text
stringlengths
2.85k
2.55M
label
class label
11 classes
arXiv:1304.0305v2 [math.AC] 3 Apr 2013 ON THE NUMBER OF GENERATORS OF IDEALS DEFINING GORENSTEIN ARTIN ALGEBRAS WITH HILBERT FUNCTION   n+1 n+1 (1, n + 1, 1 + 2 , . . . , 2 + 1, n + 1, 1) SABINE EL KHOURY, A. V. JAYANTHAN, AND HEMA SRINIVASAN Abstract. Let R = k[w, x1 , . . . , xn ]/I be a graded Gorenstein Artin algebra . Then I = ann F for some F in the divided power algebra kDP [W, X1 , . . . , Xn ]. If RI2 is a height one ideal generated by n quadrics, then I2 ⊂ (w) after a possible change of variables. Let J = I ∩ k[x1 , . . . , xn ]. Then µ(I) ≤ µ(J) + n + 1 and I is said to be generic if µ(I) = µ(J) + n + 1. In this article we prove necessary conditions, in terms of F , for an ideal to be generic. With some extra assumptions on the exponents of terms of F , we obtain a characterization for I = ann F to be generic in codimension four. Introduction Let R = k[x1 , . . . , xr ] and I be a homogeneous ideal of R. Let A = R/I be an Artinian Gorenstein quotient of R. If r = 2, then it is known that I is a complete intersection. If r = 3, then by Buchsbaum and Eisenbud structure theorem [2], I is the (2n)th order pfaffians of a (2n+1)th order skew symmetric matrix. When r = 4, Kustin and Miller gave a structure theorem for Gorenstein Artinian ideals of the form (f, g, h, x4 J), where J is a Gorenstein ideal of height three. Let I = ⊕n≥1 In be the direct sum decomposition of a Gorenstein Artinian ideal in k[x, y, z, w]. In [4], Iarrobino and Srinivasan studied several properties of the Gorenstein ideals I such that I2 ∼ = hwx, wy, w 2i. They gave = hwx, wy, wzi or I2 ∼ a structure theorem for ideals I with I2 = hwx, wy, wzi and Hilbert function HR/I = (1, 4, 7, . . . , 1). They did this by establishing a connection between some properties of the ideal I and J = I ∩ R′ , where R′ = k[x, y, z], which is a height three Gorenstein ideal. When I2 = hwx, wy, w 2i, they named these algebras mysterious Gorenstein algebras and studied their various properties. They showed that such an ideal can be obtained as an annihilator of a homogeneous form F = G(X, Y, Z) + W Z [j−1] ∈ kDP [X, Y, Z, W ], where kDP [X, Y, Z, W ] denotes the divided power algebra. They studied the Hilbert function properties of R/I connecting it with those of R′ /J. In [3], El Khoury and Srinivasan studied certain properties of Gorenstein Artinian algebras of the form R/I, where I2 = hwx, wy, w 2i. They gave a structure theorem for 1 2 SABINE EL KHOURY, A. V. JAYANTHAN, AND HEMA SRINIVASAN such ideals. They showed that I is generated by I2 , J = I ∩ R′ and an element of the form wz β − g, where g ∈ R′ ∈ / I. It can easily be seen that gx, gy ∈ J. El Khoury and Srinivasan proved that  wx, wy, w 2, α1 , . . . , αn−1 , z j , wz β − g is a minimal generating set for I unless gx or gy is already a minimal generator of J = (α1 , . . . , αn−1 , z j ). In that case, dropping each of gx and gy that is a minimal generator for J, the remaining n + 3 or n + 2 elements minimally generate I. They obtained a minimal free resolution of R/I in all three cases where neither gx nor gy is a part of a minimal generating set for J, either one of them is a minimal generator and both are minimal generators for J. They also studied a special case of these ideals namely, F = X [a] H(Y, Z) + W Z [j−1] . In that case, they described completely the minimal free resolution of R/I. They concluded their article with an interesting question on classification of ideals I with n + 2, n + 3 and n + 4 number of generators where n denotes the minimum number of generators of J. In this article, we consider the problem in higher embedding dimensions and partially answer this question. Let R = k[w = x0 , x1 , . . . xn ] be a standard graded ring of dimension n + 1 and I a ho  mogeneous Gorenstein ideal of height n+1 with H(R/I) = (1, n+1, 1+ n+1 , . . . , n+1 + 2 2 1, n + 1, 1). Suppose the ideal RI2 has height one. Then after a possible change of vari[j−1] ables, I equals ann F , where F = G(X1 , . . . , Xn ) + W [j] or F = G(X1 , . . . Xn ) + W Xn under Macaulay equivalence. Let J = I ∩ k[x1 , . . . xn ] = I ∩ R′ so that R = R′ [w]. If F = G(X1 , . . . Xn ) + W [j], then J is Gorenstein of height n and I is minimally generated by J, wxi , 1 ≤ i ≤ n − 1, w β − g [j−1] for some g ∈ R′ and not in I. If F = G(X1 , . . . Xn ) + W Xn , then I is generated by J, wxi , 1 ≤ i ≤ n − 1, w 2, wxβn − g for some β ≤ j − 1 and g ∈ R′ \J. In the generic case, all of these are minimal generators, that is gxi is not a minimal generator of J for any i. Thus, if G is sufficiently general, µ(I) = µ(J) + n + 1 and we say G or I = ann(G + W Z [j−1]) is generic. Since there is a one-to-one correspondence between the height four Gorenstein ideals I with the property that I2 ∼ = (wxi , 1 ≤ i ≤ n − 1, w 2 ) and homogeneous forms F = G(X1 , . . . Xn ) + W Z [j−1] ∈ kDP [W, X1 , . . . Xn−1 , Xn = Z], classifying such ideals is equivalent to classifying these homogeneous forms in the divided power algebra. Therefore, we try to classify the property of I being generic in terms of certain properties of the homogeneous form F such that I = ann F . ∂G + W Z [j−1] ) In Section 1, we begin by comparing I = ann(G + W Z [j] ) and Ixi = ann( ∂X i in general and show that when Xi divides G, I can be generic only if Ixi is generic. When ON THE NUMBER OF GENERATORS OF IDEALS DEFINING GORENSTEIN ARTIN ALGEBRAS 3 n = 3, for Gorenstein Artinian algebras, we have more specific results. We prove that if I = ann(F ) is generic, then there are some relations among the X, Y and Z-degrees of F. In Section 2, we study the case when F = G(Y, Z) + X [a] G1 + W Z [j−1] . When a > j/2 we prove that I is generic if and only if max degY (G) = max degY (G1 ). In the next section, we discuss the general case, where F = G(Y, Z) + X [a1 ] G1 (Y, Z) + · · · + X [an ] Gn (Y, Z) + W Z [j−1] . Assuming that j − an < a1 < · · · < an , we obtain necessary and sufficient conditions for I to be generic. We conclude our article by comparing the Hilbert functions of R/I and R′ /J. As a consequence, we show that certain classes of Cohen-Macaulay height three ideals in k[x, y, z] are unimodal, even though they are not Gorenstein. 1. Genericity Let R be a standard graded k algebra of dimension n + 1 and I be a graded Gorenstein  ideal of height n+1 such that H(R/I) = (1, n+1, 1+ n+1 , . . . , n+1, 1). Then the ideal I 2 has n quadrics amongst its minimal generators. Suppose these quadrics generate an ideal I2 of height one, then there exists a one form w such that I2 ⊂ (w) and R = k[w, x1 , . . . xn ] for some suitable one form xi . Let R′ = k[x1 , . . . , xn ] and J = I ∩ R′ . We will make use of the Macaulay equivalence between graded Gorenstein ideals of socle degree j in R = k[w, x1 , . . . xn ] and j-forms in the divided power algebra R∗ = kDP [X1 , . . . , Xn ] by the action of R on R∗ by differentiation. If F ∈ R∗ , then ann F = {f ∈ R | (∂/∂f )(F ) = 0}. The multiplication in the divided power algebra is different from the usual polynomial X [a+b] . algebra : X [a] · X [b] = (a+b)! a!b! [j−1] In our situation, I = ann F , where F = G + W [j] or G + W Xn depending on whether w 2 ∈ / I or w 2 ∈ I. When G is generic among R[X1 , . . . Xn ], µ(I) = µ(J) + n + 1. We say that F is generic mod W and the corresponding ideal I = ann F is generic if µ(I) = µ(J) + n + 1. If w 2 ∈ / I, then we can see that I2 = (wxi , 1 ≤ i ≤ n) and R′ /J is a Gorenstein Artin algebra of embedding dimension n. The minimal number of generators for I, µ(I) is precisely n+1 more than that of J for I = (J, wx1 , . . . , wxn , w j −g) for some g ∈ R′ , g ∈ / J. Thus µ(I) = µ(J) + n + 1 and in this case, I is always generic in our sense. From now on, we consider the case where w 2 ∈ I. Then w 2 is one of the quadrics minimally generating I and for a suitable choice of one forms x1 , . . . xn−1 , xn = z, I2 ∼ = 4 SABINE EL KHOURY, A. V. JAYANTHAN, AND HEMA SRINIVASAN (w 2 , wx1 , . . . wxn−1 ). There exists a unique F = G(X1 , . . . , Xn−1 , Z) + W Z [j−1] of degree j in the divided power algebra such that I = ann F . It has been proved in [3] that I is generated by (I2 , J, wz β − g) with J = I ∩ k[x1 , . . . , xn = z], g ∈ k[x1 , . . . , xn−1 , z] \ J and β ≤ j − 1. Suppose J is minimally generated by α1 , . . . , αn = z j . Since wxi are in I, gxi , 1 ≤ i ≤ n − 1 belong to J. Therefore, if gxi ∈ nJ, where n = (x1 , . . . xn−1 , z) ⊂ k[x1 , . . . , xn−1 , z], then they are not part of any minimal generating set for J and hence µ(I) = µ(J) + n + 1. Depending on whether gxi ’s are part of a minimal generating set for J, the number of minimal generators for I will be µ(J) + t for 2 ≤ t ≤ n + 1. We summarize this as: Remark 1.1. If A = R/I is a Gorenstein Artin algebra with Hilbert function (1, n +  1, 1 + n+1 , . . . , n + 1, 1), then after a linear change of variables, R = k[x1 , . . . , xn , w] 2 and there exists a unique minimal generator for I of the form wxtn − g(x1 , . . . xn ). If J = I ∩ k[x1 , . . . , xn ], then µ(I) = µ(J) + n + 1 − r, where r is the cardinality of {i | gxi ∈ J/mJ}. Thus, I is generic if and only if gxi ∈ (x1 , . . . xn )J for all 1 ≤ i ≤ n − 1. The purpose of this paper is to classify these polynomials F that give rise to generic ideals I. We begin by proving a result which helps us restrict our study to a simpler class of polynomials. Let F = G(X1 , . . . , Xn−1 , Z) + W Z [j−1] and I = ann F . Without loss of generality, we may also assume that G does not have a term in LZ j−1 where L is a linear form for in that case we can replace W by (W +L). In what follows we will take I = ann F with F as above. For any form F ∈ kDP [X1 , . . . , Xn−1 , Z, W ], FX denotes the partial with respect to X. Theorem 1.2. Suppose F ′ = Xt G + W Z [j] for some t, 1 ≤ t ≤ n − 1. If ann F is generic, then so is ann F ′ . Proof. Let Xt = X, I ′ = ann F ′ and I = ann F . Let R′ = k[x1 , . . . , xn−1 , z] and J ′ = ′ I ′ ∩k[x1 , . . . , xn−1 , z]. Then I ′ = (wxi , 1 ≤ i ≤ n−1, w 2, J ′ , wz β −g ′ ) for some g ′ ∈ R′ \ J ′ ′ and β ′ ≤ j. We first show that wz β −g ′ can be replaced with wz β+1 −h for some h ∈ R′ \ J ′ and hx ∈ nJ ′ . Claim: wz β − g ∈ I for some g if and only if wz β+1 − gx ∈ I ′ . ON THE NUMBER OF GENERATORS OF IDEALS DEFINING GORENSTEIN ARTIN ALGEBRAS 5 Proof of the claim: If wz β − g ∈ I, then 0 = ∂G ∂W Z [j−1] ∂G ∂W Z [j−1] ∂F = + − − ∂wz β − g ∂wz β ∂wz β ∂g ∂g = Z [j−β−1] − This implies ∂G ∂Z [j−1] −W . ∂g ∂g ∂Z [j−1] ∂G = 0 and = Z [j−β−1] . Now, consider ∂G ∂g ∂G′ ∂W Z [j] ∂G′ ∂W Z [j] ∂(G′ + W Z [j] ) = + − − ∂wz β+1 − gx ∂wz β+1 ∂wz β+1 ∂gx ∂gx ∂G = Z [j−β−1] − ∂g = 0. Therefore wz β+1 − gx ∈ ann(G′ + W Z [j]) = I ′ . Suppose wz t − h′ ∈ I ′ for some t < β + 1 and h′ ∈ / J ′ . Then ∂G′ ∂W Z [j] ∂G′ ∂W Z [j] ∂(G′ + W Z [j]) = + − − wz t − h′ ∂wz t ∂wz t ∂h′ ∂h′ ∂Z [j] ∂G′ − W . = Z [j−t] − ∂h′ ∂h′ 0 = ∂Z [j] ∂G′ = 0 and = Z [j−t] . This implies that x divides h′ . Let h′ = xh for some ∂h′ ∂h′ h. Consider wz t−1 − h, Hence ∂G ∂W Z [j−1] ∂G ∂W Z [j−1] ∂G + W Z [j−1] = + − − ∂wz t−1 − h ∂wz t−1 ∂wz t−1 ∂h ∂h [j−1] ∂G ∂Z = Z [j−t] − −W . ∂h ∂h ∂Z [j−1] is non-zero, then h contains a pure power of z, which must be z t . But ∂h ∂G′ = Z [j−t] would then mean that G′ has a term XZ j which is not possible by our ∂h′ assumption on F . ∂Z [j−1] ∂G′ ∂G + W Z [j−1] Therefore = 0. Since G = and h′ = xh, we get = 0. There∂h ∂x ∂wz t−1 − h fore wz t−1 − h ∈ I. This contradicts the minimality of β. This completes the proof of the claim. If 6 SABINE EL KHOURY, A. V. JAYANTHAN, AND HEMA SRINIVASAN Suppose I = (I2 , J, wz β − g) is generic and let I ′ = (I2 , J ′ , wz β+1 − gx). First note that if h ∈ nJ, then hxt ∈ nJ ′ for all t. Since gxt ∈ nJ, gxs xt ∈ nJ ′ for all 1 ≤ s, t ≤ n. Therefore they are not part of minimal generating set for J ′ . Hence I ′ is generic.  We may also restate the theorem as a necessary condition as follows: Let I = ann F = G+W Z [j]. Suppose G = Xt GXt for some 1 ≤ t ≤ n−1. Then I = ann F is generic if ann GXt + W Z [j−1] is generic. As a result of the above theorem, we concentrate on polynomials F = G + W Z [j−1] in the divided power algebra such that none of the Xi , 1 ≤ i ≤ n − 1 divides G and of course that G has no term containing Z [j−1]. The converse of the above theorem is not true in general as we can see in the Example 4.2. We remark that it is not always the case that we can achieve ’genericity’ by multiplying by an Xi even if one of gxj is a non-minimal generator for the corresponding ideal J. See the examples in the last section. However, it is an interesting question, whether if [j−1] F = G + W Xn ∈ kDP [X1 , . . . Xn , W ] is not generic, does there exist a suitable power of Xi , 1 ≤ i ≤ n − 1 multiplying G by which will result in a generic ideal, better yet, does [j] there exist a suitable one form L(X1 , . . . Xn−1 ) so that I ′ = ann(LG + W Xn ) is such that µ(I ′ ) = n + 1 + µ(I ′ ) ∩ k[x1 , . . . , xn ]? 2. Embedding Dimension Four In embedding dimension 4, we can get a stronger characterization. We now let n = 3 so that R = k[w, x, y, z]. Notation 2.1. For the rest of the paper, we set F = G0 + X [a1 ] G1 + · · · + X [al ] Gl + W Z [j−1] ! m X X cr1k Y [r1k ] Z [s1k ] = cp−t Y [p−t] Z [q+t] + X [a1 ] t=0 + · · · + X [an ] r1k +s1k =j−a1 X rnk +snk =j−an crnk Y [rnk ] Z [snk ] ! + W Z [j−1], where cp 6= 0, a1 < · · · < an and one of the G′i s contain a pure power of Z. For a polynomial h(x1 , . . . , xl ) ∈ k[x1 , . . . , xl ], let degxi h denote the highest power of xi in h. Thus, in F as in 2.1, degX F = an ,. ON THE NUMBER OF GENERATORS OF IDEALS DEFINING GORENSTEIN ARTIN ALGEBRAS 7 We first obtain a necessary condition for an ideal to be generic in terms of F . Before we prove the result, we prove a technical, but very important lemma that is needed in the proof of this theorem. This lemma will play a crucial role in the proofs of all the forthcoming characterization results as well. Lemma 2.2. With the notation as in 2.1, if degY G0 = p then ann G0 doesn’t have elements of degree less than or equal to j − p other than y p+1 when p < j − p. Proof. Clearly y p+1 ∈ ann G0 . Suppose ann G0 contains a generator of degree less than q, P say g = ki=0 αi y r−i z i for some 0 ≤ k ≤ r, where αk 6= 0. Then we have 0= ∂cp Y [p] Z [q] + cp−1 Y [p−1] Z [q+1] + . . . + cp−m Y [p−m] Z [q+m] ∂G0 = ∂g ∂αr y r + αr−1 y r−1z + · · · + αk y r−k z k = αk cp Y [p−r+k]Z [q−k] + terms in Y of degree less than p − r + k. Since cp 6= 0, αk = 0, which is a contradiction. Hence the assertion follows.  Theorem 2.3. With the notation as in 2.1, if I is generic, then either a1 ≤ degY G0 or degY G0 ≤ max{degY Gi : i = 1, . . . , n}. Proof. We first show that if f ∈ ann F with deg f < a1 , then either f ∈ ann G0 ∩ P P ann W Z [j−1] ∩ ann( ni=1 X [ai ] Gi ) or f ∈ ann(G0 + W Z [j−1]) ∩ ann( ni=1 X [ai ] Gi ). For if f ∈ ann F , then n ∂G0 X ∂X [ai ] Gi ∂W Z [j−1] ∂F = + + . 0= ∂f ∂f ∂f ∂f i=1 Therefore n X ∂X [ai ] Gi ∂G0 ∂W Z [j−1] + =− . ∂f ∂f ∂f i=1 Since G0 is a polynomial in Y and Z, the term on the left hand side of the above equality P [a ] Z [j−1] ) does not involve X. Since deg f < a1 we get that ni=1 ∂X∂fi Gi = 0 and ∂(G0 +W = 0. ∂f We now proceed to the proof of the theorem. We show that if ai > p > rik for every i and k, where p = degY G0 , then I is not generic. We do this by considering the following two cases: Case 1. Suppose p ≤ j − p. By Lemma 2.2, y p+1 is a minimal generator for ann G0 since all other generators have degree bigger than j − p. Since p > rik for all i, k, it can be seen that y p+1 ∈ ann G0 ∩ ann W Z [j−1] ∩ ann X [ai ] Gi for all i. We then conclude that y p+1 is a minimal generator for ann F . On the other hand, note that f = wz p−1 − y p ∈ ann F . Since the degree of f = p < a1 8 SABINE EL KHOURY, A. V. JAYANTHAN, AND HEMA SRINIVASAN P and contains a term in w, we get f ∈ ann(G0 + W Z [j−1]) ∩ ann( li=1 X [ai ] Gi ). We show that f is a minimal generator. Suppose wz β − g ∈ I for some β < p − 1. It implies that y p − z p−1−β g ∈ I which is impossible since y p+1 is a minimal generator. Therefore, wz β − g ∈ / I for any β < p − 1 so that f is a minimal generator for I. Since y p+1 is a minimal generator, I is not generic. Case 2. Suppose p > j − p. In that case wz p−1 − y p ∈ ann F , but might not be a minimal generator for I. Let f = wz β−1 − g(x, y, z) be a minimal generator for I, with β ≤ p. We first show that we can replace g(x, y, z) by g(y, z). We write g(x, y, z) = g1 (y, z) + xg2 (x, y, z). Then, n X ∂X [ai ] Gi ∂G0 ∂W Z [j−1] ∂F =− − + = 0. ∂f ∂g1 (y, z) i=1 ∂g1 (y, z) + xg2 (x, y, z) ∂wz β−1 n X ∂X [ai ] Gi Since ai > p ≥ β, we get = 0. Therefore, either g1 = y p =Z and ∂g + xg 1 2 i=1 or the degree of g1 is strictly less than p. But in both cases and by Lemma 2.2, the degree of g1 is greater than j − p. On the other hand, the degree of Gi is at most j − p − 1. It [a ] follows that ∂X∂gi1 Gi = 0 for all i, and hence xg2 ∈ J. So g(x, y, z) can be replaced by g(y, z). ∂F We know that ∂g(y,z) = Z [j−β] and yg(y, z) ∈ ann F . In fact, yg(y, z) ∈ ann G0 ∩ P ann(W Z [j−1] )∩ann( ni=1 X [ai ] Gi ). As in the case of the proof of Lemma 4.2 in [3], it can be seen that ann G0 is minimally generated in k[y, z] by a regular sequence (yδ(y, z), θ(y, z)) with θ(y, z) = z t + θ1 (y, z). By Lemma 2.2, the degrees of yδ(y, z) and θ(y, z) are at least j − p + 1 and the degrees of the G′i s are at most j − p − 1. It follows that P / ann W Z j−1 . Therefore yδ(y, z) and θ(y, z) ∈ ann G0 ∩ ann( ni=1 X [ai ] Gi ). But θ(y, z) ∈ θ(y, z) ∈ / ann F , but yθ(y, z) ∈ ann F . Hence, yδ(y, z) and yθ(y, z) are minimal generators for ann F . We now show that yg(y, z) is a minimal generator for I and can be chosen to be yδ(y, z). Suppose yg(y, z) is not minimal then yg(y, z) = f1 (y, z)yδ(y, z) + f2 (y, z)yθ(y, z). It implies that g(y, z) = f1 (y, z)δ(y, z) + f2 (y, z)θ(y, z). Consider ∂G0 ∂g1 [j−β] ∂G0 ∂G0 ∂G0 = = = Z [j−β]. ∂g(y, z) ∂f1 (y, z)δ(y, z) + f2 (y, z)θ(y, z) ∂f1 (y, z)δ(y, z) We can choose g(y, z) = f1 (y, z)δ(y, z). If f1 (y, z) is a constant then we are done. Otherwise f1 (y, z) = cz u since yδ(y, z) is in J. On the other hand, δ(y, z) cannot have a pure power of z, otherwise g(y, z) will have a pure power of z and will not belong to I. But ON THE NUMBER OF GENERATORS OF IDEALS DEFINING GORENSTEIN ARTIN ALGEBRAS 9 ∂G0 = Y ∂yδ(y,z) + αZ [γ] = αZ [γ] with α 6= 0 and the multiplication is the usual polynomial multiplication. It implies that f ′ = wz β−1−u − δ(y, z) is a minimal generator for I which contradicts the minimality of f . Hence, g(y, z) = cδ(y, z) and yg(y, z) is minimal. Hence I is not generic.  ∂G0 ∂δ(y,z) In [3], it was proved that if F = X [a1 ] G1 + W Z [j−1] with a1 ≥ 1, then I is generic. Example 4.8 shows that this property does not hold if F = G0 + X [a] G1 + W Z [j−1]. Let F = G0 + X [a] G1 + W Z [j−1] m X = cp−r Y [p−r] Z [q+r] + X [a] r=0 X αri Y [ri ] Z [si ] ri +si =j−a ! + W Z [j−1]. If we suppose that a > j − a ≥ p, then we get an improved version of Theorem 2.3 in this case. Theorem 2.4. Let F be as above and suppose degX F > deg G1 ≥ degY G0 . Then I is generic if and only if degY G1 = p. [p] [a+s] Proof. Suppose degY G1 = p. We write F = c−1 Z + · · · + c2 Y [2] Z [a+s+p−2] + p Y X [a] (αp Y [p] Z [s] + · · · + α0 Z [p+s] ) + W Z [j−1] with cp , αp and α0 6= 0. p s+1 We first show that wz p+s − c−1 is a minimal generator for I. Clearly, wz p+s − p y z p s+1 c−1 ∈ I. Suppose there exists wz β − g ∈ I for some β < p + s. As in the proof of p y z Theorem 2.3, we can assume that g is a function of y and z. Then we have ∂F 0 = ∂wz β − g = Therefore ∂G0 + X [a] G1 + W Z [j−1] . ∂wz β − g ∂G0 + X [a] G1 = Z [j−1−β] = Z [a] . ∂g 0 Since G0 does not involve X and g has degree p + s < a, we get ∂G = Z [a] and ∂g ∂G1 = 0. Therefore, there exists 0 ≤ i ≤ p − 2 < a with cp−i 6= 0 such that g = ∂g −1 p−i s+i [i] [a−i] 0 = cp .c−1 + · · · + Z [a] + · · · and g1 cp−i y z + g1 (y, z). If i 6= 0, then ∂G p−i Y Z ∂g does not annihilate G0 − cp−i Y [p−i]Z [a+s+i] by Lemma 2.2, which is a contradiction. Hence [a] ∂G0 [a] [a] p s and ∂X∂g G1 = c−1 i = 0 and g = c−1 p αp X . This p y z + g1 (y, z). Therefore, ∂g = Z implies that there exists a term g2 (y, z) in g1 (y, z) in y and z of total degree p + s such [a] ∂G0 −cp Y [p] Z [a+s] [a] that ∂X∂g2G1 = −c−1 6= 0 by Lemma 2.2. Continuing in this p αp X . Again ∂g2 β manner, we see that wz − g does not annihilate F , which is a contradiction. Therefore 10 SABINE EL KHOURY, A. V. JAYANTHAN, AND HEMA SRINIVASAN p s+1 p + s is the minimum exponent β of z such that wz β − g ∈ I and hence wz p+s − c−1 p y z is a minimal generator in I. Since y p+1 ∈ I, y ·y pz s+1 is not a minimal generator of I. Note also that if j is the smallest integer so that αp−j 6= 0, then x(αp−j y pz s − αp y p−j z s+j ) ∈ I. Therefore, x · y p z s+1 is also not a minimal generator of I. Hence I is generic. We now prove the converse. We know by Theorem 2.3 that if a > p and I is generic, then αp+i 6= 0 for some i ≥ 0. With the extra assumption that F has only two terms and a > j − a, we show that αp 6= 0 and αp+i = 0 for i > 0. So it suffices to show that if there exists an i > 0 such that αp+i 6= 0, then I is not generic. Suppose αp+i 6= 0 for some i. Let ! p+r X αm Y [m] Z [p+s−m] + W Z [j−1] , F = cp Y [p]Z [a+s] + · · · + c2 Y [2] Z [a+s+p−2] + X [a] m=0 where αp+i 6= 0 for some i > 0. It is clear that wz p+s − cp −1 y p z s+1 ∈ I. If it is not a minimal generator for I, then there exists β < p + s such that wz β − g(y, z) is minimal. Then we have ∂F ∂G0 ∂G1 = Z [j−1−β] − − X [a] = 0. β ∂wz − g(y, z) ∂g ∂g 1 = 0 and ∂G = Z [j−1−β]. We first claim that g(y, z) = Since a > p + s, we get ∂G ∂g ∂g cp −1 y p z q + g1 (y, z), where p + q = β + 1 and the exponents of y in g1 (y, z) are greater p−i q than p + 1. Let g(y, z) = c−1 z + g1 (y, z), with i ≥ 0 and the exponents of y p−i y ∂(G −c Y [p−i] Z [a+s+i]) 0 p−i in g1 strictly bigger than p − i. Then, = 0. But by Lemma 2.2, ∂g(y,z) [p−i] [a+s+i] ann(G0 − cp−i Y Z ) doesn’t contain generators of degree less than a + s. This implies that i = 0. Hence g(y, z) is of the required form. p q Let q be the minimal power of z such that wz β −c−1 p y z −g1 (y, z) is a minimal generator p q −1 p q for I with g1 ∈ ann G and c−1 p y z + g1 ∈ ann G1 . We show that f = y(cp y z + g1 (y, z)) is a minimal generator for I. Suppose not, then f can be obtained from a combination of a generator of the form y p+1z q−k + g2(y, z) and other generators of I. Note that y p+1z q−k + g2 (y, z) ∈ ann G0 and hence belongs to ann G1 . We have also seen that p q p+1 q−k c−1 z + g2 (y, z) p y z + g1 (y, z)) ∈ ann G1 . It is clear that neither of the generators y −1 p q and cp y z + g1 (y, z) can be obtained from each other. We then study the minimal generators of ann G1 . We know that ann G1 is minimally generated by a regular sequence of the form (yδ(y, z), θ(y, z)) with θ(y, z) = z t + θ1 (y, z). For these generators to be in I, no pure power of z of degree less than j and no terms with degree of y less than p can appear in any of them. In that case, yδ(y, z) and θ(y, z) will be multiplied by the ON THE NUMBER OF GENERATORS OF IDEALS DEFINING GORENSTEIN ARTIN ALGEBRAS 11 appropriate power of y to get rid of the power of z and have all powers of y in their terms p q greater or equal than p+1. Since both generators y p+1z q−k +g2 (y, z) and c−1 p y z +g1 (y, z) p q are independent in ann G1 , y p+1z q−k + g2 (y, z) and y(c−1 p y z + g1 (y, z)) are independent in I. Hence f is minimal and I is not generic.  Example 4.9 shows that statement of Theorem 2.4 does not hold if p < a < p + s. Now, we will consider the general case in codimension four. Let F be as in Notation 2.1. We now obtain a generalization of Theorem 2.4. Along with Notation 2.1 we further assume that Gn has a pure power of Z (in other words, Y does not divide Gn ). We first prove a necessary condition for an ideal to be generic. Theorem 2.5. Let F be as in Notation 2.1 with j − an < a1 , Y not dividing Gn and degY Gi < degY G0 for all i = 1, . . . , n − 1. If I is generic, then degY Gn = degY G0 . Proof. By Theorem 2.3, it suffices to show that if there exists an k such that rik > p in p s+1 Gn , then I is not generic. It is clear that wz p+s − c−1 ∈ I. Suppose it is not a p y z minimal generator for I, then there exists β < p + s such that wz β − g(y, z) is minimal. Since ∂G X ∂X [ai ] Y Gi ∂Gn ∂F [j−1−β] = Z − − − X [an ] 0= β ∂wz − g(y, z) ∂g ∂g ∂g i we get ∂G = Z [j−1−β] and the rest is zero. ∂g p q As in the case of the proof of Theorem 2.4, we can see that g(y, z) = c−1 p y z + g1 (y, z) with p + q = β + 1 and g1 (y, z) having all powers of y greater than p + 1. We note that p q g1 ∈ ann G0 and c−1 p y z + g1 ∈ ann Gn ∩ ann Gi for all i = 1, . . . , n − 1 in that case. It p q can be seen that f = y(c−1 p y z + g1 (y, z)) is a minimal generator for I. For, if not, then f can be expressed as a linear combination of other generators of I, one of which is of the form y p+1z q−k + g2 (y, z). Note that y p+1z q−k + g2 (y, z) ∈ ann G0 ∩ (∩i ann Gi ) and p q p+1 q−k c−1 z + g2(y, z) p y z + g1 (y, z)) ∈ ∩i ann Gi . It is clear that neither of the generators y −1 p q and cp y z + g1 (y, z) can be obtained from each other. Again, looking at the minimal generators of ann Gn , we know they are a regular sequence of the following form (yδ(y, z), θ(y, z)) with θ(y, z) = z t + θ1 (y, z). For these generators to be in I, they must be multiplied by the appropriate power of y to get rid of the power of z and have all powers of y in their terms greater or equal than p + 1. Since both generators p q p+1 q−k y p+1z q−k +g2 (y, z) and c−1 z +g2 (y, z) and p y z +g1 (y, z) are independent in ann Gn , y −1 p q y(cp y z + g1 (y, z)) are independent in I. Hence f is minimal and I is not generic.  12 SABINE EL KHOURY, A. V. JAYANTHAN, AND HEMA SRINIVASAN Examples 4.10 and 4.11 show that the converse of Theorem 2.5 is not true in general. These examples suggest that we have to add more conditions on the exponents to obtain a converse of Theorem 2.5. We prove the converse with some extra assumptions. Theorem 2.6. Suppose degY Gn = p, degZ Gn = p + s, deg Gn < a1 and degY Gi < degY G0 for all i = 1, . . . , n − 1. If F satisfies one of the two conditions below, then I is generic. (1) degY Gi < degY (Gn − Y p Z s ); (2) degZ Gi < degZ Gn for all i < n. p s+1 Proof. We first show that wz p+s − c−1 is a minimal generator for I. Suppose not, p y z β let wz − g ∈ I, where β < p + s. Then ∂F ∂wz β − g ∂[G0 (Y, Z) + X [a1 ] G1 + · · · + X [an ] Gn + W Z [j−1] ] = . ∂wz β − g 0 = Therefore ∂[G0 (Y, Z) + X [a1 ] G1 + · · · + X [an ] Gn ] = Z [j−1−β] ∂g Since ai > j − an = p + s, g may be assumed to be a function of y and z. Hence we get ∂G0 (Y, Z) = Z [j−1−β] and ∂g(y, z) ∂X [ai ] Y Gi (Y, Z) = 0. ∂g(y, z) By Lemma 2.2, ann G0 (Y, Z) does not contain generators of degree less than an + s = p s j − p. Therefore g = c−1 p y z + g1 for some polynomial g1 . But in that case, we have ∂X [an ] Gn (Y,Z) p s ∂c−1 p y z [an ] = αp c−1 and hence g1 must contain a term g2 with the power of y less p X [an ] than p such that ∂X ∂gG2n (Y,Z) = −X [an ] . Continuing in this manner, we see that wz β − g can not annihilate F , which is a contradiction. Therefore wz β − g 6∈ I for β < p + s and p s+1 hence wz p+s − c−1 is a minimal generator. p y z Note that since y p+1 ∈ I, y · y pz s+1 is not a minimal generator. Also we have in case (1) that x(αp y p−k z s+k − αp−k y p z s ) ∈ I and in case (2), x(αp z s+p − α0 y p z s ) ∈ I, which implies that xy p z s is not a minimal generator of I. Hence I is generic.  3. Hilbert Functions of I and J In this section we compare the Hilbert functions of I and J = I ∩ k[x, y, z]. It can be noted that these results are independent of whether the ideal is generic or not. ON THE NUMBER OF GENERATORS OF IDEALS DEFINING GORENSTEIN ARTIN ALGEBRAS 13 Proposition 3.1. Let R = k[x, y, z, w], F = G + W Z [j−1] , I = ann(F ) and J = I ∩ k[x, y, z]. Then HR/I − HR′ /J = [0, 1, . . . , 1, 0, . . .], where the last 1 occurs at the degree β. Proof. Let I = (I2 , J, wz β − g), where g ∈ k[x, y, z] \ J. Clearly HR/I (0) − HR′ /J (0) = 0 and HR/I (1) − HR′ /J (1) = 1. Note that I2 = hwx, wy, w 2i and J has generators of degree at least 3. Therefore HR/I (2) = 10 − 3 = 7 and HR′ /J (2) = 6. For 3 ≤ n ≤ β, In , as a k-vector space, is generated by I2 Rn−2 and Jn . If a monomial m1 ∈ [R/I]n is a k-basis element, then either m = wz n−1 or w does not divide m and m is a k-basis element of [R′ /J]n . Therefore, dimk [R/I]n = dimk [R′ /J]n + 1 for all 3 ≤ n ≤ β. For n = β + 1, one can see that wz β − g ∈ I and g ∈ / I and hence g ∈ / J. Moreover, for n n−β−1 n−β−1 n−β−1 n ≥ β + 1, wz = z g(mod I) and z g ∈ I if and only if z g ∈ J. Therefore, HR/I (n) − HR′ /J (n) = 0 for n ≥ β + 1. Hence the assertion is proved.  It is known that height three Gorenstein ideal in k[x, y, z] is unimodal, see [7]. As a corollary of the previous result, we obtain a class of Artinian level algebras of embedding dimension three, namely type two and at least one of the socle elements is a pure power of a one form, having unimodal Hilbert function. Corollary 3.2. If J ⊂ R′ = k[x, y, z] is an ideal such that J = ann(G, Z [deg G−1] ) for some polynomial G in the divided power algebra kDP [X, Y, Z], then the Hilbert function of J is unimodal. Proof. Let J be an ideal of the given form. Let I = G + W Z [j−1]. Then it can be seen that J = I ∩ R′ . From Proposition 3.1, it follows that HR′ /J = HR/I − [0, 1, . . . , 1, 0..], where the last 1 occurs at the degree β. Since I is a Gorenstein ideal with initial degree 2, HR/I is unimodal, [6, Theorem 3.1]. Therefore HR′ /J is unimodal.  4. Examples In this section we provide some examples to illustrate our results. We follow the notation that was set earlier, i.e., given a homogeneous form F in the divided power algebra kDP [W, X1 , . . . , Xn ], I = ann(F ) ⊂ k[w, x1 , . . . , xn ] and J = I ∩ k[x1 , . . . , xn ]. The following is an example of Theorem 1.2. Example 4.1. Let F ′ = G + W Z [9] = X [8] Y [2] + X [3] Y [3] Z [4] + X [2] Y Z [7] + W Z [9] and ∂2G [7] = X [6] Y [2] +XY [3] ]Z [4] +Y Z [7] +W Z [7]. If I ′ = ann(F ′ ) and I = ann(F ), F = ∂X 2 +W Z then it can be seen that µ(I ′ ) = 13 and µ(J ′ ) = 9 and µ(I) = 9 and µ(J) = 5. The following example shows that the converse of Theorem 1.2 is not true in general. 14 SABINE EL KHOURY, A. V. JAYANTHAN, AND HEMA SRINIVASAN Example 4.2. Let I = ann(Y [5] Z [8] +Y [4] Z [9] +X [5] (Y [6] Z [2] +Y [7] Z +Y [8] +Z [8] )+W Z [12] ) and I ′ = ann(XY [5] Z [8] + XY [4] Z [9] + X [6] (Y [6] Z [2] + Y [7] Z + Y [8] + Z [8] ) + W Z [13] )). Then µ(I) = 11, µ(J) = 8, µ(I ′ ) = 13 and µ(J ′ ) = 9. Therefore I ′ is generic, but I is not. The following is an example where ann(G + W Z [j−1]) is not generic and ann(X t G + W Z [t+j−1] ) is also not generic for some t. Example 4.3. Let F = G+W Z [12] = Y [3] Z [10] +Y [4] Z [9] +Y [5] Z [8] +Y [2] Z [11] +X [6] (Y [4] Z [3] + Y [2] Z [5] + Z [7] ) + X [7] (Y [3] Z [3] + Y Z [5] + Z [6] ) + W Z [12] . It can be seen that I = ann(F ) is not generic. Moreover, ann(X t G + W Z [12+t] ) is not generic for t = 1, 2, 3 and that I = ann(X 4 G+W Z [16] ) is generic. In a similar manner, one can see that ann(Y t G+W Z [12+t] ) is also not generic for t = 1, 2, 3, 4 and that ann(Y 5 G + W Z [17] ) is generic. The following example, in codimension five, shows that I = ann(G + W Z [j−1] ) ⊂ k[w, t, x, y, z] need not be generic but I = ann(T G + W Z [j]) is generic. Example 4.4. Let I = ann(Y [3] Z [9] + Y [4] Z [8] + T [3] Z [9] + X [3] (Y [4] Z [4] T + Z [9] + +W Z [11] ) and I ′ = ann(XY [3] Z [9] + XY [4] Z [8 + XT [3] Z [9] + X [4] (Y [4] Z [4] T + Z [9] + W Z [12] )). Then µ(I) = 14, µ(J) = 10, µ(I ′) = 16 and µ(J ′ ) = 11. Here, I is not generic as t4 is a minimal generator of J. But I ′ is generic for t4 is no longer the obstruction, for wz 3 −xt3 is the minimal generator of I ′ . The following is an examples of an ideal which is not generic when a > p and p > rik . Example 4.5. If F = Y [10] Z [5] + Y [9] Z [6] + Y [6] Z [9] + X [11] (Y [2] Z [2] + Z [4] ) + W Z [14] , then µ(I) = 9 and µ(J) = 6. Here wz 7 − y 8 + y 7z − y 6z 2 + y 5z 3 − yz 7 is a minimal generator for I. It can also be seen that ann G is minimally generated in k[y, z] by (θ, δ1 ) = (y 8 +y 7 z −y 5 z 3 −2y 4 z 4 −y 3 z 5 +y 2 z 6 +3yz 7 +3z 8 , y 7z 2 −y 4 z 5 −y 3 z 6 +yz 8 +2z 9 ). Note that we may replace δ1 by 3δ1 + (2z + y)θ = yg(y, z) which makes yg(y, z) a minimal generator (see the proof of Theorem 2.3). We have noticed that if p ≤ rik for some i and k, then the classification is more complicated. It does not only depend on the powers alone, but also on the coefficients as we see in the example below: Example 4.6. If I = ann(Y [3] Z [8] + Y [4] Z [7] + X [5] (Y [4] Z [2] + Y [3] Z [3] + Z [6] ) + W Z [10] ) then µ(I) = 9 and µ(J) = 5 whereas if I = ann(Y [3] Z [8] + Y [4] Z [7] + X [5] (2.Y [4] Z [2] + Y [3] Z [3] + Z [6] ) + W Z [10] ) then µ(I) = 11 and µ(J) = 8. Examples 4.7 and 4.8 are examples of Theorem 2.4. ON THE NUMBER OF GENERATORS OF IDEALS DEFINING GORENSTEIN ARTIN ALGEBRAS 15 Example 4.7. Let F = Y [4] Z [10] + Y [3] Z [11] + X [8] (Y [4] Z [2] + Y [3] Z [3] + Y [2] Z [4] + Z [6] ) + W Z [13] . In this case, degY G1 = p and one can see that the ideal I = ann(F ) is generic with µ(I) = 11 and µ(J) = 7. Example 4.8. Let F = Y [4] Z [10] + Y [3] Z [11] + X [8] (Y [5] Z + Y [4] Z [2] + Y [3] Z [3] + Y [2] Z [4] + Z [6] ) + W Z [13] . In this case degY G1 > p and we have µ(I) = 11 and µ(J) = 8. Example below shows that Theorem 2.4 doesn’t work if p ≤ a: Example 4.9. Let F = Y [4] Z [7] + Y [3] Z [8] + X [4] (Y [4] Z [3] + Z [7] ) + W Z [10] . Here, a < degX F = 4 < deg G1 = 7. One can see that µ(I) = 9 and µ(J) = 6. Whereas if F = Y [4] Z [7] + X [4] (Y [4] Z [3] + Z [7] ) + W Z [10] , then µ(I) = 9 and µ(J) = 5. In the above examples, we have degX F < deg G1 . While the first one is generic, the second one is not. This shows that our characterization is not valid without the given hypotheses. The example below shows that the converse of Theorem 2.5 is not true. Example 4.10. It can be seen that ann(Y [5] Z [12] + Y [4] Z [13] + X [8] (Y [4] Z [5] + Y [3] Z [6] + Y [2] Z [7] +Y Z [8] )+X [9] (Y [4] Z [4] +Y [3] Z [5 )+X [10] (Y [5] Z [2] +Y [4] Z [3] +Y [3] Z [4] +Z [7] )+W Z [16] ) is generic whereas ann(Y [5] Z [12] + Y [4] Z [13] + X [7] (Y [4] Z [6] + Y [3] Z [7] + Y [2] Z [8] + Y Z [9] ) + X [9] (Y [4] Z [4] + Y [3] Z [5] ) + X [11] (Y [5] Z + Y [4] Z [2] + Y [3] Z [3] + Z [6] ) + W Z [16] ) is not. Note that in both cases j − a1 < a1 , degY Gi < degY G0 and degY G3 = degY G0 = 5. The example below shows that we cannot remove the conditions degY = Gi < degY = G0 , 1 ≤ i ≤ n − 1 in Theorem 2.5. In F , all conditions except degY G1 = 6 > degY G0 = 5 are satisfied and ann F is generic and the conclusion fails where as in G all conditions except degY = G0 6= degY = Gn . Hence by the theorem 2.5, ann G cannot be generic. Example 4.11. Let F = Y [5] Z [12] + Y [4] Z [13] + X [9] (Y [4] Z [4] ) + X [10] (Y [6] Z + Y [2] Z [5] + Y [3] Z [4] + Z [7] ) + X [12] (Y Z [4] + Z [5] ) + W Z [16] . In this case, 6 = r21 > p = 5, µ(I) = 15 and µ(J) = 11, which implies that I is generic. On the other hand, if G = Y [5] Z [12] + Y [4] Z [13] + X [9](Y [4] Z [4] ) + X [10] (Y [6] Z + Y [2] Z [5] + Y [3] Z [4] + Z [7] ) + W Z [16] , then µ(I) = 15 and µ(J) = 12 as predicted by Theorem 2.5. References [1] D. Eisenbud, Commutative algebra. With a view toward algebraic geometry, Graduate Texts in Mathematics, 150. Springer-Verlag, New York, 1995. [2] D. A. Buchsbaum and D. Eisenbud. Algebra structures for finite free resolutions, and some structure theorems for ideals of codimension 3, American Journal of Mathematics. 99 (1977), no.3, 447-485. 16 SABINE EL KHOURY, A. V. JAYANTHAN, AND HEMA SRINIVASAN [3] S.El Khoury and H.Srinivasan, A Class of Gorenstein Artinian Algebras of Embedding Codimension Four, Comm. in Algebra, Vol 37, (2009), Issue 9, 3259 – 3277. [4] A. Iarrobino and H. Srinivasan, Artin Gorenstein algebras of embedding dimension four: components of PGor(H) for H = (1, 4, 7, . . . , 1) J. Pure Appl. Algebra 201 (2005) 62–96. [5] F.H.S. Macaulay, The Algebraic Theory of Modular Systems, Cambridge University Press, Cambridge, UK, (1916) reprinted with a foreword by P.Roberts, Cambridge University Press, London, New York, 1994. [6] J. Migliore, U. Nagel and F. Zanello, A Characterization of Gorenstein Hilbert functions in codimension four with small initial degree, Math. Res. Lett. 15 (2008) no. 2, 331 – 349. [7] R. P. Stanley, Hilbert functions of graded algebras, Math. Res. Lett. 28(1978) no. 1 57 – 83. Department of Mathematics, American University of Beirut, Beirut, Lebanon E-mail address: [email protected] Department of Mathematics, I.I.T. Madras, Chennai, Indian - 600036. E-mail address: [email protected] Department of Mathematics, University of Missouri, Columbia, Missouri, USA E-mail address: [email protected]
0math.AC
Path Planning With Kinematic Constraints For Robot Groups arXiv:1704.07538v1 [cs.AI] 25 Apr 2017 Wolfgang Hönig, T. K. Satish Kumar, Liron Cohen, Hang Ma, Sven Koenig, Nora Ayanian Abstract— Path planning for multiple robots is well studied in the AI and robotics communities. For a given discretized environment, robots need to find collision-free paths to a set of specified goal locations. Robots can be fully anonymous, non-anonymous, or organized in groups. Although powerful solvers for this abstract problem exist, they make simplifying assumptions by ignoring kinematic constraints, making it difficult to use the resulting plans on actual robots. In this paper, we present a solution which takes kinematic constraints, such as maximum velocities, into account, while guaranteeing a user-specified minimum safety distance between robots. We demonstrate our approach in simulation and on real robots in 2D and 3D environments. I. INTRODUCTION Path planning for multiple robots has many applications, including improving traffic at intersections, search and rescue, formation control, warehouse management, airport scheduling, and assembly planning. There are two existing major approaches: The first one works in continuous environments and can take kinematic constraints into account but does not perform well in highly cluttered, puzzle-like scenes, and the second one works in discrete environments with artificial agents without motion constraints. Hence, it is desirable to combine the two approaches by providing a planner which can deal with highly cluttered, puzzle-like scenes even under kinematic constraints. We tackle this challenge by introducing a postprocessing step that works on the output of a discrete solver. While the solver itself is allowed to make simplifying assumptions in order to run faster, our postprocessing step reinstates the adherence to real-world kinematic constraints. Solvers from the AI community for Multi-Agent PathFinding (MAPF) problems and Target-Allocation and PathFinding (TAPF) problems are able to solve instances with hundreds of agents [1]. For the MAPF problem, each agent has an assigned start- and goal location. The objective is to find a set of synchronized paths, one path per agent, such that each agent reaches its goal location without colliding with other agents while minimizing the number of actions required. Each agent can either move to an adjacent location in one timestep or wait. The TAPF problem is a generalization in which the agents are partitioned into K groups. A set of goal locations is assinged to each group. A solver The Science authors are with at the University the of Department of Computer Southern California, USA. [email protected], [email protected], {hangma,lcohen,skoenig,ayanian}@usc.edu. Our research was supported by ARL under grant number W911NF-14-D-0005, ONR under grant numbers N00014-14-1-0734 and N00014-09-1-1031, NASA via Stinger Ghaffarian Technologies, and NSF under grant numbers 1409987 and 1319966. s11 s21 A B C g12 g11 D E F (a) Example environment with two robots. The lighter circles on the right mark the goal locations. Fig. 1. (b) Graph representation of the example environment. Running TAPF example with 2 groups. allocates a specific goal location to each agent and reports a set of synchronized paths for all agents. If K = 1, all agents are anonymous, and, if K equals the number of agents, TAPF is the same as MAPF. Therefore, we will focus on TAPF in the remainder of this paper. Using a TAPF solution on real robots has several limitations: (a) robots have kinematic constraints, such as maximum velocities and accelerations; and (b) the generated solution’s timing is inflexible, necessitating costly replanning when robots execute the solution imperfectly. A framework that does not explicitly address faulty execution can cause undesirable robot-robot collisions or repeated replanning. To overcome these limitations while still being able to make use of powerful solvers developed in the AI community, we propose the use of a postprocessing step based on the algorithmic framework of Simple Temporal Networks (STNs). II. TAPF We are given an undirected graph G1 = (V1 , E1 ) and K multi-agent groups {group1 , group2 , . . . , groupK }, where groupi consists of Ki interchangeable robots {ai1 , ai2 , . . . , aiKi } for all i ∈ {1, 2, . . . , K}. Each robot aij has a unique start location sij ∈ V1 , and the i-th group has a i }. A solution set of unique target locations {g1i , g2i , . . . , gK i to the TAPF problem finds K permutations, one for each group, to uniquely assign a target location to each robot and a collision-free path for each robot to navigate from its start location to the assigned goal location. A more rigorous mathematical description is given in [1]. The makespan is the total time until the last robot reached its goal location. A solution is optimal if the makespan is minimal. For the case of a single group, the problem can be solved in polynomial time. However, in general, it is NPhard to approximate an optimal solution within any constant factor less than 4/3 [2]. The Conflict-Based Min-Cost-Flow (CBM) algorithm uses a hierarchical approach, where the lower level uses a maxflow algorithm and the higher level uses a best-first search, which tries to resolve conflicts as they occur [1]. It has been A10 B11 C21 D31 E41 B02 C12 F22 C32 D42 Fig. 2. Temporal plan graph with safety markers. shown empirically that this method works well in warehouse domains with dozens of teams and hundreds of agents. An example of a TAPF instance is shown in Fig. 1. Here, there are two groups, that each contain a single robot. The robots are holonomic and move in a discretized environment. One optimal solution of the given TAPF problem is hA, B, C, D, Ei for one robot and hB, C, F, C, Di for the other robot. III. STN The output of the TAPF solver is a set of synchronized paths, assuming that robots can traverse the unit-length edges in unit time. We call the change of location of an agent event. In order to include kinematic constraints, such as maximum velocities of the different robots, we use a Temporal Plan Graph (TPG). The TPG captures the partial order of the events determined by the TAPF solver. More formally, the TPG is an acyclic graph G2 = (V2 , E2 ), where each vertex v ∈ V2 represents an event and each edge hu, vi ∈ E2 indicates that u should be scheduled before v. In the TAPF case, there are two kinds of temporal precedences. First, the precedence which captures the location visit order for each robot individually. Second, the TAPF solution synchronizes the paths between robots to avoid conflicts. This happens if robot 1 visits a location at timestep t1 and robot 2 visits the same location at timestep t2 > t1 . Moreover, we can add safety markers as additional events to ensure a minimum safety distance between robots at any time. There are several methods to do so. An LP-solver can be used to optimize for maximum throughput or minimum makespan [3]. If the desired safety distance divides the edge length, the problem can be solved with a user-specified edgelength in strongly polynomial time by using a shortest path algorithm [4]. One example of a TPG with safety markers is shown in Fig. 2. The TPG captures only the necessary partial order on events. In order to include kinematic constraints such as maximum velocities for robots or certain parts of the environment, we can extend it to a simple temporal network (STN). An STN can be encoded as directed graph G3 = (V3 , E3 ), where V3 = {X0 , X1 , . . . , XN } and E3 are the sets of events and edges, respectively. Each edge e = hXi , Xj i ∈ E3 has lower and upper bounds [LB(e), U B(e)], indicating that Xj has to be scheduled between LB(e) and U B(e) time units after Xi . IV. EXPERIMENTS We implement TAPF and MAPF solvers as well as various variants of the STN framework in C++. For performance evaluation, we randomly generate 10 × 10 × 5 maps with Fig. 3. Examples of the experiments on robots. There are two groups of four robots each trying to change formation in an environment with obstacles. varying numbers of robots, groups, and obstacles and measure how long the TAPF solver takes to find an optimal solution. For example, a scenario with 150 obstacles and 100 robots in 5 groups can be solved in about 5 s on commodity hardware. The time the STN requires to compute a solution varies by method and desired safety distance. Interestingly, its runtime is smaller in the common case of a large safety distance, because fewer markers are required in that case. In a warehouse-like domain with 100 robots, it takes 4 s to compute a solution. We verified our approach in simulation using the VREP robotics simulator for differential drive robots, 6-legged robots, and quadcopters. Furthermore, we performed experiments with up to 8 iRobot Create2 robots, verifying that actual robots are actually able to follow the computed trajectories. An example is shown in Fig. 3. V. CONCLUSION We presented an approach for using powerful solvers from the AI community for multi-agent path finding on actual robots, which obey kinematic constraints. Although not shown here, our approach is optimal with respect to the makespan under some conditions. We demonstrate the applicability of our approach through simulation and on actual robots. In the future, we would like to test our framework on physical quadcopters and add an execution monitoring framework which makes use of the “slack” of the STN to avoid costly replanning in case of inaccurate execution. R EFERENCES [1] H. Ma and S. Koenig, “Optimal target assignment and path finding for teams of agents,” in International Conference on Autonomous Agents and Multiagent Systems, 2016. [2] H. Ma, C. Tovey, G. Sharon, T. K. S. Kumar, and S. Koenig, “Multiagent path finding with payload transfers and the package-exchange robot-routing problem,” in AAAI Conference on Artificial Intelligence, 2016. [3] W. Hönig, T. K. S. Kumar, L. Cohen, H. Ma, H. Xu, N. Ayanian, and S. Koenig, “Multi-agent path finding with kinematic constraints,” in International Conference on Automated Planning and Scheduling, 2016. [4] W. Hönig, T. K. S. Kumar, H. Ma, S. Koenig, and N. Ayanian, “Formation change for robot groups in occluded environments,” in IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016.
2cs.AI
Temporal and Volumetric Denoising via Quantile Sparse Image (QuaSI) Prior in Optical Coherence Tomography and Beyond Franziska Schirrmacher1,∗ , Thomas Köhler1,4,∗ , Tobias Lindenberger1 , Lennart Husvogt1 , Jürgen Endres1,3 , James G. Fujimoto2 , Joachim Hornegger1 , Arnd Dörfler3 , Philip Hoelter3 , and Andreas K. Maier1 arXiv:1802.03943v1 [cs.CV] 12 Feb 2018 1 2 Pattern Recognition Lab, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany {franziska.schirrmacher, thomas.koehler}@fau.de Department of Electrical Engineering & Computer Science and Research Laboratory of Electronics, Massachusetts Institute of Technology, USA 3 Department of Neuroradiology, Universitätsklinikum Erlangen, Germany 4 e.solutions GmbH, Erlangen, Germany ∗ These authors contributed equally to this work. Abstract. This paper introduces an universal and structure-preserving regularization term, called quantile sparse image (QuaSI) prior. The prior is suitable for denoising images from various medical image modalities. We demonstrate its effectivness on volumetric optical coherence tomography (OCT) and computed tomography (CT) data, which show differnt noise and image characteristics. OCT offers high-resolution scans of the human retina but is inherently impaired by speckle noise. CT on the other hand has a lower resolution and shows high-frequency noise. For purpose of denoising, we propose a variational framework based on the QuaSI prior and a Huber data fidelity model that can handle 3-D and 3-D+t data. Efficient optimization is fascilitated through use of an alternating direction method of multipliers (ADMM) scheme and the linearization of the quantile filter. Experiments on multiple dataset emphasize the excellent performance of the proposed method. 1 Introduction Optical coherence tomography (OCT) is a standard non-invasive imaging modality within clinical workflows in ophthalmology. A fine spatial resolution and the possibility of 3-D imaging aid the diagnosis and monitoring of eye diseases. In OCT, low-coherent light passes through an interferometer-like setting and is reflected back by the object. The amount of back-reflections in a certain axial depth determines the amplitude of an interference signal at one position. From the interference signal one can obtain depth-layers of the object. There are two different types of systems: time domain OCT (TD-OCT) and Fourier domain OCT (FD-OCT). In TD-OCT, light is decomposed into two parts and propagated 2 Schirrmacher, Köhler et al. registered B-scans denoised B-scan B-scan denoising registered volumes denoised volume volumetric denoising Fig. 1: We propose two pipelines of our spatio-temporal denoising algorithm for OCT data. In the first pipeline (top), hereinafter called B-scan denoising, single B-scans or a sequence of registered B-scans are processed. The second pipeline (bottom) processes volumes as well as a sequence of registered volumes and is called volumetric denoising. through a sample and a reference arm. The light is reflected back by a mirror to assign the reflected light in the sample arm to an axial depth. In FD-OCT, the Fourier transform enables a spectral resolution of the interference signal, without scanning the reference arm. Predefined patterns are used to scan an object. At each position a 1-D A-Scan is obtained encoding the back scatter intensities in axial depth. A 2-D B-Scan comprises multiple of these A-Scans acquired with linear or circular scan patterns. Current OCT systems also provide volumetric data called C-scans. To this end, several parallel B-scans are conducted with high speed to obtain 3-D volumes. Photon interference during the acquisition causes speckle noise, which turns out to be a major drawback of OCT. As a consequence, the quality of the scans might be drastically reduced. This can limit the reliability of OCT in diagnostic workflows [12] or affects image analysis for computer-aided diagnostics. Denoising of OCT to mitigate these limitations emerged as an active research area within the field of retinal image processing. In general, it can be approached using customized hardware [21,7], spatial filtering of single scans [19,8], or temporal merging of multiple consecutive scans [17]. However, denoising is still a challenging task due to two reasons: 1) OCT measures fine morphological structures and it would be unacceptable regarding clinical applications to impair these structures. 2) The inferring speckle noise follows a multiplicative model, which violates the assumption on the noise statistics of most popular denoising methods that emerged in the image processing community. In this paper, we propose denoising by postprocessing noisy OCT scans within a variational framework. As the key contribution, we introduce the class of quantile sparse image (QuaSI) priors to model the appearance of noise-free OCT data. Specifically, we propose a median filter based regularizer that is based Temporal and Volumetric Denoising via QuaSI prior 3 on the QuaSI prior using the 0.5 quantile. This follows the idea that a noisefree scan should be a fixed point of the median filter and we show that this approach facilitates structure-preserving denoising. To approach the resulting non-linear and non-convex optimization derived in our framework, we present an alternating direction method of multipliers (ADMM) scheme. Our algorithm can handle spatio-temporal denoising by processing either single scans or sequences of consecutive scans. Furthermore, it enables denoising on a B-scan level or on a volume level. Thus, it can be adjusted to the clinical needs within a target application. The proposed method can also be integrated to commercial OCT systems without modifications on the existing hardware or scanning protocols. This paper is an extension of our prior work in [25] and makes the following additional contributions: – The algorithm as well as the QuaSI prior are extended to process volumetric OCT data. – An investigation of the convergence and parameter sensitivity of the algorithm is conducted. – An extension of our algorithm is presented to process volumetric data in C-arm CT imaging. The remainder of this paper is organized as follows. In Section 2, we review related work on OCT denoising. Section 3 comprises the objective function of the energy minimization problem. In Section 4 the QuaSI prior is introduced. The numerical optimization of our denoising framework is derived in Section 5. In Section 6, an experimental evaluation of our method on publicly available benchmark data and clinical OCT scans as well as CT data is reported. Finally, Section 7 contains our conclusion. 2 Related work The image-based techniques can be divided into two groups. 2.1 Spatial Denoising Methods Spatial or single-image denoising have been extensively studied in the image processing community and various approaches emerged over the past decades. Local image filters performs smoothing of noisy images possibly in an adaptive way to preserve image structures [27]. Non-local filtering also exploits the statistics of similar and repeating patches within images. One representative from this class is the successful BM3D method [5]. However, these methods have been mainly designed for for natural images under simplified assumptions like additive white Gaussian noise, which is inappropriate to describe speckle noise that is multiplicative in nature. Learning-based denoising, e. g. based on multilayer neural networks [3], hold the potential to handle speckle noise by learning noise distributions from training data. However, large-scale training data required for such methods is barley available for OCT. 4 Schirrmacher, Köhler et al. ft Edata EQuaSI ET V Minimize f t+1 Fig. 2: Method overview: The proposed spatio-temporal denoising algorithm is based on an energy mininmization formulation with three terms. Some spatial filters that have been adopted for OCT denoising are the hybrid median filter, Lee filter, Wiener filter, or wavelet thresholding as investigated by Ozcan et al. [19]. Global denoising methods for OCT have been introduced by Salinas et al. [24] using non-linear diffusion and later by Duan et al. [8] using second order total generalized variation. Wong et al. [30] have proposed structure-adaptive Bayesian estimation to handle speckle noise. One interesting approach has been proposed Fang et al. [9], where dictionary learning based on B-scans with high signal-to-noise ratio (SNR) is used to denoise low SNR B-sans. Temporal and Volumetric Denoising via QuaSI prior 5 Single-image denoising offers great flexibility in clinical applications of OCT as few assumption on the the scanning protocol are made. However, the noise reduction is limited as such methods can utilize single B-scans only. 2.2 Temporal Denoising Methods Temporal or multi-image denoising methods considers coherence of consecutive images to improve noise reduction over single-image denoising. Such methods have been widely investigated for OCT and exploit sets of B-scans that are acquired sequentially from the same location or nearby positions. A popular approach in commercial systems is to register multiple of these B-scans and to average the registered scans to cancel out random noise. Averaging is computationally efficient but requires many repetitive acquisitions to effectively reduce speckle noise. Mayer et al. [17] enhances simple averaging based on wavelet decompositions of B-scans to estimate local image structures and noise. Denoising is conducted in the wavelet domain by weighted averaging of wavelet coefficients according to the local image structure. Cheng et al. [4] formulates OCT denoising from multiple scans as a low-rank matrix completion problem. In [26], Thapa et al. follows a similar notion and exploits the low-rank property on patch-based level of multiple B-scans using weighted nuclear norm minimization. Bian et al. [2] have proposed inter-frame and intra-frame priors for denoising using convex optimization. All of these multi-image methods have in common that they require multiple input scans. This increases the overall acquisition time and therefore they might lead to a higher patient discomfort. Also, they perform denoising on a B-scan level but ignore coherence of nearby B-scans within volumetric OCT data. If denoising of entire volumes is desired, simple consecutive processing of individual B-scans can lead to suboptimal results. In this paper, we mitigate both limitations by proposing a unified approach to handle denoising on B-scan or volume level based on single or multiple scans. 3 Background This section presents the variational framework for denoising volumetric OCT data. Fig. 1 illustrates the two pipelines of our proposed algorithm, namely B-scan denoising and volumetric denoising. We denote a volume as a tensor G̃ ∈ RL×Nx ×Ny composed of L B-scans G̃l , l = 1, . . . , L of size Nx × Ny pixels. For the sake of convenience, we reshape volumes to vector notation according to g̃ = (g̃1 , . . . , g̃L )> ∈ RLN , where g̃l ∈ RN , N = Nx Ny denotes a single B-scan using row-wise scanning of G̃l . 3.1 Noise Model In OCT, each captured B-scan g̃l of a volume g̃ is related to a respective noisefree scan f̃l in a volume f̃ = (f̃1 , . . . , f̃L )> ∈ RLN according to the multiplicative model: g̃l = f̃l ñl , (1) 6 Schirrmacher, Köhler et al. where is the Hadamard (element-wise) product and ñl ∈ RN denotes multiplicative speckle noise. Following prior work on OCT denoising [30,8], we formulate the multiplicative noise model in (1) in a logarithmic measurement domain. This leads to the additive noise model: gl = fl + nl , (2) where gl = log(g̃l ), fl = log(f̃l ) and nl = log(ñl ). 3.2 Energy Minimization Formulation Given a sequence of K ≥ 1 volumes g(k) with k = 1, . . . , K that are either captured from the same position or from nearby positions and registered to each other, we aim at finding a noise-free volume f̂ . We formulate denoising as the minimization of the objective function: f̂ = argmin f K X  ρ f − g(k) + λRQuaSI (f ) + µk∇f k1 . (3) k=1 The first term in (3) denotes the data fidelity of f w.r.t. input volumes g1 , . . . , gL followed by two regularization terms. The first regularization term is the proposed quantile sparse image (QuaSI) prior weighted by λ ≥ 0. The second regularization term denotes µ ≥ 0 weighted anisotropic total variation (TV), which regularizes the image gradient ∇f = (∇x f , ∇y f , ∇z f )> . It is worth noting that the general denoising framework in (3) can handle both noise reduction for entire volumes in 3-D as well as for individual B-scans in 2-D by constraining the domain of both regularization terms. In (3), the data fidelity term is customized to the image formation in OCT using the loss function ρ : RN → R+ 0 . In general, the image formation for clinical OCT needs to consider a mixture of speckle noise, potential misalignments between the input volumes, or motion artifacts. Following prior work on mixed noise models in image restoration [11], we propose to use the Huber loss [18]: ρ(z) = N X φ(zi ), (4) i=1 where: ( φ(z) = 1 2 2z  |z| − 1 2  if z ≤  otherwise, (5) and  > 0 denotes the threshold of the Huber loss. This leads to an outlierinsensitive model while the underlying data fidelity is a convex term. 4 Quantile Sparse Image (QuaSI) Prior A robust and efficient regularization term is of importance to achieve results with a high signal-to-noise ratio (SNR). The better the regularization term is able to Temporal and Volumetric Denoising via QuaSI prior 2 (a) Noisy B-scan fnoisy (b) Gold standard B-scan fgold (c) fnoisy − Q(fnoisy ) (d) fgold − Q(fgold ) ·105 2 1.5 1.5 1 1 0.5 0.5 0 0 5 · 10−2 0.1 0.15 0.2 (e) Histogram of fnoisy − Q(fnoisy ) 0 7 ·105 0 5 · 10−2 0.1 0.15 0.2 (f) Histogram of fgold − Q(fgold ) Fig. 3: Analysis of our proposed QuaSI prior using median filtering Q(·) to model the appearance of OCT B-scans. (a) and (b) depict a noisy B-scan along the respective gold standard taken from the pig eye dataset [17]. (c) and (d) show the residual f − Q(f ) of the QuaSI regularization term, where brighter pixels express higher residuals (contrast enhanced for visualization). (e) and (f) depict the corresponding histograms of the both residuals, where the histogram for the gold standard is sparse. Our QuaSI prior exploits the sparsity of f − Q(f ) for regularization in our variational denoising framework. model natural or medical images, the better the result of the optimization. In OCT denoising structure preservation is a sensitive issue. The B-scans contain small morphological structures that need to be preserved for the purpose of diagnosis. In order to tackle the problems referred to above, the so called quantile sparse image (QuaSI) prior is introduced. 4.1 Definition of the Prior The QuaSI prior is based on quantile filtering, where the quantile filter is denoted as f̃ = Q(f ). The p-quantile with p ∈ [0, 1] is determined within a local neighborhood N (i), where d denotes the width of the cubic filter kernel. For 8 Schirrmacher, Köhler et al. ft 1 2 3 j 1 i 1 current position position of the quantile Move kernel Qi,j = 1 Fig. 4: Construction of the binary matrix to approximate the quantile filter Q(f ) = Qf t . the i-th pixel in f we filter according to f˜i = quantileN (i) (fi , p). Inspired by the regularization by denoising priors by [22], the denoised volume is a fixed point under the quantile filter. In this way: RQuaSI (f ) = ||f − Q(f )||1 . (6) Specifically, regularization according to (6) enforces sparsity of residual f − Q(f ). This offers a general model for regularization and – depending on the application – various types of statistics can be chosen for Q(f ). In this paper, we propose the median filter, where f˜i = medianN (i) (fi ). This follows the rationale that median filtering facilitates structure-preserving denoising under non-Gaussian noise. To validate the QuaSI prior using median filter regularization for OCT denoising, we study its behavior under real measurement noise. For this purpose, we use the publicly available pig eye dataset [17], which provides a gold standard B-scan obtained from the average of 455 registered noisy B-scans. We compare a noisy B-scan fnoisy with the gold standard fgold in Fig. 3a and Fig. 3b. The residuals f − Q(f ) of the QuaSI regularization term are illustrated in Fig. 3c for the noisy B-scan and in Fig. 3d for the gold standard. Compared to the gold standard, the noisy B-scan yields a less sparse signal as shown in the histograms of both residuals in Fig. 3e and Fig. 3f. Notice that the QuaSI regularization does not penalize image discontinuities. The histogram using the noisy B-scan contains less zero elements, while the histogram for the gold standard is sparse. Our proposed QuaSI prior exploits these observations for structure-preserving regularization in our variational denoising framework. Temporal and Volumetric Denoising via QuaSI prior 4.2 9 Linearization In order to deal with the non-linearity of the quantile operator Q(f ) the linearization Q(f ) = Qf , similar to the work of [20], is performed. The binary matrix Q is assembled element-wise according to: ( Qij = 1 0 if j = z, otherwise, (7) where z = arg quantiler∈N (i) fr . This operation filters the i-th pixel according to the p-quantile in its local neighborhood N (i). For f 0 = f the linearization fullfills Q(f 0 ) = Qf 0 , while otherwise Q serves as an approximation of the quantile filter. Fig. 4 illustrates the construction of the binary matrix Q in 2-D. Each pixel is replaced by the quantile within its local neighborhood. The position of the quantile is stored in the binary matrix. In this example, the quantile is at position j. Thus, the i row of the matrix contains a one in the j-th column and zeros otherwise. The multiplication Qf yields the quantile filtered result. 5 Deploying QuaSI for OCT Denoising The non-smooth and non-linear QuaSI prior as well as the non-smooth TV prior impede the optimization of (3) due to the quantile filter and the L1 -Norm. Using the linearization of the quantile filter and an optimization scheme based on ADMM [10] enable an efficient minimization. In order to tackle the L1 -Norm, the auxiliary variables u and v are introduced. This leads to the constraint optimization problem: f̂ = argmin f K X  ρ f − g(k) + λkuk1 + µkvk1 k=1 (8) such that u = f − Q(f ), v = ∇f . An unconstrained optimization problem is obtained using quadratic penalty functions according to: f̂ = argmin f K X k=1  α ρ f − g(k) + ku − f + Q(f )k22 + λkuk1 2 (9) β + kv − ∇f k22 + µkvk1 . 2 The Lagrangian multipliers α > 0 and β > 0 enforce the constraints u = f − Q(f ) and v = ∇fl . If α, β → ∞, we end up at the original problem (3). In order to strictly enforce the constraint, the Bregman variables bu and bv are 10 Schirrmacher, Köhler et al. Algorithm 1 Denoising with the QuaSI prior using ADMM optimization (1) (K) Initialize u1 = v1 = 0, b1u = b1v = 0 and fl1 = mean(gl , . . . , gl ) for t = 1, . . . , Touter do Assemble QuaSI linearization Q from the intermediate estimate f t according to (7) for i = 1, . . . , Tinner do Update weight matrices W(k) , k = 1, . . . , K for IRLS (14) Update the intermediate estimate f t+1 using CG iterations for (11) Update the auxiliary variables ut+1 and vt+1 using (15) – (16) Update the Bregman variables bt+1 and bt+1 using (17) – (18) v u end for end for introduced. Then, we minimize the augmented Lagrangian: LAL (f , u, v, bu , bv ) = K X ρ f − g(k)  k=1 α + ku − f + Q(f ) − bu k22 + λkuk1 2 β + kv − ∇f − bv k22 + µkvk1 . 2 (10) We iteratively optimize (10) by alternating minimization w.r.t. the individual parameters. Hence, three subproblems emerge, where the L1 -Norm is decoupled from the L2 -Norm. We solve these problems separately in alternating minimization scheme. The minimization of the augmented Lagrangian (10) w.r.t. f can be solved in a least square sense. Therefore, the binary matrix Q is constructed using the result f t from the previous iteration, where t denotes the iteration index. In order to cope with the Huber loss, iteratively re-weighted least squares (IRLS) is applied. Solving the resulting least squares problem leads to the linear system: Af t+1 = b A=2 K X (W(k) )> + β∇> ∇ + αM> M (11) (12) k=1 b=2 K X (W(k) )> g(k) + β∇> (v − bv ) + α(M)> (u − bu ), (13) k=1 where M = I − Q and W(k) are diagonal weight matrices constructed from f t . Using the intermediate result f t , we can computed the weights for IRLS according to: (k) φ0 (fit − gi ) (k) Wii = , (14) (k) |fit − gi | Temporal and Volumetric Denoising via QuaSI prior 11 where φ0 (z) is the derivative of the Huber loss. The threshold of the Huber loss is set  = 1.345σ to achieve 95-percent efficiency of the estimator under Gaussian noise [18]. We use the mean absolute deviation (MAD) to estimate the (k) standard deviation σ = 1.4826mad(fit − gi ) [23]. To solve the linear system (11), conjugate gradient (CG) iterations are used. The minimization of the augmented Lagrangian (10) w.r.t. the auxiliary variables can be done by exploiting the separability of the problem. Given the estimate for the intermediate result f t+1 , this leads to the element-wise updates: ut+1 = shrink([f t+1 − Qf t+1 + btu ]i , λ/α), i (15) vit+1 = shrink([∇f t+1 + btv ]i , µ/β)., (16) where shrink(z, γ) = sign(z) max(z − γ, 0) denotes the shrinkage operator [10]. Given an estimate for the intermediate result f t+1 as well as the auxiliary variables ut+1 and vt+1 , the Bregman variables are updated according to: bt+1 = btu + (f t+1 − Qf t+1 − ut+1 ), u (17) bt+1 v (18) = btv + (∇f t+1 −v t+1 ). Algorithm 1 summarizes the proposed ADMM based iteration scheme. Overall, we use two nested optimization loops to solve (8). We use the mean of the input images as an initial guess f 1 as well as u1 = v1 = 0, b1u = b1v = 0. The weight matrices for IRLS are updated in every iteration step. The linearization Q of the quantile filter is updated every Tinner iterations, assuming the position of the quantile does not change within the next Tinner iterations. This assumption speeds up the algorithm, as the construction of the matrix is time-consuming. Note that Tinner should not be choosen too large in order to avoid a bad approximation of the quantile filter. A proper evaluation of the convergence of the algorithm is presented in Sect. 6.5. 6 Experiments and Results In this section, we evaluate our spatio-temporal framework for denoising of retinal OCT data. Specifically, we quantitatively benchmark our method on different datasets including comparisons to the state-of-the-art. In addition to OCT, we also present an application of our QuaSI prior for removing structured noise in C-arm CT imaging. Throughout all experiments, we adopted our framework in two versions. For denoising on a B-scan level, the parameters were set to µ = 0.075 · K, λ = 5.0 · K, α = 100.0 · K, β = 1.5 · K, Touter = 20 and Tinner = 2 for K B-scans and 3 × 3 median filtering to setup the QuaSI prior. For volumetric denoising based on 6 adjacent B-scans, the parameters were set to µ = 0.0007 · K, λ = 1.0 · K, α = 120.0 · K, β = 0.05 · K, Touter = 20 and Tinner = 2 for K volumes and 3 × 3 × 3 median filtering. 12 Schirrmacher, Köhler et al. AVG BM3D BED WMF Ours SSIM value PSNR value 0.8 25 0.6 0.4 20 0.2 5 10 Number of input images 5 10 Number of input images Fig. 5: Quantification of noise reduction in terms of mean PSNR and SSIM for different denoising methods on the pig eye dataset for different numbers of input images. (a) Noisy input image (b) AVG (c) BED [30] (d) BM3D [5] (e) WMF [17] (f) Ours (TV + QuaSI) Fig. 6: Denoising on the pig eye dataset 9 using K = 5 B-scans. (a) Noisy image, (b) – (f) AVG, BED [30], BM3D [5], WMF [17], and the proposed method. 6.1 Datasets To evaluate the performance of the proposed OCT denoising algorithm, we conducted experiments on two different datasets. This comprises ex-vivo benchmark data as well as real clinical data. Pig Eye Data For an evaluation of OCT denoising on B-scan level, we used the publicly available pig eye dataset provided by Mayer et al. [17]. The dataset comprises 455 B-scans corresponding to 35 eye positions with 13 B-scans per Temporal and Volumetric Denoising via QuaSI prior AVG BM3D BED 4 2 Ours 6 CNR value MSR value 6 WMF 13 1 2 3 4 Number of input images 5 4 2 1 2 3 4 Number of input images 5 Fig. 7: Quantification of noise reduction in terms of mean MSR and CNR measures for denoising on a B-scan level on our clinical dataset for different numbers of input images. position and was captured ex-vivo with a Spectralis HRA & OCT. The published B-scans were registered to each other to compensate for geometric shifts between them. We apply denoising to sets of K registered B-scans with K ∈ [1, 13] to demonstrate the influence of different numbers of input B-scans on the denoising result. The pig eye dataset provides a gold standard B-scans that was obtained by averaging all 455 registered scans. The quality of the denoising algorithm was evaluated by assessing the fidelity of a denoised B-scan w.r.t. to the gold standard using the peak-signal-to-noise ratio (PSNR) as well as the structural similarity index (SSIM). Clinical Data In order to evaluate and compare B-scan with volumetric denoising, we use clinical data. A prototype ultrahigh-speed swept-source OCT system with 1050 nm wavelength and a sampling rate of 400,000 A-scans per second [29] was used to acquire volumetric data of 14 human subjects. Proliferative and non-proliferative diabetic retinopathy, early age-related macular degeneration and one healthy subject are covered on two volumes per subject, where each B-scan was acquired five times in immediate succession. We use 500 A-scans by 500 B-scans for a field size of 3×3 mm. For denoising on a B-scan level the central B-scan of each volume is used, while volumetric denoising is performed on adjacent B-scans including the central one. As the clinical data does not provide a gold standard, we follow prior work [9,19,30] and the measure noise reduction using the mean-to-standard-deviation 14 Schirrmacher, Köhler et al. (a) Noisy image (MSR: 2.68, CNR: 2.47) (b) AVG (MSR: 3.17, CNR: 3.17) (c) BM3D [5] (MSR: 4.61, CNR: 4.85) (d) BED [30] (MSR: 4.67, CNR: 4.85) (e) WMF [17] (MSR: 3.67, CNR: 3.55) (f) Ours (MSR: 5.02, CNR: 5.36) Fig. 8: Visual comparison of denoising results using our clinical dataset with K = 5 B-scans from a 46 years old male diabetic retinopathy patient. (a) Noisy image with manually selected background (red) and foreground regions (green) to determine MSR and CNR. (b) – (f) AVG, BM3D [5], BED [30], WMF [17], and the proposed method. ratio (MSR) and the contrast-to-noise ratio (CNR) according to: µf σf |µf − µb | CNR = q , 1 (σf2 + σb2 ) 2 MSR = (19) (20) where µf and µb as well as σf and σb denote the means and standard deviations of the intensities in a foreground and a background region, respectively. The regions to determine MSR and CNR were manually selected for the central B-scan of each volume, see Fig. 8a. Temporal and Volumetric Denoising via QuaSI prior 6.2 15 Comparison to the State-of-the-art We compared our proposed spatio-temporal denoising against four competing noise reduction approaches. As a representative of general-purpose methods, we evaluated the popular BM3D [5] that is state-of-the-art in the field of natural image denoising. In terms of spatial filters customized for OCT, we used Bayesian estimation denoising (BED) [30]. In the field of temporal methods using multiple registered B-scans, we evaluate simple averaging (AVG) as a baseline as well as wavelet multi-frame denoising (WMF) [17]. To ensure fair comparisons between spatial and temporal methods, we provide the average of all B-scans as input for single-image denoising (BM3D and BED). In contrast, AVG and WMF are pure temporal approaches that process multiple registered B-scans. Notice that all of these methods can only operate on individual 2-D B-scans to denoise volumetric data and are therefore compared to our proposed method on a B-scan level. First, we conducted experiments for denoising on a B-scan level on the pig eye dataset described in Section 6.1. Figure 5 depicts the mean PSRN and SSIM of the competing denoising methods w.r.t. to the gold standard for different numbers of input B-scans. We observed quantitatively that our proposed method consistently outperforms the competing BM3D, BED, and WMF denoising regardless of the number of input frames. Moreover, using only 2 input B-scans, our spatiotemporal method achieved comparable results to averaging 5 B-scans. This reveals that our method is more economic regarding the number of required input scans. This property is essential for clinical applications, where acquiring more scans might lead to unacceptable long acquisition times. Figure 6 depicts qualitative denoising results for K = 5 B-scans. Here, the proposed spatio-temporal denoising algorithm using the QuaSI prior achieved superior performance in terms of noise reduction, while anatomical structures like retinal layers are preserved. Second, denoising on a B-scan level was studied on our clinical datasets using the non-reference MSR and CNR measures for a quantitative evaluation. Figure 7 depicts the averaged MSR and CNR measures for different numbers of input images. Overall, we observed that BM3D and our proposed method achieved the best noise reduction expressed by both measures. Figure 8 qualitatively compares the denoising performance on one example dataset. We found that AVG, WMF, BED facilitate structure-preserving denoising but were prone to noise breakthroughs in homogeneous areas, which lowers their MSR and CNR. In contrast, BM3D achieved superior noise reduction but suffered from streak artifacts. Similar observations were made in related work on OCT denoising [9] and can be explained by assumption of additive white Gaussian noise used for BM3D. The proposed method achieved a decent tradeoff between noise reduction and structure preservation. 6.3 Impact of the QuaSI Prior We used the pig eye dataset as well as the clinical data to evaluate the performance of our spatio-temporal denoising algorithm with and without the QuaSI prior. Fig. 9 illustrates the impact of the QuaSI prior on the denoising result for the 16 Schirrmacher, Köhler et al. (a) K = 1 (b) K = 5 (c) K = 13 Fig. 9: This comparison aims at demonstrating the improvement of the proposed spatio-temporal denoising with TV + QuaSI regularization (third row) compared to simple averaging of consecutive B-scans (top row) and the proposed spatiotemporal denoising with TV regularization only (second row) for different numbers of input images. pig eye data compared to simple averaging and pure TV regularization. In terms of noise reduction, the proposed variational framework outperformed simple averaging. Especially in the enlarged region a noticeable difference between averaging and the proposed denoising algorithm is shown. In homogeneous areas, the algorithm considerably suppressed speckle noise, while preserving important structures. The noise reduction was superior when using a combination of the QuaSI prior and the TV prior for regularization as shown for the retinal structures in the enlarged region. In addition, the QuaSI prior contributed to structure-preservation and avoided staircasing artifacts that typically appear in TV denoising. Fig. 10 illustrates the impact of the QuaSI prior using PSNR and SSIM (for the pig eye data) as well as MSR and CNR (for clinical data) for different numbers of input scans. Here, our denoising framework with QuaSI prior outperformed TV denoising in terms of all measures. Temporal and Volumetric Denoising via QuaSI prior TV Mean PSNR TV + QuaSI Mean SSIM Mean MSR Mean CNR 30 1 6 6 15 0.5 3 3 1 5 13 1 17 5 13 1 5 1 5 Fig. 10: Mean PSNR, SSIM, MSR and CNR measures to quantify noise reduction with and without the QuaSI prior for 1, 5 and 13 input images. (a) B-scan denoising K = 1 (MSR: 5.68, CNR: 5.25) (b) volumetric denoising K = 1 (MSR: 6.43, CNR: 5.99) (c) B-scan denoising K = 5 (MSR: 7.78, CNR: 7.15) (d) volumetric denoising K = 5 (MSR: 6.85, CNR: 6.51) Fig. 11: Denoising on the clincial dataset using 5 registered volumes from a 67 years old male mild non-proliferative diabetic retinopathy patient. Denoising is performed on a B-scan level as well as on a volume level. 6.4 B-scan vs. Volumetric Denoising So far, we evaluated denoising of volumetric OCT data by simply processing individual B-scans. In order to evaluate the impact of true volumetric denoising to simple B-scan wise B-scan denoising in our proposed framework, we used the clinical dataset presented in Section 6.1. Our volumetric denoising processes 6 18 Schirrmacher, Köhler et al. K = 1 scan B-scan Volumetric denoising denoising K = 5 scans B-scan Volumetric denoising denoising MSR 5.35 5.77 6.50 6.31 CNR 5.27 5.60 6.38 6.18 Table 1: Mean MSR and CNR measures for 1 and 5 registered input volumes on the clinical data. For B-scan denoising, the central B-scan is used and for volumetric denoising 6 adjacent B-scans including the central one are used. consecutive B-scans including the central one. That way, CNR and MSR measures from the previous experiments can be used for comparison. Table 1 shows the mean MSR and CNR using one and five registered input volumes. Here, we found that our volumetric denoising achieved better results in terms of noise reduction for 1 input volume, as adjacent B-scans affect denoising positively. For 5 input volumes, we found that our B-scan denoising achieved slightly better results in terms of noise reduction. However, as opposed to noise reduction, volumetric denoising achieved superior performance in structure preservation by exploiting coherence between adjacent B-scans. This is depicted in Fig. 11, where the retinal layers in the magnified region can be better distinguished. 6.5 Convergence and Parameter Sensitivity The convergence of the proposed algorithm is shown experimentally on a B-scan level. By our definition, the algorithm converges if a stationary point of the objective function (3) is reached. The value of the objective, hereinafter referred to as energy, is computed after every update of the intermediate image f t+1 . In addition, PSNR and SSIM of the intermediate image are computed. Based on the optimal parameter setting µ = 0.075 · K, λ = 5.0 · K, α = 100.0 · K, β = 1.5 · K, Touter = 20, Tinner = 10 and Tcg = 3 for B-scan denoising, we denoise the pig eye dataset 9 with K = 8 B-scans. Varying one parameter in an otherwise fixed parameter setting shows the influence of the individual parameter on the convergence. Fig. 12 illustrates the influence of Touter , Tinner and Tcg on the convergence, where Touter · Tinner = 300 for fair comparison. Three different settings are compared, the optimal parameter setting, a special case where Tinner = 1 and large Tcg . The approximation of the QuaSI prior is updated every Tinner iterations. With increasing number of inner iterations, peaks appear in the energy as well as in the PSNR value and impair the convergence properties of the algorithm. This is mainly attributable to the rare assembly of Q. Hence, the special case shows nice convergence properties, as no approximation is necessary. Due to the high computational costs of the special case, the proposed optimal setting if preferable. It requires half the computational cost with similar convergence properties. Furthermore, the PSNR value increases faster. Increasing Tcg also Temporal and Volumetric Denoising via QuaSI prior Touter = 30 Tinner = 10 Tcg = 3 Touter = 300 Tinner = 1 Tcg = 1 19 Touter = 30 Tinner = 10 Tcg = 30 0.8 28 PSNR SSIM 0.7 0.6 26 0.5 0.4 0 100 200 300 Number of inner and outer iterations 0 100 200 300 Number of inner and outer iterations ·105 Energy 1.5 1 0.5 0 100 200 300 Number of inner and outer iterations Fig. 12: The division of number of iterations on Touter , Tinner and Tcg influences the convergence behavior of the proposed algorithm. The intermediate energy and PSNR measures of four different settings are displayed. λ = 0.05 λ = 0.5 λ =5 λ = 50 0.8 0.6 0.5 0.4 0 100 200 300 Number of inner and outer iterations 28 PSNR SSIM 0.7 26 0 100 200 300 Number of inner and outer iterations Fig. 13: Intermediate SSIM and PSNR measures of four different λ values to illustrate the impact of the QuaSI prior on the convergence behavior of the algorithm. induces peaks in the energy and PSNR value. Additionally, the PSNR value decreases, which is not preferable. The impact of the QuaSI prior on the denoising process is controlled by λ, which is illustrated in Fig. 13. With decreasing λ the PSNR and SSIM value increase slower, due to the low impact of the QuaSI prior. This underlines the 20 Schirrmacher, Köhler et al. α =1 α = 10 α = 100 α = 1000 0.8 0.6 0.5 0.4 0 100 200 300 Number of inner and outer iterations 28 PSNR SSIM 0.7 26 0 100 200 300 Number of inner and outer iterations Fig. 14: Comparison of four different values for the Lagrangian multiplier α and their influence on the convergence behavior of the proposed algorithm. The intermediate energy and PSNR measures are displayed. effectiveness of the proposed QuaSI prior. Increasing λ does not change the convergence properties of the algorithm. The Lagrangian multiplier α enforces the constraint u = f − Q(f ). For α → ∞, the augmented Lagrangian (10) results in the objective function (3). Hence, decreasing α impairs the convergence properties of the algorithm by introducing peaks in the SSIM as well as in the PSNR value. PSNR and SSIM value decrease, which is not preferable. Choosing a large α = 1000 reduces the peaks but the PSNR value increases slower compared the the proposed parameter setting. For a large α, the constraint must be satisfied more strictly which results in higher computational cost due to the slow convergence. 6.6 Quantile Sparse Image Denoising for Volumetric C-Arm Data Besides the OCT data presented in previous sections, we further applied the QuaSI framework for denoising cerebral perfusion data acquired using a C-arm computed tomography (CT) system. This data describes a sequence of volumetric CT images and is commonly used for stroke assessment by measuring the distribution of injected contrast agent within the brain over time. Photon effects as well as patient movement and angular undersampling usually deteriorates the image quality by introducing both structured and unstructured noise (see Figure 15 a,c). Current approaches towards noise reduction in CT imaging are, for example, based on anisotropic filtering or rely on a heuristic detection of streaks and vessel structures [14,15,16]. Compared to OCT, where the proposed method takes multiple input images and results in a single output image, denoising of C-arm perfusion data transforms multiple input images to multiple output images, hereinafter called QuaSI 3D+t. The constraint optimization problem, as given in (8), thus slightly changes by enforcing the data fidelity for each input volume and by incorporating an L1 -Norm regularizer in temporal direction for subsequent volumes, resulting in Temporal and Volumetric Denoising via QuaSI prior f̂ = argmin ρ(f − g) + λkuk1 + µkvk1 + ωkdt k1 , f 21 (21) where f and g ∈ RN with N = Nx Ny Nz Nt describe a sequence of volumetric image data. In the last term of equation 21, ω ≥ 0 describes a weighting factor and dt = ∇t f the gradient in temporal direction, respectively. According to (9), the constraint optimization problem can thus be formulated as α ku − f + Q(f )k22 + λkuk1 + 2 f β γ kv − ∇f k22 + µkvk1 + kdt − ∇t f k22 + ωkdt k1 , 2 2 f̂ = argmin ρ(f − g) + (22) and is solved using the optimization approach given in Section 5. We applied the QuaSI denoising both on simulated C-arm CT data and on acquired, real patient data. The simulated data has been created using a digital brain CT phantom [1] and a realistic scanning protocol (133 projections over an angular range of 200◦ per volume). We added Poisson noise and introduced minor patient movement during the generation of the simulated data by moving the head up to 5◦ around z-axis between the individual scans. After reconstruction, the individual scans are co-registered again to assert pixel correspondence between the volumes. Input BM4D QuaSI 3-D+t PSNR 32.105 32.485 34.788 SSIM 0.883 0.914 0.943 Table 2: PSNR and SSIM for the input data, BM4D [13] and the QuaSI method. We compared the results from the proposed method to the results from BM4D [13], which is an extension of BM3D [6] to volumetric data. For a numerical comparison of the algorithms we calculate the peak signal to noise ratio (PSNR) and the structured similarity index measure (SSIM) [28]. We set the parameters of our method to α = 0.1, λ = 0.0006, β = 0.09, µ = 0.004, γ = 90 and ω = 0.8. The median filter regularization is computed on a 3 × 3 × 3 kernel. The algorithms are applied to and evaluated on a subset of the brain volume consisting of 30 consecutive slices. The slices show the complete head and contain all structures of interest such as bones, white matter, gray matter and (contrastenhanced) vessels. The results from the evaluation of the realistic brain phantom show that the proposed denoising algorithm outperforms BM4D with regards to 22 Schirrmacher, Köhler et al. (a) Noisy input, syn-(b) Denoised output thetic (c) Noisy input, clini-(d) Denoised output cal data Fig. 15: Input to and result from the QuaSI method. (a) and (c) denote noisy input to the algorithm, (b) and (d) denote the denoised result. The upper and lower row shows synthetic and real data, respectively. Note that the input to the algorithm is not just the slice as shown in the figure, but consists of a sequence of volumetric data. PSNR and SSIM, see Table 2. Vessel structures are well-preserved within both volumes and boundaries between gray and white matter are perceivable. Fig. 15 shows the input data and results from the QuaSI method for a single slice out of one of the volume sequence. 7 Conclusion In this paper, we have presented the quantile sparse image (QuaSI) prior and a corresponding spatio-temporal denoising algorithm suitable for volumetric OCT or CT data. For OCT denoising, we proposed two pipelines to either process B-scans or volumetric OCT data. The numerical optimization is derived using a linearization of the quantile filter and an alternating direction method of multipliers scheme for efficient minimization. We can show that a combination of QuaSI and Total Variation regularization outperformes state-of-the-art methods in terms of quantitative measures. Interestingly, our method can be applied to Temporal and Volumetric Denoising via QuaSI prior 23 both CT and OCT data through minor modifications of the denoising pipeline. This suggestes that it may be worthwhile to evaluate the potential of the QuaSI prior for inverse problems of other imaging modalities in future work. References References 1. Aichert, A., Manhart, M.T., Navalpakkam, B.K., Grimm, R., Hutter, J., Maier, A.K., Hornegger, J., Doerfler, A.: A realistic digital phantom for perfusion c-arm CT based on MRI data. In: Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC), 2013 IEEE. pp. 1–2. IEEE (2013) 2. Bian, L., Suo, J., Chen, F., Dai, Q.: Multiframe denoising of high-speed optical coherence tomography data using interframe and intraframe priors. Journal of Biomedical Optics 20, 20 – 20 – 11 (2015) 3. Burger, H.C., Schuler, C.J., Harmeling, S.: Image denoising: Can plain neural networks compete with bm3d? In: IEEE Conference on Computer Vision and Pattern Recognition. pp. 2392–2399 (June 2012) 4. Cheng, J., Duan, L., Wong, D.W.K., Tao, D., Akiba, M., Liu, J.: Speckle Reduction in Optical Coherence Tomography by Image Registration and Matrix Completion. In: MICCAI 2014, Proceedings, Part I. pp. 162–169 (2014) 5. Dabov, K., Foi, A., Kathovnik, V., Egiazarian, K.: Image denoising by sparse 3-d transform-domain collaborative filtering. IEEE Trans. Image Process. 16(8), 2080–2095 (2007) 6. Dabov, K., Foi, A., Katkovnik, V., Egiazarian, K.: Image denoising by sparse 3-d transform-domain collaborative filtering. IEEE Trans. Image Process. 16(8), 2080–2095 (2007) 7. Desjardins, A.E., Vakoc, B.J., Oh, W.Y., Motaghiannezam, S.M., Tearney, G.J., Bouma, B.E.: Angle-resolved optical coherence tomography with sequential angular selectivity for speckle reduction. Opt. Express 15(10), 6200 (2007) 8. Duan, J., Lu, W., Tench, C., Gottlob, I., Proudlock, F., Samani, N.N., Bai, L.: Denoising optical coherence tomography using second order total generalized variation decomposition. Biomed Signal Process Control 24, 120–127 (2016) 9. Fang, L., Li, S., Nie, Q., Izatt, J.A., Toth, C.A., Farsiu, S.: Sparsity based denoising of spectral domain optical coherence tomography images. Biomed. Opt. Express 3(5), 927–942 (2012) 10. Goldstein, T., Osher, S.: The split bregman method for l1-regularized problems. SIAM J. Imaging Sci. 2(2), 323–343 (2009) 11. Köhler, T., Huang, X., Schebesch, F., Aichert, A., Maier, A., Hornegger, J.: Robust Multiframe Super-Resolution Employing Iteratively Re-Weighted Minimization. IEEE Transactions on Computational Imaging 2(1), 42 – 58 (Mar 2016) 12. Kraus, M.: Motion Correction and Signal Enhancement in Optical Coherence Tomography. Ph.D. thesis, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) (2016) 13. Maggioni, M., Katkovnik, V., Egiazarian, K., Foi, A.: Nonlocal transform-domain filter for volumetric data denoising and reconstruction. IEEE Trans. Image Process. 22(1), 119–133 (2013) 24 Schirrmacher, Köhler et al. 14. Maier, A., Fahrig, R.: GPU Denoising for Computed Tomography, vol. 1. CRC Press, Boca Raton, Florida, USA, 1 edn. (2015), http://www.crcnetbase.com/ doi/10.1201/b18968-9 15. Maier, A., Wigström, L., Hofmann, H., Hornegger, J., Zhu, L., Strobel, N., Fahrig, R.: Three-dimensional anisotropic adaptive filtering of projection data for noise reduction in cone beam CT. Medical Physics 38(11), 5896–5909 (2011), http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/ 2011/Maier11-TAA.pdf 16. Manhart, M., Fahrig, R., Hornegger, J., Dörfler, A., Maier, A.: Guided Noise Reduction for Spectral CT with Energy-Selective Photon Counting Detectors. In: Noo, F. (ed.) Proceedings of the Third CT Meeting. pp. 91–94 (2014), https://www5.informatik.uni-erlangen.de/Forschung/ Publikationen/2014/Manhart14-GNR.pdf 17. Mayer, M.A., Borsdorf, A., Wagner, M., Mardin, C.Y., Tornow, R.P.: Wavelet denoising of multiframe optical coherence tomography. Biomed Opt Express 3(3), 2156–7085 (2012) 18. Ochs, P., Dosovitskiy, A., Brox, T., Pock, T.: On iteratively reweighted algorithms for nonsmooth nonconvex optimization in computer vision. SIAM J. Imaging Sci. 8(1), 331–372 (2015) 19. Ozcan, A., Bilenca, A., Desjardins, A.E., Bouma, B.E., Tearney, G.J.: Speckle reduction in optical coherence tomography images using digital filtering. Journal of the Optical Society of America A 24(7), 1901 (2007) 20. Pan, J., Sun, D., Pfister, H., Yang, M.H.: Blind image deblurring using dark channel prior. In: CVPR, Proceedings. pp. 1628–1636 (2016) 21. Pircher, M., Gotzinger, E., Leitgeb, R., Fercher, A.F., Hitzenberger, C.K.: Speckle reduction in optical coherence tomography by frequency compounding. J. Biomed. Opt. 8(3), 565 (2003) 22. Romano, Y., Elad, M., Milanfar, P.: The Little Engine that Could: Regularization by Denoising (RED). arXiv preprint arXiv:1611.02862 (2016) 23. Rousseeuw, P.J., Leroy, A.M.: Robust Regression and Outlier Detection. John Wiley & Sons (1987) 24. Salinas, H.M., Fernandez, D.C.: Comparison of PDE-Based Nonlinear Diffusion Approaches for Image Enhancement and Denoising in Optical Coherence Tomography. IEEE Trans. Med. Imag. 26(6), 761–771 (2007) 25. Schirrmacher, F., Köhler, T., Husvogt, L., Fujimoto, J.G., Hornegger, J., Maier, A.K.: Quasi: Quantile sparse image prior for spatio-temporal denoising of retinal OCT data. In: MICCAI 2017, Proceedings, Part II. pp. 83–91 (2017) 26. Thapa, D., Raahemifar, K., Lakshminarayanan, V.: Reduction of speckle noise from optical coherence tomography images using multi-frame weighted nuclear norm minimization method. Journal of Modern Optics 62(21), 1856–1864 (2015) 27. Tomasi, C., Manduchi, R.: Bilateral Filtering for Gray and Color Images. In: International Conference on Computer Vision (ICCV). pp. 839–846. IEEE, Bombay, India (Jan 1998) 28. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004) 29. W.Choi, Potsaid, B., Jayaraman, V., Baumann, B., Grulkowski, I., Liu, J.J., Lu, C.D., Cable, A.E., Huang, D., Duker, J.S., Fujimoto, J.G.: Phase-sensitive sweptsource optical coherence tomography imaging of the human retina with a vertical cavity surface-emitting laser light source. Opt Lett 38(3), 338 (2013) Temporal and Volumetric Denoising via QuaSI prior 25 30. Wong, A., Mishra, A., Bizheva, K., Clausi, D.A.: General bayesian estimation for speckle noise reduction in optical coherence tomography reinal imagery. Opt. Express 18(8), 8338–8352 (2010)
1cs.CV
This paper was presented at the 2017 51st Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, 2017. Copyright (c) 2017 IEEE. milliProxy: a TCP Proxy Architecture for 5G mmWave Cellular Systems Michele Polese∗ , Marco Mezzavilla† , Menglei Zhang† , Jing Zhu , Sundeep Rangan† , Shivendra Panwar† , Michele Zorzi∗ ∗ arXiv:1712.02700v1 [cs.NI] 7 Dec 2017 † Department of Information Engineering, University of Padova, Italy - e-mail: {polesemi, zorzi}@dei.unipd.it NYU Wireless, New York University, NY, USA - e-mail: {menglei, mezzavilla, srangan}@nyu.edu, [email protected]  Intel Corporation - e-mail: [email protected] Abstract—TCP is the most widely used transport protocol in the internet. However, it offers suboptimal performance when operating over high bandwidth mmWave links. The main issues introduced by communications at such high frequencies are (i) the sensitivity to blockage and (ii) the high bandwidth fluctuations due to Line of Sight (LOS) to Non Line of Sight (NLOS) transitions and vice versa. In particular, TCP has an abstract view of the endto-end connection, which does not properly capture the dynamics of the wireless mmWave link. The consequence is a suboptimal utilization of the available resources. In this paper we propose a TCP proxy architecture that improves the performance of TCP flows without any modification at the remote sender side. The proxy is installed in the Radio Access Network, and exploits information available at the Next Generation Node Base (gNB) in order to maximize throughput and minimize latency. I. I NTRODUCTION Communication at mmWave frequencies represents the new frontier for wireless networks [1]. Nowadays, indeed, most wireless standards are constrained in a very small bandwidth which can be allocated in the spectrum below 6 GHz. The mmWave spectrum (and in general frequencies above 6 GHz) would allow wireless communications to benefit from wide chunks of untapped spectrum that could be used to reach very high data rates. Millimeter waves are being considered for the next generation of cellular networks (i.e., 5G), which is currently being standardized by 3GPP as New Radio (NR) [2], as well as for public safety [3] and vehicular communications [4], [5]. Several applications in these scenarios require high data rate, and with low latency: consider for example real-time video streaming for remote interaction with autonomous robots, virtual reality applications or raw sensor data (e.g., from RADAR or LIDAR) exchanges between vehicles. However, the mmWave technology offers both a great potential and a number of challenges, which are related to the harsh propagation conditions that must be addressed before mmWaves can be reliably deployed. The very high path loss can be overcome with beamforming techniques, which in turn require the design of protocols that account for directionality [6]. Moreover, mmWaves are affected by blockage from obstacles (e.g., buildings, trees, the human body itself) [7], and this has an impact on the service availability and the achievable data rate. These limitations have an impact not only on the protocol stack of the wireless link but also on higher layers protocols, such as TCP, which is the most widely used transport protocol in the internet, for a variety of different applications that require flow control and reliable transmissions. TCP however suffers in terms of both reduced throughput and high latency when deployed over an end-to-end connection whose last link is based on mmWave radios [8], and it is not capable of delivering the high data rate and low latency performance that the aforementioned applications require [9]. In this paper we propose the design of milliProxy, a novel TCP proxy for mmWave mobile networks aimed at fully reaping the benefits of mmWave links to achieve high throughput with low latency. It is transparent to the end hosts of the connection, and respects the end-to-end connection semantics. The main rationale is to split the TCP control loop in the mmWave RAN to optimize the flow control over the wireless link. It is based on a cross-layer, data driven approach and enables a number of optimizations for the operation of TCP in mmWave networks. The rest of the paper is organized as follows. In Sec. II, we extensively discuss the main limitations of TCP over mmWave links, and provide an overview of the literature related to TCP proxies for traditional wireless networks. The architecture of milliProxy is described in Sec. III, and the results of a performance evaluation campaign are reported in Sec. IV. Finally, conclusions and future extensions of this work are provided in Sec. V. II. R ELATED W ORK A. 5G mmWave networks and challenges for TCP In this section, we provide an overview of the main challenges related to the usage of TCP in mmWave cellular networks. They can potentially enable gigabit-per-second cell data rates thanks to the very large bandwidth available [1], but the deployment of a reliable 5G mmWave network is challenging, mainly because of the harsh propagation environment at these frequencies. The high propagation loss can be compensated using beamforming techniques, with a large number of antennas in the transceivers, but this requires the design of Physical (PHY) and Medium Access Control (MAC) layer protocols able to cope with directionality [6]. Moreover, mmWave frequencies are sensitive to blockage from a wide range of materials [7], and, while it is possible to transmit and receive data also in NLOS exploiting reflections, there is a massive difference in the achivable data rate and reliability when transitioning from LOS to NLOS (with differences in the Signal to Interference plus Noise Ratio (SINR) in the order of 30 dB) and vice versa. Therefore, it is challenging to completely benefit from the vast amount of resources, especially when taking into account the end-to-end performance and the complex interaction between higher-layer protocols and the mmWave stack, as shown in previous works [8], [10]–[14]. In particular, the main issues related to the most widely used transport protocol in end-to-end networks (i.e., TCP) are related to the slow reactiveness of TCP with respect to changes in the channel quality of the mmWave link [8], [10], [12]. This translates into a sub-optimal utilization of the available resources, since the ramp up of the congestion window of the most used congestion control algorithms (e.g., TCP CUBIC [15] and TCP NewReno [16]) is too slow and limits the achievable goodput. This issue is more marked in mmWave links than in traditional sub-6 GHz deployments, because of an orders-of-magnitude difference in bandwidth (and thus achievable rate), and it becomes more relevant as the Round Trip Time (RTT) of the connection increases, as shown in [12]. Another consequence is the emergence of the bufferbloat phenomenon [8]. When the channel condition changes from LOS to NLOS, there is a drop in the data rate offered by the physical layer. This is a problem because the packets in excess are buffered at the Radio Link Control (RLC) layer, and the TCP sender is not aware of the update until an Active Queue Management (AQM) mechanism or a buffer overflow drops one or more packets. This causes an increase in the buffer occupancy and, consequently, in the end-to-end latency. Finally, there is the possibility of extended outages, due to blockage and the lack of a fall-back link. TCP reacts to these events with retransmission timeouts, and halves the slow start threshold at each of these events. Then, when the connection resumes, the duration of the slow start phase (with the exponential increase of the congestion window) is limited, and the TCP sender stays in congestion avoidance (with a linear increase of the congestion window) for most of the time, thus exacerbating the issue related to the slow congestion window ramp up. B. TCP Performance Enhancing Proxies The performance of TCP on wireless networks has been under the spotlight since the 1990s, when the first cellular networks capable of data transmission were commercially deployed. Even though TCP faces more challenging conditions when running on top of mmWave cellular networks, it is worth describing the main approaches that can be found in the literature related to the enhancement of TCP performance on wireless links. A first comprehensive review on the topic can be found in a paper by Balakrishnan et al. [17]. The authors claim that the poor performance of TCP in mobile networks is due to packet losses over an unreliable channel. However, as shown in [11], the channel losses can be masked by retransmission mechanisms. Moreover, the considered links have very low data rate and small buffers are used in the network. The settings in a mmWave networks are very different, since large buffers and retransmissions are already implemented in the wireless link to make up for packet loss at the price of increased latency and exposing more the network to the bufferbloat phenomenon. However, the authors of [17] provide a comparison of different strategies that can possibly be adapted to mmWave networks, using TCP Reno as a baseline, and including also TCP split approaches. In a more recent paper [18], Liu et al. introduce a TCP proxy middlebox for the optimization of TCP performance without the need for any modification to the protocol stack of servers, clients and base stations. They observe that the adoption of a new end-to-end TCP congestion control mechanism may be useless in the presence of HTTP proxies, which are frequently used in mobile networks. Moreover, they design their solution for modern LTE networks, characterized by large buffers (in the order of 5 MB) and bandwidth fluctuations (even if not as wide as those in mmWave networks [1], [9]), and a fixed network which does not act as a bottleneck. Their solution is a middlebox that can be placed anywhere in the mobile operator core network, and breaks the TCP connection in two segments, i.e., it does not respect end-to-end connection semantics1 . This box performs some optimizations on the fly, such as (i) not using the information of the receiver congestion window, which may be too small with respect to the actual rate available on the link, given that experimental evaluations on the receiver buffer in real devices have highlighted that it is never filled; (ii) changing retransmission patterns by intercepting duplicate ACKs; (iii) tuning the congestion window with a rate estimation algorithm. In this design, the TCP connection from the sender to the receiver is terminated at the middlebox, which buffers the packets for the final receiver until it can forward them. A third approach is described in [21], where Ren et al. introduce a TCP proxy in the mobile network base station. This study, however, is focused on the UMTS architecture. Their approach is based on a queue control mechanism: by using the sliding mode variable structure (SMVS) control theory the buffer queue length at the base station is kept at the same size. This proxy does not respect the end-to-end TCP semantics, because it terminates the connection at the proxy. The advertised window at the proxy is used to limit the sending rate of the server and to avoid buffering delays. At the proxy, a control mechanism is used to keep the queue length at a reference value, by inferring the bandwidth available at the base station. Some other interesting approaches that respect the end-toend TCP semantics are (i) Mobile TCP (M-TCP) [22], which freezes the TCP sender when it senses imminent congestion, in order to avoid packet loss and connection timeouts; and (ii) Snoop [23], also from Balakrishnan et al., which performs local retransmissions when TCP packet losses are sensed, in order to improve the connection reactiveness. I-TCP [24], instead, is a TCP split approach, not compliant with the end-to-end TCP semantics, that uses a traditional TCP congestion control also on the wireless link and does not yield a great performance improvement. In [25], a performance enhancement proxy for mmWave 1 According to [19], [20], the end-to-end principle, which states that certain functions in the internet are designed to work at the end hosts, is a founding paradigm of the internet. A proxy that splits the TCP connection into two independent segments does not respect the end-to-end TCP semantics, meaning that ACKs may be sent to the sender before the packet is actually received by the other end host. cellular networks is proposed. It is installed in the base stations, and breaks the end-to-end TCP semantics by sending early ACKs to the server. Moreover it performs batch retransmissions, i.e., it retransmits the packets that were detected as lost as well as the segments with a sequence number which is close to that of the lost packets. The detection of the lost packets however assumes that on the link only Hybrid Automatic Repeat reQuest (HARQ) retransmissions are performed, while in general with TCP the RLC Acknowledged Mode (AM) is also used. In the performance evaluation, moreover, the authors of [25] limit the application data rate to 100 Mbit/s, which can be usually sustained also in NLOS. Therefore, the performance analysis does not account for the very high data rates that can be achieved with mmWave and for the wide rate variations of the LOS to NLOS (or vice versa) transitions. Finally, it focuses only on the throughput and delivery ratio for a single user, without considering the latency and thus the bufferbloat problem. III. E ND - TO - END P ROXY A RCHITECTURE FOR MM WAVE In this section we describe our TCP proxy architecture for mmWaves, called milliProxy, and highlight the main innovations with respect to the solutions reported in Sec. II. Importantly, by being transparent to both the end points of the TCP flow, milliProxy respects the end-to-end semantics of the TCP connection, as opposed to most of the proposed approaches cited in Sec. II. The key functionalities of milliProxy are (1) the ability to split the control loop of the connection with a different and tunable Flow Window (FW) policy at the source server and at the proxy, as well as (2) the capability of controlling the Maximum Segment Size (MSS) of the connection in the portion between the proxy and the User Equipment (UE). A. Proxy Architecture MilliProxy is a TCP proxy which can be implemented and deployed as a network function, composed of several modules that can be updated or changed. It can be placed in the gNB, fully benefiting from the interaction with the mmWave protocol stack, or in a node in the core network, sharing outof-band information with the gNB to which the TCP receiver is connected. According to the position of the proxy, there may be the need to design a mechanism to cope with the user mobility. For example, if the proxy is in the gNB, when the UE performs a handover the network has to transfer the milliProxy’s state from the source to the target gNB. If instead the proxy is in an edge node of the core network, then it can manage multiple cells without the need to forward the state for each UE handover. Additional considerations on this issue are left for future work. The basic structure of the proxy is shown in Fig. 1. An instance of the proxy is created for each TCP flow which goes through the node in which it is installed, so that different policies can be enabled for different users, or different flows of the same user. Each instance has its own customizable buffer (set by default to 10 MB), flow window module and ACK management unit. The buffer is used to store the payload of the TCP packets before they can be delivered to the TCP receiver, and the ACK management unit checks for incoming ACKs to milliProxy instance milliProxy instance Flow window management Flow module window Flow management module BufferFlow Buffer ACK management module ACK management Server module UE End-to-end flows UE Server Figure 1: Architecture of milliProxy clear the contents of the buffer. The flow window policy is the equivalent at the proxy of the congestion window mechanism at the TCP sender, i.e., it controls the amount of data that can be forwarded by the proxy. The policy is not hard-coded into the proxy, but is loaded as a module, according to the implementation of the TCP congestion control mechanisms in the Linux kernel [26]. The ACK management unit of the proxy modifies the advertised window in each ACK that is relayed to the server in order to enforce the proxy flow window value also at the TCP sender. According to [27], the TCP sender selects the minimum between its congestion window and the received value of the advertised window as the maximum number of bytes it can send. Similarly to [10], the advertised window in the modified ACKs is set to be equal to the flow window determined at the proxy. This makes it possible to capture both components of the network, and adapt accordingly: the wired part is regulated by the classical TCP congestion control selected, while the wireless channel is used in a cross-layer fashion by the proxy, which selects the proper value of the advertised window. The presence of the buffer makes it possible to tune the MSS of the connection between the proxy and the UE differently from that of the other part of the connection, enabling further optimizations. If the MSS of the overall connection is limited by the Maximum Transmission Unit (MTU) of some intermediate networks using ethernet as link layer technology (i.e., the MSS is at most 1460 bytes), then the proxy buffers the 1460-byte payloads, and can send a larger segment which aggregates multiple payloads of the end-to-end connection. For example, fourteen 1460-bytes payloads received back-to-back in a small time interval can be combined into a single 20440bytes segment which is sent from the proxy to the UE. This increases the efficiency of the transmission process in the last mile of the connection, i.e., in the mmWave wireless link, because of the smaller overhead of the TCP/IP headers (in the previous example, just one TCP/IP header is used instead of fourteen), and because fewer uplink resources have to be scheduled for the transmission of ACKs from the UE [28]. Notice that aggregation is generally performed also at the RLC and MAC layers of very high-bandwidth connections in order to improve the transmission efficiency [29], [30], and the larger MSS helps also this process, since fewer concatenation and Update FW Data packet IN Payload (MSS 1) Header Flow Window Option Processing Header Flow Buffer RTT Estimate Window scaling Data packet OUT Payload (MSS 2) max TX SN max acked SN ACKs OUT ACK management module ACK IN Figure 2: Packets processing in a milliProxy instance. segmentation operations are required at the transmitter and the receiver. Fig. 2 depicts how a packet is processed by milliProxy. By design, it is completely transparent to the UE, i.e., the TCP receiver. It intercepts all the packets belonging to the flows it is handling, and the payload of data packets is stored in the proxy buffer. Any options in the packet header are processed, for example to estimate the RTT, as will be described in the following sections, or to handle the advertised window scaling. The payload will then be sent as part of a larger segment as soon as the flow window allows it. When an ACK is received, the proxy checks its sequence number, and marks the corresponding bytes in the buffer as received, which will then be discarded, allowing the flow window to advance. Consequently, a number of ACKs corresponding to the number of original packets received (approximatively equal to the ratio between the MSS of the proxy-UE connection and that of the server-proxy connection) is sent to the TCP sender. In each ACK the advertised window value is overwritten with the value of the flow window in the proxy. B. RTT estimation The estimation of the RTT can be performed using the TCP timestamp option [31]. This option is symmetric, i.e., it is added both to data packets at the TCP sender and to ACKs at the receiver. It has a total length of 10 bytes, and contains two timestamps. The first (T Sval ) is that of the clock of the end host that transmits the packet, the second (T Secho ) is the T Sval of a recently received packet from the other end host. Its usage is advised in [31] in order to improve the TCP performance, in terms of both throughput and security. If both the end hosts share the same clock, the estimation of the RTT is composed by two phases as follows. In the first one, which is shown in Fig. 3, the milliProxy instance estimates the latency on the path from the UE to the server. The timestamp T Secho of the data packet sent from the server to the UE corresponds to the time t−1 at which the UE sent an ACK. Similarly, the timestamp T Sval in the same packet corresponds to the time instant t0 at which the server transmitted the data packet. Given the very high packet rate that is sustained in mmWave networks, it is unlikely to observe a significant time interval between receiving the ACK corresponding to T Secho and sending the data packet corresponding to T Sval . !/*0 !+ = %&,-. Data milliProxy ACK !"# = %&'()* Figure 3: RTT computation at the proxy. Therefore, the latency of the uplink path can be estimated as TUE→server = t0 − t−1 . In a similar fashion, it is possible to use the timestamp values carried by ACK packets to estimate the latency on the downlink path Tserver→UE . Finally, the RTT is estimated as RT Te = Tserver→UE + TUE→server . If instead the two end hosts do not have the same clock, or if the TCP timestamp option is not supported, other methods can be used to estimate the RTT as reported in [32]. C. Integration with the 5G protocol stack The proxy is configured to collect some statistics from the connected 5G gNB. According to the location of the proxy, this data collection can be performed with or without delay. If the proxy is installed in the gNB, the information can be retrieved instantaneously, whereas if it resides in a node in the core or edge network some signaling is necessary, which would introduce some incremental latency. Thanks to this information it is possible to enable a cross-layer approach, which is useful for the design of flow window management algorithms driven by the performance and the statistics of the mmWave link. More information associated with each user can be retrieved from the protocol stack of the gNB. The first is the RLC buffer occupancy B, which can be seen as a signal of a congestion event and a consequent increase in latency. The second is an estimate of the PHY layer data rate between the UE and the gNB. In [18] this is done by measuring the number of bytes transmitted in the previous slots, dividing it by the duration of the slots. This approach, however, is sensitive to the actual rate that is injected in the network by the TCP source, and can lead to an underestimation of the available rate if the source rate does not saturate the connection. This limitation is particularly relevant in mmWave networks, where it takes a long time for the TCP source to reach a full utilization of the available D. Window Management The management of the flow window is an essential component of milliProxy. In this paper we propose a scheme based on the computation of the Bandwidth-Delay Product (BDP). The implementation and testing of alternative FW management policies is left for future works. In the BDP-based scheme, the FW management module uses three different kinds of cross-layer data: the RLC buffer occupancy B, the estimated data rate Re and the estimated RTT RT Te . The latter is filtered, and the minimum value RT Tmin is selected following the approach in [10], [33]–[35], so that the queuing latency at the RLC layer or at intermediate buffers is not taken into account. The flow window is then computed as w = bRT Tmin Re c. When the RTT estimate is not yet available (i.e., for the first ACK after the reception of the SYN packet), the flow window is arbitrarily initialized to a high value of 400 MB. Moreover, it is possible to make the policy more conservative when the RLC buffer occupancy exceeds a predefined value (e.g., 2 MB). In this case, the flow window is set to w = max{bRT Tmin Re c − 2B, 0}. IV. P ERFORMANCE E VALUATION A. ns-3 mmWave module In order to evaluate the performance of milliProxy in an endto-end scenario, we implemented the proxy in ns-3 [36], an open source network simulator which also features a mmWave cellular protocol stack. A complete description of the mmWave module is provided in [37], [38]: it features a complete 3GPPlike protocol stack in the gNBs and UEs, with a custom PHY/MAC layers implementation, based on a dynamic Time Division Duplexing (TDD) scheme designed for low latency communications [39], RLC, Packet Data Convergence Protocol (PDCP) and Radio Resource Control (RRC) layers. The channel model is based on the 3GPP channel model for frequencies above 6 GHz [40], and it models the time correlation among the channel impulse responses computed for moving users in order to account for spatial consistency. B. Scenario and parameters The main simulation parameters are reported in Table I. In this paper we focus on testing the performance of milliProxy in a single user scenario, in order to evaluate the responsiveness of the proxy architecture to channel variations, from LOS to NLOS and viceversa. In order to model them, some obstacles are randomly deployed in the simulation scenario between the 100 mmWave gNB 80 Y [m] resources. In our previous works [10], [33], instead, we rely on the information provided by the Adaptive Modulation and Coding (AMC) module at the MAC layer. By knowing the channel quality of a UE it is possible to compute the modulation and coding scheme, predict how many bytes the scheduler could allocate to the user (with full buffer assumption) in the next time slot, and divide by its duration to obtain an achievable data rate Re that is not influenced by the source rate. Another useful metric that can be acquired in a cross-layer setup is the SINR of the UE, which could give an indication on the link status: for example, if it is below a certain threshold, then the proxy will know that the UE is in outage. 60 40 20 0 UE path at speed v UE 0 10 20 30 X [m] 40 50 Figure 4: Randomly generated simulation scenario. The three grey rectangles represent obstacles such as buildings, cars, trees. Parameter Value mmWave carrier frequency mmWave bandwidth 3GPP Channel Scenario Max PHY layer rate S1 link latency DS1 Latency from PGW to server DRS RLC AM buffer size BRLC RLC AM Reordering Timer RLC AM Report Buffer Status timer UE speed v TCP MSS1 (server - proxy) TCP MSS2 (proxy - UE) 28 GHz 1 GHz Urban Micro 3.2 Gbit/s 1 ms [1, 5, 10, 20] ms [10, 20] MB 1 ms 2 ms 5 m/s 1400 byte 20000 byte Table I: Simulation parameters gNB (which is at coordinates (25, 100) m) and the UE (moving from (0, 0) m to (50, 0) at speed v). As the user moves, it will experience multiple transitions, with a random duration of each LOS or NLOS phase in each different run of the simulation. An example of scenario is shown in Fig. 4. All the results are averaged over 50 independent simulation runs. C. Results Fig. 5 shows a comparison of both goodput and RAN latency when milliProxy is deployed in the gNB or not, for different RLC buffer sizes BRLC and fixed-network latencies. It can be seen that milliProxy performs better in terms of both goodput and latency, with a goodput gain of up to 2.24 times (combined with a latency reduction of 1.98 times) with the highest DRS , or a latency reduction of 43 times with a similar goodput in the edge server scenario (i.e., DRS = 1 ms). MilliProxy is therefore effective at reducing the impact of the bufferbloat issue: when the channel switches from a LOS to a NLOS state, milliProxy can reduce the TCP sending rate faster, and thereby avoid extra queuing latency. On the other hand, when the channel quality improves, milliProxy is able to (i) track the available data rate at the physical layer and (ii) promptly inform the TCP sender of the increased resource availability, which indeed results in higher goodput. The performance of milliProxy is independent on the buffer size, since it manages to keep the buffer occupancy and consequently the RLC queuing delay to a minimum. As shown in Fig. 5 and extensively discussed in [28], TCP NewReno, B = 10 MB TCP NewReno, B = 20 MB Goodput [Mbit/s] 1,500 Dinfo = 0, Tinfo = 10 ms Dinfo = 3 ms, Tinfo = 10 ms 1,600 Goodput [Mbit/s] milliProxy, B = 10 MB milliProxy, B = 20 MB UDP 1,400 1,200 1,000 1,000 2 500 6 11 21 One-way end-to-end latency DS1 + DRS [ms] 2 6 11 (a) TCP goodput 21 One-way end-to-end latency DS1 + DRS [ms] 30 milliProxy, B = 10 MB milliProxy, B = 20 MB TCP NewReno, B = 10 MB TCP NewReno, B = 20 MB RAN latency [ms] 150 RAN latency [ms] (a) TCP goodput 20 10 100 Dinfo = 0, Tinfo = 10 ms Dinfo = 3 ms, Tinfo = 10 ms 0 50 2 6 11 21 One-way end-to-end latency DS1 + DRS [ms] (b) Latency in the RAN (from the PDCP at the eNB to that at the UE) 0 2 6 11 21 One-way end-to-end latency DS1 + DRS [ms] Figure 6: Comparison of goodput and RAN latency with different milliProxy configurations. Dinfo represents the latency needed to forward the cross-layer information from the gNB to milliProxy, Tinfo is the periodicity at which this information is collected. (b) Latency in the RAN (from the PDCP at the eNB to that at the UE) Figure 5: Comparison of goodput and Radio Access Network (RAN) latency with and without milliProxy, for different buffer sizes B. DS1 + DRS [ms] 2 6 11 21 BRLC = 10 MB BRLC = 20 MB 11.8008 43.3299 4.7547 11.5578 2.5574 5.8104 1.9888 3.6988 (a) RAN latency reduction when using milliProxy, i.e., ratio between the latency with TCP NewReno and that with milliProxy. DS1 + DRS [ms] 2 6 11 21 BRLC = 10 MB BRLC = 20 MB 1.1941 1.0135 1.6875 1.1448 1.7202 1.0765 2.2430 1.9901 (b) TCP goodput gain when using milliProxy, i.e., ratio between the goodput with milliProxy and with TCP NewReno. Table II: Goodput and latency performance gains with milliProxy. traditional approaches without proxy result in higher goodput at the price of increased RAN latency when using larger buffers. A comparison between different configuration options for milliProxy is given in Fig. 6. In particular, we are interested in studying the sensitivity of goodput and latency with respect to the delay Dinfo in the acquisition of the cross-layer information from the gNB: it is equal to 0 when milliProxy is deployed in the gNB, and greater than 0 when installed in a node in the core or edge network. We consider Dinfo = 3 ms, i.e., we assume that the latency between the proxy deployed in the core/edge network and the gNB will be smaller than 3 ms. As shown in Fig. 6, the two tested configurations have a similar behavior in terms of both goodput and latency, showing that milliProxy is robust with respect to different possible deployments in the edge network or in the gNBs. V. C ONCLUSIONS In this paper we introduced milliProxy, a novel proxy designed to enhance the performance of TCP in mmWave cellular networks. We described the main challenges related to the usage of TCP on top of mmWave links, and the main proxy designs from the literature. MilliProxy splits the TCP control loop in two segments, while keeping the end-to-end semantics of TCP. It has a modular design, which enables the use of different MSS values and flow window management algorithms in the two portions of the connection (i.e., wired and wireless). The window control policy can benefit from the interaction of milliProxy with the protocol stack of the mmWave networks, which enables cross-layer approaches. We showed how a FW policy based on the BDP of the end-to-end connection allows a reduction in latency of up to 10 times or an increase in goodput of up to 2 times with respect to traditional TCP NewReno, as well as a robustness with respect to where milliProxy is placed in the network. MilliProxy is an option to reach high goodput with low latency with TCP in mmWave networks. As part of our future work we will test the proxy performance in a wide variety of scenarios in ns-3, analyzing the performance with multiple users, and with different flow window policies, and will consider the implementation in a real setup. R EFERENCES [1] S. Rangan, T. S. Rappaport, and E. Erkip, “Millimeter-wave cellular wireless networks: Potentials and challenges,” Proc. IEEE, vol. 102, no. 3, pp. 366–385, Mar 2014. [2] 3GPP, “Study on New Radio (NR) Access Technology - Physical Layer Aspects - Release 14,” TR 38.802, 2017. [3] M. Mezzavilla, M. Polese, A. Zanella, A. Dhananjay, S. Rangan, C. Kessler, T. Rappaport, and M. Zorzi, “Public Safety Communications above 6 GHz: Challenges and Opportunities,” IEEE ACCESS Special Section on Mission Critical Public-Safety Communications: Architectures, Enabling Technologies, and Future Applications, 2017. [4] J. Choi, V. Va, N. Gonzalez-Prelcic, R. Daniels, C. R. Bhat, and R. W. Heath, “Millimeter-wave vehicular communication to support massive automotive sensing,” IEEE Communications Magazine, vol. 54, no. 12, pp. 160–167, Dec 2016. [5] M. Giordani, A. Zanella, and M. Zorzi, “Millimeter wave communication in vehicular networks: Challenges and opportunities,” in 2017 6th IEEE International Conference on Modern Circuits and Systems Technologies (MOCAST), May 2017. [6] H. Shokri-Ghadikolaei, C. Fischione, G. Fodor, P. Popovski, and M. Zorzi, “Millimeter wave cellular networks: A MAC layer perspective,” IEEE Transactions on Communications, vol. 63, no. 10, pp. 3437–3458, Oct 2015. [7] S. Singh, F. Ziliotto, U. Madhow, E. M. Belding, and M. J. W. Rodwell, “Millimeter Wave WPAN: Cross-Layer Modeling and MultiHop Architecture,” in 26th IEEE International Conference on Computer Communications (INFOCOM), May 2007, pp. 2336–2340. [8] M. Zhang, M. Mezzavilla, R. Ford, S. Rangan, S. S. Panwar, E. Mellios, D. Kong, A. R. Nix, and M. Zorzi, “Transport Layer Performance in 5G mmWave Cellular,” in 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Apr 2016, pp. 730– 735. [9] M. Polese, R. Jana, and M. Zorzi, “TCP and MP-TCP in 5G mmWave Networks,” IEEE Internet Computing, vol. 21, no. 5, pp. 12–19, Sept 2017. [10] M. Zhang, M. Mezzavilla, J. Zhu, S. Rangan, and S. Panwar, “The Bufferbloat Problem over Intermittent Multi-Gbps mmWave Links,” Nov. 2016. [Online]. Available: https://arxiv.org/abs/1611.02117 [11] M. Polese, R. Jana, and M. Zorzi, “TCP in 5G mmWave Networks: Link Level Retransmissions and MP-TCP,” in 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), May 2017. [12] M. Polese, M. Mezzavilla, S. Rangan, and M. Zorzi, “Mobility Management for TCP in mmWave Networks,” in Proceedings of the 1st ACM Workshop on Millimeter-Wave Networks and Sensing Systems, co-located with ACM MobiCom’17, ser. mmNets ’17, 2017, pp. 11–16. [13] S. K. Saha, A. Garg, and D. Koutsonikolas, “A first look at TCP performance in indoor IEEE 802.11ad WLANs,” in 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Apr 2015, pp. 63–64. [14] S. Sur, I. Pefkianakis, X. Zhang, and K.-H. Kim, “WiFi-Assisted 60 GHz Wireless Networks,” in Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, ser. MobiCom ’17. ACM, 2017, pp. 28–41. [15] S. Ha, I. Rhee, and L. Xu, “CUBIC: a new TCP-friendly high-speed TCP variant,” ACM SIGOPS Operating Systems Review, vol. 42, no. 5, pp. 64–74, July 2008. [16] T. Henderson, S. Floyd, A. Gurtov, and Y. Nishida, “The NewReno Modification to TCP’s Fast Recovery Algorithm,” RFC 6582, 2012. [17] H. Balakrishnan, V. N. Padmanabhan, S. Seshan, and R. H. Katz, “A comparison of mechanisms for improving TCP performance over wireless links,” IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp. 756– 769, Dec 1997. [18] K. Liu and J. Y. Lee, “On Improving TCP Performance over Mobile Data Networks,” IEEE Transactions on Mobile Computing, vol. 15, no. 10, pp. 2522–2536, Oct 2016. [19] J. Border, M. Kojo, J. Griner, G. Montenegro, and Z. Shelby, “Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations,” RFC 3135, June 2001. [20] J. H. Saltzer, D. P. Reed, and D. D. Clark, “End-to-end arguments in system design,” ACM Trans. Comput. Syst., vol. 2, no. 4, pp. 277–288, Nov 1984. [21] F. Ren and C. Lin, “Modeling and improving TCP performance over cellular link with variable bandwidth,” IEEE Transactions on Mobile Computing, vol. 10, no. 8, pp. 1057–1070, Aug 2011. [22] K. Brown and S. Singh, “M-TCP: TCP for mobile cellular networks,” ACM SIGCOMM Computer Communication Review, vol. 27, no. 5, pp. 19–43, Oct 1997. [23] H. Balakrishnan, S. Seshan, E. Amir, and R. H. Katz, “Improving TCP/IP performance over wireless networks,” in Proceedings of the 1st annual international conference on Mobile computing and networking. ACM, 1995, pp. 2–11. [24] A. Bakre and B. Badrinath, “I-TCP: Indirect TCP for mobile hosts,” in Proceedings of the 15th International Conference on Distributed Computing Systems. IEEE, 1995, pp. 136–143. [25] M. Kim, S.-W. Ko, and S.-L. Kim, “Enhancing TCP End-to-End Performance in Millimeter-Wave Communications,” arXiv preprint arXiv:1709.00717, 2017. [26] M. Casoni, C. A. Grazia, M. Klapez, and N. Patriciello, “Implementation and validation of TCP options and congestion control algorithms for ns3,” in Proceedings of the 2015 Workshop on ns-3. ACM, 2015, pp. 112–119. [27] M. Allman, V. Paxson, and E. Blanton, “TCP Congestion Control,” RFC 5681, September 2009. [28] M. Zhang, M. Polese, M. Mezzavilla, J. Zhu, S. Rangan, S. Panwar, and M. Zorzi, “Will TCP Work in mmWave 5G Cellular Networks?” submitted to IEEE Communication Magazine, 2017. [29] 3GPP, “NR - Radio Link Control (RLC) protocol specification - Release 15,” TS 38.322, 2017. [30] D. Skordoulis, Q. Ni, H. H. Chen, A. P. Stephens, C. Liu, and A. Jamalipour, “IEEE 802.11n MAC frame aggregation mechanisms for nextgeneration high-throughput WLANs,” IEEE Wireless Communications, vol. 15, no. 1, pp. 40–47, Feb 2008. [31] D. Borman, B. Braden, V. Jacobson, and R. Scheffenegger, “TCP Extensions for High Performance,” RFC 7323, Sep 2014. [32] B. Veal, K. Li, and D. Lowenthal, “New Methods for Passive Estimation of TCP Round-trip Times,” in Proceedings of the 6th International Conference on Passive and Active Network Measurement, ser. PAM’05, 2005, pp. 121–134. [33] T. Azzino, M. Drago, M. Polese, A. Zanella, and M. Zorzi, “X-TCP: A Cross Layer Approach for TCP Uplink Flows in mmWave Networks,” in 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-HocNet’17), June 2017. [34] H. Jiang, Y. Wang, K. Lee, and I. Rhee, “Tackling bufferbloat in 3G/4G networks,” Proceedings of the 2012 ACM conference on Internet measurement, pp. 329–342, 2012. [35] N. Cardwell, Y. Cheng, C. S. Gunn, S. H. Yeganeh, and V. Jacobson, “BBR: Congestion-based congestion control,” Queue, vol. 14, no. 5, p. 50, 2016. [36] T. R. Henderson, M. Lacage, G. F. Riley, C. Dowell, and J. Kopena, “Network simulations with the ns-3 simulator,” ACM SIGCOMM demonstration, vol. 14, no. 14, p. 527, 2008. [37] M. Mezzavilla, M. Zhang, M. Polese, R. Ford, S. Dutta, S. Rangan, and M. Zorzi, “End-to-End Simulation of 5G mmWave Networks,” submitted to IEEE Communication Surveys & Tutorials, 2017. [Online]. Available: https://arxiv.org/abs/1705.02882 [38] R. Ford, M. Zhang, S. Dutta, M. Mezzavilla, S. Rangan, and M. Zorzi, “A Framework for End-to-End Evaluation of 5G mmWave Cellular Networks in ns-3,” in Proceedings of the Workshop on Ns-3. ACM, June 2016, pp. 85–92. [39] S. Dutta, M. Mezzavilla, R. Ford, M. Zhang, S. Rangan, and M. Zorzi, “Frame Structure Design and Analysis for Millimeter Wave Cellular Systems,” IEEE Transactions on Wireless Communications, vol. 16, no. 3, pp. 1508–1522, Mar 2017. [40] 3GPP, “Study on channel model for frequency spectrum above 6 GHz Release 14.2.0,” TR 38.900, 2017.
7cs.IT
arXiv:1709.06990v1 [cs.NE] 20 Sep 2017 Text Compression for Sentiment Analysis via Evolutionary Algorithms Emmanuel Dufourq Bruce A. Bassett University of Cape Town African Institute for Mathematical Sciences Email: [email protected] University of Cape Town African Institute for Mathematical Sciences South African Astronomical Observatory Email: [email protected] Abstract—Can textual data be compressed intelligently without losing accuracy in evaluating sentiment? In this study, we propose a novel evolutionary compression algorithm, PARSEC (PARts-ofSpeech for sEntiment Compression), which makes use of Partsof-Speech tags to compress text in a way that sacrifices minimal classification accuracy when used in conjunction with sentiment analysis algorithms. An analysis of PARSEC with eight commercial and non-commercial sentiment analysis algorithms on twelve English sentiment data sets reveals that accurate compression is possible with (0%, 1.3%, 3.3%) loss in sentiment classification accuracy for (20%, 50%, 75%) data compression with PARSEC using LingPipe, the most accurate of the sentiment algorithms. Other sentiment analysis algorithms are more severely affected by compression. We conclude that significant compression of text data is possible for sentiment analysis depending on the accuracy demands of the specific application and the specific sentiment analysis algorithm used. Index Terms—sentiment analysis, evolutionary algorithm, compression I. I NTRODUCTION AND R ATIONALE Sentiment analysis is the automated detection of emotions and attitudes towards a particular subject, event or entity, and has received an increasing amount of interest since the year 2000 [1], [2]. Sentiment analysis has been applied to many problem domains; for instance, determining sentiments of consumers towards products, or mining social media to gain an understanding of the public’s opinion on matters such as corruption [1]–[3]. In this study, we propose a novel evolutionary algorithm (EA) which is tasked with compressing text, whereby the objective is to retain the correct sentiment classification of the compressed text. To achieve this, the EA makes use of POS (Parts of Speech) to determine which POS can be removed from the text without hindering the classification performance. EAs [4], [5] – inspired by nature – make use of a population of individuals which are evolved over several iterations to solve optimisation problems. To illustrate the idea, consider the sentence “I went home yesterday, opened the door and was immediately faced with a terrible shock”. The key sentiment-encoding phrase is “terrible shock”. We thus want to propose an algorithm that can learn to evolve rules that can effectively do this compression. The remaining words in the sentence do not contain any useful information in determining the sentiment expressed, and thus the rules can discard those words. Feng et al. [6] proposed a Chinese text compression method with the objective of preserving the opinions expressed in the text to retain the sentiment, and to ensure that the compressed sentence is grammatically correct. The authors propose a score function which takes into consideration three primary functions; namely a word significance, a linguistic and an opinion scoring function. The word significance function makes use of the word frequency properties to allocate a score to each word. The scores were obtained by processing a corpus containing 30,000 documents. The linguistic score was obtained using a n-gram probabilistic function which made use of Google search results. The opinion score made use of an opinion lexicon to allocate a value to each word based on the frequency of the word. The authors created the lexicon from three different sources and the resulting lexicon contained 32,051 words for which the sentiment (positive, neutral or negative) was known. A dynamic programming algorithm was used in order to determine how many words should be present in a compressed sentence by evaluating several candidate compressed sentences. The score function was applied to each candidate sentence and the result was divided by the number of words in the compressed sentence. The compressed sentence with the highest value after this operator was deemed to be the final compressed sentence for a given uncompressed sentence. One Chinese data set of compressed sentences was manually created to evaluate their proposed approach. The study revealed that their proposed approach was able to outperform a traditional sentence compression method when the sentences were evaluated - in terms of the opinion and grammar - by a human. Che et al. [7] also proposed a text compression method for sentiment analysis. In their study, they make use of 10 features (which are determined for every word) to perform the compression. The features are grouped into basic, sentiment related, semantic and syntactic features. The basic features include the words before and after the word for which the features are being constructed for; they also include the POS tags for those words. There are two sentiment features, namely a binary field denoting if the word is a perception word and if it is a polarity word. These words were obtained from an existing lexicon. The semantic features include prefix and suffix characters and also Brown word features which helps identify that words which are written differently represent the same thing. They also include word embedding which makes use of Word2Vec [8] to determine if two words have a similar meaning. The syntactic feature makes use of a single feature which indicates the relationship between the words in the sentence. The sentence compression is conducted prior to the sentiment analysis. With the limited amount of existing work in this field, we propose and investigate PARSEC (PARts-of-Speech for sEntiment Compression), which makes use of an EA to achieve text compression with minimal loss in sentiment accuracy. II. PARTS - OF -S PEECH POS, in languages, are defined as the primary groups of words that are grammatically similar. Common POS include, but are not limited to: adjective, verb and noun. For example, the words “dog”, “house” and “student” are examples of nouns. In this study, the Stanford Log-linear Part-Of-Speech Tagger [9] was used to convert the original data sets into their corresponding POS tags. Thus, each word in a dataset was converted into a POS tag, and the length of each sentence in the original dataset was identical to that of the POS tagged dataset. For example, if the following sentence was found in the original dataset: “this is a great product”, it would be converted into “DT VBZ DT JJ NN” (which corresponds to the POS equivalent) in the POS tagged dataset. We used the Penn Treebank tag set [10], [11]. This set contains 36 tags and an additional 12 tags to denote certain characters such as comma, semi-colon and other characters. III. P ROPOSED C OMPRESSION M ETHOD A. Compressor This study proposes a new type of individual for EAs – referred to as a compressor – which reduces the length of sentences when applied to a dataset. The compressor is made up of several rules, and in turn, each rule is made up of a sequence of POS tags and a decision. The decision is applied whenever it’s sequence of POS tags matches the POS tags in the data. The decisions represent the indices of the words which will be removed in the matched sequence. Figure 1 illustrates an example of a compressor. the equivalent POS dataset. Furthermore, let Xi,j denote sentence i and word j in X, and Yi,j denote sentence i and word j in Y . The compressor in the figure has 10 rules denoted as R1 , R2 , R3 , ..., R10 . The first rule, R1 , has 2 tags which are represented by the sequence “JJ, NN”. This rule has one decision, and that is, to delete the word at index 0. This implies that when this particular compressor is applied, rule R1 will find POS tags in Y corresponding to the sequence “JJ NN”. Let Yl,m and Yl,m+1 denote two consecutive words in Y which have the sequence “JJ NN”. The decision in R1 is to delete index 0, thus R1 will delete Yl,m and consequently it will delete Xl,m . Thus, the size of X and Y has been reduced by one. Each time R1 finds the exact sequence “JJ NN”, the POS tag and word corresponding to “JJ” (index 0) in Y and X are deleted. Similarly for R10 , Let Yl,m , Yl,m+1 and Yl,m+2 denote three consecutive words in Y which have the sequence “NN VB RB”. The decision in R10 is to delete index 0 and 2, thus R10 will delete Yl,m , Yl,m+2 , Xl,m and Xl,m+2 from Y and X respectively for each occurrence of the POS tags “NN VB RB”. When a rule is being processed, if a punctuation mark occurs, then the rule evaluation immediately stops. This mechanism was incorporated so that the sequence of tags – which is encapsulated by a rule – is applied to a single sentence and is not applied across two separate sentences. For example, consider the two following sentences “This book was really funny. Great, tomorrow is Friday.” which corresponds to: “DT NN VBD RB JJ. JJ, NN VBZ NNP.” Assume that some rule has the following tags “JJ JJ” and the decision is to delete both indices. If the punctuation marks are not taken into consideration, then the rule will match with the words “funny” and “great”. This will result in “This book was really . , tomorrow is Friday.” Consequently, the sentiments in these two sentences are no longer positive. However, if punctuation is taken into consideration, then the rule will not delete any words since the full stop separates the two sentences. In this study, we define the term ‘wildcard’, which represents the notion of ‘any POS’ tag and is denoted with a ‘*’ symbol. Thus, when a rule is being evaluated, the wildcard POS can match with any POS in the POS dataset. For example, if a rule has the following tags: “JJ * NNP”, then any POS sequence that has ‘JJ’, followed by any POS, followed by ‘NNP’ will cause the rule to match with that POS sequence. Algorithm 1 presents the generalized pseudocode to match the tags in a rule with the POS tags in the POS dataset. The algorithm also presents how to delete words from the original and POS dataset once a rule matches with a sequence. B. PARSEC initial population generation Fig. 1. An example of a PARSEC compressor with 10 rules. In the following explanation, let X denote some original dataset for which PARSEC is being applied to, and let Y denote The pseudocode for creating an initial population of compressors is presented in algorithm 2. Several individuals are created based on a predefined user parameter, namely the population size. Several rules have to be created for each compressor. There must be at least one rule, and a user-defined Algorithm 1: Pseudocode to apply a compressor to a sentence and compress the text. input: compressor the compressor to evaluate input: original sentence the original sentence input: POS sentence the POS sentence input: length sentence the length of the sentence to evaluate 1 begin 2 for each rule in compressor do 3 tag in rule ← the tags inside rule 4 rule decisions ← the decisions inside rule 5 for i ← 0 to length sentence do 6 match ← true 7 for j ← 0 to length(tag in rule) do 8 if tag in rule [j] not equal POS sentence [i + j] then 9 match ← false 10 break loop and go to line 5 Algorithm 2: Pseudocode to create the initial population of compressors. input: population size the number of compressors to create 1 begin 2 for i ← 0 to population size do 3 CreateCompressor() 4 Evaluate compressor. 5 Add compressor to the initial population. 6 7 8 9 10 11 12 11 12 13 if match equal true then for k ← 0 to length(rule decisions) do flag original sentence [i + rule decisions[k]] 13 14 15 14 15 compressed sentence ← delete all words in original sentence that have been flagged. return compressed sentence 16 17 18 parameter, namely maxrules , is implemented to restrict the total number of rules. When creating the rules, the algorithm iterates until it has reached maxrules , and a probability value of 0.5 was set to determine if a rule was to be created or not, as can be seen on line 9 in algorithm 2. Each rule consists of two primary parts, namely the tags and the decisions, the pseudocode for the creation of those respective parts are presented in algorithms 3 and 4. C. PARSEC fitness function The pseudocode for the fitness evaluation of a compressor is presented in algorithm 6. Each instance in the dataset is considered in turn. The sentiment for each instance in the original dataset is computed using algorithm 5. When a compressor is evaluated, it is applied to each instance and a compressed sentence is created. The sentiment of each compressed sentence is computed using algorithm 5. The compressed sentiment is then compared to the original sentiment. If these are the same then the compressed sentence has had no effect on the sentiment when compared to the original. Conversely, if the values are different, then there are two possibilities. Either the compressed sentiment is equal to the correct sentiment as labelled in the training data (in which case the compressor is rewarded) or it is not (in which case the compressor is penalised). Thus, the fitness function takes Function CreateCompressor () new compressor ← create a blank compressor for j ← 0 to max tags do if rand() < 0.5 then CreateRule() and add rule to new compressor if Compressor has no rule then CreateRule() and add rule to new compressor return new compressor Function CreateRule () new rule ← create a blank rule Create the tags using algorithm 3 and add the rules to new rule. Create the decisions using algorithm 4 and add the rules to new rule. return The initial population. Algorithm 3: Pseudocode to create POS tags. input: minimum tags the minimum number of allowed pos tags input: maximum tags the maximum number of allowed pos tags 1 begin 2 pos list ← { } 3 number tags ← random[minimum tags, maximum tags ] 4 for i ← 0 to number tags do 5 if i = 0 then 6 Create a tag (excluding wildcard) and add it to pos list 7 else if i = number tags-1 then 8 Create a tag (excluding wildcard) and add it to pos list 9 else 10 Create a tag (including wildcard) and add it to pos list 11 return pos list Algorithm 4: Pseudocode to create decisions. input: number tags the number of tags 1 begin 2 for i ← 0 to number tags do 3 if random[0,1] < 0.5 then 4 Add i to decision list 5 return decision list. Algorithm 5: Pseudocode for baseline evaluation. input : sentence the sentence to be evaluated input : dictionary the dictionary of sentiment words input : negation words the list of negation words output: The sentiment for the evaluated sentence 1 begin 2 sentiment score ← 0 3 negation ← false 4 for each word in the sentence do 5 if word is in dictionary and negation is true then 6 sentiment score ← sentiment score + (-1 × word’s sentiment value) 7 if word is in dictionary and negation is false then 8 sentiment score ← sentiment score + word’s sentiment value 9 if word is in negation words then 10 negation ← swap polarity 12 else negation ← false 13 return sentiment score 11 Algorithm 6: Pseudocode to compute fitness of a compressor. input : compressor the compressor to evaluated input : sentence a list of sentences for which compressor will be evaluated on input : original lengths a list of lengths for each sentence in the original data set input : original sentiments a list of sententiment values determined by applying algorithm 5 on the original data set input : correct sentiments a list of correct sententiment values for the original data set input : number rules the number of rules that compressor has output: The sentiment for the evaluated sentence 1 begin 2 for i ← 1 to number of sentences do 3 compressed sentence ← apply compression to sentences [i]. 4 compressed sentiment ← apply algorithm 5. 5 if compressed sentiment is not equal to original sentiments [i] then 6 if compressed sentiment is equal to correct sentiments [i] then 7 raw fitness ← raw fitness + 1 8 9 10 11 12 into consideration the number of new instances for which the compressor produces the correct result. A multi-objective fitness function was created to combine the fitness, the average reduction in terms of the length of the sentences before and after compression, and the size of the compressor in terms of the number of rules. Thus, the objective was to maximize the fitness and average reduction in sentences, and to minimize the size of the compressor. IV. E XPERIMENTAL S ETUP A. Datasets and Setup Twelve data sets were created by randomly selecting reviews from corresponding Amazon review datasets [12]. For each created data set, 1000 positive and 1000 negative reviews were randomly selected from the larger corresponding Amazon data set. The larger Amazon data sets were obtained from [12], [13]. The data sets were: Amazon Instant Video (AIV), Apps for Android, Automotive, Baby, Beauty, Digital Music, Health and Personal Care, Musical Instruments (MI), Patio Lawn and else raw fitness ← raw fitness- 1 average change ← average change + (Length(sentences [i]) Length(compressed sentence)) raw fitness ← raw fitness + [0.5 × (average change/ number of sentences)] - (0.1 × number rules) return raw fitness Garden, Pet Supplies, Tools and Home Improvement, and Toys and Games. We propose a set of experiments whereby the compression rate is a user parameter and PARSEC must generate compressors that can compress the original datasets to reach the specified compression rate. To achieve this, a lower and upper user-defined compression bound were defined. The lower compression bound (LCB) was implemented to ensure that the compressors did not result in a compression ratio less than the specified value. Similarly, the upper compression bound (UCB) ensured that the compressors did not result in a compression ratio greater than the specified value. Thus, every compressor in the EA population had to have a compression rate between the LCB and UCB. Furthermore, two additional user-defined parameters were implemented to ensure that the total number of rules within each compressor remained within a certain bound. The two parameters were named compressionRulesmin and TABLE I T HE LOWER (LCB) AND UPPER (UCB) COMPRESSION BOUND CONSTRAIN THE ALGORITHM BY ENSURING THAT THE COMPRESSION RATE FOR EACH COMPRESSOR IS BETWEEN THE TWO VALUES RESPECTIVELY. T HE TABLE PRESENTS THE LCB AND UCB VALUES (%) ALONG WITH THE MINIMUM AND MAXIMUM NUMBER OF RULES USED IN THE EXPERIMENTS . T HESE SET COMPRESSION RATES WERE ENFORCED AND THE PERFORMANCE OF PARSEC WAS MEASURED ON SEVERAL DATASETS . T HE VALUES FOR THE MINIMUM AND MAXIMUM NUMBER OF RULES WERE DETERMINED BY ADDITIONAL TRIAL RUNS . I T WAS OBSERVED THAT A GREATER NUMBER OF RULES WERE NEEDED TO ACHIEVE HIGHER COMPRESSION RATES . LCB UCB 10 15 20 25 30 50 13 18 13 28 33 53 compression Rulesmin 5 10 20 40 90 350 compression Rulesmax 50 70 90 120 150 500 compression rates of 10% and 15% respectively. When experimenting with PARSEC we posed the following question. For a predetermined drop in accuracy, how much compression is achievable by PARSEC? For a threshold of -1% compression, Vivek and LingPipe were able to achieve up to 30% compression. For this same threshold five methods could achieve up to 20% compression rate. Regardless of the compression rate used, both Stanford and Sentiment140 did not obtain any result less than -1%. These two algorithms produced the weakest performance with PARSEC. 0 −1 −2 B. Sentiment analysis algorithms Several sentiment analysis algorithms were applied to the original and compressed datasets to determine the difference in accuracy and to investigate the performance of PARSEC. The following algorithms were used: SentiStrength [14], [15], MeaningCloud [16], Vivek [17], Stanford [18], uClassify [19], Sentiment140 [20], Intellexer [21] and LingPipe [22]. C. Execution of experiments We first applied the sentiment analysis algorithms described in section IV-B to the original datasets and record the test accuracy. Then, we ran PARSEC using the baseline evaluation to create compressor rules. Once the compressors were created, we applied the compressors to the original datasets to generate the compressed data. We applied the sentiment analysis algorithms on the compressed data and recorded the test accuracy. In the following section we report on the change in accuracy between the compressed and original data. PARSEC evolved a population of 250 compressors over 100 generations, the crossover rate was 60% and mutation rate was 40%. V. R ESULTS AND C ONCLUSION Figure 2 shows the average change in test accuracy across the different methods based on the compression rates. The general trend is a decrease in performance with the largest decrease in performance observed by Sentiment140. LingPipe and SentiStrength were the only two methods that achieved a positive change in performance (on certain datasets) on −3 −4 Change in Test Accuracy (%) compressionRulesmax . The compressionRulesmax parameter prevents compressors from having an extremely large number of rules. Both parameters aid in restricting the search space in terms of the number of rules to create and maintain for each compressor during the evolutionary process. The initial population generation had to respect the LCB and UCB, and respect the minimum and maximum number of rules. The mutation operator also had to respect these constraints. −5 Method IN LP MC S140 SS ST uC V −6 −7 −8 −9 −10 −11 −12 −13 −14 −15 20 40 60 Compression Rate (%) Fig. 2. Change in average test accuracy across the different sentiment analysis algorithms for different text compression rates enforced by PARSEC, averaged across all the data sets. A higher positive value indicates a better result. The various sentiment analysis technologies are denoted as follows: IN, LP, MC, S140, SS, ST, uC and V refer to Intellexer, LingPipe, MeaningCloud, Sentiment140, SentiStrength, Stanford, uClassify and Vivek respectively. The accuracy obtained by LingPipe outperformed all the other methods. Furthermore, LingPipe obtained an average positive change in accuracy of 0.1% for 10% compression. At a compression rate of 50%, LingPipe obtained an change in accuracy of -1.2% averaged over all the datasets, illustrating that it works well with PARSEC. For a threshold of -2%, five algorithms could achieve up to 30% compression rate and LingPipe was able to achieve up to 50% compression. When the threshold is set to -3% four methods could achieve up to 50% compression. We additionally wanted to determine the change in test accuracy when a much larger compression rate was used. Table II presents the results when a compression rate of 75% was used. Only certain algorithms were tested due to our limited access to the sentiment analysis algorithms. These results reveal that a large compression rate is achievable without a great loss in test accuracy: LingPipe obtained a loss of -3.3% accuracy. An example of PARSEC compression is as follows. The original sentence (which contains 56 words and is already stemmed): “this be a wonderful movie involve fascinating people who be such great actor and actress. the event be interesting and I never get tire of watch the episode. I be so sad to see that they be not go to keep go with the life of all these inhabitant of Lark rise and candleford. Mrs. Hamlin”. The compressed sentence (22 words): “this be wonderful movie involve fascinating people who actress. get tire. so sad to see not keep go rise candleford. Mrs. Hamlin”. TABLE II AVERAGE CHANGE IN TEST ACCURACY (%) ACROSS ALL THE DATA SETS WHEN PARSEC MODELS WERE CREATED FOR 75% COMPRESSION RATE . Algorithm LingPipe MeaningCloud SentiStrength uClassify Change in Test Accuracy -3.2 -4.2 -6.9 -6.4 Original Accuracy 79.7 62.5 67.8 80.7 Compressed Accuracy 76.4 58.2 60.8 74.3 Below are four rules which were randomly selected from a PARSEC model to illustrate some of the evolved rules. This model had a total of 38 rules. The POS tags are presented in order of appearance between square brackets. The indices start from zero. Rule 1 denotes that if the POS “NNP” is followed by “JJ”, then delete both words. Rule 4 denotes that if “IN” is followed by any POS and then followed by “VB”, then delete the word at index 1. • Rule 1: [NNP, JJ]. Number of decisions: 2. Decisions: [0, 1] • Rule 2: [VBG, NNP]. Number of decisions: 2. Decisions: [0, 1] • Rule 3: [IN, CC]. Number of decisions: 2. Decisions: [0, 1] • Rule 4: [IN, *, VB]. Number of decisions: 1. Decisions: [1] This study empirically demonstrates that machine learning can reduce the amount of data needed to determine the sentiments within sentences with little loss in accuracy. To achieve this, we proposed an evolutionary algorithm, PARSEC, which evolves a population of chromosomes which encode rules for compression based on the removal of POS. We studied the test accuracies achieved by the eight algorithms when set compression rate thresholds were enforced. Two algorithms showed marginal improvements in accuracy on several data sets for a compression rate of 15%. Additionally, there were 9 data sets whereby some of the algorithms were able to yield an improvement in accuracy for a compression rate of 30%. At a threshold of -1% sentiment accuracy loss, two methods were able to achieve up to 30% compression, five methods up to 20% compression, and six methods up to 10% compression. The best performing algorithm, LingPipe, showed only modest losses in accuracy even at high compression: 3.3% for a four-fold data compression. It would be of interest to incorporate the PARSEC algorithm directly into a sentiment analysis algorithm instead of via a simple dictionary approach. One could achieve this by replacing the fitness function used in the evolutionary phase with a more sophisticated sentiment analysis algorithm. This would allow the emergence of an algorithm where the compression and sentiment analysis are mutually optimised for best performance. ACKNOWLEDGMENT The financial assistance of the National Research Foundation (NRF) towards this research is hereby acknowledged. Opinions expressed and conclusions arrived at, are those of the authors and are not necessarily to be attributed to the NRF. R EFERENCES [1] B. Pang and L. Lee, “Opinion mining and sentiment analysis,” Found. Trends Inf. Retr., vol. 2, no. 1-2, pp. 1–135, Jan. 2008. [2] B. Liu, Sentiment Analysis: Mining Opinions, Sentiments, and Emotions. Cambridge University Press, 2015. [3] K. Ravi and V. Ravi, “A survey on opinion mining and sentiment analysis,” Know.-Based Syst., vol. 89, no. C, pp. 14–46, Nov. 2015. [4] A. E. Eiben and J. E. Smith, Introduction to Evolutionary Computing. SpringerVerlag, 2003. [5] X. Yu and M. Gen, Introduction to Evolutionary Algorithms. Springer Publishing Company, Incorporated, 2012. [6] S. Feng, D. Wang, G. Yu, B. Li, and K.-F. Wong, A Chinese Sentence Compression Method for Opinion Mining. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 320–329. [7] W. Che, Y. Zhao, H. Guo, Z. Su, and T. Liu, “Sentence compression for aspect-based sentiment analysis,” IEEE/ACM Trans. Audio, Speech and Lang. Proc., vol. 23, no. 12, pp. 2111–2124, Dec. 2015. [8] T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient estimation of word representations in vector space,” arXiv preprint arXiv:1301.3781, 2013. [9] K. Toutanova, D. Klein, C. D. Manning, and Y. Singer, “Featurerich part-of-speech tagging with a cyclic dependency network,” in Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology - Volume 1, ser. NAACL ’03. Stroudsburg, PA, USA: Association for Computational Linguistics, 2003, pp. 173–180. [10] M. P. Marcus, M. A. Marcinkiewicz, and B. Santorini, “Building a large annotated corpus of english: The penn treebank,” Comput. Linguist., vol. 19, no. 2, pp. 313–330, Jun. 1993. [11] A. Taylor, M. Marcus, and B. Santorini, Treebanks: Building and Using Parsed Corpora. Dordrecht: Springer Netherlands, 2003, ch. The Penn Treebank: An Overview, pp. 5–22. [12] J. Leskovec and A. Krevl, “SNAP Datasets: Stanford large network dataset collection,” http://snap.stanford.edu/data, Jun. 2014. [13] J. McAuley, R. Pandey, and J. Leskovec, “Inferring networks of substitutable and complementary products,” in Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ser. KDD ’15. New York, NY, USA: ACM, 2015, pp. 785–794. [14] M. Thelwall, K. Buckley, G. Paltoglou, D. Cai, and A. Kappas, “Sentiment in short strength detection informal text,” J. Am. Soc. Inf. Sci. Technol., vol. 61, no. 12, pp. 2544–2558, Dec. 2010. [15] M. Thelwall, K. Buckley, and G. Paltoglou, “Sentiment strength detection for the social web,” J. Am. Soc. Inf. Sci. Technol., vol. 63, no. 1, pp. 163–173, Jan. 2012. [16] MeaningCloud, “Meaningcloud is a brand by meaningcloud llc, a s—ngular company.” https://www.meaningcloud.com/, 2015. [17] V. Narayanan, I. Arora, and A. Bhatia, “Fast and accurate sentiment classification using an enhanced naive bayes model,” in Proceedings of the 14th International Conference on Intelligent Data Engineering and Automated Learning — IDEAL 2013 - Volume 8206, ser. IDEAL 2013. New York, NY, USA: Springer-Verlag New York, Inc., 2013, pp. 194–201. [18] R. Socher, A. Perelygin, J. Y. Wu, J. Chuang, C. D. Manning, A. Y. Ng, and C. Potts, “Recursive deep models for semantic compositionality over a sentiment treebank,” in Proceedings of the conference on empirical methods in natural language processing (EMNLP), 2013, pp. 1631– 1642. [19] uClassify, “uclassify,” https://www.uclassify.com/, 2008. [20] A. Go, R. Bhayani, and L. Huang, “Twitter sentiment classification using distant supervision,” Technical report, Stanford, 2009. [21] EffectiveSoft, “Intellexer,” http://www.intellexer.com/, 2000. [22] Alias-i., “Lingpipe 4.1.0,” http://alias-i.com/lingpipe, 2008. A PPENDIX Tables III to VIII present the difference in test accuracy results for the various compression rates. The various sentiment analysis algorithms are abbreviated as follows: IN, LP, MC, S140, SS, ST, uC and V refer to Intellexer, LingPipe, MeainingCloud, Sentiment140, SentiStrength, Stanford, uClassify and Vivek respectively. For a compression rate of 10%, the best and worst change in accuracy were obtained by LingPipe and Sentiment140 respectively. Based on all the findings for 10 per cent compression, there were 21 cases across all the methods and data sets whereby the change in accuracy was greater than zero. For a compression rate of 15% the number of cases was 17 whereby LingPipe obtained the best average change in accuracy with a value of 0.0%. The best change in accuracy for 20% compression rate was obtained by uClassify with a value of 0.7 on two data sets. There were six data sets for which uClassify reduced the data up to 20% and for which the test accuracy on the compressed data was better than on the original data. Additionally, there were 14 cases in total across all the algorithms whereby the change in accuracy was greater than zero for 20% compression. The findings revealed that a for the compression rate of 25% there were 14 cases for which the change was greater than zero, and the best change in average accuracy was obtained once again by LingPipe with a value of -0.3%. There was a reduction performance in terms of the number of cases having a change greater than zero when a compression of 30% was used; notably 9 cases. uClassify however, on 5 datasets, had a test accuracy greater than zero. Finally, only two algorithms were able to obtain improvements in terms of the changes for a compression rate of 50%, namely uClassify and LingPipe, with changes in 3 and 2 data sets respectively. AIV MI Digital Music Baby Patio & Garden Automotive Pet Supplies Apps for Android Beauty Tools & Home Toys & Games Health & Personal Average IN -0.9 0.1 -1.0 LP -0.0 0.3 0.2 MC 0.4 -0.7 -0.3 S140 -2.1 -1.9 -2.5 SS -0.3 -0.4 -0.1 ST -3.0 0.5 -1.9 uC -1.9 -0.4 -0.4 V -0.9 -1.4 -2.0 0.0 -0.1 0.4 0.4 -0.2 -0.2 -2.7 -2.1 0.0 -0.2 -1.2 -0.7 0.3 0.9 0.2 -0.9 -1.1 -1.2 0.4 0.3 -0.5 -0.4 -2.1 -2.9 0.0 -0.4 -1.1 0.3 0.7 0.0 -0.9 -1.6 -1.4 0.0 -0.5 -2.5 -0.3 -3.5 0.0 -1.6 -0.5 0.8 0.0 -0.1 0.2 -1.0 -1.2 -2.3 0.0 -0.6 -0.5 -1.7 -0.7 0.5 -0.4 0.0 -0.5 0.0 -1.5 -1.8 0.2 -3.1 -0.1 -1.4 0.4 0.1 -0.4 -1.6 -0.3 -1.4 0.5 -0.4 -0.4 0.1 -0.4 -2.1 TABLE III -0.2 -1.4 0.0 -0.9 D IFFERENCE BETWEEN THE COMPRESSED AND ORIGINAL TEST ACCURACY WHEN A COMPRESSION RATE BETWEEN 10% AND 13% WAS IMPOSED . AIV MI Digital Music Baby Patio & Garden Automotive Pet Supplies Apps for Android Beauty Tools & Home Toys & Games Health & Personal Average IN -1.1 1.1 -1.6 LP -1.1 0.5 0.4 MC -0.2 -0.8 -0.7 S140 -2.7 -2.9 -3.6 SS 0.1 -0.8 -0.5 ST -3.2 0.0 -2.3 uC -2.0 -1.3 -1.2 V -0.6 -0.8 -2.1 0.0 -0.3 -0.9 -0.4 -0.5 -0.3 -2.4 -3.5 0.2 -0.6 -2.0 -1.2 0.6 0.5 -0.1 -1.0 -1.4 -1.1 0.6 0.6 -1.0 -0.2 -2.8 -3.8 -0.3 -0.6 -2.2 -1.3 0.9 0.2 -0.8 -2.9 -1.7 -0.3 -0.9 -4.2 -0.5 -3.4 -1.0 -3.2 -0.9 -0.2 -0.3 0.0 -0.7 0.0 -3.5 -3.0 -0.2 -0.3 -1.3 -1.7 -1.8 1.2 -1.2 0.7 -1.3 -0.2 -1.2 -1.6 -0.1 -1.1 -0.8 -1.8 0.1 0.0 -0.6 -2.8 -0.5 -2.6 0.2 -0.4 -0.7 0.0 -0.6 -3.0 TABLE IV -0.3 -1.8 -0.3 -1.2 D IFFERENCE BETWEEN THE COMPRESSED AND ORIGINAL TEST ACCURACY WHEN A COMPRESSION RATE BETWEEN 15% AND 18% WAS IMPOSED . AIV MI Digital Music Baby Patio & Garden Automotive Pet Supplies Apps for Android Beauty Tools & Home Toys & Games Health & Personal Average IN -1.7 0.2 -2.2 -0.7 -0.9 -1.6 -1.0 -1.7 -1.1 0.6 -1.5 0.0 -0.9 LP -1.2 1.1 -0.4 -0.4 -1.1 0.2 0.4 -0.1 0.2 -0.1 0.0 -0.4 -0.1 MC S140 0.3 -4.0 -1.1 -2.5 -0.2 -3.5 -0.4 -2.7 -1.2 -3.7 -0.3 -3.5 -1.3 -3.5 -1.6 -4.8 -0.6 -4.0 -1.2 -4.4 -0.4 -3.3 -1.0 -4.2 -0.7 -3.7 TABLE V SS -0.4 -0.6 -1.2 -0.8 -0.5 -0.9 -0.4 -0.4 -1.0 -0.7 -0.2 -1.2 -0.7 ST -3.1 0.4 -3.1 -2.2 -2.2 -2.8 -2.1 -4.5 -1.1 -1.9 -2.8 -1.7 -2.2 uC -1.8 -1.2 -1.7 0.5 0.5 0.3 0.7 -1.7 -1.2 0.0 -1.5 0.7 -0.5 V -1.8 -1.4 -2.0 -1.1 -0.9 -1.7 -2.2 -3.3 -1.2 -1.5 -1.9 -0.9 -1.6 D IFFERENCE BETWEEN THE COMPRESSED AND ORIGINAL TEST ACCURACY WHEN A COMPRESSION RATE BETWEEN 20% AND 23% WAS IMPOSED . AIV MI Digital Music Baby Patio & Garden Automotive Pet Supplies Apps for Android Beauty Tools & Home Toys & Games Health & Personal Average IN -2.4 -0.6 -1.9 0.1 -0.9 -2.0 -0.8 -2.4 -1.1 -0.8 -1.2 0.3 -1.1 LP -1.6 1.0 -0.1 -0.9 -1.4 0.1 0.0 -0.4 0.2 -1.0 -0.5 0.9 -0.3 MC S140 -0.6 -3.7 -0.1 -4.8 -0.5 25.1 0.5 -4.4 0.1 -4.7 0.1 -3.3 -0.7 -5.3 -1.4 -6.7 -0.7 -5.5 -1.6 -5.2 -1.1 -5.7 0.0 -3.9 -0.5 -2.3 TABLE VI SS -0.2 -1.0 -0.5 -0.5 -0.9 -1.5 -0.6 -0.9 -0.6 -1.1 -0.2 -0.3 -0.7 ST -6.0 -1.6 -2.4 -2.6 -1.5 -4.2 -1.7 -3.4 -2.1 -3.6 -2.7 -2.8 -2.9 uC -2.5 -0.1 -2.9 -0.4 0.6 0.5 0.1 -0.9 -1.8 0.0 -1.0 -0.9 -0.7 V -2.0 -1.8 -3.5 -0.6 -1.6 -0.4 -2.9 -3.4 -2.4 -0.3 -3.6 -1.1 -1.9 D IFFERENCE BETWEEN THE COMPRESSED AND ORIGINAL TEST ACCURACY WHEN A COMPRESSION RATE BETWEEN 25% AND 28% WAS IMPOSED . AIV MI Digital Music Baby Patio & Garden Automotive Pet Supplies Apps for Android Beauty Tools & Home Toys & Games Health & Personal Average IN -2.3 -0.5 -3.3 -0.8 -1.8 -1.2 -2.2 -3.0 -2.4 -0.9 -2.2 -0.6 -1.8 LP -2.1 0.6 -1.1 -0.7 -1.2 -0.4 -0.9 0.0 -0.2 0.0 0.0 -0.3 -0.5 MC -0.1 -1.1 -1.0 0.2 -1.7 -0.9 -1.1 -2.1 -1.1 -1.3 -1.6 -0.60 -1.0 TABLE S140 -8.2 -6.9 -6.2 -6.1 -6.6 -4.8 -5.8 -7.7 -7.7 -5.9 -6.0 -6.10 -6.5 VII SS -1.3 -1.6 -1.7 -1.1 -1.5 -1.5 -1.0 -1.1 -1.2 -1.5 -0.2 -0.70 -1.2 ST -7.0 -2.4 -3.6 -5.3 -4.3 -4.7 -4.4 -6.4 -4.6 -5.0 -5.0 -5.30 -4.8 uC -2.3 -1.9 -2.8 0.7 -0.3 0.8 1.6 -2.1 -1.9 0.4 -0.7 0.70 -0.6 V -2.5 -2.8 -4.9 -1.3 -2.2 -2.6 -2.8 -5.3 -3.2 -1.1 -3.0 -2.00 -2.8 D IFFERENCE BETWEEN THE COMPRESSED AND ORIGINAL TEST ACCURACY WHEN A COMPRESSION RATE BETWEEN 30% AND 33% WAS IMPOSED . AIV MI Digital Music Baby Patio & Garden Automotive Pet Supplies Apps for Android Beauty Tools & Home Toys & Games Health & Personal Average IN -5.8 -1.9 -5.5 -1.4 -3.8 -3.7 -1.8 -6.2 -3.0 -2.2 -4.8 -2.2 -3.5 LP -4.2 0.8 -1.3 -1.4 -1.8 -2.4 -1.6 -1.6 -0.1 0.1 -1.2 -0.2 -1.2 MC -1.8 -0.9 -1.9 -1.7 -2.1 -1.9 -2.2 -4.8 -1.8 -2.2 -2.0 -2.0 -2.1 TABLE S140 -15.6 -15.1 -15.3 -12.4 -13.9 -12.6 -14.9 -17.1 -15.3 -14.3 -12.7 -12.1 -14.3 VIII SS -3.4 -2.6 -3.5 -2.4 -2.5 -2.8 -2.5 -4.4 -3.0 -3.6 -1.8 -2.2 -2.9 ST -13.2 -6.9 -9.9 -11.2 -10.1 -7.9 -8.0 -12.4 -8.7 -9.5 -10.1 -10.1 -9.8 uC -7.8 -3.9 -5.5 -1.5 -0.5 0.1 0.6 -4.3 -4.1 1.0 -4.3 -1.1 -2.6 V -8.2 -7.6 -9.0 -5.6 -4.7 -4.6 -6.2 -11.0 -7.8 -4.9 -7.2 -5.0 -6.8 D IFFERENCE BETWEEN THE COMPRESSED AND ORIGINAL TEST ACCURACY WHEN A COMPRESSION RATE BETWEEN 50% AND 53% WAS IMPOSED .
9cs.NE
Resilient Distributed State Estimation for LTI Systems ⋆ Aritra Mitra and Shreyas Sundaram a arXiv:1802.09651v1 [cs.SY] 27 Feb 2018 a School of Electrical and Computer Engineering at Purdue University, West Lafayette, IN 47907, USA Abstract Consider a linear time-invariant (LTI) dynamical system monitored by a network of sensors, modeled as nodes of an underlying directed communication graph. We study the problem of collaboratively estimating the state of the system when certain nodes are compromised by adversarial attacks. Specifically, we consider a Byzantine adversary model, where a compromised node possesses complete knowledge of the system dynamics and the network, and can deviate arbitrarily from the rules of any prescribed algorithm. We first characterize certain fundamental limitations of any distributed state estimation algorithm in terms of the measurement and communication structure of the nodes. We then develop an attack-resilient, provably correct state estimation algorithm that admits a fully distributed implementation. To characterize feasible network topologies that guarantee success of our proposed technique, we introduce a notion of ‘strong-robustness’ that captures both measurement and communication redundancy. Finally, by drawing connections to bootstrap percolation theory, we argue that given an LTI system and an associated sensor network, the ‘strong-robustness’ property can be checked in polynomial time. Key words: Resilient state estimation; distributed estimation; Byzantine attacks. 1 Introduction The control of large-scale complex networked systems such as power grids, transportation networks, water and gas distribution networks, and multi-agent robotic systems requires precise estimation of the state of the underlying dynamical process. Typically, in these applications, sensors (nodes) collecting information about the process are scattered over a geographical network. As the diameter of such networks increase, routing information from all the sensors to a central computational resource induces large delays and creates communication bottlenecks. To bypass these difficulties, it thus becomes important to consider distributed algorithms where individual sensors communicate only with sensors within a physical proximity. However, the potential merits [1] of such a distributed approach are matched by various challenges. In particular, a key challenge is to design networks and distributed algorithms that guarantee reliable operation of the system in the face of faults or sophisticated adversarial attacks on certain sensors. This leads ⋆ This paper was not presented at any IFAC meeting. This research was supported in part by NSF CAREER award 1653648. Corresponding author: Shreyas Sundaram. Telephone of the corresponding author: 1-(765)-496-0406. Email addresses: [email protected], [email protected] (Aritra Mitra and Shreyas Sundaram). Preprint submitted to Automatica to the motivation behind our present work. In a classical distributed state estimation setup, each node receives partial measurements of the state of an LTI process, and seeks to asymptotically estimate the entire state by exchanging information with its neighbors in the network. Given that our primary focus will be on security related issues associated with this problem, we direct the interested reader to recent work on singletime-scale distributed observers in [2–6] that make minimal system-theoretic and graph-theoretic assumptions. For literature on distributed Kalman filtering, see [7–9]. However, none of these papers address the challenges associated with tolerating unreliable components in the network. Accordingly, we now provide a survey of the cyber-security literature that is most relevant to our present cause. Related Work: Over the last decade, a significant amount of research has focused on security in networked control systems. In particular, for noiseless dynamical systems, it has been established that zero-dynamics plays a key role in characterizing the stealth of an attack [10, 11]. For networked control systems affected by noise, the authors in [12] recently introduced an information-theoretic metric that quantifies the detectability of an attack. An unifying feature of these works, and the ones in [13–15], is that they involve systems where all the sensor measurements are avail- 28 February 2018 conditions are met. A thorough analysis of the proposed filtering scheme is then presented in Section 5. able at a single location. In the sequel, we shall refer to such systems as centralized control systems. Our problem formulation and subsequent analysis differs from the above literature by constraining each sensor to exchange information with only its neighbors in the communication graph. As our third contribution, in Section 7, we introduce a topological property called ‘strong-robustness’ to characterize feasible systems and networks for which our proposed approach is guaranteed to work. By drawing connections to bootstrap percolation theory, we show that the ‘strong-robustness’ property can be checked in polynomial time (in the size of the system and the network). While the study of security in centralized control systems is now mature, there lacks a comprehensive theoretical understanding of analogous questions in a distributed setting. Preliminary attempts to counter adversarial behavior in a distributed state estimation context are reported in [16], [17]. However, unlike our results, these papers neither provide any theoretical guarantees of success, nor allude to graph-theoretic conditions that are necessary for their respective algorithms to work. Recently, in [18], the authors employ an H∞ based approach for detecting biasing attacks in distributed estimation networks. Our present work deviates from [18] in several aspects, namely (i) while the analysis in [18] is limited to a certain class of attack inputs, our attack model allows compromised nodes to behave arbitrarily, i.e., no restrictions are placed on the inputs that can be injected by an adversary, (ii) unlike [18], we develop a filtering algorithm that allows each uncompromised node to asymptotically recover the state of the plant without explicitly detecting which nodes are under attack, and (iii) the existence of the attack detection filter proposed in [18] relies on solving an LMI; however, the authors neither provide graph-theoretic insights regarding the solvability of such an LMI nor discuss whether the LMI can be solved in a distributed manner. In contrast, we detail graph-theoretic conditions that allow each step of our approach to have a resilient, distributed implementation. Summarily, this paper attempts to bridge the gap between centralized and distributed resilient state estimation. In this context, our contributions are as follows. We reported certain preliminary developments in [21]. In this paper, we significantly expand upon our prior results in the following ways. (i) While the analysis in [21] was limited to system matrices with real, distinct eigenvalues, our present framework allows the system matrix to have arbitrary spectrum. (ii) Section 3 is a new addition entirely, and discusses fundamental limitations of any distributed state estimation algorithm in the face of arbitrary adversarial attacks. (iii) Section 7 contains additional details about properties of feasible network topologies and discusses the applicability of our proposed approach. Notation: A directed graph is denoted by G = (V, E), where V = {1, · · · , N } is the set of nodes and E ⊆ V × V represents the edges. An edge from node j to node i, denoted by (j, i), implies that node j can transmit information to node i. The neighborhood of the i-th node is defined as Ni , {j | (j, i) ∈ E}. A node j is said to be an out-going neighbor of node i if (i, j) ∈ E. By an induced subgraph of G obtained by removing certain nodes C ⊂ V, we refer to the subgraph that has V \ C as its node set and contains only those edges of E with both end points in V \C. The notation |V| is used to denote the cardinality of a set V. The set of all eigenvalues (or modes) of a matrix A is denoted by sp(A) = {λ ∈ C | det(A− λI) = 0}, and the set of all unstable eigenvalues by ΛU (A) = {λ ∈ sp(A) | |λ| ≥ 1}. We use aA (λ) and gA (λ) to denote the algebraic and geometric multiplicities, respectively, of an eigenvalue λ ∈ sp(A). An eigenvalue λ is said to be simple if aA (λ) = gA (λ) = 1. Given a set of matrices {A1 , · · · , An }, we use diag(A1 , · · · , An ) to refer to a block diagonal matrix with Ai as its i-th block entry. For a set J = {m1 , · · · , m|J | } ⊆ {1, · · · , N }, h iT and a matrix C = CT1 · · · CTN , we define CJ , h iT CTm1 · · · CTm|J | . The identity matrix of dimension r is denoted Ir , and N+ is used to refer to the set of all positive integers. The terms ‘communication graph’ and ‘network’ are used interchangeably. Throughout this paper, we shall use the term ‘resilient’ in the same context as that used traditionally in the computer science literature to deal with worst-case adversarial attack models [22] (a formal definition of such a model is provided in the next section). Contributions: Our contributions are threefold. First, in Section 3, we characterize certain necessary conditions that need to be satisfied by the sensor measurements and the communication graph for the distributed state estimation problem to be solvable in the presence of arbitrary adversarial behavior. Our results hold for any algorithm and hence identify fundamental limitations that are of both theoretical and practical importance in the design of attack-resilient robust networks. We also argue that our impossibility results in the distributed setting generalize those existing for centralized control systems subject to sensor attacks [19, 20]. For the problem under consideration, it is imperative to understand which (potentially adversarial) neighbors a given node should listen to, and subsequently, how it should process the information received from neighbors it chooses to listen to. Consequently, our second contribution is to develop a distributed filtering algorithm in Section 4 that enables each uncompromised node to recover the entire state dynamics, provided certain graph 2 2 Definition 2 (f -local set) A set C ⊂ V is f -local if it contains at most f nodes in the neighborhood of the other nodes, i.e., |Ni ∩ C| ≤ f, ∀i ∈ V \ C. System and Attack Model System Model: Consider the LTI dynamical system x[k + 1] = Ax[k], (1) Definition 3 (f -local and f -total adversarial models) A set A of adversarial nodes is f -locally bounded (resp., f -totally bounded) if A is an f -local (resp., f total) set. where k ∈ N is the discrete-time index, x[k] ∈ Rn is the state vector and A ∈ Rn×n is the system matrix. The system is monitored by a network G = (V, E) consisting of N nodes. The i-th node receives a measurement of the state, given by yi [k] = Ci x[k], (2) ri ×n ri . We use C = where yi [k] ∈ R and Ci ∈ R h iT T T to represent the collection of the C1 · · · CN individual node observation matrices; accordingly, h iT T y[k] = y1T [k] · · · yN represents the cumulative [k] In the literature dealing with distributed fault-tolerant algorithms, it is a common assumption to consider an f -total adversarial model. However, to allow for a large number of adversaries in large scale networks, we will allow the adversarial set to be f -local. Summarily, the adversary model considered throughout this paper will be referred to as an f -locally bounded Byzantine adversary model. The non-adversarial nodes will be referred to as regular nodes and be represented by the set R = V \ A. Finally, note that the actual number and identities of the adversarial nodes are not known to the regular nodes; only the upper bound f (on the total number of adversarial nodes in the neighborhood) is known. measurement vector, i.e., y[k] = Cx[k]. Each node is tasked with estimating the entire system state x[k] based on information received from its neighbors and its local measurements (if any). As such, we assume that the pair (A, C) is detectable (this is a necessary condition for solving the distributed state estimation problem even in the absence of adversaries); however, we do not assume that the pair (A, Ci ) is detectable for any i ∈ V. Two immediate challenges are as follows: (i) As the pair (A, Ci ) may not be detectable for some (or all) i ∈ {1, · · · , N }, information exchange is necessary; and (ii) information exchange is restricted by the underlying communication graph G. In addition to the above challenges, in this paper, we allow for the possibility that certain nodes in the network are compromised by an adversary, and do not follow their prescribed state estimate update rule. We will use the following adversary model in this paper. Throughout this paper, we shall consider causal, deterministic algorithms; note however that the notions of causal and deterministic behavior apply only to the regular nodes. With x̂i [k] representing the estimate of x[k] maintained by node i, the problem studied in this paper can be formally stated as follows. Problem 1 (Resilient Distributed State Estimation Problem) Given an LTI system (1), a linear measurement model (2), and a time-invariant directed communication graph G, design a set of state estimate update and information exchange rules such that limk→∞ ||x̂i [k] − x[k]|| = 0, ∀i ∈ R, regardless of the actions of any f -locally bounded set of Byzantine adversaries. Adversary Model: We consider a subset A ⊂ V of the nodes in the network to be adversarial. We assume that the adversarial nodes are completely aware of the network topology, the system dynamics and the algorithm employed by the non-adversarial nodes. In terms of capabilities, an adversarial node can leverage the aforementioned information to arbitrarily deviate from the rules of any prescribed algorithm, while colluding with other adversaries in the process. Furthermore, following the Byzantine fault model [22], adversaries are allowed to send differing state estimates to different neighbors at the same instant of time. This assumption of omniscient adversarial behavior is standard in the literature on resilient and secure distributed algorithms [23–26], and allows us to provide guarantees against “worst-case” adversarial behavior. To characterize the threat model in terms of the number of adversaries in the network, we will use the following definitions from [27], [28]. The interplay between the measurement structure of the nodes and the underlying communication graph results in certain conditions being necessary for solving Problem 1, irrespective of the choice of algorithm. We provide such conditions in the following section. 3 Fundamental Limitations of any Distributed State Estimation Algorithm Intuitively, the network must possess a certain degree of measurement redundancy as well as redundancy in its communication structure so as to counter the effect of adversarial behavior. More specifically, the measurements of the regular nodes must ensure global detectability of the state, and the network structure should prevent the malicious nodes from acting as bottlenecks between correctly functioning nodes. To identify necessary conditions for resilient distributed state estimation that Definition 1 (f -total set) A set C ⊂ V is f -total if it contains at most f nodes in the network, i.e., |C| ≤ f . 3 Execution σ: The initial condition is x[0] = 0. The nodes in H1 are regular while the nodes in H2 are adversarial. The nodes in H2 pretend that their state estimates are x̂H2 [k] and that their measurements are CH2 Ak η, where x̂H2 [k] represents the collection of the state estimates maintained by the nodes in H2 during the execution σ ′ of T . Additionally, at each time-step, the nodes in H2 perform the exact same actions that they perform during the execution σ ′ . capture the above notions of redundancy, we first introduce some terminology. Definition 4 (Critical Set) A set of nodes F ⊂ V is said to be a critical set if the pair (A, CV\F ) is not detectable. Note that detectability of (A, C) implies that a critical set must necessarily be non-empty. Execution σ ′ : The initial condition is x[0] = η. The nodes in H2 are regular while the nodes in H1 are adversarial. The nodes in H1 pretend that their state estimates are x̂H1 [k] and that their measurements are zero, where x̂H1 [k] represents the collection of the state estimates maintained by the nodes in H1 during the execution σ of T . Additionally, at each time-step, the nodes in H1 perform the exact same actions that they perform during the execution σ. Definition 5 (Minimal Critical Set) A set F ⊂ V is said to be a minimal critical set if F is a critical set and no subset of F is a critical set. Let M = {F1 , · · · , F|M| } denote the set of all minimal critical sets. With each set Fi ∈ M, we associate a virtual node si as follows. Directed edges are added from si to each node in Fi and the resulting network is denoted ′ by Gi = (V ∪ si , E ∪ Ei ), where Ei represents the set of edges from si to Fi . Since the actions of the adversaries in the two executions described above are coupled, it becomes important to establish that such actions are in fact well-defined. To do so, we argue as follows. Consider the actions of the adversarial set H2 at time k = 0 of execution σ. Due to their omniscient nature, these adversaries can anticipate the information that a regular set H2 is supposed to transmit at time k = 0 of execution σ ′ based on algorithm T . Thus, their actions are well-defined at time k = 0. An identical argument defines the actions of the adversarial set H1 at time k = 0 of execution σ ′ . Since the actions of both the sets H1 and H2 at time k = 0 are well-defined in each of the executions σ and σ ′ , the response of the regular nodes to such actions (in the respective executions) at time k = 1 can be anticipated by any adversarial set. Specifically, to generate their actions at time k = 1 of execution σ (resp., execution σ ′ ), the adversarial set H2 (resp., H1 ) simply simulates execution σ ′ (resp., execution σ) for time k = 0 to figure out how a regular set H2 (resp., H1 ) would act at time k = 1 of execution σ ′ (resp., execution σ). Repeating the above argument reveals that the actions of the respective adversarial sets in each of the executions σ and σ ′ are well-defined at every time step. Definition 6 (f -local pair and f -total pair cuts w.r.t. si ) Consider a minimal critical set Fi ∈ M. A set H ⊂ V is called a cut w.r.t. si if removal of H from ′ ′ Gi results in an induced subgraph of Gi whose node set can be partitioned into two non-empty sets X and Y with si ∈ X , and no directed paths from X to Y in the induced subgraph. A cut H w.r.t. si is called an f -local pair cut (resp., f -total pair cut) w.r.t. si if it can be partitioned as H = H1 ∪ H2 such that both H1 and H2 are f -local (resp., f -total) in G. The following result identifies a fundamental limitation for f -local adversarial models. Theorem 1 If there exists an f -local pair cut w.r.t. si ′ in Gi for some minimal critical set Fi ∈ M, then it is impossible for any algorithm to solve Problem 1. PROOF. Suppose there exists an f -local pair cut H = H1 ∪ H2 w.r.t. si for some minimal critical set Fi ∈ M. For the sake of contradiction, suppose there exists an algorithm T that solves Problem 1 for the given network G. From the definition of H, we see that Y contains no elements of Fi . Since Fi is a critical set, it then follows that the pair (A, CY ) is not detectable. Thus, there exists an initial condition x[0] = η that causes the measurement set yY [k] corresponding to Y to be identically zero for all time, while the state x[k] remains bounded away from zero. The idea of the proof will be to demonstrate that the nodes in Y cannot distinguish between the zero initial condition and the initial condition η under an appropriately constructed attack. To this end, noting that each of the sets H1 and H2 are f -local and can hence act as valid adversarial sets, we consider the following executions σ and σ ′ of T . Based on the attack described above, it is clear that the nodes in Y receive the same state estimate and measurement information from the nodes in H in each of the two executions. Further, their own measurements are identically zero for all time in each of the two executions. Hence, based on such identical information, it is impossible for the nodes in Y to resolve the difference in the underlying initial conditions via algorithm T . This leads to the desired contradiction and completes the proof. Remark 1 Interestingly, the necessary condition presented in the above theorem bears close resemblance to the necessary condition in [28] for resilient broadcasting subject to the same f -local Byzantine adversary model 4 of adversaries that can be tolerated when one seeks to solve Problem 1. Leveraging Theorem 2, we can provide an upper bound on this number, as follows. that we consider here. This similarity can be attributed to the following analogy: viewing the virtual nodes as originators of messages in a broadcasting context, Problem 1 can be interpreted as a version of the resilient broadcasting problem where the regular nodes are required to agree (asymptotically) on a time-varying message that captures the state evolution of the system. Corollary 1 Let k denote the smallest positive integer such that there exists a k-total pair cut w.r.t. si for some Fi ∈ M. Then, the total number of adversaries f must satisfy the inequality f < k for Problem 1 to have a solution. 1 Our next result provides a necessary condition for an f total (and hence, also an f -local) adversarial model. Corollary 2 The condition |Fi | ≥ (2f + 1) ∀Fi ∈ M is necessary for resilient distributed state estimation subject to the f -local or f -total adversarial model. Theorem 2 Suppose there exists an algorithm that solves the variant of Problem 1 corresponding to an f total Byzantine adversary model. Then, the following equivalent statements are true. The proof of the above result is straightforward and is hence omitted here. With the above corollary in hand, one can gain insights regarding the distribution of certain specific critical sets in the network. To do so, given (j) (j) an eigenvalue λj ∈ ΛU (A), let {ρ1 , · · · , ρgA (λj ) } represent a basis for the null space of (A − λj In ), and let (j) (j) φi = span{ρi }, i ∈ {1, · · · , gA (λj )}. We say that (j) (j) node i can detect the subspace φi if Ci ρi 6= 0. 2 Let (j) Wi ⊆ V denote the set of all nodes that can detect (j) φi . The next result then readily follows from Corollary 2 and the PBH test [31]. (i) Consider any minimal critical set Fi ∈ M. There exists no f -total pair cut w.r.t. si . (ii) Consider a node i ∈ V such that (A, Ci ) is not detectable. Let Xi denote the set of all nodes in G that have directed paths to node i, and consider a set Di ⊂ Xi such that |Di | ≤ 2f . Let Pi ⊂ Xi represent the set of nodes that have directed paths to node i in the induced subgraph obtained by removing Di from G. Then, (A, Ci∪Pi ) is detectable. The proof of necessity follows similar arguments as in Theorem 1, while the equivalence between the two conditions stated in Theorem 2 is established in Appendix A. We now compare our results with certain relevant existing conditions. (j) Proposition 1 For each λj ∈ ΛU (A), if Wi ⊂ V, (j) where 1 ≤ i ≤ gA (λj ), then |Wi | ≥ (2f + 1) is a necessary condition for resilient distributed state estimation subject to the f-local or f-total adversarial model. Remark 2 In [19, 20], the authors showed that for centralized systems subject to f sensor attacks, a necessary condition for estimating the state asymptotically is that the system should remain detectable after the removal of any 2f sensors. In our present distributed setting, the maximum information about the state that any given node i can hope to obtain is from the set {i ∪ Xi }, where Xi is defined as in Theorem 2. Thus, the second part of Theorem 2 generalizes the necessary conditions in [19, 20]. In [11, 29], the authors established that the graph-connectivity metric plays a pivotal role in the analysis of fault-tolerant and resilient distributed consensus algorithms for settings where there are no underlying state dynamics that need to be estimated. The results stated in Theorems 1 and 2 differ from those in [11, 29] since they blend both graph-theoretic and system-theoretic requirements. Finally, it can be easily shown that when there are no adversaries, i.e., when f = 0, the conditions identified in Theorem 2 reduce to the necessary and sufficient condition for distributed state estimation, namely every source component (strong components with no incoming edges) of the graph should be detectable [2–6]. For systems with distinct eigenvalues, a direct consequence of the above result is the requirement of at least (2f +1) nodes that can detect each unstable stable eigenvalue of the system. The preceding analysis builds up to the distributed estimation strategy adopted in this paper. In particular, our approach shall involve identifying the locally detectable and undetectable eigenvalues associated with a given node, and subsequently devising separate estimation strategies for the subspaces associated with such eigenvalues. We formalize this idea in the rest of the paper. Remark 3 Two important directions of future investigation are (i) finding an efficient algorithm (if one exists) for computing k in Corollary 1 either exactly or approximately, and (ii) determining whether the conditions stated in Theorem 1 (resp., Theorem 2) are sufficient for achieving resilient distributed state estimation subject to 1 Similar bounds for static power system models subject to attacks were obtained in [30]. 2 Throughout the paper, for the sake of conciseness, we use the terminology “node i i can detect eigenvalue λj ” to imply h A−λj In = n. Each stable eigenvalue is considthat rank Ci ered detectable w.r.t. to the measurements of every node. We now discuss certain implications of Theorem 2. Given an LTI system (1), a measurement model specified by (2), and a communication graph G, it is of both theoretical and practical interest to know the maximum number 5 Definition 7 (Source nodes) For each λj ∈ ΛU (A), the set of nodes that can detect λj is denoted by Sj , and called the set of source nodes for λj . an f -local (resp., f -total) Byzantine adversary model. We point out that the main source of computational complexity associated with the first point lies in finding all the minimal critical sets associated with the given system. 4 4.1 We now proceed to develop an estimation scheme that enables each regular node to estimate z[k] (from which (j) they can obtain x[k] = Tz[k]). Accordingly, let ẑi [k] denote the estimate of z(j) [k] (the portion of z[k] corresponding to the eigenvalue λj 3 ) maintained by node i ∈ R. For each λj ∈ ΛU (A), our estimation scheme relies on separate strategies for nodes in Sj and V \ Sj . In particular, each node in Sj employs a Luenberger observer for estimating z(j) [k]. The nodes in V \ Sj , on the other hand, cannot detect the eigenvalue λj , and thus rely on a resilient consensus algorithm to estimate z(j) [k]. In what follows, we discuss these ideas in detail. Resilient Distributed State Estimation Preliminaries For an eigenvalue λ ∈ sp(A), let V(λ) represent a block diagonal matrix with the Jordan blocks corresponding to λ (in the standard Jordan canonical representation of A) along the main block diagonal. We begin by recalling certain properties of the real Jordan canonical form of a square matrix that will be useful for our subsequent development [32]. We first note that if λ represents a non-real eigenvalue of A and λ̄ represents its complex-conjugate, then [32, Lemma 3.1.18] ensures that λ and λ̄ have the same Jordan structure. Next, let λ = a + ib" where # a, b ∈ R, and a b D(a, b) be defined as D(a, b) , . Then, the ma−b a trix diag(V(λ), V(λ̄)) is similar to a real block upper triangular matrix W(λ) ∈ R2aA (λ)×2aA (λ) which has aA (λ) 2-by-2 blocks D(a, b) on the main block diagonal and (aA (λ) − 1) blocks I2 on the block superdiagonal. Henceforth, for a non-real eigenvalue λ ∈ sp(A), W(λ) will have the meaning discussed above. Let sp(A) = {{λ1 , λ̄1 }, · · · , {λp , λ̄p }, λp+1 , · · · , λγ } with the first p pairs representing the non-real eigenvalues, and λp+1 to λγ representing the real eigenvalues of A. Then, the real Jordan canonical form theorem [32, Theorem 3.4.1.5] can be stated as follows. The first step in the estimation process involves the above common coordinate transformation given by z[k] = T−1 x[k], to be performed by each regular node of the graph. As this only requires knowledge of the system matrix A (which is assumed to be known by all the nodes), all of the nodes can do this in a distributed manner (e.g., by using an agreed-upon convention for ordering the eigenvalues and corresponding eigenvectors). Building on the general theme in [3], we first present a method that allows a regular node i ∈ R to estimate the locally detectable portion of the state z[k] without communicating with neighbors. To this end, consider the following result. Lemma 1 Let λj ∈ Oi be a non-real eigenvalue. Let (j) C̄i denote the columns of C̄i corresponding to W(λj ) (j) in (3). Then, the pair (W(λj ), C̄i ) is detectable. The proof of the above lemma follows readily from the PBH test and is hence omitted here. Let Oi = {{λn1 , λ̄n1 }, · · · , {λnpi , λ̄npi }, λnpi +1 , · · · , λnγi }, where the first pi pairs represent the non-real eigenvalues, and λnpi +1 to λnγi represent the real eigenvalues of A that are detectable w.r.t. the measurements of node i. Let MOi = diag(W(λn1 ), · · · , W(λnpi ), V(λnpi +1 ), · · · , V(λnγi )). Let COi represent the columns of C̄i corresponding to the matrix MOi and zOi [k] denote the portion of the state z[k] corresponding to the detectable eigenvalues of node i, i.e., corresponding to Oi . Based on Lemma 1, it is easy to see that the pair (MOi , COi ) is detectable. Thus, a standard Luenberger observer can be locally constructed by node i for estimating zOi [k]. The specifics of such a construction are straightforward, and are similar to those in Section VI-A of [4]. We thus Theorem 3 There exists a real similarity transformation matrix T that transforms the state transition matrix A in (1) to a real block diagonal matrix M given by M = diag(W(λ1 ), · · · , W(λp ), V(λp+1 ), · · · , V(λγ )). With T as in the above theorem, and z[k] = T−1 x[k], the dynamics (1) are transformed into the form z[k + 1] = Mz[k] yi [k] = C̄i z[k], ∀i ∈ {1, · · · , N } (3) where M = T−1 AT and C̄i = Ci T. For a non-real eigenvalue pair {λj , λ̄j } ∈ sp(A), let z(j) [k] ∈ R2aA (λj ) represent the portion of the state z[k] associated with the matrix W(λj ). Similarly, for a real eigenvalue λj ∈ sp(A), z(j) [k] ∈ RaA (λj ) is the portion of the state z[k] associated with the matrix V(λj ). For each node i, we denote the detectable and undetectable eigenvalues by the sets Oi and UO i , respectively. Next, we introduce the notion of source nodes. 3 Throughout the rest of the paper, the terminology “z(j) [k] corresponds to the eigenvalue λj ” should be interpreted as z(j) [k] corresponds to the eigenvalue pair {λj , λ̄j } for a nonreal eigenvalue λj ∈ sp(A). 6 (j) skip minor details and state the following result which shall be useful later on. in hand, node i updates ẑi [k] as follows: ( (j) V(λj )z̄i [k], if λj ∈ UO i is real (j) ẑi [k+1] = (j) W(λj )z̄i [k], if λj ∈ UO i is not real, (5) iT h (j) (jσj ) (j1) where z̄i [k] = z̄i [k], · · · , z̄i [k] , σj = aA (λj ) if λj ∈ UO i is real and σj = 2aA (λj ) if λj ∈ UO i is not real. Lemma 2 For each regular node i ∈ R and each λj ∈ Oi , a Luenberger observer can be locally constructed by (j) node i such that limk→∞ ||ẑi [k] − z(j) [k]|| = 0. Based on the previous result, we see that a regular node i can estimate certain portions of the state space without having to exchange information with neighbors. The challenge, however, lies in estimating the locally undetectable portion of the state in the presence of adversaries. The following section presents a resilient consensus based strategy to address this issue. 4.2 We refer to the above algorithm as the Local-Filtering based Resilient Estimation (LFRE) algorithm. For implementing this algorithm, a regular node i needs to con(j) struct the set Ni , ∀λj ∈ UOi , based on the relative positions of its neighbors (with respect to its own position) (j) in G. We will provide the exact definition of Ni , and a distributed algorithm for constructing such a set in the following sections where we analyze the convergence of the LFRE algorithm. We conclude this section by commenting on certain features of the LFRE algorithm. Local-Filtering Based Resilient Estimation For any λj ∈ sp(A), let z (jm) [k] denote the m-th com(jm) [k] denote the ponent of the vector z(j) [k], and let ẑi estimate of that component maintained by node i ∈ V. Consider an unstable eigenvalue λj ∈ UO i . For such an eigenvalue, node i has to rely on the information received from its neighbors, some of whom might be adversarial, in order to estimate z(j) [k]. To this end, we propose a resilient consensus algorithm that requires each regular node i ∈ V \ Sj to update its estimate of z(j) [k] using the following two stage filtering strategy: Remark 4 The rationale behind performing a real Jordan canonical decomposition at every node (as opposed to a standard Jordan transformation) is to ensure that the state estimates featuring in equations (4) and (5) are real at every time-step, thereby making the sorting operation performed in Step 1 of the algorithm meaningful. At any time-step, if a regular node i either receives a non(j) real estimate of z (jm) [k] from some node l ∈ Ni or does not receive an estimate at all, it would immediately identify node l as an adversarial node, and simply assign a 0 value to node l’s estimate of z (jm) [k]. Note that every (j) regular node in Ni will always transmit a real estimate to node i at every time-step. 1) At each time-step k, each regular node i collects the state estimates of z(j) [k] received from only those (j) neighbors that belong to a certain subset Ni ⊆ Ni (to be defined later). For every component m of z(j) [k], the estimates of z (jm) [k] received from nodes (j) in Ni are sorted from largest to smallest. 2) For each component m of z(j) [k], node i removes the largest and smallest f estimates (i.e., removes 2f esti(j) mates in all) of z (jm) [k] received from nodes in Ni , and computes the quantity: (jm) z̄i [k] = X (jm) wil (jm) [k]ẑl [k], Remark 5 The strategy of disregarding the most extreme values in one’s neighborhood, and using a convex combination of the rest for performing linear scalar updates, has been used for designing resilient distributed algorithms for consensus [23, 24, 33] and optimization [25, 26] problems. In this paper, we show that such algorithms can also be used for resilient distributed state estimation, with certain substantial differences arising from the fact that the nodes are trying to track the state of an external dynamical system. (4) (jm) l∈Mi [k] (jm) 5 (j) where Mi [k] ⊂ Ni (⊆ Ni ) is the set of nodes from which node i chooses to accept estimates of z (jm) [k] at time-step k, after removing the f largest and f (j) smallest estimates of z (jm) [k] from Ni . Node i as(jm) signs the weight wil [k] to the l-th node at the kth time-step for estimating the m-th component of z(j) [k]. The weights are nonnegative and chosen to satP (jm) isfy l∈M(jm) [k] wil [k] = 1, ∀λj ∈ UOi and for each i (jm) component m of z(j) [k]. With the quantities z̄i Analysis of the Resilient Distributed Estimation Strategy In this section, we provide our main result concerning the convergence of the LFRE algorithm. Let ΩU (A) , {λj ∈ ΛU (A)|V \Sj is non-empty}. By this definition, all nodes are source nodes for each eigenvalue in ΛU (A) \ ΩU (A), and are hence capable of recovering the corresponding portions of the state based on locally constructed Luenberger observers (as discussed in Section 4.1). Consequently, the LFRE algorithm specifically applies to only [k] 7 x[k + 1] = ax[k] x[k + 1] = ax[k] 1 2 3 1 2 3 4 5 6 4 5 6 7 7 (a) (b) property indicates that all its regular neighbors in such a subgraph belong to levels strictly preceding its own level. In essence, the edges of the MEDAG Gj represent a medium for transmitting information securely from the source nodes Sj to the non-source nodes, by preventing the adversaries from forming a bottleneck between such nodes. Intuitively, this requires redundant nodes and edges, and such a requirement is met by the first property of the MEDAG. In particular, as regards measurement redundancy, it follows from the definition that for each λj ∈ ΩU (A), a MEDAG Gj contains at least (2f + 1) source nodes that can detect λj . 4 The LFRE algorithm described in the previous section relies on a special information flow pattern that requires a node i to (j) listen to only its neighbors in Ni for estimating z(j) [k]. The second property of a MEDAG then indicates that nodes in level m only use the estimates of regular nodes in levels 0 to m − 1 for recovering z(j) [k]. The implications of the above properties will become apparent in the proof of the following result which provides a sufficient condition for solving Problem 1 based on our approach. Fig. 1. A scalar unstable plant is monitored by a network of 7 nodes as depicted by the figure on the left. Nodes 1, 2 and 3 are the source nodes for this system. The figure on the right represents a subgraph of the original graph satisfying the properties of a MEDAG in Definition 8 for all 1-local sets (i.e., with f = 1). For example, when A = {1} (as shown in the right figure), every non-source node has at least 2f + 1 = 3 neighbors. The levels that partition R = V \ A are level 0 with nodes 2 and 3, level 1 with nodes 4, 5 and 6, and level 2 with node 7. Note that each regular node has all its regular neighbors in levels that are numbered lower than its own. Theorem 4 Suppose that G contains a MEDAG Gj for each λj ∈ ΩU (A). Then, based on the LFRE dynamics described by equations (4) and (5), each regular node i ∈ R can asymptotically estimate the state of the plant, despite the actions of any f -locally bounded set of Byzantine adversaries. those eigenvalues that belong to ΩU (A). Consider the following definition. Definition 8 (Mode Estimation Directed Acyclic Graph (MEDAG)) Consider an eigenvalue λj ∈ ΩU (A). Suppose there exists a spanning subgraph Gj = (V, Ej ) of G with the following properties for all f -local sets A and R = V \ A. (j) (i) If i ∈ {V \ Sj } ∩ R, then |Ni | ≥ 2f + 1, where (j) Ni = {l|(l, i) ∈ Ej } represents the neighborhood of node i in Gj . (j) (j) (ii) There exists a partition of R into the sets {L0 , · · · , LTj }, (j) (j) where Tj ∈ N+ , L0 = Sj ∩ R, and if i ∈ Lq (where Sq−1 (j) (j) 1 ≤ q ≤ Tj ), then Ni ∩ R ⊆ r=0 Lr . Further(j) (j) more, Ni = ∅, ∀i ∈ L0 . Then, we call Gj a Mode Estimation Directed Acyclic Graph (MEDAG) for λj ∈ ΩU (A). An example of a MEDAG is shown in Figure 1. The “for all A” in the definition accounts for the fact that the set of adversarial nodes during the process of state estimation is unknown, and hence can be any f -local set (j) (j) of V. Note that Tj and the levels L0 to LTj can vary across different f -local sets. For a given f -local set A, (j) we say a regular node i ∈ Lm “belongs to level m”, where the levels are indicative of the distances of the regular nodes from the source set Sj . The first property indicates that every regular node i ∈ V \ Sj has at least (2f + 1) neighbors in the subgraph Gj , while the second The proof of the above theorem is given in Appendix B. Notice that Theorem 4 hinges on the existence of a MEDAG Gj , for each λj ∈ ΩU (A); in the following section we describe an approach for checking whether a given graph G contains such MEDAGs. 6 Checking the Existence of a MEDAG From the foregoing discussion, it is apparent that the MEDAGs described in Definition 8 play a key role in solving Problem 1 based on our proposed technique. In particular, recall that for each λj ∈ ΩU (A), the LFRE algorithm described in Section 4.2 requires a regular node i ∈ V \Sj to accept estimates from only its neighbor (j) set Ni in the MEDAG Gj for estimating z(j) [k]. With these points in mind, our immediate goal in this section will be to develop a distributed algorithm, namely Algorithm 1, that constructs a MEDAG Gj for each λj ∈ ΩU (A), and in the process enables each regular (j) node i to determine the set Ni for each λj ∈ UO i . The construction of these MEDAGs constitutes the initialization phase of our design, which can then be followed up by the LFRE algorithm described earlier. We briefly describe the implementation of Algorithm 1 as follows. 4 Recall from the discussion immediately following Proposition 1 that such a condition is in fact necessary for systems with distinct eigenvalues. 8 Algorithm 1 MEDAG Construction Algorithm the termination of the MEDAG construction algorithm under arbitrary adversarial behavior. For the following discussion, we characterize the properties of the output of Algorithm 1 if it terminates. To this end, consider the spanning subgraph Gj = (V, Ej ) induced by the sets (j) {Ni } returned by Algorithm 1. Keeping in mind that ′ R ⊇ R represents the set of nodes that behave regularly during the execution of Algorithm 1, we have the following results (the proofs of these results are omitted due to space constraints, and can be found in [21]). For each eigenvalue λj ∈ ΩU (A) do: (j) Initialization: Initialize ci (j) = 0, Ni = ∅, ∀i ∈ V. Each node determines whether it belongs to Sj . Actions of the source nodes: Each node in Sj updates its counter value ci (j) = 1, and transmits the message “1” to its out-going neighbors. Following this (j) step, it does not listen to any other node, i.e., Ni = ∅ and ci (j) = 1, ∀i ∈ Sj for the remainder of the algorithm. Actions of the non-source nodes: Each node i ∈ V \ Sj does the following: • If ci (j) = 0 and node i has received “1” from at least (2f +1) distinct neighbors (not necessarily all in the same time-step), it updates ci (j) to 1, appends the labels of the neighbors from which it received “1” to (j) Ni , and transmits “1” to its out-going neighbors. • If ci (j) = 1, it discards all messages received from (j) its neighbors, i.e., it does not update ci (j) or Ni . (j) Return : A set of sets {Ni }, λj ∈ ΩU (A), i ∈ V. Proposition 2 Suppose Algorithm 1 terminates for (j) some λj ∈ ΩU (A), and returns the sets {Ni }. Then, the spanning subgraph Gj induced by these sets contains no directed cycles where every node belongs to R′ . (j) Let Lm−1 denote the set of all nodes in R′ that update their counter value from 0 to 1 in round m of Algorithm (j) 1, i.e., L0 = Sj ∩ R′ , and so on. 5 Proposition 3 Suppose Algorithm 1 terminates for some λj ∈ ΩU (A). Let Tj denote the smallest integer such that in round Tj , ci (j) = 1 ∀i ∈ R′ . Then, the sets (j) (j) {L0 , · · · , LTj } form a partition of the set R′ in Gj . Algorithm 1 requires each node i to maintain a counter (j) ci (j) and a list of indices Ni for each λj ∈ ΩU (A). The (j) nodes in Ni ⊆ Ni will be the parents of node i in the DAG constructed for the estimation of z(j) [k]. Algorithm (j) 1 is initialized with ci (j) = 0 and Ni = ∅, for each i ∈ V. Subsequently, the algorithm proceeds in rounds where in the first round each node in Sj broadcasts the message “1” to its out-going neighbors, sets ci (j) = 1, (j) maintains Ni = ∅ for all future rounds, and goes to sleep. Each node i ∈ V \ Sj waits until it has received “1” from at least (2f + 1) distinct neighbors, at which point it sets ci (j) = 1, appends the labels of each of the (j) neighbors from which it received “1” to Ni , broadcasts the message “1” to its out-going neighbors, and goes to sleep. Let R′ ⊆ V denote the set of nodes that behave regularly during the execution of Algorithm 1. We say that the MEDAG construction algorithm “terminates for λj ” if there exists Tj ∈ N+ such that ci (j) = 1 ∀i ∈ R′ , for all rounds following round Tj . The objective of (j) the algorithm is to return a set of sets {Ni }, where λj ∈ ΩU (A), and i ∈ V. Theorem 5 Suppose the MEDAG construction algorithm terminates for λj ∈ ΩU (A). Then, there exists a subgraph Gj satisfying the properties of a MEDAG for all f -local sets A that contain V \ R′ as a subset. PROOF. The result follows from Propositions 2 and 3. Remark 6 Based on the above theorem, we make the following observations. If Algorithm 1 terminates for each λj ∈ ΩU (A), and V \ R′ = ∅, then the Gj subgraphs satisfy all the properties of a MEDAG and we can directly invoke Theorem 4. If Algorithm 1 terminates for each λj ∈ ΩU (A) and V \ R′ 6= ∅, (i.e., there is some adversarial activity during the MEDAG construction phase), then we do not need to provide any guarantees of state estimation for the set of misbehaving nodes V \ R′ , since V \ R′ ⊆ A. In this case too, the subgraphs returned by Algorithm 1 have enough redundancy to ensure that Problem 1 can be solved based on our proposed approach; this fact can be established using arguments identical to those used for proving Theorem 4. In what follows, we summarize our overall approach. We emphasize that in addition to misbehavior during the state estimation phase (run-time), an adversarial node is allowed to misbehave during the implementation of Algorithm 1 (design-time) as well. For example, it can transmit the message out of turn, i.e., before receiving “1” from at least (2f + 1) neighbors. It can also choose not to transmit the message at all. Note however that we must have V \ R′ ⊆ A, i.e., the f -local set of adversaries during the estimation phase must contain the set of adversaries during the design phase. In the next section, we shall detail graph conditions that guarantee 6.1 Summary of the Resilient Distributed State Estimation Scheme 1) Each regular node i ∈ R performs the coordinate transformation z[k] = T−1 x[k] described in Section 5 Note that the method developed in this paper allows even some of the source nodes in Sj to be adversarial. 9 the set of source nodes Sj . Suppose that the MEDAG construction algorithm for λj does not terminate. Let C ⊆ V \ Sj be the set of regular nodes that never update their counter ci (j) from 0 to 1, where i ∈ C. As G is strongly (3f + 1)-robust w.r.t. Sj , it follows that C is (3f + 1)-reachable, i.e., there exists a node i ∈ C which has at least (3f + 1) neighbors outside C. Under the f -local adversarial model, at least (2f + 1) of them are regular nodes with ci (j) = 1. Thus, at least (2f + 1) regular nodes must have transmitted the message “1” to node i. Thus, based on the rules of Algorithm 1, node i must have updated ci (j) from 0 to 1 at some point of time, leading to a contradiction. 4.1; accordingly, it identifies its detectable and undetectable eigenvalues (Oi and UO i respectively). 2) The MEDAG construction algorithm described by Algorithm 1 is implemented for each λj ∈ ΩU (A); graph conditions for termination of this algorithm are provided in the next section. At the end of this algorithm, (j) each regular node i knows the subset Ni of neighbors it should use in the LFRE algorithm. 3) Each regular node i employs a locally constructed Luenberger observer (refer to Lemma 2 and the discussion preceding it) for estimating zOi [k], namely the portion of the state z[k] corresponding to its detectable eigenvalues. 4) Each regular node i employs the LFRE algorithm governed by equations (4) and (5) for estimating zU Oi [k], namely the portion of the state z[k] corresponding to its undetectable eigenvalues. Remark 8 Whereas the (2f + 1) term appears in various contexts when dealing with security problems on networks (such as distributed consensus, broadcasting and optimization), the (3f + 1) term featuring in our analysis accounts for misbehavior that involves transmission of no messages by the adversarial nodes during execution of the MEDAG construction algorithm described in Section 6. Remark 7 Whereas steps 1 and 2 correspond to the initial design phase of our scheme, steps 3 and 4 constitute the estimation phase. A key benefit of the proposed method is that if certain graph-theoretic conditions (to be discussed in the following section) are met, then our overall scheme provably admits a fully distributed implementation even under worst-case adversarial behavior. 7 We now present the main result of this paper which ties together the previous results presented in this paper, and in turn provides a connection between feasible graph topologies and the solution to Problem 1 based on our proposed approach. Feasible Graph Topologies In this section, we characterize feasible graph topologies that guarantee the termination of the MEDAG construction algorithm described in the previous section. In other words, based on Remark 6, feasible graph topologies guarantee that Problem 1 can be solved based on our proposed approach (summarized in Section 6.1). We first recall the following definition from [24, 33]. Theorem 6 Consider an LTI system (1) and a measurement model (2). Let the communication graph G be strongly (3f + 1)-robust w.r.t. Sj , ∀λj ∈ ΩU (A). Then, the proposed algorithm summarized in Section 6.1 provides a solution to Problem 1. PROOF. From Lemma 3, it follows that if G is strongly (3f + 1)-robust w.r.t. Sj for every λj ∈ ΩU (A), then the MEDAG construction algorithm terminates for each such eigenvalue. Combining Theorem 5, Remark 6 and Theorem 4 then leads to the desired result. Definition 9 (r-reachable set) For a graph G = (V, E), a set S ⊂ V, and an integer r ∈ N+ , S is an r-reachable set if there exists an i ∈ S such that |Ni \ S| ≥ r, Thus, if a set S is r-reachable, then it contains a node which has at least r neighbors outside S. We modify the notion of a strongly-r robust graph from [33] as follows. If the adversarial attacks are restricted to the estimation phase only, i.e., if there are no attacks during the initial MEDAG construction phase, then the following result provides a tight graph condition for our algorithm. Definition 10 (strongly r-robust graph w.r.t. Sj ) For r ∈ N+ and λj ∈ ΩU (A), a graph G = (V, E) is strongly r-robust w.r.t. to the set of source nodes Sj , if for any non-empty subset C ⊆ V \ Sj , C is r-reachable. Lemma 3 The MEDAG construction algorithm terminates for λj ∈ ΩU (A) if G is strongly (3f + 1)-robust w.r.t. Sj . Theorem 7 Consider an LTI system (1) and a measurement model (2). Suppose adversarial behavior is restricted to the estimation phase (steps 3 and 4) of the proposed algorithm summarized in Section 6.1. Then, this algorithm solves Problem 1 if and only if G is strongly (2f + 1)-robust w.r.t. Sj , ∀λj ∈ ΩU (A). PROOF. We prove by contradiction. Consider any λj ∈ ΩU (A) and let G be strongly (3f + 1)-robust w.r.t. The proof of the above theorem is presented in Appendix C. Essentially, Theorem 7 alludes to the fact that G contains a MEDAG Gj for each λj ∈ ΩU (A) if and only if 10 G is strongly (2f + 1)-robust w.r.t. Sj , ∀λj ∈ ΩU (A). It should be noted that Theorem 7 provides a graph condition that is necessary and sufficient for the algorithm developed in this paper. However, such a condition may not be necessary for solving Problem 1 in general. Investigation of an algorithm-independent tight graph condition that solves Problem 1 is an interesting avenue of future research. non-source node owing to the r-feasibility of the original network. As r > k, such sets are not k-local. Next, pick any λj ∈ ΩU (A) and let C be a non-empty subset of ′ ′ ′ ′ V \ Sj , where V and Sj represent the vertex set and ′ source node set for λj , respectively, in G . Since C was rreachable in G, it contained some node v with r neighbors ′ outside C. While constructing G , node v can lose at most k of such neighbors, and hence C is (r − k)-reachable in ′ G . The rest of the proof follows trivially. Theorems 6 and 7 reveal that ‘strong r-robustness w.r.t. Sj , ∀λj ∈ ΩU (A)’ is the key topological property required for guaranteeing success of our proposed algorithm. Accordingly, given a system model (1) and measurement model (2), a network that is strongly r-robust w.r.t. Sj , ∀λj ∈ ΩU (A), will be called an ‘r-feasible network ’ for simplicity. We summarize certain features of an r-feasible network in the following result. We remark on certain implications of the above result. The first property provides a procedure for constructing r-feasible networks with N nodes (where N > r) starting from r-feasible networks with fewer than N nodes. The second property shows that the measurement structure of the nodes provides an upper bound on the robustness of the overall network. The third property places a lower bound on the minimum in-degree of any node that cannot estimate the entire state on its own in an r-feasible network. Finally, a direct implication of the fourth property is that a loss of k source nodes (where k < r) for any unstable eigenvalue of the system (possibly due to sensor failures) leaves the resulting network at least (r − k)feasible if the original network is r-feasible to begin with. Proposition 4 An r-feasible network G has the following properties. ′ (i) The graph G = (V ∪ vnew , E ∪ Enew ), where vnew is a new vertex added to G and Enew is the edge set associated with vnew , is an r-feasible network if |Nvnew | ≥ r. (ii) r ≤ minλT |Sj |. j ∈ΩU (A) (iii) Let S = λj ∈ΩU (A) Sj . Then |Ni | ≥ r, ∀i ∈ V \ S. (iv) Removal of a k-local set from G, where 0 < k < r, ′ results in a network G that is (r − k)-feasible. Applicability of the Proposed Approach: Building on the insights developed in this section, we make a case for the applicability of the approach developed in this paper by addressing the following question: how efficiently can one verify whether a given network is r-feasible? To answer the above question we will exploit a connection between the ‘strong r-robustness property w.r.t. a certain set of nodes’ and the dynamic process of ‘bootstrap percolation’ on networks [34]. Given a graph G and a threshold r ≥ 2, bootstrap percolation can be viewed as a process of spread of activation where one starts off with a set I ⊆ V of initially active nodes. Subsequently, the process evolves over the network based on the rule that an inactive node becomes active if and only if it has at least r active neighbors, with active nodes remaining active forever. The process terminates when no more nodes become active; an initial set I is said to percolate if upon termination the final active set equals the entire node set V. Consider the following simple, yet key observation. PROOF. (i) Consider any λj ∈ ΩU (A). If vnew is ′ a source node for λj , then it is easily seen that G is strongly r-robust w.r.t. Sj . For the case when vnew is not a source node for λj , consider any non-empty set C ⊆ {V ∪ vnew } \ Sj . If C = {vnew }, then r-reachability of C follows from the fact that |Nvnew | ≥ r. In every other case, C contains some nodes of the original graph ′ G and is hence r-reachable as G is r-feasible. Thus G is strongly r-robust w.r.t. Sj . A similar analysis holds for each λj ∈ ΩU (A), leading to the desired result. (ii) Suppose r > |Sρ | where ρ = arg minλj ∈ΩU (A) |Sj |. Since the set C = V \ Sρ can be at most |Sρ |-reachable and |Sρ | < r, it follows that G is not r-feasible. (iii) Suppose i ∈ V \ S with |Ni | < r. As i ∈ V \ S, there exists some λj ∈ ΩU (A) such that i ∈ V \ Sj . Consider the set C = {i}. As |Ni | < r, the set C is not r-reachable. Thus, G is not strongly r-robust w.r.t. Sj , implying that G is not r-feasible. Lemma 4 Given a graph G and a threshold r ≥ 2, an initial set I percolates via the process of bootstrap percolation if and only if G is strongly r-robust w.r.t. I. The proof of the above result follows similar arguments as Lemma 3, and is hence omitted. Leveraging the above equivalence, the next result establishes that one can verify whether a given network is r-feasible in polynomial time (in the size of the system and the network). (iv) First, observe that as G is r-feasible and k < r, removal of a k-local set from G cannot cause the removal of an entire source node net Sj for any λj ∈ ΩU (A). This follows from noting that any source set Sj where λj ∈ ΩU (A) (or any set containing Sj ) will have an overlap of at least r nodes with the neighborhood of some Proposition 5 Given a system matrix A ∈ Rn×n (1), 11 a measurement model (2), a communication graph G = (V, E) with |V| = N , and an integer r ≥ 2, one can verify whether the network is r-feasible in O(nN |E|) time. graph conditions can be checked in polynomial time as discussed in the previous section. There are various interesting directions of future research, some of which were pointed out in Remark 3. Finding an algorithm-independent necessary and sufficient condition for the problem posed in this paper will likely be a challenging proposition. Whereas the focus of this paper has been on obtaining sufficient graphtheoretic conditions that account for worst-case adversarial behavior, it might be of interest to see if such conditions can be relaxed when confronted with less sophisticated adversarial attacks. Extensions of our framework to account for network-induced issues such as packetdrops, delays and asynchronicity also merit attention. Preliminary investigations along this line have been conducted in [35]. PROOF. Notice that |ΩU (A)| ≤ n, i.e., there are at most n source sets Sj for which we need to verify the strong r-robustness property in Definition 10. Based on Lemma 4, for each Sj corresponding to some λj ∈ ΩU (A), verifying whether G is strongly r-robust w.r.t. Sj is equivalent to verifying whether Sj percolates via the process of bootstrap percolation with threshold r. Thus, we analyze the complexity of simulating a bootstrap percolation process on a given network. 6 First, notice that it takes at most N iterations/rounds for a bootstrap percolation process to terminate on a network of N nodes. In each round, every inactive node checks whether it has at least r active neighbors; the enP tire process of checking is thus completed in O ( N i=1 di ) = O (|E|) time, where di represents the in-degree of node i. Thus, for a given initial set, it takes O (N |E|) time to simulate the bootstrap percolation process. The result then follows readily. References [1] Deborah Estrin, Ramesh Govindan, John Heidemann, and Satish Kumar. Next century challenges: Scalable coordination in sensor networks. In Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pages 263–270. ACM, 1999. Remark 9 Based on the above result, one can check whether the approach developed in this paper is applicable for a given system and network in polynomial time. Interestingly, leveraging the equivalence described in Lemma 4, it is possible to show that the strong r-robustness property described in Definition 10 is exhibited by various large-scale complex network models such as the BarabásiAlbert (BA) preferential attachment model, the ErdősRényi random graph model, and the 2-dimensional random geometric graph model. A detailed discussion of this topic can be found in Appendix D. 8 [2] Shinkyu Park and Nuno C Martins. Design of distributed lti observers for state omniscience. IEEE Transactions on Automatic Control, 62(2):561–576, 2017. [3] Aritra Mitra and Shreyas Sundaram. An approach for distributed state estimation of LTI systems. In Proceedings of the 2016 54th Annual Allerton Conference on Communication, Control, and Computing, pages 1088–1093, 2016. [4] A. Mitra and S. Sundaram. Distributed observers for LTI systems. IEEE Transactions on Automatic Control, 2018. [5] L Wang and AS Morse. A distributed observer for a timeinvariant linear system. IEEE Transactions on Automatic Control, 2017. [6] Weixin Han, Harry L Trentelman, Zhenhua Wang, and Yi Shen. A simple approach to distributed observer design for linear systems. arXiv preprint arXiv:1708.01459, 2017. Conclusions We studied the problem of collaboratively estimating the state of an LTI system subject to worst-case adversarial behavior. For the attack models under consideration, we identified certain necessary conditions that need to be satisfied by any system and network for the problem posed in this paper to have a feasible solution. We then developed a local-filtering algorithm to enable each noncompromised node to recover the entire state. Finally, using a topological property called strong r-robustness, we characterized networks that guarantee success of our proposed strategy. Two notable features of our approach are as follows: (i) each step of our approach admits an attack-resilient, completely distributed implementation provided certain graph conditions are met; and (ii) these [7] Usman Khan and José MF Moura. Distributing the Kalman filter for large-scale systems. IEEE Transactions on Signal Processing, 56(10):4919–4935, 2008. [8] Reza Olfati-Saber. Distributed Kalman filter with embedded consensus filters. In Proceedings of the 44th IEEE Conference on Decision and Control and European Control Conference, pages 8179–8184, 2005. [9] Ion Matei and John S Baras. Consensus-based linear distributed filtering. Automatica, 48(8):1776–1782, 2012. [10] Fabio Pasqualetti, Florian Dörfler, and Francesco Bullo. Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(11):2715–2729, 2013. [11] Shreyas Sundaram and Christoforos N Hadjicostis. Distributed function calculation via linear iterative strategies in the presence of malicious agents. IEEE Transactions on Automatic Control, 56(7):1495–1508, 2011. 6 Algorithm 1 essentially simulates the evolution of a bootstrap percolation process with threshold r = (2f + 1), provided there is no adversarial activity during the distributed implementation of such an algorithm. [12] Cheng-Zong Bai, Fabio Pasqualetti, and Vijay Gupta. Datainjection attacks in stochastic control systems: Detectability and performance tradeoffs. Automatica, 82:251–260, 2017. 12 [29] Fabio Pasqualetti, Antonio Bicchi, and Francesco Bullo. Consensus computation in unreliable networks: A system theoretic approach. IEEE Transactions on Automatic Control, 57(1):90–104, 2012. [13] André Teixeira, Iman Shames, Henrik Sandberg, and Karl Henrik Johansson. A secure control framework for resource-limited adversaries. Automatica, 51:135–148, 2015. [14] Miroslav Pajic, Insup Lee, and George J Pappas. Attackresilient state estimation for noisy dynamical systems. IEEE Transactions on Control of Network Systems, 4(1):82–92, 2017. [30] Oliver Kosut, Liyan Jia, Robert J Thomas, and Lang Tong. Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid, 2(4):645–658, 2011. [31] Joao P Hespanha. Linear systems theory. university press, 2009. [15] Shaunak Mishra, Yasser Shoukry, Nikhil Karamchandani, Suhas N Diggavi, and Paulo Tabuada. Secure state estimation against sensor attacks in the presence of noise. IEEE Transactions on Control of Network Systems, 4(1):49– 59, 2017. Princeton [32] Roger A Horn and Charles R Johnson. Matrix analysis. Cambridge university press, 2012. [33] Haotian Zhang and Shreyas Sundaram. Robustness of information diffusion algorithms to locally bounded adversaries. In Proceedings of the American Control Conference, pages 5855–5861, 2012. [16] Ion Matei, John S Baras, and Vijay Srinivasan. Trust-based multi-agent filtering for increased smart grid security. In Proceedings of the Mediterranean Conference on Control & Automation, pages 716–721, 2012. [34] Svante Janson, Tomasz Luczak, Tatyana Turova, Thomas Vallier, et al. Bootstrap percolation on the random graph GN,P . The Annals of Applied Probability, 22(5):1989–2047, 2012. [17] Usman Khan and Aleksandar M Stankovic. Secure distributed estimation in cyber-physical systems. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pages 5209–5213, 2013. [35] Aritra Mitra and Shreyas Sundaram. Secure distributed state estimation of an LTI system over time-varying networks and analog erasure channels. In Proceedings of the American Control Conference, to appear. [18] Mohammad Deghat, Valery Ugrinovskii, Iman Shames, and Cédric Langbort. Detection of biasing attacks on distributed estimation networks. In Proceedings of the IEEE Conference on Decision and Control, pages 2134–2139, 2016. [36] Réka Albert and Albert-László Barabási. Statistical mechanics of complex networks. Reviews of modern physics, 74(1):47, 2002. [19] Hamza Fawzi, Paulo Tabuada, and Suhas Diggavi. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control, 59(6):1454–1467, 2014. [37] Paul Erdős and Alfréd Rényi. On the strength of connectedness of a random graph. Acta Mathematica Academiae Scientiarum Hungarica, 12(1-2):261–267, 1964. [20] Michelle S Chong, Masashi Wakaiki, and Joao P Hespanha. Observability of linear systems under adversarial attacks. In Proceedings of the American Control Conference, pages 2439–2444, 2015. [38] Milan Bradonjić and Iraj Saniee. Bootstrap percolation on random geometric graphs. Probability in the Engineering and Informational Sciences, 28(2):169–181, 2014. [39] Gregory J Pottie and William J Kaiser. Wireless integrated network sensors. Communications of the ACM, 43(5):51–58, 2000. [21] Aritra Mitra and Shreyas Sundaram. Secure distributed observers for a class of linear time invariant systems in the presence of byzantine adversaries. In Proceedings of the 55th IEEE Conference on Decision and Control, pages 2709–2714, 2016. A [22] Danny Dolev, Nancy A Lynch, Shlomit S Pinter, Eugene W Stark, and William E Weihl. Reaching approximate agreement in the presence of faults. Journal of the ACM (JACM), 33(3):499–516, 1986. Proof of Theorem 2 PROOF. “(i)=⇒(ii)” We prove by contraposition. Suppose statement (ii) is violated for some node i ∈ V, i.e., there exists a set Di such that its removal from G causes the pair (A, Ci∪Pi ) to become undetectable (where Di and Pi have the same meaning as in the statement of Theorem 2). It then follows that F = V \{i∪Pi } is a critical set. Suppose it is also a minimal critical set. ′ We construct G by adding directed edges from a virtual node s to each node in F . 7 Observe that H = Di satisfies all the properties of an f -total pair cut w.r.t. s. In particular, Y = {i ∪ Pi } and X = {V \ {Di ∪ Y}} ∪ {s}. Thus, statement (i) is violated. A similar argument holds when F contains a minimal critical set. [23] Nitin H Vaidya, Lewis Tseng, and Guanfeng Liang. Iterative approximate byzantine consensus in arbitrary directed graphs. In Proceedings of the ACM symposium on Principles of distributed computing, pages 365–374, 2012. [24] Heath J LeBlanc, Haotian Zhang, Xenofon Koutsoukos, and Suresh Sundaram. Resilient asymptotic consensus in robust networks. IEEE Journal on Selected Areas in Communications, 31(4):766–781, 2013. [25] Shreyas Sundaram and Bahman Gharesifard. Consensusbased distributed optimization with malicious nodes. In Proceedings of the Annual Allerton Conference on Communication, Control and Computing, 2015. [26] Lili Su and Nitin Vaidya. Byzantine multi-agent optimization: Part i. arXiv preprint arXiv:1506.04681, 2015. “(i)⇐=(ii)” We again prove by contraposition. Suppose statement (i) is violated, i.e., there exists an f -total pair [27] Chiu-Yuen Koo. Broadcast in radio networks tolerating byzantine adversarial behavior. In Proceedings of the twentythird annual ACM symposium on Principles of distributed computing, pages 275–282. ACM, 2004. 7 ′ Throughout this proof, we drop the subscript on G , F and s, unlike the notation in Section 3. This is done since the subscript i is used to denote sets defined w.r.t. a node i in this proof. [28] Andrzej Pelc and David Peleg. Broadcasting with locally bounded byzantine faults. Information Processing Letters, 93(3):109–115, 2005. 13 cut H w.r.t. a virtual node s corresponding to some minimal critical set F . Consider a node i in Y (recall that Y is non-empty based on Definition 6). First consider the case when node i is not reachable from any node in H in the graph G. It then follows that in the graph G, directed paths to node i can only exist from the set Y. But since i ∈ Y and (A, CY ) is not detectable, it is trivially impossible for node i to estimate the state. We thus focus on the case where node i is reachable from a certain set of nodes, say Di , within the set H. Since |H| ≤ 2f and Di ⊆ H, we have that |Di | ≤ 2f . It can be easily argued that the removal of Di from G results in an induced subgraph where node i can only be reached from the set Y. In other words, the set Pi , as defined in the statement of Theorem 2, is a subset of Y. As (A, CY ) is not detectable, it follows that (A, Ci∪Pi ) is not detectable either, and thus statement (ii) is violated. B using (4), we obtain  P   (j) ei [k + 1] = W(λj )  P | (jσj ) l∈Mi [k] (jσj ) [k] (j1) wil [k]el .. . wil {z [k] (jσj ) [k]el [k]    ,  } (j) ēi [k] (B.1) where σj = 2aA (λj ) (since λj is non-real). For arriving P (jm) at (B.1), we used the fact that l∈M(jm) [k] wil [k] = 1 i for every component m of z(j) [k]. We now analyze the error dynamics (B.1). To this end, for each component (j) m of the vector z(j) [k], we partition the set Ni into (jm) (jm) (jm) [k], and Mi [k], such that the [k], Ji the sets Ui (jm) (jm) [k] contain f nodes each, with [k] and Ji sets Ui the highest and lowest estimate values for z (jm) [k] respectively, transmitted to node i at time-step k, and (j) (jm) Mi [k] contains the rest of the nodes in Ni . According to the update rule (4), node i only uses esti(jm) mates from the set Mi [k] (which is non-empty at all time-steps based on the properties of a MEDAG) (jm) [k]. Now, for any compoto compute the quantity z̄i (j) nent m of z [k], consider the following two cases. (i) (jm) Mi [k] ∩ A = ∅, i.e., there are no adversarial nodes (jm) in the set Mi [k]: in this case, all the nodes in the set (j) (j) (jm) Mi [k] are regular and belong to L0 (as Ni ∩ R ⊆ (j) (jm) L0 ). (ii) Mi [k] ∩ A is non-empty, i.e., there are (jm) some adversarial nodes in the set Mi [k]: based on the f -local adversarial model, it is apparent that each (jm) (jm) [k] contain at least one [k] and Ji of the sets Ui (j) regular node belonging to L0 . Let u and v be two such (jm) (jm) [k], re[k] and Ji regular nodes belonging to Ui (jm) [k], spectively. Based on the definitions of the sets Ui (jm) (jm) (jm) (jm) [k] ≤ [k], and Mi [k], we have ẑv [k] ≤ ẑl Ji (jm) (jm) (jm) (jm) ẑu [k], and hence ev [k] ≤ el [k] ≤ eu [k], for (j) (jm) every node l ∈ Mi [k]. In particular, since u, v ∈ L0 , (jm) (jm) it follows that for any node l ∈ Mi [k], emin [k] ≤ (jm) (jm) (jm) (jm) el [k] ≤ emax [k], where emin [k] = minu∈L(j) eu [k] Proof of Theorem 4 PROOF. Let A be the (unknown) set of f -local adversaries, and consider R = V \ A. Given a node i ∈ R, the state vector z[k] can be partitioned into the components zOi [k] and zU Oi [k] that correspond to the detectable and undetectable eigenvalues, respectively, of node i. Based on Lemma 2, we know that node i can estimate zOi [k] asymptotically via a locally constructed Luenberger observer. It remains to show that node i can recover zU Oi [k], or in other words, for each λj ∈ UO i , (j) we need to prove that limk→∞ ||ẑi [k] − z(j) [k]|| = 0. To this end, consider a non-real eigenvalue λj ∈ ΩU (A). As G contains a MEDAG for each λj ∈ ΩU (A), the sets (j) (j) (j) (j) {L0 , L1 , · · · , Lq , · · · LTj } form a partition of the set R. We prove that each node in R can asymptotically estimate z(j) [k] by inducting on the level number q. (j) (j1) (j1) l∈Mi (j) For q = 0, by definition of the set L0 , all nodes in L0 are regular and belong to the set Sj , i.e., λj ∈ Oi for each (j) node i in L0 . Thus, by Lemma 2, each node in level 0 can estimate z(j) [k] asymptotically. Notice that for any node i belonging to a level q, where 1 ≤ q ≤ Tj , we have (j) λj ∈ UOi . Consider a node i in L1 and let its error (jm) in estimation of the component z [k] be denoted by (jm) (jm) (jm) [k] − z [k]. The estimation errors of ei [k] , ẑi the individual components are aggregated in the vector (j) (j) ei [k] = ẑi [k] − z(j) [k]. Subtracting z(j) [k + 1] from both sides of equation (5), noting that z(j) [k + 1] = W(λj )z(j) [k] (based on the dynamics given by (3)), and (jm) (jm) and emax [k] = maxu∈L(j) eu 0 0 [k]. This property holds for every component m of z(j) [k]. Analyzing each of the two cases, we infer that at every time-step k, each com(j) ponent of the vector ēi [k] in (B.1) lies in the convex hull of the corresponding components of the error vec(j) (j) tors eu [k], u ∈ L0 = Sj ∩ R. Based on Lemma 2, we (j) have that limk→∞ eu [k] = 0, ∀u ∈ Sj ∩ R, and hence (j) it follows that ẑi [k] converges asymptotically to z(j) [k] 14 (j) violating the first property of a MEDAG in Definition 8. We thus arrive at a contradiction, and the proof is complete. for every regular node i in L1 . Suppose the result holds for all levels from 0 to q (where 1 ≤ q ≤ Tj − 1). It is easy to see that the result holds for (j) all regular nodes in Lq+1 as well, by noting the following. Sq (j) (j) (j) (i) A regular node i ∈ Lq+1 has Ni ∩ R ⊆ r=0 Lr . D (j) (ii) For each i ∈ Lq+1 , a similar analysis reveals that at every every time-step k, each component of the vector (j) ēi [k] lies in the convex hull of the corresponding comSq (j) (j) ponents of the error vectors eu [k], u ∈ r=0 Lr . The desired result then follows from the induction hypothesis. An identical argument can be sketched for a real eigenvalue λj ∈ ΩU (A), and thus the result holds for any λj ∈ ΩU (A). We arrive at the conclusion that every node i ∈ R can asymptotically estimate z(j) [k] for every eigenvalue λj ∈ UO i . Thus, each node i ∈ R can asymptotically estimate z[k], and hence x[k] = Tz[k]. C The Strong r-robustness Property of Random Graphs The focus of this section is to address the following question. Given a dynamical system and an associated large-scale complex sensor network monitoring the system, under what conditions is the system and network pair r-feasible? To provide an answer to this question, we study the ‘strong r-robustness’ property in three relatively common random graph models for large-scale complex networks, namely the Barabási-Albert (BA) preferential attachment model, the Erdős-Rényi random graph model, and the 2-dimensional random geometric graph model. Consider a scenario where we are given a dynamical system and an associated wireless sensor network such that the system and network pair is r-feasible, and hence, resilient to adversarial attacks. We wish to expand the network via addition of more sensors without disrupting the r-feasibility property, i.e., we intend to tolerate the same number of adversaries as earlier. As the first property in Proposition 4 suggests, this can be achieved by continually adding new nodes with incoming edges from at least r nodes in the existing network. The specific construction where the neighbors of a new node are selected with a probability proportional to the number of edges they already have leads to the BA preferential attachment model. Such a model is thought of as a plausible mechanism for the formation of many real-world complex networks [36]. Based on our foregoing discussion, it then follows that such real-world networks would facilitate the LFRE dynamics introduced in Section 4.2, and would hence be resilient to the worst-case attack model considered in this paper. Proof of Theorem 7 PROOF. For sufficiency, it is easily noted that the conditions stated in the theorem guarantee termination of the MEDAG construction algorithm for every λj ∈ ΩU (A). The rest of the proof for sufficiency follows identical arguments as the proof of Theorem 6. For proving necessity, we first note that the proposed algorithm summarized in Section 6.1 is applicable only if the MEDAG construction algorithm (Algorithm 1) terminates for each λj ∈ ΩU (A) and returns a subgraph Gj satisfying the properties of a MEDAG for all f -local sets containing V \ R′ . Here R′ denotes the set of nodes that behave regularly during the execution of Algorithm 1. Based on the hypothesis of the theorem, since R′ = V, the existence of a MEDAG Gj ∀λj ∈ ΩU (A) is necessary in this case for running the LFRE algorithm. The rest of the proof proceeds via contradiction. Suppose G is not strongly (2f + 1)-robust w.r.t. Sj for some λj ∈ ΩU (A) and yet there exists a MEDAG Gj for λj . Since G is not strongly (2f + 1)-robust w.r.t. λj , there exists a nonempty set C ⊆ V \ Sj that is not (2f + 1)-reachable. Consider the trivial f -local set A = ∅. The subgraph Gj must contain a partition of R = V \ A = V into levels that satisfy the second property of a MEDAG in Definition 8. With this point in mind, let C be partitioned as S (j) C = qr=1 Fr , where Fr = C ∩ Lnr for some set of integers {n1 , · · · , nq |1 ≤ ni ≤ Tj ∀i ∈ {1, · · · , q}}. Here, (j) {Lnr }qr=1 represents a subset of the levels that partition R in the MEDAG Gj (that exists based on the hypothesis). Without loss of generality, let n1 < n2 < · · · < nq . Then, from the definition of a MEDAG, it follows that (j) for any i ∈ Fn1 , Ni contains elements from only V \ C. (j) As C is not (2f +1)-reachable, |Ni | < (2f +1), thereby Next, we turn our attention to one of the most common mathematical models for large-scale networks, namely Erdős-Rényi random graphs [37]. We denote an ErdősRényi random graph on N nodes by GN,p , where all possible edges between pairs of different nodes are present independently and with the same probability p. We further note that p is in general a function of the network size N . From the perspective of a network designer, we will be interested in answering the following questions. (i) How should the size of the source sets Sj (for each λj ∈ ΩU (A)) scale with the size of the network to maintain r-feasibility in an Erdős-Rényi random graph? (ii) Which nodes should be chosen as the source nodes? Prior to answering these questions, we briefly remark on the notation to be used for the remainder of this section. The term w.h.p. (with high probability) will be used for events with probability tending to 1 as N → ∞. Given 15 two non-negative sequences aN and bN , the notation aN ≪ bN will convey the same meaning as aN = o(bN ). To make use of Lemma 4, we first recall a few definitions from [34]. Given an integer r ≥ 2, define Tc (N, p) ,  (r − 1)! N pr 1  (r−1)   1 Tc (N, p). , Ac (N ) , 1 − r (D.1) We have the following result for an Erdős-Rényi random graph model. Proposition 6 Given an LTI system (1), a measurement model (2), and a network modeled by an Erdős-Rényi random graph GN,p , suppose that for each λj ∈ ΩU (A), the source set Sj (N ) is chosen randomly. 8 Then, the following are true. Among the three random graph models mentioned earlier, the one most relevant to our cause is the twodimensional random geometric graph (RGG) model [38]. RGGs are typically used to model networks where a notion of spatial proximity governs the interaction between the nodes. A wireless sensor network where randomly deployed nodes communicate with nodes only in a geographical vicinity, constitutes an ideal setup for an RGG model [39]. We will consider a two-dimensional RGG model generated by first placing N nodes randomly within the unit square [0, 1]2 . Undirected edges are placed between two nodes if and only if the Euclidean distance between such nodes is at most d(N ), where d(N ) is a positive number that may depend on the network size N . We will denote such a RGG by GN,d(N ) . Like the Erdős-Rényi case, our focus will be on understanding how the source sets should be chosen to ensure r-feasibility of GN,d(N ) with high probability. To provide such a characterization, we first recall a few functions from [38]. Let H(x) , x lnx − x + 1 be defined on [0, ∞) and J(x) , lnx − 1 + x−1 be defined on (0, ∞). Further−1 more, let JR : [0, ∞) → [1, ∞) denote the inverse of J(x) when the domain of J(x) is [1, ∞). We then have the following result. 1 (i) Let p = p(N ) be such that N −1 ≪ p ≪ N − r . If for |S (N )| each λj ∈ ΩU (A), Ajc (N ) ≥ 1 + δ, for some δ > 0, and |Sj (N )| ≤ N2 , then GN,p is r-feasible w.h.p. if and only if N p − (lnN + (r − 1)ln lnN ) → ∞ as N → ∞. 1 (ii) Let p = p(N ) be such that p ≫ N − r . If for each λj ∈ ΩU (A), |Sj (N )| ≥ r, then GN,p is r-feasible w.h.p. Proposition 7 Given an LTI system (1) and a measurement model (2), let the communication q graph be modeled lnN by the RGG GN,d(N ), where d(N ) = aπN and a > 1. For each λj ∈ ΩU (A), let a node be chosen as a source node for λj with a probability p independently of the other 1 ). nodes in the network. Let r = γa lnN , where γ ∈ (0, 5π 5π Suppose a ≥ H(5πγ) and PROOF. (i) If the conditions in part (i) are met, then for each λj ∈ ΩU (A), Sj percolates via bootstrap percolation with threshold r on GN,p w.h.p. based on [34, Theorem 3.2]. Lemma 4 then implies that GN,p is strongly r-robust w.r.t. each such source set Sj w.h.p., i.e., GN,p is r-feasible w.h.p. . The proof for part (ii) follows similarly by leveraging [34, Theorem 5.8] and Lemma 4. ( 5πγ p ≥ min γ, −1 1 JR ( aγ ) Remark 10 We glean the following insights from the above result. First, we observe that if either condition (i) or condition (ii) is met, then our proposed algorithm will enable each regular node to asymptotically estimate the state of the system w.h.p. in the presence of any ⌊ r−1 3 ⌋ locally-bounded set of Byzantine adversaries. This is a direct consequence of Theorem 6. The first part of Proposition 2 indicates that although the source sets can be chosen randomly, their size needs to scale appropriately with the size of the network to maintain r-feasibility. The second part states that if the probability of edge formation is large enough, then it suffices to pick source sets of constant size equal to the bare minimum required for achieving r-feasibility (which equals r based on part (ii) of Proposition 4). ) . (D.2) Then, GN,d(N ) is r-feasible. 9 PROOF. For each λj ∈ ΩU (A), if the source set Sj is chosen as described above, then it percolates GN,d(N ) w.h.p. if the conditions of the proposition are met [38, Theorem 4]. The result then follows from Lemma 4. Remark 11 In an attack-prone wireless sensor network, one might be interested in tolerating f -local adversarial sets where the paramater f scales with the size of the network. Such a possibility is captured by Proposition −1 9, based on which, ⌊ γa lnN ⌋-local Byzantine adversar3 ial sets can be accounted for by our proposed algorithm. 8 By choosing Sj (N ) randomly, we imply that the measurement set needed to detect λj is allocated to |Sj (N )| nodes picked uniformly at random. The notation Sj (N ) is used to explicitly point out that the size of the source sets scales with the size of the network. q lnN . A RGG GN,d(N) is connected w.h.p. for d(N ) > πN The choice of a > 1 thus allows one to deal with an asymptotically connected GN,d(N) . 9 16
3cs.SY
Nonparametric Inference for Auto-Encoding Variational Bayes arXiv:1712.06536v1 [stat.ML] 18 Dec 2017 Erik Bodin * Iman Malik * * Carl Henrik Ek * University of Bristol † Neill D. F. Campbell † University of Bath Variational approximations are an attractive approach for inference of latent variables in unsupervised learning. However, they are often computationally intractable when faced with large datasets. Recently, Variational Autoencoders (VAEs) Kingma and Welling [2014] have been proposed as a method to tackle this limitation. Their methodology is based on formulating the approximating posterior distributions in terms of a deterministic relationship to observed data consequently the title “Auto-Encoding Variational Bayes”. Importantly, this is a decision regarding an approximate inference scheme that should not be confused with an auto-encoder as a model. Unsupervised learning is a ill-conditioned problem that requires prior knowledge to reach a solution. We would like to learn latent representations that are low-dimensional and highly interpretable. A model that has these characteristics is the Gaussian Process Latent Variable Model (GP-LVM) Lawrence [2005]. The benefits and negative of the GP-LVM are complementary to the VAE, the former provides useful low-dimensional latent representations while the latter is able to handle large amounts of data and can use non-Gaussian likelihoods. Our inspiration for this paper is to marry these two approaches and reap the benefits of both. In order to do so we will introduce a novel approximate inference scheme inspired by the GP-LVM to the VAE. The standard VAE formulation Kingma and Welling [2014] adopts a unit Gaussian prior, creating a trade-off between the embedded data residing at the same location in the latent space and the ability to reconstruct the data in the observed space. This encourages a “tight packing” of the data around a shared origin, with hope that similar data in the observed space have overlapping probability mass in the latent space i.e. mutual information. It has been shown that a simple prior over-regularizes the latent space leading to poor reconstructions Hoffman and Johnson [2016]. Other more flexible priors can be used to change the dynamic between reconstruction and mutual information, such as in recent work of using a mixture Tomczak and Welling [2017] or let the prior be autoregressive Chen et al. [2016]. The quality of the output from a VAE can be improved by more expressive generative models, but this has been shown to lead to a tendency of ignoring the latent space, defeating the purpose of unsupervised learning Zhao et al. [2017]. In summary, reconstruction quality and mutual information in the latent space is traded against each other. In this paper we address this limiting trade-off by escaping it; we let the space where we encourage sharing be separated from the space where the generative capacity is set. We do this by an approximation of a model where the observations can be generated from either space. We show experimentally that the approximation allows the capacity of the generative bottle-neck (Z) to be arbitrarily large without losing sharing and the beneficial properties of the sharing space (X), allowing reconstruction quality to be unlimited by Z at the same time as a low-dimensional space can be used to perform ancestral sampling from as well as a means to reason about the embedded data. 1 Method The VAE Kingma and Welling [2014] inference scheme optimises a traditional evidence lower bound where the latent space posterior is approximated as a deterministic relationship from the observed QN data as q(Z|Y) = i=1 q(zi |yi ) where each latent variable is conditionally independent given the 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA. Y z1 Z z2 → (a) Model z1 y2 z2 zN → ... y1 Y zN ... yN y1 (b) VAE Approximation y2 yN (c) VAE Inference Scheme Y X X Distribution z1 z2 zN z1 z2 zN → Point Estimate ... y1 Z̃ ... y2 yN y1 y2 yN Observed (d) Our Nonparametric VAE (e) Our Inference Scheme Figure 1: Contrasting variational approximation schemes for unsupervised learning. (a) We specify an unsupervised generative model from latent Z to observed Y . (b) The VAE proposes a fully factored variational approximation. (c) Inference proceeds by conditioning the variational latent parameters on observed data through an explicit deterministic function (e.g. MLP network). (d) Our model proposes an additional latent space X that ties together the factored Z space. (e) Inference then proceeds with X also conditioned on observed data through an additional deterministic function. For tractable inference we match moments between Z and Z̃. observed data. In this paper we introduce an additional latent variable X that model the interaction between the latent variables Z. Our approach means that Z are no longer independent but conditionally independent given X. This leads to the following updated evidence lower bound with an additional divergence term as, Ls = Lg − KL(qg (Z|Y)||ps (Z|X)), (1) where Lg and qg (zi |yi ) is the standard VAE lower bound and approximative posterior respectively. To facilitate the use of batch processing we will rather than matching the joint distribution of the latent space match the predictive posteriors. As each Z is conditionally independent given the observed data Y this leads to the following updated objective function, Y Y L0s = Lg − KL( qg (zi |yi )|| ps (zi |X, z¬i )). (2) i i The predictive posterior of the Gaussian process is, p(zi |X, z¬i ) = N (k(xi , X¬i )k(X¬i , X¬i )−1 z¬i , k(xi , xi ) − k(xi , X¬i )k(X¬i , X¬i )k(X¬i , xi )) (3) where k(·, ·) is the covariance function. Evaluating this posterior for N datapoints is computationally expensive due to the inverse of the covariance function. To proceed we will introduce two additional approximations, first we will approximate the mean of the predictive posterior of the GP by directly parametrising it as, µ(zi ) = k(xi , X¬i )k(X¬i , X¬i )−1 z¬i ≈ Wi z¬i . (4) 1×N In specific we will parametrise the weight matrix Wi ∈ RP such that the approximative predictive mean for zi is a convex combination of z¬i , i.e. that j Wij = 1, ∀i and Wij ≥ 0, ∀i, j. The 2 intuition behind this is that we want to encourage sharing in the latent space X such that the space Z is represented in a distributed fashion. Secondly rather than minimising the KL-divergence we will match the first mode of the two distributions. This leads to our final objective function, X L̃s = Lg − (E[zi ] − E[z̃i ])2 , (5) i where z̃ is the prediction of the latent space from X while z is the prediction using the approximative posterior from the VAE. In effect we have separated the two models while retaining a connection by matching their first modes when predicting the latent space Z. We will now proceed to show the experimental evaluation of the model showing that we are capable of using the additional lowdimensional latent space X as a proxy for the VAE latent space Z. 2 Experiments In this paper we choose to model Wi,j as a squared exponential covariance kernel between input locations, xi and xj ,   kxi − xj k2 (6) Wi,j = k(xi , xj ) = σ 2 exp − i 6= j 2l2 and infer its parameters. We ensure Wi,i = 0 by subtracting the diagonal from the computed W and normalise by rows to create a convex combination. The latent locations X are represented implicitly as a function of the observed data as in Lawrence and Quiñonero-Candela [2006]. We trained models to illustrate that our extension can be used to obtain a low-dimensional X space that is highly interpretable while permitting the use of a high-dimensional Z space to provide high quality data generation. We validate our approach, with comparison to a standard VAE, by showing data embeddings in the X space and generation of new data. All experiments were performed with the decoder and both encoders as Multilayer Perceptrons (MLP) with the same architecture as in the original VAE Kingma and Welling [2014]; we used two hidden layers of 500 units each, mini-batch sizes of 128 and a drop-out probability of 0.9 throughout training. The decoder used was the Bernoulli MLP variant. Furthermore, the ADAM Kingma and Ba [2014] optimiser was used with a learning rate of 10−3 . We varied the dimensionality of the inner most layer of the autoencoder (the Z space) for the experiments. We used the MNIST data set from LeCun et al. [1998] comprised of 55 000 training examples and 10 000 test examples of 28 × 28 pixel greyscale images, corresponding to 784 data dimensions. In Fig. 2 we show a 2-dimensional X space corresponding to a 500-dimensional Z space with both the training and test data embedded as well as examples of data generation. Despite using a high capacity Z space, the nonparametric VAE can still sample from a low dimension (in our example 2D) using ancestral sampling from the X space. This ensures that test samples maintain a high fidelity from a space that is highly interpretable, easy to visualise and easy to sample from. In Fig. 3 we show corresponding X space embeddings for different dimensionalities of Z; this demonstrates that the X space maintains its virtues independent of the Z dimension. Finally, in Fig. 4, we show sample interpolations in the latent space for the standard VAE (directly in Z) and with our extension (in X) illustrating that not only is the reconstruction quality preserved but interpolations are more meaningful. 3 Conclusions We have presented a hierarchical model for unsupervised learning and an associated efficient approximative inference scheme. The inference takes inspiration from amortised inference and use a recognition model to parameterise the approximate posterior using a deterministic relationship from the observed data. Rather than using a traditional mean-field approximation which forces the latent representation to be independent we introduce an additional latent representation that models their dependence. Our model results in a significantly lower dimensional latent representation allowing us to visualise and generate data in a intuitive manner without sacrificing the quality of the reconstruction. We have shown experimental results on how we can retain the representative power of a 500 dimensional model with just a 2 dimensional latent space. 3 (a) Training X (b) Test X (c) Samples Figure 2: Learned X space embeddings from the nonparametric VAE. Inferred X locations for (a) the training data and (b) the test data with colors encoding the MNIST digit classes. (c) Generated samples from the corresponding locations in (b) using a Z space with 500 dimensions. VAE np-VAE zi ∈ R2 zi ∈ R10 zi ∈ R100 zi ∈ R1000 Figure 3: Latent space visualisation. Upper row: the Z space embedding is visualised for the standard VAE where possible (we are unable to do this for high-dimensional Z). Bottom row: the same Z space dimensionalities are used but the nonparametric VAE allows the X space to be visualised and sampled (set to be 2-dimensional). Z spaces of higher dimension become impractical to visualise and interpret whereas the X space provides an embedding for easy display and interpretation. VAE zi ∈ R 2 zi ∈ R500 np-VAE zi ∈ R 2 zi ∈ R500 Figure 4: Latent space interpolation. The upper two rows show interpolants between two MNIST training examples for a standard VAE with a Z latent dimensionality of 2 and 500. The bottom two rows show interpolants between the same training examples for our nonparametric VAE with the same respective dimensionalities for Z but where the interpolation is performed in the inferred latent space X of dimension 2. We observe that a similar reconstruction quality is obtained by corresponding Z-dimensionalities, however, the interpolants from the X space of the nonparametric VAE are more meaningful with credible intermediate states between digits. Thus we can obtain a low dimensional latent space that provides interpretability without sacrificing reconstruction quality. 4 References Diederik P Kingma and Max Welling. Auto-Encoding Variational Bayes. In International Conference on Learning Representations (ICLR), 2014. Neil D Lawrence. Probabilistic non-linear principal component analysis with Gaussian process latent variable models. Journal of Machine Learning Research, 6:1783–1816, 2005. Matthew D Hoffman and Matthew J Johnson. ELBO Surgery: Yet Another Way to Carve up the Variational Evidence Lower Bound. In Workshop in Advances in Approximate Bayesian Inference, NIPS, 2016. Jakub M Tomczak and Max Welling. VAE with a VampPrior. arXiv preprint arXiv:1705.07120, 2017. Xi Chen, Diederik P Kingma, Tim Salimans, Yan Duan, Prafulla Dhariwal, John Schulman, Ilya Sutskever, and Pieter Abbeel. Variational Lossy Autoencoder. arXiv preprint arXiv:1611.02731, 2016. Shengjia Zhao, Jiaming Song, and Stefano Ermon. Towards a Deeper Understanding of Variational Autoencoding Models. arXiv preprint arXiv:1702.08658, 2017. Neil D Lawrence and J Quiñonero-Candela. Local distance preservation in the GP-LVM through back constraints. Proceedings of the 23rd international conference on Machine learning, pages 513–520, 2006. Diederik Kingma and Jimmy Ba. ADAM: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014. Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. Gradient-Based Learning Applied to Document Recognition. Proceedings of the IEEE, 86(11):2278–2323, 1998. 5
2cs.AI
Robustly Learning a Gaussian: Getting Optimal Error, Efficiently Ilias Diakonikolas∗ CS, USC [email protected] arXiv:1704.03866v2 [cs.DS] 5 Nov 2017 Jerry Li § EECS & CSAIL, MIT [email protected] Gautam Kamath† EECS & CSAIL, MIT [email protected] Ankur Moitra¶ Math & CSAIL, MIT [email protected] Daniel M. Kane‡ CSE & Math, UCSD [email protected] Alistair Stewartk CS, USC [email protected] November 7, 2017 Abstract We study the fundamental problem of learning the parameters of a high-dimensional Gaussian in the presence of noise — where an ε-fraction of our samples were chosen by an adversary. We give robust estimators that achieve estimation error O(ε) in the total variation distance, which is optimal up to a universal constant that is independent of the dimension. In the case√where just the mean is unknown, our robustness guarantee is optimal up to a factor of 2 and the running time is polynomial in d and 1/ε. When both the mean and covariance are unknown, the running time is polynomial in d and quasipolynomial in 1/ε. Moreover all of our algorithms require only a polynomial number of samples. Our work shows that the same sorts of error guarantees that were established over fifty years ago in the one-dimensional setting can also be achieved by efficient algorithms in high-dimensional settings. ∗ Supported by NSF CAREER Award CCF-1652862, a Sloan Research Fellowship, and a Google Faculty Research Award. † Supported by NSF CCF-1551875, CCF-1617730, CCF-1650733, and ONR N00014-12-1-0999. ‡ Supported by NSF CAREER Award CCF-1553288 and a Sloan Research Fellowship. § Supported by NSF CAREER Award CCF-1453261, CCF-1565235, a Google Faculty Research Award, and an NSF Graduate Research Fellowship. ¶ Supported by NSF CAREER Award CCF-1453261, CCF-1565235, a Packard Fellowship, a Sloan Research Fellowship, a grant from the MIT NEC Corporation, and a Google Faculty Research Award. k Supported by a USC startup grant. 1 Introduction 1.1 Background The most popular and widely used modeling assumption is that data is approximately Gaussian. This is a convenient simplification to make when modeling velocities of particles in an ideal gas [Goo15], measuring physical characteristics across a population (after controlling for gender), and even modeling fluctuations in a stock price on a logarithmic scale. However, real data is not actually Gaussian and is at best crudely approximated by a Gaussian (e.g., with heavier tails). What’s worse is that estimators designed under this assumption can perform poorly in practice and be heavily biased by just a few errant samples that do not fit the model. For over fifty years, the field of robust statistics [HR09, HRRS86, RL05] has studied exactly this phenomenon — the sensitivity or insensitivity of estimators to small deviations in the model. Unsurprisingly, one of the central questions that shaped its development was the problem of learning the parameters of a one-dimensional Gaussian distribution when a small fraction of the samples are arbitrarily corrupted. More precisely, in 1964, Huber [Hub64] introduced the following model: Definition 1. In Huber’s contamination model, we are given samples from a distribution D = (1 − ε)N (µ, σ 2 ) + εZ , where N (µ, σ 2 ) is a Gaussian of mean µ and variance σ 2 , and Z is an arbitrary distribution chosen by an adversary. Intuitively, among our samples, about a (1−ε) fraction will have been generated from a Gaussian and are called inliers, and the rest are called outliers or gross corruptions. We will work with an even more challenging1 model — called the strong contamination model (Definition 2) — where the adversary is allowed to look at the inliers and then decide on the outliers. The literature on robust statistics has given numerous explanations and empirical investigations [GCSR14, Ham01] into how such outliers might arise as the result of equipment failure, data being entered incorrectly, or even from a subpopulation that was not accounted for in a medical study. These types of errors are erratic and difficult to model, so instead our goal is to design a procedure that accurately estimates µ and σ 2 without making any assumptions about them. In one dimension, the median and median absolute deviation are well-known robust estimators for the mean and variance respectively. In particular, given samples X1 , X2 , . . . , Xn , we can compute µ b = median(X1 , X2 , . . . , Xn ) and σ b= median(|Xi − µ b|) , −1 Φ (3/4) where Φ is the cumulative distribution of the standard Gaussian. (This scaling constant is needed to ensure that σ b is an unbiased estimator when there is no noise.) If n ≥ C logε21/δ , then with probability at least 1 − δ we have that dT V (N (µ, σ 2 ), N (b µ, σ b2 )) ≤ Cε. In Huber’s contamination model, this is the strongest type of error guarantee we could hope for2 and captures both the task of learning the underlying parameters µ and σ 2 , and finding the approximately best fit to the observed distribution within the family of one-dimensional Gaussians. In fact there are plentifully many other estimators — such as the trimmed mean, winsorized mean, Tukey’s biweight function, 1 None of the results in our paper were previously known in Huber’s contamination model either. The reason we work with this stronger model is because we can — nothing in our analysis relies on the inliers and outliers being independent. 2 See Lemma 17. 1 and the interquartile range — that achieve the same sorts of error guarantees, up to constant factors. The design of robust estimators for location (e.g., estimating µ) and scale (e.g., estimating σ 2 ) is guided by certain overarching principles, such as the notion of the influence curve [HRRS86] or the notion of breakdown point [RL05]. In some cases, it is even possible to design robust estimators that are minimax optimal [Hub64]. These days, much of modern data analysis revolves around high-dimensional data — for example, when we model documents [BNJ03], images [OF96], and genomes [NJB+ 08] as vectors in a very high-dimensional space. The need for robust estimators is even more pressing in these applications, since it is infeasible to remove obvious outliers by inspection. However, adapting robust statistics to high-dimensional settings is fraught with challenges. The principles that guided the design of robust estimators in one dimension seem to inherently lead to high-dimensional estimators that are hard to compute [Ber06, HM13]. In this paper, we focus on the central problem of learning the parameters of a multivariate Gaussian N (µ, Σ) in the strong contamination model. The textbook estimators for the mean and covariance – such as the Tukey median [Tuk75] and minimum volume enclosing ellipsoid [Rou85] – essentially search for directions where the projection of D is suitably non-Gaussian. However, trying to find a direction where the projection is non-Gaussian can be like looking for a needle in an exponentially-large haystack – these statistics are not efficiently computable, in general. Furthermore, a random projection will look Gaussian with high probability [Kla07]. In this paper, our main result is an efficiently computable estimator for a high-dimensional Gaussian that achieves error b ≤ Cε dT V (N (µ, Σ), N (b µ, Σ)) in the strong contamination model, for a universal constant C that is independent of the dimension. For a Gaussian distribution, we consider estimation in terms of total variation distance, which is equivalent to estimating the parameters under the natural measures. Our main idea is to use various regularity conditions satisfied by the inliers to make the problem of searching for non-Gaussian projections easier. When just the mean µ is unknown, our algorithm runs in time polynomial in the dimension d and 1/ε. When both the mean and covariance are unknown, our algorithm runs in time polynomial in d and quasi-polynomial in 1/ε. All of our algorithms achieve polynomial sample complexity. Prior to our work, the best known algorithm of Diakonikolas et al. [DKK+ 16] achieved estimation error O(ε log 1/ε) for this problem3 , again with respect to total variation distance. Concurrently, Lai, Rao and Vempala [LRV16] gave an algorithm which achieves estimation error roughly O(ε1/2 log1/2 d). In fact, the algorithm of Diakonikolas et al. [DKK+ 16] works in a stronger model than what we consider here, where an adversary gets to look at the samples and then decides on an ε-fraction to move arbitrarily. Such errors are both additive and subtractive (because inliers are removed). Interestingly, Diakonikolas, Kane and Stewart [DKS17] proved that any Statistical Query learning algorithm that works in such an additive and subtractive model and achieves an error guarantee asymptotically better than O(ε log1/2 1/ε) must make a super-polynomial number of statistical queries. Our work shows a natural conclusion that in an additive only model it is possible to algorithmically achieve the same error guarantees as are possible in the one-dimensional case, up to a universal constant. 3 We note that, as stated, the results in [DKK+ 16] give estimation error O(ε log3/2 1/ε). However, combining the techniques in [DKK+ 16] with the arguments in Section 7 of this paper gives the stated bound. This argument will be included in the full version of [DKK+ 16]. 2 1.2 Our Results and Techniques In what follows, we will explain both our work as well as prior work through the following lens: At the core of any robust estimator is some procedure to certify that the estimates have not been moved too far away from the true parameters by a small number of corruptions. First, we consider the subproblem where the covariance Σ = I is known and only the mean µ is unknown. In the terminology of robust statistics, this is called robust estimation of location. If we could compute the Tukey median, we would have an estimate that satisfies dT V (N (µ, I), N (b µ, I)) ≤ Cε. The way that the Tukey median guarantees that it is close to the true mean is that along every direction u it is close to the median of the projection of the samples. More precisely, at least a 1−ε T T b, and at least a 1−ε fraction of the samples satisfy 2 fraction of the samples satisfy u Xi ≥ u µ 2 T T u µ b ≥ u Xi . However, if we have a candidate µ b, finding a direction u that violates this condition is again like searching for a needle in an exponentially large haystack. The approach of Diakonikolas et al. [DKK+ 16] was essentially a data-dependent way to search for appropriate directions u, by looking for directions where the empirical variance is larger than it should be (if there were no corruptions). However, because their approach considers only a single direction at a time, it naturally gets stuck at error Θ(ε log1/2 1/ε). This is because along the direction u, only when a point is Ω(log1/2 1/ε) away from most of the rest of the samples can we be relatively confident that it is an outlier. Thus, an adversary could safely place all the corruptions in the tails and move the mean by as much as Θ(ε log1/2 1/ε). This would not affect the Tukey median by as much, but would affect an estimate based on the empirical mean (because the algorithm could find no other outliers to remove) by considerably more. Our approach is to consider logarithmically many directions at once. Even though an inlier can be logarithmically many standard deviations away from the mean along a single direction u with reasonable probability, it is unlikely to be that many standard deviations away simultaneously across many orthogonal directions. Essentially, this allows us to remove the influence of outliers on all but a logarithmic dimensional subspace. Combining this with an algorithm for robustly learning the mean in time exponential in the dimension (but polynomial in the number of samples), we obtain our first main result: Theorem 1. Suppose we are given a set of n = poly(d, 1/ε) samples from the strong contamination model, where the underlying d-dimensional Gaussian is N (µ, I). Let ε ≤ ε0 , where ε0 is a positive universal constant. For any β > 0, there is an algorithm to learn an estimate N (b µ, I) that with high probability satisfies    1 1 2 ε. dT V (N (µ, I), N (b µ, I)) ≤ √ + O √ + ε β 2 Moreover, the algorithm runs in time poly(n, (1/ε)β ). We prove an almost matching lower bound of 2ε + Ω(ε2 ) on the estimation error. Thus, our √ robustness guarantee is optimal up to a factor√of 2, even among computationally inefficient robust estimators. Interestingly, our extra factor of 2 comes from the following geometric fact which we make crucial √ use of: Any convex body of diameter D in any dimension can be covered by a ball of radius D/ 2, and moreover such a ball can be (approximately) found in time exponential in the dimension. Suppose that along some direction u we have an estimate p that is guaranteed to be within ε/2 of the projection of the true mean µ. We can now confine µ to a slab of width ε, and by taking the intersection of all such slabs we get a convex body that contains µ and has diameter of 3 √ at most ε. By covering √ the body with a ball of radius ε/ 2, we are guaranteed that the center of the ball is within ε/ 2 of the true mean. This gives us a general way to combine one-dimensional robust estimates along a net of directions. We note that, for general isotropic sub-Gaussian distributions, the bound of O(ε log1/2 1/ε) of [DKK+ 17] is optimal for robust mean estimation, even in one dimension. See Section A for a proof of this fact. However, our results can be seen to hold more generally than stated above – indeed, the same arguments work for a class of symmetric isotropic sub-Gaussian distributions which are sufficiently smooth near their mean. More precisely, we require that along any univariate projection, the mean is robustly estimated by the median. We next consider the subproblem where the mean µ = 0 is known and only the covariance Σ is unknown. In the terminology of robust statistics, this is called robust estimation of scale. In this b that satisfies4 kΣ − Σk b F ≤ Cε. When Σ b does not satisfy case, we want to compute an estimate Σ this condition, it can be shown (in Section 6.2.3) that there is a degree-two polynomial p(X), where E [p(X)] = 1 and X∼N (0,Σ) E [p(X)] = 1 + C ′ ε . b X∼N (0,Σ) It turns out that, even given the polynomial p(X), deciding whether or not the above conditions b we can certainly compute E approximately hold is challenging. Given p(X) and Σ, b [p(X)]. X∼N (0,Σ) But given only contaminated samples from N (0, Σ) and without knowing what Σ is, can we estimate EX∼N (0,Σ) [p(X)]? Often, univariate robust estimation problems are considered easy, with a simple recipe: Construct an unbiased estimator for the statistic for which each sample point has low influence. However, in our setting, it is highly non-trivial to construct such an estimator. The naive attempt in this case would be the median – this immediately fails since the distribution of p(X) is asymmetric. Even if there were no noise, that would not necessarily be an unbiased estimator. So how can we dampen the influence of outliers, if there is no natural symmetry in the distribution? We construct a robust estimator crucially using the fact that p(X) is the weighted sum of chi-squared random variables when there is no noise. The key structural fact we exploit is the following: Given two sums of chi-squared random variables, if the random variables are far in total variation distance, most of their difference must lie close to their means. We use this fact to show how, given a weak estimate of the mean (i.e., one which is only accurate up ω(ε)), one can improve the estimate by a constant factor. Our result follows by an iterative application of this technique. However, there is still a major complication in utilizing our low-dimensional estimator to obtain a high-dimensional estimator. In the unknown mean case, we knew the higher-order moments (since we assumed that the covariance is the identity). Here, we do not have control over the higher-order moments of the unknown Gaussian. Overcoming this difficulty requires several new techniques, which are quite complicated, and we defer the full details to Section 6. Our second main result is: Theorem 2. Suppose we are given a set of n = poly(d, 1/ε) samples from the strong contamination model, where the underlying d-dimensional Gaussian is N (0, Σ). There is an algorithm to learn an b that runs in time poly(n, (1/ε)O(log 4 1/ε) ) and with high probability satisfies estimate N (0, Σ) b ≤ Cε , dT V (N (0, Σ), N (0, Σ)) for a universal constant C that is independent of the dimension. 4 More precisely, to obtain O(ε) error guarantee with respect to the total variation distance, we need to robustly approximate Σ within O(ε) in Mahalanobis distance, which is a stronger metric than the Frobenius norm. As part of our approach, we are able to efficiently reduce to the case that Σ is close to the identity matrix, in which case the Frobenius error suffices. 4 A key technical problem arises when we attempt to combine estimates for the covariance restricted to a subspace and its orthogonal complement. We refer to this as a stitching problem, where if we write Σ as   ΣV AT , Σ= A ΣV ⊥ and have accurate estimates for ΣV and ΣV ⊥ , we still need to accurately estimate A. Our algorithm utilizes an unexpected connection to the unknown mean case: We show that, under a carefully chosen projection scheme, we can simulate noisy samples from a Gaussian with identity covariance, where the mean of this distribution encodes the information needed to recover A. We defer the full details to Section 6.4. It turns out that we can solve the general case when both µ and Σ are unknown, by directly reducing to the previous subproblems, exactly as was done in [DKK+ 16] (with some caveats, addressed in Section 4.4). Since all of our error guarantees are optimal up to constant factors, there is only a constant factor loss in this reduction. Finally, we obtain the following corollary: Corollary 1. Suppose we are given a set of n = poly(d, 1/ε) samples from the strong contamination model, where the underlying d-dimensional Gaussian is N (µ, Σ). There is an algorithm to learn an b that runs in time poly(n, (1/ε)O(log 4 1/ε) ) and with high probability satisfies estimate N (b µ, Σ) b ≤ Cε , dT V (N (µ, Σ), N (b µ, Σ)) for a universal constant C that is independent of the dimension. This essentially settles the complexity of robustly learning a high-dimensional Gaussian. The sample complexity of our algorithm depends polynomially on d and 1/ε, and the running time depends polynomially on d and quasi-polynomially on 1/ε. Up to a constant factor, ours is the first high-dimensional algorithm that achieves the same error guarantees as in the one-dimensional case, where results were known for more than fifty years! It is an interesting open problem to reduce the running time to polynomial in 1/ε (while still being polynomial in d). As we explain in Section 6.6, this seems to require fundamentally new ideas. More Related Work In addition to the works mentioned above, there has been an exciting flurry of recent work on robust high-dimensional estimation. This includes studying graphical models in the presence of noise [DKS16], tolerating much more noise by allowing the algorithm to output a list of candidate hypotheses [CSV17], formulating general conditions under which robust estimation is possible [SCV18], developing robust algorithms under sparsity assumptions [Li17, DBS17, BDLS17] where the number of samples is sublinear in the dimension, and leveraging theoretical insights to give practical algorithms that can be applied to genomic data [DKK+ 17]. We note that, in comparison to all these other works, ours is the only to efficiently achieve the information-theoretically optimal error guarantee (up to constant factors). Despite all of this rapid progress, there are still many interesting theoretical and practical questions left to explore. 1.3 Organization In Section 2, we go over preliminaries and notation that we will use throughout the paper. In Section 3, we describe an algorithm for robustly estimating the mean of a Gaussian in low-dimensional settings, and crucially apply it in the design of an algorithm for mean-estimation in high dimensions, described in Section 4. Similarly, in Section 5, we give an algorithm for robustly estimating 5 the mean of degree-two polynomials in certain settings, which is applied in the context of our covariance-estimation algorithm in Section 6. Finally, we put these tools together and describe our general algorithm for robustly estimating a Gaussian in Section 7. 2 Preliminaries In this section, we give various definitions and lemmata we will require throughout the paper. First, given a distribution F , we let EF [f (X)] = EX∼F [f (X)] denote the expectation of f (X) under F . If S is a finite set, we let ES [f (X)] = EX∼unif(S) [f (X)] denote the expectation of f (X) under the uniform distribution over points in S (i.e., the empirical mean of f under S). Given any subspace V ⊆ Rd , we let ΠV : Rd → Rd be the projection operator onto V . If V = span(v) is 1-dimensional, we will denote this projection as Πv . 2.1 The Strong Contamination Model Here we formally define the strong contamination model. Definition 2. Fix ε > 0. We say a set of samples X1 , . . . , Xn was generated from the strong contamination model on a distribution F , if it was generated via the following process: 1. We produce (1 − ε)n i.i.d. samples G from F . 2. An adversary is allowed to observe these samples and add εn points E arbitrarily. We are then given the set of samples G ∪ E in random order. Also, we will say that the samples X1 , . . . , Xn are ε-corrupted. Moreover given an ε-corrupted set of samples S, we will write S = (G, E) where G is the set of uncorrupted points and E is the set of corrupted points. Moreover, given a subset S ′ ⊂ S, we will also write S ′ = (G′ , E ′ ), where G′ = S ′ ∩ G and E ′ = S ′ ∩ E denote the set of uncorrupted points and corrupted points remaining in S ′ . L will denote G \ G′ , which is the set of “lost” uncorrupted points. Given a contaminated set S ′ = (G′ , E ′ ) and a set G so that G′ ⊆ G, define the following quantities φ(S ′ , G) = |G \ G′ | , |S ′ | ψ(S ′ , G) = |E ′ | , |S ′ | ∆(S ′ , G) = ψ(S ′ , G) + φ(S ′ , G) log 1 . φ(S ′ , G) (1) In particular, observe that if ∆(S ′ , G) < O(ε), then a simple calculation implies that φ(S ′ , G) ≤ O(ε/ log 1/ε). Equivalently, we have removed at most an O(ε/ log 1/ε) fraction of good points from G. This is crucial, as if we throw out an ε-fraction of good points then we essentially put ourselves in the subtractive model, and there our guarantees no longer hold. There are two differences between the strong contamination model and Huber’s contamination model. First, the number of corrupted points is fixed to be εn instead of being a random variable. However, this difference is negligible. It follows from basic Chernoff bounds that n samples from Huber’s contamination model with parameter ε (for n sufficiently large) can be simulated by a (1 + o(1))ε-corrupted set of samples, except with negligible failure probability. Hence, we lose only an additive o(ε) term when translating from Huber’s contamination model to the strong contamination model, which will not change any of the guarantees in our paper. The second difference is that the adversary is allowed to inspect the uncorrupted points before deciding on the corrupted points. This makes the model genuinely stronger since the samples we are given are no longer completely independent of each other. 6 2.2 Deterministic Regularity Conditions In analyzing our algorithms, we only need certain deterministic regularity conditions to hold on the uncorrupted points. In this subsection, we formally state what these conditions are. It follows from known concentration bounds that these conditions all hold with high probability given a polynomial number of samples. Now with these regularity conditions defined once and for all, we will be able to streamline our proofs in the sense that each step in the analysis will only ever use one of these fixed set of conditions and will not use the randomness in the sampling procedure. We remark that some subroutines in our algorithm only need a subset of these conditions to hold, so we could improve the sample complexity by changing the regularity conditions we need at each step. However, since we will not be concerned with optimizing the sample complexity beyond showing that it is polynomial, we choose not to complicate our proofs in this manner. 2.2.1 Regularity Conditions for Unknown Mean In the unknown mean case, we will require the following condition: Definition 3. Let G be a multiset of points in Rd and η, δ > 0. We say that G is (η, δ)-good with respect to N (µ, I) if the following hold: p • For all x ∈ G we have kx − µk2 ≤ O( d log(|G|/δ)). • For every affine function L : Rd → R we have | PrG (L(X) ≥ 0) − PrN (µ,I) (L(X) ≥ 0)| ≤ η/(d log(d/ηδ)) . • We have that k EG [X] − EN (µ,I) [X]k2 ≤ η. • We have that kCovG [X] − Ik2 ≤ η/d. • For any even degree-2 polynomial p : Rd → R we have that E[p(X)] − G E[p2 (X)] − G E [p(X)] ≤ η N (µ,I) E [p2 (X)] ≤ η N (µ,I) E [p2 (X)]1/2 , N (µ,I) E [p2 (X)], and N (µ,I) Pr[p(X) ≥ 0] ≤ Pr [p(X) ≥ 0] + G N (µ,I) η . d log(|G|/δ) It is easy to show (see Lemma 6) that given enough samples from N (µ, I), the empirical data set will satisfy these conditions with high probability. 2.2.2 Regularity Conditions for Unknown Covariance In the unknown covariance case, we will require the following condition: Definition 4. Let G be a set of n points of Rd , and η, δ > 0. We say that G is (η, δ)-good with respect to N (0, Σ) if the following hold: • For all x ∈ G we have that xT Σ−1 x = O(d log(|G|/δ)). 7 • For any even degree-2 polynomial p : Rd → R we have E[p(X)] − G E[p2 (X)] − G E [p(X)] ≤ η N (0,Σ) E [p2 (X)] ≤ η N (0,Σ) E [p2 (X)]1/2 , N (0,Σ) E [p2 (X)] and N (0,Σ) Pr [p(X) ≥ 0] ≤ Pr [p(X) ≥ 0] + X∼G N (0,Σ) η2 . d log(|G|/δ) • For any even degree-4 polynomial p : Rd → R we have E[p(X)] − G E [p(X)] ≤ η Var [p(X)]1/2 , N (0,Σ) N (0,Σ) Pr[p(X) ≥ 0] ≤ Pr [p(X) ≥ 0] + G N (µ,I) η2 . 2 log(1/ε)(d log(|G|/δ))2 As before, it is easy to show (see Lemma 14) that given enough samples from N (0, Σ), the empirical data set will satisfy these conditions with high probability. 2.3 Bounds on the Total Variation Distance We will require some simple bounds on the total variation distance between two Gaussians. These bounds are well-known. Roughly speaking, they say that the total variation distance between two Gaussians with identity covariance is governed by the ℓ2 norm between their means, and the total variation distance between two Gaussians with mean zero is governed by the Frobenius norm between their covariance matrices, provided that the matrices are close to the identity. Lemma 1. Let µ1 , µ2 ∈ Rd be such that kµ1 − µ2 k2 = ε for ε < 1. Then   1 dTV (N (µ1 , I), N (µ2 , I)) = √ + o(1) ε . 2π For clarity of exposition we defer this calculation to the Appendix. We also need to bound the total variation distance between two Gaussians with zero mean and different covariance matrices. The natural norm to use is the Mahalanobis distance. But in our setting, we will be able to use the more convenient Frobenius norm instead (because we effectively reduce to the case that the covariance matrices will be close to the identity): b be such that kΣ−IkF ≤ O(ε log 1/ε), and kΣ− Σk b F ≤ Lemma 2 (Cor. 2.14 in [DKK+ 16]). Let Σ, Σ b ≤ O(ε). Cε. Then dTV (N (0, Σ), N (0, Σ)) These lemmata show that parameter estimation and approximation in total variation distance are essentially equivalent. Indeed, in this paper, we achieve both guarantees, but state our results in terms of total variation estimation. 3 Robustly Learning the Mean in Low Dimensions This section is dedicated to the proof of the following theorem: 8 Theorem 3. Fix µ ∈ Rd , and let ε, γ, δ > 0. Let S0 = (G0 , E0 ) be such that G0 is a (γε, δ)-good set with respect to N (µ, I), and |E0 |/|S0 | ≤ ε. Let S = (G, E) be another set with ∆(S, S0 ) < ε. Let V ⊆ Rd be a subspace. For all 0 < ρ < 1, the algorithm LearnMeanLowD(V, γ, ε, δ, S, ρ) runs in time poly(d, |S|, (1/ρ)O(dim(V )) , log(ρε/(1 − ρ)), log(1/ρ)) and returns a µ e so that kΠV (µ − µ e)k2 =  γ  1 + 2ρ √ ε. π+O 1−ρ d √ In particular, as we let ρ, γ → 0, the √ parameter estimation error approaches πε (corresponding to a total variation approximation of ε/ 2). In Lemma 17 p in the Appendix we show√that no algorithm can achieve parameter estimation error better than π2 ε. Thus, we achieve a 2 approximation to the optimal error. For simplicity, in the rest of this section, we will let V = Rd , that is, we assume there is no projection. It should be clear that this can be done without loss of generality. Our algorithm proceeds as follows: First, we show that in one dimension, the median produces an estimate which is optimal, up to lower order terms, if the sample set is (γε, δ)-good with respect to the underlying d Gaussian. Then, we show that p π by using a net argument, we can produce a convex body in R with diameter at most 2R = 2( 2 + o(1))ε which must contain the true mean. Finally, we use an old √ result of Jung [Jun01] that such a set can be circumscribed by a ball of radius 2R (see [BW41] for an English language version of the result). We use the center of the ball as our estimate µ e. 3.1 Robustness of the Median First we show that if we projectponto one dimension, then the median of the corrupted data differs from the true mean by at most π2 ε + o(ε). Our proof will rely only on the notion of a (γε, δ)-good set with respect to N (µ, I) and thus it works even in the strong contamination model. Formally, we show: Lemma 3. Fix any v ∈ Rd . Fix µ ∈ Rd , and let δ > 0. Let S0 = (G0 , E0 ) be so that G0 be a set  with (γε, δ)-good set with respect to N (µ, I), and |E0 |/|S0 | ≤ ε. Let S = (G, E) be another pπ γ ε. ∆(S, S0 ) < ε. Let b be the median of S when projected onto v. Then, |b − Πv µ| ≤ 2 +O d Proof. For any a ∈ R, we have Pr [hv, Xi > a] = X∼S Observe that we have |E| |S| |G| |E| Pr [hv, Xi > a] + Pr [hv, Xi > a] . |S| X∼G |S| X∼E PrX∼E [hv, Xi > a] ≤ ψ(S, G). Moreover, by simple calculation we have Pr [hv, Xi > a] − Pr [hv, Xi > a] ≤ 2φ(S, G) . X∼G X∼G0 Hence, we have Pr [hv, Xi > a] − X∼S |G| Pr [hv, Xi > a] ≤ ψ(S, G) + o(ε) , |S| X∼G0 since by assumption ∆(S, G) ≤ ε. Similarly, we have that for all a ∈ R, Pr [hv, Xi < a] − X∼S |G| Pr [hv, Xi < a] ≤ ψ(S, G) + o(ε) . |S| X∼G0 9 For |a| = O(ε) we have that PrN (0,I) [X > a] = 12 − √12π a + O(ε3 ). Thus, by (γε, δ)-goodness of G0 , this implies that for |a| = O(ε), we have    γε  |G| 1 1 Pr [hv, Xi > Πy µ + a] − . (2) − √ a ≤ ψ(S, G) + O X∼S |S| 2 d 2π Thus, for |a| = O(ε) we have r    γε  |G| 1 1 |E| π + o(ε) a] ≤ −√ a + +O Pr [hv, Xi > Πy µ + X∼S 2 |S| 2 |S| d 2π  γε  1 |G| 1 |E| √ a+ ≤ − + o(ε) . +O 2 |S| 2π 2|S| d   pπ  p In particular, we see that if a > π2 ε + O γε d  + o(ε), then PrX∼S p π hv, Xi > Πy µ + 2 ε < 1/2. By symmetric logic, we also have that Pr hv, Xi > Πy µ − 2 ε > 1/2. Thus, the median in pX∼S π direction v differs from Πy µ by at most 2 ε + O γε d + o(ε). 3.2 Finding a Minimum Radius Circumscribing Ball For any x ∈ Rd and r > 0, let B(x, r) = {y ∈ Rd : kx − yk2 ≤ r} denote the closed ball of radius r centered at x. The following classical result of Gale gives a bound on the radius of the circumscribing ball of any convex set in terms of its diameter: Theorem 4 (see [Jun01, BW41]). Fix R > 0. Let C ⊆ Rd be a convex √ body so that for all x, y ∈ C, we have kx − yk2 ≤ 2R. Then C is contained within a ball of radius R 2. The bound is asymptotically achieved for the standard simplex as we increase its dimension. The goal of this subsection is to show that the (approximately) minimum radius circumscribing ball can be found efficiently. We will assume we are given an approximate projection oracle for the convex body that given a point y ∈ Rd , outputs a point which is almost the closest point in C to x: Definition 5. A ρ-projection oracle for a convex body C is a function O : Rd → Rd , which, given a point y ∈ Rd , outputs a point x ∈ C so that kx − yk2 ≤ inf x′ ∈C kx′ − yk2 + ρ. Our first step is to use such an oracle to construct a net for C. First, we need the following well-known bound on the size of the net. Claim 1. Fix r > 0. Then, for any β > 0, there is a β-net F for the sphere of radius r around 0 in Rd of size (r/β)O(d) . Moreover, this net can be constructed in time poly(d, |F|). With this, we can show: Lemma 4. Fix R, C as in Theorem 4, and let 1 > ρ > 0. Let x ∈ C be arbitrary. Let O be a (ρR/3)-projection oracle for C. Suppose a call to O runs in time T . Then, there is an algorithm CircumscribeNet(R, ρ, O, x) which runs in time poly((R/ρ)O(d) , T ) and outputs a set X ⊆ Rd so that X is a (ρR)-net for C, and moreover, |X | ≤ (R/ρ)O(d) . The algorithm is fairly straightforward. First, we observe that C is contained within B(x, 2R). We then form a (ρR)/3-net of B(x, 2R) using Claim 1. We then iterate over every element v of this net, and use our projection oracle to (approximately) find the closest point in C to v. If this point is too far away, we throw it out, otherwise, we add this projected point into the net. The formal pseudocode for CircumscribeNet is given in Algorithm 1. 10 Algorithm 1 Generating a net of C 1: function CircumscribeNet(R, ρ, O, x) 2: Form an ρ/3-net F ′ of the sphere of radius 2 of size (1/ρ)O(d) as in Claim 1. 3: Let F = R · F ′ + x. 4: Let X ← ∅ 5: for each v ∈ F do 6: Let uv ← O(v) 7: if kv − uv k2 ≤ 2ρR/3 then 8: Add uv to X 9: end if 10: end for 11: return X 12: end function Proof. The runtime bound follows from Claim 1. We now turn our attention to correctness. By Claim 1, and rescaling and shifting, the set F is clearly a (ρR)/3-net for a ball B of radius 2R containing C. We now claim that the set X is indeed a (ρR)/3-net for C. Fix y ∈ C. Since C ⊆ B, this implies there is some v ∈ F so that ky − vk2 ≤ ρR/3. Thus, in Line 7, when processing v, we must find some uv ∈ C so that kuv − vk2 ≤ 2ρR/3. The claim then follows from the triangle inequality. With this, we obtain: Corollary 2. Fix R, C, ρ, O, x as in Lemma 4. Suppose a call to O runs in time T . Then, there is O(d) , T ) and returns a point an algorithm Circumscribe(R, ρ, O, x) which runs √ in time poly((R/ρ) yb so that C is contained within a ball of radius 2(1 + 2ρ)R. The algorithm at this point is very simple. Using the output of CircumscribeNet, we iterate over all points √ in a net over B(x, 2R), find an x in this net so that the distance to all points in the net is at most 2(1 + ρ)R, and output any such point. The formal pseudocode for Circumscribe is given in Algorithm 2. Algorithm 2 Finding a circumscribing ball of small radius 1: function Circumscribe(R, ρ, O, x) 2: Form an ρ/3-net F ′ of B(0, 2) of size (1/ρ)O(d) as in Claim 1. 3: Let F = R · F ′ + x. 4: Let X ← CircumscribeNet(R, ρ, O, x). 5: for each v ∈ F do √ 6: if for all u ∈ X , we have ku − vk2 ≤ 2(1 + ρ)R then 7: return u 8: end if 9: end for 10: end function Proof. The√runtime bound is immediate. By Theorem 4, there is some y ∈ B(x, √ 2R) so that ′ C ⊆ B(y, R 2). Thus, by the triangle inequality, there is some y ∈ F so that C ⊆ B(y, 2(1+ρ)R). Thus, the algorithm will output some point y ′′ ∈ F. By an additional application of the triangle √ ′′ inequality, since X is a ρR-net for C, this implies that C ⊆ B(y , 2(1 + 2ρ)R), as claimed. 11 3.3 The Full Low-Dimensional Algorithm We now have all the tools to describe the full algorithm in low-dimensions. Let S be our corrupted dataset as in Theorem 3. Fix ρ > 0. We first produce a ρ-net F over the unit sphere in Rd . By (a slight modification of) Claim 1, this net has size (1/ρ)O(d) and can be constructed in time poly(d, |F|). For each v ∈ F, we project all points in S onto v, and take the median of these points to produce bv . We then construct the following set: \ C= {y ∈ Rd : hv, yi ∈ [bv − β, bv + β]} , (3) v∈F pπ γε  where β = 2 ε + O d + o(ε) is as in Lemma 3. We now show two properties of this set, which in conjunction with the machinery above, allows us to prove Theorem 3. The first shows that C has small diameter: Claim 2. For all x, y ∈ C, we have kx − yk2 ≤ 2β/(1 − ρ). Proof. Fix any x, y ∈ C. By definition of C, it follows that for all v ∈ F, we have |hx − y, vi| ≤ 2β. For any u with kuk2 = 1, there is some v ∈ F with ku − vk2 ≤ ε, and so we have |hx − y, ui| ≤ |hx − y, vi| + |hx − y, u − vi| ≤ 2β + ρkx − yk2 . Taking the supremum over all unit vectors u and simplifying yields that kx − yk2 ≤ 2β/(1 − ρ), as claimed. The second property shows that we may find an α-projection oracle for C efficiently. Claim 3. Fix ρ′ > 0. There is a ρ′ -projection oracle ProjOracle(y, ρ′ , C) for C which runs in time poly((1/ρ)O(d) , log(γε/(1 − ρ)), log(1/ρ′ )). Proof. The projection problem may be stated as min kx − yk2 s.t.hv, yi ∈ [bv − β, bv + β], ∀v ∈ F . This is a convex minimization problem with linear constraints. By the classical theory of optimization [GLS88], finding a ρ-approximate y can be done in poly(d, log(vol(C)/ρ′ )) queries to a separation oracle for C. Since the separation oracle must only consider the constraints induced by F, this can be done in time (1/ρ)O(d) . Since by Claim 2 we have vol(C) ≤ (2β/(1 − ρ))O(d) , the desired runtime follows immediately. We now finally describe LearnMeanLowD. Using convex optimization, we first find an arbitrary x ∈ C. By Lemma 3 we know µ ∈ C and so this step succeeds. After constructing C, we run Circumscribe with appropriate parameters, and return the outputted point. The formal pseudocode for LearnMeanLowD is given in Algorithm 3. Proof. The runtime claim follows from the runtime claims for Circumscribe and ProjOracle. Thus, it suffices to prove correctness of this algorithm. C. By √ 1+2ρBy Lemma 3, we know that µ√∈ 1+2ρ Claim 2 and Corollary 2, the output y satisfies B(y, 2 1−ρ β). Thus, we have kµ−yk2 ≤ 2 1−ρ β, as claimed. 12 Algorithm 3 Finding a circumscribing ball of small radius 1: function LearnMeanLowD(ε, δ, S, ρ) 2: Form a ρ-net F of B(0, 1) of size (1/ρ)O(d) as in Claim 1. 3: for each v ∈ F do 4: Let bv be the median of S projected onto v. 5: end for 6: Form C as in Equation (3). 7: Find an p x ∈ C using convex optimization.  + o(ε) 8: Let β = π2 ε + O γε d 9: Let R = β/(1 − ρ) 10: Let O(·) = ProjOracle(·, (ρR)/3, C) 11: return the output of Circumscribe(R, ρ, O, x) 12: end function 4 Robustly Learning the Mean in High Dimensions In this section, we prove the following theorem, which is our first main result: Theorem 5. Fix ε, γ, δ > 0, and let X1 , . . . , Xn be an ε-corrupted set of points from N (µ, I), where kµk2 ≤ O(ε log 1/ε), and where   (d log(d/γεδ))6 . n=Ω γ 2 ε2 Then, for every α, β > 0, there is an algorithm RecoverMean(X1 , . . . , Xn , ε, δ, γ, α, β) which runs in timepoly(d, 1/γ, 1/εβ , 1/α, log 1/δ) and outputs a µ b so that with probability 1 − δ, we have √ π+O(γ) 1 kb µ − µk2 ≤ + √β ε. 1−α In particular, observe that Theorem 5, in conjunction with Lemma 1, gives us Theorem 1, if we set γ = o(1). With this, we may state our primary algorithmic contribution: Theorem 6. Fix ε, γ, α, δ, β > 0, and let S0 = (G0 , E0 ) be an ε-corrupted set of samples of size n from N (µ, I), where kµk2 ≤ O(ε log 1/ε), and where n = poly(d, 1/(γε), log 1/δ). Suppose that G0 is (γε, δ)-good with respect to N (µ, I). Let S ⊆ S0 be a set so that ∆(S, G0 ) ≤ ε. Then, there exists an algorithm FilterMeanOpt that given S, ε, γ, α, β outputs one of two possible outcomes: √  π+O(γ) √1 + ε. (i) A µ b, so that kb µ − µk2 ≤ 1−α β (ii) A set S ′ ⊂ S so that ∆(S ′ , G0 ) < ∆(S, G0 ). Moreover, FilterMeanOpt runs in time poly(d, 1/γ, 1/εβ , 1/α, log 1/δ). + By p first running the algorithm of [DKK 16] to obtain an estimate of the mean to error O(ε log 1/ε), then running FilterMeanOpt at most polynomially many times, we clearly recover the guarantee in Theorem 5. Thus, the rest of the section is dedicated to the proof of Theorem 6. At a high level, the structure of the argument is as follows: We first show that if there is a subspace of eigenvectors of dimension at least O(log 1/ε) of the empirical covariance matrix with large associated eigenvalues, then we can produce a filter using a degree-2 polynomial (Section 4.1). Otherwise, we know that there are at most O(log 1/ε) eigenvectors of the empirical covariance 13 with a large eigenvalue. We can learn the mean in this small dimensional subspace using our learning algorithm from the previous section, and then we can argue that the empirical mean on the remaining subspace is close to the true mean (Section 4.2). This outline largely follows the structure of the filter arguments given in [DKK+ 16], however, the filtering algorithm we use here requires a couple of crucial new ideas. First, to produce the filter, instead of using a generic degree-2 polynomial over this subspace, we construct an explicit, structured, degree-2 polynomial which produces such a filter. Crucially, we can exploit the structure of this polynomial to obtain very tight tail bounds, e.g., via the Hanson-Wright inequality. This is critical to avoid a quasi-polynomial runtime. If instead we used arbitrary degree-2 polynomials in this subspace, it would need to be of dimension O(log2 1/ε) and the low-dimensional algorithm in the second step would take quasi-polynomial time. Second, we must be careful to throw out far fewer good points than corrupted points. In particular, by our definition of ∆ (which gives an additional logarithmic penalty to discarding good points) and our guarantee that ∆ decreases, our filter can only afford to throw out an ε/ log(1/ε) fraction of good points in total, since ∆ is initially ε. This is critical, as if we threw away an ε-fraction of good points, then proving that the problem remains efficiently solvable becomes problematic. In particular, if these points were thrown away arbitrarily, then this becomes the full additive and subtractive model, for which a statistical query lower bound prevents us from getting an O(ε)-approximate answer in polynomial time [DKS17]. To avoid discarding too many good points, we exploit tight exponential tail bounds of Gaussians, and observe that by slightly increasing the threshold at which we filter away points, we decrease the fraction of good points thrown away dramatically. 4.1 Making Progress with Many Large Eigenvalues We now give an algorithm for the case when there are many eigenvalues which are somewhat large. Formally, we show: Theorem 7. Fix ε, γ, δ, α, β > 0, and let S0 = (G0 , E0 ) be an ε-corrupted set of samples of size n from N (µ, I), where kµk2 ≤ O(ε log 1/ε), and where n = poly(d, 1/(γε), log 1/δ). Suppose that b be the G0 is (γε, δ)-good with respect to N (µ, I). Let S ⊆ S0 be a set so that ∆(S, G0 ) ≤ ε. Let Σ sample covariance of S, let µ b be the sample mean of S, and let V be the subspace of all eigenvectors b − I with eigenvalue more than 1 ε. Then, there exists an algorithm FilterMeanManyEig of Σ β that given S, ε, γ, δ, α, β outputs one of two possible outcomes: 1. If dim(V ) ≥ C1 β log(1/ε), then it outputs an S ′ so that ∆(S ′ , G0 ) < ∆(S, G0 ). 2. Otherwise, the algorithm outputs “OK”, and outputs an orthonormal basis for V . b − I, and if there are too Our algorithm works as follows: It finds all large eigenvalues of Σ many, produces an explicit degree-2 polynomial which, as we will argue, produces a valid filter. The formal pseudocode for our algorithm is in Algorithm 4. For clarity of exposition, we defer the proof of Theorem 7 to Appendix C. 4.2 Returning an Estimate When There are Few Large Eigenvalues At this point, we have run the filter of Algorithm 4 until there are few large eigenvalues. In the subspace with large eigenvalues, we again run the low dimensional algorithm to obtain an estimate for the mean in this subspace. Recall that Lemma 3 guarantees the accuracy of this estimator within this subspace. In the complement of this subspace, where the empirical covariance is very 14 Algorithm 4 Filter if there are many large eigenvalues of the covariance 1: function FilterMeanManyEig(S, ε, γ, δ, α, β) 2: Let C1 , C2 , C3 > 0 be sufficiently large constants. b be the empirical mean and covariance of S, respectively. 3: Let µ b and Σ b − I with eigenvalue more than 4: Let V be the subspace of Rd spanned by eigenvectors of Σ 1 β ε. 5: if dim(V ) ≥ C1 β log(1/ε) then 6: Let V ′ be a subspace of V of dimension C1 β log(1/ε). √ 7: Let µ̃ be an approximation to ΠV ′ (µ) with ℓ2 -error π+O(γ) 1−α ε, computed using LearnMeanLowD(V, γ, ε, δ, S, γ). 8: Let p(x) be the quadratic polynomial p(x) = kΠV ′ (x) − µ̃k22 − dim(V ′ ). 9: Find a value T > 0 so that either: (a) T > C2 d log(|S|/δ) and p(x) > T for at least one x ∈ S, or (b) T > 2C3 log(1/ε)/c0 and PrS (p(x) > T ) > exp(−c0 T /(2C3 )) + γε/(d log(|S|/δ)). 10: 11: 12: 13: 14: return S ′ = {x ∈ S : p(x) ≤ T } else return an orthonormal basis for V . end if end function close to the identity, Lemma 5 (stated below) shows that the empirical mean is close to the true mean. This leads to a simple algorithm which outputs an estimate for the mean, described in Algorithm 5. Algorithm 5 Return a mean if there are few large eigenvalues of the covariance 1: function FilterMeanFewEig(S, ε, γ, δ, α, β, V ) √ π+O(γ) 2: Let µ̃V be an approximation to ΠV (µ) with ℓ2 -error 1−α ε, computed using LearnMeanLowD(V, γ, ε, δ, S, γ). 3: Let µ̃V ⊥ be the empirical mean on V ⊥ , ΠV ⊥ µ̂. 4: return µ̃V + µ̃V ⊥ . 5: end function Lemma 5. Let µ, η, G0 , S be as in Theorem 7. Let µ b be the sample mean of S, and let v be a unit ε vector. Suppose that hv, µ − µ bi > β 1/2 . Then VarS [hv, Xi] > 1 + βε . For clarity of exposition, we defer the proof of Lemma 5 to Appendix C. 4.3 The Full High-Dimensional Algorithm We now have almost all the pieces needed to prove the full result. The last ingredient is the fact that, given enough samples, the good set condition is satisfied by the samples from the true distribution. Formally, Lemma 6. Fix η, δ > 0. Let X1 , . . . , Xn be independent samples from N (µ, I), where n = Ω((d log(d/ηδ))6 /η 2 ). Then, S = {X1 , . . . , Xn } is (η, δ)-good with respect to N (µ, I) with probability at least 1 − δ. 15 Proof. This follows from Lemmas 8.3 and 8.16 of [DKK+ 16]. At this point, we conclude with the proof of Theorem 5. Within the subspace V , Lemma √ π+O(γ) 3 guarantees that the mean is accurate up to ℓ2 -error 1−α ε. Within the subspace V ⊥ , the ε contrapositive of the statement of Lemma 5 guarantees the mean is accurate up to ℓ2 -error β 1/2 . The desired result follows from the Pythagorean theorem. 4.4 An Extension, with Small Spectral Noise For learning of arbitrary Gaussians, we will need a simple extension that allows us to learn the mean even in the presence of some spectral norm error in the covariance matrix. Since the algorithms and proofs are almost identical to the techniques above, we omit them for conciseness. Formally, we require: Theorem 8. Fix χ, ε, δ > 0, and let X1 , . . . , Xn be an ε-corrupted set of points from N (µ, Σ), where kΣ − Ik2 ≤ O(χ), kµk2 ≤ O(ε log 1/ε), and where n = poly(d, 1/χ, 1/ε, log 1/δ). For any γ > 0, there is an algorithm RecoverMeanNoisy(X1 , . . . , Xn , ε, δ, γ, χ) which runs in time poly(d, 1/χ, 1/ε, log 1/δ) and outputs a µ b so that with probability 1 − δ, we have kb µ − µk2 ≤ (C + γ)ε + O(χ). This extension follows from two elementary observations: 1. For the learning in low dimensions, observe that the median is naturally robust to error in the covariance, and in general, by the same calculation we did, the error of the median becomes O(ε + α). 2. For the filter, observe that we only need concentration of squares of linear functions, and whatever error we have in this concentration goes directly into our error guarantee. Thus, by the same calculations that we had above, if we filtered for eigenvalues above 1 + O(ε + α), we would immediately get the desired bound. 5 Robustly Estimating the Mean of Degree Two Polynomials In this section, we give robust estimates of E[p2 (X)] for degree-2 polynomials p in subspaces of small dimension, which is an important prerequisite to learning the covariance in high-dimensions. A crucial ingredient in our algorithm is the following improvement theorem (stated and proved in the next section) which shows how to take any weak high-dimensional estimate for the covariance and use it to get an even better robust estimate for E[p2 (X)]. 5.1 Additional Preliminaries Here we give some additional preliminaries we require for the low-dimensional learning algorithm we present here. We will need the following well-known tail bound for degree-2 polynomials: Lemma 7 (Hanson-Wright Inequality [LM00, Ver10]). Let X ∼ N (0, I) ∈ Rd and A be a d × d matrix. Then for some absolute constant c0 , for every t ≥ 0,    2  t t T T , . Pr X AX − E[X AX] > t ≤ 2 exp −c0 · min kAk2F kAk2 We will also require the following lemmata: 16 Lemma 8 (Hölder’s inequality for Schatten norms). Let A, B be matrices. Then, for all p, q so that 1p + 1q = 1, we have kABkS 1 ≤ kAkS p kBkS q . This implies the following corollary: b M be so that kΣ − Σk b F ≤ O(δ), and so that kM kF = 1. Then, we have Corollary 3. Let Σ, Σ, 1/2 1/2 1/2 1/2 b b kΣ M Σ − Σ M Σ kS 1 ≤ 5δ. Proof. We have b 1/2 M Σ b 1/2 kS 1 ≤ kΣ1/2 M Σ1/2 − M kS 1 + kM − Σ b 1/2 M Σ b 1/2 kS 1 . kΣ1/2 M Σ1/2 − Σ We will bound the first term on the RHS by 5δ/2; the second term is bounded symmetrically. We have kΣ1/2 M Σ1/2 − M kS 1 ≤ kΣ1/2 M Σ1/2 − M Σ1/2 kS 1 + kM Σ1/2 − M kS 1 kΣ1/2 − IkS 2 kM Σ1/2 kS 2 + kΣ1/2 − IkS 2 kM kS 2 ≤ 5δ/2 , where the last line follows from Hölder’s inequality for Schatten norms. 5.2 An Improvement Theorem Here we state and prove one of the main technical ingredients in our algorithm for robustly learning the covariance. Theorem 9. Fix ε, δ, τ > 0. Let Σ be so that kΣ − IkF ≤ O(ε log 1/ε), and fix a p ∈ P2 , where P2 denotes the set of even degree-2 polynomials in d variables. Let G0 be an (ε, δ)-good set of samples from N (0, Σ), and let S = {X1 , . . . , Xn } be so that ∆(S, G0 ) ≤ ε. Then, for any C > 0 there is an algorithm LearnMeanChiSquared which, given p, X1 , . . . , Xn , and ε, outputs a µ b so that with probability 1 − τ over the randomness of the algorithm, µ b− E X∼N (0,Σ) [p(X)] ≤ kΣ − IkF /C + O(log(C)ε) . Moreover, the algorithm runs in time O(|S| + log(1/τ )/ε2 ). The way to think about how this result fits into the overall strategy is that robustly estimating the covariance is equivalent to robustly estimating the mean of every (normalized) degree-two polynomial p. The above theorem shows how a weak estimate in high-dimensions can be used to obtain stronger estimates in one dimension, which ultimately we will use to improve the highdimensional estimate as well. The above theorem is the workhorse in our proof. Our algorithm itself is simple, however, its correctness is quite non-trivial. We define some threshold T . Given our corrupted set of samples from N (0, Σ), we use our corrupted data set to estimate the mean of p(X) conditioned on the event that |p(X)| ≤ T . Then, to estimate the contribution of the mean from points X so that |p(X)| > T , we estimate this by EX∼N (0,I) [p(X)1|p(X)|>T ]. In other words, we are replacing the contribution of the true tail by an estimate of the contribution of p(X) when X ∼ N (0, I) on this tail. The formal pseudocode is given in Algorithm 6. Intuitively, this algorithm works because of two reasons. First, it is not hard to show that the influence of points p(X) within the threshold T on the estimator are bounded by at most T . Hence, the adversary cannot add corrupted points within this threshold and cause our estimator to deviate 17 too much. Secondly, because we know that kΣ − IkF is small, by carefully utilizing smoothness properties of sums of chi-squared random variables, we are able to show that our estimate for the contribution of the tail is not too large. At a high level, this is because “most” of the distance between two chi-squared random variables must remain close to the means, so the difference in the tails is much smaller. Proving that this holds in a formal sense is the majority of the technical work of this section. Proof. We know the distribution of p(X ′ ) for X ′ ∼ N (0, I) explicitly and wish to use this to get a better estimate for the mean of p(X) for X ∼ N (0, Σ) than might be given by the mean of the ε-corrupted set of samples. Algorithm 6 Approximating E[p(X)] for X ∼ N (0, Σ) with corrupted samples. 1: function LearnMeanChiSquared(X1 , . . . , Xn , p(x), ε, τ ) 2: Let T = O(log  C).  x − T, for x ≥ T 3: Let f (x) = 0, for |x| ≤ T .   x + T, for x ≤ −T P 4: Compute α = ni=1 (p(Xi ) − f (p(Xi )))/n. ′ from X ′ ∼ N (0, I). 2 5: Simulate m = O((ln X1′ , . . . , Xm Pmτ )/ε ) samples ′ 6: Return µ b = α + i=1 f (p(Xi ))/n. 7: end function It follows from (ε, δ)-goodness that | PrX ′ ∼N (0,Σ) [p(X ′ ) > t] − #{Xi : p(Xi ) > t}/n| ≤ 2ε for all t. We need to express the expectation in terms that we can use this to bound. For Z = p(X ′ ), we have that Z T Z T Pr[Z < −t]dt . Pr[Z > t]dt − E[Z − f (Z)] = E[max{T, min{−T, Z}}] = 0 0 Similarly, the samples have α= n X i=1 (p(Xi ) − f (p(Xi ))/n = Z T 0 #{Xi : p(Xi ) > t} dt − n Z t 0 #{Xi : p(Xi ) < −t} dt . n Thus, we have | E[Z − f (Z)] − α| ≤ 2T ε. Since p ∈ P2 , we have E[p(X ′ )] = 1 for X ′ ∼ N (0, I). Thus, we have Var[f (p(X ′ ))] ≤ E[f (p(X ′ ))2 ] ≤ E[p(X ′ )2 ] = 1. It follows by results that the empirical after Pstandard concentration ′ )/n − E[p(X ′ )]| ≤ ε with probability 1 − τ . taking m = O(ln(1 − τ )/ε2 ) samples has | m f (p(X ) i i=1 When this holds, we have µ b− E X∼N (0,Σ) [p(X)] ≤ (2T + 1)ε + E [f (p(X))] − X∼N (0,I) E [f (p(X))] . X∼N (0,Σ) To prove the correctness of the algorithm it remains to show that: Lemma 9. For any constant C > 0, for T = O(log C), we obtain E [f (p(X))] − X∼N (0,I) E [f (p(X ′ ))] ≤ X ′ ∼N (0,Σ) 18 kΣ − IkF . C Proof. Let M be the symmetric matrix with kM kF = 1 such that p(x) = xT M x for x ∈ Rd . We can write p(X) with X ∼ N (0, I) as p(X) + tr(M ) = X T M X = X T O T DOX = Y T DY = d X ai Yi2 , i=1 where O is orthogonal, D is diagonal, ai are the eigenvalues of M , and Y ∼ N (0, I) hence Yi are P 2 i.i.d. from N (0, 1). Since kM kF = 1, here we have ai = 1. If instead we express p(X ′ ) in terms of X ′ ∼ N (0, σ 2 ), we obtain: ′ p(X ) + tr(M ) = Y ′T Σ 1/2 MΣ 1/2 ′ Y =Y ′T ′T ′ ′ ′ T ′ O DOY =Y DY = d X bi Yi2 , i=1 where O′ is orthogonal, D ′ is diagonal, bi are the eigenvalues of Σ1/2 M Σ1/2 , and Y ′ , Y ∼ N (0, I) hence Yi are i.i.d. from N (0, 1). P By Corollary 3, we have that i |bi − ai | ≤ (5/2)kΣ − IkF . Now consider the random variables Zi,λ = −tr(M ) + where d X j=1 cj (Yi2 − 1) ,    bj , cj = (1 − λ)ai + λbi   aj for j < i for j = i , for j > i for 1 ≤ i ≤ d and 0 ≤ λ ≤ 1. Note that Zi,1 = Zi+1,0 , for 1 ≤ i ≤ d − 1. Note that, to prove the lemma, it suffices to show that X 2|bi − ai |/5C . | E[f (Z1,0 )] − E[f (Zd,1 )]| ≤ i To this end, Pconsider how P E[f (Zi,λ )] varies with λ. We can write Zi,λ = Z−i + Zi , where Z−i = −tr(M ) + j<i bj Yj2 + j>i aj Yj2 ; and Zi = ci Yi2 , where ci = ((1 − λ)ai + λbi ). We assume for now that ci 6= 0. Since only Zi depends on λ, we have d E[f (Zi,λ )] d = E[f (Z−i + Zi )] dλ dλ   d E [f (Z−i + Zi )] = E Z−i dλ Zi  Z ∞  d = E f (Z−i + x)Pi (x)dx Z−i dλ −∞  Z ∞ f (Z−i + x)dPi (x)/dλdx , = E Z−i −∞ where Pi (x) is the probability density function of the random variable Zi . Standard results about the χ2 distribution give that: Fact 1. Let Y1 , Y2 , Y3 ∼ N (0, 1). Then the probability density function of Y12 is Y12 + Y22 is 1 −x/2 , 2e and of Y12 + Y22 + Y32 is √ √ x e−x/2 . 2π 19 √ 1 e−x/2 , 2πx of This gives that Pi (x) = √ 1 e−x/2ci . 2πxci Now consider the derivative: 1 1 /dλ · e−x/2ci + √ · de−x/2ci /dλ 2πxci 2πxci 1 dci x 1 dci −x/2ci =− √ · 2 · e−x/2ci · ·e +√ · 3/2 dλ dλ 2πxci 2ci 2 2πxci √ (bi − ai ) x −x/2ci bi − a i e−x/2ci + √ e =− √ 3/2 5/2 2 2πxci 2πci dPi (x)/dλ = d √ (3) = ((bi − ai )/2ci )(Pi (x) − Pi (x)) , (3) where Pi (x) is the distribution of Zi + Zi′ + Zi′′ , where Zi′ and Zi′′ are i.i.d. copies of Zi . We thus have  Z ∞ d E[f (Zi,λ )] f (Z−i + x)dPi (x)/dλdx = E Z−i dλ −∞ = ((bi − ai )/2ci ) E [E[f (Z−i + Zi )] − E[f (Z−i + Zi + Zi′ + Zi′′ )]] Z−i = ((bi − ai )/2ci ) E[f (Zi,λ ) − f (Zi,λ + Zi′ + Zi′′ )] = ((bi − ai )/2ci ) E [f (Zi,λ ) − ′E ′′ [f (Zi,λ + Zi′ + Zi′′ )]] . Zi,λ Zi ,Zi Since f has Lipschitz constant 1, |f (Zi,λ ) − EZi′ ,Zi′′ [f (Zi,λ + Zi′ + Zi′′ ]| ≤ E[Zi′ + Zi′′ ] = 2ci whatever value Zi,λ takes. Using the probability distribution of Zi′ + Zi′′ , in the case ci > 0, we have for all |z| ≤ T , Z ∞ ′′ ′ e−x/2ci /2ci · (z + x − T )dx E ′′ [f (z + Zi + Zi )] = ′ Zi ,Zi T −z −(T −z)/2ci =e (z − T + 2ci + (T − z)) = 2ci e−(T −z)/2ci . Since ci ≤ max ai , bi ≤ 1 + O(ε log(1/ε)) ≤ 2, for large enough T = O(log C), we have e−(T /2)/2ci ≤ 1/C 2 T . We assume that this holds. For −T ≤ z ≤ T /2, we have 2ci e−(T −z)/2ci ≤ 2ci /C 2 T . A similar argument when ci < 0 gives that for −T /2 ≤ z ≤ T , we have 2|ci |e−(T −z)/2ci ≤ 2|ci |/C 2 T . Now we have enough to show that d E[f (Zi,λ )] ≤ |(bi − ai )/2ci || E [f (Zi,λ ) − ′E ′′ [f (Zi,λ ) + Zi′ + Zi′′ )]| Zi,λ dλ Zi ,Zi ≤ Pr [|Zi,λ − tr(M )| ≥ T /2]|(bi − ai )| + |(bi − ai )|/C 2 . Zi,λ By the Hanson-Wright inequality, we have that for any x, √ Pr [|Zi,λ − E[Zi,λ ]| ≥ 2kck2 x + kck∞ x] ≤ 2e−x , Zi,λ where c = (b1 , . . . , bi − 1, ci , ai+1 , . . . , ad ). Note that kck2 ≤ 1 + O(kΣ − IkF ) ≤ 2. Also, E[Zi,λ ] + P tr(M ) is the sum of coordinates of c, and so | E[Zi,λ ]| ≤ ij=1 |bj − aj | ≤ O(kΣ − IkF ) ≤ 1. Putting this together, we obtain Pr [|Zi,λ − tr(M )| ≥ T /2] ≤ 2 exp(−((T − 1)/8)2 ) ≤ 1/C 2 . Zi,λ 20 Finally, we have that, assuming ci 6= 0, d E[f (Zi,λ )] ≤ 2|(bi − ai )|/C 2 . dλ Now we need to deal with the special case ci = 0. Note that since f is Lipschitz, for any β ∈ R, we have | E[f (Z−i + βYi2 ) − f (Z−i )]|/|β| ≤ | E[Yi2 ]| ≤ 1. By considering the limit as β tends to d E[f (Zi,λ )] ≤ 1. zero from above or below, we get that when ci = 0, the derivative still exists and dλ Since the limit 2|(bi − ai )|/C 2 only does not apply at one point where E[f (Zi,λ )] is still continuous as a function of λ, this is not an issue. We still obtain that | E[f (Zi,0 )] − E[f (Zi,1 )]| ≤ 2|(bi − ai )|/C 2 . Recalling that Zi,1 = Zi+1,0 with Z1,0 = p(X ′ ) and Zd,1 = p(X) for X ′ ∼ N (0, 1) and X ∼ N (0, Σ), we have by the Mean Value Theorem, that X | E[f (p(X ′ ))] − E[f (p(X)]| ≤ | E[f (Zi,0 )] − E[f (Zi,1 )]| i ≤ 2|(bi − ai )|/C 2 ≤ O(kΣ − IkF /C 2 ) ≤ kΣ − IkF /C , as required. This completes the proof of the theorem. 5.3 Working in a Low-Dimensional Space of Degree-Two Polynomials We now show that via similar techniques as before, we can patch our estimates together to find a matrix which agrees with the ground truth on all degree-two polynomials in a fixed subspace of low dimension. Formally, we show: Theorem 10. Fix ε, τ > 0. Let Σ be so that kΣ−IkF ≤ O(ε log 1/ε). Let G0 be an (ε, δ)-good set of samples from N (0, Σ), and let S = {X1 , . . . , Xn } be so that ∆(S, G0 ) ≤ ε. Let W1 be a subspace of degree-2 polynomials, and let W2 be an orthogonal subspace of degree-2 polynomials, so that we have b so that EX∼N (0,Σ) [p(X)] − E aΣ b [p(X)] ≤ ξ for all p ∈ W2 . Then there is an algorithm X∼N (0,Σ) b runs in time poly(d, |S|, 2O(dim(W1 )) , log 1/τ ), LearnMeanPolyLowD which given ε, S, W1 , W2 , Σ and returns a Σ′ so that E N (0,Σ) [p(X)] − E [p(X)] ≤ 4 (kΣ − IkF /C + O(log(C)ε) + ξ , N (0,Σ′ ) for all p ∈ span(W1 ∪ W2 ) ∩ P2 , with probability 1 − τ . In particular, this implies: Corollary 4. Fix ε, τ > 0. Let Σ be so that kΣ − IkF ≤ O(ε log 1/ε). Let G0 be an (ε, δ)good set of samples from N (0, Σ). Let S = {X1 , . . . , Xn } be so that ∆(S, G0 ) ≤ ε. Let V be a subspace of Rd . Then there is an algorithm LearnCovLowDim which given S, ε, ξ, τ, V runs in 2 time poly(|S|, 2O(dim(V ) ) , log 1/τ ) and returns a Σ′ so that  kΠV Σ − Σ′ ΠV k2 ≤ 4 (kΣ − IkF /C + O(log(C)ε) , with probability 1 − τ . 21 Proof. Observe that the dimension of the space of degree-2 polynomials W in V is O(dim(V )2 ). Run the algorithm in Theorem 10 with the same parameters as before, with W1 = W and W2 = ∅ (so that we may take ξ = 0), and then the guarantee of that algorithm, along with Lemma 10, gives our desired guarantee. We now describe the algorithm for Theorem 10. Essentially, we do the same thing as we did for low-dimensional learning in the unknown mean case: we take a constant net over V ∩ P2 , l earn the mean over every polynomial in the net, and then find a Σ′ which is close in each direction to the learned mean. Since we will not attempt to optimize the constant factor here, will will use a naive LP-based approach to find a point which is close to optimal. The formal pseudocode is given in Algorithm 7. Algorithm 7 Filter if there are many large eigenvalues of the covariance 1: function LowDimCovLearning(S, ε, ξ, τ, W1 , W2 ) 2: Generate a 1/2-cover C for W1 ∩ P2 . 3: Let τ ′ = 2−|C| τ 4: for p ∈ C do 5: Compute mp = LearnMeanChiSquared(S, p, ε, τ ′ ). 6: Generate a linear constraint cp (Σ′ ): EN (0,Σ′ ) [p(X)] − mp ≤ kΣ − IkF /C + O(log(C))ε. 7: end for 8: Generate the convex constraint that EN (0,Σ′ ) [p(X)] − EN (0,Σ′ ) [p(X)] ≤ ξ for all p ∈ W2 . 9: Using a convex program, return any matrix Σ′ which obeys cp (Σ′ ) for all p ∈ C. 10: end function Observe that every constraint for each polynomial in W1 is indeed linear in Σ′ , by Lemma 10. Moreover, the constraint for W2 has an explicit separation oracle, since it induces a norm, and for any p ∈ W2 , we may explicitly compute EN (0,Σ′ ) [p(X)] − EN (0,Σ′ ) [p(X)]. Thus, we may use separating hyperplane techniques to solve this convex program in the claimed running time. Proof of Theorem 10. Let us condition on the event that LearnMeanChSquared succeeds for each p ∈ C. By a union bound, this occurs with probability at least 1 − τ . Thus, in each p ∈ C, we have that |mp − EX∼N (0,Σ) [p(X)]| ≤ β, where β = kΣ − IkF /C + O(log(C))ε. Let Σ′ be the matrix we find. By the triangle inequality, we then have that for every p ∈ C, that | EN (0,Σ′ ) [p(X)] − EN (0,Σ) [p(X)]| ≤ 2β. Hence, by the usual net arguments, we know that for every p ∈ V ∩ P2 , | E [p(X)] − N (0,Σ′ ) E [p(X)]| ≤ 4β . N (0,Σ) Moreover, by triangle inequality, for every p ∈ W2 , we have EN (0,Σ′ ) [p(X)] − EN (0,Σ′ ) [p(X)] ≤ 2ξ. The result then follows from the Pythagorean theorem. 6 Robustly Learning the Covariance in High-Dimensions In this section, we show how to robustly estimate the covariance of a mean-zero Gaussian in highdimensions up to error O(ε). We use our low-dimensional learning algorithm from the previous section as a crucial subroutine in what follows. Our main algorithmic contribution is as follows: Theorem 11. Fix ε, δ > 0, and let S0 = (G0 , E0 ) be an ε-corrupted set of samples of size n from N (0, Σ), where kΣ − IkF ≤ ξ where ξ = O(ε log 1/ε), and where n = poly(d, 1/ε, log 1/δ). Suppose 22 that G0 is (ε, δ)-good with respect to N (0, Σ). Let S ⊆ S0 be a set so that ∆(S, G0 ) ≤ ε. Then, there exists an algorithm ImproveCov that given S, ξ, ε, fails with probability at most poly(ε, 1/d, δ), and otherwise outputs one of two possible outcomes: b so that kΣ b − ΣkF ≤ kΣ − IkF /2. (i) A matrix Σ, (ii) A set S ′ ⊂ S so that ∆(S ′ , G0 ) < ∆(S, G0 ). Moreover, ImproveCov runs in time poly(d, (1/ε)O(log 4 1/ε) , log 1/δ). By first applying the algorithm in [DKK+ 16] to produce an initial estimate for Σ, and then iterating the above algorithm polynomially many times, this immediately yields: Corollary 5. Fix ε, δ > 0, and let G0 be a set of i.i.d. samples from N (0, Σ), where n = poly(d, 1/ε, log 1/δ). Let S be so that ∆(S, G0 ) ≤ ε. There is an universal constant C and an b so that with probability 1 − δ, we have kΣ b −1/2 ΣΣ b −1/2 − IkF ≤ Cε. In algorithm which outputs a Σ particular, this implies that   b ≤ 2Cε . dTV N (0, Σ), N (0, Σ) 6.1 Technical Overview Our strategy for obtaining a high-dimensional estimate for the covariance based on solving lowdimensional subproblems will be substantially more challenging than it was for the unknown mean case. The natural approach is to take the poly log(1/ε)-dimensional subspace of degree-2 polynomials of largest empirical variance and construct a filter. However, this fails because, unlike in the mean case, we do not know the variance of these degree-2 polynomials to small error. For the unknown mean case, because we assumed that we knew the covariance was the identity (or spectrally close to the identity), this was not an issue. Now, the variance of our polynomials depends on the (unknown) covariance of the true Gaussian, which may be more than O(ε)-far from our current estimate. Indeed, it is not difficult to come up with counterexamples where there are many large eigenvalues of the empirical covariance matrix, but no filter can make progress. We overcome this hurdle in several steps. First, in Section 6.3, we show how to find a filter if there are many medium-sized eigenvalues of the empirical covariance matrix. This will proceed roughly in the same way that the filter for the unknown mean does. If no filter is created, then we know there are at most logarithmically large eigenvalues of the empirical covariance. In the subspace V ⊆ Rd spanned by their eigenvectors, we can then learn the covariance to high accuracy using our low-dimensional estimator. Then, in Section 6.3, we show that if we restrict to the orthogonal subspace, i.e., the subspace where the empirical covariance matrix does not have large eigenvalues, we can indeed either produce a filter or improve our estimate of the covariance restricted to this subspace using our low-dimensional estimator. While the blueprint is similar to the filter for the unknown mean, the techniques are much more involved and subtle. Supposing we have not yet created a filter, we have now estimated the covariance on a polylogarithmic dimensional subspace V , and on V ⊥ . This does not in general imply that we have learned the covariance in Frobenius norm. In block form, if we write   ΣV AT , Σ= A ΣV ⊥ 23 where here Rd is written as V ⊕ V ⊥ , this implies we have learned ΣV and ΣV ⊥ to high accuracy. Thus, it remains to estimate the cross term A. In Section 6.4, we show, given a polylogarithmically sized subspace V , and a good estimate of the covariance matrix on V and V ⊥ , how to fill in the entire covariance matrix. Roughly, we do this by randomly fixing directions in V , and performing rejection sampling based on the correlation in the direction in V , and showing that the problem reduces to one of robustly learning the mean of a Gaussian, which (conveniently) we have already solved. These steps together yield our overall algorithm ImproveCov. Finally, in Section 6.6 we explain why there is a natural barrier that makes reducing the running time from quasi-polynomial to polynomial (in 1/ε) difficult. 6.2 Additional Preliminaries Here we give some additional preliminaries we will require in this Section. 6.2.1 The Agnostic Tournament We also require the following classical result, which allows us to do agnostic hypothesis selection with corrupted samples (see e.g., [DL01, DDS12, DK14, DDS15]). Theorem 12. Fix ε, δ > 0. Let D1 , . . . , Dk , D be a set of distributions where mini dTV (Di , D) = γ. 1/δ . There is an algorithm Tournament which given oracles for evaluating Set n = Ω log k+log ε2 the pdfs of D1 , . . . , Dk along with n independent samples X1 , . . . Xn from D, outputs a Di so that dTV (Di , D) ≤ 3γ + ε with probability 1 − δ. Moreover, the running time and number of oracle calls needed is at most O(n2 /ε2 ). Remark 1. As a simple corollary of the agnostic tournament, observe that this allows us to do agnostic learning without knowing the precise error rate ε. Throughout the paper, we assume the algorithm knows ε. However, if the algorithm is not given this information, and instead given an η and asked to return something with error at most O(ε + η), we may simply grid over {η, (1 + γ)η, (1 + γ)2 η, . . . , 1} (here γ is some arbitrary constant that governs a tradeoff between runtime and accuracy), run our algorithm with ε set to each element in this set, and perform hypothesis selection via Tournament. Then it is not hard to see that we are guaranteed to output something which has error at most O(ε + (1 + γ)η). 6.2.2 The Fourth Moment Tensor of a Gaussian As in [DKK+ 16], it will be crucial for us to understand the behavior of the fourth moment tensor of a Gaussian. Let ⊗ denote the Kronecker product on matrices. We will make crucial use of the following definition: 2 Definition 6. For any matrix M ∈ Rd×d , let M ♭ ∈ Rd denote its canonical flattening into a vector 2 2 in Rd , and for any vector v ∈ Rd , let v ♯ denote the unique matrix M ∈ Rd×d so that M ♭ = v. We will also require the following definition: 2 Definition 7. Let Ssym = {M ♭ ∈ Rd : M is symmetric}. The following result was proven in [DKK+ 16]: Theorem 13 (Theorem 4.15 in [DKK+ 16]). Let X ∼ N (0, Σ). Let M be the d2 × d2 matrix given by M = E[(X ⊗ X)(X ⊗ X)T ]. Then, as an operator on Ssym , we have    T . M = 2Σ⊗2 + Σ♭ Σ♭ 24 6.2.3 Polynomials in Gaussian Space Here we review some basic facts about polynomials under Gaussian measure, which will be crucial for our algorithm for learning Gaussians with unknown covariance. We equip the set of polynomials over Rd with the Gaussian inner product, defined by hf, gi = EX∼N (0,I) [f (X)g(X)], and we let kf k22 = hf, f i. For any symmetric M with kM kF = 1, define the degree-2 polynomial p(x) = √12 (xT M x − tr(M )). We call p the polynomial associated to M . Observe that p is even (i.e., has no degree-1 terms). We will use the following properties of such polynomials: Lemma 10. Let M be symmetric, so that kM kF = 1. Let p be its associated polynomial. Then, we have: (i) EX∼N (0,I) [p(X)] = 0. (ii) More generally, for any positive definite matrix Σ, we have EX∼N (0,Σ) [p(X)] = hM, Σ − Ii. (iii) VarX∼N (0,I) [p(X)] = EX∼N (0,I) [p2 (X)] = hp, pi = 1. (iv) More generally, for any positive definite matrix Σ, we have 2 T 1 E [p2 (X)] = M ♭ Σ⊗2 M ♭ + hΣ − I, M ♭ i . 2 X∼N (0,Σ) Proof. The first three properties are a straightforward calculation. We show the last one here. By definition, we have E X∼N (0,Σ) 1 E [(X T M X − tr(M ))2 ] 2 X∼N (0,Σ) 1 E [(X T M X)2 − 2(X T M X)tr(M ) + tr(M )2 ] = 2 X∼N (0,Σ)   1 T ♭ 2 ♭T = E [M (X ⊗ X)(X ⊗ X) M ] − 2hM, Σitr(M ) + tr(M ) 2 X∼N (0,Σ)    T T (a) 1 M ♭ 2Σ⊗2 + Σ♭ Σ♭ M ♭ − 2hM, Σitr(M ) + tr(M )2 = 2  T 1 ♭ = M ♭ Σ⊗2 M ♭ + hM , Σi2 − 2hM, Σitr(M ) + tr(M )2 2 2 1 ♭ ♭ T ⊗2 =M Σ M + hΣ − I, M ♭ i , 2 [p2 (X)] = as claimed, where (a) follows from Theorem 13. Observe that Lemma 10(iv) implies that if we take the top eigenvector of the d2 × d2 matrix Σ⊗2 + on the linear subspace 1  ♭   ♭ ⊤ M M 2 V = {M ♭ : M is a symmetric d × d matrix} , then the associated polynomial maximizes EX∼N (0,Σ) [p2 (X)], and so we can find these polynomials efficiently. More generally, if we take any linear subspace of degree two polynomials with associated 25 matrix subspace V ′ , so that V ′ ⊆ V , then the top eigenvector of the same matrix restricted to V ′ allows us to find the polynomial in this subspace which maximizes EX∼N (0,Σ) [p2 (X)] efficiently. We have the following tail bound for degree-2 polynomials in Gaussian space: We will use ΠV (x) and ΠV (S) to denote projection to a subspace V , of a point x and a set of points S, respectively. We will also need the following hypercontractivity theorem for low-degree polynomials in Gaussian space: Theorem 14 (Hypercontractivity in Gaussian space, see e.g. [O’D14]). Let p : Rd → R be a degree √ m polynomial, and let q ≥ 2 be even. Then EX∼N (0,I) [p(X)q ]1/q ≤ ( q − 1)m kpk2 . We need the following definition: Definition 8. Let Pk denote the set of even degree-k polynomials over d variables satisfying VarX∼N (0,1) [p(X)] = 1. Moreover, for any subspace W ⊆ Rd , let Pk (W ) denote the set of even polynomials over d variables which only depend on the coordinates in W . b Then by the arguments above, we have that for any two matrices Σ, Σ, ! b F = sup kΣ − Σk E [p(X)] − E [p(X)] . p∈P2 X∼N (0,Σ) b X∼N (0,Σ) In particular, by Lemma 2, this implies that when kΣ − Ik2 is small, then learning a Gaussian with unknown covariance in total variation distance is equivalent to learning the expectation of every even degree-2 polynomial. Theorem 14 implies the following concentration for degree-4 (more generally, low-degree) polynomials of Gaussians: Corollary 6. Let p be a degree-4 polynomial. Then there is some A, C ≥ 0 so that for all t ≥ C, we have   Pr [|p(X) − E [p(X)]| ≥ tkpk2 ] ≤ exp −At1/2 . N (0,I) N (0,I) Proof. Hypercontractivity in particular implies the following moment bound: for all q ≥ 2 even, we have E [(p(X) − E [p(X)])q ] ≤ (q − 1)qm/2 kp(X) − E [p(X)]kq2 . N (0,I) N (0,I) N (0,I) By a typical moment argument, and optimizing the choice of q, this gives the desired bound. Hermite polynomials Hermite polynomials are what arise by Gram-Schmidt orthogonalization applied with respect to this inner product. For a vector of non-negative integers a = (a1 , . . . , ad ), we let Ha (x) : Rd → R be the Hermite Pd polynomial associated with multi-index a. It is well-known that the degree of Ha is |a| = i=1 ai , and moreover, hHa , Hb i = δa,b . In particular, for any r ≥ 1, the Hermite polynomials of degree at most r form an orthonormal basis with respect to the Gaussian inner product for all polynomials with degree at most r. Therefore, given any polynomial p : Rd → R with degree r, we may write it uniquely as X p(x) = ca (p)Ha (x), where ca (p) = hp, Ha i . |a|≤r We define the kth harmonic component of p to be X p[k](x) = ca (p)Ha (x) , |a|=k and we say p is harmonic of degree k if it equals its kth part. 26 6.3 Working with Many Large Eigenvalues of the Second and Fourth Moment As in the unknown mean case, we will need a filter to detect if there are many directions of the empirical covariance which have too large an eigenvalue. Formally, we need: Theorem 15. Fix ε, δ > 0. Assume kΣ − IkF ≤ ξ, where ξ = O(ε log 1/ε). Suppose that G0 b = ES [XX T ]. is (ε, δ)-good with respect to N (0, Σ). Let S be a set so that ∆(S, G0 ) ≤ ε. Let Σ Then there is an algorithm FilterCovManyDeg2Eig and a universal constant C such that the following guarantee holds: b − I has more than O(log 1/ε) eigenvalues larger than Cξ, then the algorithm outputs a 1. If Σ ′ S so that ∆(S ′ , G0 ) < ∆(S, G0 ). 2. Otherwise, the algorithm outputs “OK”, and outputs an orthonormal basis v1 , . . . , vk for the b − I with eigenvalue larger than Cξ. subspace V of vectors spanned by all eigenvectors of Σ The filter developed here is almost identical to the one developed for unknown mean. Thus, for conciseness we describe and prove the theorem in Appendix D.1. We will also need a subroutine to enforce the condition that not only does the fourth moment tensor have spectral norm which is at most O(ε log2 1/ε) (restricted to a certain subspace of polynomials), but there can only be at most O(poly log 1/ε) directions in which the eigenvalue is large. However, the techniques here are a bit more complicated, for a number of reasons. Intuitively, the main complication comes from the fact that we do not know what the fourth moment tensor looks like, whereas in the unknown mean case, we knew that the covariance was the identity by assumption. Our main result in this subsection is the following subroutine: Theorem 16 (Filtering when there are many large eigenvalues). Fix ε, δ > 0. Assume kΣ − IkF ≤ ξ, where ξ = O(ε log 1/ε). Let C be the universal constant in FilterCovManyDeg2Eig. Let W ⊆ Rd be a subspace, so that for all v ∈ W with kvk2 = 1, we have v T ES [XX T ]v ≤ 1 + Cξ. Suppose that G0 is (ε, δ)-good with respect to N (0, Σ). Let S be a set so that ∆(S, G0 ) ≤ ε. Let k = O(log4 1/ε). Then there is an algorithm FilterCovManyDeg4Eig and universal constants C1 , C2 such that the following guarantee holds: 1. If there exist p1 , . . . , pk ∈ P2 (W ) so that hpj , pℓ i = δjℓ for all j, ℓ, and so that ES [p2j (Y )] − 1 ≥ C1 ε for all j, then the algorithm outputs an S ′ so that ∆(S ′ , G0 ) < ∆(S, G0 ). 2. Otherwise, the algorithm outputs “OK”, and outputs an orthonormal basis p1 , . . . , pk′ for a subspace V of degree-2 polynomials in P2 (W ) with k′ ≤ k so that for all p ∈ V ⊥ ∩ P2 , we have ES [p2 (X)] − 1 ≤ C2 ε. Moreover, FilterCovManyEig runs in time poly(d, 1/ε, log 1/δ). Roughly, we will show that if there are many polynomials with large empirical variance, this implies that there is a degree-four polynomial whose value is much larger than it could be if w were the set of uniform weights over the uncorrupted points. Moreover, we can explicitly construct this polynomial, and it has a certain low-rank structure which allows us to use the concentration bounds we have previously derived. 6.4 Stitching Together Two Subspaces This section is dedicated to giving an algorithm which allows us to fully reconstruct the covariance matrix given that we know it up to small error on a low-dimensional subspace V and on W = V ⊥ . 27 Algorithm 8 Filter if there are many large eigenvalues of the fourth moment tensor 1: function FilterCovManyEig(S, ε, ξ, δ, W ) b = ES [XX T ] 2: Let Σ 3: Let C1 , C2 , C3 be some universal constants sufficiently large 4: Let A be the constant in Corollary 6 5: Let B be the constant in Claim 20 6: Let m = 0 7: Let k = O(log4 1/ε) 8: while there exists p ∈ P2 (W ) so that p ∈ V ⊥ and ES [p2 (X)] − 1 > C1 ξ do 9: Let Vm+1 = span(Vm ∪ p) 10: Let m ← m + 1 11: end while 12: Let p1 , . . . , pm be an orthonormal basis for Vm 13: if m ≥ k then [4] 14: Let qi = (p2i ) be the 4th harmonic component of p2i 15: Let ri = p2i − qi be the degree-2 component of p2i P 16: Let Q(x) = ki=1 qi 17: Find a T so that either: √ • T > C3 d2 k log(|S|) and p(X) > T for at least one x ∈ S ′ , OR √ • T > 4A2 C2 B k log2 (1/ε) and √ Pr [Q(X) > T ] > exp(−A(T /4B k)1/2 ) + ε2 /(d log(|S|/δ))2 . X∈u S 18: 19: 20: 21: 22: return the set S ′ = {X ∈ S : Q(X) ≤ T } else return “OK”, and output p1 , . . . , pm end if end function Theorem 17. Let 1 > ξ > η > ε > 0, and let τ > 0. Let Σ so that kΣ − IkF ≤ ξ. Suppose that Rd is written as V ⊕ W for orthogonal subspaces V and W with dim(V ) = O(log(1/ε)). Suppose furthermore that   ΣV AT , Σ= A ΣW with kΣV − IV kF , kΣW − IW kF = O(η). Let S0 = (G0 , E0 ) be an ε-corrupted set of samples from N (0, Σ), and let S ⊆ S0 with ∆(S, G) ≤ O(ε) of size poly(d, 1/η, log 1/δ). Then, there exists a universal constant C5 and an algorithm Stitching that given V, W, ξ, η, ε, τ and S runs in polynomial time and with probability at least 1 − τ returns a matrix Σ0 with kΣ0 − ΣkF = C5 η + O(ξ 2 ). In the latter, we will show the algorithm works when τ = 2/3. As usual the probability of success can be boosted by repeating it independently.5 The basic idea of the proof is as follows. Since we already know good approximations to ΣV and ΣW , it suffices to find an approximation to 5 Observe the only randomness at this point is in the random choices made by the algorithm. Thus, one can just (j) (ℓ) (1) run this algorithm O(log 1/δ) times to obtain Σ0 , . . . , Σ0 and find any Σ0 which is O(η + ξ 2 ) close to at least a 2/3 + o(1) fraction of the other outputs. 28 A. In order to do this, we note that if we take a sample x from G conditioned on its projection to V being some vector v, we find that the distribution over W is a Gaussian with mean approximately Av. Running our algorithm for approximating the mean of a noisy-Gaussian, we can then compute the mapping v → Av, which will allow us to compute A. There are three main technical obstacles to this approach. The first is that we cannot condition on xV taking a particular value, as we will likely see no samples from X with exactly that projection. Instead, what we will do is given samples from X we will reject them with probabilities depending on their projections to V in such a way to approximate the conditioning we require. The second obstacle is that the errors in X may well be concentrated around some particular projection to V . Therefore, some of these conditional distributions may have a much larger percentage of errors than ε. To circumvent this, we will show that by carefully choosing how we do our conditioning and by carefully picking the correct distribution over vectors v, that on average these errors are only O(ε). Finally, we need to be able to reconstruct A from a collection of noisy approximations to Av. We show that this can be done by computing these approximations at a suitably large random set of v’s, and finding the matrix A that minimizes the average ℓ2 error between Av and its approximation. Our algorithm is given in Algorithm 9: Algorithm 9 Stitching the two subspaces together 1: function Stitching(V, W, δ, ε, τ, S) 2: Given a vector x, let xV and xW be the projections onto V and W , respectively. 3: Let C be a sufficiently large constant (where C may depend on the constants in the big-O terms in the guarantee that dim(V ) = O(log(1/ε))). 4: Generate a set V = {v1 , . . . , vm } of (n/ε)C independent random samples from N (0, 2IV ). 5: for v ∈ V do 6: For each sample x ∈ S, add xW to a new set T independently with probability exp(−kxV − vk2 /2) . 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: Treat T as a collection of independent samples from a noisy Gaussian with covariance matrix IW + O(η). Set av equal to 0 if T did not contain enough samples for our algorithm or if kµ̃k2 > C log(1/ε). for ε ∈ {1, 1/2, 1/4, 1/8, . . . , η} do Let µ e be the output of RecoverMeanNoisy(T, ε, (ε/n)2C , o(1), O(η)). end for Run Tournament with the output hypotheses. Set av = µ̃, where µ e is the winning hypothesis. end for Use linear programming to find the dim(W ) × dim(V )-matrix B that minimizes the convex function Ev∈u S [|av − Bv|]. return   IV 2B T . Σ0 = 2B IW end function Before we prove Theorem 17, we will need the following definition. 29 Definition 9. A function f : Rd → R is a positive measure if f ≥ 0 and R |f |1 = f , and we say f1 ≤ f2 if f1 (x) ≤ f2 (x) pointwise. R f ≤ 1. We write Proof of Theorem 17. Throughout this proof, let G = N (0, Σ). It is clear that this algorithm has polynomial runtime and sample complexity. We have yet to show correctness. The first thing that we need to understand is the procedure of rejection sampling, where we reject x except with probability exp(−kxV − vk2 /2). Therefore, given a distribution D, we let the positive measure Dv be what is obtained by sampling from D and accepting a sample x only with probability exp(−kxV − vk2 /2). We need to understand the distributions Gv and Xv . Note that the pdf of G is given by p (2π)−n/2 det(Σ−1 ) exp(−xΣ−1 x/2)dx. Therefore, the density of Gv is p (2π)−n/2 det(Σ−1 ) exp(−xΣ−1 x/2 − kxV − vk22 /2)dx p =(2π)−n/2 det(Σ−1 ) exp(−x(Σ−1 + IV )x/2 + x · v − kvk22 /2)dx. Note that letting µv := (Σ−1 + IV )−1 v = v/2 + O(δkvk2 ) that this equals p =(2π)−n/2 det(Σ−1 ) exp(−(x − µv )(Σ−1 + IV )(x − µv )/2 − kvk22 /2 + µv · v/2)dx p =(2π)−n/2 det(Σ−1 ) exp(−(x − µv )(Σ−1 + IV )(x − µv )/2 − kvk22 (1 + O(δ))/4)dx. Note that this is a Gaussian with mean µv weighted by s det(Σ−1 ) exp(−kvk22 (1 + O(δ))/4) = Θ(2− dim(V )/2 exp(−kvk22 /4)) , det(Σ−1 + IV ) so long as kvk2 ≪ δ−1/2 . Therefore, if this condition holds, a random sample from G is accepted by this procedure with probability Θ(2− dim(V ) exp(−kvk22 /4). We also need to understand the fraction of samples from Xv that are erroneous. In a slight abuse of notation, let E also denote the distribution which is uniform over the points in E, and let L be the distribution which is uniform over the points in L. Therefore, we define εv := 2n/2 exp(kvk22 /4)(|Ev |1 + |Lv |1 log(1/ε)) , that is approximately the fraction of samples from Xv that are errors (where subtractive errors are weighted more heavily). p Note that so long as kvk2 < C log(1/ε) that so long as |Lv |1 = o(1) that T in Step 5 will have sufficiently many samples with high probability. Furthermore, if this is the case, we have (assuming our mean estimation algorithm succeeds) that kµ̃ − πW (µv )k2 ≤ O(εv + η). Therefore, unless kµv k2 = Ω(C log(1/ε)) (which can only happen in kvk2 = Ω(C log(1/ε))), we have with high probability that kav − πW (µv )k2 = O(εv + η). In fact, we assume that this holds for all v ∈ S with kvk2 ≪ (C log(1/ε)). In order to show that this is generally a good approximation, we need to know that εv is not too large on average. In particular, we show: Lemma 11. If v ∼ N (0, 2IV ), then Ev [εv ] = O(ε). 30 Proof. Letting F = E + log(1/ε)L, we have that Z − dim(V )/2 E[εv ] = (2π) exp(kvk22 /4) exp(−kvk22 /4)dFv dv v Z Z − dim(V )/2 2 = (2π) exp(−kx − vk /2)dF (x)dv = dF = O(ε). Note that πW (µv ) = M v, where M = πW (Σ−1 + IV )−1 πVT . Let B be any dim(W ) × dim(V ) matrix. Note that E [kBv − M vk22 ] = 2kB − M k2F . v∼N (0,2IV ) Therefore, Ev∼N (0,2IV ) [kBv − M vk2 ] = O(kB − M kF ). Since kBv − M vk22 is a degree-2 polynomial in v, by Corollary 4 in [Kan12], # " r E [kBv − M vk42 ]/2 > 1/81. Pr [kBv − M vk2 > kB − M kF /2] > Pr kBv − M vk22 > v∼N (0,2IV ) v∼N (0,2IV ) v∼N (0,2IV ) Combining these we find that E [kBv − M vk2 ] = Θ(kB − M kF ) . v∼N (0,2IV ) Next we show that our choice of S derandomizes this result. Lemma 12. With high probability over the choice of S, we have that E [kBv − M vk2 ] = Θ(kB − M kF ). v∈u S for all dim(W ) × dim(V ) matrices B. Proof. This is equivalent to showing that for all matrices U = B − M it holds E [kU vk] = Θ(kU kF ). v∈u S By the standard scaling laws, it suffices to show this only for U with kU kF = 1. We also note that it suffices to show this only for U in an ε-net for all such matrices. This is because if kU − U ′ kF < ε and if U ′ satisfies the desired condition, then E [kU vk2 ] = E [kU ′ vk2 ] + O( E [k(U − U ′ )vk2 ]) = Θ(1) + O(ε) E [kvk2 ] , v∈u S v∈u S v∈u S v∈u S and with high probability Ev∈u S [kvk2 ] = O(log(1/ε)). Note that such nets exist with size exp(poly(n/ε)). Therefore, it suffices to show that this condition holds for each such U with probability exp(−(n/ε)Ω(C) ). As noted above, it suffices that E [kU vk2 ] = O( E [kU vk2 ]) = O(1) v∈u S v∈u S and that Pr [kU vk2 > 1/4] ≥ Pr [kU vk2 ≥ 1/4] − 1/100. v∈u S v∈u S The first follows because if S = {v1 , . . . , vm } then Ev∈u S [kU vk2 ] is a degree-2 polynomial in the √ vi with mean O(1) and variance O(1/ m), so by standard concentration results, is O(1) with 1 − exp(−Ω(|S|)) probability. The latter follows from standard concentration bounds. This completes the proof. 31 We also note that the random choice of S has another nice property: Lemma 13. With S and av as above, with high probability we have that E [kav − M vk2 ] = O(η) . v∈u S Proof. Let S = {v1 , . . . , vm }. Then kf (vi ) − M vi k2 are independent random variables with mean E[O(εv + η)] = O(η) and variance at most E[kav k22 + kM vk22 ] ≤ O(log2 (1/ε)) + E[kvk22 ] = O(log2 (1/ε)). The result follows by Chernoff bounds. Now by Lemmas 12 and 13 with high probability over the choice of S in Step 4, and the av in Step 5 we have that for all dim(W ) × dim(V )-matrices B that E [kBv − M vk2 ] = Θ(kB − M kF ), v∈u S and have that E [kav − M vk2 ] = O(η). v∈u S Combining these statements, we have that for all dim(W ) × dim(V )-matrices B that E [kav − Bk2 ] = Θ(kB − M kF ) + O(η). v∈u S Note that by taking B = M , this quantity is O(η). Therefore, the B found in Step 15 satisfies O(ε) = E [kav − Bk2 ] = Θ(kB − M kF ) + O(η) , v∈u S and therefore, kB − M kF = O(η). The rest of the proof is a simple computation of the matrices involved. In particular, recall that     IV AT ΣV AT + O(η) , = Σ= A IW A ΣW where the O(η) denotes a matrix with Frobenius norm O(η) and where kAkF = O(δ). It is easy to see that   I −AT + O(η + δ2 ). Σ−1 = V −A IW Therefore, Σ −1 Hence, (Σ −1  2IV −AT + O(η + δ2 ). + IV = −A IW  −1 + IV )   IV /2 AT /2 = + O(η + δ2 ). A/2 IW Therefore, M = A/2 + O(η + δ2 ). Therefore, A = 2M + O(η + δ2 ) = 2B + O(η + δ2 ). And finally, we conclude that   IV 2B T + O(η + δ2 ) = Σ0 + O(η + δ2 ). Σ= 2B IW 32 6.5 The Full High-Dimensional Algorithm We now show how to prove Theorem 11, given the pieces we have. We first show that given enough samples from N (0, Σ), the empirical data set without corruptions satisfies the regularity conditions in Section 2.2.2 with high probability. For clarity of exposition, the proof of this lemma is deferred to Appendix D.3. Lemma 14. Fix η, δ > 0. Let X1 , . . . , Xn be independent samples from N (µ, I), where n = poly(d, 1/η, log 1/δ). Then, S = {X1 , . . . , Xn } is (η, δ)-good with respect to N (µ, I) with probability at least 1 − δ. Finally, we require the following guarantee, which states that if there is a degree-2 polynomial whose expectation under S and the truth differs by a lot (equivalently, if the empirical covariance differs from the true covariance in Frobenius norm substantially), then it must also have very large variance under S. Lemma 15. Fix ε, δ > 0. Assume kΣ − IkF ≤ ξ, where ξ = O(ε log 1/ε). Suppose that G0 is (ε, δ)-good with respect to N (0, Σ), and let S ⊆ S0 be a set so that ∆(S, G0 ) ≤ ε. There is some √ absolute constant C5 so that if p ∈ P2 is a polynomial so that ES [p(X)] − EN (0,Σ) [p(X)] > C5 ξε, then ES [p2 (X)] − 1 > C1 ξ. We defer the proof of this lemma to the Appendix. We are now ready to present the full algorithm as Algorithm 10. Algorithm 10 Filter if there are many large eigenvalues of the covariance 1: function ImproveCov(S, ξ, ε, δ) 2: Let C be the universal constant in FilterCovManyDeg2Eig 3: Let τ = poly(ε, 1/d, δ). 4: Run FilterCovManyDeg2Eig(S, ε, ξ) 5: if FilterCovManyDeg2Eig outputs S ′ then 6: return S ′ 7: else 8: Let V be the subspace returned by FilterCovManyDeg2Eig 9: Let W = V ⊥ . 10: Run FilterCovManyDeg4Eig(S, ε, ξ, δ, W ) 11: if FilterCovManyDeg4Eig outputs S ′ then 12: return S ′ 13: else 14: Let U1 be the subspace of degree 2 polynomials over W it returns 15: Let U2 be the perpendicular subspace of degree 2 polynomials over W b = ES [XX T ] 16: Let Σ 17: Let ΣV = LearnCovLowDim(S, ε, ξ, τ, V ) b 18: Let ΣW = LearnMeanPolyLowD(S, ε, ξ, τ, U1 , U2 , Σ) ′ 19: Take poly(n, 1/ε) fresh ε-corrupted samples S 20: return Stitching(V, W, ΣV , ΣW , ξ, ε, S ′ ). 21: end if 22: end if 23: end function 33 Proof of Theorem 11. Condition on the events that neither LearnCovLowDim nor Stitching fail. This happens with probability at least poly(ε, 1/d, δ). Observe that if we pass the “if” statement in Line 5, then by the guarantee of FilterCovManyDeg2Eig this is indeed an S ′ satisfying the desired properties. Otherwise, by the guarantees of FilterCovManyDeg2Eig, we have that W satisfies the conditions needed by FilterCovManyDeg4Eig. Hence, if we pass the “if” statement in Line 11, then the guarantee of FilterCovManyDeg4Eig this is indeed a S ′ satisfying the desired properties. Otherwise, by Lemma 15, we know √ that for all polynomials p ∈ P2 over W orthogonal to U1 , we have | EN (0,Σ) − ES [XX T ]| ≤ C5 ξε. Thus, ΣW satisfies the conditions needed by Stitching. By Corollary 4, we know that ΣV satisfies the conditions for Stitching, and so the correctness of the algorithm follows from Theorem 17. 6.6 The Barrier at Quasi-Polynomial Here we explain why improving the running time from quasi-polynomial to polynomial in 1/ε will likely be rather difficult. Recall that our strategy is to project the problem onto lower dimensional subproblems and stitch together the answer. We need the dimension of the subspace to be large enough that we can find a polynomial Q that is itself the sum of squares of k orthogonal degree two polynomials pi so that the value of Q on the corrupted points is considerably larger than the value on the uncorrupted points. More precisely, if we let S = (G, E) denote our corrupted set of samples then we want EE [Q(X)] to be larger than Q(X) for all but a poly(ε) fraction of X ∈ G. We then remove all points X ∈ S with large Q(X) and by the properties of Q we are guaranteed that we throw out mostly corrupted points. It √ turns out that the most aggressive we could be is removing points where Q(X) is more than k standard deviations away from its expectation under the true Gaussian. But since Q is a degree-four polynomial and we want Q(X) √ to be smaller than our cutoff for all but a poly(ε) fraction of X ∈ G, we are forced to choose k = Ω(log 1/ε), which means that we need to reduce to k = Ω(log2 1/ε) dimensional subproblems. Thus, if we solve low-dimensional subproblems in time exponential in the dimension, we naturally arrive at a quasi-polynomial running time. It seems that any approach for reducing the running time to polynomial would require fundamentally new ideas. 7 The General Algorithm We now have all the tools to robustly learn the mean and covariance of an arbitrary high-dimensional Gaussian. We first show how to reduce the problem of robustly learning the covariance of N (µ, Σ) to learning the covariance of N (0, Σ), by at most doubling error, a trick previously used in [DKK+ 16] and [LRV16]. Given an √ ε-corrupted set of samples X1 , . . . , X2n of size 2n from N (µ, Σ), we may let Yi = (Xi − Xn+i )/ 2. Then we see that if Xi and Xn+i are uncorrupted, then Yi ∼ N (0, Σ). Moreover, at most 2εn of the Yi can be corrupted, since there are at most 2εn corrupted Xi . Therefore, by doubling the error rate, we may assume that µ = 0. We may then apply the algorithm b so that with high probability, we have kΣ b −1/2 ΣΣ b −1/2 − IkF ≤ O(ε) in Corollary 5 to obtain a Σ 4 O(log 1/ε) with polynomially many samples, and in poly(d, (1/ε) ) time. b −1/2 X ′ . We may then take an additional set of ε-corrupted samples {Xi′ , . . . , Xn′ }, and let Yi′ = Σ i ′ ′ b we have that if X is uncorrupted, then Y ∼ N (0, Σ) e where Then, by our guarantee on Σ, i i e − IkF ≤ O(ε). We then run RecoverMeanNoisy with the Y ′ to obtain a µ kΣ b so that i −1/2 −1/2 b e b b kb µ−Σ µk2 ≤ O(ε). This guarantees that dTV (N (b µ, Σ), N (Σ µ, Σ)) ≤ O(ε), which in turn b N (µ, Σ)) ≤ O(ε), as claimed. implies that dTV (N (b µ, Σ), 34 Therefore, we have shown: Theorem 18. Fix ε, δ > 0. Given an ε-corrupted set of samples S from N (µ, Σ), where n = poly(d, 1/ε, log 1/δ), there is an algorithm RecoverGaussian which takes as input S, ε, δ, and b so that outputs a µ b, Σ b ≤ O(ε) . dTV (N (µ, Σ), N (b µ, Σ)) Moreover, the algorithm runs in time poly(d, (1/ε)O(log 4 1/ε) , log 1/δ). References [BDLS17] S. Balakrishnan, S. S. Du, J. Li, and A. Singh. Computationally efficient robust sparse estimation in high dimensions. In Proceedings of the 30th Annual Conference on Learning Theory, COLT ’17, 2017. [Ber06] T. Bernholt. Robust estimators are hard to compute. Technical report, University of Dortmund, Germany, 2006. [BNJ03] D. M Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. Journal of machine Learning research, 3(Jan):993–1022, 2003. [BW41] L. M. Blumenthal and G. E. Wahlin. On the spherical surface of smallest radius enclosing a bounded subset of n-dimensional euclidean space. Bull. Amer. Math. Soc., 47:771–777, 1941. [CSV17] M. Charikar, J. Steinhardt, and G. Valiant. Learning from untrusted data. In Proc. 49th Annual ACM Symposium on Theory of Computing (STOC), pages 47–60. ACM Press, 2017. [CW01] A. Carbery and J. Wright. Distributional and Lq norm inequalities for polynomials over convex bodies in Rn . Mathematical Research Letters, 8(3):233–248, 2001. [DBS17] S. S. Du, S. Balakrishnan, and A. Singh. Computationally efficient robust estimation of sparse functionals. CoRR, abs/1702.07709, 2017. [DDS12] C. Daskalakis, I. Diakonikolas, and R.A. Servedio. Learning Poisson Binomial Distributions. In Proceedings of the 44th Symposium on Theory of Computing, pages 709–728, 2012. [DDS15] A. De, I. Diakonikolas, and R. Servedio. Learning from satisfying assignments. In Proceedings of the 26th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015, pages 478–497, 2015. [DK14] C. Daskalakis and G. Kamath. Faster and sample near-optimal algorithms for proper learning mixtures of gaussians. In Proceedings of The 27th Conference on Learning Theory, COLT 2014, pages 1183–1213, 2014. [DKK+ 16] I. Diakonikolas, G. Kamath, D. M. Kane, J. Li, A. Moitra, and A. Stewart. Robust estimators in high dimensions without the computational intractability. In Proceedings of FOCS’16, 2016. 35 [DKK+ 17] I. Diakonikolas, G. Kamath, D. M. Kane, J. Li, A. Moitra, and A. Stewart. Being robust (in high dimensions) can be practical. In Proceedings of the 34th International Conference on Machine Learning, ICML ’17, pages 999–1008. JMLR, Inc., 2017. [DKS16] I. Diakonikolas, D. M. Kane, and A. Stewart. Robust learning of fixed-structure bayesian networks. CoRR, abs/1606.07384, 2016. [DKS17] I. Diakonikolas, D. M. Kane, and A. Stewart. Statistical query lower bounds for robust estimation of high-dimensional gaussians and gaussian mixtures. In Proceedings of the 58th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’17, Washington, DC, USA, 2017. IEEE Computer Society. [DL01] L. Devroye and G. Lugosi. Combinatorial methods in density estimation. Springer Series in Statistics, Springer, 2001. [GCSR14] A. Gelman, J. B. Carlin, H. S. Stern, and D. B. Rubin. Bayesian data analysis, volume 2. Chapman & Hall/CRC Boca Raton, FL, USA, 2014. [GLS88] M. Grötschel, L. Lovász, and A. Schrijver. Geometric Algorithms and Combinatorial Optimization, volume 2. Springer, 1988. [Goo15] R. Goodell. Personal communication, 2015. [Ham01] F. Hampel. Robust statistics: A brief introduction and overview. In First International Symposium on Robust Statistics and Fuzzy Techniques in Geodesy and GIS. A. Carosio, H. Kutterer (editors), Swiss Federal Institute of Technology Zurich (ETH), Institute of Geodesy and Photogrammetry, IGP-Bericht, number 295, pages 13–17, 2001. [HM13] M. Hardt and A. Moitra. Algorithms and hardness for robust subspace recovery. In COLT 2013, pages 354–375, 2013. [HR09] P.J. Huber and E. M. Ronchetti. Robust statistics. Wiley New York, 2009. [HRRS86] F. R. Hampel, E. M. Ronchetti, P. J. Rousseeuw, and W. A. Stahel. Robust statistics. The approach based on influence functions. Wiley New York, 1986. [Hub64] P. J. Huber. Robust estimation of a location parameter. The Annals of Mathematical Statistics, 35(1):73–101, 1964. [Jun01] H. W. E. Jung. Über die kleinste kugel, die eine räumliche figur einschliesst. J. Reine Angew. Math, 123:241–257, 1901. [Kan12] D. M. Kane. A structure theorem for poorly anticoncentrated gaussian chaoses and applications to the study of polynomial threshold functions. In FOCS, pages 91–100, 2012. [Kla07] B. Klartag. A central limit theorem for convex sets. 168(1):91–131, 2007. [Li17] J. Li. Robust sparse estimation tasks in high dimensions. CoRR, abs/1702.05860, 2017. [LM00] B. Laurent and P. Massart. Adaptive estimation of a quadratic functional by model selection. Ann. Statist., 28(5):1302–1338, 2000. 36 Inventiones mathematicae, [LRV16] K. A. Lai, A. B. Rao, and S. Vempala. Agnostic estimation of mean and covariance. In Proceedings of FOCS’16, 2016. [NJB+ 08] J. Novembre, T. Johnson, K. Bryc, Z. Kutalik, A. R. Boyko, A. Auton, A. Indap, K. S. King, S. Bergmann, M. R. Nelson, et al. Genes mirror geography within europe. Nature, 456(7218):98–101, 2008. [O’D14] R. O’Donnell. Analysis of Boolean Functions. Cambridge University Press, 2014. [OF96] B. A. Olshausen and D. J. Field. Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature, 381(6583):607, 1996. [RL05] P. J. Rousseeuw and A. M. Leroy. Robust regression and outlier detection, volume 589. John Wiley & Sons, 2005. [Rou85] P. Rousseeuw. Multivariate estimation with high breakdown point. Mathematical Statistics and Applications, pages 283–297, 1985. [SCV18] J. Steinhardt, M. Charikar, and G. Valiant. Resilience: A criterion for learning in the presence of arbitrary outliers. In Proc. of the 9th Conference on Innovations in Theoretical Computer Science, 2018. to appear. [Tuk75] J. W. Tukey. Mathematics and picturing of data. In Proceedings of ICM, volume 6, pages 523–531, 1975. [Ver10] R. Vershynin. Introduction to the non-asymptotic analysis of random matrices, 2010. A Lower Bounds on Agnostic Learning In this section, we prove information theoretic lower bounds for robust distribution learning. In particular, we will prove that no algorithm (efficient or inefficient) can learn a general distribution ε . We note that our lower from an ε-corrupted set of samples to total variation distance less than 1−ε bound applies in more general settings than we consider in this paper in couple of ways: 1. Our construction is univariate; 2. Our construction works for any pair of distributions which are Gaussian distributions; and ε 1−ε -close, and not just for 3. Our construction holds for Huber’s ε-contamination model, which is weaker than the noise model studied in this paper. In Huber’s ε-contamination model, data is drawn from a mixture distribution (1 − ε)P + εQ, where P is some distribution that we wish to estimate and Q is arbitrary (in particular, it might ε -close can be made indistindepend on P ). We will show that any two distributions which are 1−ε guishable under this contamination model. ε Lemma 16. Let p1 and p2 be two distributions such that dTV (p1 , p2 ) = 1−ε . Then there exist Huber ε-contaminations p1′ and p2′ of p1 and p2 respectively, such that p1′ = p2′ . Therefore, no ε in Huber’s ε-contamination model. algorithm can learn a distribution p up to accuracy < 1−ε 37 Proof. Since dTV (p1 , p2 ) = ε 1−ε , we can write   ε ε p1 = 1 − q1 , pc + 1−ε 1−ε   ε ε p2 = 1 − q2 , pc + 1−ε 1−ε where pc , q1 , q2 are distributions. Let p1′ be the Huber ε-contamination of p1 with q2 , p2′ be the Huber ε-contamination of p2 with q1 . In other words, p1′ = (1 − 2ε) pc + εq1 + εq2 , p2′ = (1 − 2ε) pc + εq2 + εq1 , and thus p1′ = p2′ as desired. We note that a similar lower bound holds when p1 and p2 are required to be Gaussians, but weakened by a factor of 2. This is due to the geometry of the space of Gaussian distributions, and we note that in the case where the variance is known, this is achieved by the median. Lemma 17.pNo algorithm can output an estimate for the mean of a unit-variance Gaussian at  π accuracy < 2 − o(1) ε with probability > 1/2 in Huber’s ε-contamination model. Consequently,  by Lemma 1, no algorithm can learn a Gaussian to total variation distance < 12 − o(1) ε in Huber’s ε-contamination model. Proof. We will consider the distributions p1 = N (−α, 1) and p2 = N (α, 1), where α is to be specified later. We note that if p1 and p2 can be ε-corrupted into the same distribution, then the best estimate for the mean is to output 0 (by symmetry), and the result holds. 2 (x)} and We will show that p1 can be ε-corrupted into a distribution f , where f (x) = max{p1 (x),p η η is a normalizing constant (the case of p2 follows similarly). In other words, f can be written as (1 − ε)p1 + εq1 for some distribution q1 . Since q1 is a distribution, it is non-negative, and thus we 2 (x)} require that (1 − ε)p1 (x) ≤ f (x) for all x ∈ R. Note that f (x) = max{p1 (x),p ≥ p1η(x) . η We can compute η as follows: Z ∞ Z ∞ p2 (x)dx max {p1 (x), p2 (x)} dx = 2 η= 0 −∞ r      α α 1 1 2 + erf √ α − O(α3 ) = 1 + erf √ =1+ =2 2 2 π 2 2 Thus, p (x) p1 (x) q 1 = f (x) ≥ ≥ η 1 + π2 α − O(α3 ) 1− r ! 2 α + O(α2 ) p1 (x). π q Again, since we require that (1 − ε)p1 (x) ≤ f (x), it suffices that 1 − ε ≤ 1 − π2 α + O(α2 ) and thus q  pπ that π2 α − O(α2 ) ≤ ε. This corresponds to α ≤ 2 − o(1) ε, and the proof is complete. Observe that this lower bound can be strengthened by a factor of two in the subtractive adversary model, where the adversary is able to both remove εN samples and add εN samples. In this 38 infinite sample regime, this means that a distribution can be corrupted to any distribution which is ε-far in total √ variation  distance. By noting that N (−α, 1) and N (α, 1) are both ε-far from N (0, 1) for α = 2π + o(1) ε, we obtain the following lemma. Note that this lower bound is also achieved by the median in this model. Lemma 18.√No algorithm  can output an estimate for the mean of a unit-variance Gaussian at 2π + o(1) ε with probability > 1/2 in the subtractive adversary model. Consequently, accuracy < by Lemma 1, no algorithm can learn a Gaussian to total variation distance < ε in the subtractive adversary model. Finally, we conclude by sketching a lower bound for mean estimation of sub-Gaussian distributions. Lemma 19. No algorithm can output an estimate for the mean of a sub-Gaussian distribution at accuracy o(ε log1/2 (1/ε)) with probability > 1/2 in the Huber’s ε-contamination model. Proof. We start with the distribution q = N (0, 1). We construct p1 by truncating the right tail of q at the point xr = c1 log1/2 (1/ε) for some constant c1 , and rescaling the rest of the distribution appropriately. Observe that, for an appropriate choice of c1 :   1 ; • p1 is sub-Gaussian with a constant of O 1−ε • The mean of p1 is −c2 ε log1/2 (1/ε) for some constant c2 ; • p1 can be corrupted in Huber’s ε-contamination model to be q. We can similarly consider p2 , which is constructed by truncating the left tail of q at the point xl = −c1 log1/2 (1/ε). Since p1 and p2 are indistinguishable when they are both ε-corrupted to q, and the mean of all three distributions are separated by ≥ c2 ε log1/2 (1/ε), the lemma follows. B B.1 Omitted Proofs from Section 2 Proof of Lemma 1 Proof. Observe that by rotational and translational invariance, it suffices to consider the problem when µ1 = −εe1 /2 and µ2 = εe1 /2, where e1 is the first standard basis vector. By the decomposability of TV distance, we have that the TV distance can in fact be written as a 1 dimensional integral: Z ∞ 1 1 2 2 dTV (N (µ1 , I), N (µ2 , I)) = · √ e−(x−ε/2) /2 − e−(x+ε/2) /2 dx . 2 2π −∞ 2 /2 The value of the function f (x) = e−(x−ε/2) when x > 0, hence this integral becomes 2 /2 − e−(x+ε/2) is negative when x < 0 and positive Z ∞ 1 2 2 e−(x−ε/2) /2 − e−(x+ε/2) /2 dx dTV (N (µ1 , I), N (µ2 , I)) = √ 2π 0 = F (ε/2) − F (−ε/2) , 39 Rx 2 where F (x) = √12π −∞ e−t /2 dt is the CDF of the standard normal Gaussian. By Taylor’s theorem, and since F ′′ (x) is bounded when x ∈ [−1, 1], we have F (ε/2) − F (−ε/2) = F ′ (−ε/2)ε + O(ε3 ) 1 2 = √ e−(ε/2) /2 ε + O(ε3 ) 2π   1 = √ + o(1) ε , 2π which proves the claim. C Omitted Proofs from Section 4 C.1 Proof of Theorem 7 First, we require the following several claims about p(x) under various distributions, including the true Gaussian and from choosing points uniformly at random from the sets of interest. Note that throughout this section we will use Lemma 3, which implies that kΠV ′ µ − µ̃k2 < 2ε when the parameters α, γ are chosen appropriately. Claim 4. EN (µ,I) [p(X)] = kΠV ′ µ − µ̃k22 . Proof. Letting v1 , . . . , vC1 β log(1/ε) be an orthonormal basis of V ′ , we have C1 β log(1/ε) E [p(X)] = N (µ,I) X i=1 C1 β log(1/ε) E N (viT µ,1) 2 [hvi , X − µ̃i − 1] = X i=1 (viT (µ − µ̃))2 = kΠV ′ µ − µ̃k22 . Claim 5. For some absolute constant c0 and all t ≥ kΠV ′ µ − µ̃k22 ,    (t − kΠV ′ µ − µ̃k22 )2 2 Pr (p(X) > t) ≤ 2 exp −c0 · min , t − kΠV ′ µ − µ̃k2 . C1 β log(1/ε) N (µ,I) Proof. This follows from Lemma 7, after re-centering the polynomial using Claim 4 and noting that the spectral norm and squared Frobenius norm of the corresponding A matrix are at most 1 and C1 β log(1/ε), respectively. Claim 6. ES [p(X)] ≥ C1 ε log(1/ε). Proof. Recall that µ̂ is the empirical mean of the point set. E[p(X)] = E[kΠV ′ X − µ̃k22 ] − dim(V ′ ) S S ≥ E[kΠV ′ X − ΠV ′ µ̂k22 ] − dim(V ′ ) S   1 ≥ 1 + ε dim(V ′ ) − dim(V ′ ) = C1 ε log(1/ε) . β Claim 7. EG0 [p(X)] ≤ kµ − µ̃k22 + O(γ)ε. 40 Proof. E [p(X)] ≤ G0 ≤ ≤ Z 0 Z ∞ Pr[p(X) ≥ t]dt G0 O(d log(d/εδ)) Pr[p(X) ≥ t]dt G0 0 Z O(d log(d/εδ)) Pr [p(X) ≥ t]dt + O(γ)ε N (µ,I) 0 ≤ kµ − µ̃k22 + O(γ)ε The inequalities follow from (γε, δ)-goodness and Claim 4. Claim 8. φ(S, G0 ) EL [p(X)] = (C1 β + O(γ) + o(1))ε. Proof. φ(S, G0 ) E[p(X)] = L Z ∞ φ(S, G0 ) Pr[p(X) > t]dt L 0 = Z O(d log(|G|/δ)) φ(S, G0 ) Pr[p(X) > t]dt = Z (4) L 0 C1 β log(1/ε)+4ε2 φ(S, G0 ) Pr[p(X) > t]dt 0 + Z L O(d log(|G|/δ)) C1 β log(1/ε)+4ε2 φ(S, G0 ) Pr[p(X) > t]dt L 2 ≤ (C1 β log(1/ε) + 4ε )φ(S, G0 ) + 2 Z O(d log(|G|/δ)) Pr[p(X) > t]dt C1 β log(1/ε)+4ε2 G0 ≤ (C1 β log(1/ε) + 4ε2 )φ(S, G0 ) Z O(d log(|G|/δ)) Pr [p(X) > t] + +2 C1 β log(1/ε)+4ε2 N (µ,I) 2 γε dt d log(|G|/δ) ≤ (C1 β log(1/ε) + 4ε )φ(S, G0 ) + O(γε) + 8εc0 C1 β ≤ (C1 β + O(γ) + o(1))ε. (5) (6) (7) (4) and (5) follow from G0 being (γε, δ)-good, (6) is from Claim 5, and (7) is because φ(S, G0 ) log(1/φ(S, G0 )) ≤ (1 + o(1))ε . This gives: Claim 9. ψ EE [p(X)] ≥ C1 ε log 1/ε − (C1 β + 1 + O(γ) + o(1))ε. Proof. This immediately follows from Claims 6, 7, and 8. We now show that in the case that there are many large eigenvalues, there will be a T satisfying the conditions of the filter. Claim 10. Suppose dim(V ) ≥ C1 β log(1/ε). Then there is a T satisfying the conditions in the algorithm. 41 Proof. Suppose not. Then, we have ψ E[p(X)] ≤ E Z 2C3 log(1/ε)/c0 0 ψ Pr[p(X) ≥ t]dt + E ≤ 2(C3 /c0 )ψ log 1/ε + ≤ 2(C3 /c0 )ψ log 1/ε + ≤ (2C3 /c0 )ε log 1/ε + Z Z Z C2 d log |S|/δ Z 2(C3 /c0 ) log(1/ε) C2 d log |S|/δ ∞ 2C3 log(1/ε)/c0 ψ Pr[p(X) ≥ t]dt E ψ Pr[p(X) ≥ t]dt E Pr[p(X) ≥ t]dt 2(C3 /c0 ) log(1/ε) S C2 d log |S|/δ Pr[p(X) ≥ t]dt . 2(C3 /c0 ) log(1/ε) S By applying the contradiction assumption, we have   c0 T γε Pr[p(X) ≥ t]dt ≤ exp − dt + 2C3 d log |S|/δ 2(C3 /c0 ) log(1/ε) S 2(C3 /c0 ) log(1/ε)   Z C2 d log |S|/δ c0 T exp − ≤ dt + C2 γε 2C3 2(C3 /c0 ) log(1/ε)   Z ∞ c0 T dt + C2 γε exp − ≤ 2C3 2(C3 /c0 ) log(1/ε) Z ∞ exp (−t) dt + C2 γε ≤ (C3 /c0 ) Z Z C2 d log |S|/δ C2 d log |S|/δ 2 log(1/ε) 2 ≤ (C3 /c0 ) · O(ε ) + C2 γε , and thus, we have ψ E[p(X)] ≪ C1 ε log 1/ε − (C1 β + 1 + O(γ) + o(1))ε , E which contradicts Claim 9. It now suffices to prove that if we construct a filter, then the invariant that ∆ decreases is preserved. Formally, we show: Claim 11. Suppose dim(V ) ≥ C1 β log(1/ε). Let S ′ be the set of points we return. Then ∆(S ′ , G) < ∆(S, G). Proof. Let T be the threshold we pick. If T > C2 d log(|S|/δ) then the invariant is satisfied since we remove no good points, by (γε, δ)-goodness. It suffices to show that in the other case, we remove log(1/ε) times many more bad points than good points. By definition we remove at least     γε c0 T + . |S| · exp − 2C3 d log |S|/δ points. On the other hand, by (γε, δ)-goodness, Claim 5, we know that we throw away at most |G| · Pr[p(X) > T ] ≤ |G0 | · Pr[p(X) > T ] G G0      γε (T − kµ − µ̃k22 )2 2 , (T − kµ − µ̃k2 ) + ≤ |G0 | exp −c0 · min . C1 β log(1/ε) 2 log(1/ε)(d log(|S|/δ)) 42 By our choice of T , and since kµ − µ ek2 ≤ O(δ) ≪ 1, the first term is upper bounded by       (C3 − 1)2 (T − kµ − µ̃k22 )2 2 , (T − kµ − µ̃k2 ) ≤ exp −c0 · min T, (C3 − 1)T ) exp −c0 · min C1 β log(1/ε) C1 β and so  exp −c0 · min     (C3 − 1)2 c0 T T, (C3 − 1)T ) ≤ exp − C1 β C3   c0 T 2 = exp − 2C3   c0 T ·ε ≤ exp − 2C3   1 c0 T ≪ . exp − 2C3 log2 1/ε Since we have maintained this invariant so far, in particular, we have thrown away more bad points than good points, and so |G0 | ≤ (1 + ε)|S|.     γε c0 T Therefore, we have log(1/ε) · |G| · PrG [p(X) > T ] ≤ |S| · exp − 2C + d log |S|/δ , and hence, 3 the invariant is satisfied. Claims 10 and 11 together imply the correctness of Theorem 7. C.2 Proof of Lemma 5 We require the following basic fact of good sets (see, e.g., Fact 8.6 in [DKK+ 16]): Fact 2. Let v ∈ Rd be any unit vector. Let G be (η, δ)-good with respect to N (µ, I). Then for any T > 0, Pr(|v · (X − µ)| > T ) ≤ 2 exp(−T 2 /2) + η/(d log(d/ηδ)) , G and Pr (|v · (X − µ)| > T ) ≤ 2 exp(−T 2 /2). N (µ,I) ε Proof. Let hv, µ − µ bi = R > β 1/2 . Observe that by direct calculation, we have ES [hv, X − 2 2 2 µi ] − ES [hv, bi ] ≤ 3R . Hence, it suffices to show that ES [hv, X − µi2 ] ≥ 1 + Ω(R2 /ε) −  X − µ  ε. γ + O β1 We write S = (G0 \ L, E) where |E| = ψ|S| and |L| = φ|S|. First we consider the expectation of v · X over X in S. This is µ0 − φµL + ψµE . 1−φ+ψ where µ0 is the mean over G0 , µL the mean over L and µE the mean over E. By (γε, δ)-goodness, we have that |hv, µ0 − µi| ≤ γε. We also have that Z ∞ Pr [|hv, X − µi| ≥ t] dt |hv, µL − µi| ≤ L 0 Z √ O( d log(d/εδ)) Pr [|hv, X − µi| ≥ t] dt = L 0 43 Since we have   |G0 | Pr [|hv, X − µi| > t] , Pr [|hv, (X − µ)i| > t] ≤ min 1, L |L| G0 (8) by Fact 2 and the calculations done in the proof of Corollary 8.8 in [DKK+ 16], we have that ε , |hv, µL − µi| ≤ O(log |S|/|L|) ≤ O(log 1/φ). Since by assumption we have hv, µ − µ bi = R > β 1/2 this implies that hv, µE − µi = Ω(R/ε). In particular, this implies that   E hv, X − µi2 ≥ E [hv, X − µi]2 E E  2 R ≥Ω . ε2 Next we consider the expectation of hv, X −µi2 . By (γε, δ)-goodness, we have EG0 [hv, X −µi2 ] = 1 + O(ε). We also have that Z ∞     2 φ Pr |hv, X − µi|2 ≥ t dt φ E hv, X − µi ≤ L 0 L 5 ≤ log(1/ε)φ + β ≤ 5 log(1/ε)φ + β Z O(d log d/εδ) (5/β) log(1/ε) Z O(d log d/εδ)   φ Pr |hv, X − µi|2 ≥ t dt L   Pr |hv, X − µi|2 ≥ t dt (5/β) log(1/ε) G0 Z O(d log d/εδ)   5 Pr |hv, X − µi|2 ≥ t dt + γε log(1/ε)φ + β (5/β) log(1/ε) N (µ,I)     1 = O + γ + o(1) ε. β = Since EG0 [hv, (X − µ)i2 ] − φ EL [hv, (X − µ)i2 ] + ψ EE [hv, (X − µ)i2 ] , S 1−φ+ψ    ε. this is at least 1 + Ω(R2 /ε) − γ + O β1 E[hv, (X − µ)i2 ] = D D.1 Omitted Proofs from Section 6 Proof of Theorem 15 b − I, and Our algorithm works as follows, just as for Algorithm 4. It finds all large eigenvalues of Σ if there are too many, produces an explicit degree-2 polynomial which, as we will argue, produces a valid filter. The formal pseudocode for our algorithm is in Algorithm 11. The proofs of the following claims are identical to the proofs of Claim 6-9, by applying the corresponding property of (γε, δ)-goodness for this setting, and so we omit them. Claim 12. ES [p(x)] ≥ Cξ. Claim 13. EG0 [p(X)] ≤ ε . (d log 1/ε)2 Claim 14. φ(S, G0 ) EL [p(X)] = (C + O(γ) + o(1))ε. 44 Algorithm 11 Filter if there are many large eigenvalues of the covariance 1: function FilterCovManyDeg2Eig(S, ε, ξ, δ) b be the empirical second moment of S, respectively. 2: Let Σ b − I with eigenvalue more than 3: Let V be the subspace of Rd spanned by eigenvectors of Σ Cξ. 4: if dim(V ) ≥ C1 log(1/ε) then 5: Let V ′ be a subspace of V of dimension C1 log(1/ε). 6: Let p(x) be the quadratic polynomial p(x) = kΠV ′ (x)k22 − dim(V ′ ). 7: Find a value T > 0 so that either: • T > C2 d log(|S|/δ) and p(x) > T for at least one x ∈ S, or • T > 2C3 log(1/ε)/c0 and PrS (p(x) > T ) > exp(−c0 T /(2C3 )) + ε/(d log(|S|/δ)). 8: return S ′ = {x ∈ S : p(x) ≤ T } . else return an orthonormal basis for V . 11: end if 12: end function 9: 10: Claim 15. ψ EE [p(X)] ≥ Cξ − (C1 + 1 + O(γ) + o(1))ε. These claims imply just as before that there is a T with the desired properties. Again, the proof is identical. Formally: Claim 16. Suppose dim(V ) ≥ C log(1/ε). Then there is a T satisfying the conditions in the algorithm. Finally, we show the invariant that ∆ decreases. This is almost identical to the proof of Claim 11, however, we need to slightly change our application of the Hanson-Wright inequality. Formally, we show: Claim 17. Suppose dim(V ) ≥ C1 log 1/ε. Let S ′ be the set of points we return. Then ∆(S ′ , G) < ∆(S, G). Proof. Let T be the threshold we pick. If T > C2 d log(|S|/δ) then the invariant is satisfied since we remove no good points, by (γε, δ)-goodness. It suffices to show that in the other case, we remove log 1/ε times many more bad points than good points. By definition we remove at least     c0 T ε |S| · exp − + 2C3 d log |S|/δ points. On the other hand, observe that if v1 , . . . , vk is an orthonormal basis for V , we have X kΠV xk22 = hvi , Xi2  X vi viT Σ1/2 X , = yΣ1/2 45 so that ifPX ∼ N (0, Σ), we have Y ∼ N (0, I). Let M = Σ1/2 kM kF ≤ ni=1 kΣk2 ≤ (1 + ξ)k, and kM k2 ≤ kΣk2 ≤ (1 + ξ). Since E [kΠV xk22 ] − k = N (0,Σ) ≤ k X i=1 k X i=1 P  vi viT Σ1/2 . We have that viT (Σ − I)vi kΣ − Ik2 ≤ (1 + ξ)k , we have by Hanson-Wright that Pr N (0,Σ)      (T − (1 + ξ)k)2 , (T − kµ − (1 + ξ)kk22 ) , kΠV xk22 − dim(V ) > T ≤ exp −c0 · min C1 log(1/ε) so by our choice of T , we have       (T − kµ − µ̃k22 )2 (C3 − 1)2 2 exp −c0 · min , (T − kµ − µ̃k2 ) ≤ exp −c0 · min T, (C3 − 1)T ) . C1 log(1/ε) C1 The remaining proof now proceeds identically to the proof of Claim 17. D.2 Proof of Theorem 16 Clearly, the only non-trivial condition to certify for Theorem 16 is that if we are in Case (1), the returned set satisfies the desired properties. Our proof will roughly follow the same structure as the proof of Theorem 7. We will first show that the empirical average of the polynomial Q can only be large because of the contribution of the points in E (Claim 21). We will then show that this implies that there exists a threshold T which the algorithm will find in this case (Claim 22). Finally, we will show that for any such T we find, the returned set of points will indeed satisfy ∆(S ′ , G0 ) < ∆(S, G0 ), which implies the correctness of the algorithm (Claim 23). We first show the following claim: Claim 18. ES [ri ] − EN (0,Σ) [ri ] ≤ (4C + 1)ξ √ Proof. Let us suppose that pi corresponds to the matrix Ai , given by (Ai )a,b = ∇a ∇b pi / 2!, so that the Ai are orthonormal with respect to the Frobenius norm. Then the constant harmonic 2 2 2 part √ of2 pi corresponds to kAi kF ≤ 1. The degree-2 harmonic part of p2i corresponds to the matrix 2 2Ai . This is because if we let Bi be the matrix corresponding to pi , we have   1 ∇a ∇b p2i (X) E (Bi )a,b = √ 2 X∼N (0,I) 2 =√ E [∇b (pi (X)∇a pi (X))] 2 X∼N (0,I) 2 E [∇a pi (X)∇b pi (X) + pi (X)∇a ∇b pi (X)] =√ 2 X∼N (0,I) 2 =√ E [∇a pi (X)∇b pi (X)] 2 X∼N (0,I) √ = 2 2h(Ai )a , (Ai )b i , 46 where the second to last line follows since ∇a ∇b pi (X) is a constant, and the last line follows from explicit computation. In particular,√this implies that the non-constant component of Pri corresponds to matrix with trace norm at most 2 2 ≤ 4. Therefore, r can be written as r (x) = αi hvi , xi2 +C0 i i P for some constant C0 , where |αi | ≤ 4. Thus, by our assumption, we have ES [ri ] ≤ 1 + Cξ. The claim then follows since Σ and I are differ in Frobenius norm by at most ξ. Claim 19. ES [Q(X)] − EX∼N (0,Σ) [Q(X)] ≥ (C1 − 6)ξk Proof. Observe that since kΣ − IkF ≤ ξ, in particular we have kΣ⊗2 − I ⊗2 k2 ≤ ξ, and hence by Lemma 10 we have that EN (0,Σ) [p2 (X)] − EX∼N (0,I) [p2 (X)] ≤ 2ξ for all p ∈ P2 . Hence, in particular, we have E[p2i (X)] − E [p2i (X)] ≥ (C1 − 2)ξ . S By Claim 18, we have E S " In particular, this implies that N (0,Σ) k X i=1 # ri − E [Q(X)] − S E N (0,Σ) " k X i=1 # ri ≤ (4C + 1)k . E [Q(X)] ≥ (C1 − 4C − 5)ξk , N (0,I) as claimed. We now show: Claim 20. There is some universal constant B so that E √ [Q2 (X)]1/2 ≤ B k . X∼N (0,Σ) Before we prove this, we need the following lemma: Lemma 20. For any degree-4 polynomial p, and any Σ, if we let F (y, p, Σ) denote the yth percentile of p under Σ, then we have F (1/4, p2 , Σ), F (3/4, p2 , Σ) = Θ(EX∼N (0,Σ) [p2 (X)]). Proof. Let µ′ = EX∼N (0,Σ) [p2 (X)]. First, we note that Pr(p2 (X) > 4µ′ ) ≤ 1/4, so F (3/4, p2 , Σ) ≤ 4µ′ . On the other hand, anti-concentration bounds [CW01], we have that Pr(p2 (X) ≤ √ ′ by known 1/8 ′ εµ ) = Pr(|p(X)| ≤ εµ ) = O(ε ). So, for ε a sufficiently small constant, Pr(p2 (X) ≤ εµ′ ) < 1/4, and therefore, F (1/4, p2 , Σ) ≥ εµ′ . Since εµ′ ≤ F (1/4, p2 , Σ) ≤ F (3/4, p2 , Σ) ≤ 4µ′ , this completes our proof. Proof of Claim 20. Since dTV (N (0, Σ), N (0, I)) = O(ε log 1/ε) = o(1), we have that F (3/4, Q2 , Σ) ≤ F (1/4, Q2 , Σ), so by the above lemma, we have that E [Q2 (X)]1/2 ≤ O( X∼N (0,Σ) E [Q2 (X)]1/2 ) . X∼N (0,I) Hence, it suffices to bound kQk22 . 47 √ Let us again suppose that pi corresponds to the matrix Ai , given by (Ai )a,b = ∇a ∇b pi / 2!. Note that the Ai are symmetric matrices that form an orthonormal set. We note that qi is the harmonic degree-4 polynomial corresponding to the rank-4 tensor √ Ta,b,c,d = ∇a ∇b ∇c ∇d qi / 24 √ = ∇a ∇b ∇c ∇d (p2i )/ 24 √ = (2(∇a ∇b pi )(∇c ∇d pi ) + 2(∇a ∇c pi )(∇b ∇d pi ) + 2(∇a ∇d pi )(∇b ∇c pi ))/ 24 √ = (4(Ai )a,b (Ai )c,d + 4(Ai )a,c (Ai )b,d + 4(Ai )a,d (Ai )b,c )/ 24 √ = 6Sym(Ai ⊗ Ai ). √ P By linearity, Q corresponds to the rank-4 tensor T = 6 ki=1 Sym(Ai ⊗ Ai ). It thus suffices to show that kT k2 = O(k), where here k · k2 denotes the square root of the sum of the squares of the entries of the tensor. In order to show this, we note that kT k2 = supkV k2 =1 hV, T i. Therefore, it √ suffices to show that for all 4-tensors V with kV k2 ≤ 1, that hV, T i = O( k). We note that + + * * k k X X √ √ hV, T i = 6 V, Sym(Ai ) ⊗ Ai = 6 Sym(V ), Ai ⊗ Ai . i=1 i=1 Note that Sym(V ) is a symmetric 4-tensor of ℓ2 norm at most 1. Thinking of Sym(V ) as a symmetric Pn 2 matrix over 2-Tensors, we can write it as Sym(V ) = j=1 λj Bj ⊗ Bj , where the Bj ’s are an Pn 2 2 orthonormal basis for the set of 2-tensors and j=1 λj = kSym(V )k22 ≤ 1. Then, if ci,j := hAi , Bj i, P and cj = ki=1 c2i,j , we have that 2 2 k n n X √ X √ X c2i,j = 6 λj λj cj . hV, T i = 6 i=1 j=1 j=1 Since the Ai are orthonormal, cj ≤ 1 for all j. Furthermore, 2 2 n X cj = c2i,j = k X i=1 i=1 j=1 j=1 Therefore, n k X X kAi k2F = k. v v u n2 u n2 n2 uX √ √ √ X √ uX hV, T i = 6 λj cj ≤ 6t λ2j t c2j ≤ 6 · 1 · k = O( k) . j=1 j=1 j=1 Let µ′ = EX∼N (0,Σ) [Q(X)]. We now show that since G0 is ε-good, then almost all of the difference in Claim 19 must be because of the points in E. Claim 21. EE [Q(Y )] − µ′ ≥ C1 −6 2 · ξk φ Proof. It suffices to show that E[Q(X)] − µ′ ≤ G 48 C1 − 6 ξk , 2 (9) that is, the good points do not contribute  √ much to the difference. By (ε, δ)-goodness of G0 and ′ Claim 20 we have E0 [Q(Y )] − µ ≤ O ε k . Moreover, we have φ(E[Q(X)] − L E [Q(X)]) ≤ X∼N (0,Σ) (a) = Z ∞ 0 Z   φ Pr Q(X) − µ′ ≥ t dt L √ 2 O( kd log |S|/δ)   φ Pr Q(X) − µ′ ≥ t dt L 0 Z √ 2 ≤ φ · O( k log 1/ξ) + √ ≤ φ · O( k log2 1/ξ) + √ ≤ φ · O( k log2 1/ξ) + (b) √ O( kd2 log |S|/δ) φ Pr √ L O( k log2 1/ξ) Z O(√kd2 log |S|/δ)  Pr √ G0 O( k log2 1/ξ) Z O(√kd2 log |S|/δ)  Q(X) − µ′ ≥ t dt  Q(X) − µ′ ≥ t dt Pr [Q(X) − µ′ ≥ t]dt + O(ξ) √ O( k log2 1/ξ) N (0,Σ) √ ≤ O(ξ k) + exp(−Ω(log 1/ξ)) (c)  ≪ 5ξk , where (a) follows from the boundedness condition of (ε, δ)-goodness, (b) follows from the last condition of goodness, and (c) follows from hypercontractivity. This shows (9), which completes the proof. We now show that this implies that there must be a T satisfying the conditions in Algorithm 8. Claim 22. If dim(Vm ) ≥ k, then Algorithm 8 returns a T satisfying the conditions in the algorithm. Proof. Suppose not. By the assumption that kI − ΣkF ≤ ξ, we have |µ′ | = | EX∼N (0,Σ) [Q(X)]| ≤ P 2ξkQk2 ≤ ki=1 kpi k2 + kri k2 ≤ 5ξk. Thus, we have     C1 − 6 C1 − 6 − 5 ξk ≫ E[Q(X)] ≥ ξk . E 2ψ 3ψ But since we assume there is no T satisfying the conditions in Algorithm 8, we have Z ∞ Pr[p(X) > t]dt ψ E [p(X)] ≤ ψ X∈E 0 E √ 2 ≤ ψ · 4B k log (1/ξ) + ≤ 4Bψ · √ k log2 (1/ξ) + ≤ 4C2 Bψ · √ Z √ O(d2 k log(|S|/δ)) ψ Pr[p(X) √ E 4B k log2 1/ξ Z O(d2 √k log(|S|/δ)) Pr[p(X) √ S 4B k log2 1/ξ Z O(d2 √k log(|S|/δ)) k log2 (1/ξ) + √ 4A2 C2 B k log2 1/ξ √ Z ∞ √ ≤ 4A2 C2 Bψ k log2 (1/ξ) + 4B k √ e 2 ) ≪ 10ξk , ≤ O( kξ) + O(ε A2 log2 1/ξ > t]dt > t]dt  t √ exp −A 4B k 1/2 ! ε2 + 2 d log |G|/δ e 2) exp(−Ω(t1/2 ))dt + O(ε which is a contradiction, for our choice of C1 , C2 , C3 , and since we chose k = O(log4 1/ε). 49 ! dt The final thing we must verify is that the number of good points we remove is much smaller than the number of bad points we remove. Formally, we show: Claim 23. If dim(Vm ) ≥ k, then Algorithm 8 returns a S ′ satisfying ∆(S ′ , G0 ) < ∆(S, G0 ). √ Proof. Let T be the threshold we pick. If T > C3 d2 k log(|S|) then the invariant is satisfied since we remove no good points, by (ε, δ)-goodness. It suffices to show that we remove log 1/ε times many more bad points than good points. Otherwise, by definition we remove a total of ! 1/2 !  ε2 T √ + 2 |S| · exp −A d log2 |S|/δ 2B k points. On the other hand, by (ε, δ)-goodness, hypercontractivity, and Claim 20, we know that the total number of points we throw away is at most |G| · Pr[Q(X) > T ] ≤ |G0 | · Pr[Q(X) > T ] G G0 −1/2 ! ! ε2 + ≤ |G0 | exp −A 2 log(1/ε)(d log(|G|/δ))2 !  1/2 ! T ε2 √ ≤ |G0 | exp −A . + 2 log(1/ε)(d log(|G|/δ))2 B k  T kQk2 Since we have maintained this invariant so far, in particular, we have√ thrown away more bad points than good points, and so |G0 | ≤ (1 + ε)|S|. Moreover, since T ≥ 4B k log2 1/ε, we have exp −A  T √ B k 1/2 ! = exp −A ≤ exp −A ≤ exp −A ≤ exp −A     T √ 4B k T √ 4B k T √ 4B k T √ 4B k 1/2 !2 1/2 ! 1/2 ! 1/2 !  · exp −A · ε−1 · !1/2  √ 2 4B k log 1/ε  √ 4B k 1 . log 1/ε    1/2  Therefore, we have log(1/ε) · |G| · PrG [Q(X) > T ] ≤ |S| · exp −A 4BT√k + hence, the invariant is satisfied. ε2 d2 log |G|/δ  , and Claims 22 and 23 together prove the theorem. D.3 Proof of Lemma 6 By Lemma 8.16 in [DKK+ 16], the first two items hold together with probability 1 − O(δ) after taking O(poly(d, 1/η, log 1/δ)) samples. Thus, it suffices to show that the last property holds with probability 1 − O(δ) given O(poly(d, 1/η, log 1/δ)) samples. We may clearly WLOG take Σ = I. Moreover, these properties are clearly invariant under scaling, and hence, it suffices to prove them 50 for degree-four polynomials with VarN (0,I) [p(X)] = 1. For any fixed degree-4 polynomial p, by P hypercontractivity, since P (X) = n1 ni=1 p(Xi ) has variance Var[P (X)] = n1 , we have that " # n   1X Pr p(Xi ) − E [p(X)] ≥ t ≤ exp −At1/2 n1/4 . n N (0,I) i=1 In particular, if we take n=Ω then Pr "  log4 1/δ η2  , # n 1X p(Xi ) − E [p(X)] ≥ η ≤ O(δ) . n N (0,I) i=1 4 Since there is a 1/3-net over all degree-4polynomials with unit variance of size (1/3)O(d ) , by union  d4 log1/δ samples, then the second to last property holds bounding, we obtain that if we take Ω η2 with probability 1 − δ. Finally, the same net technique used to prove Lemma 8.16, along with hypercontractivity, may be used to show the last property holds when given poly(d, log 1/η, log 1/δ) samples. D.4 Proof of Lemma 15 Proof. Let µ′ = EN (0,Σ) [p(X)], s = EN (0,Σ) [p2 (X)], and let ES [p(X)] − EN (0,Σ) [p(X)] = K. By (ε, δ)-goodness and Lemma 10, we have E [p(X)] − µ′ ≤ ε E [p2 (X)]1/2 ≤ 2ε . G0 N (0,Σ) (10) Moreover, for some appropriate choice of β1 , we have Z ∞ ′ φ Pr [|p(X) − µ| ≥ t] dt φ E[p(X)] − φµ ≤ L 0 L ≤ β1 φ log 1/ε + (a) Z ≤ β1 φ log 1/ε + (b) ≤ β1 φ log 1/ε + (c) O(d log |S|/δ) β1 log 1/ε |G0 | |S| |G0 | |S| Z Z φ Pr [|p(X) − µ| ≥ t] dt L O(d log |S|/δ) β1 log 1/ε O(d log |S|/δ) β1 log 1/ε Pr [|p(X) − µ| ≥ t] dt G0 Pr [|p(X) − µ| ≥ t] dt + O(ε) N (0,Σ) ≤ β1 φ log 1/ε + εO(β1 ) + O(ε) = O(ε) , (11) where (a), (b), follows from the definition of goodness, and (c) follows from standard Guassian concentration bounds. In particular, (10) and (11) together imply that 2K K ≥ E[p(X) − µ′ ] ≥ , E ψ 2ψ 51 so this implies K2 . 4ψ 2 E[(p(X) − µ′ )2 ] ≥ E Expanding this yields that E[(p(X) − µ′ )2 ] = E[p2 (X)] − 2µ′ E[p(X)] + (µ′ )2 , E E E so since |µ′ | ≤ kΣ − IkF ≤ ξ, we have E[p2 (X)] ≥ E 2K K2 − + O(ξ 2 ) . 4ψ 2 ψ (12) On the other hand, by Lemma 10, we have 1 |s − 1| ≤ kΣ⊗2 − I ⊗2 k2 + kΣ − Ik2F 2 ≤ ξ + O(ξ 2 ) . (13) Also, by (ε, δ)-goodness and Lemma 10, we have E [p2 (X)] − s ≤ ε(1 + O(ξ)) , (14) G0 and, for A as in Corollary 6, and β appropriately chosen, Z ∞ 2 φ(E[p (X)] − s) ≤ φ Pr[|p2 (X) − s| ≥ t]dt L 0 L 2 ≤ βAφ log 1/ε + Z O((d log |S|/δ)2 ) |G0 | ≤ βAφ log 1/ε + |S| 2 (a) ≤ βAφ log2 1/ε + (b) ≤ βAφ log2 1/ε + φ Pr[|p2 (X) − s| ≥ t]dt L 2A log2 1/ε |G0 | |S| Z ∞ Z O((d log |S|/δ)2 ) βA log 1/ε Z Pr[|p2 (X) − s| ≥ t]dt G0 2 O((d log |S|/δ)2 ) 2 βA log 1/ε 1/2 /2 e−At 2 Pr [|p2 (X) − s| ≥ t]dt + O(ε2 ) N (0,Σ) dt + O(ε2 ) βA log 1/ε 2 ≪ 2βAξ + O(ε) + O(ε ) , (15) where (a) follows from goodness, and (b) follows from Corollary 6 and since kΣ − IkF = o(1). Thus, (12), (13), (14), and (15) together imply that E[p2 (X)] − 1 ≥ 1 − (ξ + O(ξ 2 )) − O(ε) − 2βAξO(ε) + S and so since K ≥ Ω √  εξ , this gives the desired bound. 52 K2 − 2K + O(ξ 2 ) , 4ψ
10math.ST
ON THE ALGEBRAIC AND ARITHMETIC STRUCTURE OF THE MONOID OF PRODUCT-ONE SEQUENCES arXiv:1802.00991v1 [math.AC] 3 Feb 2018 JUN SEOK OH Abstract. Let G be a finite group. A finite unordered sequence S = g1 · . . . · gℓ of terms from G, where repetition is allowed, is a product-one sequence if its terms can be ordered such that their product equals 1G , the identity element of the group. As usual, we consider sequences as elements of the free abelian monoid F (G) with basis G, and we study the submonoid B(G) ⊂ F (G) of all product-one sequences. This is a finitely generated C-monoid, which is a Krull monoid if and only if G is abelian. In case of abelian groups, B(G) is a well-studied object. In the present paper we focus on non-abelian groups, and we study the class semigroup and the arithmetic of B(G). 1. Introduction Let G be a finite group. By a sequence over G, we mean a finite unordered sequence of terms from G, where the repetition of elements is allowed (the terminology stems from Arithmetic Combinatorics). A sequence S is a product-one sequence if its terms can be ordered such that their product equals the identity element of the group. Clearly, juxtaposition of sequences is a commutative operation on the set of sequences. As usual we consider sequences as elements of the free abelian monoid F (G) with basis G, and clearly the subset B(G) ⊂ F (G) of all product-one sequences is a submonoid. The small Davenport constant d(G) is the maximal integer ℓ for which there is a sequence of length ℓ which has no productone subsequence. The large Davenport constant D(G) is the maximal length of a minimal product-one sequence (by a minimal product-one sequence we mean an irreducible element in the monoid B(G)). Suppose that G is abelian, and let us use additive notation in this case. Then product-one sequences are zero-sum sequences and their study is the main objective of Zero-Sum Theory ([12, 25]). The monoid B(G) is a Krull monoid with class group G (apart from the exceptional case where |G| = 2), and because it has intimate relationship with general Krull monoids having class group G, the study of B(G) is a central topic in factorization theory ([18, 15]). Although the abelian setting has been the dominant one, many of the combinatorial problems on sequences over abelian groups have also been studied in the nonabelian setting. For example, an upper bound on the small Davenport constant was given already in the 1970s [29], and in recent years Gao’s Theorem E(G) = |G| + d(G) ([25, Chapter 16]) has been generalized to a variety of nonabelian groups ([3, 14, 13, 26, 27]). Fresh impetus came from invariant theory. If G is abelian, then d(G) + 1 = β(G) = D(G), where β(G) is the Noether number. If G is nonabelian and has a cyclic subgroup of index two, then the Davenport constants and the Noether number have been explicitely determined ([8, 17]), and it turned out that d(G) + 1 ≤ β(G) ≤ D(G). For a survey on the interplay with invariant theory we refer to [9] and for recent progress to [24, 6, 7, 10]. Let F be a factorial monoid. A submonoid H ⊂ F is a C-monoid if H × = H ∩ F × and the reduced class semigroup is finite. A commutative ring is called a C-ring if its monoid of regular elements is a b is C-monoid. To give an example of a C-ring, consider a Mori domain R. If its conductor f = (R : R) 2010 Mathematics Subject Classification. 13A50, 20D60, 20M13. Key words and phrases. product-one sequences, Davenport constant, C-monoids, sets of lengths. This work was supported by the Austrian Science Fund FWF, W1230 Doctoral Program Discrete Mathematics. 1 2 JUN SEOK OH b is finite, then R is a C-ring. For more on C-rings we refer to nonzero and the residue class ring R/f [30, 21]. The finiteness of the reduced class semigroup is used to derive arithmetical finiteness result for C-monoids ([18]). However, the structure of the (reduced) class semigroup has never been studied before. The monoid B(G) of product-one sequences is a finitely generated C-monoid, which is Krull if and only if G is abelian (in the Krull case, the class semigroup coincides with the class group which is isomorphic to G, apart from the exceptional case where |G| = 2). After putting together the needed background in Section 2, we study the structure of the class semigroup of B(G) in Section 3. Among others we show that the unit group of the class semigroup is isomorphic to the center of G, and we reveal a subgroup of the class semigroup which is isomorphic to G/G′ , which is the class group of the complete integral closure of B(G) (see Theorems 3.8 and 3.10; G′ denotes the commutator subgroup of G). In Section 4 we provide a complete description of the class semigroup for non-abelian groups of small order. In Section 5 we study the arithmetic of B(G) and our focus is on sets of lengths. Among others we show that unions of sets of lengths are finite intervals (Theorem 5.5). Throughout this paper, let G be a multiplicatively written finite group with identity element 1G ∈ G. 2. Preliminaries We denote by N the set of positive integers. For integers a, b ∈ Z, [a, b] = {x ∈ Z | a ≤ x ≤ b} means the discrete interval. For every n ∈ N, Cn denotes a cyclic group of order n. For an element g ∈ G, ord(g) ∈ N is its order, and for a subset G0 ⊂ G, hG0 i ⊂ G denotes the subgroup generated by G0 . We will use the following standard notation of group theory: • Z(G) = {g ∈ G | gx = xg for all x ∈ G} ⊳ G is the center of G, • [x, y] = xyx−1 y −1 ∈ G is the commutator of the elements x, y ∈ G, and • G′ = [G, G] = h[x, y] | x, y ∈ Gi ⊳ G is the commutator subgroup of G. Semigroups. All our semigroups are commutative and have an identity element. Let S be a semigroup. We denote by S × its group of invertible elements and by E(S) the set of all idempotents of S. E(S) is endowed with the Rees order ≤, defined by e ≤ f if ef = e. Clearly, ef ≤ e and ef ≤ f for all e, f ∈ E(S). If E ⊂ E(S) is a finite subsemigroup, then E has a smallest element. By a monoid, we mean a semigroup which satisfies the cancellation laws. Let H be a monoid. Then q(H) denotes the quotient group of H and A(H) the set of irreducibles (atoms) of H. The monoid H is called atomic if every non-unit of H can be written as a finite product of atoms. We say that H is reduced if H × = {1}, and we denote by Hred = H/H × = {aH × | a ∈ H} the associated reduced monoid of H. A monoid F is called free abelian with basis P ⊂ F if every a ∈ F has a unique representation of the form Y a= pvp (a) with vp (a) = 0 for almost all p ∈ P . p∈P If F is free abelian with basis P , then P is the set of primes of F , we set F = F (P ), and denote by P • |a| = p∈P vp (a) the length of a, and by • supp(a) = {p ∈ P | vp (a) > 0} the support of a. A monoid F is factorial if and only if Fred is free abelian if and only if F is atomic and every atom is a prime. We denote by • H ′ = {x ∈ q(H) | there is an N ∈ N such that xn ∈ H for all n ≥ N } the seminormalization of H, by e = {x ∈ q(H) | xN ∈ H for some N ∈ N} the root closure of H, and by • H b • H = {x ∈ q(H) | there is a c ∈ H such that cxn ∈ H for all n ∈ N} the complete integral closure of H, e ⊂H b ⊂ q(H). Then the monoid H is called and observe that H ⊂ H ′ ⊂ H PRODUCT-ONE SEQUENCES 3 • seminormal if H = H ′ (equivalently, if x ∈ q(H) and x2 , x3 ∈ H, then x ∈ H), e • root closed if H = H, b • completely integrally closed if H = H. If D is a monoid and H ⊂ D a submonoid, then H is a divisor-closed submonoid if a ∈ H, b ∈ D, and b | a implies that b ∈ H. A monoid homomorphism ϕ : H → D is said to be • cofinal if for every α ∈ D there is an a ∈ H such that α | ϕ(a). • a divisor homomorphism if a, b ∈ H and ϕ(a) | ϕ(b) implies that a | b. • a divisor theory if D is free abelian, ϕ is a divisor homomorphism, and for all α ∈ D there are a1 , . . . , am ∈ H such that α = gcd(ϕ(a1 ), . . . , ϕ(am )). • a transfer homomorphism if it satisfies the following two properties : (T 1) D = ϕ(H)D× and ϕ−1 (D× ) = H × . (T 2) If u ∈ H, b, c ∈ D and ϕ(u) = bc, then there exist v, w ∈ H such that u = vw, ϕ(v)D× = bD× , and ϕ(w)D× = cD× . Transfer Krull monoids. A monoid H is said to be a Krull monoid if it satisfies one of the following equivalent conditions (see [18, Theorem 2.4.8]): (a) H is completely integrally closed and satisfies the ACC on divisorial ideals. (b) There is a divisor homomorphism ϕ : H → F , where F is free abelian monoid. (c) H has a divisor theory. A commutative domain R is a Krull domain if and only if its multiplicative monoid of nonzero elements is Krull. Further examples of Krull monoids can be found in [18, 16]. Let H be a Krull monoid. Then a divisor theory ϕ : H → F is unique up to isomorphism and  C(H) = q(F )/q ϕ(H) is called the class group of H. A monoid H is said to be a transfer Krull monoid if it allows a transfer homomorphism to a Krull monoid (since in our setting all monoids are commutative, [2, Lemma 2.3.3] shows that the present definition coincides with the definition in [16]). The significance of transfer homomorphisms θ : H → B stems from the fact that they allow to pull back arithmetical properties from the (simpler monoid) B to the monoid H (of original interest). In particular, if H is a transfer Krull monoid, then sets of lengths in H coincide with sets of lengths in a Krull monoid (see Equation (5.1)). Since the identity map is a transfer homomorphism, every Krull monoid is a transfer Krull monoid. For a list of transfer Krull monoids which are not Krull we refer to [16]. To give one such example, consider a ring of integers O in an algebraic number field K, a central simple algebra A over K, and a classical maximal O-order R of A. If every stably free left R-ideal is free, then the (non-commutative) semigroup of cancellative elements of R is a transfer Krull monoid over a finite abelian group ([33]). Class semigroups and C-monoids. (a detailed presentation can be found in [18, Chapter 2]). Let F be a monoid and H ⊂ F a submonoid. Two elements y, y ′ ∈ F are called H-equivalent, denote y ∼H y ′ , −1 if y −1 H ∩ F = y ′ H ∩ F . H-equivalence is a congruence relation on F . For y ∈ F , let [y]F H denote the congruence class of y, and let   × C(H, F ) = [y]F and C ∗ (H, F ) = [y]F H |y ∈ F H | y ∈ (F \ F ) ∪ {1} . Then C(H, F ) is a commutative semigroup with unit element [1]F H (called the class semigroup of H in F ) and C ∗ (H, F ) ⊂ C(H, F ) is a subsemigroup (called the reduced class semigroup of H in F ). As usual, class groups and class semigroups will both be written additively. The following lemma describes the relationship between class groups and class semigroups. Its proof is elementary and can be found in [18, Propositions 2.8.7 and 2.8.8] Lemma 2.1. Let F be a monoid and H ⊂ F be a submonoid. 4 JUN SEOK OH 1. If H ⊂ F is cofinal, then the map θ : C(H, F ) → q(F )/q(H), [y]F H 7→ yq(H) for all y ∈ F , is an epimorphism. Moreover, θ is an isomorphism if and only if H ֒→ F is a divisor homomorphism. 2. If C(H, F ) is a group, then H ⊂ F is cofinal, and if C(H, F ) is a torsion group, then H ֒→ F is a divisor homomorphism. A monoid H is called a C-monoid if H is a submonoid of a factorial monoid F such that H ∩ F × = H × and C ∗ (H, F ) is finite. A commutative ring R is a C-ring if its monoid of regular elements is a C-monoid. A Krull monoid is a C-monoid if and only if it has finite class group. We refer to [18, 30, 21, 28] for b more on C-monoids. To give an explicit example, consider a Mori ring R. If the conductor f = (R : R) b is finite, then R is a C-ring. We will need the following lemma (for a proof see [18, is nonzero and R/f Theorem 2.9.11]). Lemma 2.2. Let F = F × × F (P ) be factorial and H ⊂ F be a C-monoid. Suppose that vp (H) ⊂ N0 is a numerical monoid for all p ∈ P (this is a minimality condition on F which can always be assumed without restriction). b is a Krull monoid with nonempty conductor (H : H) b and finite class group C(H). b 1. H b → F (P ), defined by 2. The map ∂ : H ∂(a) = Y pvp (a) , p∈P b is a divisor theory, and there is an epimorphism C ∗ (H, F ) → C(H). 3. Algebraic Properties of the monoid of product-one sequences We introduce sequences over the finite group G. Our notation and terminology follows the articles [17, 24, 9]. Let G0 ⊂ G be a subset. The elements of the free abelian monoid F (G0 ) will be called sequences over G0 . This terminology goes back to Arithmetic Combinatorics. Indeed, a sequence over G0 can be viewed as a finite unordered sequence of terms from G0 , where the repetition of elements is allowed. In order to avoid confusion between the multiplication in G and multiplication in F (G0 ), we denote multiplication in F (G0 ) by the boldsymbol · and we use brackets for all exponentiation in F (G0 ). In particular, a sequence S ∈ F (G0 ) has the form (3.1) S = g1 · . . . · gℓ = • gi = i∈[1,ℓ] • g [vg (S)] ∈ F (G0 ), g∈G0 where g1 , . . . , gℓ ∈ G0 are the terms of S. Moreover, if S1 , S2 ∈ F (G0 ) and g1 , g2 ∈ G0 , then S1 ·S2 ∈ F (G0 ) has length |S1 |+ |S2 |, S1 ·g1 ∈ F (G0 ) has length |S1 |+ 1, g1 g2 ∈ G is an element of G, but g1 ·g2 ∈ F (G0 ) is a sequence of length 2. If g ∈ G0 , T ∈ F (G0 ), and k ∈ N0 , then . . · T} ∈ F (G0 ) . g [k] = g · . . . · g ∈ F (G0 ) and T [k] = |T · .{z | {z } k k Let S ∈ F (G0 ) be a sequence as in (3.1). Then we denote by π(S) = {gτ (1) . . . gτ (ℓ) ∈ G | τ a permutation of [1, ℓ]} ⊂ G and Π(S) = [ π(T ) ⊂ G , T |S |T |≥1 the set of products and subsequence products of S, and it can easily be seen that π(S) is contained in a G′ -coset. Note that |S| = 0 if and only if S = 1F (G0 ) , and in that case we use the convention that π(S) = {1G }. The sequence S is called • a product-one sequence if 1G ∈ π(S), and • product-one free if 1G ∈ / Π(S). PRODUCT-ONE SEQUENCES 5 Definition 3.1. Let G0 ⊂ G be a subset. 1. The submonoid B(G0 ) = {S ∈ F (G0 ) | 1G ∈ π(S)} ⊂ F (G0 )  is called the monoid of product-one sequences, and A(G0 ) = A B(G0 ) denotes its set of atoms. 2. We call D(G0 ) = sup{|S| | S ∈ A(G0 )} ∈ N ∪ {∞} the large Davenport constant of G0 and d(G0 ) = sup{|S| | S ∈ F (G0 ) is product-one free} ∈ N0 ∪ {∞} the small Davenport constant of G0 . Note that obviously the set B(G0 ) is a multiplicatively closed subset of the commutative cancellative semigroup F (G0 ) whence B(G0 ) is indeed a monoid. Our object of interest is the monoid B(G) but for technical reasons we also need the submonoids B(G0 ) for subsets G0 ⊂ G. The next lemma gathers some elementary properties. Its simple proof can be found in [9, Lemma 3.1]. Lemma 3.2. Let G0 ⊂ G be a subset. 1. B(G0 ) ⊂ F (G0 ) is a reduced finitely generated submonoid, A(G0 ) is finite, and D(G0 ) ≤ |G|. 2. Let S ∈ F (G) be product-one free. (a) If g0 ∈ π(S), then g0−1 · S ∈ A(G). In particular, d(G) + 1 ≤ D(G). (b) If |S| = d(G), then Π(S) = G \ {1G } and hence d(G) = max{|S| : S ∈ F (G) with Π(S) = G \ {1G}}. 3. If G is cyclic, then d(G) + 1 = D(G) = |G|. The Davenport constant of finite abelian groups is a frequently studied invariant in Zero-sum Theory (for an overview see [18] and for recent progress [31, 5]). For the Davenport constant of nonabelian groups we refer to [17, 24, 10]. Lemma 3.3. Let G0 ⊂ G be a subset. A submonoid H ⊂ B(G0 ) is divisor-closed if and only if H = B(G1 ) for a subset G1 ⊂ G0 . Proof. If G1 ⊂ G0 , then clearly B(G1 ) ⊂ B(G0 ) is a divisor-closed submonoid. Conversely, let H ⊂ B(G0 ) be a divisor-closed submonoid. We set [ G1 = supp(B) B∈H and obtain that H ⊂ B(G1 ). We have to show that equality holds. Let S = g1 · . . . · gℓ ∈ B(G1 ). Then for every i ∈ [1, ℓ] there is some Bi ∈ H such that gi ∈ supp(Bi ). Then B1 · . . . · Bℓ ∈ H and S divides B1 · . . . · Bℓ , which implies that S ∈ H.  Proposition 3.4. The following statements are equivalent : (a) G is abelian. (b) B(G) is a Krull monoid. (c) B(G) is a transfer Krull monoid. Proof. The implications (a) ⇒ (b) and (b) ⇒ (c) are well-known and immediate. Indeed, if G is abelian, then the embedding B(G) ֒→ F (G) is a divisor homomorphism whence B(G) is Krull. By definition, every Krull monoid is a transfer Krull monoid. (c) ⇒ (a) Assume to the contrary that G is not abelian but B(G) is a transfer Krull monoid. Thus there is a transfer homomorphism θ1 : B(G) → H, where H is a Krull monoid. Since there is a transfer homomorphism θ2 : H → B(G0 ), where G0 ⊂ C(H) is a subset of the class group, and since the composition 6 JUN SEOK OH of transfer homomorphisms is a transfer homomorphism, we obtain a transfer homomorphism θ : B(G) → B(G0 ), where G0 is a subset of an abelian group. Since G is non-abelian, there exist g, h ∈ G such that gh 6= hg. Consider the sequence U = g · h · g −1 · (gh−1 g −1 ) ∈ A(G). From [18, Proposition 3.2.3], we have that θ(U ) ∈ A(G0 ), say θ(U ) = a1 · . . . · aℓ , where ai ∈ G0 for all i ∈ [1, ℓ]. Let m = ord (hgh−1 g −1 ) ∈ N. Then U [m] = (g · g −1 )[m] · (h · (gh−1 g −1 ))[m] , and hence it follows that (a1 · . . . · aℓ )[m] = θ(U [m] )  [m] = θ(g · g −1 ) · θ (h · (gh−1 g −1 ))[m] . [m] Since B(G0 ) ֒→ F (G0 ) is a divisor homomorphism (and so B(G0 ) is root closed), the fact that θ(g·g −1 ) divides (a1 ·. . .·aℓ )[m] in B(G0 ) implies that θ(g ·g −1 ) divides a1 ·. . .·aℓ in B(G0 ). Since θ(g ·g−1 ) and a1 · . . . · aℓ ∈ A(G0 ), it follows that θ(g · g −1 ) = a1 · . . . · aℓ = θ(U ). Thus θ (h · (gh−1 g −1 ))[m] = 1F (G0 ) , a contradiction.  Clearly, if |G| ≤ 2, then B(G) is factorial whence it is both a Krull monoid (with trivial class group) and a C-monoid (with trivial class semigroup). In order to avoid trivial case distinctions, we exclude this case whenever convenient. By Proposition 3.4, B(G) is not Krull when G is not abelian. The next proposition reveals that B(G) is a C-monoid in all cases and determines the class group of its complete integral closure. Proposition 3.5. Suppose that |G| ≥ 3. 1. If G0 ⊂ G is a subset, then B(G0 ) ⊂ F (G0 ) is cofinal and B(G0 ) is a C-monoid. [ ֒→ F (G) is a divisor theory and the map 2. The embedding B(G)   [ = q F (G) /q B(G) Φ : C(B(G)) −→ G/G′ gG′ ,  where S ∈ F (G) and g ∈ π(S), is an isomorphism. Clearly, vg B(G) = N0 for all g ∈ G.  3. There is an epimorphism C B(G), F (G) → G/G′ . Sq(B(G)) 7−→ Proof. 1. and 2. Let G0 ⊂ G. If S = g1 · . . . · gℓ ∈ F (G0 ) and g ∈ π(S), then S ′ = g −1 · S ∈ B(G0 ), S | S ′ , and hence B(G0 ) ⊂ F (G0 ) is cofinal. Let k ∈ N0 . If g ∈ G with ord(g) > 2, then U = g · g −1 ∈ B(G), vg (U [k] ) = k. If g = 1G , then vg (g [k] ) = k. If ord(g) = 2, then there is an h ∈ G \ {1G , g} and U = g · h · (gh)−1 ∈ B(G) and vg (U [k] ) = k. Thus in all cases we have vg (B(G)) = N0 . [ It is easy to check that Φ is an isomorphism (details can be found in [9, Theorem 3.2]). Since C(B(G)) \ is finite, C(B(G 0 )) is finite and since B(G0 ) is finitely generated, it is a C-monoid by [19, Proposition 4.8]. 3. This follows from 2. and from Lemma 2.2.2.  We start with the study of the class semigroup and recall that, by definition, for two sequences S, S ′ ∈ F (G) the following statements are equivalent: • S ∼B(G) S ′ . • For all T ∈ F (G), we have S · T ∈ B(G) if and only if S ′ · T ∈ B(G). • For all T ∈ F (G), we have 1G ∈ π(S · T ) if and only if 1G ∈ π(S ′ · T ). If S = g1 · . . . · gℓ ∈ B(G) such that 1G = g1 . . . gℓ , then 1G = gi . . . gℓ g1 . . . gi−1 for every i ∈ [1, ℓ]. We will F (G) use this simple fact without further mention. Moreover, ∼ means ∼B(G) and we write [S] = [S]B(G) . PRODUCT-ONE SEQUENCES 7 Lemma 3.6. Let S ∈ F (G). 1. If S ′ ∈ F (G) such that S ∼ S ′ , then π(S) = π(S ′ ). 2. Let S ′ ∈ F (G). In the following cases, S ∼ S ′ if and only if π(S) = π(S ′ ) : (a) S and S ′ are sequences over the center of G. (b) There is g ∈ π(S) such that π(S) = gG′ .  3. If g, h ∈ G with g 6= h, then g ≁ h. In particular, |G| ≤ |C B(G), F (G) |. 4. If g ∈ Z(G) and h ∈ G, then g · h ∼ gh. 5. |π(S)| = 1 if and only if hsupp(S)i is abelian. Proof. 1. Suppose that S ′ ∈ F (G) with S ∼ S ′ . Then for every g ∈ G we obtain that g ∈ π(S) ⇔ g −1 · S ∈ B(G) ⇔ g −1 · S ′ ∈ B(G) ⇔ g ∈ π(S ′ ) , which implies that π(S) = π(S ′ ). 2. From 1., it remains to verify the reverse implication. Suppose that π(S) = π(S ′ ). (a) Since S, S ′ ∈ F (Z(G)), we have |π(S)| = |π(S ′ )| = 1, say π(S) = π(S ′ ) = {g}. Then for every T ∈ F (G) we have π(S · T ) = gπ(T ) and π(S ′ · T ) = gπ(T ) , which implies that S ∼ S ′ . (b) Suppose that there is a g ∈ π(S) such that π(S) = gG′ . Let T ∈ F (G) such that T · S ∈ B(G). Then we have π(T )π(S) ⊂ π(T · S) ⊂ G′ . ′ Since π(S) = gG , there are t ∈ π(T ) and e ∈ G′ such that tg = e. Hence we obtain that 1G = ee−1 = tge−1 ∈ π(T )π(S) = π(T )π(S ′ ) ⊂ π(T · S ′ ). It follows that T · S ′ ∈ B(G). By symmetry, we infer that S ∼ S ′ . 3. Let g, h ∈ G. Then g, h ∈ F (G) and if g ∼ h, then 1. implies that {g} = π(g) = π(h) = {h}. Therefore, g 6= h implies that g ≁ h, and hence we obtain that |G| ≤ |C B(G), F (G) |. 4. This follows from the fact that g ∈ Z(G). 5. Obvious.  Lemma 3.7. Let S ∈ F (G).  1. If [S] is an idempotent of C B(G), F (G) , then π(S) ⊂ G′ is a subgroup.  2. [1F (G)] = B Z(G) . In particular, if g ∈ Z(G), then g [ord(g)] ∼ 1F (G) .   3. [S] is the smallest idempotent in E C B(G), F (G) (with respect to the Rees order) if and only if π(S) = G′ .    Proof. 1. Suppose that [S] is an idempotent of C B(G), F (G) . Then [S] = S [2] whence S ∼ S [2] , and Lemma 3.6.1 implies that  π(S)π(S) ⊂ π S [2] = π(S) . Thus π(S) ⊂ G′ is a subgroup.  2. Suppose that S ∈ B Z(G) . Then π(S) = {1G }, and for all T ∈ F (G) we have π(S · T ) = π(T ) = π(1F (G) · T ) , whence S ∼ 1F (G) . Conversely, suppose that S ∼ 1F (G) . Then S ∈ B(G), and we set S = g1 ·. . .·gℓ such that g1 . . . gℓ = 1G . Assume to the contrary that there is an i ∈ [1, ℓ] such that gi ∈ / Z(G), say i = 1. Then there is an element h ∈ G such that hg1 6= g1 h. Then T = (hg1 ) · (h−1 g1−1 ) ∈ F (G) \ B(G), but 8 JUN SEOK OH 1G = g1 (hg1 )(g2 . . . gℓ )(h−1 g1−1 ) ∈ π(T · S) . Since S ∼ 1F (G), we infer that 1G ∈ π(T · 1F (G)) = π(T ), a contradiction.  In particular, if g ∈ Z(G), then g [ord(g)] ∈ B Z(G) and hence g [ord(g)] ∼ 1F (G) . 3. First, we suppose that π(S) = G′ . Then [S] is an idempotent by Lemma 3.6.2, and it remains  to verify that [S] is the smallest idempotent of C B(G), F (G) . Let S ′ ∈ F (G) such that [S ′ ] is an idempotent. We have to show that S ∼ S · S ′ . Since π(S ′ ) ⊂ G′ is a subgroup by 1., S, S ′ ∈ B(G), and since π(S · S ′ ) is a G′ -coset, it follows that G′ ⊂ π(S)π(S ′ ) ⊂ π(S · S ′ ) ⊂ G′ whence G′ = π(S · S ′ ) . Again Lemma 3.6.2 implies that S ∼ S · S ′ . To show the converse, suppose that [S] is the smallest idempotent. We construct an element S ′ ∈ F (G) such that π(S ′ ) = G′ . Then the proof above shows that [S ′ ] is the smallest idempotent whence S ∼ S ′ and π(S) = π(S ′ ) = G′ . We set G′ = {g1 , . . . , gn }, and for each i ∈ [1, n] we set gi = ki Y −1 −1 ai,ν bi,ν ai,ν bi,ν , where ki ∈ N and all ai,ν , bi,ν ∈ G , ν=1 and define Si = −1 (ai,ν · bi,ν · a−1 i,ν · bi,ν ) ∈ B(G) . • ν∈[1,ki ] Then obviously π(S1 · . . . · Sn ) = G′ .  Theorem 3.8. 1. Suppose that G/G′ = {g0 G′ , . . . , gk G′ }, and for each i ∈ [0, k] let Si ∈ F (G) such that π(Si ) = gi G′ . Then the map   G/G′ → [Si ] | i ∈ [0, k] = C ⊂ C B(G), F (G) gi G′ 7→ [Si ]  is a group isomorphism. Thus C B(G), F (G) contains a subgroup isomorphic to the class group [ Moreover, for any i ∈ [0, k] and for any S ∈ F (G), we have [S · Si ] ∈ C. of B(G). 2. The map Z(G) → g 7→ × C B(G), F (G) [g] is a group isomorphism.  Proof. 1. We first verify the existence of such sequences S , . . . , S . Since C B(G), F (G) is finite, the 0 k  set E C B(G), F (G) has the smallest element, say [S]. For each i ∈ [0, k], we set Si = gi · S. Since π(S) = G′ by Lemma 3.7.3, it follows that for each i ∈ [0, k] gi G′ ⊂ π(gi · S) ⊂ gi G′ , whence π(Si ) = π(gi · S) = gi G′ . We now use Lemma 3.6.2. If i, j ∈ [0, k], then gi gj ∈ π(Si )π(Sj ) ⊂ π(Si · Sj ), and hence π(Si · Sj ) = gi gj G′ = gℓ G′ = π(Sℓ ) for some ℓ ∈ [0, k]. Thus it follows that C is a subgroup of the class semigroup and [ the given map is an isomorphism. By Proposition 3.5.2, G/G′ is isomorphic to the class group of B(G). Moreover, let S ∈ F (G), g ∈ π(S), and i ∈ [0, k]. Then ggi G′ = gπ(Si ) ⊂ π(S)π(Si ) ⊂ π(S · Si ) , whence π(S · Si ) = ggi G′ = gj G′ = π(Sj ) for some j ∈ [0, k]. Again by Lemma 3.6.2, we have S · Si ∼ Sj , and thus [S · Si ] ∈ C. PRODUCT-ONE SEQUENCES 9  2. Let S ∈ F (G) such that [S] ∈ C F (G), B(G) is invertible. Then there is an S ′ ∈ F (G) such that 0C(F (G),B(G)) = [1F (G) ] = [S] + [S ′ ] = [S · S ′ ] ,   whence S · S ′ ∼ 1F (G) . Then Lemma 3.7.2 implies that S · S ′ ∈ B Z(G) whence S, S ′ ∈ F Z(G) . If g ∈ π(S), then Lemma 3.6.2 implies that S ∼ g. This proves that the given map is well-defined and surjective. Lemma 3.6 (items 3 and 4) shows that the map is a monomorphism.  Our next goal is a detailed investigation of the case where |G′ | = 2. We derive a couple of special properties which do not hold in general (Theorem 3.10 and Remark 3.11). Lemma 3.9. Suppose that |G′ | = 2, and let g ∈ G with ord(g) = n.    1. We have g ∼ g [n+1] , and hence g [n] ∈ C B(G), F (G) is idempotent. 2. If k ∈ [1, n] is odd and g k ∈ / Z(G), then g [k] ∼ g k . 3. If g, h ∈ G \ Z(G) with gh = hg, then g · h ≁ gh provided that one of the following conditions holds : (a) gh ∈ Z(G). (b) There is g0 ∈ G such that g0 g 6= gg0 and g0 h 6= hg0 .  Proof. 1. Let T ∈ F (G). Since g n = 1G , 1G ∈ π(g · T ) implies that 1G ∈ π g [n+1] · T . Conversely,  suppose that 1G ∈ π g [n+1] · T . If every element in supp(T ) commutes with g, then  π g [n+1] · T = π(g · T ) and hence 1G ∈ π(g · T ) . Now suppose that there is at least one h ∈ supp(T ) such that hg 6= gh. Then π(g · T ) has at least two elements. Since |G′ | = 2 and  π(g · T ) ⊂ π g [n+1] · T ⊂ G′ ,   we obtain that π(g · T ) = G′ and hence 1G ∈ π(g · T ). Thus [g] = g [n+1] and thus  [n]   [n]   [2n]   [n+1] [n−1]   [n]  g + g = g = g ·g = g .   2. Let k ∈ [1, n] be odd, g k ∈ / Z(G), and T ∈ F (G). If 1G ∈ π g k · T , then 1G ∈ π g [k] · T . Conversely,   suppose that 1G ∈ π T · g [k] . If hg = gh for all h ∈ supp(T ), then obviously 1G ∈ π g k · T .  Suppose there is an element h ∈ supp(T ) such that hg 6= gh. Then π T ·g [k] = G′ . We set T = h1 ·. . .·hℓ with h1 = h and consider the elements g 0 = h1 g k h2 . . . hℓ and (1) g0 = gh1 g k−1 h2 . . . hℓ in G′ .  (1) (1) Then G′ = g0 , g0 . If g0 = 1, then we are done. Suppose that g0 = 1G . Then (2) (1) g0 = ggh1 g k−2 h2 . . . hℓ 6= g0 (2) whence g0 = g0 , and hg 2 = g 2 h. Thus we obtain (1) (3) (k) 1G = g0 = g0 = . . . = g0  = g k h1 . . . hℓ ∈ π T · g k . 3. Let g, h ∈ G \ Z(G) with gh = hg. (a) Suppose that gh ∈ Z(G) and assume to the contrary that g · h ∼ gh. By Lemma 3.7.2, we infer that (g · h)[ord(gh)] ∼ gh[ord(gh)] ∼ 1F (G) .  a contradiction to [1F (G) ] = B Z(G) . (b) Let g0 ∈ G such that g0 g 6= gg0 and g0 h 6= hg0 . If T = (g −1 g0 ) · (h−1 g0−1 ) ∈ F (G) ,  then 1G ∈ / π T · (gh) but 1G = g(g −1 g0 )h(h−1 g0−1 ) ∈ π(T · g · h). This shows that g · h ≁ gh.  10 JUN SEOK OH It is well-known that a finitely generated monoid is Krull if and only if it is root-closed. Thus if G is non-abelian, then B(G) is not root-closed by Proposition 3.4. The next result shows that it is seminormal if |G′ | = 2. An element c of a semigroup is called a regular if c lies in a subgroup of the semigroup, and the semigroup is called Clifford if every element is regular. Theorem 3.10. Suppose that |G′ | = 2. 1. B(G) is seminormal.  2. C B(G), F (G) is a Clifford semigroup. In particular, if S ∈ F (G) with π(S) = {g}, then [S] generates a cyclic subgroup of order ord(g).  Q 3. |C B(G), F (G) | ≤ |Z(G)| + g∈G\Z(G) ord(g).   Proof. 1. Let S ∈ q B(G) such that S [2] , S [3] ∈ B(G). Since S ∈ q F (G) with S [2] , S [3] ∈ F (G), we have that S ∈ F (G). Let g ∈ π(S). Since S [2] , S [3] ∈ B(G), it follows that   g 2 ∈ π S [2] ⊂ G′ and g 3 ∈ π S [3] ⊂ G′ . Since G′ is a subgroup of G, we obtain g ∈ G′ . If g = 1G , then we are done. Suppose that g 6= 1G . Then G′ = {1G , g}. If each two elements in supp(S) would commute, then   π S [3] = {g 3 } , π(S) = {g}, π S [2] = {g 2 }, and which implies g 2 = 1G = g 3 and g = 1G , a contradiction. Thus supp(S) contains two elements which do not commute, say S = g1 · . . . · gℓ , g1 g2 6= g2 g1 , and g = g1 . . . gℓ . Then 1G = g2 g1 g3 . . . gℓ ∈ π(S). 2. Let S ∈ F (G). If π(S) has two elements, then [S] lies in the group given in Theorem 3.8.1. Suppose that π(S) has onlynone element, say π(S) = {g} and ord(g) = n. We assert that S ∼ S [n+1] . Suppose this  [n] o is a cyclic subgroup of the class semigroup, and hence the assertion holds true. Then [S], . . . , S  [m]  follows. Let m ∈ [1, n] and S the identity element of the subgroup. Then it is an idempotent of the  class semigroup, and Lemma 3.7.1 shows that π S [m] = {g m } ⊂ G′ is a subgroup. This implies m = n. Thus it remains to show that S ∼ S [n+1] . To do so, let T ∈ F (G) be given. Since S [n] ∈ B(G),  1G ∈ π(T · S) implies that 1G ∈ π T · S [n+1] .  Conversely, suppose that 1G ∈ π T · S [n+1] . If every element of supp(T ) commutes with every element of  supp(S), then π T · S [n+1] = π(T · S) and thus 1G ∈ π(T · S). If there are t ∈ supp(T ) and s ∈ supp(S) such that ts 6= st, then |π(T · S)| ≥ 2 and hence 1G ∈ π(T · S). 3. We set G = {g1 , . . . , gn } and Z(G) = {g1 , . . . , gk } for some k ∈ [1, n]. Let S ∈ F (G). Then we can write S of the form [k ord(g1 )+r1 ] S = g1 1 · . . . · gn[kn ord(gn )+rn ] , where k1 , . . . , kn ∈ N0 and ri ∈ [1, ord(gi )] for each i ∈ [1, n]. By Lemma 3.9.1, we have [r ] S ∼ g1 1 · . . . · gn[rn ] . [r ] [r ] By Lemma 3.6.4., g1 1 · . . . · gk k ∼ g0 , where g0 = g1r1 . . . gkrk ∈ Z(G). Thus [r ] k+1 S ∼ g0 · gk+1 · . . . · gn[rn ] , and hence the assertion follows.  Remark 3.11. 1. Suppose that |G′ | = 2. Let g, h ∈ G be distinct with ord(g) = n and ord(h) = m. By Theorem 3.10.2, [g] ⊂ C B(G), F (G) generates a cyclic subgroup of order n and [h] generates a cyclic subgroup of order m. PRODUCT-ONE SEQUENCES 11 Suppose that h[g]i ∩ h[h]i = 6 ∅. Then there are i ∈ [1, n] and j ∈ [1, m] such that g [i] ∼ h[j] . Let  m j [m] mj = ord(h ) = gcd(j,m) . Since h is an idempotent, we have g [imj ] ∼ h[m] .   By Lemma 3.6.1, imj = kn for some k ∈ N. Since g [n] is also idempotent, we have g [n] ∼ h[m] . Again by Lemma 3.6.1, we obtain gh = hg because B(G)-equivalence is a congruence relation on F (G). It follows that if gh 6= hg, then h[g]i ∩ h[h]i = ∅, and for each i ∈ [1, n] and j ∈ [1, m],  [i]   [j]   [i] [j]  g + h = g ·h ∈C, where C is the group given in Theorem 3.8.1.  2. Suppose that B(G) is seminormal and let G0 ⊂ G be a subset. Let S ∈ q B(G0 ) such that  S [2] , S [3] ∈ B(G0 ). Since B(G) is seminormal, it follows that S ∈ B(G) and hence S ∈ B(G) ∩ q B(G0 ) = B(G0 ). Thus B(G0 ) is seminormal. 3. Let D2n = ha, bi = {1G , a, . . . , an−1 , b, ab, . . . , an−1 b} be the dihedral group with n ≡ 3 mod 4, where ord(a) = n, ord(b) = 2, and ak baℓ b = ak−ℓ for all k, ℓ ∈ Z. Then  n−1 S = a[ 2 ] · b[2] ∈ q B(D2n ) \ B(D2n ), but S [2] , S [3] ∈ B(D2n ). Thus if G contains D2n as a subgroup, then 2. shows that B(G) is not seminormal. 4. Examples of Class Semigroups for Non-abelian Groups of small order In this section, we discuss the three smallest non-abelian groups and provide a complete description of the class semigroup. Among others we will see that the monoid of product-one sequences over the dihedral group with 6 elements is not seminormal and the associated class semigroup is not Clifford. Example 4.1. Let G = Q8 = {E, I, J, K, −E, −I, −J, −K} be the quaternion group with the relations IJ = −JI = K, ′ JK = −KJ = I, KI = −IK = J, and IJK = −E . ′ Then Z(G) = G = {E, −E} and G/G ≃ C2 ⊕ C2 . Furthermore, d(G) = 4 and D(G) = 6 by [17, Theorem 1.1]. Let S ∈ F (G). If |π(S)| = 2, then, by Theorem 3.8.1, S is B(G)-equivalent to an element in the group C which is isomorphic to G/G′ . We only consider  the case |π(S)| = 1. By Lemma 3.6.5, hsupp(S)i is an abelian subgroup of G. Suppose that S ∈ F hIi . Then S has of the form S = E [n1 ] · I [n2 ] · (−E)[n3 ] · (−I)[n4 ] , where n1 , . . . , n4 ∈ N0 . By Lemma 3.6.4 and Lemma 3.9 (items 1 and 2), we have S ∼ I [n] for some n ∈ [1, 4] .   By symmetry, we obtain the same results in the case S ∈ F hJi and S ∈ F hKi . Moreover, If  S ∈ F h−Ei , then, by Theorem  3.8.2, S is B(G)-equivalent to an element in the group of units of the class semigroup C B(G), F (G) which is isomorphic to Z(G). It follows that  |C B(G), F (G) | = 18 . Figure 1 presents the subgroup lattice of the class  semigroup. Note that the subgroup lattice of G is not preserved in the class semigroup C B(G), F (G) . Furthermore, observe that the bottom elements in the lattice are all idempotent elements of the class semigroup. 12 JUN SEOK OH  C B(G), F (G) h[I · J], [I · K]i h[I · K]i h[J · K]i h[I · J · K]i h[I · J]i h[K]i h[J]i h[I]i h[−E]i   h K [2] i   h J [2] i   h I [2] i h[1F (G) ]i   h K [4] i   h J [4] i   h I [4] i Figure 1. Subgroup Lattice of the Class Semigroup over Q8 Example 4.2. Let G = D8 = ha, b | a4 = b2 = 1G and ba = a3 bi = {1G , a, a2 , a3 , b, ab, a2 b, a3 b} be the dihedral group of order 8. Then Z(G) = G′ = ha2 i = {1G , a2 } and G/G′ ≃ C2 ⊕ C2 . Furthermore, d(G) = 4 and D(G) = 6 by [17, Theorem 1.1]. All arguments run along the same lines as the ones given in the previous example. However, in this case, there are two elements g, h ∈ G \ Z(G) such that gh = hg. Consider the sequence b · a2 b ∈ F (G) having π(b · a2 b) = {a2 }, and suppose that b · a2 b ∼ S for some S ∈ F (G). By Lemma 3.6 (items 1 and 5), we have π(S) = {a2 } and hence hsupp(S)i ⊂ G is abelian subgroup containing a2 . It follows that hsupp(S)i is one of hai, ha2 i, ha2 , bi and ha2 , abi.  CASE 1. S ∈ F ha2 i . Then S = a2 is only possible choice, but it never happen by Lemma 3.9.3.  CASE 2. S ∈ F hai . Then S = a[2] is only possible choice by Lemma 3.6.4 and Lemma 3.9 (items 1 and 2). Since B(G)equivalence is a congruence relation on F (G), b · a2 b ∼ a[2] implies that b · a2 b · a ∼ a[3] . But {a3 } = π(a[3] ) = π(b · a2 b · a) = {a, a3 }, a contradiction. In the case that S ∈ F ha2 , abi , we can obtain a contradiction by the same argument of CASE 2. It follows that S = b · a2 b, and by Lemma 3.6.4,  S [2] ∼ b[2] is an idempotent element of the class semigroup C B(G), F (G) with the relation b[2] ∼ (a2 b)[2] ∼ S [2] .   For the sequence T = ab · a3 b ∈ F (G), we can obtain the same result by above argument. Thus T [2]  is an idempotent element of the class semigroup C B(G), F (G) with the relation (ab)[2] ∼ (a3 b)[2] ∼ T [2]. It follows that  |C B(G), F (G) | = 18 . Figure 2 presents the subgroup lattice of the class semigroup. Note that, as in  the previous example, the subgroup lattice of G is not preserved in the class semigroup C( B(G), F (G) . Furthermore, observe that the bottom elements in the lattice are all idempotent elements of the class semigroup. × Remark 4.3. In general, the group of units C B(G), F (G) of the class semigroup is not a direct factor. For example, let G be the group described in Example 4.1. Assume to the contrary that C B(G), F (G) has a decomposition of the form  × C B(G), F (G) = C0 × C B(G), F (G) , where C0 is a subsemigroup having 9 elements. Figure 1. shows that there are three elements x ∈ C B(G), F (G) such that x 6= x3 . It follows that there exist three elements satisfying such property in the PRODUCT-ONE SEQUENCES 13  C B(G), F (G)   h[ab], a3 b i   h[b], a2 b i     h a[3] · b[2] , a[2] · b[3] i h[a]i                   h a[3] · b[2] i h a[2] · b[3] i h a[2] · b[2] · ab i h b · a2 b i h a2 b i h[b]i h a2 i h ab · a3 b i h a3 b i h[ab]i h a[2] i   h a[2] · b[2] i   h b[2] i   h (ab)[2] i h[1F (G) ]i   h a[4] i Figure 2. Subgroup Lattice of the Class Semigroup over D8 × decomposition. Since |C B(G), F (G) | = 2, C0 has at least two such elements, whence |C0 | > 9. Indeed, if [I] and [J] are in C0 , then [I · J] = [I] + [J] ∈ C0 and thus we obtain that C0 has at least 10 elements. The similar argument works for the group described in Example 4.2. Example 4.4. Let G = D6 = ha, b | a3 = b2 = 1G and ba = a2 bi = {1G , a, a2 , b, ab, a2 b} be the dihedral group of order 6. Then Z(G) = {1G }, G′ = hai = {1G, a, a2 }, and G/G′ ≃ C2 . Furthermore, d(G) = 3 and D(G) = 6 by [17, Theorem 1.1]. Let S ∈ F (G). If |π(S)| = 3, then, by Theorem 3.8.1, we obtain S ∼ a[2] · b[2] S ∼ a · a2 · b , or where π(a[2] · b[2] ) = {1G, a, a2 } and π(a · a2 · b) = {b, ab, a2 b}. If |π(S)| = 2, then S is B(G)-equivalent with one of the following sequences : (4.1) a · b[n] , b[n] · ab, a · (ab)[n] , b · (ab)[n] , a · (a2 b)[n] , b[n] · a2 b, b · (a2 b)[n] , where n ∈ N. We now start with the following claims. CLAIM.A : b[2] ∼ b[4] , (ab)[2] ∼ (ab)[4] , (a2 )[2] ∼ a[4] , a2 · b[n] , a2 · (ab)[n] , a2 · (a2 b)[n] , (ab)[n] · a2 b, ab · (a2 b)[n] , (a2 b)[2] ∼ (a2 b)[4] , (a2 )[3] ∼ a[3] , (a2 )[4] ∼ a[2] , a[2] ∼ a[5] , (a2 )[2] ∼ (a2 )[5] , a · a2 ∼ a[3] , a · b ∼ a2 · b ∼ a · b[3] ∼ b[2] · ab ∼ b[2] · a2 b , a · ab ∼ a2 · ab ∼ a · (ab)[3] ∼ ab[2] · a2 b ∼ ab[2] · b , a · a2 b ∼ a2 · a2 b ∼ a · (a2 b)[3] ∼ (a2 b)[2] · ab ∼ (a2 b)[2] · b . CLAIM.B : b ≁ b[3] , ab ≁ (ab)[3] , b · ab ≁ b · a2 b, a2 b ≁ (a2 b)[3] , ab · a2 b, a · b[2] , b · a2 b ≁ ab · a2 b, a · b[2] , ab · a2 b ≁ a · b[2] , a · (ab)[2] , a ≁ a[4] , a · (ab)[2] , a · (ab)[2] , a[2] ≁ a2 , a · (a2 b)[2] , a · (a2 b)[2] , a · (a2 b)[2] . Suppose the Claims hold true. Then we obtain that   |C B(G), F (G) | = 26 and C B(G), F (G) = G1 ∪ G2 ∪ G3 ∪ G4 , where n                    o • G1 = [b], b[2] , b[3] , [ab], (ab)[2] , (ab)[3] , [a2 b], (a2 b)[2] , (a2 b)[3] , [a], a[2] , a[3] , a[4] , a2 , 14 JUN SEOK OH n            o • G2 = [a · b], [a · ab], a · a2 b , a · b[2] , a · (ab)[2] , a · (a2 b)[2] , [b · ab], b · a2 b , ab · a2 b , n   o • G3 = a[2] · b[2] , a · a2 · b (that is isomprphic to G/G′ ), and n o  • G4 = [1F (G) ] that is isomorphic to Z(G) . Figure 3 presents the subgroup lattice of the class semigroup. Note that, as in  the previous example, the subgroup lattice of G is not preserved in the class semigroup C B(G), F (G) . Furthermore, observe that the elements in the set n    o [b], [ab], a2 b , [a], a2 ∪ G2  are not regular, whence C B(G), F (G) is not Clifford semigroup, and the bottom elements in the lattice are all idempotent elements of the class semigroup.  C B(G), F (G)   h a · a2 · b i   h b[3] i   h a[2] · b[2] i   h b[2] i   h (ab)[3] i   h (ab)[2] i   h (a2 b)[3] i h[1F (G) ]i   h a[2] i   h (a2 b)[2] i   h a[3] i Figure 3. Subgroup Lattice of Class Semigroup over D6 Proof of the Claim. We only show the first assertions, and others can be proved by the same way. Let T ∈ F (G). Since b2 = 1G , it suffices to show that if b[4] · T ∈ B(G), then b[2] · T ∈ B(G). Suppose that b[4] · T ∈ B(G). CASE 1. |π(T )| = 3. Then we have T ∼ a[2] · b[2] or T ∼ a · a2 · b . Since b[4] · T ∈ B(G), it follows that we have the only case T ∼ a[2] · b[2] . Then, since b[2] · a · b · a · b ∈ B(G),   b[2] · T ∼ b[2] · a[2] · b[2] implies that b[2] · T ∈ b[2] · a[2] · b[2] ⊂ B(G) . CASE 2. |π(T )| = 2. Then T is B(G)-equivalent with one of the sequence described in (4.1). Since b[4] · T ∈ B(G), the possible choice of T under B(G)-equivalence is one the following sequences : a · (ab)[even] , b · (ab)[odd≥3 ] , a · (a2 b)[even], a2 · (ab)[even], a2 · (a2 b)[even] , b · (a2 b)[odd≥3 ] , (ab)[odd] · a2 b, ab · (a2 b)[odd] . Then we obtain the following simple calculation, and it can cover all other cases : ab · b · ab · b · a, a2 b · b · a2 b · a · b, ab · b · ab · a2 · b, a2 b · b · a2 b · b · a2 , ab · b · ab · b · ab · b, a2 b · b · a2 b · b · a2 b · b, ab · b · a2 b · b, which are all product-one sequences, and thus it follows that b[2] · T ∈ B(G). CASE 3. |π(T )| = 1. Then hsupp(T )i is abelian subgroup by Lemma 3.6.5. If hsupp(T )i = h1G i, then we are done because T ∈ B(G). PRODUCT-ONE SEQUENCES 15 If hsupp(T )i = hbi, then T = b[n] for some n ∈ N by Lemma 3.6.4. Since b[4] · T ∈ B(G), it follows that n should be even number, and hence we are done. By symmetry, we can obtain the same result whenever hsupp(T )i = habi or ha2 bi. Suppose now that hsupp(T )i = hai. Then T = a[n1 ] · (a2 )[n2 ] for some n1 , n2 ∈ N0 . i) n1 = 0. In this case, b[4] · (a2 )[n2 ] ∈ B(G) implies that n2 ≥ 2. It follows that b[2] · (a2 )[n2 ] ∈ B(G). ii) n2 = 0. In this case, b[4] · a[n1 ] ∈ B(G) implies that n1 ≥ 2. It follows that b[2] · a[n1 ] ∈ B(G). iii) n1 ≥ 1 and n2 ≥ 1. To avoid the trivial case, we may assume that n1 6= n2 . If |n1 − n2 | = 1, then, since any choice of n1 , n2 can be reduced to the case n1 = 1, n2 = 2 it suffices to verify only such two cases, a · b · a2 · a2 · b[3] ∈ B(G) a · a · b · a2 · b[3] ∈ B(G) If |n1 − n2 | ≥ 2, then it can be reduced or n1 = 2, n2 = 1 , and we have the followings : implies that a · b · a2 · a2 · b ∈ B(G), implies that a · a · b · a2 · b ∈ B(G). to the case n1 = 0 or n2 = 0. Therefore, in any cases, we can obtain b[2] · T ∈ B(G), and it follows that b[2] ∼ b[4] . Moreover, b ≁ b[3] because b[3] · (ab)[3] ∈ B(G), but b · (ab)[3] ∈ / B(G). Hence  [2]   [3]  b [b], b ,  are distinct B(G)-equivalence classes in the class semigroup C B(G), F (G) .  5. Arithmetic Properties of the monoid of product-one sequences The goal of this section is to study the arithmetic of the monoid B(G) of product-one sequences. To do so we briefly recall some arithmetical concepts (details can be found in [18]). Let H be an atomic monoid and a, b ∈ H. If a = u1 ·. . .·uk , where k ∈ N and u1 , . . . , uk ∈ A(H), then k is called the length of the factorization and LH (a) = L(a) = {k ∈ N | a has a factorization of length k} ⊂ N is the set of lengths of a. As usual we set L(a) = {0} if a ∈ H × , and then L(H) = {L(a) | a ∈ H} denotes the system of sets of lengths of H. Let k ∈ N and suppose that H 6= H × . Then [ L ⊂ N Uk (H) = k∈L,L∈L(H) denotes the union of sets of lengths containing k, and we set ρk (H) = sup Uk (H) . If L = {m1 , . . . , mk } ⊂ Z is a finite subset of the integers, where k ∈ N and m1 < . . . < mk , then ∆(L) = {mi − mi−1 | i ∈ [2, k]} ⊂ N is the set of distances of L. If all sets of lengths are finite, then [ ∆(L) ∆(H) = L∈L(H) is the set of distances of H. It is easy to check that min ∆(H) = gcd ∆(H). If θ : H → B is a transfer homomorphism between atomic monoids having finite sets of lengths, then ([18, Proposition 3.2.3]) (5.1) L(H) = L(B) whence ∆(H) = ∆(B) and Uk (H) = Uk (B) for all k ∈ N. 16 JUN SEOK OH It is well-known that if H is finitely generated, then then all unions Uk (H) of sets of lengths (in particular, all sets of lengths) and the set of distances ∆(H) are finite ([18, Theorem 3.1.4]). We will study the system of sets of lengths and all further mentioned invariants for the monoid B(G). As usual, we set    L(G) = L B(G) , ∆(G) = ∆ B(G) , Uk (G) = Uk B(G)  and ρk (G) = ρk B(G) for all k ∈ N. Since B(G) is finitely generated by Lemma 3.2, all these invariants are finite. The significance of the monoid B(G) for abelian groups stems from its relevance for general Krull monoids. Indeed, if H is a commutative Krull monoid with class group G such that every class contains a prime divisor, then there is a transfer homomorphism θ : H → B(G) and hence L(H) = L(G). This transfer process from monoids of zero-sum sequences to more general monoids carries over to transfer Krull monoids ([16]). We study the structure of Uk (G) and of ∆(G) for general finite groups G and we will derive canonical bounds for their size. Most results are known in the abelian case partly with different bounds (for a recent survey on the abelian case we refer to [32]). However, if G is non-abelian, then B(G) is not a transfer Krull monoid by Proposition 3.4. Thus the present results cannot be derived from the abelian setting. If |G| ≤ 2, then B(G) is factorial, L(G) = {{k} | k ∈ N0 }, ∆(G) = ∅, and Uk (G) = {k} for all k ∈ N. To avoid annoying case distinctions we exclude this trivial case. Throughout this section, let G be a finite group with |G| ≥ 3. Although the forthcoming proofs parallel the proofs given in the commutative setting there is a main difference. It stems from the fact that, in the non-abelian case, the embedding B(G) ֒→ F (G) is not a divisor homomorphism. Thus there exist U, V ∈ B(G) such that U divides V in F (G), but not in B(G). Moreover, U and V can be atoms (e.g., if G is the quaternion group, as discussed in Examples 4.1, then U = I [4] ∈ A(G) and V = I [4] · J [2] ∈ A(G) have this property). Lemma 5.1. Let k, ℓ ∈ N with k < ℓ and U1 , . . . , Uk , V1 , . . . , Vℓ ∈ A(G) such that U1 ·. . .·Uk = V1 ·. . .·Vℓ . There exist µ ∈ [1, k], λ, λ′ ∈ [1, ℓ] with λ 6= λ′ , and g1 , g2 ∈ G such that Uµ = g1 · g2 · . . . · gm with m ≥ 2, 1G = g1 . . . gm , g1 | Vλ , and g2 | Vλ′ in F (G). Proof. Assume to the contrary that the assertion does not hold. Since 1G is a prime element of B(G), we may suppose without restriction that all Ui and Vj have length at least two. We set U1 = g1 · g2 · . . . · gm where m ≥ 2 and 1G = g1 . . . gm . Then g1 · g2 divides Vλ for some λ ∈ [1, ℓ], say λ = 1. Then we consider g2 · g3 . Since the assertion does not hold, it follows that g1 · g2 · g3 divides V1 . Proceeding recursively we obtain that U1 | V1 , say V1 = U1 · V1′ with V1′ ∈ F (G). Thus we obtain the equation U2 · . . . · Uk = V1′ · V2 · . . . · Vℓ . Proceeding in this way we end up with an equation of the form 1F (G) = S1 · . . . · Sη · Vη+1 · . . . · Vℓ , where η ≤ k and S1 , . . . , Sη ∈ F (G), a contradiction to k < ℓ.  We consider the following property : P. If U = g1 · . . . · gℓ ∈ A(G) and g1 = h1 h2 with h1 , h2 ∈ G, then U ′ = h1 · h2 · g2 · . . . · gℓ is either an atom or a product of two atoms at most. Remark 5.2. Of course, every abelian group satisfies Property P and the same is true for some nonabelian groups such as the quaternion group. However, for every n ≥ 9, the dihedral group D2n does not have Property P as the following example shows. PRODUCT-ONE SEQUENCES 17 Example 5.3. 1. Let G = Q8 be the quaternion group as discussed in Example 4.1. Then D(G) = 6, and clearly any atom having length at most 4 satisfies Property P. Any atom U having the length 6 has the form [4] [2] U = g1 · g2 , where g1 , g2 ∈ {I, J, K, −I, −J, −K} with g2 6= ±g1 , and any atom V having length 5 is one of the following three types : [3] • V = g1 · g2 · g3 , [2] g1 where g1 , g2 , g3 ∈ {I, J, K, −I, −J, −K} with g2 6= g3 and g2 , g3 6= ±g1 . [2] g2 • V = · · (−E), where g1 , g2 ∈ {I, J, K, −I, −J, −K} with g2 6= ±g1 . • V = g1 · (−g1 ) · g2 · (−g2 ) · (−E), where g1 , g2 ∈ {I, J, K} with g1 6= g2 . It is easy to check that G satisfies Property P. 2. Let G = D2n = ha, b | an = b2 = 1G and ba = a−1 bi be the dihedral group, where n ≥ 9. Consider the following sequences : U = b[2] · (ba)[3] · a2 · ba5 and U ′ = b[2] · (ba)[3] · ba2 · ba4 · ba5 . Then U ′ is a product of b[2] , (ba)[2] , and ba2 · ba · ba4 · ba5 , which are atoms. Now we need to verify that U is an atom. Assume to the contrary that U is not atom, say U = W1 · W2 with W1 , W2 ∈ B(G), and let W1 be an atom with a2 | W1 . Write W1 = g1 · g2 · . . . · gℓ with g1 = a2 and g1 g2 . . . gℓ = 1G . Then ℓ = 3 or ℓ = 5. If ℓ = 3, then g2 g3 = a−2 and g2 , g3 ∈ {b, ba, ba5 }. Since n ≥ 9, this is impossible. If ℓ = 5, then W2 = b[2] or W2 = (ba)[2] which implies that W1 = (ba)[3] · a2 · ba5 or W1 = b[2] · ba · a2 · ba5 . It is easy to check that W1 is not an atom. Thus G does not have Property P.  Lemma 5.4. Suppose that G satisfies Property P. Then for every S ∈ B(G) with max ∆ L(S) ≥ 2, there exists T ∈ B(G) such that |T | < |S| and max ∆ L(T ) ≥ max ∆ L(S) − 1.  Proof. Let S ∈ B(G) and d = max ∆ L(S) ≥ 2. Then there are k, ℓ ∈ N and U1 , . . . , Uk , V1 , . . . , Vℓ ∈ A(G) such that S = U1 · . . . · Uk = V1 · . . . · Vℓ with ℓ − k = d and U1 · . . . · Uk has no factorization of length in [k + 1, ℓ − 1]. Since 1G ∈ B(G) is a prime element, we may assume that 1G does not divide S, and thus all Ui and Vj have length at least 2. By Lemma 5.1, we may assume that there are g1 , g2 ∈ G such that g1 · g2 | U1 , Let U1 = g1 · g2 · and consider U1′ , V1 = g1 · V1′ g1 | V1 and g2 | V2 in F (G). and V2 = g2 · V2′ with U1′ , V1′ , V2′ ∈ F (G). Then we set g0 = g1 g2 ∈ G, U1′′ = g0 · U1′ and V1′′ = g0 · V1′ · V2′ . Clearly, U1′′ ∈ A(G). Since V1 gives rise to a product-one equation with g1 being the finial element and V2 gives rise to a product-one equation with g2 being the first element, it follows that V1′′ ∈ B(G). We obtain that U1′′ · U2 · . . . · Uk = V1′′ · V3 · . . . · Vℓ . We set T = U1′′ · U2 · . . . · Uk and observe that |T | < |S|. If T = W1 · . . . · Wt with W1 , . . . , Wt ∈ A(G) and g0 | W1 in F (G), then W1 = g0 · W1′ and W1′′ = g1 · g2 · W1′ is either atom or product of precisely two atoms. Thus S = U1 · . . . · Uk has a factorization of length t or t + 1. It follows that T has no factorization of length in [k + 1, ℓ − 2], and thus we obtain   max ∆ L(T ) ≥ ℓ − 1 − k = d − 1 = max ∆ L(S) − 1 .  The next result shows that the set of distances and all unions of sets of lengths of B(G) are finite intervals. This is far from being true in general. Indeed, for every finite set ∆ ⊂ N with min ∆ = gcd ∆ there is a finitely generated Krull monoid H such that ∆(H) = ∆ ([22]). 18 JUN SEOK OH Theorem 5.5. 1. Uk (G) is a finite interval for all k ∈ N. 2. If G satisfies Property P, then ∆(G) is a finite interval with min ∆(G) = 1. Proof. 1. Let k ∈ N. We set λk (G) = min Uk (G). Then Uk (G) ⊂ [λk (G), ρk (G)], and we have to show equality. Note that it is sufficient to prove that [k, ρk (G)] ⊂ Uk (G). Indeed, suppose that this is done, and let ℓ ∈ [λk (G), k]. Then ℓ ≤ k ≤ ρℓ (G), hence k ∈ Uℓ (G) and consequently ℓ ∈ Uk (G). It follows that [λk (G), ρk (G)] = Uk (G). To prove the assertion, let ℓ ∈ [k, ρk (G)] be minimal such that [ℓ, ρk (G)] ⊂ Uk (G). Assume to the contrary that ℓ > k. We set Ω = {A ∈ B(G) | {k, j} ⊂ L(A) for some j ≥ ℓ} and choose B ∈ Ω such that |B| is minimal. Then B = U1 · . . . · Uk = V1 · . . . · Vj , where U1 , . . . , Uk , V1 , . . . , Vj ∈ A(G) , and by Lemma 5.1, we may assume that Uk = g1 · g2 · U with g1 | Vj−1 and g2 | Vj , where U = g3 · . . . · gt and g1 . . . gt = 1G . We set g0 = g1 g2 ∈ G and obtain that Uk′ = g0 · U ∈ A(G). Write Vj−1 = h1 · . . . · hn · g1 and Vj = g2 · s1 · . . . · sm ′ with h1 . . . hn g1 = 1G and g2 s1 . . . sm = 1G . Let Vj−1 = g0 · V ∈ B(G), where V = h1 · . . .· hn · s1 · . . . · sm ∈ F (G), and consider B ′ = U1 · . . . · Uk−1 · Uk′ . Then |B ′ | < |B|, and B ′ = U1 · . . . · Uk−1 · Uk′ = V1 · . . . · Vj−2 · W1 · . . . · Wt , ′ = W1 · . . . · Wt with W1 , . . . , Wt ∈ A(G). By the minimality of |B|, we have (j − 2) + t < ℓ ≤ j. where Vj−1 Hence t = 1 and j = ℓ. Thus ℓ − 1 ∈ Uk (G), a contradiction to the minimality of ℓ. Therefore ℓ = k and hence [k, ρk (G)] ⊂ Uk (G). 2. Since ∆(G) is finite as mentioned before, we can take S0 ∈ B(G) with minimal length such that  max ∆ L(S0 ) = max ∆(G). By Lemma 5.4, we can find S1 ∈ B(G) with minimal length such that |S1 | < |S0 | and max ∆ L(S1 ) ≥ max ∆(G) − 1. By the minimality of S0 ,  |S1 | < |S0 | implies max ∆ L(S1 ) < max ∆(G) .  It follows that max ∆(G) − 1 = max ∆ L(S1 ) ∈ ∆(G). Again Lemma 5.4 implies that we can find S2 ∈ B(G) with minimal length such that |S2 | < |S1 | and max ∆ L(S2 ) ≥ max ∆(G) − 2. By the minimality of S1 ,  |S2 | < |S1 | implies max ∆ L(S2 ) < max ∆(G) − 1 .  It follows that max ∆(G) − 2 = max ∆ L(S2 ) ∈ ∆(G). Continuing this process, we can obtain Sn ∈ B(G) such that  1 = max ∆(G) − n = max ∆ L(Sn ) ∈ ∆(G) . Thus ∆(G) = [1, max ∆(G)] is an interval.  Next we study the maxima of the sets Uk (G). Recall that we have defined ρk (G) = max Uk (G) for all k ∈ N. Even in case of abelian groups, precise values of ρ2k+1 (G) are unknown in general ([11]). Proposition 5.6. Let k ∈ N. for all k ∈ N. 1. ρk (G) ≤ kD(G) 2 2. ρ2k (G) = kD(G) for all k ∈ N. In particular, 1 + kD(G) ≤ ρ2k+1 (G) ≤ kD(G) + D(G) 2 for all k ∈ N. PRODUCT-ONE SEQUENCES 19 Proof. 1. Let k ∈ N. Let A ∈ B(G) with k ∈ L(A). We have to show that max L(A) ≤ kD(G) 2 . There are U1 , . . . , Uk ∈ A(G) such that A = U1 · . . . · Uk . Since 1G ∈ B(G) is a prime element, we may assume that 1G does not divide A, and hence any atom dividing A has length at least 2. If A = V1 · . . . · Vℓ for V1 , . . . , Vℓ ∈ A(G), then we obtain 2ℓ ≤ ℓ X i=1 |Vi | = |A| = k X |Uj | ≤ kD(G) . j=1 kD(G) It follows that ℓ ≤ kD(G) 2 , and thus max L(A) ≤ 2 . 2. Let k ∈ N. Then, by 1., we have ρ2k (G) ≤ kD(G). Now let U = g1 · . . . · gℓ ∈ A(G) with ℓ = |U | = D(G), where g1 , . . . , gℓ ∈ G. Consider the sequence V = g1−1 · . . . · gℓ−1 ∈ A(G) .   Then kD(G) ∈ L (U · V )[k] . Since 2k ∈ L (U · V )[k] , we obtain ρ2k (G) ≥ kD(G), and hence ρ2k (G) = kD(G). It remains to prove the “In particular” statement. For all i, j ∈ N, we have Ui (G) + Uj (G) ⊂ Ui+j (G) whence ρi (G) + ρj (G) ≤ ρi+j (G). Thus the “In particular” statement follows from 1. and 2.  Our next goal is to study the maximum of the set of distances ∆(G). If G is abelian, then precise values for max ∆(G) are known only for very special classes of groups including cyclic groups ([23]). For general groups G we study max ∆(G) via a further invariant (introduced in Definition 5.7). The main result is Proposition 5.12. Definition 5.7. Let H be an atomic monoid. 1. For b ∈ H, let ω(H, b) denote the smallest N ∈ N0 ∪ {∞} with the following property : For all n ∈ N and a1 , . . . , an ∈ H, if b | a1 . . . an , then Q there exists a subset Ω ⊂ [1, n] such that |Ω| ≤ N and b | ν∈Ω aν . 2. We set ω(H) = sup {ω(H, u) | u ∈ A(H)} ∈ N0 ∪ {∞}. If H is an atomic monoid with ∆(H) 6= ∅, then 2 +max ∆(H) ≤ ω(H) (see [18, Theorem 1.6.3] and [20, Proposition 3.6]). As usual we set ω(G) = ω B(G) and observe that 2 + max ∆(G) ≤ ω(G). If G is a cyclic group or an elementary 2-group, then 2 + max ∆(G) = ω(G) = D(G). Lemma 5.8. We have D(G) ≤ ω(G), and equality holds if G is abelian. Proof. Let U = g1 · . . . · gℓ ∈ A(G) with ℓ = |U | = D(G). Put Vi = gi · gi−1 ∈ A(G) for all i ∈ [1, ℓ]. Then we obtain U | V1 · . . . · Vℓ in B(G) . Assume to the contrary that U divides a proper subproduct in B(G), say U | V1 ·. . .·Vk for some k ∈ [1, ℓ−1]. Then 2k ≥ ℓ. If 2k = ℓ, then U = V1 · . . . · Vk is not atom in B(G). If 2k > ℓ, then ℓ − k < k, and, for each j = [1, ℓ − k], we may assume that gk+j = gj−1 . Hence we have U = (g1 · gk+1 ) · . . . · (gℓ−k · gℓ ) · (gℓ−k+1 · . . . · gk ) , and each terms is in B(G). It follows that U is not atom in B(G), a contradiction. Thus U cannot divide a proper subproduct, and hence D(G) ≤ ω(G). Suppose that G is abelian. It remains to show that ω(G) ≤ D(G). Let U ∈ A(G). If U | V1 · . . . · Vk for V1 , . . . , Vk ∈ B(G), then there is a subproduct of at most |U | factors such that U divides this subproduct in F (G). Since B(G) ֒→ F (G) is a divisor homomorphism, this divisibility holds in B(G). Hence ω(G, U ) ≤ |U | ≤ D(G), and it follows that ω(G) ≤ D(G).  20 JUN SEOK OH Next we define Davenport constants of additive commutative semigroups (as studied in [35, 1, 34]) and will apply these concepts to the class semigroup of B(G). Recall that all our semigroups have an identity element (a zero-element in the additive case) and we use the convention that an empty sum equals the zero-element. Definition 5.9. Let C be an additive commutative semigroup. 1. We denote by d(C) the smallest d ∈ N0 ∪ {∞} with the following property : P P For all n ∈ N and c1 , . . . , cn ∈ C, there exists Ω ⊂ [1, n] such that |Ω| ≤ d and nν=1 cν = ν∈Ω cν . 2. We denote by D(C) the smallest ℓ ∈ N ∪ {∞} with the following property : P P For all n ∈ N with n ≥ ℓ and c1 , . . . , cn ∈ C, there exists Ω ( [1, n] such that nν=1 cν = ν∈Ω cν . If G is a finite abelian group, then of course the definitions for D(G) and d(G) given in Definition 3.1 and in Definition 5.9 coincide. Lemma 5.10. If C is a finite commutative semigroup, then D(C) = d(C) + 1 ≤ |C|. Proof. The equality D(C) = d(C) + 1 is verified in [1, Proposition 1.2]. Since we could not find a reference that |C| is an upper bound, we provide the short argument. To show that D(C) ≤ |C|, it suffices to verify that |C| has the property given in Definition 5.9. So let n ∈ N with n ≥ |C| and c1 , . . . , cn ∈ C. If all sums X cν , c1 , c1 + c2 , . . . , c1 + . . . + cn−1 0= ν∈∅ are pairwise distinct, then one of the sums coincides with c1 + . . . + cn as required. Suppose there are k, ℓ ∈ [0, n − 1] with k < ℓ and c1 + . . .+ ck = c1 + . . .+ cℓ . Then c1 + . . .+ cn = c1 + . . .+ ck + cℓ+1 + . . .+ cn as required.  Lemma 5.11. Let F be a monoid, H ⊂ F a submonoid with H × = H ∩ F × and C = C ∗ (H, F ). If n ∈ N and f, a1 , . . . , an ∈ F with f a1 . . . an ∈ H, then there exists a subset Ω ⊂ [1, n] such that Y |Ω| ≤ d(C) and f aν ∈ H . ν∈Ω Proof. By the definition of d(C), there exists a subset Ω ⊂ [1, n] such that |Ω| ≤ d(C) and n X [aν ]F H = ν=1 X [aν ]F H. ν∈Ω Since f a1 . . . an ∈ H, we have n n iF h Y iF h Y Y X X F F F F f aν ∈ f aν = [f ]H + [aν ]H = [f ]H + [aν ]H = f aν ⊂H. ν∈Ω Proposition 5.12. ν∈Ω H ν∈Ω ν=1 ν=1 H    1. D(G) ≤ ω(G) ≤ D(G) + d C B(G), F (G) .   2. D(G/G′ ) ≤ D C B(G), F (G) , and equality holds if G is abelian.  Proof. We set C = C(B(G), F (G) . 1. The first inequality follows from Lemma 5.8. For the second inequality, let U ∈ A(G), and A1 , . . . , An ∈ B(G) such that U | A1 · . . . · An in B(G) . PRODUCT-ONE SEQUENCES 21 After renumbering if necessary, we may assume that U | A1 · . . . · A|U| in F (G), say A1 · . . . · A|U| = U · W  with W ∈  F (G). Then  W · A|U|+1 · . . . · An ∈ B(G). By Lemma 5.11, there is a subset Ω ⊂ |U | + 1, n , say Ω = |U | + 1, m , such that |Ω| ≤ d(C) and W · A|U|+1 · . . . · Am ∈ B(G). Thus we obtain A1 · . . . · Am = U · (W · A|U|+1 · . . . · Am ) and m ≤ |U | + d(C) ≤ D(G) + d(C). 2. By Theorem 3.8.1, G/G′ is an isomorphic to a subsemigroup of C. Clearly, this implies that D(G/G′ ) ≤ D(C). Suppose that G is abelian. Then |G′ | = 1 and G/G′ is isomorphic to G. Furthermore, B(G) ֒→ F (G) is a divisor theory, the class semigroup C is isomorphic to the class group of B(G) by Lemma 2.1, and the class group of B(G) is isomorphic to G. Thus equality holds.  References [1] S.D. Adhikari, W. Gao, and Guoqing Wang, Erdős-Ginzburg-Ziv theorem for finite commutative semigroups, Semigroup Forum 88 (2014), 555 – 568. [2] N.R. Baeth and D. Smertnig, Factorization theory: From commutative to noncommutative settings, J. Algebra 441 (2015), 475 – 551. [3] J. Bass, Improving the Erdős-Ginzburg-Ziv theorem for some non-abelian groups, J. Number Theory 126 (2007), 217 – 236. [4] F.E. Brochero Martı́nez and S. Ribas, Extremal product-one free sequences in Dihedral and Dicyclic Groups, Discrete Mathematics(2017), https://doi.org/10.1016/j.disc.2017.09.024. [5] F. Chen and S. Savchev, Long minimal zero-sum sequences in the groups C2r−1 ⊕ C2k , Integers 14 (2014), Paper A23. [6] K. Cziszter and M. Domokos, On the generalized Davenport constant and the Noether number, Central European J. Math. 11 (2013), 1605 – 1615. [7] , Groups with large Noether bound, Ann. Inst. Fourier (Grenoble) 64 (2014), 909 – 944. , The Noether number for the groups with a cyclic subgroup of index two, J. Algebra 399 (2014), 546 – 560. [8] [9] K. Cziszter, M. Domokos, and A. Geroldinger, The interplay of invariant theory with multiplicative ideal theory and with arithmetic combinatorics, Multiplicative Ideal Theory and Factorization Theory, Springer, 2016, pp. 43 – 95. [10] K. Cziszter, M. Domokos, and I. Szöllősi, The Noether number and the Davenport constants of the groups of order less than 32, arXiv:1702.02997. [11] Y. Fan and Q. Zhong, Products of k atoms in Krull monoids, Monatsh. Math. 181 (2016), 779 – 795. [12] W. Gao and A. Geroldinger, Zero-sum problems in finite abelian groups : a survey, Expo. Math. 24 (2006), 337 – 369. [13] W. Gao and Yuanlin Li, The Erdős-Ginzburg-Ziv theorem for finite solvable groups, J. Pure Appl. Algebra 214 (2010), 898 – 909. [14] W. Gao and Zaiping Lu, The Erdős-Ginzburg-Ziv theorem for dihedral groups, J. Pure Appl. Algebra 212 (2008), 311 – 319. [15] A. Geroldinger, Additive group theory and non-unique factorizations, Combinatorial Number Theory and Additive Group Theory (A. Geroldinger and I. Ruzsa, eds.), Advanced Courses in Mathematics CRM Barcelona, Birkhäuser, 2009, pp. 1 – 86. [16] , Sets of lengths, Amer. Math. Monthly 123 (2016), 960 – 988. [17] A. Geroldinger and D.J. Grynkiewicz, The large Davenport constant I: Groups with a cyclic index 2 subgroup, J. Pure Appl. Algebra 217 (2013), 863 – 885. [18] A. Geroldinger and F. Halter-Koch, Non-Unique Factorizations. Algebraic, Combinatorial and Analytic Theory, Pure and Applied Mathematics, vol. 278, Chapman & Hall/CRC, 2006. [19] A. Geroldinger and W. Hassler, Arithmetic of Mori domains and monoids, J. Algebra 319 (2008), 3419 – 3463. [20] A. Geroldinger and F. Kainrath, On the arithmetic of tame monoids with applications to Krull monoids and Mori domains, J. Pure Appl. Algebra 214 (2010), 2199 – 2218. [21] A. Geroldinger, S. Ramacher, and A. Reinhart, On v-Marot Mori rings and C-rings, J. Korean Math. Soc. 52 (2015), 1 – 21. [22] A. Geroldinger and W. A. Schmid, A realization theorem for sets of distances, J. Algebra, 481 (2017), 188 – 198. [23] A. Geroldinger and Q. Zhong, The catenary degree of Krull monoids II, J. Australian Math. Soc. 98 (2015), 324 – 354. [24] D.J. Grynkiewicz, The large Davenport constant II: General upper bounds, J. Pure Appl. Algebra 217 (2013), 2221 – 2246. , Structural Additive Theory, Developments in Mathematics, vol. 30, Springer, 2013. [25] [26] Dongchun Han, The Erdős-Ginzburg-Ziv Theorem for finite nilpotent groups, Archiv Math. 104 (2015), 325 – 332. [27] Dongchun Han and Hanbin Zhang, Erdős-Ginzburg-Ziv Theorem and Noether number for Cm ⋉ϕ Cmn , arXiv:1707.03639. [28] F. Kainrath, Arithmetic of Mori domains and monoids : The Global Case, Multiplicative Ideal Theory and Factorization Theory, Springer, 2016, pp. 183 – 218. 22 JUN SEOK OH [29] J.E. Olson and E.T. White, Sums from a sequence of group elements, Number Theory and Algebra (H. Zassenhaus, ed.), Academic Press, 1977, pp. 215 – 222. [30] A. Reinhart, On integral domains that are C-monoids, Houston J. Math. 39 (2013), 1095 – 1116. [31] W.A. Schmid, The inverse problem associated to the Davenport constant for C2 ⊕ C2 ⊕ C2n , and applications to the arithmetical characterization of class groups, Electron. J. Comb. 18(1) (2011), Research Paper 33. , Some recent results and open problems on sets of lengths of Krull monoids with finite class group, Multiplicative [32] Ideal Theory and Factorization Theory (S.T. Chapman, M. Fontana, A. Geroldinger, and B. Olberding, eds.), Springer, 2016, pp. 323 – 352. [33] D. Smertnig, Sets of lengths in maximal orders in central simple algebras, J. Algebra 390 (2013), 1 – 43. [34] Guoquing Wang, Davenport constants for semigroups II, J. Number Theory 153 (2015), 124 – 134. [35] Guoquing Wang and Weidong Gao, Davenport constants for semigroups, Semigroup Forum 76 (2008), 234 – 238. Institute for Mathematics and Scientific Computing, University of Graz, NAWI Graz, Heinrichstraße 36, 8010 Graz, Austria E-mail address: [email protected]
0math.AC
. TOP LOCAL COHOMOLOGY, MATLIS DUALITY AND TENSOR PRODUCTS MAJID EGHBALI A BSTRACT. Let a be an ideal of a local ring ( R, m) with d = dim R. For i > d the local cohomology module Hai ( R) vanishes. In the case that Had ( R) 6 = 0, at first we give a bound for depth D ( Had ( R)), arXiv:1302.1274v1 [math.AC] 6 Feb 2013 where d > 2 and ( R, m) is complete. More precisely we show grade(b, D ( Had ( R))) + dim R/b ≥ depth( D ( Had ( R))) ≥ 2, where b is an ideal of R of dimension ≤ 2 and D(-) denotes the Matlis duality functor. Later we give conditions that Cohen-Macaulayness of D ( Had ( R)) fails, where d ≥ 3. Finally, Had ( R) ⊗ R Had ( R), D ( Had ( R)) ⊗ R D ( Had ( R)) and Had ( R) ⊗ R D ( Had ( R)) are examined. In particular, we give the necessary and sufficient condition for Cohen-Macaulayness of D ( Had ( R)) ⊗ R/Q D ( Had ( R)), where Q is a certain ideal of R. 1. I NTRODUCTION Let a ⊂ R denote an ideal of a local ring ( R, m) with d = dim R. Let M be a finitely generated R-module. For an integer i ∈ Z, let Hai ( M ) denote the ith local cohomology module of M with respect to a as introduced by Grothendieck (see [G] and [Br-Sh]). Let E := ER ( R/m) be the injective hull of the R-module R/m. By D (−) we denote the Matlis dual functor HomR (−, E). In algebraic geometry a (set-theoretic) complete intersection is a variety Y that can be cut out by codim(Y ) many equations. By a result of Hellus [H, Corollary 1.1.4] Matlis dual of local cohomology can be useful to see whether we have a set-theoretic complete intersection ideal or not. Of a particular interest is the last non-vanishing degree of the local cohomology module Hai ( R) known as the cohomological dimension cd(a, R). In general cd(a, R) ≤ d and in the case that a = m, the equality occurs. Hartshorne-Lichtenbaum Vanishing Theorem gives the necessary and sufficient condition for non-vanishing of Had ( R) (cf. [Br-Sh, Theorem 8.2.1]). Here we assume that Had ( R) 6= 0 and give some information on D ( Had ( R)) and the tensor products of these modules. First, for a complete local ring ( R, m) we show that depth D ( Had ( R)) ≥ min{2, d} (see Theorem 3.1 ). Then, we give an upper bound for depth( D ( Had ( R))): grade(b, D ( Had ( R))) + dim R/b ≥ depth( D ( Had ( R))) ≥ 2, where b is an ideal of R of dimension at most 2 and d ≥ 3. Hence, it provides conditions in which Cohen-Macaulayness of D ( Had ( R)) fails (d ≥ 3), see Remark 3.5. Recently, there were some researches on the endomorphism ring of local cohomology modules and their importance, see for instance [H-St], [H-Sch], [Sch3] and [E-Sch]. However not so much is known on its dual, that is on the tensor product of local cohomology modules. Section four is devoted to examining the modules Had ( R) ⊗ R Had ( R), D ( Had ( R)) ⊗ R D ( Had ( R)) and Had ( R) ⊗ R 2000 Mathematics Subject Classification. 13D45, 13C14. Key words and phrases. Top local cohomology, Depth, Tensor products, Matlis duality, Cohen-Macaulayness. The author is supported in part by a grant from IPM (No. 91130026). 1 2 EGHBALI D ( Had ( R)). In particular, in the case R is complete and pdR/Q (K R/Q ) < ∞ for a certain ideal Q of R we give the necessary and sufficient conditions for Cohen-Macaulayness of D ( Had ( R)) ⊗ R/Q D ( Had ( R)) (see Theorem 4.2). We denote by pdR ( M ) resp. K M the projective dimension resp. the canonical module of a finite R-module M (if it exists). 2. P RELIMINARIES Let ( R, m) be a local ring of dimension d. We denote by ER ( R/m) the injective hull of the residue field R/m = k. The Matlis duality functor Hom R (−, ER ( R/m)) is denoted by D (−). We state the following lemmas which we need in our proofs. Lemma 2.1. Let ( R, m) be a complete local ring. Suppose that M and N are either Artinian or finitely generated R-modules. Then we have the following isomorphism Hom( M, N ) ∼ = Hom( D ( N ), D ( M )). Proof. Since N ∼ = D ( D ( N )) so by [R, Theorem 2.11] we get the claim as follows: Hom R ( M, N ) ∼ = Hom R ( M, D ( D ( N ))) ∼ = Hom R ( D ( N ), D ( M )).  Lemma 2.2. Let ( R, m) be a complete local ring. Let M and N be Artinian R-modules. Then we have the following isomorphism D( N ) ⊗R M ∼ = D (HomR ( M, N )). Proof. It should be noted that, by Matlis duality D ( N ) is a finitely generated R-modules. By Hom −⊗-adjointness we can prove the claim as follows: D( N ) ⊗R M ∼ = D ( N ) ⊗ R D ( D ( M )) ∼ = D ( N ) ⊗ R Hom R ( D ( M ), E( R/m)) ∼ = Hom R (HomR ( D ( N ), D ( M )), E( R/m)) ∼ = Hom R (HomR ( M, N ), E( R/m)). (cf. [Br-Sh, 10.2.16]) The last isomorphism follows by 2.1.  We need the definition of the canonical module of a finitely generated R-module M. To this end let ( R, m) be the epimorphic image of a local Gorenstein ring (S, n) and n = dim S. Definition 2.3. (A) For a finitely generated R-module M we consider t K ( M ) = HomR ( Hm ( M ), ER ( R/m)), t = dim M. t ( M ) is an Artinian R-module it turns out that K ( M ) is a finitely generated R̂-module. Because Hm (B) This is closely related to the notion of the canonical module K M of a finitely generated Rmodule M. To this end we have to assume that ( R, m) is the epimorphic image of a local Gorenstein ring (S, n) with n = dim S. Then K M = ExtnS−t ( M, S) is called the canonical module of M. TOP LOCAL COHOMOLOGY 3 By virtue of the Cohen’s Structure Theorem and (A) there is an isomorphism K ( M ) ≃ K M̂ . By the Local Duality Theorem (see [G]) there are the following isomorphisms t Hom R ( Hm ( M ), ER ( R/m)) ≃ K ( M ) ≃ K M̂ . Here R̂ resp. M̂ denote the m-adic completion of R resp. of M. In the following, we summarize a few results about the last non-vanishing local cohomology module Had ( R). To this end note that a finite module M over a Noetherian ring R satisfies Serre’s condition Sn if depth Mp ≥ min{n, dim Mp } for all p ∈ Supp M. Lemma 2.4. Let ( R, m) be a complete local ring of dimension d and Had ( R) 6= 0. (a) Had ( R) is an Artinian R-module. (b) H d ( R) ∼ = H d ( R/Qa ( R)), where a m Qa ( R) = T {q : q primary component of R, dim R/q = d and Rad(a + q) = m}. (c) D ( Had ( R)) ∼ = K R/Qa ( R) is a finitely generated R-module. (d) Ann R Had ( R) = Qa ( R). (e) dim D ( Had ( R)) = d. (f) The module D ( Had ( R)) satisfies Serre’s condition S2 . (g) If R/Qa ( R) is a Cohen-Macaulay ring, then the module D ( Had ( R)) is Cohen-Macaulay. Proof. For the proof of (a), see [Br-Sh, Theorem 7.1.6]. For the proof of (b), (c), (d) and (g) we refer to [E-Sch, 3.3, 4.1(c), 4.2(a) and 4.3]. Part (e) follows by (b) and (d). The prove of (f) is a consequence of (c) and [Sch1, Lemma 1.9].  As a technical tool, in Section three, we use the so-called formal local cohomology modules. i ( M/an M ) the ith formal local cohomology of M with respect to We denote by Fai ( M ) := limn Hm ←− a. see [Sch2] for more information and also [E]. Lemma 2.5. (see [Sch2, Remark 3.6 and Theorem 4.5]) Let ( R, m) be a local ring. (a) If M is a finitely generated R-module, then dimR M/aM = sup{i ∈ Z : Fai ( M ) 6= 0}. (b) If the local ring ( R, m) is a quotient of a local Gorenstein ring (S, n), Then n−i Fai ( M ) ∼ ( M, S), E), i ∈ Z, = HomR ( HaS where M is considered as an S-module, n = dim S and E denotes the injective hull of the residue field R/m. It should be noted that Hai ( M, N ) = limn ExtiR ( M/an M, N ) is known as the ith generalized −→ local cohomology module provided that M and N are finitely generated R-modules. In case R = M, the module Hai ( M, N ) is the same as the ordinary local cohomology module Hai ( N ). 4 EGHBALI 3. ON THE DEPTH Let ( R, m) be a complete local ring of dimension d and a be an ideal of R. It is a well-known result that D ( Had ( R)) is a Cohen-Macaulay module of dimension d for d ≤ 2 (see for example 2.4(f)). In this section we examine the depth of Matlis dual of top local cohomology modules. Theorem 3.1. Let ( R, m) be a complete local ring of dimension d. Let Had ( R) be nonzero. Then depth( D ( Had ( R)) ≥ min{d, 2}. Proof. We prove the claim by induction on d. For d ≤ 2, the claim is clear. Assume that d ≥ 3. ∼ H d ( R/Q), where Q := Qa ( R). By First note that by virtue of Lemma 2.4 we have Had ( R) = m the definition of Q we may deduce that m ∈ / Ass R/Q and so depth R/Q > 0. Hence, there exists an element x ∈ m which is nonzero divisor on R/Q. From the short exact sequence x 0 → R/Q → R/Q → R/( x, Q) → 0 we get the following long exact sequence x d ( R/Q )) → D ( H d ( R/Q )) → D ( H d −1 ( R/( x, Q )) → · · · . 0 → D ( Hm m m Since dim( R/( x, Q)) = d − 1, so by induction hypothesis one can see that Hence, there are u, v ∈ m \ S d −1 depth D ( Hm ( R/( x, Q)) ≥ 2. d ( R/Q )) /xD ( H d ( R/Q ))) p. p∈Ass( D ( Hm m Thus it follows that d depth( D ( Hm ( R/Q)) ≥ 2.  According to [H, Corollary 1.1.4] the grade(a, D ( Had ( R))) plays a significant role to see whether a is a set-theoretic complete intersection. In this direction, we try to find an explicit relation between depth D ( Had ( R)) and grade(a, D ( Had ( R))) (see Theorem 3.2). To this end we denote by gradea ( M, N ) the least integer i such that Hai ( M, N ) is nonzero for finitely generated R-modules M and N. Theorem 3.2. Let a be an ideal of a local ring ( R, m). Let M and N be finitely generated R-modules. Then gradea ( M, N ) ≥ max{0, depth N − dim M/aM }. In order to prove Theorem 3.2 we need some preparations. Remark 3.3. Let ( R, m) be a local ring which is a factor ring of a Gorenstein local ring (S, n). In the light of Lemma 2.5 we have dim M/aM = sup{i : Fai ( M ) 6= 0} dim S − i = sup{i : HaS ( M, S) 6= 0} j = sup{dim S − j : HaS ( M, S) 6= 0} i ( M, S) 6 = 0} = dim S − inf{i : HaS = dim S − gradea ( M, S), TOP LOCAL COHOMOLOGY 5 where dim M/aM = dim S − grade(a + AnnS M ). See [B, Proposition 5.5]. Lemma 3.4. Let M and N be two finitely generated R-modules and a be an ideal of R. Then gradea ( M, N ) ≥ gradea ( M, R) − pdR N, provided that pdR N < ∞ . Proof. We argue by induction on n := pdR N. Put n = 0 so N is a finite free R-module of the form N ∼ = ⊕t R, where t is an integer. Hence, the isomorphisms H i ( M, N ) ∼ = H i ( M, ⊕t R) ∼ = ⊕t H i ( M, R) a a a hold. Clearly gradea ( M, N ) ≥ gradea ( M, R). Next, suppose that n > 0 and the claim holds for n − 1. There is a finite free R-module F such that 0→L→F→N→0 which induces pdR L = n − 1. By induction hypothesis gradea ( M, L) ≥ gradea ( M, R) − n + 1. If i < gradea ( M, R) − n, then it follows from the long exact sequence · · · → Hai ( M, F ) → Hai ( M, N ) → Hai+1 ( M, L) → · · · that Hai ( M, N ) is zero. Hence, gradea ( M, N ) ≥ gradea ( M, R) − pdR N.  Now is the time to give the proof of Theorem 3.2 as follows: Proof of Theorem 3.2. First note that by passing to the completion we may assume that R is a complete local ring. Then, by Cohen’s structure Theorem R is a factor ring of a regular local ring ( T, n). In the light of Independence Theorem we may assume that Fi ( M ) ∼ = Fi ( M ), where a b b := a ∩ T. Using Remark 3.3, we have dim M/aM = dim T − gradea ( M, T ). So by Lemma 3.4 and Auslander-Buchsbaum Theorem we prove the claim as follows: dim M/aM = dim T − gradea ( M, T ) ≥ dim T − gradea ( M, N ) − pdT N = depth N − gradea ( M, N ).  Assume that b is an ideal of R of dimension at most 2 and d ≥ 3. By virtue of Theorem 3.2 and 3.1 we have grade(b, D ( Had ( R))) + dim R/b ≥ depth( D ( Had ( R))) ≥ 2, which is an upper bound for depth( D ( Had ( R))). Remark 3.5. Let ( R, m) be a local ring of dimension d. 6 EGHBALI (a) Let x be a parameter element of R. Consider 0 : R < x >= S n ≥1 0 : R x n and following exact sequence 0 → 0 : R < x >→ R → R/0 : R < x >→ 0. One can see that dim(0 : R < x >) < d and dim R/(0 : R < x >) = d. Now apply Had (−) to the above short exact sequence to get the following exact sequence Had (0 : R < x >) → Had ( R) → Had ( R/0 : R < x >) → 0. Hence, by Grothendieck’s vanishing Theorem, we have the isomorphism Had ( R) ∼ = d Ha ( R/0 : R < x >). (b) Now we give conditions that Cohen-Macaulayness of D ( Had ( R)) fails. Let ( R, m) be a complete local ring, d ≥ 3 and b be a one-dimensional ideal containing a regular element x of R (part one guarantees the existence of a regular element of R). Then, it implies the following short exact sequence x 0 → R → R → R/xR → 0. Thus we have the following long exact sequence x · · · → Had−1 ( R/xR) → Had ( R) → Had ( R) → 0. By applying D (−) we get x 0 → D ( Had ( R)) → D ( Had ( R)) → D ( Had−1( R/xR)) → · · · . Now it yields that x is a D ( Had ( R))-regular element. So grade(b, D ( Had ( R))) > 0. Suppose that b does not contain a D ( Had ( R))/xD ( Had ( R))-regular element. Hence, [Bru-Her, 1.2.3 and 1.2.4] imply that Ext1R ( R/b, D ( Had ( R))) 6= 0 and then, grade(b, D ( Had ( R))) = 1. Therefore, in the view of Theorem 3.1 and Theorem 3.2 we have 2 ≤ depth( D ( Had ( R)) ≤ grade(b, D ( Had ( R))) + dim R/b = 2. It shows that with the above assumptions D ( Had ( R)) is not Cohen-Macaulay for d ≥ 3. 4. TENSOR PRODUCTS Throughout this section, ( R, m) is a local ring of dimension d. We assume that Had ( R) 6= 0 and Q := Qa ( R). In recent research there is an interest in endomorphism rings of certain local cohomology modules Hai ( R). This was done in the case of i = d by the author and Schenzel (see [E-Sch]) and some conditions for Cohen-Macaulayness of Hom R ( Had ( R), Had ( R)) have been investigated. For the sake of completeness, we state the following result. Remark 4.1. Let a be an ideal of a complete local ring ( R, m). Then, depthR (Hom R ( Had ( R), Had ( R))) ≥ min{2, d}. To this end note that Hom R ( Had ( R), Had ( R)) ∼ = HomR ( D ( Had ( R)), D ( Had ( R))) (see 2.1). Hence, the claim is clear by virtue of [Bru-Her, Exer. 1.4.19] and Theorem 3.1. The next part of our work is to investigate the tensor product of top local cohomology modules and their Matlis duals. TOP LOCAL COHOMOLOGY 7 Theorem 4.2. Let ( R, m) be a complete local ring of dimension d. Then, the following statements hold: (a) Had ( R) ⊗ R Had ( R) is of finite length. (b) Assume that R/Q is a Gorenstein ring. Then, Had ( R) ⊗ R Had ( R) = 0. (c) The ideal Q is contained in AnnR ( D ( Had ( R)) ⊗ R D ( Had ( R)) and the Krull dimension of D ( Had ( R)) ⊗ R D ( Had ( R)) is equal to d. (d) Suppose that pdR/Q (K R/Q ) < ∞ then, the following statements are equivalent : (1) R/Q is a Cohen-Macaulay ring. (2) R/Q Tori ( D ( Had ( R)), D ( Had ( R))) = 0 for all i ≥ 1 and D ( Had ( R)) ⊗ R/Q D ( Had ( R)) is a Cohen-Macaulay R/Q-module. (e) Assume that R/Q satisfies S2 situation. Then, there is an isomorphism Had ( R) ⊗ R D ( Had ( R)) ∼ = ER/Q ( R/m). Proof. (a) As Had ( R) is an Artinian R-module, then it follows by [F-H, Proposition 6.1] that Had ( R) ⊗ R Had ( R) is of finite length. (b) Since Had ( R) ⊗ R Had ( R) is of finite length so by Hom −⊗-adjointness we have Had ( R) ⊗ R Had ( R) ∼ = D ( D ( Had ( R) ⊗ R Had ( R))) ∼ = D (HomR ( Had ( R), D ( Had ( R))) ∼ = D (HomR ( Had ( R), K R/Q )). As R/Q is a Gorenstein ring of positive dimension then, the later module is zero. To this end note that the last isomorphism follows by Lemma 2.4. (c) It is clear that AnnR ( D ( Had ( R)) ⊗ R D ( Had ( R)) ⊇ AnnR ( D ( Had ( R))) = Q (see 2.4) and dim R ( D ( Had ( R)) ⊗ R D ( Had ( R))) = dimR (Supp( D ( Had ( R)) ⊗ R D ( Had ( R)))) = dimR D ( Had ( R)) = d (see 2.4). (d) It should be noted that for a finite module M which has R-module and R/Q-module structures then, it is clear that depthR M = depthR/Q M. Moreover, by virtue of 2.4 it follows that D ( H d ( R)) ∼ = K R/Q . a In order to prove that 1 implies 2, take into account that if R/Q is a Cohen-Macaulay ring, then D ( Had ( R)) is a Cohen-Macaulay module (see 2.4). Thus by Auslander-Buchsbaum Theorem we deduce that K R/Q is a free R/Q-module. Hence, ToriR/Q ( D ( Had ( R)), D ( Had ( R))) = 0, for all i ≥ 1. 8 EGHBALI Now using [Hu-W, Lemma 2.2] we have depth( D ( Had ( R)) ⊗ R/Q D ( Had ( R))) = d. Thus D ( Had ( R)) ⊗ R/Q D ( Had ( R)) is a Cohen-Macaulay R/Q-module. To show that (2) implies (1), we first use the hypothesis and [Hu-W, Lemma 2.2]. Then we have 2 depth D ( Had ( R)) = depth R/Q + depth( D ( Had ( R)) ⊗ R/Q D ( Had ( R))). (4.1) As pdR/Q (K R/Q ) < ∞, then by Auslander-Buchsbaum Theorem it follows that depth D ( Had ( R)) ≤ depth R/Q. Since D ( Had ( R)) ⊗ R/Q D ( Had ( R)) is a Cohen-Macaulay R/Q-module, then in the light of the equality (4.1) we prove the claim as follows: depth R/Q ≥ depth( D ( Had ( R)) ⊗ R/Q D ( Had ( R))) = dimR/Q ( D ( Had ( R)) ⊗ R/Q D ( Had ( R))) = dim R/Q. (e) As Had ( R) is an Artinian R-module so D ( Had ( R)) is finite. Hence, Had ( R) ⊗ R D ( Had ( R)) ∼ = D (HomR ( Had ( R), Had ( R))) ∼ = D ( R/Q) ∼ = ER/Q ( R/m). To this end note that the first isomorphism follows by Lemma 2.2 and the second one follows by [E-Sch, Theorem 4.2].  Let M and N be nonzero finitely generated modules over a local ring ( R, m). M and N satisfy the depth formula provided that depth M + depth N = depth R + depth( M ⊗ R N ). A necessary condition for the depth formula to hold is that depth M + depth N ≥ depth R (see [Hu-W, pp. 163]). As an application of 3.1 we deduce the following result: Corollary 4.3. Let ( R, m) be a d-dimensional complete local ring. In case d = 3 or 4, then we have depth( D ( Had ( R) ⊗ R D ( Had ( R)) ≥ 4 − depth R. Corollary 4.4. Let ( R, m) be a complete local ring with d ≥ 4. Suppose that pdR/Q (K R/Q ) < ∞ and ToriR/Q ( D ( Had ( R)), D ( Had ( R))) = 0 for all i > 0. Then, (a) depth( D ( Had ( R)) ⊗ R/Q D ( Had ( R))) ≥ 4 − depth R/Q, (b) pdR/Q ( D ( Had ( R)) ⊗ R/Q D ( Had ( R))) ≤ 2 depth R/Q − 4. Proof. By Lemma 2.4 it follows that D ( Had ( R)) ∼ = K R/Q is a finitely generated module. Part (a) is a consequence of 3.1 and [A, Theorem 1.2]. Part (b) follows by (a) and the Auslander-Buchsbaum Theorem.  TOP LOCAL COHOMOLOGY 9 R EFERENCES [A] M. Auslander, Modules over unramified regular local rings, Ill. J. Math. 5 (1961), 631–647. [B] M. H. Bijan-Zadeh, A common generalization of local cohomology theories, Glasgow Math. J. 21, 173–181, (1980). [Br-Sh] M. Brodmann and R.Y. Sharp, Local cohomology: an algebraic introduction with geometric applications, Cambridge Univ. Press, 60, Cambridge, (1998). [Bru-Her] W. Bruns and J. Herzog, Cohen-Macaulay rings, Cambridge Univ. Press, (1993). [E] M. Eghbali, On Artinianness of formal local cohomology, colocalization and coassociated primes. Math. Scand. , to appear. arXiv:1011.4141 [math.AC]. [E-Sch] M. Eghbali and P. Schenzel, On an endomorphism ring of local cohomology , Comm. Alg. 40: 4295–4305, (2012). [F-H] C. Faith and D. Herbera, Endomorphism rings and tensor products of linearly compact modules, Comm. Alg. 25(4), (1997), 1215–1255. [G] A. Grothendieck, Local cohomology, Notes by R. Hartshorne, Lect. Notes in Math. 20, Springer, 1966. [H] M. Hellus, Local Cohomology and Matlis duality, Habilitationsschrift, Leipzig (2006). [H-Sch] M. Hellus and P. Schenzel, On cohomologically complete intersections, J. Algebra 320 (2008) 3733–3748. [H-St] M. Hellus and J. Stückrad, On endomorphism rings of local cohomology modules, Proc. A.M.S Vol. 136(7), (2008), (2333– 2341). [Hu-W] C. Huneke and R. Wiegand, Tensor products of modules, rigidity and local cohomology , Math. Scand. 81 (1997), 161– 183. [R] J. Rotman, An Introduction to Homological Algebra, Academic Press, Orlando, FL, 1979. [Sch1] P. Schenzel, On the use of local cohomology in algebra and geometry, In: J. Elias, J.M. Giral, R.M. Miró-Roig, S. Zarzuela (Eds.), Six Lectures in Commutative Algebra, Proceed. Summer School on Commutative Algebra at Centre de Recerca Matemtica, Progr. Math., Vol. 166, Birkhäuser, 1998, 241-292. [Sch2] P. Schenzel, On formal local cohomology and connectedness, J. Algebra, 315(2), (2007), 894–923. [Sch3] P. Schenzel, On endomorphism rings and dimensions of local cohomology modules , Proc. A.M.S Vol. 137(4), (2009), (1315– 1322). M. E GHBALI , S CHOOL OF M ATHEMATICS , I NSTITUTE B OX : 19395-5746, T EHRAN -I RAN . E-mail address: [email protected] FOR R ESEARCH IN F UNDAMENTAL S CIENCES (IPM), P. O.
0math.AC
What Doubling Tricks Can and Can’t Do for Multi-Armed Bandits Lilian Besson† L ILIAN .B ESSON @C ENTRALE S UPELEC . FR CentraleSupélec (campus of Rennes), IETR, SCEE Team, Avenue de la Boulaie – CS 47601, F-35576 Cesson-Sévigné, France arXiv:1803.06971v1 [stat.ML] 19 Mar 2018 Emilie Kaufmann EMILIE . KAUFMANN @ UNIV - LILLE 1. FR CNRS & Université de Lille, Inria SequeL team UMR 9189 – CRIStAL, F-59000 Lille, France Abstract An online reinforcement learning algorithm is anytime if it does not need to know in advance the horizon T of the experiment. A well-known technique to obtain an anytime algorithm from any nonanytime algorithm is the “Doubling Trick”. In the context of adversarial or stochastic multi-armed bandits, the performance of an algorithm is measured by its regret, and we study two families of sequences of growing horizons (geometric and exponential) to generalize previously known results that certain doubling tricks can be used to conserve certain regret bounds. In a broad setting,√we prove that a geometric doubling trick can be used to conserve (minimax) bounds in RT = O( T ) but cannot conserve (distribution-dependent) bounds in RT = O(log T ). We give insights as to why exponential doubling tricks may be better, as they conserve bounds in RT = O(log T ), and are √ close to conserving bounds in RT = O( T ). Keywords: Multi-Armed Bandits; Anytime Algorithms; Sequential Learning; Doubling Trick. 1. Introduction Multi-Armed Bandit (MAB) problems are well-studied sequential decision making problems in which an agent repeatedly chooses an action (the “arm” of a one-armed bandit) in order to maximize some total reward (Robbins, 1952; Lai and Robbins, 1985). Initial motivation for their study came from the modeling of clinical trials, as early as 1933 with the seminal work of Thompson (1933). In this example, arms correspond to different treatments with unknown, random effect. Since then, MAB models have been proved useful for many more applications, that range from cognitive radio (Jouini et al., 2009) to online content optimization (e.g., news article recommendation (Li et al., 2010), online advertising (Chapelle and Li, 2011), A/B Testing (Kaufmann et al., 2014; Yang et al., 2017)), or portfolio optimization (Sani et al., 2012). While the number of patients involved in a clinical study (and thus the number of treatments to select) is often decided in advance, in other contexts the total number of decisions to make (the horizon T ) is unknown. It may correspond to the total number of visitors of a website optimizing its displays for a certain period of time, or to the number of attempted communications in a smart radio device. In such cases, it is thus crucial to devise anytime algorithms, that is algorithms that do no rely on the knowledge of this horizon T to sequentially select arms. A general way to turn any base algorithm into an anytime algorithm is the use of the so-called Doubling Trick, first proposed by Auer et al. (1995), that consists in repeatedly running the base algorithm with increasing horizons. Motivated by the frequent use of this technique and the absence of a generic study of its effect c 2018 L. Besson & E. Kaufmann. W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS on the algorithm’s efficiency, this paper investigates in details two families of doubling sequences (geometric and exponential), and shows that the former should be avoided for stochastic problems. More formally, a MAB model is a set of K arms, each arm k being associated to a (unknown) reward stream (Yk,t )t∈N . Fix T a finite (possibly unknown) horizon. At each time step t ∈ {1, . . . , T } an agent selects an arm A(t) ∈ {1, . . . , K} and receives as a reward the current value of the associated reward stream, r(t) := YA(t),t . The agent’s decision strategy (or bandit algorithm) AT := (A(t), t ∈ {1, . . . , T }) is such that A(t) can only rely on the past observations A(1), r(1), . . . , A(t−1), r(t−1), on external randomness and (possibly) on the knowledge of the horizon T . The objective of the agent is to find an algorithm A that maximizes the expected cumulated rewards, where the expectation is taken over the possible randomness used by the algorithm and the possible randomness in the generation of the rewards stream. In the oblivious case, in which the reward streams are independent of the algorithm’s choice, this is equivalent to minimizing the regret, defined as " T # X  RT (AT ) := max E Yk,t − YA(t),t . (1) k∈{1,...,K} t=1 This quantity, referred to as pseudo-regret in Bubeck et al. (2012), quantifies the difference between the expected cumulated reward of the best fixed action, and that of the strategy AT . For the general adversarial bandit problem (Auer et al., 2002b), in which the rewards streams are arbitrary (picked by an adversary), a worst-case lower bound has been given. It says that for √ every algorithm, there exists (stochastic) reward streams such that the regret is larger than (1/20)p KT (Auer et al., 2002b). Besides, the EXP3 algorithm has been shown to have a regret of order KT log(K). Much smaller regret may be obtained in stochastic MAB models, in which the reward stream from each arm k is assumed to be i.i.d., from some (unknown) distribution νk , with mean µk . In that case, various algorithms have been proposed with problem-dependent regret upper bounds of the form C(ν) log(T ), where C(ν) is a constant that only depend on the arms distributions. Different assumptions on the arms distributions lead to different problem-dependent constants. In particular, under some parametric assumptions (e.g., Gaussian distributions, exponential families), asymptotically optimal algorithms have been proposed and analyzed (e.g., kl-UCB (Cappé et al., 2013) or Thompson sampling (Agrawal and Goyal, 2012; Kaufmann et al., 2012)), for which the constant C(ν) obtained in the regret upper bound matches exactly that of the lower bound given by Lai and Robbins (1985). Under the non-parametric assumption that the νk are bounded in [0, 1],Pthe regret of the UCB1 algorithm (Auer et al., 2002a) is of the above form with C(ν) = 8 × k:µk >µ∗ (µ∗ − µk )−1 , where µ∗ = maxk µk is the mean of the best arm. Like in this last example, all the available constants C(ν) become very large on “hard” instances, in which some arms are very close √ to the best arm. On such instances, C(ν) log(T ) may be much larger than the worst-case (1/20) KT , and distribution-independent guarantees may actually be preferred. The MOSS algorithm, proposed by Audibert and Bubeck (2009), is the first stochastic bandit algorithm to enjoy a problem-dependent logarithmic regret and to be optimal in a minimax sense, as √ its regret is proved to be upper bounded by KT , for bandit models with rewards in [0, 1]. However the corresponding constant C(ν) is proportional to K/∆min , where ∆min = mink (µ∗ − µk ) is the minimal gap, which worsen the constant of UCB1. Another drawback of MOSS is that it is not anytime. These two shortcoming have been overcame recently in two different works. On the one hand, the MOSS-anytime algorithm (Degenne and Perchet, 2016) is minimax optimal and anytime, but its problem-dependent regret does not improve that of MOSS. On the other hand, the kl-UCB++ 2 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS algorithm (Ménard and Garivier, 2017) is simultaneously minimax optimal and asymptotically optimal (i.e., it has the best problem-dependent constant C(ν)), but it is not anytime. A natural question is thus to know whether a Doubling Trick could overcome this limitation. This question is the starting point of our comprehensive study of the Doubling Trick: can a single Doubling Trick be used to preserve both problem-dependent (logarithmic) regret and minimax (square-root) regret? We answer this question in the negative, by showing that two different types of Doubling Trick may actually be needed. In this paper, we investigate how algorithms enjoying regret guarantees of the generic form   ∀T ≥ 1, RT (AT ) ≤ c T γ (log(T ))δ + o(T γ log(T ))δ (2) may be turned into an anytime algorithm enjoying similar regret guarantees with an appropriate Doubling Trick. This does not come for free, and we exhibit a “price of Doubling Trick”, that is a constant factor larger than 1, referred to as a constant manipulative loss. The rest of the paper is organized as follows. The Doubling Trick is formally defined in Section 2, along with a generic tool for its analysis. In Section 3, we present upper and lower bounds on the regret of algorithms to which a geometric Doubling Trick is applied. Section 4 investigates regret guarantees that can be obtained for a “faster” exponential Doubling Trick. Experimental results are then reported in Section 5. Complementary elements of proofs are deferred to the appendix. 2. Doubling Tricks The Doubling Trick, denoted by DT , is a general procedure to convert a (possibly non-anytime) algorithm into an anytime algorithm. It is formally stated below as Algorithm 1 and depends on a non-decreasing diverging doubling sequence (Ti )i∈N (i.e., Ti → ∞ for i → ∞). DT fully restarts the underlying algorithm A at the beginning of each new sequence (at t = Ti + 1), and run this algorithm on a sequence of length (Ti − Ti−1 ). Input: Bandit algorithm A, and doubling sequence (Ti )i∈N . 1 2 3 4 5 6 7 8 Let i = 0, and initialize algorithm A(0) = AT0 . for t = 1, . . . , T − 1 do if t > Ti then // Next horizon Ti+1 from the sequence Let i = i + 1. Initialize algorithm A(i) = ATi −Ti−1 . // Full restart end Play with A(i) : play arm A0 (t) := A(i) (t − Ti ), observe reward r(t) = YA0 (t),t . end Algorithm 1: The Generic Doubling Trick Algorithm, A0 = DT (A, (Ti )i∈N ). Related work. The Doubling Trick is a well known idea in online learning, that can be traced back to Auer et al. (1995). In the literature, the term Doubling Trick usually refers to the geometric sequence Ti = 2i , in which the horizon is actually doubling, that was popularized by Cesa-Bianchi and Lugosi (2006) in the context of adversarial bandits. Specific doubling tricks have also been used for stochastic bandits, for example in the work of Auer and Ortner (2010), which uses the doubling i sequence Ti = 22 to turn the UCB-R algorithm into an anytime algorithm. 3 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS Elements of regret analysis. For a sequence (Ti )i∈N , with Ti ∈ N for all i, we denote T−1 = 0, and T0 is always taken non-zero, T0 > 0 (i.e., T0 ∈ N∗ ). We only consider non-decreasing and diverging sequences (that is, ∀i, Ti+1 ≥ Ti , and Ti → ∞ for i → ∞). Definition 1 (Last Term LT )  For a non-decreasing diverging sequence (Ti )i∈N and T ∈ N, we can define LT (Ti )i∈N by  ∀T ≥ 1, LT (Ti )i∈N := min {i ∈ N : Ti > T } . (3) It is simply denoted LT when there is no ambiguity (e.g., if the doubling sequence is chosen). DT (A) reinitializes its underlying algorithm A at each time Ti , and in generality the total regret is upper bounded by the regret on each sequence {Ti , . . . , Ti+1 − 1}. By considering the last partial sequence {TLT −1 , . . . , T − 1}, this splitting can be used to get a generic upper bound (UB) by taking into account a larger last sequence (up to TLT − 1). And for stochastic bandit models, the i.i.d. hypothesis on the rewards streams makes the splitting on each sequence an equality, so we can also get the lower bound (LB) by excluding the last partial sequence. Lemma 2 is proved in Appendix A.1. Lemma 2 (Regret Lower and Upper Bounds for DT ) For any bandit model and algorithm A and horizon T , one has the generic upper bound LT X RT (DT (A, (Ti )i∈N )) ≤ RTi −Ti−1 (ATi −Ti−1 ). (LB) i=0 Under a stochastic bandit model, one has furthermore the lower bound LT −1 RT (DT (A, (Ti )i∈N )) ≥ X RTi −Ti−1 (ATi −Ti−1 ). (UB) i=0 As expected, the key to obtain regret guarantees for a Doubling Trick algorithm is to carefully choose the doubling sequence (Ti )i∈N . Empirically, one can verify that sequences with slow growth gives terrible results, and for example using an arithmetic progression typically gives a linear regret. Building on this result, we will prove that if A satisfies a certain regret bound (RT = O(T γ ), O((log T )δ ), or O(T γ (log T )δ )) then an appropriate anytime version of A with a certain doubling trick can conserve the regret bound, with an explicit constant multiplicative loss ` > 1. In this paper, we study in depth two families of sequences: first geometric and then exponential growths. 3. What the Geometric Doubling Trick Can and Can’t Do We define geometric doubling sequences, and prove that they can be used to conserve bounds in   O T γ (log T )δ with γ > 0 but cannot be used to conserve bounds in O (log T )δ . Definition 3 (Geometric Growth) For b ∈ R, b > 1 and T0 ∈ N∗ , the sequence defined by Ti = bT0 bi c is non-decreasing and diverging, and satisfies    T ∀T < T0 , LT = 0, and ∀T ≥ T0 , LT = logb , (4) T0 ∀i > 0, T0 (b − 1)bi−1 − 1 ≤ Ti − Ti−1 ≤ 1 + T0 (b − 1)bi−1 .  Asymptotically for i and T → ∞, Ti = O bi and LT ∼ logb (T ) = O(log T ). 4 (5) W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS 3.1. Conserving a Regret Upper Bound with Geometric Horizons √ A geometric doubling sequence allows to conserve a minimax bound (i.e., RT = O( T )). It was suggested, for instance, in (Cesa-Bianchi and Lugosi, 2006, Ex.2.9). √ We generalize this result in the following theorem, proved in Appendix A.2, by extending it from T bounds to bounds of the form T γ (log T )δ for any 0 < γ < 1 and δ ≥ 0. Note that no distinction is done on the case δ = 0 neither in the expression of the constant loss, nor in the proof. δ Theorem 4 If an algorithm A satisfies RT (AT ) ≤ c T γ (log  T ) + f (T ), for 0 < γ < 1, δ ≥ 0 γ δ and for c > 0, and an increasing function f (t) = o t (log t) (at t → ∞), then the anytime version A0 := DT (A, (Ti )i∈N ) with the geometric sequence (Ti )i∈N of parameters T0 ∈ N∗ , b > 1 (i.e., Ti = bT0 bi c) with the condition T0 (b − 1) > 1 if δ > 0, satisfies, RT (A0 ) ≤ `(γ, δ, T0 , b) c T γ (log T )δ + g(T ),  with a increasing function g(t) = o tγ (log t)δ , and a constant loss `(γ, δ, T0 , b) > 1,  `(γ, δ, T0 , b) := log(T0 (b − 1) + 1) log(T0 (b − 1)) δ × bγ (b − 1)γ . bγ − 1 (6) (7) For a fixed γ and δ, minimizing `(γ, δ, T0 , b) does not always give a unique solution. On the one γ γ hand, if γ & 0.384, there is a unique solution b∗ (γ) > 1 minimizing the b b(b−1) term, solution of γ −1 γ+1 b − 2b + 1 = 0, but without a closed form if γ is unknown. On the other hand, for any γ, the term depending on δ tends quickly to 1 when T0 increases. Practical considerations. Empirically, when γ and δ are fixed and known, there is no need to γ γ minimize ` jointly. It can be minimized separately by first minimizing b b(b−1) γ −1 , that is by solving bγ+1 − 2b + 1 = 0 numerically (e.g., with Newton’s method), and then by taking T0 large enough so that the other term is close enough to 1. √ √ For the usual case of γ = 1/2 and δ = 0 (i.e., bounds in T ), the optimal choice of b is 3+2 5 leading to ` ' 3.33, and the usual choice of b = 2 gives ` ' 3.41 (see Corollary 10 in appendix). Any large enough T0 gives similar performance, and empirically T0  K is preferred, as most algorithms explore each arm once in their first steps (e.g., T0 = 200 for K = 9 for our experiments). 3.2. A Regret Lower Bound with Geometric Horizons We observe that the constant loss in Eq. (7) from the previous Theorem 4 blows up when γ goes to zero, giving the intuition that no geometric doubling trick could be used to preserve a logarithmic bound (i.e., with γ = 0, δ > 0). This is confirmed by the lower bound given below. Theorem 5 For stochastic models, if A satisfies RT (AT ) ≥ c (log T )δ , for c > 0 and δ > 0, then the anytime version A0 := DT (A, (Ti )i∈N ) with the geometric sequence (Ti )i∈N of parameters T0 ∈ N∗ , b > 1 (i.e., Ti = bT0 bi c) satisfies this lower bound for a certain constant c0 > 0, ∀T ≥ 1, LT ≥ 2 =⇒ RT (A0 ) ≥ c0 (log T )δ+1 . (8) This implies that RT (A0 ) = Ω((log T )δ+1 ), which proves that a geometric sequence cannot be used to conserve a logarithmic regret bound. 5 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS Theorem 5 implies that a geometric sequence cannot be used to conserve a finite-horizon lower bound like RT (AT ) ≥ c log(T ). A complementary lower bound, stated as Theorem 11 in √ Appendix B, shows that if the regret is lower bounded at finite horizon by RT (AT ) ≥ c T , then a comparable lower bound for the Doubling Trick algorithm DT (A), possibly with a larger constant. This special case (δ = 1) is indeed the most interesting, as in the stochastic case the regret of any uniformly efficient algorithm is at least logarithmic (Lai and Robbins (1985)), and efficient algorithm with logarithmic regret have been exhibited. If RT (AT )/log T is bounded, then using a geometric sequence in the doubling trick algorithm is a bad idea as it guarantees a blow up in the regret, that is RT (DT (A, (Ti )i∈N )) = Ω((log T )2 ). This result is the reason we need to consider successive horizons growing faster than a geometric sequence (i.e., such that log(Ti )  i), like the exponential sequence, which is studied in Section 4. 3.3. Proof of Theorem 5 Let A0 := DT (A, (Ti )i∈N ) and consider a fixed stochastic bandit problem. The lower bound (LB) from Lemma 2 gives 0 RT (A ) ≥ LX T −1 RTi −Ti−1 (AT =Ti −Ti−1 ) i=0 We bound Ti − Ti−1 ≥ T0 (b − 1)bi−1 − 1 for any i > 0, thanks to Definition 3, and we can use the hypothesis on A for each regret term. ≥ LX T −1 δ c(log(Ti − Ti−1 )) ≥ c i=0 LX T −2 =c LX T −1 δ log T0 (b − 1)bi−1 − 1 i=1 log T0 (b − 1)bi − 1 δ (with i := i − 1) i=0 Let xi := T0 (b − 1)bi > 0. If we have T0 (b − 1) > 1 (see below (♣) in Page 7 for a discussion on 0 (b−1)−1) the other case), then Lemma 15 (Eq. (26)) gives log(xi − 1) ≥ log(T log(T0 (b−1)) log(xi ) as xi > 1. For lower bounds, there is no need to handle the constants tightly, and we have xi ≥ bi by hypothesis, so  δ 0 (b−1)−1) let call this constant c0 = c log(T > 0, and thus it simplifies to log(T0 (b−1)) ≥ c0 LX T −2 δ log(bi ) i=0 δ P T −2 A sum-integral minoration for the increasing function t 7→ tδ (as δ > 0) gives L log(bi ) = i=0 R δ P T −2 δ δ LT −2 tδ dt = (log b) (L − 2)δ+1 (if L ≥ 2), and so (log b)δ L T T i=1 i ≥ (log b) 0 δ+1 RT (A0 ) ≥ c0 (log b)δ (LT − 2)δ+1 δ+1 6 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS For the geometric sequence, we know that LT ≥ logb  T T0  ≥ logb (T ), and logb (T ) − 2 ∼ logb (T ) c00 at T → ∞ so there exists a constant 0 < < 1 such that LT − 2 ≥ c00 logb (T ) for T large enough 2 (≥ b−1 ), and such that LT ≥ 2. And thus we just proved that there is a constant c000 > 0 such that RT (A0 ) ≥ c000 (log T )δ+1 =: g(T ).  So this proves that for T large enough, RT (A0 ) ≥ g(T ) with g(T ) = O (log T )δ+1 , and so RT (A0 ) = Ω((log T )δ+1 ), which also implies that RT (A0 ) cannot be a O (log T )δ . (♣) If we do not have the hypothesis T0 (b − 1) > 1, the same proof could be done, by observing 1 that from i ≥ i0 large enough, we have xi ≥ bi−i0 (as soon as bi0 ≥ T0 (b−1) > 0, i.e., i0 ≥ d− logb (T0 (b − 1))e ≥ 1), and so the same arguments can be used, to obtain a sum from i = i0 + 1 instead of from i = 1. For a fixed i0 , we also have LT − 2 − i0 ≥ c00 log(T ) for a (small enough) constant c00 , and thus we obtain the same result.  4. What Can the Exponential Doubling Trick Do? We define exponential doubling sequences, and prove that they can be used to conserve bounds in  δ O (log T ) , unlike the previously studied geometric sequences. Furthermore, we provide elements  showing that they may also conserve bounds in O(T γ ) or O T γ (log T )δ . Definition 6 (Exponential Growth) For a, b ∈ R, a, b > 1 and T0 ∈ N∗ , if τ := Ta0 ∈ R, ≥ 0, i then the sequence defined by Ti := bτ ab c is non-decreasing and diverging, and satisfies     T . (9) ∀T < T0 , LT = 0, and ∀T ≥ T0 , LT = logb loga τ  i Asymptotically for i and T → ∞, Ti = O ab and LT ∼ logb (loga ( Tτ )) = O(log log T ). 4.1. Conserving a Regret Upper Bound with Exponential Horizons An exponential doubling sequence allows to conserve a problem-dependent bound on regret (i.e., RT = O(log T )). This was already used in particular cases by Auer and Ortner (2010) and more recently by Liau et al. (2018). We generalize this result in the following theorem. Theorem 7 If an algorithm A satisfies RT (AT ) ≤ c T γ (log T )δ + f (T ), for 0 ≤ γ < 1, δ ≥ 0,  and for c > 0, and an increasing function f (t) = o tγ (log t)δ (at t → ∞), then the anytime version A0 := DT (A, (Ti )i∈N ) with the exponential sequence (Ti )i∈N of parameters T0 ∈ N∗ , a, b > 1 (i.e., i Ti = b Ta0 ab c), satisfies the following inequality,  γ RT (A0 ) ≤ `(γ, δ, T0 , a, b) c T b (log T )δ + g(T ). (10)  with an increasing function g(t) = o (tb )γ (log t)δ , and a constant loss `(γ, δ, T0 , a, b) > 0,    a (b−1)γ b2δ > 0 if δ > 0 T0 bδ −1 `(γ, δ, T0 , a, b) := (11) 1 1 + > 1 if δ = 0 (log(a))(log(bγ )) 7 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS This result first shows that an exponential doubling trick can preserve a logarithmic regret bound (O(log(T )), which corresponds to γ = 0 and δ = 1), with a multiplicative  constant loss ` ≥ 4. It can γ δ further be applied to bounds of the generic form RT = O T (log T ) , but with a significant loss as T γ becomes T bγ , additionally to the constant multiplicative loss ` > 0. However, it is important to notice that for γ > 0, the constant ` can be made arbitrarily small (with a large enough first step T0 ). This observation is encouraging, and let the authors think that a tighter upper bound could be proved. Remark 8 An interesting particular case of Theorem 7 is the following (γ = 0, δ = 1 and f (t) = 0). i RT (AT ) ≤ c log(T ) =⇒ RT (DT (A, (bT0b c)i∈N )) ≤ b2 c log(T ). b−1 (12) In this upper bound, the optimal choice of b is b = 2, which yields a constant multiplicative loss of `(γ = 0, b) = 4. It can be observed that this loss is twice smaller as the loss of 8.0625 obtained by (Auer and Ortner, 2010, Sec.4)1 . 4.2. A Regret Lower Bound with Exponential Horizons Assuming the upper bound of Theorem 7 obtained for γ > 0 are tight would lead√to think that exponential doubling tricks cannot preserve minimax regret bounds of the form O( T )). If true, such a conjecture would need to be supported by a lower bound (a counterpart of Theorem 5). Theorem 9 provides such a lower bound, but as discussed below, combined with Theorem 7, this result rather advocates the use of exponential doubling tricks. Theorem 9 is proved in Appendix A.3. Theorem 9 For stochastic models, if A satisfies RT (AT ) ≥ c T γ , for c > 0 and 0 < γ ≤ 1, then the anytime version A0 := DT (A, (Ti )i∈N ) with the exponential sequence (Ti )i∈N of parameters i T0 ∈ N∗ , a > 1, b > 1 (i.e., Ti = b Ta0 ab c), satisfies this lower bound for a certain constant c0 > 0, ∀T ≥ 1, RT (A0 ) ≥ c0  1 Tb γ . (13) We already saw that any exponential doubling trick can conserve logarithmic problem-dependent regret bounds. If we could take b → 1 in the two previous Theorems 7 and 9, both results would match and prove that there exists an exponential doubling trick that can also be used to conserve minimax regret bounds. This argument is not so easy to formulate, as b cannot depend on T , but it supports our belief that exponential doubling tricks are good candidates for (asymptotically) preserving both problem-dependent and minimax regret bounds. 4.3. Proof of Theorem 7 Let A0 := DT (A, (Ti )i∈N ), and consider a fixed bandit problem. We first consider the harder case of δ > 0, see below in Page 10 in (♠) for the other case. The lower bound (LB) from Lemma 2 gives RT (A0 ) ≤ LT X RTi −Ti−1 (AT =Ti −Ti−1 ) i=0 1. In Auer and Ortner (2010), the authors obtained a loss of 258/32 = 8.0625 ≥ 8, as the ratio between the constants for the log(T ) terms, respectively 258 in Th.4.1 and 32 in Th.3.1. 8 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS i We bound naively2 Ti − Ti−1 ≤ Ti ≤ Ta0 ab , and we can use the hypothesis on A for each regret term, as f and t 7→ ctγ (log t)δ are non-decreasing for t ≥ 1 (by hypothesis for f and by Lemma 16). ≤ LT X f (Ti ) + c LT X i=0 γ δ (Ti ) (log (Ti )) ≤ g1 (T ) + c i=0 LT  X T0 i=0 γ   δ T0 bi log a a a a bi PLT The first part is denoted g1 (T ) := i=0 f (Ti ) and is dealt with Lemma 17: the sum of f (Ti ) is P  γ LT δ γ δ by hypothesis, and this sum of T γ (log(T ))δ is ao i i=0 Ti (log(Ti )) , as f (t) = o t (log t) i  bγ δ bγ δ proved below to be bounded by T (log(T )) . So g1 (T ) = o T (log T ) . The second part is γ PLT  bi γ   T bi δ c Ta0 . Define log+ (x) := max(log(x), 0) ≥ 0, so whether Ta0 ≤ 1 log a0 a i=0 a  i    i or > 1, we always have log Ta0 ab ≤ log+ Ta0 +log ab . Then we can use Lemma 14 (Eq. (23))   δ δ δ i + (log(a))δ bi to distribute the power on δ (as it is < 1). So log Ta0 ab ≤ log+ Ta0 with the convention that 0δ = 0 (even if δ = 0), and so this gives #  γ "  δ X LT LT X  T0 δ + T0 bi γ bi γ i δ ≤ g1 (T ) + c log (a ) + (log(a)) (a ) b a a i=0 i=0 If γ = 0 then  the first sum is just LT + 1 = O(log(log(T ))) which can be included in g1 (T ) = o (log T )δ (still increasing), and so only the second sum has to be bounded, and a geometric P T i δ δ sum gives L ≤ bδb−1 (bLT )δ . But if γ > 0, we can naively bound the first sum by i=0 b  PLT bi γ bLT )γ Observe that abLT = (abLT −1 )b ≤ (a T )b . So abLT = O T b i=0 (a ) ≤ (LT + 1)(a T0  and LT + 1 = O(log(log(T ))), thus the first sum is a O T bγ log(log(T )) = o T bγ (logT )δ (as δ > 0). In both cases, the first sum can be included in g2 (T ) which is still a o T bγ (log T )δ Another P T b i γ i δ P T i δ δ L geometric sum bounds the second sum by L b ≤ (ab T )γ L ≤ bδb−1 (bLT )δ . i=0 (a ) i=0 b ≤ g1 (T ) + c1 (ab LT )γ (bLT )δ  T0 γ bδ a bδ −1 We identify a constant multiplicative loss c1 := c depends on LT is (ab LT (log a)δ > 0. The only term left which )γ (bLT )δ , and it can be bounded by using bLT = bbLT −1 ≤ b loga (a TT0 ) = L T b T ≤ (a T )b . The constant part of b + b log+ a ( T0 ) ≤ b + b loga (T ) (as T ≥ 1), and again with a T0  bLT also gives a O T bγ term, that can be included in g(T ) := g2 (T ) + (a TT0 )bγ which is still a  o T bγ (log T )δ , and is still increasing as sum of increasing functions. So we can focus on the last term, and we obtain #γ  δ " b b a b ≤ g(T ) + c1 T (log T )δ log(a) T0   =⇒ RT (A0 ) ≤ g(T ) + `(γ, δ, T0 , a, b) cT bγ (log T )δ with an increasing g(t) = o tbγ (log t)δ . i−1 i−1 2. Here, using the more subtle bound Ti − Ti ≤ Ta0 ab (αb ) + 1, with α = ab−1 , from Definition 6, does not seem to help as it becomes too complicated to handle clearly in the log terms. 9 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS So the constant multiplicative loss ` depends on γ and δ as well as on T0 , a and b and is  (b−1)γ b2δ a × δ `(γ, δ, T0 , a, b) := > 0, if δ > 0. T0 b −1 (14) If T0 = a, the loss `(γ, δ, T0 , a, b) is minimal at b∗ (δ) = 21/δ > 1 and for a minimal value of minb>1 `(γ, δ, T0 , a, b) = 4 (for any δ and γ). Finally, the a/T0 part tends to 0 if T0 → ∞ so the loss can be made as small as we want, simply by choosing a T0 large enough (but constant w.r.t. T ). (♠) Now for the other case of δ = 0, we can start similarly, but instead of bounding naively PLT bi γ PLT bi γ bLT )γ we use Lemma 13 to get a more subtle bound: i=0 (a ) by (LT + 1)(a i=0 (a ) ≤ LT γ 1 γ b a + (1 + (log(a))(log(bγ )) )(a ) . The constant term gets included in g(T ), and for the non-constant LT part, (ab )γ is handled similarly. Finally we obtain the loss `(γ, 0, T0 , a, b) := 1 + 1 > 1. (log(a))(log(bγ )) (15)  5. Numerical Experiments We illustrate here the practical cost of using Doubling Trick, for two interesting non-anytime algorithms that have recently been proposed in the literature: Approximated Finite-Horizon Gittins indexes, that we refer to as AFHG, by Lattimore (2016) (for Gaussian bandits with known variance) and kl-UCB++ by Ménard and Garivier (2017) (for Bernoulli bandits). We first provide some details on these two algorithms, and then illustrate the behavior of Doubling Tricks applied to these algorithms with different doubling sequences. 5.1. Two Index-Based Algorithms P We denotePby Xk (t) := s<t YA(s),s 1(A(s) = k) the accumulated rewards from arm k, and Nk (t) := s<t 1(A(s) = k) the number of times arm k was sampled. Both algorithms A assume to know the horizon T . They compute an index IkA (t) ∈ R for each arm k ∈ {1, . . . , K} at each time step t ∈ {1, . . . , T }, and use the indexes to choose the arm with highest index, i.e., A(t) := arg maxk∈{1,...,K} Ik (t) (ties are broken uniformly at random). • The algorithm AFHG can be applied for Gaussian bandits with variance V (= 1 for our experiments). Let m(T, t) = T − t + 1 ≥ 1, and let v   u u Xk (t) u V m(T, t)   . IkAFHG (t) := +t log  (16) Nk (t) Nk (t) N (t) log1/2 m(T,t) k Nk (t) • The algorithm kl-UCB++ can be applied for bounded rewards in [0, 1], and in particular for Bernoulli bandits. The binary Kullback-Leibler divergence is kl(x, y) := x log(x/y) + (1 − + x) log((1 − x)/(1 − y)) (for  0 < x, y < 1), andletlog (x) := max(0, log(x)) ≥ 0. Let the 2 T T function g(n, T ) := log+ Kn (1 + log+ ( Kn ) ) for n ≤ T , and finally let     Xk (t) g(Nk (t), T ) kl-UCB++ Ik (t) := sup q : kl ,q ≤ . (17) Nk (t) Nk (t) q∈[0,1] 10 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS 5.2. Experiments We present some results from numerical experiments on Bernoulli and Gaussian bandits. More results are presented in Appendix E. We present in pages 12 and 13 results for K = 9 arms and horizon T = 45678 (to ensure that no choice of sequence were lucky and had TLT −1 = T or too close to it). We ran n = 1000 repetitions of the random experiment, either on the same “easy” bandit problem µ (with evenly spaced means), or on n different random instances µ sampled uniformly in [0, 1]K , and we plot theP average regret on n simulations. The black line without markers is the (asymptotic) lower bound in k6=k∗ (kl(µk , µ∗ ))−1 log T , from Lai and Robbins (1985). We consider kl-UCB++ for Bernoulli bandits (Figures 2, 3) or AFHG for Gaussian bandits (Figures 4, 5), Each doubling trick algorithm uses the same T0 = 200 as a first guess for the horizon. We include both the non-anytime version that knows the horizon T , and different anytime versions to compare the choice of doubling trick. To compare against an algorithm that does not need the horizon, we also include kl-UCB (Cappé et al., 2013) as a baseline for Bernoulli bandits and for Gaussian bandits (in the Gaussian version, the divergence used is kl(x, y) = (x − y)2 /2, and the algorithm is referred to as UCB). We consider are a geometric doubling sequence with b = 2, and two different exponential doubling sequences: the “classical” b = 2 and a “slower” one with b = 1.1. Both use a = T0 = 200, and the last one is using a = 2, b = 2. Despite what was proved theoretically in Theorem 7, using a = T0 and a large enough T0 improves regarding to using a = 2 and a leading (T0 /a) factor. Another version of the Doubling Trick with “no restart”, denoted DT no-restart , is presented in Appendix C, but it is only an heuristic and cannot be applied to any algorithm A. Algorithm 2 can be applied to kl-UCB++ or AFHG for instance, as they use T just as a numerical parameter (see Eqs. 16 and 17), but its first limitation is that it cannot be applied to DMED+ (Honda and Takemura, 2010) or EXP3++ (Seldin and Lugosi, 2017), or any algorithms based on arm eliminations, for example. A second limitation is the difficulty to analyze this “no restart” variant, due to the unpredictable effect on regret of giving non-uniform prior information to the underlying algorithm A on each successive sequence. An interesting future work would be to analyze it, either in general or for a specific algorithm like kl-UCB++ . Despite its limitations, this heuristic exhibits as expected better empirical performance than DT , as can be observed in Appendix E. 6. Conclusion We formalized and studied the well-known “Doubling Trick” for generic multi-armed bandit problems, that is used to automatically obtain an anytime algorithm from any non-anytime algorithm. Our results are summarized in √ Table 1. We show that a geometric doubling can be used to conserve minimax regret bounds (in T ), with a constant loss (typically ≥ 3.33), but cannot be used to conserve problem-dependent bounds (in log T ), for which a faster doubling sequence is needed. An exponential doubling sequence can conserve logarithmic regret bounds also with a constant loss, but it is still an open question to know if minimax bounds can be obtained for this faster growing sequence. Partial results of both a lower and an upper bound, for bounds of the generic form T γ (log T )δ , let use believe in a positive answer. It is still an open problem to know if an anytime algorithm can be both asymptotically optimal for the problem-dependent regret (i.e., with the exact constant) and optimal in a minimax regret √ (i.e., have a KT regret), but we believe that using a doubling trick on non-anytime algorithms like kl-UCB++ cannot be the solution. We showed that it cannot work with a geometric doubling sequence, and conjecture that exponential doubling trick would never bring the right constant either. 11 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS i Bound \ Doubling Geometric, Ti = bT0 bi c Exponential, Ti = b Ta0 ab c (log T )δ × Known to fail RT (DT ) ≥ c0 (log T )1+δ if RT (AT ) ≥ c(log T )δ . (Theorem 5) X Known to work, with loss 2δ `(δ, b) = bbδ −1 > 1. (Theorem 7) Tγ X Known toγ work,γ with loss `(γ, b) = b b(b−1) > 1. γ −1 (Theorem 4) T γ (log T )δ for both γ > 0, δ > 0 X Known to work, with loss `(γ, δ, T0 , b) =  δ γ log(T0 (b−1)+1) b (b−1)γ bγ −1 > 1. log(T0 (b−1)) (Theorem 4 ) ? Partial, best known bound is 1 c00 (T b )γ ≤ RT (DT ≤ `c(T b )γ with a loss ` > 1, if c0 T γ ≤ RT (AT ) ≤ cT γ . (Theorems 7, 9) ? Partial, best known bound is RT (DT ) ≤ `c(T b )γ if RT (AT ) ≤ cT γ , with a loss ` → 0 for T0 → ∞. (Theorem 7) Figure 1: Summary of known positive X and negative × and partial results ?. Cumulated regrets for different bandit algorithms, averaged 1000 times 9 arms: Bayesian MAB, Bernoulli with means on [0, 1] 400 Cumulated regret Rt = tµ ∗ − s=0 k=1 9 t−1 X X µk 1000 [Tk (s)] 500 KLUCB KLUCB+ + (T = 45678) DT(Ti = 200 × 2i )[KLUCB+ + ] DT(Ti = 2002i )[KLUCB+ + ] DT(Ti = 2001.1i )[KLUCB+ + ] DT(Ti = (200/2)22i )[KLUCB+ + ] Lai & Robbins lower bound = 3.74 log(t) 300 200 100 0 0 10000 20000 30000 Time steps t = 0. . . T − 1, horizon T = 45678 40000 Figure 2: Regret for DT , for K = 9 Bernoulli arms, horizon T = 45678, n = 1000 repetitions and µ taken uniformly in [0, 1]K . Geometric doubling (b = 2) and slow exponential doubling (b = 1.1) are too slow, and short first sequences make the regret blow up in the beginning of the experiment. At t = 40000 we see clearly the effect of a new sequence for the best doubling trick (Ti = 200 × 2i ). As expected, kl-UCB++ outperforms kl-UCB, and if the doubling sequence is growing fast enough then DT (kl-UCB++ ) can perform as well as kl-UCB++ (see for t < 40000). 12 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS Cumulated regrets for different bandit algorithms, averaged 1000 times 9 arms: [B(0.1), B(0.2), B(0.3), B(0.4), B(0.5), B(0.6), B(0.7), B(0.8), B(0.9) ∗ ] 400 300 Cumulated regret Rt = tµ ∗ − s=0 k=1 9 t−1 X X µk 1000 [Tk (s)] 350 KLUCB KLUCB+ + (T = 45678) DT(Ti = 200 × 2i )[KLUCB+ + ] DT(Ti = 2002i )[KLUCB+ + ] DT(Ti = 2001.1i )[KLUCB+ + ] DT(Ti = (200/2)22i )[KLUCB+ + ] Lai & Robbins lower bound = 7.52 log(t) 250 200 150 100 50 0 0 10000 20000 30000 Time steps t = 0. . . T − 1, horizon T = 45678 40000 Figure 3: Similarly but for µ evenly spaced in [0, 1]K ({0.1, . . . , 0.9}). Both kl-UCB and kl-UCB++ are very efficient on “easy” problems like this one, and we can check visually that they match the lower bound from Lai and Robbins (1985). As before we check that slow doubling are too slow to give reasonable performance. Cumulated regrets for different bandit algorithms, averaged 1000 times 9 arms: Bayesian MAB, Gaussian with uniform means on [−5, 5] 2000 Cumulated regret Rt = tµ ∗ − s=0 k=1 9 t−1 X X µk 1000 [Tk (s)] 2500 UCB ApprFHG(T = 45678) DT(Ti = 200 × 2i )[ApprFHG] DT(Ti = 2002i )[ApprFHG] DT(Ti = 2001.1i )[ApprFHG] DT(Ti = (200/2)22i )[ApprFHG] Lai & Robbins lower bound = 4.06 log(t) 1500 1000 500 0 0 10000 20000 30000 Time steps t = 0. . . T − 1, horizon T = 45678 40000 Figure 4: Regret for K = 9 Gaussian arms N (µ, 1), horizon T = 45678, n = 1000 repetitions and µ taken uniformly in [−5, 5]K and variance V = 1. On “hard” problems like this one, both UCB and AFHG perform similarly and poorly w.r.t. to the lower bound from Lai and Robbins (1985). As before we check that geometric doubling (b = 2) and slow exponential doubling (b = 1.1) are too slow, but a fast enough doubling sequence does give reasonable performance for the anytime AFHG obtained by Doubling Trick. 13 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS Acknowledgments This work is supported by the French National Research Agency (ANR), under the project BADASS (grant coded: N ANR-16-CE40-0002), by the French Ministry of Higher Education and Research (MENESR) and ENS Paris-Saclay. References S. Agrawal and N. Goyal. Analysis of Thompson sampling for the Multi-Armed Bandit problem. In Conference On Learning Theory. PMLR, 2012. J-Y. Audibert and S. Bubeck. Minimax policies for adversarial and stochastic bandits. In Conference on Learning Theory, pages 217–226. PMLR, 2009. P. Auer and R. Ortner. UCB Revisited: Improved Regret Bounds For The Stochastic Multi-Armed Bandit Problem. Periodica Mathematica Hungarica, 61(1-2):55–65, 2010. P. Auer, N. Cesa-Bianchi, Y. Freund, and R. Schapire. Gambling in a Rigged Casino: The Adversarial Multi-Armed Bandit Problem. In Annual Symposium on Foundations of Computer Science, pages 322–331. IEEE, 1995. P. Auer, N. Cesa-Bianchi, and P. Fischer. Finite-time Analysis of the Multi-armed Bandit Problem. Machine Learning, 47(2):235–256, 2002a. P. Auer, N. Cesa-Bianchi, Y. Freund, and R. Schapire. The Nonstochastic Multiarmed Bandit Problem. SIAM journal on computing, 32(1):48–77, 2002b. S. Bubeck, N. Cesa-Bianchi, et al. Regret Analysis of Stochastic and Non-Stochastic Multi-Armed Bandit Problems. Foundations and Trends R in Machine Learning, 5(1), 2012. O. Cappé, A. Garivier, O-A. Maillard, R. Munos, and G. Stoltz. Kullback-Leibler upper confidence bounds for optimal sequential allocation. Annals of Statistics, 41(3):1516–1541, 2013. N. Cesa-Bianchi and G. Lugosi. Prediction, Learning, and Games. Cambridge University Press, 2006. O. Chapelle and L. Li. An Empirical Evaluation of Thompson Sampling. In Advances in Neural Information Processing Systems, pages 2249–2257. Curran Associates, Inc., 2011. R. Degenne and V. Perchet. Anytime Optimal Algorithms In Stochastic Multi Armed Bandits. In International Conference on Machine Learning, pages 1587–1595, 2016. A. Garivier, E. Kaufmann, and T. Lattimore. On Explore-Then-Commit Strategies. volume 29 of Advances in Neural Information Processing Systems (NIPS), Barcelona, Spain, 2016. J. Honda and A. Takemura. An Asymptotically Optimal Bandit Algorithm for Bounded Support Models. In Conference on Learning Theory, pages 67–79. PMLR, 2010. W. Jouini, D. Ernst, C. Moy, and J. Palicot. Multi-Armed Bandit Based Policies for Cognitive Radio’s Decision Making Issues. In International Conference Signals, Circuits and Systems. IEEE, 2009. 14 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS E. Kaufmann, N. Korda, and R. Munos. Thompson Sampling: an Asymptotically Optimal Finite-Time Analysis, pages 199–213. PMLR, 2012. E. Kaufmann, O. Cappé, and A. Garivier. On the Complexity of A/B Testing. In Conference on Learning Theory, pages 461–481. PMLR, 2014. T. L. Lai and H. Robbins. Asymptotically Efficient Adaptive Allocation Rules. Advances in Applied Mathematics, 6(1):4–22, 1985. T. Lattimore. Regret Analysis Of The Finite Horizon Gittins Index Strategy For Multi Armed Bandits. In Conference on Learning Theory, pages 1214–1245. PMLR, 2016. L. Li, W. Chu, J. Langford, and R. E. Schapire. A Contextual-Bandit Approach to Personalized News Article Recommendation. In International Conference on World Wide Web, pages 661–670. ACM, 2010. D. Liau, E. Price, Z. Song, and G. Yang. Stochastic Multi-Armed Bandits in Constant Space. In International Conference on Artificial Intelligence and Statistics, 2018. P. Ménard and A. Garivier. A Minimax and Asymptotically Optimal Algorithm for Stochastic Bandits. In Algorithmic Learning Theory, volume 76, pages 223–237. PMLR, 2017. H. Robbins. Some Aspects of the Sequential Design of Experiments. Bulletin of the American Mathematical Society, 58(5):527–535, 1952. A. Sani, A. Lazaric, and R. Munos. Risk-Aversion In Multi-Armed Bandits. In Advances in Neural Information Processing Systems, pages 3275–3283, 2012. Y. Seldin and G. Lugosi. An Improved Parametrization and Analysis of the EXP3++ Algorithm for Stochastic and Adversarial Bandits. In Conference on Learning Theory, volume 65, pages 1–17. PMLR, 2017. W. R. Thompson. On the Likelihood that One Unknown Probability Exceeds Another in View of the Evidence of Two Samples. Biometrika, 25, 1933. F. Yang, A. Ramdas, K. Jamieson, and M. Wainwright. A framework for Multi-A(rmed)/B(andit) Testing with Online FDR Control. In Advances in Neural Information Processing Systems, pages 5957–5966. Curran Associates, Inc., 2017. Note: the simulation code used for the experiments is using Python 3. It is open-sourced at https://GitHub.com/SMPyBandits/SMPyBandits and fully documented at https://SMPyBandits.GitHub.io. 15 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS Appendix A. Omitted Proofs We include here the proofs omitted in the main document. A.1. Proof of Lemma 2, “Regret Lower and Upper Bounds for DT ” Let A0 denote DT (A, (Ti )i∈N ). For every k ∈ {1, . . . , K},    " T # L −1  T T T i X X X X E (Xk,t − XA(t),t ) = E (Xk,t − XA(t),t ) + E  (Xk,t − XA(t),t ) t=1 ≤ i=0 LX T −1 i=0 ≤ LX T −1  max k∈{1,...,K} t=Ti−1 Ti X E t=TLT −1   (Xk,t − XA(t),t ) + t=Ti−1 max k∈{1,...,K} E T X  (Xk,t − XA(t),t ) t=TLT −1   RTi −Ti−1 A0 + RT −TLT −1 A0 . i=0 Thus, by definition of the regret 0 RT (A ) ≤ = LX T −1 i=0 LX T −1 i=0 RTi −Ti−1 (A0 ) + RT −TLT −1 (A0 )    RTi −Ti−1 ATi −Ti−1 + R T − TL −1 ATLT −TLT −1 | {z T } ≤TL ≤ LT X T −TL −1 T  RTi −Ti−1 ATi −Ti−1 . i=0 In the stochastic case, it is well known that the regret can be rewritten in the following way, introducing µk the mean of arm k and µ∗ the mean of the best arm: " T # X 0 ∗ RT (A ) = E (µ − µA(t) ) t=1 LT −1 = X i=0 = LX T −1 i=0  E Ti X   (µ∗ − µA(t) ) + E  t=Ti−1 T X  (µ∗ − µA(t) ) t=TLT −1  RTi −Ti−1 ATi −Ti−1 ) + RT −TLT −1 (A0 ) . | {z } ≥0  and the lower bound follows. 16 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS A.2. Proof of Theorem 4, “Conserving a Regret Upper Bound with Geometric Horizons” It is interesting to note that the proof is valid for both the easiest case when δ = 0 (as it was known in Cesa-Bianchi and Lugosi (2006) for γ = 1/2) and the generic case when δ ≥ 0, with no distinction. As far as the authors know, this result in its generality with δ ≥ 0 is new. Proof Let A0 := DT (A, (Ti )i∈N ), and consider a fixed bandit problem. The upper bound (UB) from Lemma 2 gives 0 RT (A ) ≤ LT X RTi −Ti−1 (AT =Ti −Ti−1 ) i=0 We can use the hypothesis on A for each regret term, as f and t 7→ ctγ (log t)δ are non-decreasing for t ≥ 1 (by hypothesis for f and by Lemma 16). ≤ LT X f (Ti − Ti−1 ) + cT0γ (log T0 )δ i=0 +c LT X (Ti − Ti−1 )γ (log (Ti − Ti−1 ))δ i=1 The first part is denoted g1 (T ) := i=0 f (Ti − Ti−1 ) + cT0γ (log T0 )δ , it is an increasing function as a sum Pof increasing functions, and it is dealt  with by using Lemma17: the sum of f (Ti − Ti−1 ) LT γ δ γ δ by hypothesis, and this sum is a o i=0 (Ti − Ti−1 ) (log(Ti − Ti−1 )) , as f (t) = o t (log t) PLT of (Ti − Ti−1 )γ (log(Ti − Ti−1 ))δ is proved below to be bounded by c0 T γ (log(T ))δ for a certain  constant c0 > 0, which gives g1 (T ) = o T γ (log T )δ . For the second part, we bound Ti − Ti−1 ≤ T0 (b − 1)bi−1 + 1 thanks to Definition 3. Moreover, as γ < 1 we can use Lemma 14 (Eq. (23)) to distribute the power on γ, so (T0 (b − 1)bi−1 + 1)γ ≤ (T0 (b − 1)bi−1 )γ + 1(γ 6= 0) (indeed if γ = 0 both sides are equal to 1). This gives ≤ g1 (T ) + c(T0 (b − 1))γ LT LT X X (bi−1 )γ (log(Ti − Ti−1 ))δ + c1(γ 6= 0) (log(Ti − Ti−1 ))δ i=1 i=1 P T PLT δ δ δ δ If γ = 6 0, thelast sum is bounded by L i (log Ti ) ≤ (log T0 ) (LT + 1) + (log b) i i which   δ+1 δ+1 γ δ is a O LT = O (log T ) = o T (log T ) (as γ > 0, thanks to a geometric sum), and  so it can be included in g2 (T ) = o T γ (log T )δ . If γ = 0, there is only the first sum. We bound again Ti − Ti−1 ≤ T0 (b − 1)bi−1 + 1 and use Lemma 15 to bound log(T0 (b − 1)bi−1 + 1) by log(T0 (b−1)+1) i−1 ) term (as T (b − 1) > 1 by hypothesis). 0 log(T0 (b−1)) log(T0 (b − 1)b  δ LT X log(T0 (b − 1) + 1) i−1 i−1 γ ≤ g2 (T ) + c(T0 (b − 1)) (b ) log(T0 (b − 1)b ) log(T0 (b − 1)) γ i=1 i−1 We split the  log(T0 (b − 1)b ) term in two, and once again, the termγwith log(T  0 (b − 1)) gives a L −1 O b T (by a geometric sum), which gets included in g3 (T ) = o T (log T )δ . We focus on the fastest term, and we can now rewrite the sum from i = 0 to LT − 1,   LT −1 log(T0 (b − 1) + 1) δ X ≤ g2 (T ) + c(T0 (b − 1)) log(b) (bi )γ iδ log(T0 (b − 1)) γ i=0 17 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS We naively bound iδ by (LT − 1)δ , and use a geometric sum to have γ ≤ g2 (T ) + c(T0 (b − 1))  log(T0 (b − 1) + 1) log(b) log(T0 (b − 1)) δ (LT − 1)δ bγ (bLT −1 )γ bγ − 1 Finally, observe that LT − 1 ≤ logb ( TT0 ) ≤ logb (T ), so the (log b)δ term simplifies, and observe that bLT −1 ≤ TT0 so the T0γ term also simplifies. Thus we get  ≤ g2 (T ) + c  log(T0 (b − 1) + 1) log(T0 (b − 1)) δ bγ (b − 1)γ γ T (log T )δ . bγ − 1 The constant multiplicative loss ` depends on γ and δ as well as on T0 and b, and is `(γ, δ, T0 , b) := δ γ log(T0 (b−1)+1) b (b−1)γ bγ −1 > 1. log(T0 (b−1)) Minimizing the constant loss? This constant loss has two distinct part, `(γ, δ, T0 , b) = `1 (δ, T0 , b) `2 (γ, b), with `1 depending on δ, T0 and b (equal to 1 if δ = 0), and `2 depending on γ and b. δ  0 (b−1)+1) • Minimizing this constant loss `1 (δ, T0 , b) := log(T ≥ 1 is independent of δ (even log(T0 (b−1)) if it is 0). If we assume b to be fixed, `1 (δ, T0 , b) → 1 when T0 → ∞. Moreover, for any δ and b > 1, `1 (δ, T0 , b)√goes to 1 very quickly when T0 is large enough. For instance, for γ = δ = 12 and b = 3+2 5 (see Corollary 10), then `1 (δ, T0 , b) ' 1.109 for T0 = 2, ' 1.01 for T0 = 10 and ' 1.0004 for T0 = 100. γ γ • To minimize this constant loss `2 (γ, b) := b b(b−1) > 1, we fix γ and study h : b 7→ γ −1 `2 (γ, b). The function h is of class C 1 on (1, ∞) and h(b) → +∞ for b → 1+ and b → ∞, so h has a (possibly non-unique) global minimum and attains it. Moreover h0 (b) =  γbγ−1 (b−1)γ−1 γ+1 − 2b + 1 has the sign of bγ+1 − 2b + 1, which does not have a constant b γ 2 (b −1) sign and does not have explicit root(s) for a generic γ. However, it is easy to minimizing `2 (γ, b) for b numerically when γ is known and fixed (with, e.g., Newton’s method). The result from Theorem 4 of course implies the result from (Cesa-Bianchi and Lugosi, 2006, Ex.2.9), in the special case of δ = 0 and γ = 12 (for minimax bounds), as stated numerically in the following Corollary 10. 1 1 , 0, T0 , b) does not 2 and δ = 0, the multiplicative loss `( 2 q √ √ 5 b∗ ( 21 ) = 3+2 5 ' 2.62 and its minimum is 11+5 ' 3.33. 2 √ 2 loss of √2−1 ' 3.41, close to the optimal value. Corollary 10 If γ = depend on T0 . It is then minimal for Usually b = 2 is used, which gives a In particular, order-optimal and optimal algorithms for the minimax bound have γ = f (t) = 0, for which Theorem 7 gives a simpler bound √ √ 2 √ i RT (AT ) ≤ c T =⇒ RT (DT (A, (T0 2 )i∈N )) ≤ √ c T. 2−1 18 1 2 and (18) W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS A.3. Proof of Theorem 9, “Minimax Regret Lower Bound with Exponential Horizons” Proof Let A0 := DT (A, (Ti )i∈N ), and consider a fixed stochastic bandit problem. The lower bound (LB) from Lemma 2 gives RT (A0 ) ≥ LX T −1 RTi −Ti−1 (AT =Ti −Ti−1 ) i=0 We can use the hypothesis on A for each regret term, and as 0 < γ ≤ 1, we can use Lemma 14 (Eq. (24)) to distribute the power on γ to ease the proof and obtain ≥ cT0γ +c ≥ cT0γ + c LX T −1 (Ti − Ti−1 )γ i=1 LX T −1 γ Tiγ − Ti−1  (it is a telescopic sum and simplifies) i=1 ≥ cTLγT −1 1 Observe that TLT −1 ≥ (TLT ) b by definition of the exponential sequence (Def. 6), and TLT ≥ T (Def. 1). For the log(TLT −1 ) term, we simply have log(TLT −1 ) ≥ 1b log(T ) so if c0 = c/b, then we obtain what we want γ RT (A0 ) ≥ c0 T b . γ b , and it looks very similar to This lower bound goes from RT (AT ) = ΩT γ to RT (DT (A)) = ΩT  bγ the upper bound from Theorem 7 where RT (DT (A)) = O T was obtained from RT (AT ) = O(T γ ). 1 Remark It does seem sub-optimal to lower bound TLT −1 like this (TLT −1 ≥ (TLT ) b ), but we remind that T can be located anywhere in the discrete interval {TLT −1 , . . . , TLT − 1}, so in the worst case when T is very close to TLT (and for large enough T ), we indeed have TLb T −1 ∼ TLT and 1 TLT ∼ T , so with this approach, the lower bound TLT −1 ≥ T b cannot be improved. Appendix B. Minimax Regret Lower Bound with Geometric Horizons We include here a last result that partly replies to Theorem 4. It is more subtle that the lower bound in Theorem 5 but still provides an interesting insight: if b is not chosen carefully (i.e., if `0 (γ, b) > 1), then the anytime version of AT using a geometric Doubling Trick suffers a non-improvable constant multiplicative loss compared to AT . Theorem 11 For stochastic models, if A satisfies RT (AT ) ≥ c T γ , for 0 < γ < 1 and c > 0, then the anytime version A0 := DT (A, (Ti )i∈N ) with the geometric sequence (Ti )i∈N of parameters T0 ∈ N∗ , b > 1 (i.e., Ti = bT0 bi c) satisfies LT ≥ 2 =⇒ RT (A0 ) ≥ `0 (γ, b) c T γ + g0 (T ). 19 (19) W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS with g0 (t) = O(log t) = o(tγ ), and a constant loss `0 (γ, b) depending only on γ and b, (b − 1)γ > 0. − 1) `0 (γ, b) = (20) bγ (bγ `0 (γ, b) is always > 0 and tends to 0 for b → ∞, and some choice of b gives `0 (γ, b) > 1. Proof Let A0 := DT (A, (Ti )i∈N ), and consider a fixed stochastic bandit problem. Assume LT ≥ 2. The lower bound (LB) from Lemma 2 gives 0 RT (A ) ≥ LX T −1 RTi −Ti−1 (AT =Ti −Ti−1 ) i=0 We bound Ti − Ti−1 ≥ T0 (b − 1)bi−1 − 1 for i > 0, thanks to Definition 3, and we can use the hypothesis on A for each regret term. Additionally, we have (Ti − Ti−1 )γ ≥ (T0 (b − 1)bi−1 − 1)γ ≥ (T0 (b − 1))γ (bi−1 )γ − 1 by Lemma 14 (Eq. (24), as b > 1 and 0 < γ < 1), thus ≥ LX T −1 c(Ti − Ti−1 )γ ≥ cT0γ + cT0γ (b − 1)γ LX T −1 LX T −1 i=1 i=1 i=0 ≥ cT0γ + cT0γ (b γ − 1) (bi−1 )γ − c 1 LX T −2 (bi )γ − c(LT − 1) i=0 We have PLT −1 i=0 (bi )γ = (bLT −1 )γ −1 bγ −1 thanks to a geometric sum (with γ > 0) and thus ≥ cT0γ + cT0γ (b − 1)γ (bLT −1 )γ − 1 + c(1 − LT ) bγ − 1   γ Thanks to Definition 3, bLT −1 satisfies bLT −1 ≥ 1b TT0 . Let g0 (T ) := cT0γ (b−1) − 1 + c(LT − bγ −1   1) = O(1) + O logb ( TT0 ) = O(log T ) = o(T γ ) and g0 (T ) > 0, then we have     (b − 1)γ γ (b − 1)γ γ ≥c γ γ T − cT0 − 1 + c(LT − 1) . b (b − 1) bγ − 1 We obtain as announced, RT (A0 ) ≥ `0 (b) cT γ + g0 (T ) with g0 (T ) = O(log T ) = o(T γ ). γ Maximizing the constant loss? To maximize3 `0 (γ, b) := bγ(b−1) (bγ −1) > 0, we fix γ and study 1 the function h : b 7→ `0 (γ, b). The function h is of class C on (1, ∞) and h(b) → +∞ for  (b−1)γ−1 b → 1+ and h(b) → 0 for b → ∞. Moreover h0 (b) = −γ bγ+1 −2bγ + bγ+1 + 1 has the γ −1)2 (b  same sign as f (b) := − −2bγ + bγ+1 + 1 . The function f is of class C 1 , with f (1) = 0 and 2γ 2γ f 0 (b) = −(γ + 1)(b − γ+1 )bγ−1 , and as 0 < γ < 1, γ+1 < 1 so f 0 (b) < 0 for all b > 1. Thus f is decreasing, and ∀b > 1, f (b) < f (1) = 0. So h0 has a negative sign, and this allows to conclude that h is decreasing, and so b 7→ `0 (γ, b) has no global maximum at fixed γ, and `0 → ∞ if b → 1+ . 3. For the largest possible lower bound, we try to maximize the constant loss in the lower bound. 20 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS Relationship with the upper bound. For any b > 1, we compare `0 (γ, b) with `(γ, b) and we see that, interestingly, `0 (γ, b) = `2 (γ, b)/b2γ , with `2 (γ, b) from Theorem 4. For the particular case of γ = 12 , this lower bound also leads to another interesting remark: if b is chosen to minimize the loss in the upper bound (Theorem 4, b∗ ( 12 ) = √ √ 3+ 5 2 ), then this lower bound gives `0 ( 12 , b∗ ( 12 )) = 1 + 22 ' 1.71 > 1, which proves that this choice of geometric doubling trick cannot be used to conserve an optimal algorithm, i.e., the constant loss cannot be made as close to 1 as we want. Appendix C. An Efficient Heuristic, the Doubling Trick with “No Restart” Let A0 := DT no-restart (A, (Ti )i∈N ) denotes the following Algorithm 2. The only difference with DT (Algorithm 1) is that the history from all the steps from t = 1 to t = Ti is used to reinitialize the new algorithm A(i) . To be more precise, this means that a fresh algorithm A(i) is created, and then fed with successive observations (A0 (s), YA0 (s),s ) for all 1 ≤ s < t, like if it was playing from the beginning. Note that A(i) could have chosen a different path of actions, but we give it the observations from the previous plays of A0 . This obviously cannot be applied to any kind of algorithm A, and for instance any algorithm based on arm elimination (e.g., Explore-Then-Commit approaches like in Garivier et al. (2016)) will most surely fail with this approach. This second doubling trick algorithm DT no-restart can be applied in practice if A is index-based and uses the horizon T as a simple numerical parameter in its indexes, like it is the case for instance for AFHG (cf. Eq. (16)). or kl-UCB++ (cf. Eq. (17)). Input: Bandit algorithm A, and sequence (Ti )i∈N Let i = 0, and initialize algorithm A(0) = AT0 . 2 for t = 1, . . . , T do 3 if t > Ti then // Next horizon Ti+1 from the sequence 4 Let i = i + 1. 5 Initialize algorithm A(i) = ATi −Ti−1 . 6 Update internal memory of A(i) with the history of plays and rewards from Ai−1 . 7 end 8 Play with A(i) : play arm A0 (t) := A(i) (t − Ti ), observe reward r(t) = YA0 (t),t . 9 end Algorithm 2: The Non-Restarting Doubling Trick Algorithm, A0 = DT no-restart (A, (Ti )i∈N ). 1 However, it is much harder to state any theoretical result on this heuristic DT no-restart . We conjecture that a regret upper bound similar to (UB) from Lemma 2 could still be obtained, but it is still an open problem that the authors do not know how to tackle for a generic algorithm. The intuition is that starting A(i) with some previous observations from the (same) i.i.d. process (Yk,s )k∈{1,...,K},s∈N can only improve the performance of A(i) , and lead to a smaller regret on the interval {Ti , . . . , Ti+1 − 1}. 21 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS Appendix D. Basic but Useful Results All the logarithm log are taken in base e = exp(1) (i.e., natural logarithm ln, but log is preferred for x readability). Logarithms in a basis b > 1 are denoted logb (x) := log log b , for any x ∈ R, x > 0. We remind that bxc denotes the integer part of x ∈ R, and for x > 0, that is the unique integer i such that i ≤ x < i + 1. The only property we use is its definition and the fact that bxc ≤ x. We also define dxe := 1 + bxc for x ≥ 0, which is the unique integer j such that j − 1 ≤ x < j. D.1. Weighted Geometric Inequality Lemma 12 (Weighted Geometric Inequality) For any n ∈ N∗ , b > 1 and δ > 0, and if f is a function of class C 1 , non-decreasing and non-negative on [0, ∞), we have n X bδ f (n)(bn )δ . bδ − 1 f (i)(bi )δ ≤ i=0 (21) Proof By hypothesis, f is non-decreasing, so ∀i ∈ {0, . . . , n}, f (i) ≤ f (n), and so by using the sum of a geometric sequence, we have ! n n  X X bδ  1 (bn+1 )δ = δ f (n)(bn )δ . f (i)(bi )δ ≤ f (n) (bi )δ ≤ f (n) δ b −1 b −1 i=0 i=0 f (i) = 1 gives the geometric inequality. Note that if we make δ → 0, the left sum converges to P n−1 i=0 f (i) and the right term diverges to +∞, making this inequality completely uninformative. D.2. Another Sum Inequality i This second result is similar to the previous one but for a “doubly exponential” sequence, i.e., ab , as it also bounds a sum of increasing terms by a constant times its last term. Lemma 13 For any n ∈ N∗ , a > 1, b > 1 and γ > 0, we have   n  n  X 1 i bn γ (ab )γ ≤ aγ + 1 + (a ) = O (ab )γ . (log(a))(log(bγ )) (22) i=0 Proof We first isolate both the first and last term in the sum and focus on the from i = 1 sum up to t i = n − 1. As the function t 7→ (ab )γ is increasing for t ≥ 1, we use a sum-integral inequality, and then the change of variable u := γbt , of Jacobian dt = log1 b du u , gives n−1 X bi γ Z (a ) ≤ i=1 n a 1 γbt 1 dt ≤ log(bγ ) Z γbn γb au du u u Now for u ≥ 1, observe that au ≤ au , and as γb > 1, we have Z γbn 1 1 1 1 n n γ ≤ au du ≤ aγb = (ab ) . γ γ γ log(b ) γb log(b ) log(a) (log(a))(log(b )) Finally, we obtain as desired, n P i n (ab )γ ≤ aγ + (ab )γ + i=0 22 1 bn γ (log(a))(log(bγ )) (a ) . W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS D.3. Basic Functional Inequalities These functional inequalities are used in the proof of the main theorems. Lemma 14 (Generalized Square Root Inequalities) For any x, y ≥ 0 and 0 < δ < 1, (x + y)δ ≤ xδ + y δ . (23) And conversely for any 0 < δ < 1, and x, y ≥ 0, if x ≥ y then (x − y)δ ≥ xδ − y δ . (24) Proof Fix y ≥ 0. Let f (x) := (x+y)δ −(xδ +y δ ) for x ≥ 0. First, f (0) = y δ −y δ = 0, and as δ > 0, f is differentiable on [0, ∞), with f 0 (x) = (log δ)(x + y)δ − (log δ)xδ = (log δ)((x + y)δ − xδ ), and as δ < 1, log δ < 0, and (x + y)δ ≥ xδ , so f 0 (x) ≤ 0 for any x ≥ 0. Therefore, f is non-increasing, and so ∀x ≥ 0, f (x) ≤ f (0) = 0, so f is non-positive, giving the desired inequality (for any y ≥ 0 and any x ≥ 0). The second inequality is a direct application of the first one. Assume x ≥ y, and let x0 = x − y ≥ 0, then (x0 + y)δ ≤ (x0 )δ + y δ . This gives (x − y)δ = (x0 )δ ≤ (x0 + y)δ − y δ = xδ − y δ . Lemma 15 (Bounding log(x − ∆)) Let x0 > 1 and 0 < ∆ < x0 (e.g., ∆ ≤ 1), then ∀x ≥ x0 , log(x0 − ∆) log(x) ≤ log(x − ∆) ≤ log(x). log(x0 ) (25) With ∆ = 1, it implies that if T0 > 1, b > 1 satisfy T0 (b − 1) > 1, then for any i ∈ N, we have log(T0 (b − 1)bi − 1) ≥ log(T0 (b − 1) − 1) log(T0 (b − 1)bi ). log(T0 (b − 1)) (26) log(x−∆) 1 log(x) , defined for x ≥ x0 . It is of class C , and by differentiating, we have f 0 (x) = log(x)−log(x−∆) > 0 as log is increasing. So f is increasing, and its minimum is attained at x(log x)2 0 −∆) x = x0 , i.e., ∀x ≥ x0 , f (x) ≥ f (x0 ) = log(x log(x0 ) > 0, which gives Eq. (25). Proof Let f (x) := The corollary is immediate but stated explicitly for clarity when used in page 6. Lemma 16 For any γ > 0 and δ > 0, the function f : x 7→ xγ (log x)δ is increasing on [1, ∞). Proof f is of class C 1 on [1, ∞). First, if γ > 0, we have f 0 (x) = xγ−1 (log x)δ−1 (δ + γ log(x)). So f 0 (x) > 0 if and only if δ + γ log(x) ≥ 0, that it x ≥ exp(− γδ ). But x ≥ 1 and < 0 so f 0 (x) is always positive, and thus f is increasing. Then, if γ = 0, we have f 0 (x) = δ x1 (log x)δ−1 > 0 as x > 1 gives log x > 0 and so (log x)δ−1 > 0. It is also true if γ ≥ 0, δ ≥ 0 if not both are zero simultaneously. 23 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS D.4. Controlling an Unbounded Sum of Dominated Terms This Lemma is used in the proofs of our upper bounds (Theorems 4 and 7), to handle the sum of f (Ti ) terms. In particular, it can be applied to (Ti ) the geometric sequence and g(t) = h(t) = tγ or g(t) = h(t) = tγ (log t)δ (for Theorem 4) for γ > 0 and δ ≥ 0; or (Ti ) the exponential sequence, g(t) = tγ (log t)δ and h(t) = tbγ (log t)δ (for Theorem 7) for γ ≥ 0 and δ ≥ 0. Note that it would be obvious if LT was bounded for T → ∞, but a more careful analysis has to be given as LT → ∞. Lemma 17 Let f , g and h be three positive, diverging and non-decreasing functions on [1, ∞), such that f (t) = o(g(t)) for t → ∞. Let a non-decreasing diverging sequence (Ti )i∈N , and a diverging sequence (LT )T ∈N (i.e., Ti → ∞Pfor i → ∞ and LT → ∞ if T → ∞), such that there T exists a constant c ≥ 0 satisfying ∀T ≥ 1, L i=0 g(Ti ) ≤ c × h(T ). Then the (unbounded) sum of dominated terms f (Ti ) is still dominated by h(T ), i.e., f (t) = o(g(t)) and ∃c ≥ 0, T →∞ LT X g(Ti ) ≤ c × h(T ) =⇒ ∀T ≥1 i=0 LT X f (Ti ) = o(h(T )) . i=0 T →∞ (27) Proof By hypothesis, if f is dominated by g, formally f (t) = o(g(t)), then there exists a positive function ε(t) such that f (t) = g(t)ε(t) and ε(t) → 0 for t → 0. Fix η > 0, as small as we want, then there exists Tη ≥ 1 such that ∀t ≥ Tη , ε(t) ≤ η. Let iη such that Tiη −1 < Tη ≤ Tiη . Now for any T ≥ Tη and large enough so that LT ≥ Tη , we can start to split the sum LT X i=0 iη −1 f (Ti ) = X i=0 f (Ti ) + LT X f (Ti ) i=iη The first sum is naively bounded by iη × f (Tiη −1 ) as f is increasing, and for the second sum, for any i ≥ iη , Ti ≥ Tη and so f (Ti ) = ε(Ti )g(Ti ) ≤ ηg(Ti ), thus   LT X ≤ iη f (Tiη −1 ) + η ×  g(Ti ) i=iη The sum is smaller than a sum on a larger interval, as g(Ti ) ≥ 0 for any i, and f is increasing so ! LT X ≤ iη f (Tη ) + η g(Ti ) i=0 But now, f (Tη ) ≤ ηg(Tη ) by hypothesis, and this sum is smaller than c × h(T ) also by hypothesis ≤ iη η × g(Tη ) + ηc × h(T ) = η (iη g(Tη ) + c × h(T )) Finally, we use the hypothesis that h(T ) is diverging and as η and Tη are both fixed, there exists a f fη . And so we have finally proved that Tη ≥ Tη large enough so that iη g(Tη ) ≤ h(T ) for all T ≥ T fη ≥ 1, ∀T ≥ T fη , ∀η > 0, ∃T LT X f (Ti ) ≤ η(c + 1) × h(T ). i=0 This concludes the proof and shows that L T P f (Ti ) = o(h(T )) as wanted. i=0 24 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS Appendix E. Additional Experiments We presents additional experiments, for Gaussian bandits and for the heuristic DT no-restart . E.1. Experiments with Gaussian Bandits (with Known Variance) We include here another figure for experiments on Gaussian bandits, see Fig. 5. Cumulated regrets for different bandit algorithms, averaged 1000 times 9 arms: [N(−4, 1), N(−3, 1), N(−2, 1), N(−1, 1), N(0, 1), N(1, 1), N(2, 1), N(3, 1), N(4, 1) ∗ ] 350 300 Cumulated regret Rt = tµ ∗ − s=0 k=1 9 t−1 X X µk 1000 [Tk (s)] 400 UCB ApprFHG(T = 45678) DT(Ti = 200 × 2i )[ApprFHG] DT(Ti = 2002i )[ApprFHG] DT(Ti = 2001.1i )[ApprFHG] DT(Ti = (200/2)22i )[ApprFHG] Lai & Robbins lower bound = 5.44 log(t) 250 200 150 100 50 0 0 10000 20000 30000 Time steps t = 0. . . T − 1, horizon T = 45678 40000 Figure 5: Regret for DT , for K = 9 Gaussian arms N (µ, 1), horizon T = 45678, n = 1000 repetitions and µ uniformly spaced in [−5, 5]K . On “easy” problems like this one, both UCB and AFHG perform similarly and attain near constant regret (identifying the best Gaussian arm is very easy here as they are sufficiently distinct). Each doubling trick also appear to attain near constant regret, but geometric doubling (b = 2) and slow exponential doubling (b = 1.1) are slower to converge and thus less efficient. E.2. Experiments with DT no-restart As mentioned previously, the DT no-restart algorithm (Algorithm 2) is only an heuristic so far, as no theoretical guarantee was proved for it. For the sake of completeness, we also include results from numerical experiments with it, to compare its performance against the “with restart” version DT . As expected, DT no-restart enjoys much better empirical performance, and in Figs. 6 and 7 we see that a geometric or a slow exponential doubling trick with no restart with kl-UCB++ can outperform kl-UCB and perform similarly to the non-anytime kl-UCB++ . But as observed before, the regret blows up after the beginning of each new sequence if the doubling sequence increase too fast (e.g., exponential doubling). Despite what is proved theoretically in Theorem 5, here we observe that the geometric doubling is the only one to be slow enough to be efficient. 25 W HAT D OUBLING T RICKS C AN AND C AN ’ T D O FOR M ULTI -A RMED BANDITS Cumulated regrets for different bandit algorithms, averaged 1000 times 9 arms: Bayesian MAB, Bernoulli with means on [0, 1] 400 Cumulated regret Rt = tµ ∗ − s=0 k=1 9 t−1 X X µk 1000 [Tk (s)] 500 KLUCB KLUCB+ + (T = 45678) DTnr(Ti = 200 × 2i )[KLUCB+ + ] DTnr(Ti = 2002i )[KLUCB+ + ] DTnr(Ti = 2001.1i )[KLUCB+ + ] DTnr(Ti = (200/2)22i )[KLUCB+ + ] Lai & Robbins lower bound = 6.81 log(t) 300 200 100 0 0 10000 20000 30000 Time steps t = 0. . . T − 1, horizon T = 45678 40000 Figure 6: Regret for K = 9 Bernoulli arms, horizon T = 45678, n = 1000 repetitions and µ taken uniformly in [0, 1]K , for DT no-restart . Geometric doubling (e.g., b = 2) and slow exponential doubling (e.g., b = 1.1) are too slow, and short first sequences make the regret blow up in the beginning of the experiment. At t = 40000 we see clearly the effect of a new sequence for the best doubling trick (Ti = 200 × 2i ). As expected, kl-UCB++ outperforms kl-UCB, and if the doubling sequence is growing fast enough then DT no-restart (kl-UCB++ ) can perform as well as kl-UCB++ . Cumulated regrets for different bandit algorithms, averaged 1000 times 9 arms: [B(0.1), B(0.2), B(0.3), B(0.4), B(0.5), B(0.6), B(0.7), B(0.8), B(0.9) ∗ ] 140 100 Cumulated regret Rt = tµ ∗ − s=0 k=1 9 t−1 X X µk 1000 [Tk (s)] 120 KLUCB KLUCB+ + (T = 45678) DTnr(Ti = 200 × 2i )[KLUCB+ + ] DTnr(Ti = 2002i )[KLUCB+ + ] DTnr(Ti = 2001.1i )[KLUCB+ + ] DTnr(Ti = (200/2)22i )[KLUCB+ + ] Lai & Robbins lower bound = 7.52 log(t) 80 60 40 20 0 0 10000 20000 30000 Time steps t = 0. . . T − 1, horizon T = 45678 40000 Figure 7: K = 9 Bernoulli arms with µ evenly spaced in [0, 1]K . On easy problems like this one, both kl-UCB and kl-UCB++ are very efficient, and here the geometric allows the DT no-restart anytime version of kl-UCB++ to outperform both kl-UCB and kl-UCB++ . 26
10math.ST
Algorithmic Linearly Constrained Gaussian Processes Markus Lange-Hegermann 1 arXiv:1801.09197v1 [stat.ML] 28 Jan 2018 Abstract We algorithmically construct multi-output Gaussian process priors which satisfy linear differential equations. Our approach attempts to parametrize all solutions of the equations using Gröbner bases. If successful, a push forward Gaussian process along the paramerization is the desired prior. We consider several examples, among them the full inhomogeneous system of Maxwell’s equations. By bringing together stochastic learning and computeralgebra in a novel way, we combine noisy observations with precise algebraic computations. 1. Introduction In recent years, Gaussian process regression has become a prime regression technique (Rasmussen & Williams, 2006). Roughly, a Gaussian process can be viewed as a suitable2 probability distribution on a set of functions, which we can condition on observations using Bayes’ rule. The resulting mean function is used for regression. Additionally, one can also easily sample random functions, so-called realizations, from this distribution. The strength of Gaussian process regression lies in avoiding overfitting while still finding functions complex enough to describe any behavior present in given observations, even in noisy or unstructured data. Gaussian processes are usually applied when observations are rare or expensive to produce. Applications range, among many others, from robotics (Deisenroth et al., 2015), biology (Honkela et al., 2015), global optimization (Osborne et al., 2009), astrophysics (Garnett et al., 2015) to engineering (Thewes et al., 2015). Incorporating justified assumptions into the prior helps these applications: the full information content of the scarce observations can be utilized to create a more precise regression model. Examples of such assumptions are smooth or rough behavior, trends, homogeneous or heterogeneous noise, local or global behavior, and periodicity (cf. §4 in (Rasmussen 1 Correspondence to: Markus Lange-Hegermann <[email protected]>. 2 Gaussian processes are the maximum entropy prior for finite mean and variance in the unknown behavior (Jaynes, 1968; Jaynes & Bretthorst, 2003). & Williams, 2006),(Duvenaud, 2014)). Such assumptions are usually incorporated in the covariance structure of the Gaussian process. Even certain physical laws, given by certain linear differential equations, could be incorporated into the covariance structures of Gaussian process priors. Thereby, despite their random nature, all realizations and the mean function of the posterior strictly adhere to these physical laws3 . For example, (Macêdo & Castro, 2008) constructed covariance structures for divergence-free and curl-free vector fields, which (Wahlström et al., 2013; Solin et al., 2015) used to model electromagnetic phenomena. A first step towards systematizing this construction was achieved in (Jidling et al., 2017). In certain cases, a parametrization of all solutions for physical laws could be found by a computation that does not necessarily terminate. Having found a parametrization, one could assume a Gaussian process prior for the parametrizing functions and push it forward. This results in a Gaussian process prior for the solutions of the physical laws. In Section 3, this paper combines these ideas from (Jidling et al., 2017) with an algorithm which computes this parametrization if it exists, or reports failure if it does not exist. This algorithm is a homological result in algebraic system theory (cf. §7.(25) in (Oberst, 1990)). This paper adds information to Gaussian processes in two ways: (i) restricting to solutions of linear operator matrices by constructing a suitable prior and (ii) conditioning on observations using Bayes’ rule. Since these two constructions are compatible, we can combine strict, global information from equations with noisy, local information from observations. The author views this combination of techniques from homological algebra and machine learning as the main result of this paper, and 3 For notational simplicity, we refrain from using the phrases “almost surely” and “up to equivalence” in this paper. We say that all realizations of a Gaussian process adhere to such laws if there is an element in its equivalence class w.r.t. almost sure equality that has this property, and similarly for continuity and smoothness. Algorithmic Linearly Constrained Gaussian Processes the construction of covariance functions satisfying physical laws as a proof of concept. Example 4.2 shows a typical application. It constructs a Gaussian process such that all of its realizations satisfy the inhomogeneous Maxwell equations of electromagnetism. Conditioning this Gaussian process on a single observation of electric current yields, as expected, a magnetic field circling around this electric current. Even though Gaussian processes are a highly precise interpolation tool, they lack in two regards: missing extrapolation capabilities and high computation time, cubically in the amount of observations. These problems have, to a certain degree, been addressed: several fast approximations to Gaussian process regression (Titsias, 2009; Hensman et al., 2013; Wilson et al., 2015a; Izmailov et al., 2017; Dong et al., 2017) and more powerfull covariance structures (Lee et al., 2017; Wilson & Adams, 2013; Wilson et al., 2015b; Calandra et al., 2016) have been proposed. This paper addresses these two problems from a complementary angle. The linear differential equations allow to extrapolate and reduce the needed amount of observations, which improves computation time. 2. Differential Equations and Gaussian Processes This section is mostly expository and summarizes Gaussian processes and how differential operators act on them. Subsection 2.1 summarizes Gaussian process regression. We then introduce differential (Subsection 2.2) and other operators (Subsection 2.4), and sketch their connection to constructing priors (Subsection 2.3). 2.1. Gaussian processes A Gaussian process g = GP(µ, k) is a distribution on the set of functions Rd → R` such that the function values g(x1 ), . . . , g(xn ) at x1 , . . . , xn ∈ Rd have a joint Gaussian distribution. It is specified by a mean function µ : Rd → R` : x 7→ E(g(x)) and a positive semidefinite covariance function `×` k : Rd ⊕ Rd → R0 : (x, x0 ) 7→ E((g(x) − µ(x))(g(x0 ) − µ(x0 ))T ) . Assume the regression model yi = g(xi ) and condition on n observations {(xi , yi ) ∈ R1×d ⊕ R1×` | i = 1, . . . , n} . Denote by k(x, X) ∈ R`×`n resp. k(X, X) ∈ R`n×`n the 0 (covariance) matrices obtained by concatenating the matrices k(x, xj ) resp. the positive semidefinite block partitioned matrix with blocks k(xi , xj ). Write µ(X) ∈ R`×n for the matrix obtained by concatenating the vectors µ(xi ) and y ∈ R1×`n for the row vector obtained by concatenating the rows yi . The posterior x 7→ µ(X) + (y − µ(X))k(X, X)−1 k(x, X)T ,  (x, x0 ) 7→ k(x, x0 ) − k(x, X)k(X, X)−1 k(x0 , X)T , GP is a Gaussian process and its mean function x → 7 µ(X) + (y − µ(X))k(X, X)−1 k(x, X)T is used as regression model. 2.2. Differential equations From now on, let R = R[∂x1 , . . . , ∂xd ] be the polynomial ring in the partial differential operators. This ring models linear (partial) differential equations with constant coefficients, as it acts on the vector space F = C ∞ (Rd , R) of smooth functions, where ∂xi acts by partial derivative w.r.t. xi . The set of realizations of a Gaussian process with squared exponential covariance function is dense in F (cf. Thm. 12, Prop. 42 in (Simon-Gabriel & Schölkopf, 2016)). Roughly speaking, Gaussian processes are the linear objects among stochastic processes. Hence, it is not surprising to find a rich interplay of Gaussian processes and linear differential equations. The class of Gaussian processes is closed under matrices 00 B ∈ R`×` of linear differential operators with constant coefficients. Let g = GP(µ, k) be a Gaussian process with 00 realizations in the space F ` of vectors with functions in F as entries. Define the Gaussian process B∗ g as the Gaussian process induces by the pushforward measure under B of the Gaussian measure induced by g. It holds that B∗ g = GP(Bµ(x), Bk(x, x0 )(B 0 )T ) , (1) where B 0 denotes the operation of the operators in B on functions with argument x0 ∈ Rd (cf. Thm. 9 in (Bertinet & Agnan, 2004)). The covariance matrices for such Gaussian processes as in (1) are often singular. This is to be expected, as B∗ g is rarely dense in F ` . For numerical stability, we tacitely assume the model yi = g(xi ) + ε for small Gaussian white noise term ε and adopt k by adding var(ε) to k(xi , xi ) for observations xi . Example 2.1. Let g = GP(0, k(x, x0 )) be a scalar univariate Gaussian process with differentiable realizations. Then, the Gaussian process of derivatives of functions is given by   ∂ ∂2 0 g = GP 0, k(x, x ) . ∂x ∗ ∂x∂x0 ∂ One can interpret this Gaussian process ∂x g as taking ∗ derivatives as measurement data and producing a regression model of derivatives. Algorithmic Linearly Constrained Gaussian Processes 2.3. Parametrizations 2.4. Further operator rings We say that a Gaussian process is in a function space, if 0 its realizations are contained in said space. For A ∈ R` ×` define the solution set The theory presented for differential equations with constant coefficients also holds for other rings R of linear operators and solution spaces F. The following three operator rings are prominent examples. solF (A) := {f ∈ F ` | Af = 0} . Such solutions sets and Gaussian processes are connected. Lemma 2.2. Let g = GP(µ, k) be a Gaussian process in F `×1 . Then g is also a Gaussian process in solF (A) for 0 A ∈ R` ×` if and only if µ ∈ solF (A) and A∗ (g − µ) is the constant zero process. Proof. Assume that g is a Gaussian process in solF (A). Then, as the mean function is a realization, µ ∈ solF (A). Furthermore, for g̃ := (g − µ) = GP(0, k) we have that all realizations are annihilated by A, and hence A∗ g̃ is the constant zero process. Conversely, assume that µ ∈ solF (A) and A∗ (g − µ) is the constant zero process. This implies 0 = A∗ (g − µ) = A∗ g − A∗ µ = A∗ g, i.e. all realizations of g become zero after a pushforward by A. In particular, all realizations of g are contained in solF (A). Our goal is to construct Gaussian processes with realizations dense in the solution set solF (A) of an operator matrix 0 A ∈ R` ×` . The following remark, implicit in (Jidling et al., 2017), is a first step towards an answer. 0 00 Remark 2.3. Let A ∈ R` ×` and B ∈ R`×` with AB = 0. 00 Let g = GP(0, k) be a Gaussian process in F ` . Then, the set of realizations of B∗ g is contained in solF (A). This follows easily from Lemma 2.2, as A∗ (B∗ g) = (AB)∗ g = 0∗ g = 0. 00 We call B ∈ R`×` a parametrization of solF (A) if 00 solF (A) = BF ` . Parametrizations yield the denseness of the realizations of a Gaussian process B∗ g in solF (A). The polynomial ring R = R[x1 , . . . , xd ] models polynomial equations when it acts on the set F of smooth functions defined on a (Zariski-)open set in Rd . To model ordinary linear differential equations with rational4 coefficients consider the Weyl algebra R = R(t)h∂t i, with the non-commutative relation ∂t t = t∂t + 1 representing the product rule of differentiation. Here, we consider solutions in the set F of smooth functions defined on a co-finite set. The polynomial ring R = R[σx1 , . . . , σxd ] models linear shift equations with constant coefficients when it acts on the d set F = RZ≥0 of d-dimensional sequences by translation of the arguments. 3. Computing parametrizations By the last section, constructing a parametrization B of solF (A) yields a Gaussian process dense in the solution set 0 solF (A) of an operator matrix A ∈ R` ×` . Subsection 3.1 gives necessary and sufficient conditions for a parametrization to exist and Subsection 3.2 describes their computation. It turns out that these computations are purely algebraic over R. 3.1. Existence of parametrizations It turns out that we can decide whether a parametrization exists purely algebraically, with operations over R that do not involve F. 0 Proposition 2.4. Let B ∈ R`×` be a parametrization of 0 solF (A) for A ∈ R` ×` . Let g = GP(0, k) be a Gaussian 00 process dense in F ` . Then, the set of realizations of B∗ g is dense in solF (A). By r-ker(A) we denote the right kernel of A ∈ R` ×` , i.e. r-ker(A) = {m ∈ R`×1 | Am = 0}. By l-ker(A) we 0 denote the left kernel of A, i.e. l-ker(A) = {m ∈ R1×` | mA = 0}. Abusing notation, denote any matrix as left resp. right kernel if its rows resp. columns generate the kernel as an R-module. This proposition is a consequence of partial derivatives being bounded, and hence continuous, when F is equipped with the Fréchet topology generated by the family of seminorms Theorem 3.1. Let A ∈ R` ×` . Define matrices B = r-ker(A) and A0 = l-ker(B). Then solF (A0 ) is the largest subset of solF (A) that is parametrizable and B parametrizes solF (A0 ). 00 0 kf ka,b := sup sup z∈[−b,b]d i∈Zd ≥0 |i|≤a | ∂ f (z)| ∂z i for a, b ∈ Z≥0 (cf. §10 in (Treves, 1967)). Now, the continuous surjective map induced by B maps a dense set to a dense set. In constrast to vector spaces, the left kernel of the right kernel of A is not necessarily A (up to an equivalence) in case of operator rings. For example, the solution set solF (A0 ) is the subset of controllable behaviors in solF (A). 4 No major changes for polynomial, holonomic, or meromorphic coefficients. Algorithmic Linearly Constrained Gaussian Processes Corollary 3.2. In Theorem 3.1, solF (A) is parametrizable if and only if the rows of A and A0 generate the same rowmodule. Since AB = 0, this is the case if all rows of A0 are contained in the row module generated by the rows of A. (Decker et al., 2016) and Macaulay2 (Grayson & Stillman) are two well-known open source implementations. In this case, solF (A) is parametrized by B. Furthermore, a 00 Gaussian process g with realizations dense in F ` leads to a Gaussian process B∗ g with realizations dense in solF (A). Many covariance functions5 incorporate hyperparameters and advanced methods specifically add more hyperparameters to Gaussian processes, see e.g. (Snelson et al., 2003; Calandra et al., 2016; Wilson & Adams, 2013), for additional flexibility. For a proof of this theorem and its corollary see Thm. 2 in (Zerz et al., 2010), (cf. also Thm. 3, Alg. 1, and Lemma 1.2.3 in (Zerz, 2000) or §7.(24) in (Oberst, 1990)) and for additional characterizations, generalizations, and proofs using more homological machinery see (Quadrat, 2013; 2010b; Barakat, 2010; Seiler & Zerz, 2010; Chyzak et al., 2005; Robertz, 2015) and references therein. The approach assigns a prior to the parametrising functions and pushes this prior forward to a prior of the solution set solF (A). The paramerization is not canonical, and hence different parametrizations might lead to different priors. This did not lead to practical problems, yet. 3.2. Algorithms Summarizing Theorem 3.1 and Corollary 3.2 algorithmically, we need to compute right kernels (of A), compute left kernels (of B), and decide whether rows (of A0 ) are contained in a row module (generated by the rows of A). All these computations are an application of Gröbner basis algorithms. In the recent decades, Gröbner bases algorithms have become one of the core algorithms of computeralgebra, with manifold applications among others in in geometry, system theory, natural sciences, and automatic theorem proving. Generalizing the Gaussian algorithm, reduced Gröbner bases generalize the reduced echolon form to systems of linear operator equations. In particular, using them, one can compute all solutions in R (not in F) of the homogeneous system and compute, if it exists, a particular solution in R (not in F) for an inhomogeneous system. Solving homogeneous systems is the same as computing its right resp. left kernel or finding all relations (the generalization of linear dependencies) between columns resp. rows of a matrix. Solving inhomogeneous equations decides whether an element is contained in a module. Alternatively, the uniqueness of reduced Gröbner bases also decides submodule equality. A formal description of Gröbner bases would exceed the scope of this note. Instead, we refer to the excellent literature (Sturmfels, 2005; Eisenbud, 1995; Adams & Loustaunau, 1994; Greuel & Pfister, 2002; Gerdt, 2005; Buchberger, 2006) and explicitely show in the next section how to use Gröbner bases in computer algebra systems. They are implemented in various computer algebra systems, e.g., Singular 3.3. Hyperparameters The approach in this paper is the opposite. We restrict the Gaussian process prior, specifically to solutions of an operator matrix, guarding against overfitting. The prior of the parametrizing functions can, and usually does, still contain hyperparameters. These can be determined by maximizing the likelihood, as usual. Many important applications contain unknown parameters in the equations. Such parameters can also be estimated by the likelihood, when conditioning on data. For ordinary differential equations, the solution set of an operator matrix is a direct sum of parametrizable functions and a finite dimensional set of functions, both with constant resp. variable coefficients, due to the Smith form resp. Jacobson form. In many cases, in particular the case of constant coefficients, the solution set of the finite dimensional summand can easily be computed. This paper also allows to compute with the parametrizable summand of the solution set and estimate parameters and hyperparameters of both summands together. 4. Examples Example 4.1. We reproduce the well-known fact that divergence-free fields can be parametrized by the curl operator. This has been used in connection with Gaussian processes to model electric and magnetic phenomena (Macêdo & Castro, 2008; Wahlström et al., 2013; Solin et al., 2015). The same algebraic computation also constructs a prior for tangent fields of a sphere. The computer algebra system Macaulay2 (Grayson & Stillman) performs the Gröbner basis computations. Let R be the polynomial ring in three indeterminates, which we can both interpret as the polynomial ring Q[∂1 , ∂2 , ∂3 ] in the differential operators resp. the polynomial ring Q[x1 , x2 , x3 ] in the indeterminates. i1 : R=QQ[d1,d2,d3] o1 = R o1 : PolynomialRing 5 Sometimes even the mean function contains hyperparameters. These additional hyperparameters are usually not very expressive, compared to the non-parametric Gaussian process model. Algorithmic Linearly Constrained Gaussian Processes   and consider the matrix A = ∂1 ∂2 ∂3 representing the divergence resp. the normals of circles centered around the origin. i2 : A=matrix{{d1,d2,d3}} o2 = | d1 d2 d3 | 1 3 o2 : Matrix R <--- R The right kernel of A is given by the operator B representing the curl resp. tangent spaces of circles centered around the origin. i3 : B = generators kernel A o3 = 1 | -d2 0 -d3 | 1 | d1 -d3 0 | 1 | 0 d2 d1 | 3 3 o3 : Matrix R <--- R Since the right kernel A0 of B is again the A, the matrix B is really parametrization matrix of the solutions of A. i4 : A1 = transpose generators kernel transpose B o4 = | d1 d2 d3 | 1 3 o4 : Matrix R <--- R (As kernel in Macaulay2 yields right kernels, we compute the left kernel by transposition.) Figure 1. Taking the squared exponential covariance function for k in Example 4.1 yields the above smooth mean tangent field on the sphere after conditioning at 4 evenly distributed points on the equator with two opposite tangent vectors pointing north and south each. The two visible of these four vectors are displayed significantly bigger. tor matrix We construct a prior for tangent fields on the sphere by assuming equal covariance functions k for 3 uncorrelated parametrizing functions. A mean field is demonstrated in Figure 1 and the covariance function for the tangent field is k(x1 , y1 , z1 , x2 , y2 , z2 )·  −y1 y2 − z1 z2 y1 x2  x1 y2 −x1 x2 − z1 z2 x1 z2 y1 z2  z1 x2  . z1 y2 −x1 x2 − y1 y2 Example 4.2. Maxwell’s equations of electromagnetism uses curl and divergence operators as building blocks. It is a well-known result that the solutions of the inhomogeneous Maxwell equations are parametrized by the electric and magnetic potentials. We verify this and use the parametrization to construct a Gaussian process, such that its realizations adhere to Maxwell’s equations. We condition this prior on a single observation of flowing electric current, which leads to the magnetic field circling around the current. All computations have been performed in Maple using the Involutive package (Blinkov et al., 2003). The homogenous Mawell equations are given by the opera-  0  ∂z  −∂y   0 Mh :=   −∂t   0   0 ∂x −∂z 0 ∂x 0 0 −∂t 0 ∂y ∂y −∂x 0 0 0 0 −∂t ∂z ∂t 0 0 ∂x 0 ∂z −∂y 0 0 ∂t 0 ∂y −∂z 0 ∂x 0  0 0   ∂t   ∂z   ∂y   −∂x   0  0 applied to three components of the electric field and three components of the magnetic (pseudo) field. We have set all constants to 1. The right kernel of Mh is zero, in particular no parametrization exists. The inhomogeneous Maxwell equations with three additional components of the electric current and one additional component of electric flux aregiven by the 8 × 10 operator  04×4 matrix Mi := Mh . Using Gröbner bases, one −I4 computes the right kernel   ∂x ∂t 0 0 ∂y ∂z 0 0 0 −∂t ∂x −∂t ∂y −∂t ∂z 2 2 2 ∂x + ∂y + ∂z        0 0 0 −∂z ∂y 2 2 ∂y + ∂z − ∂t2 −∂y ∂x −∂z ∂x ∂t ∂x ∂t 0 ∂z 0 −∂x −∂y ∂x 2 2 ∂x + ∂z − ∂t2 −∂z ∂y ∂t ∂y 0 ∂t −∂y ∂x 0 −∂z ∂x −∂z ∂y 2 2 ∂x + ∂y − ∂t2 ∂t ∂z        of Mi and verifies that it is a parametrization of the set of Algorithmic Linearly Constrained Gaussian Processes solutions of the inhomogeneous Maxwell equations. We assume squared exponential covariance functions k := exp − 1 (x1 − x2 )2 + (y1 − y2 )2 2  +(z1 − z2 )2 + (t1 − t2 )2 and a zero mean function for four uncorrelated parametrising functions (electric and magnetic potential). The resulting covariance matrix can be found in Appendix A and for a demonstration see Figure 2. y > T := E[3];  0 1  1 1 t3 Dt > Mult( T1, [[ Dt, -tˆ3 ]], T, Alg );   1 0 In particular, after the base change with the matrix T , the systemis free on one generator and parametrizable by the 0 matrix . 1 The original system is thus parametrizable by     1 0 B=T· = 1 . 1 t3 ∂ t 1 1 x For a parametrizing functions with squared exponential covariance functions k(t1 , t2 ) = exp(− 12 (t1 − t2 )2 ) and a zero mean function, the covariance function for (x, u) is " #   t1 −t2 1 1 t32 2 (t2 −t1 −1)(t1 −t2 −1) exp − (t1 − t2 ) t2 −t1 2 t3 t3 t3 1 2 1 There are no exceptional points in the domain of the transformed system, but T removes {0} from the domain of the original system. We restrict ourselves to the set of smooth functions C ∞ (R>0 , R) defined on positive real numbers. For a demonstration of these priors see Figures 3 and 4. Figure 2. We condition the prior in Example 4.2 on an electric current in z-direction and zero electric flux at the origin x = y = z = t = 0. The diagram shows the mean posterior magnetic field in the (z, t) = (0, 0)-plane. As expected, it circles around the point with electric current. This mean field  has closed form  −y  2 2 2 2 1 1 · . x + y − 4 exp − 2 x + y 10 x Example 4.3. We consider the one-dimensional Weyl algebra R = R(t)h∂t i. It allows a stronger notion of a basis than a Gröbner basis: the Jacobson form (Jacobson, 1943). It is similar to the Smith normal form for PID’s, in that multiplying with invertible matrices on both sides yields a diagonal matrix. We use the Maple packages Janet and OreModules (Blinkov et al., 2003; Chyzak et al., 2007). > with( Janet ): with( OreModules ): > Alg := DefineOreAlgebra( diff=[ Dt, t ], polynom=[ t ] ): We consider the time-varying control system d 3 dt x(t) = t u(t) from Example  1.5.7  in (Quadrat, 2010a). The Jacobson form is just 1 0 . > E := ElementaryDivisors( [ diff(x(t),t)-tˆ3*u(t) ], [ t ], [ x, u ] ): > T1 := E[1];  1 − t3 x(t) 1 u(t) 0 1 2 3 4 5 Figure 3. The state function x(t) of the system in Example 4.3 can be influenced by assigning an input function u(t). For example setting x(1) = 0 and u(t) = t41+1 for t ∈ {1, 11 , 12 , . . . , 5} 10 10 leads to the above posterior mean. This model yields x(5) ≈ R5 3 1.436537, close to 1 t4t+1 dt ≈ 1.436551. A. Covariance matrices The covariance matrix for the 3-dimensional electric field E, the 3-dimensional magnetic (pseudo) field B, the 3dimensional electric current C and 1-dimensional electric flux F in Maxwell’s equations as constructed in Example 4.2 is   KE,E KE,B KE,C KE,F KB,E KB,B KB,C KB,F   K := 4k ·  KC,E KC,B KC,C KC,F  KF,E KF,B KF,C KF,F Algorithmic Linearly Constrained Gaussian Processes 1 0 Symposium on Mathematical Theory of Networks and Systems - MTNS 2010, pp. 1657–1661, Budapest, Hungary, 2010. x(t) 1 u(t) 2 3 Bertinet, A. and Agnan, Thomas C. Reproducing Kernel Hilbert Spaces in Probability and Statistics. Kluwer Academic Publishers, 2004. -1 -2 Figure 4. We prescribe a desired behavior for the state x(t) in Example 4.3 and let the Gaussian process construct a suitable input u(t). Starting with x(1) = 1 we give u(t) one time step to control 20 21 x(t) to zero, e.g., by setting x(t) = 0 for t ∈ { 10 , 10 , . . . , 5}. for matrices Buchberger, Bruno. An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal. J. Symbolic Comput., 41(3-4):475– 511, 2006. Translated from the 1965 German original by Michael P. Abramson. KE,E = (2 − (t1 − t2 )2 )I3 − v T v KB,B = (2 − vv T )I3 − v T v KC,C = (4 + 3(t1 − t2 )2 − (vv T ))v T v +((vv T − (t1 − t2 )2 )2 − 3(t1 − t2 )2 − 7vv T + 10)I3 KF,F = (t1 − t2 )2 (vv T − 3) + (vv T )2 − 11vv T + 18 KB,E = (t1 − t2 )(v ∧ v) KC,E = (t1 − t2 )((2 + vv T − (t1 − t2 )2 )I3 − 2v T v) KF,E = ((t1 − t2 )2 + vv T − 6)v Calandra, Roberto, Peters, Jan, Rasmussen, Carl E., and Deisenroth, Marc P. Manifold Gaussian processes for regression. In International Joint Conference on Neural Networks, pp. 3338–3345, 2016. doi: 10.1109/IJCNN. 2016.7727626. Chyzak, Frédéric, Quadrat, Alban, and Robertz, Daniel. Effective algorithms for parametrizing linear control systems over Ore algebras. Appl. Algebra Engrg. Comm. Comput., 16(5):319–376, 2005. KC,B = (vv T − (t1 − t2 )2 − 4)(v ∧ v)   KF,B = 0 0 0 KF,C = −(t1 − t2 )(vv T + (t1 − t2 )2 − 8)v   x1 − x2 y2 − y2 z1 − z2 , using v := for  the 3 × 3 identity matrix, and  v ∧ v 0 −(z1 − z2 ) y1 − y2  z1 − z2 0 −(x1 − x2 ). −(y1 − y2 ) x1 − x2 0 Blinkov, Yuri A., Cid, Carlos F., Gerdt, Vladimir P., Plesken, Wilhelm, and Robertz, Daniel. The MAPLE Package JANET: I. Polynomial Systems. II. Linear Partial Differential Equations. In Proceedings 6th International Workshop on Computer Algebra in Scientific Computing, pp. 31–40 and 41–54, 2003. (http://www.mathb. rwth-aachen.de/Janet). I3 := Acknowledgments The authors thanks M. Barakat, S. Gutsche, C. Kaus, D. Moser, S. Posur, and O. Wittich for discussions concerning this paper, W. Plesken, A. Quadrat, D. Robertz, and E. Zerz for introducing him to the algebraic background of this paper, S. Thewes for introducing him to the stochastic background of this paper, and the authors of (Jidling et al., 2017) for providing the starting point of this work. References Adams, William W. and Loustaunau, Philippe. An introduction to Gröbner bases. Graduate Studies in Mathematics. American Mathematical Society, 1994. Barakat, Mohamed. Purity filtration and the fine structure of autonomy. In Proceedings of the 19th International Chyzak, Frédéric, Quadrat, Alban, and Robertz, Daniel. OreModules: a symbolic package for the study of multidimensional linear systems. In Applications of time delay systems, volume 352 of Lecture Notes in Control and Inform. Sci., pp. 233–264. Springer, Berlin, 2007. (http://www.mathb.rwth-aachen.de/ OreModules). Decker, Wolfram, Greuel, Gert-Martin, Pfister, Gerhard, and Schönemann, Hans. S INGULAR 4-1-0 — A computer algebra system for polynomial computations. http: //www.singular.uni-kl.de, 2016. Deisenroth, Marc Peter, Fox, Dieter, and Rasmussen, Carl Edward. Gaussian processes for data-efficient learning in robotics and control. IEEE Trans. Pattern Anal. Mach. Intell., 37(2):408–423, 2015. Dong, Kun, Eriksson, David, Nickisch, Hannes, Bindel, David, and Wilson, Andrew Gordon. Scalable log determinants for gaussian process kernel learning. 2017. (arXiv:1711.03481). Duvenaud, David. Automatic Model Construction with Gaussian Processes. PhD thesis, University of Cambridge, 2014. Algorithmic Linearly Constrained Gaussian Processes Eisenbud, David. Commutative Algebra with a View Toward Algebraic Geometry, volume 150 of Graduate Texts in Mathematics. Springer-Verlag, 1995. Garnett, Roman, Ho, Shirley, and Schneider, Jeff G. Finding galaxies in the shadows of quasars with Gaussian processes. In Bach, Francis R. and Blei, David M. (eds.), ICML, volume 37 of JMLR Workshop and Conference Proceedings, pp. 1025–1033. JMLR.org, 2015. Gerdt, Vladimir P. Involutive algorithms for computing Gröbner bases. In Computational commutative and noncommutative algebraic geometry, volume 196 of NATO Sci. Ser. III Comput. Syst. Sci., pp. 199–225. 2005. Grayson, Daniel R. and Stillman, Michael E. Macaulay2, a software system for research in algebraic geometry. http://www.math.uiuc.edu/Macaulay2/. Greuel, G. and Pfister, G. A Singular introduction to commutative algebra. Springer-Verlag, 2002. With contributions by Olaf Bachmann, Christoph Lossen and Hans Schönemann. Hensman, James, Fusi, Nicoló, and Lawrence, Neil D. Gaussian processes for big data. In Proceedings of the TwentyNinth Conference on Uncertainty in Artificial Intelligence, 2013. Lee, Jaehoon, Bahri, Yasaman, Novak, Roman, Schoenholz, Samuel S., Pennington, Jeffrey, and Sohl-Dickstein, Jascha. Deep neural networks as Gaussian processes, 2017. (arXiv:1711.00165). Macêdo, Ives and Castro, Rener. Learning divergence-free and curl-free vector fields with matrix-valued kernels. Instituto Nacional de Matematica Pura e Aplicada, Brasil, Tech. Rep, 2008. Oberst, Ulrich. Multidimensional constant linear systems. Acta Appl. Math., 20(1-2):1–175, 1990. Osborne, Michael A., Garnett, Roman, and Roberts, Stephen J. Gaussian processes for global optimization. In 3rd international conference on learning and intelligent optimization (LION3), pp. 1–15, 2009. Quadrat, Alban. An introduction to constructive algebraic analysis and its applications. In Journées Nationales de Calcul Formel, volume 1 of Les cours du CIRM, pp. 279–469. CIRM, Luminy, 2010a. (http://ccirm.cedram.org/ccirm-bin/ fitem?id=CCIRM_2010__1_2_281_0). Quadrat, Alban. Systèmes et Structures – Une approche de la théorie mathématique des systèmes par l’analyse algébrique constructive. April 2010b. Habilitation thesis. Honkela, Antti, Peltonen, Jaakko, Topa, Hande, Charapitsa, Iryna, Matarese, Filomena, Grote, Korbinian, Stunnenberg, Hendrik G., Reid, George, Lawrence, Neil D., and Rattray, Magnus. Genome-wide modeling of transcription kinetics reveals patterns of rna production delays. Proceedings of the National Academy of Sciences, 112(42):13115–13120, 2015. doi: 10.1073/pnas. 1420404112. Quadrat, Alban. Grade filtration of linear functional systems. Acta Appl. Math., 127:27–86, 2013. doi: 10.1007/s10440-012-9791-2. Izmailov, Pavel, Novikov, Alexander, and Kropotov, Dmitry. Scalable Gaussian processes with billions of inducing inputs via tensor train decomposition, 2017. (arXiv:math/1710.07324). Robertz, Daniel. Recent progress in an algebraic analysis approach to linear systems. Multidimensional Syst. Signal Process., 26(2):349–388, April 2015. doi: 10.1007/s11045-014-0280-9. Jacobson, N. The Theory of Rings. Mathematical surveys and monographs. American Mathematical Society, 1943. Seiler, Werner M. and Zerz, Eva. The inverse syzygy problem in algebraic systems theory. PAMM, 10(1):633–634, 2010. Jaynes, Edwin T. Prior probabilities. IEEE Transactions on systems science and cybernetics, 4(3):227–241, 1968. Jaynes, Edwin T. and Bretthorst, G. Larry. Probability Theory: The Logic of Science. Cambridge University Press, 2003. Jidling, Carl, Wahlström, Niklas, Wills, Adrian, and Schön, Thomas B. Linearly constrained Gaussian processes. 2017. (arXiv:1703.00787). Rasmussen, Carl Edward and Williams, Christopher K. I. Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning). The MIT Press, 2006. Simon-Gabriel, C.-J. and Schölkopf, B. Kernel distribution embeddings: Universal kernels, characteristic kernels and kernel metrics on distributions. Technical report, 2016. (arXiv:1604.05251). Snelson, Edward, Rasmussen, Carl Edward, and Ghahramani, Zoubin. Warped gaussian processes. In Thrun, Sebastian, Saul, Lawrence K., and Schlkopf, Bernhard (eds.), NIPS, pp. 337–344. MIT Press, 2003. Algorithmic Linearly Constrained Gaussian Processes Solin, Arno, Kok, Manon, Wahlström, Niklas, Schön, Thomas B., and Särkkä, Simo. Modeling and interpolation of the ambient magnetic field by Gaussian processes. 2015. (arXiv:1509.04634). Sturmfels, Bernd. What is... a Gröbner basis? Notices of the AMS, 52(10):2–3, 2005. Thewes, Silja, Lange-Hegermann, Markus, Reuber, Christoph, and Beck, Ralf. Advanced Gaussian Process Modeling Techniques. In Design of Experiments (DoE) in Powertrain Development. Expert, 2015. Titsias, Michalis K. Variational learning of inducing variables in sparse Gaussian processes. In Artificial Intelligence and Statistics 12, pp. 567–574, 2009. Treves, F. Topological Vector Spaces, Distributions and Kernels. Dover books on mathematics. Academic Press, 1967. Wahlström, Niklas, Kok, Manon, Schön, Thomas B., and Gustafsson, Fredrik. Modeling magnetic fields using Gaussian processes. In in Proceedings of the 38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2013. Wilson, Andrew G. and Adams, Ryan Prescott. Gaussian process kernels for pattern discovery and extrapolation. In ICML (3), volume 28 of JMLR Workshop and Conference Proceedings, pp. 1067–1075. JMLR.org, 2013. Wilson, Andrew G., Dann, Christoph, and Nickisch, Hannes. Thoughts on massively scalable Gaussian processes. 2015a. (arXiv:1511.01870). Wilson, Andrew G., Hu, Zhiting, Salakhutdinov, Ruslan, and Xing, Eric P. Deep kernel learning. 2015b. arXiv:1511.02222). Zerz, Eva. Topics in multidimensional linear systems theory, volume 256 of Lecture Notes in Control and Information Sciences. London, 2000. Zerz, Eva, Seiler, Werner M, and Hausdorf, Marcus. On the inverse syzygy problem. Communications in Algebra, 38 (6):2037–2047, 2010.
0math.AC
Decarbonized Demand Response for Residential Plug-in Electric Vehicles in Smart Grids Farshad Rassaei, Wee-Seng Soh and Kee-Chaing Chua arXiv:1604.00812v1 [math.OC] 4 Apr 2016 Department of Electrical and Computer Engineering National University of Singapore, Singapore Email: [email protected], {weeseng,chuakc}@nus.edu.sg Abstract—Recently, in Paris, the world has reached an agreement whereby many countries commit to bolster their efforts about reducing adverse climate changes. Hence, we can expect that decarbonization will even attract more attention in different energy sectors in near future. In particular, both generation side and consumption side are required to be run more congruently and environmentally friendly. Thus, employing the renewables at the generation side along with our proposed decarbonized demand response (DDR) at the consumption side could significantly reduce deleterious impacts on the climate. Such ambition, at the consumption side, necessitates symbiosis and synergy between the customers and the retailer, and among customers, respectively. In other words, there should be some incentive-based collaboration between customers and the retailer as well as coordination among customers to make the objective be achieved successfully. In this paper, we present such matching demand response (DR) algorithm for residential users owning vehicle-to-grid (V2G) enabled plug-in electric vehicles (PEVs) who obtain electricity from a common retailer. The retailer itself is connected to the wholesale electricity market to purchase and sell electricity. Furthermore, we explain the details of the existing symbiosis and synergy in our system. Our simulation results illustrate that substantial cost savings can be achieved along with pollution reduction by our proposed technique. Index Terms—Climate change, demand response (DR), electricity retailer, plug-in electric vehicles (PEVs), power demand elasticity, residential load, smart grids, vehicle-to-grid (V2G). I. I NTRODUCTION Climate change has become one of the major concerns worldwide. Recently, in December 2015, many countries have agreed to further enhance their efforts to confront adverse climate changes which are mainly because of tremendous green house gases (GHGs) emissions, e.g., CO2 and CH4 [1]. One of the significant reasons for GHG emissions is the transportation sector. Thus, decarbonization this sector has attracted much research, e.g, [2]–[6]. Meanwhile, plug-in electric vehicles (PEVs) are good alternatives for traditional cars to diminish carbon emissions provided their electricity consumption is managed properly. However, in the literature, PEVs’ charging and/or discharging management and scheduling are mainly investigated for cost savings purposes, e.g., [7]–[10]. In these papers, the emphasis is mostly on increasing the users’ utility, welfare, the billing strategies, etc. On the other hand, in near future, we are going to face a new paradigm in power system, e.g., new ways of electricity generation, market liberalization, storage capability, two-way Fig. 1: The United States of America GHGs emissions by sector in 2014 [13]. electricity delivery, demand side management (DSM), demand response (DR) and environmentally concious transportation [11] and [12]. Let us add the salience of decarbonization to the above list. Hence, a practical technique is incumbent to consider this new paradigm in order to be competent enough to be employed in a real-world smart grid. The share of the electricity generation and transportation sectors in GHGs emissions depend on many factors, e.g., type and age of generators, different regions, traffic congestion management, etc. It varies from one region to another one in the world. For instance, Fig. 1 illustrates the GHGs emissions by sector in 2014 in the U.S. and we can observe that the quota from electricity generation and transportation sectors stand for more than half of the overall emissions. However, we believe that minimizing and even nullifying the share of GHGs emissions from the transportation and the power generation sectors will be possible in the long run by further utilizing renewables, electromobility and proper DDR techniques. Besides, the emissions from power generators could be reduced in smart grids wherein there is high penetration of renewables and distributed generation (DG). Widespread penetration of PEVs could inherently reduce the GHGs emissions from the transportation sector. Fig. 2 shows that the share from light duty vehicles (LDV) accounts for Independent System Operator Energy Generator 1 Energy Retailer 1 The Electricity Market Energy Generator 2 Energy Retailer N Energy Generator M Fig. 2: The share of GHGs emissions in the transportation sector by mode in the U.S. [13]. Annual standard deviation of the price ($) 120 100 Day−ahead market 2014 Spot market 2014 Day−ahead market 2015 Spot market 2015 80 60 40 20 0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Time of day (Hour) Fig. 3: Annual standard deviation of the electricity price in 2014 and 2015 for each our of a day in PJM for DA and RT (spot) markets. 59%. Nonetheless, PEVs’ electricity demand adds a huge burden on the power generation side. We should note that striving to make decarbonized energy supply alone is not adequate [14] nor is electrification of transportation sector. In order to triumph in GHGs reduction, congruous DR techniques are also needed. In other words, taking into account the level of GHGs emissions for the generation and consumption sides in DR can further diminish the emissions even in an already electrificated sector. In this paper, we consider Pennsylvania-Jersey-Maryland (PJM) day-ahead (DA) and real-time (RT) electricity market. We use its pricing data for the years 2014 and 2015 [15], the average prices of electricity per MWh which has been sold over those two years are very close for both DA and RT markets in each year, i.e., $48.95 and $48.21, in 2014, and $33.94 and $33.34 in 2015, respectively. The reason for cheaper average price in 2015 compared to its antecedent year could be the unprecedented falling down of the oil price. Fig. 3 shows the annual standard deviation of electricity price in 2014 and 2015 for each hour of a day in PJM for both DA and RT (spot) markets. Although the prices are Fig. 4: An archetype of a smart electricity system encompassing several retailers, utility companies and multiple users sharing one electricity retailer or an aggregator. much cheaper in 2015, we observe that hourly pricing data for PJM’s DA and RT markets can be significantly distinct and unpredictable. Another point is that we see RT market prices has more fluctuations than the DA market, as we could expect it. Therefore, the high uncertainty, particularly in the RT market, can remarkably affect the overall electricity procurement cost for a retailer especially in the long term. This fact is much more expected when the power system is relying on a large number of intermittent energy resources with more uncertainty. The role of intelligence along with significant architectures and concepts in future power systems are reviewed in [16]. A good overview of DR and their different classifications in a deregulated electricity market is discussed in [17]. In [18], we present a statistical modelling and a closed-form expression for PEVs’ uncoordinated charging power demand. Our paper [9] proposes a decentralized demand shaping algorithm for an a priori known demand profile for the next day or for flattening the aggregated daily demand profile. In [10] we consider both DA and RT markets of PJM in our proposed DR algorithm. In this paper, for the transportation sector, by adding the significance of reducing GHGs emissions, we discuss decarbonized DR (DDR) techniques for residential users owning vehicle to grid (V2G) enabled PEVs by which we strive to decrease the emissions from the electric power sector, see Fig. 1. Hence, we contemplate lessening both carbon emissions and electricity procurement costs. II. S YSTEM M ODEL In this section, we provide the underlying model and assumptions of the power system in this paper which entails the energy markets, the electricity retailers or the aggregators, and the residential users. Similar models for future smart power systems are advocated in [8] and [19]. We discuss this model in the sequel. Fig. 4 represents our model of a smart electricity system where multiple users share one electricity retailer or an aggregator. The users’ overall load can be differentiated into two distinct types; typical household load which normally needs on-demand electricity supply, e.g. air conditioning, heating, lighting, audio visual devices, cooking and refrigerator, and PEV as a flexible or programmable load. Here, the dotted lines show the underlying information system and the solid lines represent the power transmission and distribution infrastructure. We assume that an electricity retailer (which may own its generation capacity) bids to the energy market, e.g., on a DA basis. Then, based on its energy needs and the market situation, it buys electricity from the market at market clearing prices (MCPs). Then, we assume that the retailer is willing to handle its customers’ PEVs’ electricity assignments (charging and discharging) such that the shape of the resulting aggregated power demand profile matches the electricity profile resulted from the successful bids in the DA market. This enables the retailer to minimize its demand from the RT market -which has more price volatility according to Fig. 3- for balancing the load in the following day. Accordingly, it can reduce the overall electricity procurement cost. This cost reduction makes the energy retailer afford to offer more attractive deals to the customers in the form of pricing, rewarding, promotions, etc [9]. On the other hand, we assume that there are some incentives or limits from a regulator or the government which make the retailers interested in or have to reduce the GHGs emissions. We note that the incentives and limits can be translated to payoffs and fines, in terms of fulfilment and violation, respectively. As we indicated in [10], retailers adjust their electricity deals (purchase and sell) in response to market prices. Nevertheless, the regulator can put some limits on power consumption, e.g., the mean of daily electricity consumption. This could reduce or cancel the need of turning on the traditional generators which are accounted for 30% of the GHGs emissions Fig. 1. In practice, the shaped aggregated profile does not exactly suite the retailer’s purchased DA energy profile. Thus, the retailer needs to reciprocate the load imbalances in the following day by referring to the RT market and buy electricity at RT prices. Therefore, we assume that a retailer should consider three directions when designing its DR technique: DA market, RT market and GHGs emissions. III. A NALYSIS In this section, we provide the electricity procurement cost for a retailer bidding to the electricity market and then present our proposed DDR algorithm. The overall electricity procurement cost for the next day can be formulated as follows: Cost =< lDA , pDA > + < li , pRT > = 24 X t=1 DA pDA + t lt 24 X t=1 i pRT t lt , (1) where Cost is the overall electricity procurement cost over the scheduling horizon. The 24-elements vectors lDA and pDA represent the power demand and electricity price cleared in the DA market for the following day. The units of liDA and pDA are MWh and $/MWh, respectively. Similarly, li and pRT i are load imbalance and the electricity price vectors in the RT market for the next day. The values of the elements of these two vectors will be known to the retailer only at each time slot of the next day. Then, the following sequential optimization programming technique is used. The users individually contribute in this program (see Algorithm 1): (λ < l0PEV,n , l0A,n + l0−n − ld > minimize 0 lPEV,n t0 0t0 0t0 + lA,n + lPEV,n )), +(1 − λ)(l−n (2) 0 0 t0 −1 t0 −1 1 1 [lPEV,n , · · · , lPEV,n ] = [lPEV,n , · · · , lPEV,n ], βn X 0t lPEV,n = EPEV,n − t=t0 N X tX 0 −1 t lPEV,n , (4) t=αn P24 PN t (lPEV,n (3) + t lA,n ) = 1.5 × t=1 n=1 t n=1 (lPEV,n t + lA,n ) N , ∀t, (5) 0t |lPEV,n | ≤ pmax , ∀t ∈ TP PEV,n , 0t P lPEV,n = 0, ∀t ∈ / TPEV,n , t X t=t0 −1 0k SOCPEV,n + lPEV,n ≥ 0.2 k=t0 (6) (7) × CPEV,n , ∀t ∈ TP PEV,n , (8) Here, lPEV,n and lA,n show the energy assignment vectors for user n’s PEV and the aggregated load from its household appliances, respectively. Besides, l0PEV,n and l0A,n vectors show the same things whenever load altering is needed in RT market, see Algorithm 1. Furthermore, ld is the purchased load profile from DA market. EPEV,n is the user n’s required energy to be delivered to its PEV which is associated with the total required charging time TPEV,n as follows: EPEV,n = ω × TPEV,n , (9) where ω is the charging power rate of the outlet to which it is plugged in. Likewise, αn and βn represent the arrival time and t departure time of the PEV. Furthermore, |lPEV,n | ≤ pmax limits the maximum power that can be delivered to/from the PEV, we may presume pmax = ω, and TP PEV,n describes the permissible charging time set or simply the set of time slots during the PEV’s connection time to the power grid. This is simply the set of time slots between αn and βn . Constraint (5) limits excessive power consumption at each time slot. This prevents the need to turn on or use traditional thermal generators. Additionally, l−n is the aggregated power profile from other N − 1 users in the system which is described as follows: X l−n = (lPEV,i + lA,i ). (10) i∈N i6=n Algorithm 1 Decarbonized Demand Response (DDR) 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: Fig. 5: Distributions of (a) arrival time, (b) departure time, (c) charging time and (d) initial SOC, for 1,000 electric vehicles. In (8), CPEV,n is the total storage capacity of the user n’s PEV and we assume that in case of employing V2G in the system, PEV’s state of charge (SOC) should not fall below 20% of that total capacity in order to make sure that the adverse impacts on PEV’s battery lifetime due to complete depletion are avoided. We know the fact that (li , pRT ) is unknown to the retailer a priori, at each time slot t0 of the next day after getting this information, the retailer may decide to alter the previously shaped DA demand profile. It may want to minimize its RT electricity purchase to balance the load if the RT prices rise unexpectedly and even sell back some of its pre-purchased electricity from DA market to the RT market by using the PEVs’ available demand elasticity. RT prices may fluctuate significantly due to the state of the RT market or contingencies. We should notice that in the proposed programming method λ is one for shaping the aggregated demand profile, lN , for the DA market. Then, as described in Algorithm 1, λ could take a desired value to alter the aggregated demand profile, l0N , in response to price fluctuations in the RT market. As the chances for the price to remain that high during all the next remaining hours of the day is low [20], reshaping the load profile by lowering the electricity consumption at that time slot and purchasing electricity at the further time slots can yield to a lower electricity procurement total cost in practice. This is also true for purchasing electricity at those time slots when price, unexpectedly, falls down significantly. The retailer may buy extra electricity at those specific time slots (based on the overall storage capacity coming from connected PEVs). We should note that the retailer is assumed to be allowed to employ the existing flexibility (offered by each user’s PEV) and the diversity (resulting from the users’ different usage patterns). We refer to these two as the system’s elasticity. Nevertheless, the electricity consumption behaviours of the users (their PEVs’ usage patterns) are not to be changed and hence the algorithm preserves users’ comfort. Moreover, users’ privacy is not violated as the information about their individual appliances, including PEV, is not revealed. 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: Each user initializes its respective load profile over the assignment horizon based on its power demands, i.e., ln for n = 1, . . . , N . All N users send their initialized load profiles to the retailer. while not reaching convergence do for n = 1 to N do λ is set 1 in the proposed problem. The retailer calculates the state information l−n according to (10) for user n. The retailer sends (l−n − ld ) to user n. Each user n solves the proposed problem and updates its load profile ln . User n sends back the new demand profile to the retailer. The retailer updates ln . end for end while for t = 1 to 24 do The retailer receives information from RT market, i.e., pRT t . The retailer decides whether or not it proceeds for demand altering. λ is set to a desired value in the proposed problem. while not reaching convergence do for n = 1 to N do The retailer sends demand altering signal at time slot t to user n. User n solves problem (2) and updates its load profile l0n . User n sends back the new demand profile to the retailer. The retailer updates l0n . The retailer calculates the state information l0−n according to (10) for user n. end for end while 26: end for 24: 25: The convergence criterion in Algorithm 1 can be simply assumed as a desired number of iterations of updating all users’ demand profiles or it can be determined to be lower than some pre-set mean square error (MSE) between two subsequent iterations of achieving aggregated demand profiles. As we have discussed in [9], the convergence is guaranteed to be obtained. Furthermore, users’ contribution can be modelled as a cooperative game with complete information wherein a Nash equilibrium exists [9]. IV. S IMULATION R ESULTS In this section, we evaluate and present the results of our proposed model and programming technique articulated in the previous sections through computer simulations. In the (a) 800 400 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 (b) 2400 2000 1600 1200 800 400 0 Cleared bids from DA market (kW) Power Consumption (kW) 1200 1500 1200 900 600 300 0 1 2 3 4 5 6 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Time of day (Hour) Fig. 7: The assumed electricity profile purchased by the retailer from the DA market by the bids that could be cleared. 450 RT market DA market 400 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Time of Day (Hour) Fig. 6: Electricity demand profile from (a) normal household appliances, i.e., without PEVs and (b) the overall electricity demand profile when users owns PEVs with different usage patterns based on NHTS data. simulations, we consider the number of residential users, N , to be 1,000 and the horizon for testing and evaluation is considered to be 24 hours for a DA programming scenario with a time granularity of one hour. For the PEVs usage patterns, our data and distributions are based on 2009 NHTS data [21]. Fig. 5 displays the distributions for arrival time, departure time, charging time and PEVs’ state of charge (SOC) at the arrival time. Furthermore, we considered new standard outlets, NEMA 5-15, with 1.8 kW power transfer limit. We assumed that PEVs are needed to be fully charged by their respective next departure time. Additionally, we considered 24 kWh energy storage capacity for all PEVs according to Nissan Leaf model [22]. Moreover, we adopted the PJM interconnection electricity market pricing data for both DA and RT markets in the year 2015 [15] and assumed that PEVs are all V2G enabled. Next, we examine the DDR scheme introduced in Algorithm 1. Fig. 6 shows the assumed daily aggregated electricity demand profile of the users with and without the presence of PEVs with different usage patterns based on NHTS data. Fig. 7 shows an assumed electricity profile cleared for the retailer in the DA market. In other words, it shows the bids that could be cleared in the market at different hours of the following day. The results of Algorithm 1 is depicted in Fig. 9. For this, we assumed λ = 0.5 in (2). For a particular day as an extreme example- Fig. 8 - it can be observed that at the eighth hour of the day the highest RT price occurs. Online demand altering can reduce the aggregated demand from 1258.7 kWh to 878.2 kWh, i.e., we can obtain almost %30 reduction in the overall demand at that hour. This is when the constraint (5) in the proposed programming technique and algorithm is 350 Price ($/MWh) 1600 300 250 200 150 100 50 0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Time of day (Hour) Fig. 8: DA and RT prices for 28 November 2015 in PJM Interconnection electricity market (the number of days with such black swan behaviour in 2014 and 2015 is several). not complied. In case of the absence and presence of that constraint -Decarbonization constraint- DDR algorithm results can be seen in Fig. 9. We see that the picks are curbed in Fig. 9(c). But, the power demand at eighth hour is now 985.6 kWh which cause some extra cost. This additional money could be paid back by the regulator to the retailer as subsidies for instance. In our simulations, convergence has been attained only after one single iteration of updating all users’ electricity demand profiles in Algorithm 1. TABLE I: OVERALL ENERGY PROCUREMENT COSTS FOR THE RETAILER Case Energy procurement cost ($) 1 5,382.3 2 4,463.9 3 4,149.2 4 4,262.8 Power Consumption (kW) 2000 1750 1500 1250 1000 750 500 250 0 2000 1750 1500 1250 1000 750 500 250 0 2000 1750 1500 1250 1000 750 500 250 0 (a) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 (b) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 (c) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Time of Day (Hour) Fig. 9: Aggregated power demand profiles for (a) after using DR technique in [9], (b) when the algorithm in [10] is used and (c) when the proposed DDR algorithm is employed. It should be emphasized that this could be achieved since at that hour of the day we had almost 405 V2G enabled PEVs available at users’ dwellings. Different results would be obtained for the other hours of that day. Also, it is obvious that the amount of cost savings would be dissimilar on weekdays and in the weekend. In Table I, we compare the overall electricity procurement costs for the retailer for four cases: case (1) is purchasing electricity without any DR, case (2) when DR technique in [9] is used, i.e., only DA demand shaping is implemented, case (3) when joint shaping and altering demand is applied as in [10] and case (4) when DDR is being employed. It can be seen that in the first case, when no DR method is used and the power demand is directly purchased from the RT market, total cost is the highest. For the second case, around $920 is saved and in the third case the cost is further reduced by $314.7. In the fourth case, however, when DDR is employed there is some extra cost, $113.6, because of complying with the GHGs emissions reduction in Algorithm 1. V. C ONCLUSION AND F UTURE W ORK In this paper, we proposed a fast converging and decentralized algorithm for managing V2G enabled PEVs’ electricity assignments (charging and discharging) in order to simultaneously reduce the overall electricity procurement cost and GHGs emission for electricity retailers. We illustrated that with some incentives and/or regulations from the regulator, the retailer or aggregator could help lessening GHGs emissions by using our proposed decarbonized demand response (DDR) technique. In this work, we emphasised on the importance of considering decarbonization in DR algorithms for PEVs. However, various other combinatorial optimization methods could be investigated. Furthermore, regional GHGs emission factors can be captured into the evaluations in practice. R EFERENCES [1] E. Burleson, “Paris agreement and consensus to address climate challenge,” ASIL INSIGHT, Forthcoming, 2016. [2] H. Zhang, W. Chen, and W. Huang, “Times modelling of transport sector in china and usa: Comparisons from a decarbonization perspective,” Applied Energy, vol. 162, pp. 1505–1514, 2016. [3] K. C. Hargroves, C. Desha, and E. von Weisaecker, “Introducing carbon structural adjustment: energy productivity and decarbonization of the global economy,” Wiley Interdisciplinary Reviews: Energy and Environment, vol. 5, no. 1, pp. 57–67, 2016. [Online]. Available: http://dx.doi.org/10.1002/wene.181 [4] J. Liu and G. Santos, “Decarbonizing the road transport sector: breakeven point and consequent potential consumers’ behavior for the us case,” International Journal of Sustainable Transportation, vol. 9, no. 3, pp. 159–175, 2015. [5] K. B. Abdallah, M. Belloumi, and D. De Wolf, “International comparisons of energy and environmental efficiency in the road transport sector,” Energy, vol. 93, pp. 2087–2101, 2015. [6] S. Mittal, H. Dai, and P. Shukla, “Low carbon urban transport scenarios for china and india: A comparative assessment,” Transportation Research Part D: Transport and Environment, 2015. [7] B. G. Kim, S. Ren, M. van der Schaar, and J. W. Lee, “Bidirectional energy trading and residential load scheduling with electric vehicles in the smart grid,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, pp. 1219–1234, Jul. 2013. [8] A. H. Mohsenian-Rad, V. Wong, J. Jatskevich, R. Schober, and A. Leon-Garcia, “Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid,” IEEE Transactions on Smart Grid, vol. 1, no. 3, pp. 320 –331, Dec. 2010. [9] F. Rassaei, W. S. Soh, and K. C. Chua, “Demand response for residential electric vehicles with random usage patterns in smart grids,” Sustainable Energy, IEEE Transactions on, vol. 6, no. 4, pp. 1367–1376, Oct 2015. [10] ——, “Joint shaping and altering the demand profile by residential plugin electric vehicles for forward and spot markets in smart grids,” in Smart Grid Technologies - Asia (ISGT ASIA), 2015 IEEE Innovative, Nov 2015, pp. 1–6. [11] C. Marnay, “Challenges of supply: An evolving energy paradigm [in my view],” Power and Energy Magazine, IEEE, vol. 11, no. 5, pp. 104–100, 2013. [12] M. Kutz, Environmentally conscious transportation. Wiley Online Library, 2008, vol. 1. [13] Center for climate change and energy solutions). [Online]. Available: http://www.c2es.org/facts-figures/us-emissions. [14] J. H. Williams, A. DeBenedictis, R. Ghanadan, A. Mahone, J. Moore, W. R. Morrow, S. Price, and M. S. Torn, “The technology path to deep greenhouse gas emissions cuts by 2050: the pivotal role of electricity,” science, vol. 335, no. 6064, pp. 53–59, 2012. [15] Pennsylvania–jersey–maryland (PJM) interconnection. [Online]. Available: http://www.pjm.com/markets-and-operations/etools/data-miner. aspx. [16] T. Strasser, F. Andren, J. Kathan, C. Cecati, C. Buccella, P. Siano, P. Leitao, G. Zhabelova, V. Vyatkin, P. Vrba et al., “A review of architectures and concepts for intelligence in future electric energy systems,” Industrial Electronics, IEEE Transactions on, vol. 62, no. 4, pp. 2424–2438, 2015. [17] M. H. Albadi and E. El-Saadany, “A summary of demand response in electricity markets,” Electric Power Systems Research, vol. 78, no. 11, pp. 1989–1996, 2008. [18] F. Rassaei, W. S. Soh, and K. C. Chua, “A statistical modelling and analysis of residential electric vehicles’ charging demand in smart grids,” in Innovative Smart Grid Technologies Conference (ISGT), 2015 IEEE Power Energy Society, Feb 2015, pp. 1–5. [19] Y. Liu, C. Yuen, S. Huang, N. Ul Hassan, X. Wang, and S. Xie, “Peakto-average ratio constrained demand-side management with consumer’s preference in residential smart grid,” Selected Topics in Signal Processing, IEEE Journal of, vol. 8, no. 6, pp. 1084–1097, Dec 2014. [20] J. M. Poterba and L. H. Summers, “Mean reversion in stock prices: Evidence and implications,” Journal of financial economics, vol. 22, no. 1, pp. 27–59, 1988. [21] National household travel survey (2009). [Online]. Available: http: //nhts.ornl.gov. [22] Nissan Leaf. [Online]. Available: http://www.nissanusa.com/ electric-cars/leaf.
5cs.CE
Recursive Sampling for the Nyström Method arXiv:1605.07583v5 [cs.LG] 3 Nov 2017 Cameron Musco MIT [email protected] Christopher Musco MIT [email protected] November 6, 2017 Abstract We give the first algorithm for kernel Nyström approximation that runs in linear time in the number of training points and is provably accurate for all kernel matrices, without dependence on regularity or incoherence conditions. The algorithm projects the kernel onto a set of s landmark points sampled by their ridge leverage scores, requiring just O(ns) kernel evaluations and O(ns2 ) additional runtime. While leverage score sampling has long been known to give strong theoretical guarantees for Nyström approximation, by employing a fast recursive sampling scheme, our algorithm is the first to make the approach scalable. Empirically we show that it finds more accurate, lower rank kernel approximations in less time than popular techniques such as uniformly sampled Nyström approximation and the random Fourier features method. 1 Introduction The kernel method is a powerful tool for applying linear learning algorithms (SVMs, linear regression, etc.) to nonlinear problems. The key idea is to map data to a higher dimensional kernel feature space, where linear relationships correspond to nonlinear relationships in the original data. Typically this mapping is implicit. A kernel function is used to compute inner products in the high-dimensional kernel space, without ever actually mapping original data points to the space. Given n data points x1 , . . . , xn , the n × n kernel matrix K is formed where Ki,j contains the highdimensional inner product between xi and xj , as computed by the kernel function. All computations required by a linear learning method are performed using the inner product information in K. Unfortunately, the transition from linear to nonlinear comes at a high cost. Just generating the entries of K requires Θ(n2 ) time, which is prohibitive for large datasets. 1.1 Kernel approximation A large body of work seeks to accelerate kernel methods by finding a compressed, often lowrank, approximation K̃ to the true kernel matrix K. Techniques include random sampling and embedding [AMS01, BBV06, ANW14], random Fourier feature methods for shift invariant kernels [RR07, RR09, LSS13], and incomplete Cholesky factorization [FS02, BJ02]. One of the most popular techniques is the Nyström method, which constructs K̃ using a subset of “landmark” data points [WS01]. Once s data points are selected, K̃ (in factored form) takes just O(ns) kernel evaluations and O(s3 ) additional time to compute, requires O(ns) space to store, and can be manipulated quickly in downstream applications. E.g., inverting K̃ takes O(ns2 ) time. The Nyström method performs well in practice [YLM+ 12, GM13, TRVR16], is widely implemented [HFH+ 09, PVG+ 11, IBM14], and is used in many applications under different names such as “landmark isomap” [DST03] and “landmark MDS” [Pla05]. In the classic variant, landmark points are selected uniformly at random. However, significant research seeks to improve performance via data-dependent sampling that selects landmarks which more closely approximate the full kernel matrix than uniformly sampled ones [SS00, DM05, ZTK08, BW09, KMT12, WZ13, GM13, LJS16]. Theoretical work has converged on leverage score based approaches, as they give the strongest provable guarantees for both kernel approximation [DMM08, GM13] and statistical performance in downstream applications [AM15, RCR15, Wan16]. Leverage scores capture how important an individual data point is in composing the span of the kernel matrix. Unfortunately, these scores are prohibitively expensive to compute. All known approximation schemes require Ω(n2 ) time or assume strong conditions on K – e.g. good conditioning or data “incoherence” [DMIMW12, GM13, AM15, CLV16]. Hence, leverage score-based approaches remain largely in the domain of theory, with limited practical impact [KMT12, LBKL15, YPW15]. 1.2 Our contributions In this work, we close the gap between strong approximation bounds and efficiency: we present a new Nyström algorithm based on recursive leverage score sampling which achieves the “best of both worlds”: it produces kernel approximations provably matching the accuracy of leverage score methods while only requiring O(ns) kernel evaluations and O(ns2 ) runtime for s landmark points. Theoretically, this runtime is surprising. In the typical case when s ≪ n, the algorithm evaluates just a small subset of K, ignoring most of the kernel space inner products. Yet its performance 1 guarantees hold for general kernels, requiring no assumptions on coherence or regularity. Empirically, the runtime’s linear dependence on n means that our method is the first leverage score algorithm that can compete with the most commonly implemented techniques, including the classic uniform sampling Nyström method and random Fourier features sampling [RR07]. Since our algorithm obtains higher quality samples, we show experimentally that it outperforms these methods on benchmark datasets – it can obtain as accurate a kernel approximation in significantly less time. As a bonus, our approximations have lower rank, so they can be stored in less space and processed more quickly in downstream learning tasks. 1.3 Paper outline Our recursive sampling algorithm is built on top of a Nyström scheme of Alaoui and Mahoney that samples landmark points based on their ridge leverage scores [AM15]. After reviewing preliminaries in Section 2, in Section 3 we analyze this scheme, which we refer to as RLS-Nyström. To simplify prior work, which studies the statistical performance of RLS-Nyström for specific kernel learning tasks [AM15, RCR15, Wan16], we prove a strong, application independent approximation guarantee: for any λ, if K̃ is constructed with s = Θ(dλeff log dλeff ) samples1 , where dλeff = tr(K(K + λI)−1 ) is the so-called “λ-effective dimensionality” of K, then with high probability, kK − K̃k2 ≤ λ. In Appendix C, we show that this guarantee implies prior results on the statistical performance of RLS-Nyström for kernel ridge regression and canonical correlation analysis. We also use it to prove new results on the performance of RLS-Nyström for kernel rank-k PCA and k-means clustering – in both cases just O(k log k) samples are required to give a solution with good accuracy. After affirming the favorable theoretical properties of RLS-Nyström, in Section 4 we show that its runtime can be significantly improved using a recursive sampling approach. Intuitively our algorithm is simple. We show how to approximate the kernel ridge leverage scores using a uniform sample of 21 of our input points. While the subsampled kernel matrix still has a prohibitive n2 /4 entries, we can recursively approximate it, using our same sampling algorithm. If our final Nyström approximation will use s landmarks, the recursive approximation only needs rank O(s), which lets us estimate the ridge leverage scores of the original kernel matrix O(ns2 ) time. Since n   in just 2 ns2 ns 2 is cut in half at each level of recursion, our total runtime is O ns + 2 + 4 + ... = O(ns2 ), significantly improving upon the method of [AM15], which takes Θ(n3 ) time in the worst case. Our approach builds on recent work on iterative sampling methods for approximate linear algebra [CLM+ 15, CMM17]. While the analysis in the kernel setting is technical, our final algorithm is simple and easy to implement. We present and test a parameter-free variation of Recursive RLSNyström in Section 5, confirming superior performance compared to existing methods. 2 Preliminaries Consider an input space X and a positive semidefinite kernel function K : X × X → R. Let F be an associated reproducing kernel Hilbert space and φ : X → F be a (typically nonlinear) feature map such that for any x, y ∈ X , K(x, y) = hφ(x), φ(y)iF . Given a set of n input points x1 , . . . , xn ∈ X , define the kernel matrix K ∈ Rn×n by Ki,j = K(xi , xj ). It will often be natural to consider the kernelized data matrix that generates K. Informally, ′ let Φ ∈ Rn×d be the matrix containing φ(x1 ), ..., φ(xn ) as its rows (note that d′ may be infinite). 1 O(dλeff log dλeff ) samples is within a log factor of the best possible for any low-rank approximation with error λ. 2 K = ΦΦT . While we use Φ for intuition, in our formal proofs we replace it with any matrix B ∈ Rn×n satisfying BBT = K (e.g. a Cholesky factor). We repeatedly use the singular value decomposition, which allows us to write any rank r matrix M ∈ Rn×d as M = UΣVT , where U ∈ Rn×r and V ∈ Rd×r have orthogonal columns (the left and right singular vectors of M), and Σ ∈ Rr×r is a positive diagonal matrix containing the singular values: σ1 (M) ≥ σ2 (M) ≥ . . . ≥ σr (M) > 0. M’s pseudoinverse is given by M+ = VΣ−1 UT . 2.1 Nyström approximation The Nyström method selects a subset of “landmark” points and uses them to construct a low-rank approximation to K. Given a matrix S ∈ Rn×s that has a single entry in each column equal to 1 so that KS is a subset of s columns from K, the associated Nyström approximation is: K̃ = KS(ST KS)+ ST K. (1) K̃ can be stored in O(ns) space by separately storing KS ∈ Rn×s and (ST KS)+ ∈ Rs×s . Furthermore, the factors can be computed using just O(ns) evaluations of the kernel inner product to form KS and O(s3 ) time to compute (ST KS)+ . Typically s ≪ n so these costs are significantly lower than the cost to form and store the full kernel matrix K. We view Nyström approximation as a low-rank approximation to the dataset in feature space. Recalling that K = ΦΦT , S selects s kernelized data points ST Φ and we approximate Φ using its ′ ′ projection onto these points. Informally, let PS ∈ Rd ×d be the orthogonal projection onto the row def span of ST Φ. We approximate Φ by Φ̃ = ΦPS . We can write PS = ΦT S(ST ΦΦT S)+ ST Φ. Since it is an orthogonal projection, PS PTS = P2S = PS , and so we can write:  K̃ = Φ̃Φ̃T = ΦP2S ΦT = Φ ΦT S(ST ΦΦT S)+ ST Φ ΦT = KS(ST KS)+ ST K. This recovers the standard Nyström approximation (1). Note that we present the above for intuition and do not rigorously handle possibly infinite dimensional feature spaces. To formalize the argument, replace Φ with any B ∈ Rn×n satisfying BBT = K. 3 The RLS-Nyström method We now introduce the RLS-Nyström method, which uses ridge leverage score sampling to select landmark data points, and discuss its strong approximation guarantees for any kernel matrix K. 3.1 Ridge leverage scores In classical Nyström approximation (1), S is formed by sampling data points uniformly at random. Uniform sampling can work in practice, but it only gives theoretical guarantees under strong regularity or incoherence assumptions on K [Git11]. It will fail for many natural kernel matrices where the relative “importance” of points is not uniform across the dataset For example, imagine a dataset where points fall into several clusters, but one of the clusters is much larger than the rest. Uniform sampling will tend to oversample landmarks from the large cluster while undersampling or possibly missing smaller but still important clusters. Approximation of K and learning performance (e.g. classification accuracy) will decline as a result. 3 (a) Uniform landmark sampling. (b) Improved landmark sampling. Figure 1: Uniform sampling for Nyström approximation can oversample from denser parts of the dataset. A better Nyström scheme will select points that more equally cover the relevant data. To combat this issue, alternative methods compute a measure of point importance that is used to select landmarks. For example, one heuristic applies k-means clustering to the input and takes the cluster centers as landmarks [ZTK08]. A large body of theoretical work measures importance using variations on the statistical leverage scores. One natural variation is the ridge leverage score: Definition 1 (Ridge leverage scores [AM15]). For any λ > 0, the λ-ridge leverage score of data point xi with respect to the kernel matrix K is defined as def liλ (K) = K(K + λI)−1  i,i , (2) where I is the n × n identity matrix. For any B ∈ Rn×n satisfying BBT = K, we can also write liλ (K) = bTi (BT B + λI)−1 bi , (3) where bTi ∈ R1×n is the ith row of B. For conciseness we write liλ (K) as liλ and include the argument only when referring to the ridge note that leverage scores of a kernel matrix other than  K. To check that (2) and (3) are equivalent T T −1 T −1 T T bi (B B+λI) bi = B(B B + λI) B i,i . Using the SVD to write B = UΣV and accordingly −1 T K = UΣ2 UT confirms that K(K + λI)−1 = B(BT B + λI)−1 BT = UΣ2 Σ2 + λI U . + It’s not hard to check (see [CLM 15]) that the ridge scores can be defined alternatively as: liλ = minn y∈R 1 T kb − yT Bk22 + kyk22 . λ i (4) This formulation provides better insight into the meaning of these scores. Since BBT = K, any kernel learning algorithm effectively performs linear learning with B’s rows as data points. So the ridge scores should reflect the relative importance or uniqueness of these rows. From (4) it’s clear that liλ ≤ 1 since we can set y to the ith standard basis vector. A row bTi will have ridge score ≪ 1 (i.e. is less important) when it’s possible to find a more “spread out” y that uses other rows in B to approximately reconstruct bTi – in other words when the row is less unique. 4 3.2 Sum of ridge leverage scores As is standard in leverage score methods, we don’t directly select landmarks to be the points with the highest scores. Instead, we sample each point with probability proportional to liλ . I.e. if a point has the highest possible ridge leverage score of 1, we will select it with probability 1 to be a landmark. If a point has leverage score 1/100, we select it with probability 1/100.2 Accordingly, the number of landmarks selected, which controls K̃’s rank, is a random variable with expectation equal to the sum of the λ-ridge leverage scores. To ensure compact kernel approximations, we want this sum to be small. Immediately from Definition 1, we have: Fact 2 (Ridge leverage scores sum to the effective dimension). n X liλ (K) = tr(K(K + λI)−1 ). (5) i=1 tr(K(K + λI)−1 ) is a natural quantity, called the “effective dimension” or “degrees of freedom” for a ridge regression problem on K with regularization λ [HTF02, Zha06]. We use the notation: def dλeff = tr(K(K + λI)−1 ). (6) dλeff increases monotonically as λ decreases. For any fixed λ it is essentially the smallest possible rank achievable for K̃ satisfying the approximation guarantee given by RLS-Nyström: kK − K̃k2 < λ. 3.3 The basic sampling algorithm We can now introduce the RLS-Nyström method of Alaoui and Mahoney as Algorithm 1. Our pseudocode allows sampling each point by any probability greater than liλ . This is useful later when we compute ridge leverage scores approximately. Naturally, oversampling landmarks can only improve K̃’s accuracy. It could cause us to take more samples, but we will always ensure that the sum of our approximate ridge leverage scores is not much higher than that of the exact scores. Algorithm 1 RLS-Nyström Sampling input: x1 , . . . , xn ∈ X , kernel matrix K, ridge parameter λ > 0, failure probability δ ∈ (0, 1/8) output: kernel approximation K̃ ˜lλ > lλ for the λ-ridge leverage score of each x1 , . . . , xn 1: Compute an over-approximation, io i n P 2: Set pi := min 1, ˜ lλ · 16 log( ˜ lλ /δ) . i i Construct S ∈ Rn×s by sampling x1 , . . . , xn each independently with probability pi . In other words, for each i add a column to S with a 1 in position i with probability pi . 4: return the Nyström factors KS ∈ Rn×s and (ST KS)+ ∈ Rs×s . 3: Note that this implementation of RLS-Nyström Sampling does not form K̃ explicitly in Step 4, as this would take space and time quadratic in n. It simply returns the factors KS ∈ Rn×s and (ST KS)+ ∈ Rs×s . Any kernel learning method can then access K̃ implicitly. For example, the kernel method can be implemented as a linear method run on the n × s matrix KS(ST KS)+/2 whose rows serves as a compression of the data points in kernel space 2 To ensure concentration in our sampling algorithm, we will actually take points with probability qliλ where q is a small oversampling parameter. 5 3.4 Accuracy bounds Like other leverage scores methods, RLS-Nyström sampling is appealing because it provably approximates any kernel matrix. In particular, we show that the algorithm produces a K̃ which spectrally approximates K up to a small additive error. This is the strongest type of approximation offered by any known Nyström method [GM13] and, importantly, it guarantees that K̃ will provide provable accuracy when used in place of K in many downstream machine learning applications. Theorem 3 (Spectral error approximation). For any P λ > 0 and δ ∈ (0, 1/8), Algorithm 1 returns an S ∈ Rn×s such that with probability 1 − δ, s ≤ 2 i pi and K̃ = KS(ST KS)+ ST K satisfies: K̃  K  K̃ + λI. When ridge scores are computed exactly, P (7)   λ log(dλ /δ) . p = O d i i eff eff  denotes the standard Loewner matrix ordering on positive semi-definite matrices3 . Note that (7) immediately implies the well studied (see e.g [GM13]) spectral norm guarantee, kK − K̃k2 ≤ λ. Intuitively, Theorem 3 guarantees that the K̃ produced by RLS-Nyström well approximates the top of K’s spectrum (i.e. any eigenvalues > λ) while allowing it to lose information about smaller eigenvalues, which are less important for many learning tasks. Proof. It is clear from the view of Nyström approximation as a low-rank projection of the kernelized data (see Section 2.1) that K̃  K. Formally, for any B ∈ Rn×n with BBT = K: K̃ = KS(ST KS)+ ST K = BPS BT , where PS = BT S(ST BBT S)+ ST B is the orthogonal projection onto the row span of ST B. Since PS is a projection kPS k2 ≤ 1. So, for any x ∈ Rn : xT K̃x = xT BPS Bx = kPS Bxk22 ≤ kBxk22 = xT Kx, which is equivalent to K̃  K. It remains to show that K  K̃ + λI. In Lemma 11, Appendix A, we apply a matrix Bernstein bound [Tro15] to prove that, when S’s columns are reweighted by the inverse of their sampling probabilities, with probability 1 − δ/2:   1 3 BT B + λI  BT SST B + λI  BT B + λI . 2 2 It is not hard to show (Corollary 13, Appendix A) that even if S is unweighted, as in Algorithm 1, this bound implies the existence of some finite scaling factor C > 0 such that: BT B  C · BT SST B + λI. (8) Let P̄S = I − PS be the projection onto the complement of the row span of ST B. By (8): P̄S BT BP̄S  C · P̄S BT SST BP̄S + λP̄S IP̄S . 3 M  N means that N − M is positive semidefinite. 6 (9) Since P̄S projects to the complement of the row span of ST B, ST BP̄S = 0. So (9) gives: P̄S BT BP̄S  0 + λP̄S IP̄S  λI. In other notation, kP̄S BT BP̄S k2 ≤ λ. This in turn implies kBP̄S BT k2 ≤ λ and hence: BP̄S BT = B(I − PS )BT  λI. Rearranging and using K = BBT and K̃ = BPS BT gives theP result. A Chernoff bound (see Lemma 11, Appendix A), gives that with probability 1 − δ/2, s ≤ 2 i pi , completing the theorem. Often a regularization parameter λ is specified for a learning task, and for near optimal performance on this task, we set the approximation factor in Theorem 3 to ǫλ. In this case we have: 1 Corollary 4 (Tighter spectral error approximation). For any λ > 0 and δ ∈ (0, 1/8),Algorithm  run with ridge parameter ǫλ returns S ∈ Rn×s such that with probability 1 − δ, s = O dλ eff ǫ log dλ eff δǫ and K̃ = KS(ST KS)+ ST K satisfies K̃  K  K̃ + ǫλI. −1  1 (K + λI)−1 . λ Proof. This follows from Theorem 3 by noting dǫλ eff ≤ deff /ǫ since (K + ǫλI) ǫ Corollary 4 is sufficient to prove that K̃ can be used in place of K without sacrificing performance on kernel ridge regression and canonical correlation tasks (see [AM15] and [Wan16]). We also use it to prove a projection-cost preservation guarantee (Theorem 14, Appendix B). Specifically, we show that if O((k log k)/ǫ) landmarks are sampled with an appropriately chosen ridge parameter λ, then for any rank-k projection matrix X, K̃ will satisfy, for some fixed c > 0: tr(K − XKX) ≤ tr(K̃ − XK̃X) + c ≤ (1 + ǫ) tr(K − XKX). (10) (10) allows us to prove approximation guarantees for kernel PCA and k-means clustering. Projectioncost preservation has proven a powerful concept in the matrix sketching literature [FSS13, CEM+ 15, CMM17, BWZ16, CW17]. We hope that an explicit guarantee for kernels will lead to applications of RLS-Nyström beyond those considered in this work. Our results on downstream learning bounds that can be derived from Theorem 3 are summarized in Table 1. Details can be found in Appendices B and C. 4 Recursive sampling for efficient RLS-Nyström Having established strong approximation guarantees for RLS-Nyström, it remains to provide an efficient implementation. Specifically, Step 1 of Algorithm 1 naively requires Θ(n3 ) time. We show that significant acceleration is possible using a recursive sampling approach, which is adapted from techniques developed in [CLM+ 15] and [CMM17]. 4.1 Ridge leverage score approximation via uniform sampling The key idea is to approximate the ridge leverage scores of K using a uniform sample of the data points. To ensure accuracy, the sample must be large – a constant fraction of the points. We later show how to recursively approximate this large sample to achieve our final runtimes. We first prove: 7 Application Kernel Ridge Regression w/ Parameter λ Kernel k-means Clustering Rank k Kernel PCA Kernel CCA w/ Regularization Params λx , λy ∗ Downstream Guarantee Relevant Theorem Space to store K̃ Time to compute K̃ (1 + ǫ) relative error risk bound Thm 15 Õ( (1 + ǫ) relative error Thm 16 Õ( nk ǫ ) nk Õ( nk ǫ2 ) + Õ( ǫ ) kernel evals. (1 + ǫ) relative Frobenius norm error Thm 17 Õ( nk ǫ ) nk Õ( nk ǫ2 ) + Õ( ǫ ) kernel evals. Õ( ndλ eff ǫ ) Õ( ndλ eff ǫ 2 n(dλ eff ) )+ ǫ2 ) kernel evals. 2 2 λ ǫ additive error to canonical correlation λ Thm 18 ndλx +nd y Õ( eff ǫ eff ) x )2 +n(d y )2 n(dλ eff eff )+ ǫ2 λy λx ndeff +ndeff Õ( ) kernel evals. ǫ Õ( For conciseness, Õ(·) hides log factors in the failure probability, deff , and k. Table 1: Downstream guarantees for K̃ obtained from RLS-Nyström (Algorithm 1). For all problems, the runtime and space cost depends linearly on the number of training data points n. Lemma 5. For any B ∈ Rn×n with BBT = K and S ∈ Rn×s chosen by sampling each data point independently with probability 1/2, let ˜lλ = bT (BT SST B + λI)−1 bi i i (11) P and pi = min{1, 16˜liλ log( i ˜liλ /δ)} for any δ ∈ (0, 1/8). Then with probability at least 1 − δ: 1. l˜iλ ≥ liλ for all i. P P λ P λ 2. i pi ≤ 64 i li log( i li /δ). The first condition ensures that the approximate scores ˜liλ suffice for use in Algorithm 1. The second ensures that the Nyström approximation obtained will have, up to constant factors, the same size as if we used the true ridge leverage scores. Note that it is not obvious how to compute ˜lλ using the formula in (11) without explicitly forming B. We discuss how to do this in Section 4.2. i Proof. The first bound follows trivially since BT SST B  BT B so: ˜lλ = bT (BT SST B + λI)−1 bi ≥ bT (BT B + λI)−1 bi = lλ . i i i i The challenge is the second bound. The key observation is that there exists a diagonal reweighting def 1 matrix W ∈ Rn×n , 0  W  I such that for all i, liλ (WKW) ≤ α where α = 12 · 16 log(P . This lλ /δ) i ensures that uniformly sampling rows with probability 1/2 from the reweighted is a P λ kernel P WKW λ valid ridge leverage score sampling. Additionally, |{i : Wi,i < 1}| ≤ 32 log( li /δ) · li . That is, we do not need to reweight too many columns to achieve the ridge leverage score bound. Although W is never actually computed, its existence can be proved algorithmically: we can construct a valid W by iteratively considering any i with liλ (WKW) ≥ α. Since λ > 0, it is always possible to decrease the ridge leverage score to exactly α by decreasing Wi,i sufficiently. It is clear from the interpretation of Definition 1 given in (4) that decreasing Wi,i , which corresponds to decreasing the weight of row i of B, only increases the ridge leverage scores of other 8 rows. So, any reweighted row will always maintain leverage score ≥ α as other rows are reweighted. Theorem 2 of [CLM+ 15] demonstrates rigorously that the reweighted rows’ leverage scores in fact converge to α. Further, since W  I, it is simple to show (see Lemma 19, Appendix D.1): X i liλ (WKW) ≤ X def liλ (K) = i X liλ . i Thus, since each reweighted row has liλ (WKW) ≥ α, α · |{i : Wi,i < 1}| ≤ |{i : Wi,i < 1}| ≤ We can now bound Since liλ (WKW) ≤ 12 · P i pi . For any 1 P for 16 log( liλ /δ) P λ i li and so: X  X 1X λ li = 32 log liλ /δ · liλ . α i i that is reweighted by W we just trivially bound pi ≤ 1. all i, and since S samples each i with probability 1/2, by the matrix Bernstein bound of Lemma 11, with probability 1 − δ/2: 1 T 2 3 (B W B + λI)  (BT WSST WB + λI)  (BT W2 B + λI). 2 2 Hence: ˜lλ = bT (BT SST B + λI)−1 bi ≤ bT (BT WSST WB + λI)−1 bi i i i ≤ 2bTi (BT W2 B + λI)−1 bi = 2liλ (WBBT W) = 2liλ (WKW). Again using that W  I and Lemma 19, X i pi = X P ˜λ {i:Wi,i =1} li pi + {i:Wi,i <1} ≤2 X {i:Wi,i =1} ≤ |{i : Wi,i < 1}| + 32 log = 64 log 4.2 X liλ /δ pi P X  X · liλ . λ i li . Overall:  X liλ /δ · liλ i i Computing ridge leverage scores from a sample In order to utilize Lemma 5 we must show how to efficiently compute ˜liλ via formula (11) without explicitly forming either K or B. We prove the following: Lemma 6. For any sampling matrix S ∈ Rn×s , and any λ > 0: −1 T  1 T T T T −1 ˜lλ def S K K − KS S KS + λI . = b (B SS B + λI) b = i i i λ i,i It follows that we can compute ˜liλ for all i in O(ns2 ) time using just O(ns) kernel evaluations, to compute KS and the diagonal of K. 9 Proof. Using the SVD write ST B = ŪΣ̄V̄T . V̄ ∈ Rn×s forms an orthonormal basis for the row span of ST B. Let V̄⊥ be span for the nullspace of ST B. Then we can rewrite ˜liλ as: ˜lλ = bT BT SST B + λI i i −1 T    bi = bTi V̄, V̄⊥ (Σ̄2 + λI)−1 V̄, V̄⊥ bi . Here we abuse notation a by letting Σ̄ represent an n × n diagonal matrix whose first s entries are the singular values of ST B and whose remaining entries are all equal to 0. Now:     ˜lλ = bT V̄, V̄⊥ (Σ̄2 + λI)−1 V̄, V̄⊥ T bi = 1 bT V̄T V̄⊥ bi + bT V̄(Σ̄2 + λI)−1 V̄T bT . i i i i λ i ⊥ (12) Focusing on the second term of (12),  1 I − Σ̄2 (Σ̄2 + λI)−1 V̄T bi λ  1 T 1 = bi V̄V̄T bi − bTi V̄ Σ̄2 (Σ̄2 + λI)−1 V̄T bi . λ λ bTi V̄(Σ̄2 + λI)−1 V̄T bi = bTi V̄ (13) Focusing on the second term of (13),  bTi V̄ Σ̄2 (Σ̄2 + λI)−1 V̄T bi = bTi V̄Σ̄ŪT Ū(Σ̄2 + λI)−1 ŪT ŪΣ̄V̄T bTi = bTi BT S(ST KS + λI)−1 ST Bbi . Substituting back into (13) and then (12), we conclude that: ˜lλ = 1 bT V̄T V̄⊥ bi + 1 bT V̄V̄T bi − 1 bT BT S(ST KS + λI)−1 ST Bbi i λ i ⊥ λ i λ i 1 1 = bTi bi − bTi BT S(ST KS + λI)−1 ST Bbi λ λ −1 T  1 1 = Ki,i − S K KS ST KS + λI . λ λ i,i We can compute (ST KS+λI)−1 in O(s3 ) ≤ O(ns2 ) time and O(s2 ) ≤ O(ns) kernel evaluations. −1 T S K requires just O(ns) Given this inverse, computing the diagonal entries of KS ST KS + λI 2 kernel evaluations to form KS and O(ns ) time to perform the necessary multiplications. Finally, computing the diagonal entries of K requires n additional kernel evaluations. 4.3 Recursive RLS-Nyström We are finally ready to use Lemmas 5 and 6 to give an efficient recursive method for ridge leverage score Nyström approximation. We show that the output of Algorithm 2, S, is sampled according to approximate ridge leverage scores for K and so satisfies the approximation bound of Theorem 3. Theorem 7 (Main Result). Let S ∈ Rn×s be computed by Algorithm 2. With probability 1 − 3δ, s ≤ 384 · dλeff log(dλeff /δ), S is sampled by overestimates of the λ-ridge leverage scores of K, and thus by Theorem 3, the Nyström approximation K̃ = KS(ST KS)+ ST K satisfies: K̃  K  K̃ + λI. Algorithm 2 uses O(ns) kernel evaluations and O(ns2 ) computation time. 10 Algorithm 2 RecursiveRLS-Nyström. input: x1 , . . . , xm ∈ X , kernel function K : X × X → R, ridge λ > 0, failure prob. δ ∈ (0, 1/32) output: weighted sampling matrix S ∈ Rm×s 1: if m ≤ 192 log(1/δ) then 2: return S := Im×m . 3: end if 4: Let S̄ be a random subset of {1, ..., m}, with each i included independently with prob. 12 . ⊲ Let X̄ = {xi1 , xi2 , ..., xi|S̄ | } for ij ∈ S̄ be the data sample corresponding to S̄. ⊲ Let S̄ = [ei1 , ei2 , ..., ei|S̄| ] be the sampling matrix corresponding to S̄. S̃ := RecursiveRLS-Nyström(X̄, K, λ, δ/3). Ŝ := S̄ · S̃.    −1 3 7: Set ˜ liλ := 2λ K − KŜ ŜT KŜ + λI ŜT K 5: 6: i,i for each i ∈ {1, . . . , m} . ⊲ By Lemma 6, equals 23 (B(BT ŜŜT B+λI)−1 BT )i,i . K denotes the kernel matrix for datapoints {x1 , . . . , xm } and kernel function K. P 8: Set pi := min{1, ˜ liλ · 16 log( ˜liλ /δ)} for each i ∈ {1, . . . , m} . 9: Initially set weighted sampling matrix S to be empty. For each i ∈ {1, . . . , m}, with probability pi , append the column √1pi ei onto S. 10: return S. √ Note that in Algorithm 2 the columns of S are weighted by 1/ pi . The Nyström approximation K̃ = KS(ST KS)+ ST K is not effected by column weights (see derivation in Section 2.1). However, weighting is necessary when the output is used in recursive calls (i.e., when S̃ is used in Step 6). We prove Theorem 7 via the following intermediate result: Theorem 8. For any inputs x1 , . . . , xm , K, λ > 0 and δ ∈ (0, 1/32), let K be the kernel matrix for x1 , . . . , xm and kernel function K and let dλeff (K) be the effective dimension of K with parameter λ. With probability (1 − 3δ), RecursiveRLS-Nyström outputs S with s columns that satisfies: 3 1 T (B B + λI)  (BT SST B + λI)  (BT B + λI) 2 2 for any B with BBT = K. (14) def Additionally, s ≤ smax (dλeff (K), δ) where smax (w, z) = 384 · (w + 1) log ((w + 1)/z). The algorithm uses ≤ c1 msmax (dλeff (K), δ) kernel evaluations and ≤ c2 msmax (dλeff (K), δ)2 additional computation time where c1 and c2 are fixed universal constants. Proof. RecursiveRLS-Nyström is a recursive algorithm and we prove Theorem 8 via induction on the size of the input, m. In particular, we will show that, if Theorem 8 holds for any all m < n, then it also holds for m = n. Our base case is m = 1. Base case: Theorem 8 holds for any inputs as long as m = 1. Suppose m = 1, so the input data set just consists of a single point x1 . Then the if statement on Line 1 evaluates to true since 192 log(1/δ) > 1. So, S is set to a 1 × 1 identity matrix and (14) of Theorem 8 holds trivially since (BT B + λI) = (BT SST B + λI). Furthermore, s = 1 ≤ smax (dλeff (K), δ) for any dλeff (K) and δ, as required. The algorithm runs in O(1) time and performs no kernel evaluations, so the runtime requirements of Theorem 8 also hold as long as c2 set to a large enough constant. This all holds with probability 1, and so for any input failure probability δ. 11 Inductive Step: Theorem 8 holds for m = n as long as it holds for all m < n. Depending on the setting of δ, we split our analysis into 2 cases: Case 1: The number of input data points n is < 192 log(1/δ). In this case, as for the base case, the if statement on Line 1 evaluates to true. S is set to an n × n identity matrix so (14) holds trivially. Furthermore, the number of samples s is equal to n, and n < 192 log(1/δ) ≤ smax (dλeff (K), δ) as required. Again the algorithm doesn’t compute any kernel dot products, the runtime bound required by Theorem 8 holds, and all statements hold with probability 1, which is > 1 − 3δ for any input failure probability δ. Case 2: The number of input data points n is ≥ 192 log(1/δ). For this case we will use our inductive assumption since RecursiveRLS-Nyström will call itself recursively at Step 5, for a smaller input size m < n. We first note that the expected number of samples taken in Step 4 is n/2. I.e. E |S̄| = n/2. By a standard multiplicative error Chernoff bound, with high probability the number of samples taken is not much larger than this expectation. This is important because it tells us that our problem size decreases substantially before we make the recursive call in Step 5. Following the simplified Chernoff bounds in e.g. [MU17], when n ≥ 192 log(1/δ), and thus E |S̄| ≥ 96 log(1/δ), we have :   P 1 ≤ |S̄| ≤ .56n ≥ (1 − δ) (15) as long as δ < 1/32, as required by Theorem 8. So, with probability (1 − δ), on Step (5), RecursiveRLS-Nyström is called recursively on a data set X̄ of size ≥ 1 and ≤ .56n. Accordingly, we can apply our inductive assumption that Theorem 8 holds for all m between 1 and n − 1 to conclude that, with probability (1 − 3 · δ/3)4 : 1. Let KS̄ denote the kernel matrix for the data points in X̄ (corresponding to the sample S̄ with kernel function K. Then BS̄ = S̄T B satisfies BS̄ BTS̄ = KS̄ . Thus: 1 T 3 (BS¯ BS̄ + λI)  (BTS¯ S̃S̃T BS¯ + λI)  (BTS¯ BS̄ + λI). 2 2 (16) 2. S̃ has ≤ smax (dλeff (KS̄ ), δ/3) columns. ¯ · smax (dλ (K ), δ/3) 3. The recursive call at Step 5 evaluates K, the kernel function, ≤ c1 · |S| S̄ eff 2 λ times and uses ≤ c2 · |S̄| · smax (deff (KS̄ ), δ/3) additional runtime steps. We first use (16) to prove (14). We can write KS̄ = S̄T KS̄. For all i ∈ {1, . . . n} let  X −1 T  ¯lλ /δ)}. B ℓ̄λi = B BT S̄S̄T B + λI and p̄i = min{1, 16¯liλ log( i i,i i By Lemma 5, since S̄ is constructed by sampling with probability 12 , with probability 1 − δ, ∀ i: ℓ̄λi ≥ ℓλi (K) n X and i=1   p̄i ≤ 64dλeff (K) log dλeff (K)/δ . Here ℓλi (K) is the exact ith λ-ridge leverage score of K. 4 Note that in Step 5 we run RecursiveRLS-Nyström with failure probability δ/3 12 (17) Now, since BS¯ = S̄T B, it follows from (16) and from the well known fact that M  N =⇒ N−1  M−1 , that for any vector z, −1  −1 −1 2 T z. z ≤ 2zT BT S̄S̄T B + λI z ≤ zT BT S̄S̃S̃T S̄T B + λI z BT S̄S̄T B + λI 3 Accordingly, since we set Ŝ := S̄ · S̃, for all i ∈ {1, . . . , n}    −1 3 λ T T T ℓ̄i ≤ B B ŜŜ WB + λI B ≤ 3ℓ̄λi . 2 i,i (18) By Lemma 6, the middle term is exactly equal to ˜liλ as computed in Step 7 of RecursiveRLS-Nyström. So combining (18) and (17) we have that: ℓ̃λi ≥ ℓλi (K) n X and i=1   pi ≤ 192dλeff (K) log dλeff (K)/δ . (19) The second bound holds because, as computed on Step 8 of RecursiveRLS-Nyström,   X X ˜lλ /δ)} ≤ 3 min{1, ¯lλ · 16 log( ¯lλ /δ)} = 3p̄i ≤ 192dλ (K) log dλ (K)/δ pi = min{1, ˜liλ · 16 log( i i i eff eff by (18). Equation (19) guarantees that S is sampled by over-estimates of the ridge leverage scores and we have a bound on the sum of the sampling probabilities. So, to establish (14), we just apply the matrix Bernstein results of Lemma 11. We conclude that, with probability (1 − δ), 3 1 T (B B + λI)  (BT SST B + λI)  (BT B + λI) 2 2 for any B with BBT = K. The same lemma guarantees that S will have s columns where X 1X pi ≤ s ≤ 2 pi . 2 (20)  pi ≤ 384dλeff (K) log dλeff (K)/δ ≤ smax (dλeff (K), δ) columns. To finish our proof of Theorem 8, we still need a bound on the number of kernel function evaluations used by the algorithm and on its overall runtime. Kernel evaluations are performed both during the recursive call at Step 5 and when computing approximate leverage scores at Step 7. Let s̃ be the number of columns in S̃, and hence in Ŝ. At Step 7, K needs to be evaluated n · (s̃ + 1) times: ns̃ times to compute KŜ and n times to compute the diagonal of K. Additionally, by the 3rd guarantee that comes from our inductive assumption, we need at most c1 · |S̄| · smax (dλeff (KS̄ ), δ/3) kernel evaluations for the recursive call. We claim that: 2 P smax (dλeff (KS̄ ), δ/3) ≤ 1.317smax (dλeff (K), δ). (21) This follows from Lemma 19: since KS̄ = S̄T KS̄ and S̄S̄T  I for any sampling matrix, dλeff (KS̄ ) ≤ dλeff (K). Additionally, we use that log(3/δ) ≤ 1.317 log(1/δ) when δ ≤ 1/32. Using this bound and (15) we see that our total number of kernel evaluations is bounded by: n · (s̃ + 1) + c1 · |S̄| · smax (dλeff (KS̄ ), δ/3) ≤ n · (smax (dλeff (KS¯), δ/3) + 1) + c1 · .56n · smax (dλeff (KS̄ ), δ/3) ≤ (2.317 + .74c1 ) n · smax (dλeff (K), δ). 13 As long as c1 > 9, the above is < c1 nsmax (dλeff (K), δ), so we see that RecursiveRLS-Nyström run on a data set of size n performs no more kernel evaluations than that allowed by Theorem 8. We finally bound runtime, accounting for the recursive call to RecursiveRLS-Nyström and all other steps. Again, using the 3rd guarantee from our inductive assumption, (21), and (15) to bound |S̄|, the recursive call that computes S̃ has runtime at most: c2 · |S̄| · smax (dλeff (KS̄ ), δ/3)2 ≤ .972c2 n · smax (dλeff (K), δ)2 . In addition to the recursive call, the remaining runtime of the algorithm is dominated by the  −1 time to compute ŜT KŜ + λI and then to multiply this matrix by the n × s̃ matrix KŜ at Step 7. Both of these operations and all other steps can be performed in O(s̃3 + ns̃2 ) time. Since s̃ ≤ n, there is a constant c such that the number of steps required for the algorithm besides the recursive call is cns̃2 ≤ cnsmax (dλeff (KS̄ ), δ/3)2 . Again applying (21), our runtime is bounded by: .972c2 n · smax (dλeff (K), δ)2 + cnsmax (dλeff (KS̄ ), δ/3)2 which is ≤ c2 n · smax (dλeff (K), δ)2 as long as c2 ≥ 40c. The proof of our statements above relied on three events succeeding: (15), (17), that the recursive call satisfies (16) and the two following guarantees. Each of these events fails with probability at most δ, so we conclude via a union bound that they all succeed with probability 1 − 3δ. Accordingly, we have proven that Theorem (8) holds for fixed universal constants c1 and c2 for any input data set of size n as long as it holds for any input data set of size m with 1 ≤ m < n. Along with our base case, this establishes the theorem for all input sizes. Proof of Theorem 7. Theorem 7 is nearly a direct corollary of Theorem 8. In our proof of Theorem 3 we show that if 3 1 T (B B + λI)  (BT SST B + λI)  (BT B + λI) 2 2 for a weighted sampling matrix S, then even if we remove the weights from S so that it has all unit entries (they don’t effect the Nyström approximation), K̃ = KS(ST KS)+ ST K satisfies: K̃  K  K̃ + λI. The runtime bounds alsofollow nearly directly from Theorem 8. In particular, we have established  2 λ λ that O nsmax (deff (K), δ) kernel evaluations and O nsmax (deff (K), δ) additional runtime are required by RecursiveRLS-Nyström. We only needed the upper bound to prove Theorem 8, but along the way (20) actually  showed that in a successful run of RecursiveRLS-Nyström, S has Θ dλeff (K) log dλeff (K)/δ columns. Additionally, we may assume that deff (K) ≥ 1/2. If it is not, then it’s not hard to check (see proof of Lemma 19) that λ must be ≥ kKk. If this is the case, the guarantee of Theorem 7 is vacuous: any  Nyström approximation K̃ satisfies K̃  K  K̃ + λI. With deff (K) ≥ 1/2, dλeff (K) log dλeff (K)/δ and thus s are Θ(smax (dλeff (K), δ) so we conclude that Theorem 7 uses O(ns) kernel evaluations and O(ns2 ) additional runtime. 14 5 Empirical Evaluation We conclude with an empirical evaluation of our recursive Nyström method. We first introduce a variant of Algorithm 2 where, instead of choosing a regularization parameter λ, the user sets a sample size s and λ is automatically determined such that s = Θ(dλeff · log(dλeff /δ)). This variant is practically appealing as it essentially yields the best possible approximation to K for a fixed sample budget. Additionally, it is necessary in applications to kernel rank-k PCA and k-means clustering, when λ is unknown, but where we set s ≈ k log k (see Appendices B and C). 5.1 Recursive RLS-Nyström algorithm for fixed sample size Given a fixed sample size s, we will control λ using the following fact: Fact 9 (Proven in (31), Appendix B). For any K and integer k, for λ = 1 k Pn i=k+1 σi (K), dλeff ≤ 2k. If we choose k such that s ≈ k log k then setting λ as above will yield an RLS-Nyström approximation with approximately s sampled columns. The details are given in Algorithm 3. Algorithm 3 Recursive RLS-Nyström sampling, fixed sample size. input: x1 , . . . , xm ∈ X , kernel function K : X × X → R, sample size s, failure prob. δ ∈ (0, 1/32) ′ output: sampling matrix S ∈ Rm×s . 1: if m ≤ s then 2: return S := Im×m . 3: end if 4: Let S̄ be a random subset of {1, ..., m}, with each i included independently with probability 1 2 . ⊲ Let X̄ = {xi1 , xi2 , ..., xi|S¯| } for ij ∈ S̄ be the data sample corresponding to S̄. ⊲ Let S̄ = [ei1 , ei2 , ..., ei|S̄| ] be the sampling matrix corresponding to S̄. 5: 6: 7: 8: 9: S̃ := RecursiveRLS-Nyström(X̄, K, s, δ/3). Ŝ := S̄ · S̃. Set k toPthe maximum integer with ck log(2k/δ) ≤ s, where c is some fixed constant. ⊲ Approximate λ λ̃ := k1 ni=k+1 σi (ŜT KŜ)    −1 ŜT K for each i ∈ {1, ..., m}. Set ˜liλ := λ̃5 K − KŜ ŜT KŜ + λ̃I i,i ⊲ By Lemma 6, equals 23 (B(BT ŜŜT B+ λ̃I)−1 BT )i,i . K denotes the kernel matrix for datapoints {x1 , . . . , xm } and kernel function K. 10: Set pi := min{1, ˜ liλ · 16 log(2k/δ)} for each i ∈ {1, ..., , }. 11: Initially set weighted sampling matrix S to be empty. For each i ∈ {1, . . . , m}, with probability pi , append the column √1pi ei onto S. 12: return S Theorem 10. For sufficiently large universal constant c, let k be any positive integer with s ≥ P ′ ck log(2k/δ) and λ = k1 ni=k+1 σi (K). Let S ∈ Rn×s be computed by Algorithm 3. With probability 1 − 3δ, s′ ≤ 2s, S is sampled by overestimates of the λ-ridge leverage scores of K, and the Nyström approximation K̃ = KS(ST KS)+ ST K satisfies the guarantee of Theorem 3. Algorithm 3 uses O(ns) kernel evaluations and O(ns2 ) runtime. 15 For the λ given in Theorem 10, we have dλeff = Θ(k). Hence, since we set s = Θ(k log k/δ), additive error λ is essentially the smallest we can obtain using an s sample Nyström approximation. The proof of Theorem 10 is similar to that of Theorem 7. We defer it to Appendix D. 5.2 Performance of Recursive RLS-Nyström for kernel approximation We evaluate Algorithm 3 on the datasets listed in Table 2, comparing against the classic Nyström method with uniform sampling [WS01] and the random Fourier features method [RR07]. Implementations were in MATLAB and run on a 2.6 GHz Intel Core i7 with 16GB of memory. # of Data Points n 515345 581012 331152 48842 Dataset YearPredictionMSD Covertype Cod-RNA Adult # of Features d 90 54 8 110 Link https://archive.ics.uci.edu/ml/datasets/YearPredictionMSD https://archive.ics.uci.edu/ml/datasets/Covertype https://www.csie.ntu.edu.tw/~ cjlin/libsvmtools/datasets/ https://archive.ics.uci.edu/ml/datasets/Adult Table 2: Datasets downloaded from UCI ML Repository [Lic13], except Cod-RNA [UKM06]. For each dataset, we split categorical features into binary indicatory features and mean center and normalize all features to have variance 1. We use a Gaussian kernel for all tests, with the width parameter σ selected via cross validation on regression and classification tasks. To compute kK − K̃k2 , we only process a random subset of 20k data points since otherwise multiplying by the full kernel matrix K to compute kK − K̃k2 is prohibitively expensive. Experiments on the full kernel matrices are discussed in Section 5.3. 10 10 -2 10 -4 0 1000 2000 3000 Samples (a) Adult 4000 5000 10 kK − K̃k2 kK − K̃k2 kK − K̃k2 0 10 10 10 10 2 10 Recursive RLS-Nystrom Uniform Nystrom Random Fourier Features 10 4 2 10 4 Recursive RLS-Nystrom Uniform Nystrom Random Fourier Features 4 10 2 kK − K̃k2 Recursive RLS-Nystrom Uniform Nystrom Random Fourier Features 10 4 10 0 Recursive RLS-Nystrom Uniform Nystrom Random Fourier Features 3 10 2 0 -2 0 500 1000 1500 2000 Samples 10 -2 10 -4 10 1 0 1000 2000 3000 4000 Samples (b) Covertype (c) Cod-RNA 5000 10 0 0 1000 2000 3000 4000 5000 Samples (d) YearPredictionMSD Figure 2: For a given number of samples, Recursive RLS-Nyström yields approximations with lower error, measured by kK − K̃k2 . Error is plotted on a logarithmic scale, averaged over 10 trials. Figure 2 confirms that Recursive RLS-Nyström consistently obtains better kernel approximation error than the other methods. The advantage of Nyström over random Fourier features is substantial – this is unsurprising as the Nyström methods are data dependent and based on data projection, as opposed to pointwise approximation of K. Even between the Nyström methods there is a substantial difference in kernel approximation, especially for large sample sizes. As we can see in Figure 3, with the exception of YearPredictionMSD, the better quality of the landmarks obtained with Recursive RLS-Nyström translates into runtime improvements. While the cost per sample is higher for our method at O(nd + ns) time versus O(nd + s2 ) for uniform Nyström and O(nd) for random Fourier features, since RLS-Nyström requires fewer samples it more quickly 16 10 0 10 -1 10 -2 Recursive RLS-Nystrom Uniform Nystrom 10 -3 10 10 2 10 1 10 0 10 10 2 Recursive RLS-Nystrom Uniform Nystrom 10 -1 10 -2 -4 0 5 10 Runtime (sec.) (a) Adult 15 10 -3 0 1 2 3 4 10 0 10 -1 10 -2 10 -3 0 5 1 2 3 Runtime (sec.) Runtime (sec.) (b) Covertype 10 Recursive RLS-Nystrom Uniform Nystrom 1 kK − K̃k2 1 kK − K̃k2 10 kK − K̃k2 kK − K̃k2 obtains K̃ with a given accuracy. K̃ will also have lower rank, which can accelerate processing in downstream applications. For example, to achieve kK − K̃k2 ≤ 1 for the Covertype dataset, Recursive RLS-Nyström requires 650 samples in comparison to 3800 for uniform Nyström. (c) Cod-RNA 4 5 3 Recursive RLS-Nystrom Uniform Nystrom 10 2 10 1 10 0 0 2 4 6 8 10 Runtime (sec.) (d) YearPredictionMSD Figure 3: Especially for small error, Recursive RLS-Nyström typically obtains a fixed level of approximation faster than uniform sampling. It only underperformed uniform sampling for the YearPredictionMSD dataset. Results for random Fourier features are excluded from this plot: while the method is faster than Nyström, it never obtained high enough accuracy to be directly comparable. Error is plotted on a log scale, with results averaged over 10 trials. 5.2.1 Accelerated recursive method While Recursive RLS-Nyström typically outperforms classic Nyström, on datasets with relatively uniform ridge leverage scores, such as YearPredictionMSD, it only narrowly beats uniform sampling in terms accuracy. As a result it incurs a higher runtime cost since it is slower per sample. To combat this issue we implement a simple heuristic modification of our algorithm. We note that the final cost of computing the Nyström factors KS and (ST KS)+ is O(ns + s3 ) for both methods. Recursive RLS-Nyström is only slower because computing leverage scores at intermediate levels of recursion takes O(ns2 ) time (Step 9, Algorithm 3) . This cost can be improved by simply adjusting the regularization λ to restrict pthe sample size on each recursive call to be < s. Specifically, we can balance runtimes by taking ≈ (ns + s3 )/n samples on lower levels. Doing so improves our runtime, bringing the per sample cost down to approximately that of random Fourier features and uniform Nyström (Figure 4a) while nearly maintaining the same approximation quality. For datasets such as Covertype in which Recursive RLS-Nyström performs significantly better than uniform sampling, so does the accelerated method (see Figure 4b). However, the performance of the accelerated method does not degrade when leverage scores are relatively uniform – it still offers the best runtime to approximation quality tradeoff (Figure 4c). We note that further runtime improvements may be possible. Subsequent work extends fast ridge leverage score methods to distributed and streaming environments [CLV17]. Empirical evaluation of these techniques could lead to even more scalable, high accuracy Nyström methods. 5.3 Performance of Recursive RLS-Nyström for learning tasks We conclude by verifying the usefulness of our kernel approximations in downstream learning tasks. We focus on Covertype and YearPredictionMSD, which each have approximately n = 500, 000 data points. While full kernel methods do not scale in this regime, Recursive RLS-Nyström does since its runtime depends linearly on n. For example, on YearPredictionMSD the method requires 307 sec. (averaged over 5 trials) to build a 2, 000 landmark Nyström approximation for 463, 716 training 17 2 Recursive RLS-Nystrom Uniform Nystrom Random Fourier Features Acclerated Recursive RLS-Nystrom 1 0.5 0 0 500 1000 Samples 1500 10 2 10 0 10 2000 10 kK − K̃k2 kK − K̃k2 Runtime (sec) 1.5 Recursive RLS-Nystrom Uniform Nystrom Random Fourier Features Accelerated Recursive RLS-Nystrom 10 4 -2 0 500 1000 1500 Recursive RLS-Nystrom Uniform Nystrom Random Fourier Features Accelerated Recursive RLS-Nystrom 3 10 2 10 1 10 0 2000 0 1 (a) Runtimes for Covertype. (b) Errors for Covertype. 2 3 4 5 Runtime (sec.) Samples (c) Runtime/error tradeoff for YearPredictionMSD. Figure 4: Our accelerated Recursive RLS-Nyström, which undersamples at intermediate recursive calls, nearly matches the per sample runtime of random Fourier features and uniform Nyström while still providing approximation nearly as good as the standard Recursive RLS-Nyström. For datasets like YearPredictionMSD with relatively uniform kernel leverage scores, the accelerated version offers the best runtime vs. approximation tradeoff. All results are averaged over 10 trials. 9.8 Recursive RLS-Nystrom Uniform Nystrom Random Fourier Features Recursive RLS-Nystrom Uniform Nystrom Random Fourier Features 9.7 9.6 80 9.5 RMSE Classification Rate 85 75 9.4 9.3 9.2 9.1 9 70 50 100 Samples 8.9 200 500 1000 2000 Samples (a) Covertype (b) YearPredictionMSD Figure 5: Performance of kernel approximation methods for classification and clustering. For Covertype, classification error is measured in separating Class 2 from the remaining classes. For YearPredictionMSD, RMSE is for the unnormalized output. Regularization and kernel parameters are obtained via cross validation on training data. Test results are averaged over 10 trials with a fixed test set, as all three algorithms are randomized. points. Ridge regression using the approximate kernel then requires 208 sec. for a total of 515 sec. In comparison, the fastest method, random Fourier features, required 43 sec. to build a rank 2, 000 kernel approximation and 222 sec. for regression, for a total time of 265 sec. For Covertype we performed classification using the LIBLINEAR support vector machine library. For all sample sizes the SVM dominated runtime cost, so Recursive RLS-Nyström was only marginally slower than uniform Nyström and random Fourier features for a fixed sample size. In terms of classification rate for Covertype and RMSE error for YearPredictionMSD, as can be seen in Figure 5, both Nyström methods outperform random features. However, we do not see much difference between the two Nyström methods. We leave open understanding why the significantly better kernel approximations discussed in Section 5.2 do not necessarily translate to much better learning performance, or whether they would make a larger difference for other problems. 18 Acknowledgements We would like to thank Michael Mahoney for bringing the potential of ridge leverage scores to our attention and suggesting their possible approximation via iterative sampling schemes. We would also like to thank Michael Cohen for pointing out (and fixing) an error in our original manuscript and generally for his close collaboration in our work on leverage score sampling algorithms. Finally, thanks to Haim Avron for pointing our an error in our original analysis. References [AM15] Ahmed Alaoui and Michael W Mahoney. Fast randomized kernel ridge regression with statistical guarantees. In Advances in Neural Information Processing Systems 28 (NIPS), pages 775–783, 2015. [AMS01] Dimitris Achlioptas, Frank Mcsherry, and Bernhard Schölkopf. Sampling techniques for kernel methods. In Advances in Neural Information Processing Systems 14 (NIPS), 2001. [ANW14] Haim Avron, Huy Nguyen, and David Woodruff. Subspace embeddings for the polynomial kernel. In Advances in Neural Information Processing Systems 27 (NIPS), pages 2258–2266, 2014. [Bac13] Francis Bach. Sharp analysis of low-rank kernel matrix approximations. In Proceedings of the 26th Annual Conference on Computational Learning Theory (COLT), 2013. [BBV06] Maria-Florina Balcan, Avrim Blum, and Santosh Vempala. Kernels as features: On kernels, margins, and low-dimensional mappings. Machine Learning, 65(1):79–94, 2006. [BJ02] Francis Bach and Michael I. Jordan. Kernel independent component analysis. Journal of Machine Learning Research, 3(Jul):1–48, 2002. [BMD09] Christos Boutsidis, Michael W. Mahoney, and Petros Drineas. Unsupervised feature selection for the k-means clustering problem. In Advances in Neural Information Processing Systems 22 (NIPS), pages 153–161, 2009. [BW09] Mohamed-Ali Belabbas and Patrick J. Wolfe. Spectral methods in machine learning: New strategies for very large datasets. Proceedings of the National Academy of Sciences of the USA, 106:369–374, 2009. [BWZ16] Christos Boutsidis, David P. Woodruff, and Peilin Zhong. Optimal principal component analysis in distributed and streaming models. In Proceedings of the 48th Annual ACM Symposium on Theory of Computing (STOC), 2016. [CEM+ 15] Michael B. Cohen, Sam Elder, Cameron Musco, Christopher Musco, and Madalina Persu. Dimensionality reduction for k-means clustering and low rank approximation. In Proceedings of the 47th Annual ACM Symposium on Theory of Computing (STOC), pages 163–172, 2015. 19 [CLL+ 15] Shouyuan Chen, Yang Liu, Michael Lyu, Irwin King, and Shengyu Zhang. Fast relative-error approximation algorithm for ridge regression. In Proceedings of the 31st Annual Conference on Uncertainty in Artificial Intelligence (UAI), pages 201–210, 2015. [CLM+ 15] Michael B. Cohen, Yin Tat Lee, Cameron Musco, Christopher Musco, Richard Peng, and Aaron Sidford. Uniform sampling for matrix approximation. In Proceedings of the 6th Conference on Innovations in Theoretical Computer Science (ITCS), pages 181–190, 2015. [CLV16] Daniele Calandriello, Alessandro Lazaric, and Michal Valko. Analysis of Nyström method with sequential ridge leverage score sampling. In Proceedings of the 32nd Annual Conference on Uncertainty in Artificial Intelligence (UAI), pages 62–71, 2016. [CLV17] Daniele Calandriello, Alessandro Lazaric, and Michal Valko. Distributed adaptive sampling for kernel matrix approximation. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS), 2017. [CMM17] Michael B. Cohen, Cameron Musco, and Christopher Musco. Input sparsity time low-rank approximation via ridge leverage score sampling. In Proceedings of the 28th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1758–1777, 2017. [CW17] Kenneth L. Clarkson and David P. Woodruff. Low-rank PSD approximation in inputsparsity time. In Proceedings of the 28th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 2061–2072, 2017. [DM05] Petros Drineas and Michael W Mahoney. On the Nyström method for approximating a Gram matrix for improved kernel-based learning. Journal of Machine Learning Research, 6:2153–2175, 2005. [DMIMW12] Petros Drineas, Malik Magdon-Ismail, Michael W. Mahoney, and David P. Woodruff. Fast approximation of matrix coherence and statistical leverage. Journal of Machine Learning Research, 13:3475–3506, 2012. [DMM08] Petros Drineas, Michael W Mahoney, and S Muthukrishnan. Relative-error CUR matrix decompositions. SIAM Journal on Matrix Analysis and Applications, 30(2):844– 881, 2008. [DST03] Vin De Silva and Joshua B Tenenbaum. Global versus local methods in nonlinear dimensionality reduction. In Advances in Neural Information Processing Systems 16 (NIPS), pages 721–728, 2003. [FS02] Shai Fine and Katya Scheinberg. Efficient SVM training using low-rank kernel representations. Journal of Machine Learning Research, 2:243–264, 2002. [FSS13] Dan Feldman, Melanie Schmidt, and Christian Sohler. Turning big data into tiny data: Constant-size coresets for k-means, PCA, and projective clustering. In Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1434–1453, 2013. 20 [Git11] Alex Gittens. The spectral norm error of the naive Nyström extension. arXiv:1110.5305, 2011. [GM13] Alex Gittens and Michael Mahoney. Revisiting the Nyström method for improved large-scale machine learning. In Proceedings of the 30th International Conference on Machine Learning (ICML), pages 567–575, 2013. Full version at arXiv:1303.1849. [HFH+ 09] Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H Witten. The WEKA data mining software: an update. ACM SIGKDD Explorations Newsletter, 11(1):10–18, 2009. [HKZ14] Daniel Hsu, Sham M. Kakade, and Tong Zhang. Random design analysis of ridge regression. Foundations of Computational Mathematics, 14(3):569–600, 2014. [HTF02] Trevor Hastie, Robert Tibshirani, and Jerome Friedman. The elements of statistical learning: data mining, inference and prediction. Springer, 2nd edition, 2002. [IBM14] IBM Reseach Division, Skylark Team. Libskylark: Sketching-based Distributed Matrix Computations for Machine Learning. IBM Corporation, Armonk, NY, 2014. [KMT12] Sanjiv Kumar, Mehryar Mohri, and Ameet Talwalkar. Sampling methods for the Nyström method. Journal of Machine Learning Research, 13:981–1006, 2012. [LBKL15] Mu Li, Wei Bi, James T Kwok, and Bao-Liang Lu. Large-scale Nyström kernel matrix approximation using randomized SVD. IEEE Transactions on Neural Networks and Learning Systems, 26(1):152–164, 2015. [Lic13] M. Lichman. UCI machine learning repository, 2013. [LJS16] Chengtao Li, Stefanie Jegelka, and Suvrit Sra. Fast DPP sampling for Nyström with application to kernel methods. In Proceedings of the 33rd International Conference on Machine Learning (ICML), 2016. [LSS13] Quoc Le, Tamás Sarlós, and Alexander Smola. Fastfood - Computing Hilbert space expansions in loglinear time. In Proceedings of the 30th International Conference on Machine Learning (ICML), pages 244–252, 2013. [MU17] Michael Mitzenmacher and Eli Upfal. Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis. Cambridge university press, 2017. [PD16] Saurabh Paul and Petros Drineas. Feature selection for ridge regression with provable guarantees. Neural Computation, 28(4):716–742, 2016. [Pla05] John Platt. FastMap, MetricMap, and Landmark MDS are all Nyström algorithms. In Proceedings of the 8th International Conference on Artificial Intelligence and Statistics (AISTATS), 2005. [PVG+ 11] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830, 2011. 21 [RCR15] Alessandro Rudi, Raffaello Camoriano, and Lorenzo Rosasco. Less is more: Nyström computational regularization. In Advances in Neural Information Processing Systems 28 (NIPS), pages 1648–1656, 2015. [RR07] Ali Rahimi and Benjamin Recht. Random features for large-scale kernel machines. In Advances in Neural Information Processing Systems 20 (NIPS), pages 1177–1184, 2007. [RR09] Ali Rahimi and Benjamin Recht. Weighted sums of random kitchen sinks: Replacing minimization with randomization in learning. In Advances in Neural Information Processing Systems 22 (NIPS), pages 1313–1320, 2009. [SS00] Alex J Smola and Bernhard Schökopf. Sparse greedy matrix approximation for machine learning. In Proceedings of the 17th International Conference on Machine Learning (ICML), pages 911–918, 2000. [SS02] Bernhard Schölkopf and Alexander J Smola. Learning with kernels: support vector machines, regularization, optimization, and beyond. MIT press, 2002. [SSM99] Bernhard Schölkopf, Alexander J. Smola, and Klaus-Robert Müller. Advances in kernel methods. chapter Kernel principal component analysis, pages 327–352. MIT Press, 1999. [Tro15] Joel A. Tropp. An introduction to matrix concentration inequalities. Foundations and Trends in Machine Learning, 8(1-2):1–230, 2015. [TRVR16] Stephen Tu, Rebecca Roelofs, Shivaram Venkataraman, and Benjamin Recht. Large scale kernel learning using block coordinate descent. arXiv:1602.05310, 2016. [UKM06] Andrew V Uzilov, Joshua M Keegan, and David H Mathews. Detection of non-coding RNAs on the basis of predicted secondary structure formation free energy change. BMC bioinformatics, 7(1):173, 2006. [Wan16] Weiran Wang. On column selection in approximate kernel canonical correlation analysis. arXiv:1602.02172, 2016. [Woo14] David P. Woodruff. Sketching as a tool for numerical linear algebra. Foundations and Trends in Theoretical Computer Science, 10(1-2):1–157, 2014. [WS01] Christopher Williams and Matthias Seeger. Using the Nyström method to speed up kernel machines. In Advances in Neural Information Processing Systems 14 (NIPS), pages 682–688, 2001. [WZ13] Shusen Wang and Zhihua Zhang. Improving CUR matrix decomposition and the Nyström approximation via adaptive sampling. Journal of Machine Learning Research, 14:2729–2769, 2013. [YLM+ 12] Tianbao Yang, Yu-feng Li, Mehrdad Mahdavi, Rong Jin, and Zhi-Hua Zhou. Nyström method vs random Fourier features: A theoretical and empirical comparison. In Advances in Neural Information Processing Systems 25 (NIPS), pages 476–484, 2012. 22 [YPW15] Yun Yang, Mert Pilanci, and Martin J Wainwright. Randomized sketches for kernels: Fast and optimal non-parametric regression. Annals of Statistics, 2015. [YZ13] Martin Wainwright Yuchen Zhang, John Duchi. Divide and conquer kernel ridge regression. Proceedings of the 26th Annual Conference on Computational Learning Theory (COLT), 2013. [Zha06] Tong Zhang. Learning bounds for kernel regression using effective data dimensionality. Learning, 17(9), 2006. [ZTK08] Kai Zhang, Ivor W. Tsang, and James T. Kwok. Improved Nyström low-rank approximation and error analysis. In Proceedings of the 25th International Conference on Machine Learning (ICML), pages 1232–1239, 2008. A Ridge leverage score sampling bounds Here we give the primary matrix concentration results used to bound the performance of ridge leverage score sampling in Theorems 3, 7, and 10. λ ˜λ Lemma 11. For any δ ∈ (0, n λ > 0 and o 1/8), given ridge leverage score approximations li ≥ li for P all i, let pi = min 1, 16˜liλ log( ˜liλ /δ) . Let S ∈ Rn×s be selected by sampling the standard basis √ vectors e1 , . . . , en each independently with P probability pi and rescaling selected columns by 1/ pi . P With probability 1 − δ, 1/2 · i pi ≤ s ≤ 2 i pi and: 1 3 1 1 T B B − λI  BT SST B  BT B + λI, 2 2 2 2 (22) Proof. Let B = UΣVT be the singular value decomposition of B. By Definition 1: liλ = bTi BT B + λI −1 bi = bTi VΣ2 VT + λVVT −1 = bTi VΣ̄2 VT bi  T −2 T = bi VΣ̄ V bi , −1 bi where Σ̄2i,i = σi2 (B) + λ. For each i ∈ 1, . . . , n define the matrix valued random variable: Xi = ( 1 pi  − 1 Σ̄−1 VT bi bTi VΣ̄−1 with probability pi −Σ̄−1 VT bi bTi VΣ̄−1 with probability (1 − pi ) P Let Y = i Xi . We have E Y = 0. Furthermore, BT SST B = VΣ̄Y Σ̄VT + BT B. If we can show that kYk2 ≤ 12 , then since VΣ̄2 VT = BT B + λI this would give the desired bound: 1 3 1 1 T B B − λI  BT SST B  BT B + λI. 2 2 2 2 To prove that kYk2 is small we use an intrinsic dimension matrix Bernstein inequality. This inequality will bound the deviation of Y from its expectation as long as we can bound each kXi k2 and we can bound the matrix variance E(Y 2 ). 23 Theorem 12 (Theorem 7.3.1, [Tro15]). LetP X1 , . . . , Xn be random symmetric matrices such that for all i, E X = 0 and kXi k2 ≤ L. Let Y = ni=1 Xi . As long we can bound the matrix variance: E(Y 2 )  Z, then for for t ≥ p kZk2 + L/3, P [kYk ≥ t] ≤ 4 2 /2 tr(Z) kZk−t+Lt/3 e 2 . kZk2 P If pi = 1 (i.e. c˜liλ log( liλ̃ /δ) ≥ 1) then Xi = 0 so kXi k2 = 0. Otherwise, we use the fact that: 1 1 b bT  λ bi bTi  BT B + λI. ˜lλ i i li i (23) This follows because we can write any x as x = (BT B + λI)−1/2 y for some y. We can then write: xT bi bTi x = yT (BT B + λI)−1/2 bi bTi (BT B + λI)−1/2 y ≤ kyk22 · k(BT B + λI)−1/2 bi bTi (BT B + λI)−1/2 k2 . Since (BT B + λI)−1/2 bi bTi (BT B + λI)−1/2 is rank 1, we have:   k(BT B + λI)−1/2 bi bTi (BT B + λI)−1/2 k2 = tr (BT B + λI)−1/2 bi bTi (BT B + λI)−1/2 = bTi (BT B + λI)−1 bi = liλ (24) where in the last step we use the cyclic property of the trace. Writing y = (BT B + λI)1/2 x and plugging back into (24) gives: xT bi bTi x ≤ kyk22 · liλ = xT (BT B + λI)x · liλ . Rearranging and using that ˜liλ ≥ liλ gives (23). With this bound in place we get:  1 −1 T T −1 −1 T T · Σ̄ V b b V Σ̄  Σ̄ V B B + λI VΣ̄−1 = I. i i ˜lλ i So we have: Xi  ˜lλ 1 1 1 −1 T P I  Σ̄ V bi bTi VΣ̄−1  i I = P λ  I. pi pi 16 log li /δ 16 log liλ̃ /δ Next we bound the variance of Y. # "  2 X X 1 2 2 − 1 + (1 − pi ) · Σ̄−1 VT bi bTi VΣ̄−2 VT bi bTi VΣ̄−1 E(Y ) = E(Xi )  pi pi X 1 1 P λ  Σ̄−1 VT BT BVΣ̄−1  · lλ̃ · Σ̄−1 VT bi bTi VΣ̄−1  pi i 16 log li /δ 1 1 P λ  Σ2 Σ̄−2  P λ  D. (25)  16 log 16 log li /δ li /δ 24 where D1,1 = 1 and Di,i = (Σ2 Σ̄−2 )i,i = σi2 (B) 2 σi (B)+λ for all i ≥ 2. Note that kDk2 = 1. P λ  Then applying Theorem 12 with Z = D/16 log li /δ we see that: −1/8  1 1 + P λ P λ 1 ≤ 4 tr(D)e 16 log( li /δ) 192 log( li /δ) . P kYk2 ≥ 2  (26) Then we observe that: X  liλ . tr(D) ≤ 1 + tr(Σ2 Σ̄−2 ) = 1 + tr K(K + λI)−1 = 1 + i Plugging into (26), establishes (27): !  P λ X 1 λ ≤4 1+ li · e−2 log( li /δ) ≤ δ/2. P kYk ≥ 2  i P Note that here we make the extremely mild assumption that i liλ ≥ 1. If not, we can simply use a smaller λ that makes this condition true, and will have s = O(1). All that remains to show is that the sample size s is bounded with high probability. If pi = 1, we always sample i so there is no variance in s. LetPS ⊆ [1, ..., n] be P the set ofPindices with pi < 1. The expected number of points sampled from S is i∈S pi = 16 log( ˜liλ /δ) i∈S ˜liλ . Assume without P ˜λ loss of generality that i∈S li ≥ 1 – otherwise can just increase our leverage score estimates and increase the expected sample size by at most 1. Then, by a standard Chernoff bound, with probability at least 1 − δ/2, X X X X 1 ˜lλ ≤ s ≤ 2 · 16 log( ˜lλ . ˜lλ /δ) ˜lλ /δ) · 16 log( i i i i 2 i∈S i∈S Union bounding over failure probabilities gives the lemma. Lemma 11 yields an easy corollary about sampling without rescaling the columns in S: Corollary 13. For 0 and δ ∈o(0, 1/8), given ridge leverage score approximations ˜liλ ≥ liλ for n any λ >P all i, let pi = min 16˜liλ log( ˜ liλ /δ), 1 . Let S ∈ Rn×s be selected by sampling, but not rescaling, the standard basis vectors e1 , . . . , en each independently with probability pi . With probability 1 − δ, P P 1/2 · i pi ≤ s ≤ 2 i pi and there exists some scaling factor C > 0 such that BT B  C · BT SST B + λI. Proof. By Lemma 11, if we set C ′ = 1 mini pi we have: 1 1 T B B − λI  C ′ · BT SST B 2 2 BT B  2C ′ · BT SST B + λI which gives the corollary by setting C = 2C ′ . 25 (27) B Projection-cost preserving kernel approximation In addition to the basic spectral approximation guarantee of Theorem 3, we prove that, with high probability, the RLS-Nyström method presented in Algorithm 1 outputs an approximation K̃ satisfying what is known as a projection-cost preservation guarantee. This approximation also immediately holds for the efficient implementation of sampling in Algorithm 3. P Theorem 14 (Projection-cost preserving kernel approximation). Let λ = kǫ ni=k+1 σi (K). For n×s such that with probability 1 − δ, any P ǫ ∈ (0, 1), δ ∈ (0, P 1/8), RLS-Nyström returns an S ∈ R 1/2 i pi ≤ s ≤ 2 i pi and the approximation K̃ = KS(SKS)+ SK satisfies, for any rank k orthogonal projection X and a positive constant c independent of X: tr(K − XKX) ≤ tr(K̃ − XK̃X) + c ≤ (1 + ǫ) tr(K − XKX). When ridge leverage scores are computed exactly, P i pi =O k ǫ (28)  k log δǫ . Intuitively, Theorem 14 ensures that the distance from K̃ to any low dimensional subspace closely approximates the distance from K to the subspace. Accordingly, K̃ can be used in place of K to approximately solve low-rank approximation problems, both constrained (e.g. k-means clustering) and unconstrained (e.g. principal component analysis). See Theorems 16 and 17. Proof. Set c = tr(K) − tr(K̃), which is ≥ 0 since K̃  K by Theorem 3. By linearity of trace: tr(K̃ − XK̃X) + c = tr(K) − tr(XK̃X). So to obtain (28) it suffices to show: tr(XKX) − ǫ tr(K − XKX) ≤ tr(XK̃X) ≤ tr(XKX). (29) Since X is a rank k orthogonal projection we can write X = QQT where Q ∈ Rn×k has orthonormal columns. Applying the cyclic property of the trace, and the spectral bound of Theorem 3: tr(XK̃X) = tr(QT K̃Q) = k X i=1 qTi K̃qi ≤ k X qTi Kqi = tr(QT KQ) = tr(XKX). i=1 This gives us the upper bound of (29). For the lower bound we apply Corollary 4: tr(XK̃X) = k X i=1 qTi K̃qi ≥ k X i=1 qTi Kqi − kǫλ = tr(XKX) − kǫλ. (30) P Pn Finally, kǫλ = ǫ ni=k+1 σi (K) ≤ ǫ tr(K − XKX) since tr(K) = i=1 σi (K) and tr(XKX) ≤ Pk i=1 σi (K) by the Eckart-Young theorem. Plugging into (30) gives (29), completing the proof. 26 P We conclude by showing that s is not too large. As in the proof ofPTheorem 3, s ≤ 2 P λ Pi pλi with probability 1 − δ. When ridge leverage scores are computed exactly i pi ≤ 16 li log( li /δ). ! n X 1 X λ σi (K I)−1 ) li = tr(K(K + ǫ k i i=k+1 ! n 1 1 X ≤ tr(K(K + σi (K I)−1 ) ǫ k i=k+1 = n 1X ǫ 1 = ǫ 1 ≤ ǫ Accordingly, C P i pi σ (K) + i=1 i k X i=1 k+ σi (K) Pn 1 k σi (K) + n X 1 i=k+1 k i=k+1 σi (K) σi (K) 1 Pn k i=k+1 σi (K) σi (K) Pn i=k+1 σi (K) ! + n X i=k+1 = σi (K) + 2k . ǫ σi (K) 1 Pn k i=k+1 σi (K) ! (31) k = 32 kǫ log δǫ as desired. Applications to learning tasks In this section use our general approximation gaurantees from Theorems 3 and 14 to prove that the kernel approximations given by RLS-Nyström sampling are sufficient for many downstream learning tasks. In other words, K̃ can be used in place of K without sacrificing accuracy or statistical performance in the final computation. C.1 Kernel ridge regression We begin with a standard formulation of the ubiquitous kernel ridge regression task [SS02]. Given input data points x1 , . . . , xn ∈ Rd and labels y1 , . . . , yn ∈ R this problem asks us to solve: def α = arg min kKc − yk22 + λcT Kc, c∈Rn (32) which can be done in closed form by computing: α = (K + λI)−1 y. For prediction, when we’re given a new input x, we evaluate its label to be: y= n X αi K(xi , x). (33) i=1 C.1.1 Approximate kernel ridge regression Naively, solving for α exactly requires at least O(n2 ) time to compute K, plus the cost of a direct or iterative matrix inversion algorithm. Prediction is also costly since it requires a kernel evaluation with all n training points. These costs can be reduced significantly using Nyström approximation. 27 In particular, we first select landmark points and compute the kernel approximation K̃ = KS(ST KS)+ ST K. We can then compute an approximate set of coefficients: def α̃ = (K̃ + λI)−1 y. (34) With a direct matrix inversion, doing so only takes O(ns2 ) time when our sampling matrix S ∈ Rn×s selects s landmark points. This is a significant improvement on the O(n3 ) time required to invert the full kernel. Additionally, the cost of multiplying by K̃ + λI, which determines the cost of most iterative regression solvers, is reduced, from O(n2 ) to O(ns). To predict a label for a new x, we first compute its kernel product with all of our landmark points. Specifically, let x(1) , . . . , x(s) be the landmarks selected by S’s columns. Define w ∈ Rs as: def wi = K(x(i) , x). and let y = wT (ST KS)+ ST Kα̃. (35) Computationally, it makes sense to precompute (ST KS)+ ST Kα̃. Then the cost of prediction is just s kernel evaluations to compute w, plus s additional operations to multiply wT by (ST KS)+ ST Kα̃. This approach is the standard way of applying Nyström approximation to the ridge regression problem and there are a number of ways to evaluate its performance. Beyond directly bounding minimization error for (32) (see e.g. [CLL+ 15, YPW15, YZ13]), one particularly natural approach is to consider how the statistical risk of the estimator output by our approximate ridge regression routine compares to that of the exactly computed estimator. C.1.2 Relative error bound on statistical risk To evaluate statistical risk we consider a fixed design setting which has been especially -popular [Bac13, AM15, LJS16, PD16]. Note that more complex statistical models can be analyzed as well [HKZ14, RCR15]. In this setting, we assume that our observed labels y = [y1 , . . . , yn ] represent underlying true labels z = [z1 , . . . , zn ] perturbed with noise. For simplicity, we assume uniform Gaussian noise with variance σ 2 , but more general noise models can be handled with essentially the same proof [Bac13]. In particular, our modeling assumption is that: yi = zi + ηi where ηi ∼ N (0, σ 2 ). Following [Bac13] and [AM15], we want to bound the expected in sample risk of our estimator for z, which is computed using the noisy measurements y = z+η. For exact kernel ridge regression, we can check from (33) that this estimator is equal to Kα. The risk R is: def R = E kK(K + λI)−1 (z + η) − zk22 η  = k K(K + λI)−1 − I zk22 + E kK(K + λI)−1 ηk22 η 2 T −2 = λ z (K + λI) 2 z + σ tr(K2 (K + λI)−2 ). 28 The two terms that compose R are referred to as the bias and variance terms of the risk: def bias(K)2 = λ2 zT (K + λI)−2 z def variance(K) = σ 2 tr(K2 (K + λI)−2 ). For approximate kernel ridge regression, it follows from (35) that our predictor for z is K̃α̃. Accordingly, the risk of the approximate estimator, R̃ is equal to: R̃ = bias(K̃)2 + variance(K̃) We’re are ready to prove our main theorem on kernel ridge regression. Theorem 15 (Kernel Ridge Regression Risk Bound). Suppose K̃ is computed using RLS-Nyström with approximation parameter ǫλ and failure probability δ ∈ (0, 1/8). Let α̃ = (K̃ + λI)−1 y and let K̃α̃ be our estimator for z computed with the approximate kernel. With probability 1 − δ: R̃ ≤ (1 + 3ǫ)R. By Theorem 7, Algorithm K̃ with just O(ns) kernel evaluations and O(ns2 ) compu 2λ can compute  d dλ eff tation time, with s = O eff ǫ log δǫ . In other words, replacing K with the approximation K̃ is provably sufficient for obtaining a 1 + Θ(ǫ) quality solution to the downstream task of ridge regression. Proof. The proof follows that of Theorem 1 in [AM15]. First we show that: bias(K̃) ≤ (1 + ǫ)bias(K). (36) At first glance this might appear trivial as Theorem 3 easily implies that (K̃ + λI)−1  (1 + ǫ)(K + λI)−1 However, this statement does not imply that (K̃ + λI)−2  (1 + ǫ)2 (K + λI)−2 since (K̃ + λI)−1 and (K + λI)−1 do not necessarily commute. Instead we proceed: 1 bias(K̃) = k(K̃ + λI)−1 zk2 λ ≤ k(K + λI)−1 zk2 + k(K̃ + λI)−1 z − (K + λI)−1 zk2 −1 = k(K + λI) −1 zk2 + k(K̃ + λI) (triangle inequality) −1 [(K + λI) − (K̃ + λI)](K + λI) = k(K + λI)−1 zk2 + k(K̃ + λI)−1 (K − K̃)(K + λI)−1 zk2 ≤ k(K + λI)−1 zk2 + k(K̃ + λI)−1 (K − K̃)k2 k(K + λI)−1 zk2   1 = bias(K) 1 + k(K̃ + λI)−1 (K − K̃)k2 . λ 29 zk2 (submultiplicativity) (37) So we just need to bound k(K̃ + λI)−1 (K − K̃)k2 ≤ ǫ. First note that, by Theorem 3, Corollary 4, K − K̃  ǫλI and since (K − K̃) and I commute, it follows that (K − K̃)2  ǫ2 λ2 I. (38) Accordingly, k(K̃ + λI)−1 (K − K̃)k22 = k(K̃ + λI)−1 (K − K̃)2 (K̃ + λI)−1 k2 ≤ ǫ2 λ2 k(K̃ + λI)−2 k2 1 ≤ ǫ 2 λ2 2 = ǫ 2 . λ So k(K̃ +λI)−1 (K− K̃)k2 ≤ ǫ as desired and plugging into (37) we have shown (36), that bias(K̃) ≤ (1 + ǫ)bias(K). We next show that: variance(K̃) ≤ variance(K), where variance(K) = σ 2 tr(K2 (K + λI)−2 ) = σ 2 Pn i=1 σi (K̃) ≤ σi (K) for all i. It follows that, for every i, σi (K̃) σi (K̃) + λ  (39) 2 σi (K) . σi (K)+λ ≤ σi (K) . σi (K) + λ ≤ n  X Since K̃  K by Theorem 3, This in turn implies that n X i=1 σi (K̃) σi (K̃) + λ !2 i=1 σi (K) σi (K) + λ 2 , which gives (39). Combining (39) and (36) we conclude that, for ǫ < 1, R(fˆK̃ ) ≤ (1 + ǫ)2 R(fˆK ) ≤ (1 + 3ǫ)R(fˆK ). C.2 Kernel k-means Kernel k-means clustering asks us to partition x1 , . . . , xn , into k cluster sets, {C1 , . . . , Ck }. Let 1 P µi = |Ci | xj ∈Ci φ(xj ) be the centroid of the vectors in Ci after mapping to kernel space. The goal is to choose {C1 , . . . , Ck } which minimize the objective: k X X i=1 xj ∈Ci kφ(xj ) − µi k2F (40) It is well known that this optimization problem can be rewritten as a constrained low-rank approximation problem (see e.g. [BMD09] or [CEM+ 15]). In particular, for any clustering C = 30 n×k called the cluster indicator {C1 , . . . , Ck } we can define p a rank k orthonormal matrix C ∈ R matrix for C. Ci,j = 1/ |Cj | if xi is assigned to Cj and Ci,j = 0 otherwise. CT C = I, so CCT is a rank k projection matrix. Furthermore, it’s not hard to check that: k X X i=1 xj ∈Ci  kφ(xj ) − µi k2F = tr K − CCT KCCT . (41) Informally, if we work with the kernalized data matrix Φ, (41) is equivalent to kΦ − CCT Φk2F . Regardless, it’s clear that solving kernel k-means is equivalent to solving:  min tr K − CCT KCCT C∈S (42) where S is the set of all rank k cluster indicator matrices. From this formulation, we easily obtain: Theorem 16 (Kernel k-means Approximation Bound). Let K̃ be computed by RLS-Nyström with ǫ Pn λ = k i=k+1 σi (K) and δ ∈ (0, 1/8). Let C̃∗ be the optimal cluster indicator matrix for K̃ and let C̃ be an approximately optimal cluster indicator matrix satisfying:     tr K̃ − C̃C̃T K̃C̃C̃T ≤ (1 + γ) tr K̃ − C̃∗ C̃∗T K̃C̃∗ C̃∗T . Then, if C∗ is the optimal cluster indicator matrix for K:    tr K − C̃C̃T KC̃C̃T ≤ (1 + γ)(1 + ǫ) tr K − C∗ C∗T KC∗ C∗T By Theorem 10, Algorithm 3 can compute K̃ with O(ns) kernel evaluations and O(ns2 ) computation k . time, with s = O kǫ log δǫ In other words, if we find an optimal set of clusters for our approximate kernel matrix, those clusters will provide a (1 + ǫ) approximation to the original kernel k-means problem. Furthermore, if we only solve the kernel k-means problem approximately on K̃, i.e. with some approximation factor (1 + γ), we will do nearly as well on the original problem. This flexibility allows for the use of k-means approximation algorithms (since the problem is NP-hard to solve exactly). Proof. The proof is almost immediate from our bounds on RLS-Nyström:     (Theorem 14) tr K − C̃C̃T KC̃C̃T ≤ tr K̃ − C̃C̃T K̃C̃C̃T + c   (by assumption) ≤ (1 + γ) tr K̃ − C̃∗ C̃∗T K̃C̃∗ C̃∗T + (1 + γ)c   ≤ (1 + γ) tr K̃ − C∗ C∗T K̃C∗ C∗T + (1 + γ)c (optimality of C̃∗ )   ≤ (1 + γ) tr K̃ − C∗ C∗T K̃C∗ C∗T + c (since c ≥ 0)   (Theorem 14) ≤ (1 + γ)(1 + ǫ) tr K − C̃∗ C∗T KC∗ C∗T . 31 C.3 Kernel principal component analysis We consider the standard formulation of kernel principal component analysis (PCA) presented in [SSM99]. The goal is to find principal components in the kernel space F that capture as much variance in the kernelized data as possible. In particular, if we work informally with the kernelized data matrix Φ, we want to find a matrix Zk containing k orthonormal columns such that: ΦΦT − (ΦZk ZTk )(ΦZk ZTk )T is as small as possible. In other words, if we project Φ’s rows to the k dimensional subspace spanned by Vk ’s columns and then recompute our kernel, we want the approximate kernel to be close to the original. We focus in particular on minimizing PCA error according to the metric:  tr ΦΦT − (ΦZk ZTk )(ΦZk ZTk )T = kΦ − ΦZk ZTk k2F , (43) which is standard in the literature [Woo14, ANW14]. As with f in kernel ridge regression, to solve this problem we cannot write down Zk explicitly for most kernel functions. However, the optimal Zk always lies in the column span of ΦT , so we can implicitly represent it by constructing a matrix X ∈ Rn×k such that ΦT X = Zk . It is then easy to compute the projection of any new data vector onto the span of Zk (the typical objective of principal component analysis) since we can multiply by ΦT X using the kernel function. By the Eckart-Young theorem the optimal Zk contains the top k row principal components of Φ. Accordingly, if we write the singular value decomposition Φ = UΣVT we want to set X = Uk Σ−1 k , which can be computed from the SVD of K = UΣ2 UT . Zk will equal Vk and (43) reduces to: tr(K − ΦVk VkT Φ) = tr(K − Vk VkT K) n X = σi (K). (cyclic property) (44) i=k+1 Theorem 17 (Kernel PCA Approximation Bound). Let K̃ be computed by RLS-Nyström with ǫ Pn λ = k i=k+1 σi (K) and δ ∈ (0, 1/8). From K̃ we can compute a matrix X ∈ Rs×k such that if we set Z = ΦT SX, with probability 1 − δ: kΦ − ΦZZT k2F ≤ (1 + 2ǫ)kΦ − ΦVk VkT k2F = (1 + 2ǫ) n X σi (K). i=k+1 By Theorem 10, Algorithm 3 can compute K̃ with O(ns) kernel evaluations and O(ns2 ) computation k . time, with s = O kǫ log δǫ Note that S is the sampling matrix used to construct K̃. Z = ΦT SX can be applied to vectors (in order to project onto the approximate low-rank subspace) using only s kernel evaluations. Proof. Re-parameterizing Zk = ΦT Y, we see that minimizing (43) is equivalent to minimizing tr(K − KYY T K) 32 over Y ∈ Rn×k such that (ΦT Y)T ΦT Y = Y T KY = I. Then we re-parameterize again by writing Y = K−1/2 W where W is an n × k matrix with orthonormal columns. Using linearity and cyclic property of the trace, we can write: tr(K − KYY T K) = tr(K) − tr(Y T KKY) = tr(K) − tr(WT KW) = tr(K) − tr(WWT KWWT ). So, we have reduced our problem to a low-rank approximation problem that looks exactly like the k-means problem from Section C.2, except without constraints. Accordingly, following the same argument as Theorem 16, if we find W̃ minimizing: tr(K̃) − tr(W̃W̃T K̃W̃W̃T ), then:   n X tr(K) − tr(W̃W̃T KW̃W̃T ) ≤ (1 + ǫ) min tr(K) − tr(WWT KWWT ) = (1 + ǫ) σi (K). W i=k+1 W̃ can be taken to equal the top k eigenvectors of K̃, which can be found in O(n · s2 ) time. However, we are not quite done. Thanks to our re-parameterization this bound guarantees that ΦT K−1/2 W̃ is a good set of approximate kernel principal components for Φ. Unfortunately, ΦT K−1/2 W̃ cannot be represented efficiently (it requires computing K−1/2 ) and projecting new vectors to ΦT K−1/2 W̃ would require n kernel evaluations to multiply by ΦT . Instead, recalling the definition of PS = ΦT S(ST KT S)+ ST Φ from Section 2.1, we suggest using the approximate principal components: PS ΦT K̃−1/2 W̃. Clearly PS ΦT K̃−1/2 W̃ is orthonormal because: (PS ΦT K̃−1/2 W̃)T PS ΦT K̃−1/2 W̃ = W̃T K̃−1/2 ΦT PS ΦK̃−1/2 W̃ = W̃T IW̃ = I. We will argue that it is offers nearly as a good of a solution as ΦT K−1/2 W̃. Specifically, substituting into (43) gives a value of: tr(K − ΦPS ΦT K̃−1/2 W̃W̃T K̃−1/2 ΦPS ΦT ) = tr(K) − tr(W̃W̃T K̃−1/2 ΦPS ΦT ΦPS ΦT K̃−1/2 ) = tr(K) − tr(W̃W̃T K̃−1/2 K̃2 K̃−1/2 ) = tr(K) − tr(W̃W̃T K̃). Compare this to the value obtained from ΦT K−1/2 W̃: h i h i tr(K) − tr(W̃W̃T KW̃W̃T ) − tr(K) − tr(W̃W̃T K̃W̃W̃T ) k n     X ǫ X w̃iT (K − K̃)w̃i ≤ k = tr W̃W̃T (K − K̃) = tr W̃T (K − K̃)W̃ = σi (K). k i=1 33 i=k+1 (45) The last step follows from Theorem 3 which guarantees that (K − K̃)  ǫλI. Recall that we set ǫ Pn λ = k i=k+1 σi (K) and each column w̃i of W̃ has unit norm. We conclude that the cost obtained by PS ΦT K̃−1/2 W̃ is bounded by: T tr(K − ΦPS Φ K̃ −1/2 T W̃W̃ K̃ −1/2 T T T ΦPS Φ ) ≤ tr(K) − tr(W̃W̃ KW̃W̃ ) + ǫ ≤ (1 + 2ǫ) n X n X σi (K) i=k+1 σi (K). i=k+1 This gives the result. Notice that PS ΦT K̃−1/2 W̃ = ΦT S(ST KT S)+ ST ΦΦT K̃−1/2 W̃ so, if we set: X = (ST KT S)+ ST K̃1/2 W̃, our solution can be represented as Z = ΦT SX as desired. C.4 Kernel canonical correlation analysis We briefly discuss a final application to canonical correlation analysis (CCA) that follows from applying our spectral approximation guarantee of Theorem 3 to recent work in [Wan16]. Consider n pairs of input points (x1 , y1 ), ..., (xn , yn ) ∈ (X , Y) along with two positive semidefinite kernels, Kx : X × X → R and Ky : Y × Y → R. Let Fx and Fy and φx : X → Fx and φy : Y → Fy be the Hilbert spaces and feature maps associated with these kernels. Let Φx and Φy denote the kernelized X and Y inputs respectively and Kx and Ky denote the associated kernel matrices. The goal We consider standard regularized kernel CCA, followingPthe presentation in [Wan16]. P is to compute coefficient vectors αx and αy such that fx∗ = ni=1 αxi φx (xi ) and fy∗ = ni=1 αyi φy (yi ) satisfy: (fx∗ , fy∗ ) = arg max fxT ΦTx Φy fy∗ fx ∈Fx ,fy ∈Fy subject to fxT ΦTx Φx fx fyT ΦTy Φy fy + λx kfx k2Fx = 1 + λy kfy k2Fy = 1 In [Wan16], the kernelized points are centered to their means. For simplicity we ignore centering, but note that [Wan16] shows how bounds for the uncentered problem carry over to the centered one. It can be shown that αx = (Kx + λx I)−1 β x and αy = (Ky + λy I)−1 β y where β x and β y are the top left and right singular vectors respectively of T = (Kx + λx I)−1 Kx Ky (Ky + λy I)−1 . The optimum value of the above program will be equal to σ1 (T). [Wan16] shows that if K̃x and K̃y satisfy: K̃x  Kx  K̃x + ǫλx I K̃y  Ky  K̃y + ǫλx I 34 then if α̃x and α̃y are computed using these approximations, the achieved objective function value will be within ǫ of optimal (see their Lemma 1 and Theorem 1). So we have: Theorem 18 (Kernel CCA Approximation Bound). Suppose K̃x and K̃y are computed by RLSNyström with approximation parameters ǫλx and ǫλy and failure probability δ ∈ (0, 1/8). If we solve for α̃x and α̃y , the approximate canonical correlation will be within an additive ǫ of the true canonical correlation σ1 (T). and By Theorem 7, Algorithm 2 can compute K̃ x and K̃y with  O(nsx + nsy ) kernel evaluations  O(ns2x + ns2y ) computation time, with sx = O D D.1 x dλ eff ǫ log λ x dλ eff δǫ and sy = O deffy ǫ λ log deffy δǫ . Additional proofs Effective dimension bound Lemma 19. For any W ∈ Rn×p with WWT  I, n X liλ (WT KW) i=1 ≤ n X liλ (K), i=1 or equivalently, by Fact 2, dλeff (WT KW) ≤ dλeff (K). Proof. By Definition 1, liλ = K(K + λI)−1 n X i=1  i,i so n  X liλ (K) = tr K(K + λI)−1 = i=1 σi (K) . σi (K) + λ Take any matrix B ∈ Rn×n such that BBT = K. Note that for any matrix Y, σi (YY T ) = σi (Y T Y) for any non-zero singular values. Accordingly, σi (WT KW) = σi (WT BBT W) = σi (BT WWT B) ≤ σi (BT B) = σi (BBT ) = σi (K) The ≤ step follows from WWT  I so BT WWT B  BT B. We thus have: n X liλ (WT KW) = i=1 p X i=1 n n i=1 i=1 X σi (K) X σi (WT KW) liλ (K), ≤ = σi (WT KW) + λ σi (K) + λ giving the lemma. D.2 Proof of Theorem 10: fixed sample size guarantees We now prove Theorem 10, which gives the approximation and runtime guarantees for our fixed sample size algorithm, Algorithm 3. The theorem follows from the recursive invariant: 35 Theorem 20. With probability 1 − 3δ, Algorithm 3 performs O(ns) kernel evaluations, runs in O(ns2 ) time, and for any integer k with s ≥ ck log(2k/δ) returns S satisfying, for any B with BBT = K: 3 1 T (B B + λI)  (BT SST B + λI)  (BT B + λI) 2 2 for λ = 1 k (46) Pn i=k+1 σi (K). Proof. Assume by induction that after forming S̄ via uniformly sampling, the recursive call to Algorithm 3 returns S̃ such that Ŝ = S̄ · S̃ satisfies: 1 T T 3 (B S̄S̄ B + λ′ I)  (BT ŜŜT B + λ′ I)  (BT S̄S̄T B + λ′ I). 2 2 P P where λ′ = k1 ni=k+1 σi (S̄T KS̄). This implies that λ̃ = k1 ni=k+1 σi (ŜT KŜ) satisfies: ! ! n n X X 3 1 T ′ T ′ σi (S̄ KS̄) + kλ ≤ λ̃ ≤ σi (S̄ KS̄) + kλ 2k 2k i=k+1 (47) i=k+1 ′ ′ λ ≤ λ̃ ≤ 3λ . Combining with (47) we have: 1 T T 9 (B S̄S̄ B + λ′ I)  (BT ŜŜT B + λ̃I)  (BT S̄S̄T B + λ′ I). 2 2 So, for all i, ˜liλ (which is computed using (BT ŜŜT B + λ̃I) and oversampling factor 5 in Step 9 of Algorithm 3) is at least as large as the approximate leverage score computed using S̄ instead of Ŝ. If we sample by these scores, by Lemma 5 and Lemma 11 we will have with probability 1 − δ: 1 T 3 (B B + λ′ I)  (BT SST B + λ′ I)  (BT B + λ′ I) 2 2 which implies (46) since λ′ ≤ λ since kS̄k2 ≤ 1 so σi (S̄T KS̄) ≤ σi (K) for all i. It just remains to show that we do not sample too many points. This can be shown using a similar reweighting argument to that used in the fixed λ case in Lemma 5. Full details appear in Lemma 13 of [CMM17]. When forming the reweighting matrix W, decreasing Wi,i will decrease P n th ridge i=k+1 σi (WKW) and hence will decrease λ. However, it is not hard to show that the i leverage score will stillPdecrease. So we can find W giving a uniform ridge leverage score upper bound of α. Let λ′ = ni=k+1 σi (WKW). Using P the same argument P as Lemma 5, we can bound the sum of estimated sampling probabilities ′ ′ λ by 64 log( li (WKW)/δ) · liλ (WKW) ≤ s/5 by Fact 9 if we set c large enough. The runtime and failure probability analysis is identical to that of Algorithm 2 (Theorem 8) – the only extra step is computing λ̃ which can be done in O(s3 ) time via an SVD of ŜT KŜ. Proof of Theorem 10. The theorem follows immediately since Theorem 20 guarantees that in the final level of recussion K is sampled by overestimates of its λ-ridge leverage scores. The runtime bound follows from Theorem 20 and the fact that it is possible to compute KS using O(ns) kernel evaluations and (ST KS)+ using O(ns2 + s3 ) = O(ns2 ) additional time. 36
8cs.DS
arXiv:1710.05012v1 [cs.IT] 13 Oct 2017 Potential Conditional Mutual Information: Estimators and Properties Arman Rahimzamani and Sreeram Kannan∗ Department of Electrical Engineering, University of Washington, Seattle October 16, 2017 Abstract The conditional mutual information I(X; Y |Z) measures the average information that X and Y contain about each other given Z. This is an important primitive in many learning problems including conditional independence testing, graphical model inference, causal strength estimation and time-series problems. In several applications, it is desirable to have a functional purely of the conditional distribution pY |X,Z rather than of the joint distribution pX,Y,Z . We define the potential conditional mutual information as the conditional mutual information calculated with a modified joint distribution pY |X,Z qX,Z , where qX,Z is a potential distribution, fixed airport. We develop K nearest neighbor based estimators for this functional, employing importance sampling, and a coupling trick, and prove the finite k consistency of such an estimator. We demonstrate that the estimator has excellent practical performance and show an application in dynamical system inference. 1 Introduction Given three random variables X, Y, Z, the conditional mutual information I(X; Y |Z) (CMI) is the expected value of the mutual information between X and Y given Z, and can be expressed as follows [1], CM IX↔Y |Z (pX,Y,Z ) := I(X; Y |Z) = D(pX,Y,Z ||pZ pX|Z pY |Z ). (1) Thus CMI is a functional of the joint distribution pX,Y,Z . A basic property of CMI, and a key application, is the following: I(X; Y |Z) = 0 iff X is independent of Y given Z. This measure depends on the joint distribution between the three variables pX,Y,Z . There are certain circumstances where such a dependence on the entire joint distribution is not favorable, and a measure that depends purely on the conditional distribution pY |X,Z is more useful. This is because, in a way, conditional independence can be well defined purely in terms of the conditional distribution and the measure pX,Z is extraneous. This motivates the direction that we explore in this paper: we define potential conditional mutual information as a function purely of pY |X,Z evaluated with a distribution qX,Z that is fixed a-priori. An Example: Consider the following causal graph where X → Y , Z → X and Z → Y shown in Figure 1a. Let us say pY |X,Z has a strong dependence on both X and Z, say defined by the structural equation Y = X + Z. We would like to measure the strength of the edge X → Y in this causal graphical model. One natural measure in this context is I(X; Y |Z). However, if we use I(X; Y |Z) as the strength, the strength goes to zero when Z ≈ X and this is undesirable. In such a case, Janzing et al [2] pointed out that a better strength of causal influence is given by the following: C(X → Y ) := D(pX,Y,Z ||pZ pX pY |Z ). ∗ Email: [email protected] and [email protected] 1 (2) (a) (b) Figure 1: (a): A causal graph, where the interest is in determining the strength of X to Y . (b) A gene expression trace as a function of time for a few example genes. This causal measure satisfies certain axioms laid out in that paper and is nonzero in the aforesaid example. However, in the case that the distribution pX approaches a deterministic distribution (X is approximately a constant), this measure becomes zero, irrespective of the fact that the relationship from X and Z to Y remains unaltered. We would like to define a potential dependence measure that is dependent purely on pY |X,Z and which has no dependence on the observed pX,Z . We note that such a measure should give a (strong) non-zero result if Y = X + Z. The Measure: We define potential conditional information measure as the conditional mutual information evaluated under a predefined distribution qX,Z , and denote it as qCM I(X ↔ Y |Z), and express it as follows. qCM IX↔Y |Z (pY |X,Z ) := CM IX↔Y |Z (qX,Z pY |X,Z ). (3) A Simple Property: The main question here is how to choose qX,Z . A simple property that maybe of interest is the following, which can be easily stated in case that all three variables X, Y, Z are discrete. In such a case, it will be useful if we can have that qCM IX↔Y |Z (pY |X,Z ) = 0 if and only if pY |X,Z depends purely only on Z. Such a property will be true for qCMI as long as qX,Z is non-zero for every value of X, Z. In case that all three variables are real valued, a similar statement can be asserted when qX,Z is a positive everywhere density, under the assumption that pX,Y,Z induces a joint density. Instantiations: We will propose some instantiations of the potential CMI by giving examples of the distribution qX,Z . • CMI: qX,Z = pX,Z . Here the qX,Z is the factual measure and hence qCMI devolves to pure CMI. • uCMI: qX,Z = uX,Z , where uX,Z is the product uniform distribution on X, Z. This is well defined when X, Z is either discrete or has a joint density with a bounded support. • nCMI: qX,Z = nX,Z , where nX,Z is the i.i.d. Gaussian distribution on X, Z. This is well defined when X, Z are real-valued (whether scalar or vector). • maxCMI = maxqXZ CMI(qX,Z pY |X,Z ) is defined as an analog of the Shannon capacity in the conditional case, where we maximize the CMI over all possible distributions on X, Z. This is akin to tuning the input distribution to maximize the signal in the graph. Note that uCMI or nCMI is not invariant to invertible 2 functional transformations on X, Z, whereas maxCMI is indeed invariant to such functional transformations. • iCMI: qX,Z = pX pZ is the CMI evaluated not under the true joint distribution of X, Z but under the product distribution on X, Z. This measure is related to the causal strength measure proposed in [2], though not identical. Note that uCMI, nCMI, maxCMI all satisfy the property that they are zero if and only if pY |X,Z has no dependence on X, whereas CMI and iCMI do not. Applications: A key application of the potential information measures is in testing graphical models, where conditional independence tests are the basic primitive by which models are built [3, 4, 5]. To give a concrete example of the setting, which motivated us to pursue this line of study, consider the following problem, which can model gene regulatory network inference from time-series data. We observe a set of n time series, Xi (t) for t = 1, 2, ...T with i = 1, 2, ..n and wish to infer the graph of the dynamical system. The underlying model ~ is a markov chain with Xi (t) depending only on Xj (t − 1) for j ∈ P a(i) and the goal is to assumption is that X determine P a(i), the set of parents of a given node. This was originally studied in the setting when the variables are jointly Gaussian and hence the dependence is linear (see [6] for the original treatment, and [7, 8] for versions with latent variables). This problem was generalized to the setting with arbitrary probability distributions and temporal dependences in [9] and studied further in [10], for one-step markov chains in [11] and deterministic relationships in [12]. From these works, under some technical condition, we can assert that the following method is guaranteed to be consistent, xi → xj ⇐⇒ I{Xi (t − 1); Xj (t)|Xic (t − 1)} > 0. (4) Thus to solve this problem, we estimate the CMI between the aforesaid variables. However, we observed while experimenting with gene regulatory network data (from [13]), that there is a strange phenomenon; the performance of the inference worsens as we collect more data: the number of data points increases. An example of a gene expression time series for a few genes is shown in Figure 1b. It is clear that as the number of time points increases, the system is moving into an equilibrium with very little change in gene expression values. This induces a distribution on any Xi (t) which looks more and more like a deterministic distribution. In such a case, an information measure such as CMI which depends on the “input” distribution pxi (t−1) will converge to zero and thus its performance will deteriorate as the number of samples increases. However a measure that depends on the conditional distribution pxj t|xi (t−1),xi need not deteriorate with increasing number of samples. Thus qCMI is more appropriate in this context (see Sec. 4.3 for performance of qCMI on this problem). Related work: In the case that there is a pair of random variables X, Y , recent work [14] explored conditional dependence measures which depend only on pY |X . Again in the two-variable case, a measure that had weak dependence on pX was studied in [15]. The proposal there was to use the strong data processing constant and hypercontractivity [16, 17] to infer causal strength; this has strong relationships to information bottleneck [18]. In this paper, we extend [19] to conditional independence (rather than independence studied there). In a related but different direction, Shannon capacity, which is a potential dependence metric, was proposed in [20] to infer causality from observational data [21]. Main Contributions: In this paper, we make the following main contributions: 1. We propose potential conditional mutual information as a way of quantifying conditional independence, but depending only on the conditional distribution pY |X,Z . 2. We propose new estimators in the real-valued case that combine ideas from importance sampling, a coupling trick and k-nearest neighbors estimation to estimate potential CMI. 3. We prove that the proposed estimator is consistent for a fixed k, which does not depend on the number of samples N . 4. We demonstrate by simulation studies that the proposed estimator has excellent performance when there are a finite number of samples, as well as an application in gene network inference, where we show that qCMI can solve the non-monotonicity problem. 3 2 Estimator In most real settings, we do not have access to either the joint distribution pX,Y,Z or the conditional distribution pY |X,Z , but need to estimate the requisite information functionals from observed samples. We are given N independent identically distributied samples {(xi , yi , zi )i=1,2,..,N } from pX,Y,Z . In the case of qCMI, the estimator is also given as input the modified distribution qX,Z . The estimator needs to estimate qCMI from samples. In the case of discrete valued distributions, it is possible to empirically estimate pX,Y,Z from samples and calculate the qCMI from this distribution. We focus our attention here on the case of continuous valued alphabet, where each variable takes on values in a bounded subset of Rd . We assume that X, Y, Z are of dimensions dx , dy , dz respectively, and let fX,Y,Z denote the joint density of the three variables (we assume that it exists). In such a case, it is possible to estimate fX,Y,Z using kernel density estimators [22, 23] and then warp the estimate using the potential measure qX,Z . However, it is known that k-nearest neighbors based estimators perform better even in the simpler case of mutual information estimation and are widely used in practice [24, 25]. Therefore in this work, we develop KNN based estimators for qCMI estimation. 2.1 Entropy estimation Consider first the estimation of the differential entropy of a random variable X with density fX and observed samples x1 , ..., xN .. A simple method PN to estimate the differential entropy is to use the re-substitution estimator, where we calculate ĥ(X) := N1 i=1 log(fˆX (xi )), where fˆX is an estimate of the density of X. We can estimate the density using a KNN based estimator. To do so, we fix k a-priori, and for each sample xi , find the distance ρk,i to the nearest neighbor. k (5) fˆX (xi )cd ρdk,i ≈ . N This estimator is not consistent when k is fixed, and it was shown in a remarkable result by Kozhachenko and Loenenko [26] that the bias is independent of the distribution and can be computed apriori. Thus the following estimator was shown in [26] to be consistent for differential entropy. ĥKL (X) = N N ρdk,i cd 1 X log + log k − ψ(k). N i=1 k While it is possible to have estimators which fix an  apriori and then find the number of nearest neighbors to plug into the formula, such estimators do not adapt to the density (some regions will have many more points inside an  neighborhood than others) and do not have a consistency proof as well. We mention this as fixed  estimators are used for a sub-problem in our estimator. 2.2 Coupling trick The conditional mutual information can be written as a sum of 4 differential entropies, and one can estimate these differential entropies independently using KNN estimators and sum them. I(X; Y |Z) = −h(X, Y, Z) − h(Z) + h(X, Z) + h(Y, Z). However, even in the case of mutual information, the estimation can be improved by an inspired coupling trick, in what is called the KSG estimator [24]. We note that the original KSG estimator did not have a proof of consistency and its consistency and convergence rates were analyzed in a recent paper [27]. Also of interest is the fact that the coupling trick has been shown to be quite useful in problems where X, Y or both have a mixture of discrete and continuous distributions or components [28]. This trick was applied in the context of conditional mutual information estimation in [29]. However, we note that this estimator of CMI does not have a proof of consistency to the best of our knowledge. The CMI estimator essentially fixes a k for the (X, Y, Z) vector and calculates for each sample (xi , yi , zi ), the distance ρk,i to the k-th nearest neighbor. The estimator fixes this ρk,i as the distance and calculates the number of nearest neighbors 4 within ρk,i in the Z, (X, Z) and (Y, Z) dimensions as nz,i , nxz,i , nyz,i respectively. The CMI estimator is then given by,   N cdx +dz cdy +dz 1 X ˆ (ψ(k) − log(nxz,i ) − log(nyz,i ) + log(nz,i )) + log . CM I := N i=1 cdx +dy +dz cdz 2.3 (6) qCMI estimator Here, we adapt this estimator to calculate the qCMI for a given potential distribution qX,Z . The major difference is the utilization of an importance sampling estimator to get the importance of each sample i estimated as follows, ωi := qXZ (xi , zi ) . fˆXZ (xi , zi ) (7) However, importance sampling based reweighting alone is insufficient to handle qCMI estimation, since there is a logarithm term which depends on the density also. We handle this effect by appropriately re-weighting the number of nearest neighbors for the (y, z) and z terms carefully using the importance sampling estimators. The estimation algorithm is described in detail in Algorithm 1. Algorithm 1: qCMI algorithm Data: Data Samples (xi , yi , zi ) for i = 1, . . . , N and qX,Z ˆ I an estimate of qCM I Result: qCM Step 1: Calculate weights ωi for i = 1, . . . , N do Estimate fˆXZ (xi , zi ) using a Kernel density estimator [23, 22]. i ,zi ) ωi := fqˆXZ (x , the importance sampling estimate of sample i. (x ,z ) XZ i i end Step 2: Calculate information samples Ii for i = 1, . . . , N do ρk,i := Distance of k-th nearest neighbor of (xi , yi , zi ). P nxz,i := j6=i:k(xi ,zi )−(xj ,zj )k<ρk,i 1, the number of neighbors of (xi , zi ) within distance ρk,i . PN nyz,i := j6=i:k(yi ,zi )−(yj ,zj )k<ρk,i ωj , the weighted number of neighbors of (yi , zi ) within distance ρk,i . P nz,i := j6=i:kzi −zj k<ρk,i ωi , the weighted number of neighbors of zi within distance ρk,i . Ii := ψ(k) − log(nxz,i ) − log(nyz,i ) + log(nz,i ). end   ˆ I = 1 PN ωi Ii + log cdx +dz cdy +dz . Return qCM i=1 N cd +d +d cd x 3 y z z Properties Our main technical result is the consistency of the proposed potential conditional mutual information estimator. This proof requires combining several elements from importance sampling, and accounting for the correlation induced by the coupling trick, in addition to handling the fact that the k is fixed and hence introduces a bias into estimation. Assumption 1. We make the following assumptions. R 2 a) fXY Z (x, y, z) (log fXY Z (x, y, z)) dxdydz < ∞. 5 b) All the probability density functions (PDF) are absolutely integrable, i.e. for all A, B ⊂ {X, Y, Z}, R q ∞ and |fA|B (a|b)|da < ∞. R |fA|B (a|b)|da < q c) There exists a finite constant C such that the hessian matrices of fXY Z and fXY Z exist and it’s true that q max{kh(fXY Z )k2 , kh(fXY Z )k2 } < C almost everywhere. d) All the PDFs are upper-bounded, i.e. there exists a positive constant C 0 such that for all A, B ⊂ {X, Y, Z}, q < C 0 almost everywhere. fA|B < C 0 and fA|B e) fXZ is upper and lower-bounded, i.e. there exist positive constants C1 and C2 such that C1 qXZ (x, z) < fXZ (x, z) < C2 qXZ (x, z) almost everywhere. f ) There bandwidth hN of kernel density estimator is chosen as hN = 21 N −1/(2dx +2dz +3) . z g) The k for the KNN estimator is chosen satisfying k > max{ dxd+d , y dx +dy dx +dz dz , dy } Theorem 1. Under the Assumption 1, the qCMI estimator expressed in Algorithm 1 converges to the true value qCMI. p ˆ I→ qCM qCM I (8) Proof. Please see Section A for the proof. 4 Simulation study In this section, we describe some simulated experiments we did to test the qCMI algorithm. The reader should notice that all the tests we have done are taking qXZ as uXZ , i.e. all the tests are done for the special case of uCMI. So by exploiting the qCMI notations we mean uCMI everywhere. 4.1 qCMI consistency The first numerical experiment we do is to test the consistency of our qCMI estimation algorithm. We set up a system of three variables X, Y and Z. The variables X and Z are independent taken from un (0, 1) distribution, i.e. X and Z are taken form a uniform distribution and then raised to a power of n. When n = 1, the variables X and Z are already uniform. When n is large, the un (0, 1) distribution skews more towards 0. For simplicity we apply identical n for both X and Z here. Then Y is generated as Y = (X + Z + W ) mod 1 in which the noise term W is sampled from u(0, 0.2). From elementary information theory calculation, we can deduce that  1 I(X; Y |Z) = log .2 = 1.609 if n = 1. Thus I q (X; Y |Z) = 1.609 for all n. We plot the estimated value against the ground truth. As the first part of the experiment, we keep the number of samples constant at 1000 and 20000, and change the degree n from 1 to 10. We compare the results of our KSG-based method with the simple partitioning method, and the theoretical √ value of qCMI. For the partitioning method, the number of partitions at each dimension is determined by 3 100N , so that we observe on average 100 samples inside each quantization bin. The results are shown in Figure 2a and Figure 2b. Our expectation is that qCMI remains constant as n (degree of distribution) changes. We see that with relatively high number of samples, the accuracy of proposed qCMI is satisfactorily high. As the second part of the experiment, we do the same experiment as the first part, but this time we keep n = 5 and change the number of samples. The result is shown in Figure 2c. We can see convergence of KSG-based qCMI estimator to the true value and how it outperforms the partitioning-based qCMI method. As the third part of the experiment, we repeated the process for the first part, but replaced the un (0, 1) distributions with β(1.5, 1.5) and the noise distribution with N (0, σ 2 ) and repeated the experiment for σ = 0.3, 1.0. For this part we kept the number of partitions at 25 for each dimension. The results of calculated qCMI values are shown in Figure 3a and Figure 3b. 6 (a) (b) (c) Figure 2: The qCMI values calculated for un (0, 1) distributions for X and Z, and uniform noise: (a) N=1000 samples and (b) N =20000 samples. (c) Degree n = 5. 4.2 Dealing with discrete components As we discussed before, the qCMI algorithm replaces the observed distribution fXZ distribution with a distribution qXZ . This property comes in handy when we want to remove the bias caused by repeated samples. For example, as discussed earlier, suppose that we want to measure the mutual information of two coupled variables in a dynamical system evolving through time. Such systems usually start from an initial state, go through a transient state and eventually reach a steady state. If one takes samples of the system’s state at a constant rate to study the interaction of two variables, they might end up taking too many samples from the initial and steady states while the transient phase which usually happens in a relatively short time might be more informative. The conditional mutual information is not able to deal with this undesirable bias caused by the initial and steady states, while qCMI inherently deals with the effect by compensating for the samples which are less likely to happen. To better observe the effect, we repeat the first experiment of the previous section, but this time we generate 1000 samples from the scenario, and then add zeros to the X, Y and Z to create a high probability of occurrence at (0, 0, 0). The proof of consistency of the estimator holds only when there is a joint density, i.e., the joint measure is absolutely continuous with respect to the Lebesgue measure, and hence does not directly apply to this case. We refer the reader to [28] for an analysis of a similar coupled KNN estimator for mutual information in the discrete-continuous mixture case. Changing the number of zero points added from 0 to 20000, we apply the conditional MI and qCMI to the data generated and compare the results. As we can see in figure 3c, with the number of zeros increasing, the value of conditional MI falls down to zero, unable to capture the inter-dependence of X and Y given Z, while qCMI value remains unchanged, properly discovering the inter-dependence from the transient values. 4.3 Non-linear Neuron Cells’ Development Process In this section, we apply the RDI and uRDI algorithms to neuron cells’ development process simulated based on a model from [13] which can be modeled as a dynamical system. A dynamical System is described as a set of variables shown by a vector of x which evolve through time starting from an initial state x(0). The evolution can be described as a vector function g(.) such that x(t) = g (x(t − 1)). Note that g can be a stochastic function in general, i.e. it may include random coefficients, additive noise and so on. The dynamical system here describes the evolution of 13 genes through the development process. The nonlinear equations governing the development process approximate a continuous development process, in which ẋ(t) = g(x(t − 1)). In other words, x(t) = x(t − 1) + dt.g (x(t − 1)) + n(t) in which n are independent Gaussian noises ∼ N (0, σ 2 ). For this system, we want to infer the true network of causal inferences. In a dynamical system, we say xi causes xj if xj (t) is a function of xi (t − 1). For this purpose, we first apply the RDI algorithm [12] to extract 7 (a) (b) (c) Figure 3: The qCMI values calculated for a system with beta distribution for X and Z and Gaussian additive noise: (a) σ = 0.3, and (b) σ = 1.0. (c) The qCMI and CMI values versus the number of zeros added. the pairwise directed causality between the variables by calculating I (xi (t − 1), xj (t)|xj (t − 1)). Then we apply the uRDI algorithm, in which the conditional mutual information I(X; Y |Z) in RDI is replaced with qCMI as I q (X; Y |Z) using qX,Z as a uniform distribution. This system is a good example of a system in which the genes undergo a rather short transient state compared to the initial and steady states, and hence we expect an improvement in the performance of causal inference by applying uRDI (see Figure 1b for an example run of the system). The details of the dynamical system are given in [13]. We simulated the system for discretization dt = 0.1 and σ = .001, and changed the number of steps until which the system continues developing, and then applied the RDI and uRDI algorithms to evaluate the performance of each of the algorithms in terms of the area-under-the-ROC-Curve (AUC). The results are shown in Figure 4a. As we can see, with the number of steps increasing implying the number of samples captured in the steady state are increased, the uRDI algorithm outperforms RDI. In another test scenario, we fixed the number of steps at 200, but concatenated several runs of the same process. The results and the improvement of performance by uRDI can be seen in the Figure 4b. 4.4 Decaying Linear Dynamical System In this section, we simulate a linear decaying dynamical system. A dynamical system in the simple case of a deterministic linear system can be described as: x(t) = Ax(t − 1) (9) In which A is a square matrix. Here we simulate a system of 13 variables, all of them initialized from a u(0.5, 2) distribution. The first 6 variables (x1 , . . . , x6 ) are evolved through a linear deterministic process as in (9) in which A is a square 6 × 6 matrix initialized as:   u(0.75, 1.25) 0 0 0 u(0.75, 1.25) 0 u(0.75, 1.25) u(0.75, 1.25) 0 0 0 u(0.75, 1.25)     0 u(.75, 1.25) u(.75, 1.25) 0 0 0  A= (10)   0 u(.75, 1.25) 0 u(.75, 1.25) 0 0     0 0 u(.75, 1.25) u(.75, 1.25) u(.75, 1.25) 0 u(.75, 1.25) u(.75, 1.25) 0 0 0 u(.75, 1.25) Then the matrix A is divided by 5 ∗ λmax (A) in which λmax (A) is the greatest eigenvalue of A. It’s done to make sure that all the variables decay exponentially to 0. After initialization, the matrix A is kept constant throughout the development process, i.e. it doesn’t change with time t. 8 (a) (b) (c) Figure 4: AUC values for the neuron cells’ development process: a) versus the number of steps. b) versus the number of runs. (c) for the decaying linear system The other 7 variables (x7 , . . . , x13 ) are random independent Gaussian variables. In this experiment, we simulate the system described above for various numbers of time-steps, keeping the standard deviation of the Gaussian variables at σ = 0.1, and applied both RDI and uRDI algorithms to infer the true causal inferences. Then we calculate the AUC values, the results are shown in Figure 4c. As we can see, the uRDI algorithm outperforms RDI by a margin of 0.1 in terms of AUC. 5 Future Directions In this section, we will describe some promising directions for further investigation. 1. Quantifying causal strength: As pointed out earlier, potential conditional mutual information can be used as a metric for quantifying causal strength when the graph is a simple three node network (shown in Figure 1a). However, further work is needed in order to generalize the definition to deduce the causal strength of an edge or a set of edges in an arbitrary graph, akin to the formulation in [2] and to study the relative advantages and disadvantages of such a formulation. 2. Discrete qCMI estimators: It has been shown in recent work that such estimators are not optimal even for determining mutual information in the discrete alphabet case [30, 31, 32]. A very interesting question is how such minimax-rate optimal estimators can be developed in the potential measures problem. 3. maxCMI estimation: While we have developed efficient estimators for qCMI, in maxCMI, there is a further maximization over potential distributions q, which leads to some interesting interactions between estimation and optimization. Recent work has studied estimation of Shannon capacity on continuous alphabets, however, the formulation is not convex leading to possible local minima [14]. Further work is needed in order to find provably optimal estimators for maxCMI in the continuous case. 4. Other conditional measures: Recent work [15] has used strong data processing constants as a way for quantifying dependence between two variables, with relationships to information bottleneck. These measures depend partially on the factual measure pX , and are implicitly regularized. One direction of future work is to develop multi-variable versions of such estimators to estimate the strength of conditional independence, for example. 5. Multivariable measures: Develop estimators that can handle more general multi-variable information measures including total correlation [33] and multi-variate mutual information [34]. 6. Ensemble estimation: Another approach exploiting k-nearest-neighbors for mutual information is the socalled ensemble estimation approach, where estimators for different k are combined together to get a stronger 9 estimator, with fast convergence [35]. An interesting direction of research is to obtain ensemble estimators for potential measures. 6 Acknowledgement The authors would like to thank Xiaojie Qiu and Cole Trapnell for discussions that triggered this work. This work was supported in part by NSF Career award (grant 1651236) and NIH award number R01HG008164. A Proof Here we’ll try to introduce a proof for qCMI algorithm we devised. As we know, the conditional mutual information is defined as,   Z fY |XZ (y|x, z) I(X; Y |Z) = fXY Z (x, y, z) log dxdydz. (11) fY |Z (y|z) The qCMI is defined as the mutual information of X and Y given Z when the joint distribution of X and Z is replaced by a joint uniform distribution qXZ (x, z), ! Z fY |XZ (y|x, z) q dxdydz. (12) I (X; Y |Z) = fY |XZ (y|x, z)qXZ (x, z) log fYq |Z (y|z) In which: fYq |Z (y|z) = fYq Z (y, z) = fZq (z) = fYq Z (y, z) , f q (z) Z Z q fXY Z (x, y, z)dx, Z q fXY Z (x, y, z)dxdy. (13) (14) (15) from now on, the superscript U over each distribution function implies that the actual fXZ (x, z) is replaced by qXZ (x, z). Equivalently, qCMI can be written as, I q (X; Y |Z) = −hq (X, Y, Z) + hq (X, Z) + hq (X, Y ) − hq (Z), (16) where, Z q h (X, Y, Z) ≡ hq (X, Z) ≡ hq (Y, Z) ≡ hq (Z) ≡ − Z − Z − Z − q fXY Z (x, y, z) log fXY Z (x, y, z)dxdydz. (17) q fXY Z (x, y, z) log fXZ (x, z)dxdydz. (18) q q fXY Z (x, y, z) log fY Z (y, z)dxdydz. (19) q q fXY Z (x, y, z) log fZ (z)dxdydz. (20)  R q Note that −hq (X, Y, Z) + hq (X, Z) = −hq (Y |X, Z) = fXY Z (x, y, z) log fY |XZ (y|x, z) dxdydz. So the term inside the logarithm is independent of the distribution over (X, Z) and hence log fXY Z (x, y, z) and log fXZ (x, z) appear when defining hq (X, Y, Z) and hq (X, Z). Here we introduce a qCMI estimator, based on the KSG estimator for UMI. Remember the KSG-type estimator for the conditional MI, N 1 X ˆ (ψ(k) − log(nxz,i ) − log(nyz,i ) + log(nz,i )) + C(dx , dy , dz ). I(X; Y |Z) = N i=1 10 (21) where  C(dx , dy , dz ) := log cdx +dz cdy +dz cdx +dy +dz cdz  . (22) The estimator for the qCMI is as below, N 1 X Iˆq (X; Y |Z) = ωi gi (xi , yi , zi ), N i=1 (23) where, ωi ≡ qXZ (xi , zi ) . fˆXZ (xi , zi ) (24) gi (xi , yi , zi ) ≡ ψ(k) − log(nxz ) − log( X k(yi −yj ,zi −zj )k<ρk,i B X ωj ) + log( ωj ) + C(dx , dy , dz ). (25) kzi −zj k<ρk,i KSG estimator for qCMI: Proof of convergence Similar to the [19] we define, ωi0 ≡ n0yz,i ≡ qXZ (xi , zi ) . fXZ (xi , zi ) X ωj0 . (26) (27) (i) j∈Nyz n0z,i X ≡ ωj0 . (28) (i) j∈Nz g 0 (xi , yi , zi ) ≡ ψ(k) − log(nxz ) − log(n0yz,i ) + log(n0z,i ) + C(dx , dy , dz ). (29) From the triangle inequality, we can write, |Iˆq (X; Y |Z) − I q (X; Y |Z)| ≤ + |Iˆq (X; Y |Z) − | 1 N N X ωi0 g 0 (xi , yi , zi )| (30) (31) i=1 N 1 X 0 0 ω g (xi , yi , zi ) − I q (X; Y |Z)|. N i=1 i (32) To show the convergence of the KSG estimator for qCMI, we will show that (31) and (32) both converge to zero. The Lemma 1 proves that (31) converges to zero. The lemma will be proven through the Section C. Lemma 1. The term (31) converges to 0 as N −→ ∞ in probability. For (32) we will first write the left hand side term as four entropy terms and show the convergence of each of the terms to their respecttive true entropy term. This will be done in the Lemmas 2 and 3. So we can write, N N X ωi0 1 X 0 0 ωi g (xi , yi , zi ) = ĥq (Y, Z) + ĥq (X, Z) − ĥq (X, Y, Z) − ĥq (Z) − (log(N − 1) + ψ(N )) , N i=1 N i=1 11 (33) where, N  1 X 0 ω −ψ(k) + ψ(N ) + log cdx +dy +dz + (dx + dy + dz ) log ρk,i . N i=1 i (34) ≡ N 1 X 0 ω (− log(nxz,i ) + log(N − 1) + log cdx +dz + (dx + dz ) log ρk,i ) . N i=1 i (35) ĥqN (Y, Z) ≡ N  1 X 0 ωi − log(n0yz,i ) + log(N − 1) + log cdy +dz + (dy + dz ) log ρk,i . N i=1 (36) N  1 X 0 ωi − log(n0z,i ) + log(N − 1) + log cdz + dz log ρk,i . N i=1 (37) ĥqN (X, Y, Z) ≡ ĥqN (X, Z) ĥqN (Z) ≡ PN ω 0 The term i=1 Ni (log(N − 1) + ψ(N )) converges to 0 as N −→ ∞. We will prove the convergence of the rest of terms in the following lemmas, proving the Theorem 1. p Lemma 2. Under the Assumption 1, ĥqN (X, Y, Z) → hq (X, Y, Z) as N −→ ∞. Proof. It directly follows from the Lemma 2 from [19]. We just need to let X̃ ≡ (X, Z) and then show that ĥqN (X̃, Y ) −→ hq (X̃, Y ) directly using the Lemma 2 from [19]. Lemma 3. For N −→ ∞, p ĥqN (X, Z) + ĥqN (Y, Z) − ĥqN (Z) → hq (X, Z) + hq (Y, Z) − hq (Z). C (38) Proof of lemma 1 Th proof is analog to that of Lemma 1 in [19]. The term (31) is upper-bounded as, |Iˆq (X; Y |Z) − = | N 1 X 0 0 ω g (xi , yi , zi )| N i=1 i (39) N 1 X (ωi g(xi , yi , zi ) − ωi0 g 0 (xi , yi , zi )) | N i=1 (40) ≤ N 1 X |ωi g(xi , yi , zi ) − ωi0 g 0 (xi , yi , zi )| N i=1 (41) ≤ N 1 X (|ωi − ωi0 ||g 0 (xi , yi , zi )| − ωi |g(xi , yi , zi ) − g 0 (xi , yi , zi )|) N i=1 (42) = N  1 X |ωi − ωi0 ||g 0 (xi , yi , zi )| + ωi | log(nyz,i ) − log(n0yz,i )| + ωi | log(nz,i ) − log(n0z,i )| N i=1 (43) ! N 1 X 1 1 1 1 0 0 0 0 ≤ |ωi − ωi ||g (xi , yi , zi )| + ωi |nyz,i − nyz,i |( + 0 ) + ωi |nz,i − nz,i |( + 0 ) (44) N i=1 2nyz,i 2nyz,i 2nz,i 2nz,i   N N X 1 X ωi max1≤j≤N |ωi0 − ωi | max1≤j≤N |ωi0 − ωi | ≤ |ωi − ωi0 ||g 0 (xi , yi , zi )| + + (45) N i=1 N min1≤j≤N ωi0 min1≤j≤N ωi i=1   1 1 0 0 ≤ max |ωi − ωi | max |g (xi , yi , zi )| + + . (46) 1≤i≤N 1≤i≤N min1≤j≤N ωi0 min1≤j≤N ωi 12 The term g 0 (xi , yi , zi ) can be easily lower-bounded and upper-bounded as, − 2 log N ≤ g 0 (xi , yi , zi ) ≤ 2 log N. (47) Thus, for any  > 0 and sufficiently large N such that log N > max{C2 /3, 3C2 } and, if |ωi − ωi0 | < /(3 log N ) for all i , we have,   1 1 0 0 + (48) max |ωi − ωi | max |g (xi , yi , zi )| + 1≤i≤N 1≤i≤N min1≤j≤N ωi0 min1≤j≤N ωi ! 1  2 log N + C2 + ≤ (49)  3 log N 1/C2 − 3 log N  (2 log N + C2 + 2C2 ) ≤ . (50) ≤ 3 log N So for any  > 0 and sufficiently large N : !   N 1 X  0 0 0 P |ωi g(xi , yi , zi ) − ωi g (xi , yi , zi )| >  ≤ P max |ωi − ωi | > . (51) 1≤i≤N N i=1 3 log N    converges to zero as N −→ Following the proof of Lemma 1 in [19], the term P max1≤i≤N |ωi − ωi0 | > 3 log N ∞. So the desired convergence for the term (31) is obtained. D Proof of lemma 3 If we define, fˆXZ (xi , zi ) ≡ fˆYq Z (yi , zi ) ≡ fˆZq (zi ) ≡ âi ai nxz,i , x +dz (N − 1)cdx +dz ρdk,i n0yz,i d +dz y (N − 1)cdy +dz ρk,i n0z,i z (N − 1)cdz ρdk,i (52) , (53) , (54) ≡ log fˆXZ (xi , zi ) + log fˆYq Z (yi , zi ) − log fˆZq (zi ), ≡ log fXZ (xi , zi ) + log fYq Z (yi , zi ) − log fZq (zi ). (55) (56) Then, ĥqN (X, Z) + ĥqN (Y, Z) − ĥqN (Z) = − N X ω0  i i=1 = − N N X ω0 i i=1 N  log fˆXZ (xi , zi ) + log fˆYq Z (yi , zi ) − log fˆZq (zi ) âi . (57) (58) Now we can write, |ĥqN (X, Z) + ĥqN (Y, Z) − ĥqN (Z) − (hq (X, Z) + hq (Y, Z) − hq (Z)) | ≤ |hq (X, Z) + hq (Y, Z) − hq (Z) − N X i=1 + N X ω0 i i=1 N |ai − âi |. − ωi0 N ai | (59) (60) (61) 13 For the term (60), since the terms ai = ωi0 (log fXZ (xi , zi ) + log fYq Z (yi , zi ) + log fZq (zi )) are i.i.d random variables, given the Assumption 1, by the strong law of large numbers, we can write, N X i=1 − ωi0 ai N N X = i=1 − ωi0 (log fXZ (x, z) + log fYq Z (y, z) − log fZq (z)) N (62) =   qXZ (x, z) E − (log fXZ (x, z) + log fYq Z (y, z) − log fZq (z)) fXZ (x, z) Z − fY |XZ (y|x, z)qXZ (x, z) (log fXZ (x, z) + log fYq Z (y, z) − log fZq (z)) dxdydz = hq (X, Z) + hq (Y, Z) − hq (Z). −→ (63) (64) (65) Therefore, the term (60) converges to 0 almost surely. For the term (61), let Ti = (Xi , Yi , Zi ), thus t = (x, y, z), and fT (t) = fXY Z (x, y, z). For any fixed  > 0, we can write, ! N X ωi0 P |ai − âi | >  (66) N i=1 ! ! N N [ X ≤ P {|ai − âi | > /2} + P ωi0 > 2N . (67) i=1 i=1 The second term converges to zero. The first term can be bounded as, ! N [ P {|ai − âi | > /2} (68) i=1 Z ≤ N.P (|ai − âi | > /2) ≤ N P (|ai − âi | > /2|Ti = t) fT (t)dt. (69) The term P (|ai − âi | > /2|Ti = t) can be upper-bounded by I1 (t) + I2 (t) + I3 (t) + I4 (t) + I5 (t), where, I1 (t) = P (ρk,i > r1 |Ti = t) . (70) I2 (t) = (71) I3 (t) = I4 (t) = I5 (t) = P (ρk,i < r2 |Ti = t) . Z r1 P (| log fXZ (xi , zi ) − log fˆXZ (xi , zi )| > /6|ρk,i = r, Ti = t)fρ (r)dr. r=r2 Z r1 P (| log fU (Y Z) (yi , zi ) − log fˆU (Y Z) (yi , zi )| > /6|ρk,i = r, Ti = t)fρ (r)dr. r=r2 Z r1 P (| log fU (Z) (zi ) − log fˆU (Z) (zi )| > /6|ρk,i = r, Ti = t)fρ (r)dr. (72) (73) (74) r=r2 In which, −1 r1 r2 ≡ log N (N fT (t)cdx +dy +dz ) dx +dy +dz 2 ≡ max{(log N ) (N fXZ (x, z)cdx +dz ) (75) −1 dx +dz 2 q , (log N ) (N f (y, z)cdy +dz ) −1 dy +dz 2 , (log N ) −1 (N fZq (z)cdz ) dz }.(76) The terms I1 (t) and I2 (t) represent the probability that the value of ρk.i is too large or two small. We will show that both probabilities converge to 0, i.e. ρi,k obtained lies within a reasonable range. The r1 threshold is dx +dy +dz k determined based on the fact that N ≈ fT (ti )cdx +dy +dz ρk,i and selecting k = log N is a reasonable choice. s The r2 threshold, on the other hand, implies that ρi,k should lie in a range such that kNs ≈ fS (si )cds ρdk,i for all subspaces s ∈ {(x, z), (y, z), z}. The terms I3 (t), I4 (t) and I5 (t) represent the estimation error probability for a reasonable ρk,i . Considering each of the terms separately, We will prove that each term will go to zero as N goes to infinity. 14 D.0.1 Convergence of I1 The term I1 (t) can be upper-bounded in the same way as explained in [19] for I1 (z). Then we will have, I1 (t) ≤ kN k−1 exp{− D.0.2 (log N )dx +dy +dz }. 4 (77) Convergence of I2 For the convergence of I2 (t), we are goona take the same steps as [19] for I2 (z). First let BT (t, r) ≡ n : kn − tk < r −1 be the (dx + dy + dz )-dimensional ball centered at z with radius r. For r2,1 ≡ (log N )2 (N fXZ (x, z)cdx +dz ) dx +dz and for sufficiently large N , the probability mass within the BT (t, r2,1 ) is given by,   −1 p2,1 ≡ P u ∈ BT (t, (log N )2 (N fXZ (x, z)cdx +dz ) dx +dz   dx +dy +dz  −1 −1 1 + C(log N )4 (N fXZ (x, z)cdx +dz ) dx +dz )2 ≤ fT (t)cdx +dy +dz (log N )2 (N fXZ (x, z)cdx +dz ) dx +dz ≤ 2fT (t)cdx +dy +dz dx +dy +dz dx +dz (log N )2(dx +dy +dz ) N − dx +dy +dz dx +dz (fXZ (x, z)cdx +dz ) dx +dy +dz cd +d +d ≤ 2fY |XZ (y|x, z) x y z (log N )2(dx +dy +dz ) N − dx +dz cdx +dz dx +dy +dz c d +d +d x y z ≤ 2C 0 (log N )2(dx +dy +dz ) N − dx +dz . cdx +dz (78) (79) (80) Where the last inequalty comes from the assumption that fY |XZ (y|x, z) < C 0 . Similarly, for the second −1 threshold r2,2 = (log N )2 (N f q (y, z)cdy +dz ) dy +dz , p2,2   −1 ≡ P u ∈ BT (t, (log N )2 (N fYq Z (y, z)cdy +dz ) dy +dz  dx +dy +dz   −1 −1 ≤ fT (t)cdx +dy +dz (log N )2 (N fYq Z (y, z)cdy +dz ) dy +dz 1 + C(log N )4 (N fYq Z (y, z)cdy +dz ) dy +dz )2 ≤ 2fT (t)cdx +dy +dz dx +dy +dz dy +dz (log N )2(dx +dy +dz ) N − dx +dy +dz dy +dz (fYq Z (y, z)cdy +dz ) d +dy +dz fT (t) cdx +dy +dz − xdy +d z ≤ 2 q (log N )2(dx +dy +dz ) N fY Z (y, z) cdy +dz d +dy +dz f q (t) cdx +dy +dz − xdy +d z ≤ 2C2 q T (log N )2(dx +dy +dz ) N fY Z (y, z) cdx +dz d +dy +dz cd +d +d − xdy +d z ≤ 2C2 C 0 x y z (log N )2(dx +dy +dz ) N . cdy +dz (81) (82) (83) (84) The last two inequalities come from the bounds assumed on the distribution functions. Similarly, for the second 15 −1 threshold r2,2 = (log N )2 (N fZq (z)cdz ) dz we can write:   −1 p2,3 ≡ P u ∈ BT (t, (log N )2 (N fZq (z)cdz ) dz  dx +dy +dz   −1 −1 1 + C(log N )4 (N fZq (z)cdz ) dz )2 ≤ fT (t)cdx +dy +dz (log N )2 (N fZq (z)cdz ) dz ≤ ≤ ≤ ≤ 2fT (t)cdx +dy +dz dx +dy +dz dz (log N )2(dx +dy +dz ) N − (85) (86) dx +dy +dz dz (87) (fZq (z)cdz ) dx +dy +dz fT (t) cdx +dy +dz 2 q (log N )2(dx +dy +dz ) N − dz fZ (z) cdz dx +dy +dz fTq (t) cdx +dy +dz 2C2 q (log N )2(dx +dy +dz ) N − dz fZ (z) cdz dx +dy +dz c d +d +d x y z 2C2 C 0 (log N )2(dx +dy +dz ) N − dz cdz (88) (89) (90) The last two inequalities come from the bounds assumed on the distribution functions. Similar to the procedure for I2 (z) in the [19], I2 (t) is the probability that at least k samples lie in BT (t, max{r2,1 , r2,2 , r2,3 }). Then we have, I2 (t) = = P (ρk,i < max{r2,1 , r2,2 , r2,3 })  N −1  X N-1 N −1−m max{p2,1 , p2,2 , p2,3 }m (1 − max{p2,1 , p2,2 , p2,3 }) m (91) (92) m=k ≤ N −1 X N m max{p2,1 , p2,2 , p2,3 }m (93) m=k ≤ N −1  X m=k d +d dy z cdx +dy +dz − min{ xdz y , dxd+d , } y dx +dz 2CC (log N )2(dx +dy +dz ) N min{cdy +dz , cdx +dz , cdz } 0 m . (94) (95) Similarly, for N sufficently large and applying the sum of geometric series, we have,  I2 (t) ≤ 4CC 0 D.0.3 cdx +dy +dz min{cdy +dz , cdx +dz , cdz } k (log N )2k(dx +dy +dz ) N −k min{ dx +dy dz d y z , dxd+d , } y dx +dz . (96) Convergence of I3 Given Ti = t = (x, y, z), and ρk,i = r and fˆXZ (xi , zi ) = nxz,i x +dz (N −1)cdx +dz ρd k,i , we have,   P | log fXZ (Xi , Zi ) − log fˆXZ (Xi , Zi )| > /6|ρk,i = r, Ti = t   = P nxz,i > (N − 1)cdx +dz rdx +dz fXZ (x, z)e/6 |ρk,i = r, Ti = t   + P nxz,i < (N − 1)cdx +dz rdx +dz fXZ (x, z)e/6 |ρk,i = r, Ti = t . (97) (98) (99) Given Ti = t, Lemma 4 gives the probability distribution of the nxz,i . Lemma 4. Given Ti = t = (x, y, z), and ρk,i = r < rN for some deterministic sequance of rN such that PN −1 limN ←−∞ rN = 0 and for any  > 0, the number of neighbors nxz,i −k is distributed as l=k+1 Ul , where Ul are i.i.d Bernoulli random variables with mean fXZ (x, z)cdx +dz rdx +dz (1 − /8) ≤ E[Ul ] ≤ fXZ (x, z)cdx +dz rdx +dz (1 − /8) for sufficiently large N . 16 Proof. See the proof of Lemma 5 in [19]. Based on Lemma 4,   P nxz,i > (N − 1)cdx +dz rdx +dz fXZ (x, z)e/6 |ρk,i = r, Ti = t ! N −1 X dx +dz /6 = P fXZ (x, z)e − k Ul > (N − 1)cdx +dz r (100) (101) l=k+1 N −1 X = P ! Ul − (N − 1 − k)E[Ul ] > (N − 1)cdx +dz r dx +dz /6 fXZ (x, z)e − k − (N − 1 − k)E[Ul ] . (102) l=k+1 The right hand side term inside the probability can be lower bounded as, (N − 1)cdx +dz rdx +dz fXZ (x, z)e/6 − k − (N − 1 − k)E[Ul ] ≥ (N − 1)cdx +dz r dx +dz /6 (103) dx +dz − k − (N − 1 − k)fXZ (x, z)cdx +dz r (1 − /8) (104)   /6 fXZ (x, z) e − 1 − /8 − k ≥ (N − k − 1)cdx +dz r (105)  (106) ≥ (N − k − 1)cdx +dz rdx +dz fXZ (x, z) . 48 for sufficiently large N . 2 Applying Bernstein’s inequality, (102) can be upper bounded by exp{− 2304(1+19/144) (N −k−1)cdx +dz rdx +dz fXZ (x, z)}. The tail distribution can also be upper-bounded by the same term. Thus, fXZ (x, z)e dx +dz P (| log fXZ (xi , zi ) − log fˆXZ (xi , zi )| > /6|ρk,i = r, Ti = t) ≤ 2 exp{− 2 (N − k − 1)cdx +dz rdx +dz fXZ (x, z)}. 2304(1 + 19/144) Therefore, the term I3 (t) can be upper-bounded as, Z r1 I3 (t) = P (| log fXZ (xi , zi ) − log fˆXZ (xi , zi )| > /6|ρk,i = r, Ti = t)fρ (r)dr (107) (108) r=r2 −1 Z log N (N fT (t)cdx +dy +dz ) dx +dy +dz ≤ −1 P (| log fXZ (xi , zi ) − log fˆXZ (xi , zi )| > /6|ρk,i = r, Ti = t)fρ (r)dr r=(log N )2 (N fXZ (x,z)cdx +dz ) dx +dz −1 Z ≤ log N (N fT (t)cdx +dy +dz ) dx +dy +dz 2 (N − k − 1)cdx +dz rdx +dz fXZ (x, z)}fρ (r)dr 2304(1 + 19/144)  dx +dz −1 N cdx +dz fXZ (x, z) (log N )2 (N fXZ (x, z)cdx +dz ) dx +dz } (109) −1 r=(log N )2 (N fXZ (x,z)cdx +dz ) dx +dz 2 exp{− 2 4608 2 2(d +d ) ≤ 2 exp{− (log N ) x z }. 4608 For sufficiently large N. ≤ D.0.4 2 exp{− (110) Convergence of I4 Given Ti = t = (x, y, z), and ρk,i = r and fˆU (yi , zi ) = = + n0yz,i d +dz y (N −1)cdy +dz ρk,i , we have,   P | log f q (Yi , Zi ) − log fˆq (Yi , Zi )| > /6|ρk,i = r, Ti = t   P nyz,i > (N − 1)cdy +dz rdy +dz f q (Yi , Zi )e/6 |ρk,i = r, Ti = t   P nyz,i < (N − 1)cdy +dz rdy +dz f q (Yi , Zi )e/6 |ρk,i = r, Ti = t . 17 (111) (112) (113) (1) (2) We can write n0yz,i = nyz,i + nyz,i , where, (1) nyz,i X = j:kTj −tk<ρi,k (2) nyz,i X = j:kTj −tk>ρi,k qXZ (xj , zj ) fXZ (xj , zj ) (114) qXZ (xj , zj ) I{k(Yj − Yi , Zj − Zi )k < ρk,i }. fXZ (xj , zj ) (115) Given Ti = t, Lemma 5 gives the probability distribution of the n0yz,i . Lemma 5. Given Ti = t = (x, y, z), and ρk,i = r < rN for some deterministic sequance of rN such that PN −1 (2) limN ←−∞ rN = 0 and for any  > 0, the distribution of nyz,i is l=k+1 Vl , where Vl are i.i.d random variables with Vl ∈ [0, 1/C1 ] and mean fXZ (x, z)cdx +dz rdx +dz (1 − /8) ≤ E[Ul ] ≤ fXZ (x, z)cdx +dz rdx +dz (1 − /8) for sufficiently large N . Proof. See the proof of Lemma 6 in [19]. According to the Lemma 5 and following the same procedure as I3 (t), the term I4 (t) will also be bounded here in th same way. We have: C 1 2 2(d +d ) I4 (t) ≤ 2 exp{− (log N ) y z } (116) 4608 D.0.5 Convergence of I5 Similar to the case of I4 (t), given Ti = t = (x, y, z), and ρk,i = r and fˆU (zi ) = , we have,   P | log f q (Zi ) − log fˆq (Zi )| > /6|ρk,i = r, Ti = t   P nz,i > (N − 1)cdz rdz f q (Zi )e/6 |ρk,i = r, Ti = t   P nz,i < (N − 1)cdz rdz f q (Zi )e/6 |ρk,i = r, Ti = t . = + (1) n0z,i z (N −1)cdz ρd k,i (117) (118) (119) (2) We can write n0z,i = nz,i + nz,i , where, (1) nz,i = X j:kTj −tk<ρi,k (2) nz,i = X j:kTj −tk>ρi,k qXZ (xj , zj ) fXZ (xj , zj ) (120) qXZ (xj , zj ) I{kZj − Zi k < ρk,i }. fXZ (xj , zj ) (121) Following the same procedure as for I4 (t), we will obtain the upper bound below for I5 (t): I5 (t) ≤ 2 exp{− C1 2 2(d ) (log N ) z } 4608 18 (122) Now, we can write, N X ω0 i P i=1 N ! |ai − âi | >  (123) Z ≤ N (I1 (t) + I2 (t) + I3 (t) + I4 (t) + I5 (t)) fT (t)dt (124) (log N )dx +dy +dz } ≤ kN k exp{− 4  k d +d dy z cdx +dy +dz 1−k min{ xdz y , dxd+d , } y dx +dz + 4CC 0 (log N )2k(dx +dy +dz ) N min{cdy +dz , cdx +dz , cdz } + 2N exp{− 2 C1 2 2(d +d ) 2(d ) (log N ) x z + 4N exp{− (log N ) z }. 4608 4608 (125) d d +d y z , dx +d } < 0, then all the terms will converge to 0 as If k is chosen large enough so that 1 − k min{ xdz y , dxd+d y z N goes to infinity, and the proof of Lemma 3 is complete. References [1] T. M. Cover and J. A. Thomas, Elements of information theory. John Wiley & Sons, 2012. [2] D. Janzing, D. Balduzzi, M. Grosse-Wentrup, and B. Schölkopf, “Quantifying causal influences,” The Annals of Statistics, pp. 2324–2358, 2013. [3] P. Spirtes, C. N. Glymour, and R. Scheines, Causation, prediction, and search. MIT press, 2000. [4] P. W. Holland, C. Glymour, and C. Granger, “Statistics and causal inference,” ETS Research Report Series, vol. 1985, no. 2, 1985. [5] A. P. Dawid, “Conditional independence in statistical theory,” Journal of the Royal Statistical Society. Series B (Methodological), pp. 1–31, 1979. [6] C. W. Granger, “Investigating causal relations by econometric models and cross-spectral methods,” Econometrica: Journal of the Econometric Society, pp. 424–438, 1969. [7] P. Geiger, K. Zhang, B. Schoelkopf, M. Gong, and D. Janzing, “Causal inference by identification of vector autoregressive processes with hidden components,” in International Conference on Machine Learning, pp. 1917–1925, 2015. [8] H. Hosseini, S. Kannan, B. Zhang, and R. Poovendran, “Learning temporal dependence from time-series data with latent variables,” in Data Science and Advanced Analytics (DSAA), 2016 IEEE International Conference on, pp. 253–262, IEEE, 2016. [9] M. Eichler, “Graphical modelling of multivariate time series,” Probability Theory and Related Fields, vol. 153, no. 1-2, pp. 233–268, 2012. [10] C. J. Quinn, N. Kiyavash, and T. P. Coleman, “Directed information graphs,” IEEE Transactions on information theory, vol. 61, no. 12, pp. 6887–6909, 2015. [11] J. Sun, D. Taylor, and E. M. Bollt, “Causal network inference by optimal causation entropy,” SIAM Journal on Applied Dynamical Systems, vol. 14, no. 1, pp. 73–106, 2015. [12] A. Rahimzamani and S. Kannan, “Network inference using directed information: The deterministic limit,” in Communication, Control, and Computing (Allerton), 2016 54th Annual Allerton Conference on, pp. 156–163, IEEE, 2016. 19 [13] X. Qiu, S. Ding, and T. Shi, “From understanding the development landscape of the canonical fate-switch pair to constructing a dynamic landscape for two-step neural differentiation,” PloS one, vol. 7, no. 12, p. e49271, 2012. [14] W. Gao, S. Kannan, S. Oh, and P. Viswanath, “Causal strength via shannon capacity: Axioms, estimators and applications,” in Proceedings of the 33rd International Conference on Machine Learning, 2016. [15] H. Kim, W. Gao, S. Kanan, S. Oh, and P. Viswanath, “Discovering potential correlations via hypercontractivity,” arXiv preprint arXiv:1709.04024, 2017. [16] V. Anantharam, A. Gohari, S. Kamath, and C. Nair, “On maximal correlation, hypercontractivity, and the data processing inequality studied by erkip and cover,” arXiv preprint arXiv:1304.6133, 2013. [17] Y. Polyanskiy and Y. Wu, “Strong data-processing inequalities for channels and bayesian networks,” in Convexity and Concentration, pp. 211–249, Springer, 2017. [18] N. Tishby, F. C. Pereira, and W. Bialek, “The information bottleneck method,” arXiv preprint physics/0004057, 2000. [19] W. Gao, S. Kannan, S. Oh, and P. Viswanath, “Conditional dependence via shannon capacity: Axioms, estimators and applications,” arXiv preprint arXiv:1602.03476, 2016. [20] R. Kidambi and S. Kannan, “On shannon capacity and causal estimation,” in Communication, Control, and Computing (Allerton), 2015 53rd Annual Allerton Conference on, pp. 988–992, IEEE, 2015. [21] J. M. Mooij, J. Peters, D. Janzing, J. Zscheischler, and B. Schölkopf, “Distinguishing cause from effect using observational data: methods and benchmarks,” The Journal of Machine Learning Research, vol. 17, no. 1, pp. 1103–1204, 2016. [22] L. Devroye and C. S. Penrod, “The consistency of automatic kernel density estimates,” The Annals of Statistics, pp. 1231–1249, 1984. [23] S. J. Sheather and M. C. Jones, “A reliable data-based bandwidth selection method for kernel density estimation,” Journal of the Royal Statistical Society. Series B (Methodological), pp. 683–690, 1991. [24] A. Kraskov, H. Stögbauer, and P. Grassberger, “Estimating mutual information,” Physical review E, vol. 69, no. 6, p. 066138, 2004. [25] S. Khan, S. Bandyopadhyay, A. R. Ganguly, S. Saigal, D. J. Erickson III, V. Protopopescu, and G. Ostrouchov, “Relative performance of mutual information estimation methods for quantifying the dependence among short and noisy data,” Physical Review E, vol. 76, no. 2, p. 026209, 2007. [26] L. Kozachenko and N. N. Leonenko, “Sample estimate of the entropy of a random vector,” Problemy Peredachi Informatsii, vol. 23, no. 2, pp. 9–16, 1987. [27] W. Gao, S. Oh, and P. Viswanath, “Demystifying fixed k-nearest neighbor information estimators,” in Information Theory (ISIT), 2017 IEEE International Symposium on, pp. 1267–1271, IEEE, 2017. [28] W. Gao, S. Kannan, S. Oh, and P. Viswanath, “Estimating mutual information for discrete-continuous mixtures,” arXiv preprint arXiv:1709.06212, 2017. [29] S. Frenzel and B. Pompe, “Partial mutual information for coupling analysis of multivariate time series,” Physical review letters, vol. 99, no. 20, p. 204101, 2007. [30] G. Valiant and P. Valiant, “Estimating the unseen: an n/log (n)-sample estimator for entropy and support size, shown optimal via new clts,” in Proceedings of the forty-third annual ACM symposium on Theory of computing, pp. 685–694, ACM, 2011. 20 [31] J. Jiao, K. Venkat, Y. Han, and T. Weissman, “Minimax estimation of functionals of discrete distributions,” IEEE Transactions on Information Theory, vol. 61, no. 5, pp. 2835–2885, 2015. [32] Y. Wu and P. Yang, “Minimax rates of entropy estimation on large alphabets via best polynomial approximation,” IEEE Transactions on Information Theory, vol. 62, no. 6, pp. 3702–3720, 2016. [33] S. Watanabe, “Information theoretical analysis of multivariate correlation,” IBM Journal of research and development, vol. 4, no. 1, pp. 66–82, 1960. [34] C. Chan, A. Al-Bashabsheh, J. B. Ebrahimi, T. Kaced, and T. Liu, “Multivariate mutual information inspired by secret-key agreement,” Proceedings of the IEEE, vol. 103, no. 10, pp. 1883–1913, 2015. [35] K. R. Moon, K. Sricharan, and A. O. Hero III, “Ensemble estimation of mutual information,” arXiv preprint arXiv:1701.08083, 2017. 21
7cs.IT
TRACE RECONSTRUCTION WITH VARYING DELETION PROBABILITIES arXiv:1708.02216v1 [math.PR] 7 Aug 2017 LISA HARTUNG, NINA HOLDEN, AND YUVAL PERES A BSTRACT. In the trace reconstruction problem an unknown string x = (x0 , . . . , xn−1 ) ∈ {0, 1, ..., m − 1}n is observed through the deletion channel, which deletes each xk with a e Earlier works have proved that if each certain probability, yielding a contracted string X. xk is deleted with the same probability q ∈ [0, 1), then exp(O(n1/3 )) independent copies of e suffice to reconstruct x with high probability. We extend this upper the contracted string X bound to the setting where the deletion probabilities vary, assuming certain regularity conditions. First we consider the case where xk is deleted with some known probability qk . Then we consider the case where each letter ζ ∈ {0, 1, ..., m − 1} is associated with some possibly unknown deletion probability qζ . 1. I NTRODUCTION N Let n ∈ , m ∈ {2, 3, . . . }, and [m] = {0, . . . , m − 1}. In trace reconstruction the goal is to reconstruct an unknown string x = (x0 , . . . , xn−1 ) ∈ [m]n from noisy observations of x. Here we study the case where the data is noisy due to a deletion channel in which each bit is deleted independently with a certain probability. In other words, instead of e obtained by sending x through the observing x we observe many independent strings X deletion channel. The probability of deleting xk might depend on either (I) the location k of xk in the string, or (II) the letter xk . e is obtained in the following In Case (I) and given pk ∈ (0, 1] for k ∈ [n], the string X way for k = 0, 1, . . . , n − 1, starting from an empty string. e and increase k by one. • (retention) With probability pk , copy xk to the end of X • (deletion) With probability qk = 1 − pk , increase k by one. e is obtained by performing the In Case (II) and given pζ ∈ (0, 1] for ζ ∈ [m], the string X following steps for k = 0, 1, . . . , n − 1. e and increase k by one. • (retention) With probability px , copy xk to the end of X k • (deletion) With probability qxk = 1 − pxk , increase k by one. In Case (I) we assume the deletion probabilities are known, while we do not make this assumption in Case (II). e (1) , . . . , X e (T ) (called “traces”) from the For T ∈ we consider T independent outputs X deletion channel. Our main question is the following. Given ε > 0, how many samples b ∈ [m]n we have [X b = x] > 1 − ε? Holenstein, are needed, such that for some X  Mitzenmacher, Panigrahy, and Wieder [5] proved that exp n1/2 polylog(n) traces are sufficient in the case where all xk are deleted independently with the same probability q ∈ [0, 1). See [6] for an alternative proof. This result was recently improved by De, O’Donnell, and Servedio [3], and by Nazarov and Peres [8]. Using single  bit statistics for 1/3 the traces, they proved that reconstruction is possible with exp O(n ) traces, and that this is optimal for reconstruction techniques using only single bit statistics. The case of random strings was studied in [1] and [9]. N P Date: August 8, 2017. 1 2 LISA HARTUNG, NINA HOLDEN, AND YUVAL PERES 1.1. Main result. We study the following two settings in Case (I) where the deletion probabilities depend on the location in the string. (i) (weak monotonicity) For some δ ∈ (0, 1) the retention probabilities (pk )k∈N satisfy p` > p2k + δ for all k > `, and pk > δ for all k > 0. (ii) (periodicity) The deletion probabilities are 2-periodic, meaning that qk = q for k even, qk = qe for k odd. (1.1) In particular, (i) covers the case where the retention probabilities are monotonically decreasing and bounded away from zero, and the case where all retention probabilities are in some interval [p + δ, 2p] for p ∈ (0, 1/2] and δ > 0. Also observe that, by reversing the p sequence, we can also study strings where the deletion probabilities satisfy p` > 2j + δ for all ` > j (instead of ` < j). Theorem 1.1. Let ε > 0 and m ∈ {2, 3, . . . }, and let the deletion probabilities be known and satisfy Assumption (i) or (ii). There exists a constant C > 0 depending only on ε, m, and δ (for Assumption (i)), and ε, m, q, and qe (for Assumption (ii)), such that the original  string x ∈ [m]n , can be reconstructed with probability at least 1 − ε from T = dexp Cn1/3 e i.i.d. samples of the deletion channel applied to x. For case (II), where the deletion probabilities vary by letter, we prove the following. Theorem 1.2. For any δ, ε > 0 and m ∈ {2, 3, . . . } there is a constant C > 0 such that if minζ∈[m] pζ ≥ δ, then the string x ∈ [m]n can be reconstructed with probability at least 1 − ε  from T = dexp Cn1/3 e i.i.d. samples of the deletion channel applied to x. This result holds also in the case when the deletion probabilities are unknown. The deletion channel (or variants of it which also allow insertions, substitutions, swaps, etc.) is relevant for the study of mutations and DNA sequencing errors. In the case of mutations several studies have revealed that mutation probabilities vary by location in the genome [4, 7, 10, 11]. Outline of the paper: To prove Theorem 1.1 we will first derive in Section 2.1 an e as the coefficients of a particular exact formula expressing the single bit statistics of X polynomial. In Sections 2.2 and 2.3 we prove that this polynomial cannot be too small everywhere on a particular boundary arc of the unit disk. In Section 3 we use this to prove that for any two input strings, at least one bit in the trace has a sufficiently different expectation so we are able distinguish the two strings. Theorem 1.2 will be proved by first using the traces to obtain good estimates for the deletion probabilities, and then use a single bit test (with the estimated probabilities) for the traces sent through a second deletion channel. Acknowledgements: We thank Ryan O’Donnell for suggesting the problem of varying deletion probabilities. Most of this work was done while the first and second author were visiting Microsoft Research, and they want to thank Microsoft for the hospitality. 2. P REPARATORY L EMMAS 2.1. A polynomial identity. For a ∈ Ψ(w) = Rn define n−1 X k=0 ak pk k−1 Y `=0 (p` w + q` ). (2.1) TRACE RECONSTRUCTION WITH VARYING DELETION PROBABILITIES 3 e be the output of the deletion channel Lemma 2.1. Let a = (a0 , a1 , . . . , an−1 ) ∈ Rn and let a with input a, padded with an infinite sequence of 0’s on the right side. Then   X e aj wj  = Ψ(w). (2.2) E j≥0 Proof. The expectation on the left side of (2.2) can be written as ! n−1 k−1 k−1 X X X j ak p k w P B` = j , k=0 j=0 (2.3) `=0 where B` for ` = 0, . . . , n − 1 are independent Bernoulli(p` )-distributed random variables. Observe that ! k−1 k−1  Pk−1  k−1 X X Y j w P B` = j = E w `=0 B` = (q` + p` w), (2.4) j=0 `=0 `=0 where we used independence in the last step. Plugging (2.4) into (2.3) concludes the proof of Lemma 2.1.  Next, we will establish that (perhaps after a change of variables) the function |Ψ(w)| on a small arc of the unit disc is not to small. We use tools from standard complex analysis (inspired by [2]). 2.2. The deletion probabilities satisfy a monotonicity property. Lemma 2.2. Assume that a0 = 1, ak ∈ [−1, 1] for k ≥ 1, and that there is some δ ∈ (0, 1/10) π such that p0 > p2k + δ and pk > δ for all k > 0. Define the arc γL = {z = eiθ , −π L ≤ θ ≤ L }. Then there is a constant c > 0 depending only on δ such that maxγL |Ψ(w)| > e−cL for all L ≥ 1. Proof. Throughout the proof c is a positive constant which may depend on δ and which may change line by line. Define w0 := −q0 /p0 . Let Ω0 be a rectangular domain which contains w0 and 1/2, has sides parallel to the coordinate axes, and which is such that |pw + (1 − p)| < 1 − δ/2 for all p ∈ {p0 , p1 , . . . } and w ∈ Ω0 . Observe that an appropriate domain exists since the required inequality is satisfied for all w ∈ [w0 , 1/2]. Furthermore, observe that we may assume Ω0 changes continuously as we vary w0 . Let Ω = Ω0 ∪ B1/2 (1/2). For L > 100, let Ω0L be the horizontal translation of Ω by some tL ∈ (0, 1/10), such that γL is the intersection of Ω0L and the right half of ∂ . There is an L0 > 0 depending only on δ such that w0 ∈ Ω0L for all L > L0 , and it is sufficient to prove the result of the lemma for L > L0 . Let ΩL = Ω0L ∩ ( ∪ {z : Re(z) < 0}). Then ∂ΩL is the union of the three disjoint sets γL , γL2 , and γL3 , where D D γL2 := {z ∈ ∂ΩL : Re(z) ≤ 1/2 + tL }, γL3 := {z ∈ ∂ΩL \ γL : Re(z) > 1/2 + tL }. 0 See Figure 1 for an illustration of ∂ΩL . Since log |Ψ| is subharmonic, and letting µw ΩL denote harmonic measure of ΩL relative to w0 , Z Z Z w0 w0 0 log |Ψ(w0 )| ≤ log |Ψ(z)|dµΩL (z) + log |Ψ(z)|dµΩL (z) + log |Ψ(z)|dµw ΩL (z). γL 2 γL 3 γL (2.5) 4 LISA HARTUNG, NINA HOLDEN, AND YUVAL PERES D γL2 γL ΩL w0 γL3 F IGURE 1. Illustration of objects defined in the proof of Lemma 2.2. The domain ΩL is bounded by the colored curves. Without loss of generality we assume |Ψ(z)| < 1 everywhere on γL . For each fixed w0 0 0 there is a constant cw0 such that µw ΩL (γL ) ≥ cw0 /L. Since we assume Ω varies continuously as we vary w0 ∈ [1 − 1/δ, 0], we can find a c0 > 0 such that cw0 > c0 for all w0 this gives Z c0 w0 0 log |Ψ(z)|dµw |Ψ(w)| ≤ log max |Ψ(w)|. ΩL (z) ≤ µΩL (γL ) · log max γL γL L γL Observe that log |Ψ(z)| < c for any z ∈ ∂ΩL ∩ {z : Re(z) < 1/2 + tL }, so Z 0 log |Ψ(z)|dµw ΩL (z) ≤ c. For any w ∈ |Ψ(w)| ≤ 2 γL D, n−1 X k−1 Y pk n−1 X k=0 `=0 k=0 (qk + pk |w|) ≤ |q` + p` w| ≤ `=0 k=0 n−1 X k−1 Y (1 − δ + δ|w|)k ≤ 1 . δ(1 − |w|) (2.6) It follows that Z 3 γL 0 log |Ψ(z)|dµw ΩL (z)   Z 1 1 ≤ log + log dµw0 (z). 3 δ 1 − |z| ΩL γL (2.7) A Brownian motion started at w0 must hit the line segment `L := {z ∈ ΩL : Re(z) = 1/4 + tL } before hitting γL3 . Therefore, defining DL = B1/2 (1/2 + tL ), the integral in (2.7) is bounded above by Z 1 c sup log dµw (z). (2.8) 3 1 − |z| DL w∈`L γL 3 Since `L has distance > 1/4 from γL3 , the density of µw DL on γL is bounded above by a universal constant. For any z ∈ γL3 in the first quadrant we have 1 − |z| ≥ c−1 (θ − θ0 )2 , where θ ∈ (−π, π] is the angle for polar coordinates with origin at 1/2+tL and θ0 ∈ [0, π/2] corresponds to the point of intersection between ∂DL and ∂ in the first quadrant (see [8, equation (4.4)]). Therefore we can bound (2.8) from above by Z π/2 1 log dθ < ∞. (2.9) c θ 0 D We conclude that Z 3 γL 0 log |Ψ(z)|dµw ΩL (z) < c. (2.10) TRACE RECONSTRUCTION WITH VARYING DELETION PROBABILITIES 5 Inserting the above estimates into (2.5), we get log |p0 | ≤ c + c0 log max |Ψ(w)|, γL L which implies the lemma.  2.3. The 2-periodic case. Assume without loss of generality that p < pe. If z = pew + qe then n−1 k−1 X Y z − qe e Ψ(w) = Ψ(z) := ak p k (p` + q` ). (2.11) pe k=0 `=0 Lemma 2.3. Assume that a0 = 1, ak ∈ [−1, 1] for k ≥ 1, and that (p` )` is 2-periodic. If π e |Ψ(z)| < β everywhere on the the arc γL = {z = eiθ , −π L ≤ θ ≤ L } then there exists c depending on q and qe such that β > e−cL for all L ≥ 1. Proof. We consider the following cases. Case 1) p0 = pe. Then (2.11) gives   z − qe e + q + .... Ψ(z) = a0 pe + a1 pz + a2 pez p pe e Setting z = 0 we get Ψ(0) = pe > 0. Case 2) p0 = p. Then (2.11) gives     z − qe z − qe e + q + a2 pz p + q + .... Ψ(z) = a0 p + a1 pe p pe pe (2.12) (2.13) Setting again z = 0 gives   pe q e Ψ(0) = a0 p + a1 pe q − = p + a1 (e p − p). pe The expression in (2.14) can take three values  p if a1 = 0,  e Ψ(0) = pe if a1 = 1,  −e p + 2p if a1 = −1. (2.14) (2.15) Case 2.1) If pe 6= 2p, then we see by (2.15) that |Ψ(0)| is bounded from below by a constant depending only on p and pe. Case 2.2) p0 = p and pe = 2p. Observe that in this particular case p z − qe 1 1 +q = z+ . pe 2 2 (2.16) Hence inserting z = −1 into (2.13) gives e Ψ(−1) = a0 p > 0. (2.17) e is continuous in some neighborhood of z = −1 (uniformly in a0 , a1 , . . . ). Moreover, Ψ e Hence, there exists δ1 ∈ (0, 1) depending only on p such that |Ψ(1−δ 1 )| is bounded away from 0. 6 LISA HARTUNG, NINA HOLDEN, AND YUVAL PERES e Again |Ψ(z)| for |z| ≤ 1 is bounded in terms of a geometric series. Set p∗ = ppe and ∗ = 1 − p . Then 1 e |Ψ(z)| ≤ ∗ . (2.18) p (1 − |z|) Now the claim of Lemma 2.3 follows by letting Ω be a ball contained in such that ∂Ω is tangent to ∂ at 1 and −1 + δ1 ∈ Ω, and then proceeding as in Lemma 2.2 using the e subharmonic function log |Ψ|.  q∗ D D 3. P ROOF OF MAIN RESULT: D ELETION PROBABILITIES VARYING WITH POSITION Proof of Theorem 1.1. Throughout the proof all constants should depend only on δ and m. Let x, y ∈ [m]n be two different strings. We first consider the case m = 2. Let a = x − y. By Lemma 2.1, n−1 n−1 k−1  X  X Y ej − Yej wj = E X ak p k (q` + p` w). (3.1) j=0 k=0 `=0 Let k ∗ = min{k : ak 6= 0}. Then the right side of (3.1) is equal to Y (q` + p` w) pk∗ ak∗ + `<k∗ n−1 X ak p k k=k∗ +1 k−1 Y ! (q` + p` w) . (3.2) `=k∗ Let L ∈ N. We first consider deletion probabilities satisfying Assumption (i). First, we verify that for w ∈ γL Y (q` + p` w) ≥ exp(−nC2 /L2 ), (3.3) `<k∗ for some universal constant C2 . To see that observe that by writing w = cos(θ) + i sin(θ), for any 0 < p < 1, |pw + (1 − p)|2 = 1 − 2(1 − p)p (1 − cos(θ)) ≥ 1 − (1 − p)pθ2 + O(θ4 )  = exp −(1 − p)pθ2 + O(θ4 ) , (3.4) where we used the series expansion of cos. Since θ ∈ γL , (3.3) follows. Define A(w) = pk∗ ak∗ + n−1 X ak pk k=k∗ +1 k−1 Y (q` + p` w). (3.5) `=k∗ By Lemma 2.2 there exists w1 ∈ γL such that |A(w1 )| ≥ e−cL . Hence, taking absolute values in (3.1) gives for w ∈ γL ,  Y X  ej − Yej (3.6) E X ≥ (q` + p` w1 ) |A(w1 )| `<k∗ j≥0 ≥ exp(−nC2 /L2 )e−cL . (3.7) To approximately maximize the term on the right side of (3.6) we choose L of order and obtain that there is a constant C3 > 0 such that    X  ej − Yej ≥ exp −C3 n1/3 . E X (3.8) n1/3 j≥0 We now conclude the proof similarly as the proof of [8, Theorem 1.1] (see the argument starting with equation (2.4) of that paper). We first observe that for some j ≥ 0 and TRACE RECONSTRUCTION WITH VARYING DELETION PROBABILITIES  7  ej − Yej ≥ exp(−C4 n1/3 ). By Hoeffding’s inequality this allows us C4 > 0 we have E X to test whether our bit sequence is more likely to equal x or y; in case our string equals either x or y our test fails with probability at most exp(−C5 n1/3 ). Repeating this for all possible pairs of bit sequences x, y ∈ {0, 1}n , we can determine the original bit string with high probability as n → ∞. By increasing the constant C appearing in the statement of the theorem the result holds for any n. See [8] for a more detailed argument. For m 6= 2 we proceed similarly. Let x, y ∈ [m]n for m 6= 2. For each fixed ζ ∈ [m], e and y e to be equal to x and y, respectively, except that we replace xk by 1 if we define x xk = ζ, and we replace xk by 0 if xk 6= ζ. Using the above procedure we can find all k such that xk = ζ in the original string. Repeating for all ζ ∈ [m] we determine the original string. For deletion probabilities satisfying Assumption (ii) let A(z) = pk∗ ak∗ + n−1 X ak pk k=k∗ +1 k−1 Y  `=k∗  p` p` qe . z + q` − pe pe (3.9) By Lemma 2.3 there exists z0 ∈ γL such that |A(z0 )| ≥ e−cL . Similarly as above, for q z ∈ γL and w = z−e pe , Y (q` + p` w) ≥ exp(−nC6 /L2 ), (3.10) `<k∗ and  |w| ≥ exp −C7 /L2 . (3.11) Taking again absolute values in (3.1), this gives for z ∈ γL , X j≥0   ej − Yej |w|j E X ≥ Y (q` + p` w) |A(z)| `<k∗ ≥ exp(−nC6 /L2 )e−cL , (3.12)   ej − Yej ≥ exp(−C8 n1/3 ) for some j ≥ 0 and C8 > 0. Using (3.11), this gives that E X We conclude the proof as above.  4. P ROOF OF MAIN RESULT: D ELETION PROBABILITIES VARYING WITH LETTER To prove Theorem 1.2, we first observe that the theorem is immediate from [8] and [3] in the case where the deletion probabilities q0 , . . . , qm−1 are known. This follows since we can send the traces through a second deletion channel, where each letter ζ ∈ [m] is retained with probability p−1 ζ minζ 0 ∈[m] pζ 0 . The traces obtained in the second deletion channel can be obtained directly from x sent through a single deletion channel with constant retention probability minζ∈[m] pζ , and x can therefore be reconstructed with exp(O(n1/3 )) traces. For the case of unknown deletion probabilities, we show in Lemma 4.1 that we can obtain good estimates for the deletion probabilities by studying the traces. Then we use Lemma 4.2 to argue that these estimates are sufficiently good, so that the single bit test still works when we use our estimated values for the deletion probabilities. Lemma 4.1. Consider the setting of Theorem 1.2, where we assume the deletion probabilities are unknown, and that each letter in [m] appears at least once in x. Given any δ, C1 > 0, 8 LISA HARTUNG, NINA HOLDEN, AND YUVAL PERES we can find a C0 > 0 depending only on δ, m, and C1 , such that if we have at least T = dexp(C0 n1/3 )e traces, then we can use the traces to find an estimate pbζ for each pζ satisfying   max |b pζ − pζ | > exp(−C1 n1/3 ) < δ. (4.1) P ζ∈[m] Proof. Fix ζ ∈ [m] and define p := pζ , r := |{k ∈ [n] : xk = ζ}|, µ := rp, and v := e t |] : X e t = ζ}|, then [Yt ] = µ and rp(1 − p). Observe that 1 − p = v/µ. If Yt = |{k ∈ [|X k Var[Yt ] = v. We use the following estimates µ b, vb, and pb for µ, v, and p, respectively, E µ b= E T 1X Yt , T E T vb = t=1 1 X (Yt − µ b)2 , T −1 1 − pb = vb/b µ. t=1 We have [b µ] = µ, [b v ] = v, and Var[b µ] = v/T < r/T . Also observe that for a universal constant C > 0, we have Var[b v ] ≤ Cr4 /T . This means that for an appropriate C0 > 0, with probability 1 − on (1), we have |b µ − µ|, |b v − v| < exp(−C1 n1/3 ). Upon increasing C0 and using the definition of pb, this gives that |b p − p| < exp(−C1 n1/3 ) with probability 1 − on (1), which implies the lemma.  For x = (x0 , . . . , xn−1 ) ∈ Rn and p = (p0, . . . , pm−1) ∈ (0, 1]m, define Φxp (w) = n−1 X k=0 xk pxk k−1 Y (px` w + qx` ). (4.2) `=0 Lemma 4.2. For any C2 > 0, we can find a C1 > 0 such that the following holds for any p ∈ (0, 1]. Let p = (p, . . . , p) ∈ (0, 1]m and p0 = (p00 , . . . , p0m−1 ) ∈ (0, 1]m satisfy |p − p0ζ | < exp(−C1 n1/3 ), ∀ζ ∈ [m]. (4.3) Then for each x ∈ [m]n , each coefficient in the polynomial Φxp (w) − Φxp0 (w) has magnitude less than exp(−C2 n1/3 ). Proof. To simplify notation, let ε = exp(−C1 n1/3 ). The magnitude of the coefficient of wj in Φxp (w) − Φxp0 (w), is bounded above by the following, with B(k, p) denoting a binomial random variable n−1 n o X max [B(k, p + εb) = j] − [B(k, p) = j] : εb ∈ [−ε, ε] + ε, m P P k=0 which is bounded by a polynomial multiple of ε.  Proof of Theorem 1.2. Throughout the proof we consider constants C0 , C1 , C2 which may depend on δ, p∗ := minζ∈[m] pζ , and m, but which are independent of all other parameters. Let T = dexp(C0 n1/3 )e for some C0 > 0 which will be determined later. Consider T e (1) , . . . , X e (T ) obtained by sending x through the deletion channel considered in traces X the statement of the theorem. Using the T traces, we find an estimate pbζ for each pζ as described in Lemma 4.1, and let pb∗ = minζ∈[m] pbζ . e (t) through a second deletion channel, so that we obtain traces Send each trace X (1) (T ) X̌ , . . . , X̌ . In the second deletion channel the letter ζ is retained with probability pb∗ /b pζ . Observe that each trace X̌(t) can be obtained from x by considering a deletion channel in which the letter ζ is retained with probability p∗ζ := pζ pb∗ /b pζ . In particular, if our estimate pbζ for pζ is good for all ζ, then each letter is retained with approximately the b ∗ = (b same probability p∗ . Define p∗ = (p∗0 , . . . , p∗m−1 ) ∈ (0, 1]m and p p∗ , . . . , pb∗ ) ∈ (0, 1]m ; TRACE RECONSTRUCTION WITH VARYING DELETION PROBABILITIES 9 the first string represents the actual (unknown) retention probabilities, and while the second string represents our estimated retention probabilities. Given strings y, y0 ∈ [m]n , let Y̌ (resp. Y̌0 ) denote a string obtained by sending y (resp. 0 y ) through the two deletion channels described above, i.e., the letter ζ is retained with probability p∗ζ . We first assume m = 2. By Lemma 2.1, n−1 X  0 E Y̌j − Y̌j0 wj = Φyp∗ (w) − Φyp∗ (w) (4.4) j=0     0  0 = Φypb ∗ (w) − Φpb ∗ (w) + Φyp∗ (w) − Φypb ∗ (w) − Φyp∗ (w) − Φypb ∗ (w) .  y0 Let  E(C0 , C1 ) :=  max |b p∗ − p∗ζ | ≥ exp(−C1 n1/3 ) . ζ∈[m] By [8], there is a C2 > 0, such that for some j ∈ [n], the absolute value of the coefficient 0 of wj in Φypb ∗ (w)−Φypb ∗ (w) is at least exp(−C2 n1/3 /2). From the proof in [8] we see that C2 is universal given any lower bound on pb∗ , so on the event E(C0 , C1 )c and for sufficiently large n, we may assume that the constant C2 depends only on p∗ . Given C2 > 0, define C1 > 0 as in Lemma 4.2. By Lemma 4.1, we can find C0 > 0 such that [E(C0 , C1 )] < δ/2. (4.5) P By Lemma 4.2 and (4.4), on E(C0 , C1 )c and for all sufficiently large n, the absolute value 0 of the coefficient of wj in the polynomial Φyp∗ (w) − Φyp∗ (w) is at least exp(−2C2 n1/3 ) 0 and of the same sign as the corresponding coefficient in Φypb ∗ (w) − Φypb ∗ (w). Therefore, on the event E(C0 , C1 )c , Hoeffding’s inequality gives that with probability at least 1 − exp(−T exp(−4C2 n1/3 )/2), we can determine if our unknown bit string x equals y or (t) y0 , by considering (X̌j )1≤t≤T . After possibly increasing C0 , we see by a union bound that on E(C0 , C1 )c and for m = 2, we can identify x with probability at least 1 − 2n exp(−T exp(−4C2 n1/3 )/2). Given y, y0 ∈ [m]n for m 6= 2 we proceed similarly. For each fixed ζ ∈ [m] and with b and y b 0 to x = (x0 , . . . , xn−1 ), we first identify the set Aζ := {k ∈ [n] : xk = ζ}. Define y 0 be equal to y and y , respectively, except that all xk such that xk = ζ has been replaced by 1, and all xk such that xk 6= ζ has been replaced by 0. Using the approach above with b and y b 0 , on the event E(C0 , C1 )c we can determine Aζ except on an event of probability y 1 − 2n exp(−T exp(−4C2 n1/3 )/2). We repeat the procedure for each ζ ∈ [m], and see that on the event E(C0 , C1 )c we can determine the sets Aζ , and hence x, except on an event of probability 1 − on (1). By increasing the constant C0 if necessary, we can reconstruct the string with probability at least 1 − ε for any n.  R EFERENCES [1] T. Batu, S. Kannan, S. Khanna, and A. McGregor. Reconstructing strings from random traces. In Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, pages 910–918. Society for Industrial and Applied Mathematics, 2004. [2] P. Borwein and T. Erdélyi. Littlewood-type problems on subarcs of the unit circle. Indiana University mathematics journal, 46(4):1323, 1997. [3] A. De, R. O’Donnell, and R. Servedio. Optimal mean-based algorithms for trace reconstruction. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 17, pages 1047– 1056, New York, NY, USA, 2017. ACM. 10 LISA HARTUNG, NINA HOLDEN, AND YUVAL PERES [4] H. Ellegren, N. G. Smith, and M. T. Webster. Mutation rate variation in the mammalian genome. Current Opinion in Genetics and Development, 13(6):562 – 568, 2003. [5] T. Holenstein, M. Mitzenmacher, R. Panigrahy, and U. Wieder. Trace reconstruction with constant deletion probability and related results. In Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’08, pages 389–398, Philadelphia, PA, USA, 2008. Society for Industrial and Applied Mathematics. [6] A. McGregor, E. Price, and S. Vorotnikova. Trace reconstruction revisited. In A. S. Schulz and D. Wagner, editors, Algorithms - ESA 2014: 22th Annual European Symposium, Wroclaw, Poland, September 8-10, 2014. Proceedings, pages 689–700, Berlin, Heidelberg, 2014. Springer Berlin Heidelberg. [7] G. A. T. McVean, S. R. Myers, S. Hunt, P. Deloukas, D. R. Bentley, and P. Donnelly. The fine-scale structure of recombination rate variation in the human genome. Science, 304:581–584, 2004. [8] F. Nazarov and Y. Peres. Trace reconstruction with exp(O(n1/3 )) samples. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 17, pages 1042–1046, New York, NY, USA, 2017. ACM. [9] Y. Peres and A. Zhai. Average-case reconstruction for the deletion channel: subpolynomially many traces suffice, 2017. To appear in FOCS. [10] N. G. Smith, M. T. Webster, and H. Ellegren. Deterministic mutation rate variation in the human genome. Genome Res., 12:1350–1356, 2002. [11] F. Supek and B. Lehner. Differential DNA mismatch repair underlies mutation rate variation across the human genome. Nature, 521(7550):81–84, 2015. C OURANT I NSTITUTE OF M ATHEMATICAL S CIENCES , N EW Y ORK U NIVERSITY, N EW Y ORK , NY 10012 E-mail address: [email protected] D EPARTMENT OF M ATHEMATICS , M ASSACHUSETTS I NSTITUTE E-mail address: [email protected] M ICROSOFT R ESEARCH , R EDMOND , WA 98052 E-mail address: [email protected] OF T ECHNOLOGY , C AMBRIDGE , MA 02139
10math.ST
Self Organizing Maps to efficiently cluster and functionally interpret protein conformational ensembles Domenico Fraccalvieri* 1 Laura Bonati 1 Fabio Stella 2 1 Department 2 Department 1 of Earth and Environmental Sciences, University of Milano Bicocca, Milano, IT of Informatics, Systems and Communication, University of Milano Bicocca, Milano, IT *Corresponding Author = [email protected] Introduction The wide range of protein biological functions, such as enzymatic activity, ligand- and protein-protein interactions and allosteric regulation, is strictly related to their flexibility and dynamics[1]. To model the influence of protein motions across this broad spectrum of events Molecular Dynamics (MD) simulations are now routinely used. The identification of the most functionally relevant conformations is generally done by grouping the conformations according to a criterion of geometrical similarity and popular choices include hierarchical clustering, single, complete and average linkage and k-means [10]. These geometrical approaches rely on the assumption that the identified conformational states also correspond to the energetic states [10]. Good candidates to improve this match are Artificial Neural Networks (ANNs) which are capable to discover the relationships between the measured variables only from the available dataset [9]. Among the class of ANNs, successfully applied to artificial life systems [2], Self Organizing Maps (SOMs) [6] represent a particularly powerful data driven model that has been widely applied for exploration and clustering of high-dimensional datasets [9, 6]. We recently developed an approach which combines SOMs and hierarchical clustering to efficiently compare conformational ensembles obtained from multiple MD simulations of proteins [3]. To reliably apply the SOM analysis to these specific input data we identified and optimized a small number of SOM parameters. In particular, we confirmed that the map size is a crucial parameter and that a well-selected number of neurons is crucial both to reduce the computational cost of the analysis and to provide an intermediate topological representation of the input conformational space [3]. As a result the original MD trajectories can be represented by the few conformations that best represent the clusters obtained. Here we make a step further; the proposed approach consists of processing all the atom positions of each conformation won by a given SOM neuron using a similarity network. Different similarity measures between atoms behavior are used to compile a similarity matrix which is inputted to a network model [8]. Network algorithms are then used to automatically discover and interpret the behavior of the original protein conformational ensembles exploiting the atomic coordinates enclosed in the SOM neuron. 2 Methods Self Organizing Map clustering. The details of the proposed SOM approach can be summarized as follow. First, an ensemble of conformations is extracted from one (or more) MD trajectory with an optimized sampling rate of 1/100 ps. Each conformation of the trajectories is represented using only the Cα Cartesian coordinates. The ensemble is encoded in a matrix and is used for the learning stage, A. Graudenzi, G. Caravagna, G. Mauri, M. Antoniotti (Eds.): Wivace 2013 - Italian Workshop on Artificial Life and Evolutionary Computation EPTCS 130, 2013, pp. 83–86, doi:10.4204/EPTCS.130.13 c D. Fraccalvieri, L. Bonati & F. Stella This work is licensed under the Creative Commons Attribution License. 84 SOMs to efficiently cluster and functionally interpret protein conformational ensembles performed with the set of optimal SOM parameters previously identified by experimental design [3]. The most relevant parameters are: Map size=100, Radius=3, Training length=5000 and Neighbor function=gaussian. The neurons of this trained SOM, i.e. the proto-clusters of the original conformational ensemble, are grouped using the complete linkage algorithm and the number of clusters is automatically selected by means of the Mojena’s stopping rule [7]. To provide a graphical representation of the neurons and their connections, each neuron is described by a hexagon and the neurons belonging to each cluster are homogeneously colored (see Figure 1, central panel). Finally, to provide the most synthetic structural representation of the original ensemble, only the input conformation closest to the centroid of each cluster is represented (see Figure 1, left panel). The centroid is defined as the mean vector of all the prototype vectors of the neurons in that cluster. Network Analysis. The set of all the Cα’s atomic coordinates of the conformations won by each SOM neuron, are used to compile a network model. The following similarity measures were analyzed and empirically compared; x-y-z average absolute correlation, cosine, Pearson, Spearman correlation and biweight mid-correlation. Networks are constructed from similarity matrices by means of threshold as described in [5]. The SOM, which summarizes the atomic positions of each conformation associated with a neuron, allows building a network model which is then exploited to automatically discover and interpret the behavior of the inputted protein conformational ensembles. Graph partitioning algorithms [5] to cluster atoms with similar behavior and community detection algorithms [8, 5] were applied to the network model (see Figure 1, right panel). Figure 1: Central panel: the clustered SOM. The background colors of the neurons (hexagons) correspond to the cluster attribution. The inner hexagon is proportional to the number of conformations won by the neuron. Left panel: ribbon representation of one centroid cluster (in orange) superimposed to a reference structure (in black). Right panel: graphical analysis of one neuron. On the left, each node represents an atom of the neuron conformations and the edges link pairs of correlated atoms. The groups of nodes (atoms) with similar behavior are homogeneously colored. On the right, the nodes and the edges are represented on a reference 3D structure (in gray) using the same color code of the graph. The width of the edge is proportional to the correlation among the atoms (nodes). D. Fraccalvieri, L. Bonati & F. Stella 3 85 Results and Discussion The SOM approach developed by our group has been successfully applied showing its potential in the comparison of MD simulations of different proteins with dimensions ranging from 60 to 500 amino acids[3, 4]. These applications highlighted key features, related to the topological nature of the SOM. First, a single map was able to detect both low fluctuations, i.e. little conformational changes with respect to a reference structure, and large concerted motions, i.e. simultaneous conformational changes of different region of the protein.[3, 4]. Second, the intrinsic time dependence of the data, not given as input, was correctly recovered; in fact consecutive conformational transitions were correctly assigned to adjacent neurons, thus to adjacent clusters, on the map [3]. Moreover, the values of geometrical descriptors based on a subset of Cα atoms included in the SOM training [3, 4], as well as excluded features [4], were consistently clustered, indicating the potential of the map to classify unknown features [4]. Finally the ability of a SOM trained with a set of protein to classify conformations of similar protein was verified and exploited [4]. The extension of our protocol here presented is aimed at a deeper inspection of the dynamic information contained in each neuron in the output map. In fact, not only the subset of conformations won by each neuron, but also the specific motions caught by that neuron are analyzed. To this end, the matrices composed by the Cα Cartesian coordinates of the original data in each neuron are analyzed using similarity matrices and represented by graphs (see Figure 1, right panel). This analysis has a double outcome. First it provides an interesting and informative picture of the joint behavior of the atoms belonging to the conformations in each neuron, highlighting both local motions, i.e. motions involving structurally neighbor atoms, and long-range communications mediated by atoms able to transmit conformational signals to remote sites of the protein. Second this information can be used to cluster the data according to this graph. Cluster analysis based on similarity of the Cα dynamic behavior enclosed in each SOM neuron should increase the ability of our approach to compare the dynamics of different proteins. In conclusion, we already showed that the use of this SOM approach to cluster protein conformational ensembles increases the cluster quality compared to other methods routinely used [3]. Moreover both the approaches proposed for the map interpretation allow an efficient comparison of the dynamics of different proteins. In the former approach, the characteristics of the conformations belonging to each cluster are summarized and described by the cluster centroid, in the latter, the characteristic pathways of motion described by each neuron are highlighted by the graphs (Figure 1). Applications of this approach should range from protein engineering (to design specific mutation able to reduce, or increase, the function of a protein) to computer-based drug design (to select specific conformations of a protein suitable to interact with specific ligands). References [1] D.D. Boehr, R. Nussinov & P.E. Wright (2009): The role of dynamic conformational ensembles in biomolecular recognition. Nat. Chem. Biol. 5(11), pp. 789–796, doi:10.1038/nchembio.232. [2] A. Cangelosi, Nolfi S. & Parisi D. (2003): Artificial Life Models of Neural Development. In: On Growth, form and Computers, Elsevier Academic Press, pp. 339–52. doi:10.1016/B978-012428765-5/50051-7 [3] D. Fraccalvieri, A. Pandini, F. Stella & L. Bonati (2011): Conformational and functional analysis of molecular dynamics trajectories by Self-Organising Maps. BMC Bioinformatics 12, p. 158, doi:10.1186/14712105-12-158. [4] D. Fraccalvieri, M. Tiberti, A. Pandini, L. Bonati & E. Papaleo (2012): Functional annotation of the mesophilic-like character of mutants in a cold-adapted enzyme by self-organising map analysis of their molecular dynamics. Mol. Biosyst. 8, pp. 2680–91, doi:10.1039/C2MB25192B. 86 SOMs to efficiently cluster and functionally interpret protein conformational ensembles [5] S. Horvath (2011): Weighted Network Analysis: Applications in Genomics and Systems Biology. Springer. doi:10.1007/978-1-4419-8819-5 [6] T.K. Kohonen (2013): Essentials of the Self-Organizing Map. doi:10.1016/j.neunet.2012.09.018. Neural Networks 37, pp. 52–65, [7] R. Mojena (1977): Hierarchical Grouping Methods and Stopping Rules: An Evaluation. Comput. J. 20(4), pp. 359–63, doi:10.1093/comjnl/20.4.359. [8] M.E.J. Newman (2010): Networks: An Introduction. Oxford University Press, New York. [9] A. Pandini, D. Fraccalvieri & L. Bonati (2013): Artificial Neural Networks for Efficient Clustering of Conformational Ensembles and their Potential for Medicinal Chemistry. Curr. Top. Med. Chem. 13(5), pp. 642–51, doi:10.2174/1568026611313050007. [10] J. Shao, S.W. Tanner, N. Thompson & T.E. Cheatham (2007): Clustering molecular dynamics trajectories: 1. Characterizing the performance of different clustering algorithms. J. Chem. Theory Comput. 3(6), pp. 2312–34, doi:10.1021/ct700119m.
5cs.CE
Decoding-History-Based Adaptive Control of Attention for Neural Machine Translation arXiv:1802.01812v1 [cs.CL] 6 Feb 2018 Junyang Lin, Shuming Ma, Qi Su, Xu Sun MOE Key Laboratory of Computational Linguistics, Peking University School of Electronics Engineering and Computer Science, Peking University School of Foreign Languages, Peking University {linjunyang, shumingma, sukia, xusun}@pku.edu.cn Abstract Seq2Seq+Attention: In the Russian capital of Moscow , the Attention-based sequence-to-sequence model has proved successful in Neural Machine Translation (NMT). However, the attention without consideration of decoding history, which includes the past information in the decoder and the attention mechanism, often causes much repetition. To address this problem, we propose the decoding-history-based Adaptive Control of Attention (ACA) for the NMT model. ACA learns to control the attention by keeping track of the decoding history and the current information with a memory vector, so that the model can take the translated contents and the current information into consideration. Experiments on Chinese-English translation and the EnglishVietnamese translation have demonstrated that our model significantly outperforms the strong baselines. The analysis shows that our model is capable of generating translation with less repetition and higher accuracy. The code will be available at https://github.com/lancopku Russian capital of Moscow of the Russian capital of Moscow was killed this year because of the cold war, most of them were homeless and the elderly, including many people. Gold: The temperatures in Moscow, capital of Russia, dropped to such low levels last night that even locals felt freezing cold. Six people died as a result, bringing up the death toll due to coldness this year to 239. Most of the dead were the homeless and the elderly, including many drunk. 1 Introduction With the development of Deep Learning, Neural Machine Translation (NMT) has demonstrated outstanding effects, and the sequence-to-sequence model (Seq2Seq) [Sutskever et al., 2014] is the most commonly-used model in NMT. The attention mechanism [Bahdanau et al., 2014; Luong et al., 2015] is often used in the Seq2Seq model, and in many cases it can significantly improve the performance of the model. In translating, the decoder builds a language model on the target language for semantic coherence, the attention mechanism obtains the source-side information for the word generation at each time step. However, the current source-side information that the attention mechanism acquires is often controversial to the translated contents because the attention has no knowledge of the translated contents. We present a typical example of the over-translation of the attention-based Seq2Seq model on the Chinese-English translation in Table 1. From the example, it can be found that the attention-based Seq2Seq generates the same phrase “the Russian capital of Moscow” for multiple times, causing much repetition. Table 1: An example of the translation of the conventional attentionbased Seq2Seq model on the NIST 2003 Chinese-English translation task. The text highlighted indicates repetition. With the motivation to tackle this problem, we propose our decoding-history-based Adaptive Control of Attention (ACA) for the attention-based Seq2Seq model. The mechanism controls the output of the attention based on the decoding history, including the past information in the decoder and the past alignment information in the attention mechanism. The computation of the attention requires the information of the memory vector, which is updated based on the decoding history, by manipulating the decoder output and the attention vector. With the help of the memory, the attention can be more adaptive to the translated contents so that the repetition in translation can be reduced. Our main contributions include: • We propose a decoding-history-based Adaptive Control of Attention for the NMT model, which tackles the conflict between the current attention and the decoding history so that the generation can be more adaptive to the translated contents; • Experiments on the Chinese-English translation and the English-Vietnamese translation show that our model outperforms the strong baselines, with the advantages of 3.61 BLEU score and 1.17 BLEU score over the best attention-based Seq2Seq model; • Compared with the strong baselines, the translation of our model is with less repetition and higher accuracy. 2 Attention-based Seq2Seq In Figure 1(a), we present a common type of attention-based Seq2Seq with RNN as its main component, and as we use -1 -2 -1  +1 -1  +1    -1 -1      +1    +1 -1 +1 -1 +1 ℎ-1 ℎ ℎ+1 ℎ-1 ℎ ℎ+1 -1  +1 -1  +1 b. Attention-Based Seq2Seq + ACA a. Attention-Based Seq2Seq Figure 1: Structure of the attention-based Seq2Seq and our Seq2Seq with ACA. The left is the structure of the attention-based Seq2Seq model, and the right is the structure of our model, the attention-based Seq2Seq with the ACA. LSTM in our model, we introduce the structure of LSTM in the following. 2.1 Encoder As words are discrete units, the words in the source sequence should be sent through an embedding layer to become word embeddings as the input. On top of the embedding layer, the encoder turns the embeddings x = {x1 , ..., xn } into a sequence of encoder outputs h = {h1 , ..., hn } and sends out the final hidden state hn to the decoder. The encoder in our model is a bidirectional LSTM, which is defined below: fi = σ(Wf [xi , hi−1 ] + bf ) ii = σ(Wi [xi , hi−1 ] + bi ) oi = σ(Wo [xi , hi−1 ] + bo ) (1) (2) (3) C̃i = tanh(WC [xi , hi−1 ] + bC ) (4) 2.2 Decoder The decoder is responsible for decoding the final state of the encoder hn to a new sequence y = {y1 , ..., ym }. With the final encoder state as the initial state, the decoder is initialized to decode step by step, with a word embedding at each time step, until it generates the token representing the end-ofsentence mark. For the decoder, we implement a unidirectional LSTM. The output of each time step is sent into a feed-forward neural network to be projected into the space of vocabulary Y ∈ R|Y |×dim . At each time step, the decoder generates a word yt by sampling from a distribution of the target vocabulary Pvocab , where: Pvocab = sof tmax(Wo vt ) vt = g(Wv [ct ; st ]) st = LST M(yt−1 , st−1 , Ct−1 ) (10) (11) (12) Ci = fi ⊙ Ci−1 + ii ⊙ C̃i (5) hi = oi ⊙ tanh(Ci ) (6) where xi is the input word embedding at each time step from a minibatch of input sequences. LSTM consists of four gates, which collectively control the information flow from the last time step and the current time step. Bidirectional LSTM contains the same structure of LSTM, but it reads the input in two directions to generate two sequences of hidden → − − → − → − → − → ← − ← − ← − ← − ← − states h = {h1 , h2 , h3 , ..., hn } and h = {h1 , h2 , h3 , ..., hn }, where: → − −−→ hi = LST M(xi , hi−1 , Ci−1 ) (7) ← − ←−− hi = LST M(xi , hi−1 , Ci−1 ) (8) where g(·) refers to non-linear activation function. The global attention mechanism [Luong et al., 2015] is applied to the LSTM output st and the encoders outputs h = {h1 , ..., hn } in order to obtain the global attention αt,i and the context vector ct , which is described in the following: The encoder outputs corresponding to each time step are concatenated as mentioned below: → ← − − hi = [ hi ; hi ] (9) 2.3 ct = n X αt,i hi (13) i=1 exp(et,i ) αt,i = Pn j=1 exp(et,j ) (14) et,i = s⊤ t−1 Wa hi (15) Training The training for the Seq2Seq model is usually based on maximum likelihood estimation. Given the parameters θ and -1 R  U     F   Figure 2: Structure of the Recurrent Memory in the ACA. “R” and “F” refer to the Remove and Feed operations, and “g” refers to the MLP. source text x, the model generates a sequence ỹ. The learning process is to minimize the negative log-likelihood between the generated text ỹ and reference y, which in our context is the sequence in target language for machine translation and summary for abstractive summarization: 1 XX (i) (i) (i) p(y |ỹ , x , θ) N i=1 t=1 t <t N L=− T (16) where the loss function is equivalent to maximizing the conditional probability of sequence y given parameters θ and source sequence x. 3 Adaptive Control of Attention As it is mentioned above, it is easy for the conventional attention-based Seq2Seq NMT models to suffer from generating incoherent texts due to the conflict between the attention mechanism and the decoding history. Based on the hypothesis, we propose our decoding-history-based Adaptive Control of Attention (ACA) mechanism to tackle the problem. Instead of sending the context vector ct directly to the output layer at each time step, we propose to update the attention with a recurrent memory that stores the information from the previous decoding time steps, so that the information from the attention mechanism can be controlled to be most beneficial to the whole generation. The memory updates itself at each time step with the information from the current decoder output and the current context vector, so that it can learn to remove unnecessary information and store important information at each time step. Moreover, it is responsible for restricting the information flow of the context vector in order to mitigate the conflict between attention and neural language model. 3.1 Recurrent Memory As our objective in this study is to build connection for the attention at the current time step with the decoding history, we implement the Recurrent Memory in the decoder for updating the context vector. The recurrent memory in the model is responsible for controlling the information flow of the attention mechanism, so that the effects of the attention mechanism can be connected with the previous decoding outputs from the RNN as well as the attention mechanism. Moreover, the memory should be updated at every decoding time step, so that it can reflect the development of the decoding history.  Figure 3: Structure of Gated Control. “U” refers to the Update Gate. The memory mt is a representation vector at the decoding time step t, whose initialization m0 is the last hidden state of the encoder, which is also the initial state for the RNN of the decoder. At each decoding time step t, the memory mt is updated with a Remove-Feed operation. The operation is based on the decision of the decoder output st from the RNN and the context vector ct from the attention mechanism, so that the memory can observe the situation at the current time step and update itself with the guide of the current information. The structure of the Recurrent Memory is presented in Figure 2. At the beginning, the previous memory mt−1 experiences a Remove-Feed operation. The decoder output st and the context vector ct generate a Remove Gate rt to decide how to update the memory to be adaptive to the current decoding and a Feed Gate ft to decide how to update the memory with new information from the decoder and the attention: rt = σ(gr ([st ; ct ])) ft = σ(gf ([st ; ct ])) (17) (18) where g(·) refers to non-linear activation function to generate a vector of the hidden size. Next, the previous memory mt−1 passes through the gates and updates itself to be mt by removing information from the previous memory and adding new information from the decoder output and the context vector: mt = (rt ⊙ mt−1 ) ⊕ (ft ⊙ gi ([st ; ct ])) (19) The Remove operation based on st and ct can update the information stored in the memory based on the decoding and the attention at the current time step, so that the memory can be adaptive to the current decoding. The Feed operation based on the two same elements can provide the memory with the new information from the current time step so that the memory can store the repetition of the translated contents. Next, we introduce how the model makes use of the time-sensitive memory to improve the decoding. 3.2 Gated Control After the update, before entering the next time step, the memory mt collaborates with the decoder output st to generate a gate for the context vector ct . Therefore, the information from the attention mechanism is controlled by the information from the decoding history and the current state with the help of the updated memory. The detail operations are illustrated below. Before entering the next time step, the current memory mt and the decoder output st generate an Update Gate ut for the context vector ct : ut = σ(gu ([mt ; st ])) (20) ĉt = ut ⊙ ct (21) where ĉt is the final context vector to be concatenated with the decoder output st to generate the final output v̂t , which is given by: v̂t = go ([st ; ĉt ]) (22) In the final step of decoding, instead of sending vt to the output layer for the word prediction as mentioned in Equation 10, the model sends v̂t , outputted from the ACA, for the prediction at each time step. With the Gated Control, the context vector ct can be rectified based on the decoding history and the current information. The memory storing useful information of the partial translation can encourage to model to translate contents that are less repeated compared with the translated contents.Even if the source-side information in the context vector is in conflict with the decoding history, the conflict can be mitigated by the gate controlled by the memory. 4 Experiment This section introduces the details of our experiments, including datasets, setups, baseline models as well as results. 4.1 Datasets We evaluated our proposed model on the NIST translation task for Chinese-English translation and provided the analysis on the same task. Moreover, in order to evaluate the performance of our model on the low-resource translation, we also evaluated our model on the IWLST 2015 [Cettolo et al., 2015] for the English-Vietnamese translation task. Chinese-English Translation For the NIST translation task, we trained our model on 1.25M sentence pairs extracted from LDC2002E18, LDC2003E07, LDC2003E14, Hansards portion of LDC2004T07, LDC2004T08 and LDC2005T06, with 27.9M Chinese words and 34.5M English words. Following Su et al. [2016], we validated our model on the dataset for the NIST 2005 translation task and tested our model on that for the NIST 2002, 2003, 2004, 2006, 2008 translation tasks. We used the most frequent 50,000 words for both the Chinese vocabulary and the English vocabulary. The evaluation metric is BLEU [Papineni et al., 2002], and we calculated the case-insensitive NIST BLEU score with multi-bleu.perl provided by Moses1 . English-Vietnamese Translation The data is from the translated TED talks, containing 133K training sentence pairs provided by the IWSLT 2015 Evaluation Campaign [Cettolo et al., 2015]. We followed the studies of Huang et al. [2017], and used the same preprocessing as well as the validation set and the test set. The validation set is the TED tst2012 with 1553 sentences and the test set is the TED tst2013 with 1268 sentences. The English vocabulary is 17.7K words and the Vietnamese vocabulary is 7K words. The evaluation metric is also BLEU as mentioned above. 1 http://www.statmt.org/moses/. 4.2 Setting We implement the models using PyTorch, and the experiments are conducted on an NVIDIA 1080Ti GPU. Both the size of word embedding and hidden size are 512, and the batch size is 64. We use Adam optimizer [Kingma and Ba, 2014] to train the model with the default setting β1 = 0.9, β2 = 0.999 and ǫ = 1 × 10−8 , and we initialize the learning rate to 0.001. Based on the performance on the development sets, we use a 3-layer LSTM as the encoder and a 2-layer LSTM as the decoder. Gradient clipping is applied so that the norm of the gradients cannot be larger than a constant, which is 10 in our experiments. Dropout is used with the dropout rate set to 0.2. Following Xiong et al. [2017], we use beam search with a beam width of 10 to generate translation for the evaluation and test, and we normalize the log-likelihood scores by sentence length. 4.3 Baselines In the following, we introduce our baseline models for the Chinese-English translation and the English-Vietnamese translation respectively. Chinese-English Translation Following Su et al. [2016] and Zhang et al. [2017], we compare our model with the state-of-the-art NMT systems based on our implementation and the results directly reported in their articles, and we report the results of the baselines, Moses and RNNSearch from the study of Su et al. [2016]. • Moses An open source phrase-based translation system with default configurations and a 4-gram language model trained on the training data for the target language; • RNNSearch An attention-based Seq2Seq with finetuned hyperparameters; • Lattice The Seq2Seq model with a Lattice-based RNN Encoder [Su et al., 2016]; • Bi-Tree-LSTM A tree-coverage Seq2Seq model which lets the model depend on the source-side syntax [Chen et al., 2017]; • Mixed RNN Extending RNNSearch with a mixed RNN as the encoder [Li et al., 2017]; • CPR Extending RNNSearch with a coverage penalty [Wu et al., 2016]; • POSTREG Extending RNNSearch with posterior regularization with a constrained posterior set [Ganchev et al., 2010]; • PKI Extending RNNSearch with posterior regularization to integrate prior knowledge [Zhang et al., 2017]. English-Vietnamese Translation Following Luong and Manning [2015], Raffel et al. [2017] and Huang et al. [2017], we compare our model with the state-of-the-art NMT models, and we present the results of the baseline directly reported in their studies. • RNNSearch-1 The attention-based Seq2Seq model by Luong and Manning [2015]; Model Moses [Su et al., 2016] RNNSearch [Su et al., 2016] Lattice [Su et al., 2016] Coverage [Tu et al., 2016] Bi-Tree-LSTM [Chen et al., 2017] Mixed RNN [Li et al., 2017] CPR [Zhang et al., 2017] POSTREG [Zhang et al., 2017] PKI [Zhang et al., 2017] Seq2Seq+Attention +ACA MT-02 33.19 34.68 35.94 36.57 37.70 33.84 34.37 36.10 35.79 40.25 MT-03 32.43 33.08 34.32 35.64 34.90 31.18 31.42 33.64 35.22 38.31 MT-04 34.14 35.32 36.50 36.63 38.60 33.26 34.18 36.48 36.86 40.20 MT-05 31.47 31.42 32.40 32.73 34.35 35.50 30.67 30.99 33.08 33.14 36.82 MT-06 30.81 31.61 32.77 32.47 30.57 35.60 29.63 29.90 32.90 33.05 36.53 MT-08 23.85 23.58 24.84 25.23 22.38 22.87 24.63 24.56 28.14 Ave. 31.04 31.76 32.95 29.72 30.20 32.51 33.10 36.71 Table 2: Results of our model and the baselines (directly reported in the referred articles) on the Chinese-English translation, tested on the NIST Machine Translation tasks in 2003, 2004, 2005, 2006 with BLEU score. “-” means that the studies did not test the models on the corresponding datasets. BLEU 23.30 26.10 26.80 27.69 28.67 26.93 29.10 Table 3: Results of our model and the baselines (directly reported in the referred articles) on the English-Vietnamese translation, tested on the TED tst2013 with the BLEU score. 20 % of the duplicates Model RNNSearch-1 [Luong and Manning, 2015] RNNSearch-2 [Huang et al., 2017] LabelEmb [Sun et al., 2017b] NPMT [Huang et al., 2017] NPMT+LM [Huang et al., 2017] Seq2Seq+Attention +ACA w/o ACA ACA 15 10 5 0 1-gram • RNNSearch-2 The implementation of the attentionbased Seq2Seq by Huang et al. [2017]; • LabelEmb Extending RNNSearch with soft target representation [Sun et al., 2017b]; • NPMT The Neural Phrased-based Machine Translation model by Huang et al. [2017]; • NPMT-LM On the basis of the NPMT, a trained 4thorder language model is added. 4.4 Results Table 2 shows the overall results of the systems on the Chinese-English translation task. We compare our model with the strong baselines with their results directly reported in their articles. To facilitate fair comparison, we compare with the baselines that are trained on the same training set or slightly larger training set as reported in their articles. Many of the models are from the studies of the recent two years, which prove to be very strong baselines. The results have shown that for the six translation tasks, our ACA model has clear advantage over them, with 4.95 BLEU score over RNNSearch and 3.76 BLEU score over PKI, which proves that our model is effective. Table 3 shows the overall results of the systems on the English Vietnamese translation. It can be found that on the low-resource translation, the ACA can also bring significant improvement for the attention-based Seq2Seq model, with 2-gram 3-gram 4-gram Figure 4: Percentage of the duplicates at sentence level. Tested on the NIST 2003 dataset. The red bar is the performance of our ACA, and the blue bar is the attention-based SeqSeq without ACA. the advantage of over 2.17 BLEU score over the strongest attention-based Seq2Seq and 1.41 BLEU score over the SOTA model NPMT. Moreover, compared with NPMT with a pretrained language model, our model is still better. 4.5 Analysis In order to test whether our model can mitigate the problem of repetition in translation, we tested the repetition on the NIST 2003 dataset, following See et al. [2017]. We evaluated the proportion of the duplicates of 1-gram, 2-gram, 3-gram and 4-gram in each sentence and calculated the mean value. It can be found that at all levels, the translation of our model has less repetition. Moreover, the advantage of ours becomes clearer with the increase of the number of gram. Especially for the 4-gram, the proportion of duplicates of our model is almost only a half of that of the model without ACA. It is normal that there are repeating words in a sentence, but repeating 4-gram in most cases is unreasonable. Compared with the model without ACA, ACA can help the Seq2Seq model reduce unreasonable repetition and therefore mitigate the problem of over-translation by taking the decoding history into account. BLEU (%) 38 36 34 32 30 28 26 24 22 Source: 在此之前一年, 单单手机用户已跃居全球之冠 。 Reference: The year before that, the number of mobile phone users alone already topped the world. Seq2Seq+Attention: A year ago, cell phone users of cell phone users are already in the world. +ACA: In the past year, cell phone users have leapt to the highest level in the world. w/o ACA ACA 0 10 20 30 40 50 60 Sentence length (no shorter than) Figure 5: Performance on different sentence lengths. Tested on the NIST 2003 dataset. The red line is the performance of our ACA, and the blue line is the attention-based SeqSeq without ACA. Moreover, we choose the NIST 2003 Chinese-English translation dataset to test the performance of our model and the conventional attention-based Seq2Seq model without our ACA. We test the BLEU scores on sentences of length no shorter than 10, 20, 30, 40, 50, and 60. With the increase of length, the performance of both models decrease but our model ACA always has a clear advantage over the attentionbased Seq2Seq. In our hypothesis, the model can adapt to the decoding history by improving the attention mechanism, so it is possible that it can perform better on the long-length sentence translation. Our analysis proves that the model can be more robust to translating sentences of diverse lengths. 4.6 Translation Examples Table 4 shows two translation examples of our model on the NIST 2003 dataset, compared with the translation of the attention-based Seq2Seq model without ACA and the reference. It is obvious that both two translation examples of our example are similar to the references, outperforming those of the model without ACA, which has problems of repetition and meaning inconsistency. For the first sentence, the model without ACA generates repetition of “cell phone users” and misses the semantic unit “top”. On the contrary, our translation is closer to literal translation, which is more faithful to the expression in the source. For the second example, it requires the model to reorder the translation since the name is followed by an adverbial phrase in the source. The complex and different structure in Chinese confused the model without ACA, which can only generate repetition of “we are entering a new era”. With ACA, our model successfully reorders the translation by putting the name after the adverbial. 5 Related Work The studies of encoder-decoder framework [Kalchbrenner and Blunsom, 2013; Cho et al., 2014; Sutskever et al., 2014] for this task launched the Neural Machine Translation (NMT). To improve the focus on the information in the encoder, Bahdanau et al. [2014] proposed the attention mechanism, which greatly improved the perfor- Source: 佛莱文在谈及推行再生性能源策略已获致成功时 表示: “我们正进入一个新时代。” Reference: Speaking about the success of promoting the strategy of renewable energies, Flavin said: “we’re entering a new era.” Seq2Seq+Attention: “We are entering a new era.” “We are ente-ring a new era.” +ACA: Speaking on the success of the renewable energy strategy, Fortuyn said: “we are entering a new era.” Table 4: Two translation examples of our model, compared with the translation of the attention-based Seq2Seq model and the reference. mance of the Seq2Seq model on NMT. Still, the attention mechanism suffers from prediction failure, and therefore, a number of studies were proposed to improve the mechanism, which also enhanced the performance of the NMT model [Luong et al., 2015; Mi et al., 2016b; Jean et al., 2015; Feng et al., 2016; Tu et al., 2016; Mi et al., 2016a; Meng et al., 2016; dou; Xiong et al., 2017]. Some of them [Tu et al., 2016; Meng et al., 2016] incorporated the previous attention into the current attention for better alignment, but none of them are based on the decoding history. Besides improving attention mechanism for NMT, there are also some more effective neural networks. Gehring et al. [2017] turned the RNN-based model into CNN-based model, which greatly improves the computation speed. Vaswani et al. [2017] removed the CNN and RNN and only used attention mechanism to build the model and showed outstanding performance. Also, some researches incorporated external knowledge in their systems and also achieved obvious improvement [Li et al., 2017; Chen et al., 2017]. 6 Conclusion In conclusion, this paper proposes the decoding-historybased Adaptive Control of Attention (ACA) for the NMT model, which can transmit the significant information in the decoding history to control the output of the attention mechanism adaptively. Thus, the output of the attention mechanism is based on the the decoding history, including the past information in the RNN decoder as well as the alignment information in the attention mechanism. With this method, the conflict between the source-side information from the attention and the translated contents can be mitigated. Compared with the attention-based Seq2Seq model, our model captures more correct source information with the help of the decoding history and its translation behaves more adaptive to the past translation. Experiments on the Chinese-English translation and the English-Vietnamese translation all show that our model outperforms the strong baselines, which demonstrate the effectiveness of our model. References Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. Neural machine translation by jointly learning to align and translate. CoRR, abs/1409.0473, 2014. Mauro Cettolo, Jan Niehues, Sebastian Stüker, Luisa Bentivogli, Roldano Cattoni, and Marcello Federico. The iwslt 2015 evaluation campaign. Proc. of IWSLT, Da Nang, Vietnam, 2015. Huadong Chen, Shujian Huang, David Chiang, and Jiajun Chen. Improved neural machine translation with a syntaxaware encoder and decoder. In ACL 2017, pages 1936– 1945, 2017. Kyunghyun Cho, Bart van Merrienboer, Çaglar Gülçehre, Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, and Yoshua Bengio. Learning phrase representations using RNN encoder-decoder for statistical machine translation. In EMNLP 2014, pages 1724–1734, 2014. Shi Feng, Shujie Liu, Nan Yang, Mu Li, Ming Zhou, and Kenny Q. Zhu. Improving attention modeling with implicit distortion and fertility for machine translation. In COLING 2016, pages 3082–3092, 2016. Kuzman Ganchev, Jennifer Gillenwater, Ben Taskar, et al. Posterior regularization for structured latent variable models. Journal of Machine Learning Research, 11(Jul):2001– 2049, 2010. Jonas Gehring, Michael Auli, David Grangier, Denis Yarats, and Yann N. Dauphin. Convolutional sequence to sequence learning. In ICML 2017, pages 1243–1252, 2017. Po-Sen Huang, Chong Wang, Dengyong Zhou, and Li Deng. Neural phrase-based machine translation. CoRR, abs/1706.05565, 2017. Sébastien Jean, KyungHyun Cho, Roland Memisevic, and Yoshua Bengio. On using very large target vocabulary for neural machine translation. In ACL 2015, pages 1–10, 2015. Nal Kalchbrenner and Phil Blunsom. Recurrent continuous translation models. In EMNLP 2013, pages 1700–1709, 2013. Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. CoRR, abs/1412.6980, 2014. Junhui Li, Deyi Xiong, Zhaopeng Tu, Muhua Zhu, Min Zhang, and Guodong Zhou. Modeling source syntax for neural machine translation. In ACL 2017, pages 688–697, 2017. Minh-Thang Luong and Christopher D Manning. Stanford neural machine translation systems for spoken language domains. In Proceedings of the International Workshop on Spoken Language Translation, 2015. Thang Luong, Hieu Pham, and Christopher D. Manning. Effective approaches to attention-based neural machine translation. In EMNLP 2015, pages 1412–1421, 2015. Shuming Ma and Xu Sun. A semantic relevance based neural network for text summarization and text simplification. CoRR, abs/1710.02318, 2017. Shuming Ma, Xu Sun, Jingjing Xu, Houfeng Wang, Wenjie Li, and Qi Su. Improving semantic relevance for sequenceto-sequence learning of chinese social media text summarization. In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, ACL 2017, Vancouver, Canada, July 30 - August 4, Volume 2: Short Papers, pages 635–640, 2017. Fandong Meng, Zhengdong Lu, Hang Li, and Qun Liu. Interactive attention for neural machine translation. In COLING 2016, pages 2174–2185, 2016. Haitao Mi, Baskaran Sankaran, Zhiguo Wang, and Abe Ittycheriah. Coverage embedding models for neural machine translation. In EMNLP 2016, pages 955–960, 2016. Haitao Mi, Zhiguo Wang, and Abe Ittycheriah. Supervised attentions for neural machine translation. In EMNLP 2016, pages 2283–2288, 2016. Kishore Papineni, Salim Roukos, Todd Ward, and Wei-Jing Zhu. Bleu: a method for automatic evaluation of machine translation. In ACL, 2002, pages 311–318, 2002. Colin Raffel, Minh-Thang Luong, Peter J. Liu, Ron J. Weiss, and Douglas Eck. Online and linear-time attention by enforcing monotonic alignments. In ICML 2017, pages 2837–2846, 2017. Abigail See, Peter J. Liu, and Christopher D. Manning. Get to the point: Summarization with pointer-generator networks. In ACL 2017, pages 1073–1083, 2017. Jinsong Su, Zhixing Tan, Deyi Xiong, and Yang Liu. Latticebased recurrent neural network encoders for neural machine translation. CoRR, abs/1609.07730, 2016. Xu Sun, Xuancheng Ren, Shuming Ma, and Houfeng Wang. meprop: Sparsified back propagation for accelerated deep learning with reduced overfitting. In Proceedings of the 34th International Conference on Machine Learning, ICML 2017, Sydney, NSW, Australia, 6-11 August 2017, pages 3299–3308, 2017. Xu Sun, Bingzhen Wei, Xuancheng Ren, and Shuming Ma. Label embedding network: Learning label representation for soft training of deep networks. CoRR, abs/1710.10393, 2017. Ilya Sutskever, Oriol Vinyals, and Quoc V. Le. Sequence to sequence learning with neural networks. In NIPS, 2014, pages 3104–3112, 2014. Zhaopeng Tu, Zhengdong Lu, Yang Liu, Xiaohua Liu, and Hang Li. Modeling coverage for neural machine translation. In ACL 2016, 2016. Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz Kaiser, and Illia Polosukhin. Attention is all you need. CoRR, abs/1706.03762, 2017. Bingzhen Wei, Xu Sun, Xuancheng Ren, and Jingjing Xu. Minimal effort back propagation for convolutional neural networks. CoRR, abs/1709.05804, 2017. Yonghui Wu, Mike Schuster, Zhifeng Chen, Quoc V. Le, Mohammad Norouzi, Wolfgang Macherey, Maxim Krikun, Yuan Cao, Qin Gao, Klaus Macherey, Jeff Klingner, Apurva Shah, Melvin Johnson, Xiaobing Liu, Lukasz Kaiser, Stephan Gouws, Yoshikiyo Kato, Taku Kudo, Hideto Kazawa, Keith Stevens, George Kurian, Nishant Patil, Wei Wang, Cliff Young, Jason Smith, Jason Riesa, Alex Rudnick, Oriol Vinyals, Greg Corrado, Macduff Hughes, and Jeffrey Dean. Google’s neural machine translation system: Bridging the gap between human and machine translation. CoRR, abs/1609.08144, 2016. Hao Xiong, Zhongjun He, Xiaoguang Hu, and Hua Wu. Multi-channel encoder for neural machine translation. CoRR, abs/1712.02109, 2017. Jingjing Xu, Xu Sun, Xuancheng Ren, Junyang Lin, Binzhen Wei, and Wei Li. Dp-gan: Diversity-promoting generative adversarial network for generating informative and diversified text. CoRR, abs/1802.01345, 2018. Jiacheng Zhang, Yang Liu, Huanbo Luan, Jingfang Xu, and Maosong Sun. Prior knowledge integration for neural machine translation using posterior regularization. In ACL 2017, pages 1514–1523, 2017.
2cs.AI
arXiv:1803.01231v1 [stat.ME] 3 Mar 2018 Bayesian Projected Calibration of Computer Models Fangzheng Xie and Yanxun Xu ∗ Department of Applied Mathematics and Statistics, Johns Hopkins University Abstract We develop a Bayesian approach called Bayesian projected calibration to address the problem of calibrating an imperfect computer model using observational data from a complex physical system. The calibration parameter and the physical system are parametrized in an identifiable fashion via L2 -projection. The physical process is imposed a Gaussian process prior, which naturally induces a prior on the calibration parameter through the L2 -projection constraint. The calibration parameter is estimated through its posterior distribution, which provides a natural and non-asymptotic way for uncertainty quantification. We provide rigorous large sample justifications of the proposed approach by establishing the asymptotic normality of the posterior of the calibration parameter with efficient covariance matrix. Through extensive simulation studies and two real-world datasets analyses, we show that Bayesian projected calibration can accurately estimate the calibration parameters, calibrate the computer models, and compare favorably to alternative approaches. An R package implementing the Bayesian projected calibration is publicly available at https://drive.google. com/file/d/1Sij0P-g5ocnTeL_qcQ386b-jfBfV-ww_/view?usp=sharing. Keywords: Asymptotic normality; Computer experiment; L2 -projection; Semiparametric efficiency; Uncertainty quantification ∗ Correspondence should be addressed to Yanxun Xu ([email protected]) 1 1 Introduction With the rapid development of computational techniques and mathematical tools, computer models have been widely adopted by researchers to study large and complex physical systems. One can think of computer models as complicated nonlinear functions designed by experts using scientific knowledge (Plumlee, 2017). Compared to physical experiments, computer models are typically much faster and cheaper to run. Furthermore, computer models can be used to generate data that are infeasible to collect in practice. For example, a public available computer model called TITAN2D (Sheridan et al., 2002) was developed to simulate granular mass flows over digital elevation models of natural terrain, to better understand the loss of life and disruption of infrastructure due to volcanic phenomena, the data of which are impossible to collect in real life. For more applications of computer models, we refer to Fang et al. (2005), Santner et al. (2013), and the April 2018 issue of Statistica Sinica (http://www3.stat.sinica.edu.tw/statistica), which are devoted to computer experiments and uncertainty quantification. In this paper we consider the calibration problem in computer models when they include not only the variables that can be measured, often referred to as design, but also unknown parameters that are not directly available in the physical system. These parameters are referred to as calibration parameters in the literature (Tuo and Wu, 2016). The goal of calibration is to estimate calibration parameters by combining observational data from physical systems and simulated data from computer models, so that the computer models with the estimated calibration parameters plugged-in provide decent approximations to the underlying physical systems. Formally, we model the outputs (yi )ni=1 of the physical system η at design (xi )ni=1 through a nonparametric regression model yi = η(xi ) + ei , i = 1, · · · , n, where (ei )ni=1 are independent N(0, σ 2 ) noises. The computer model y s (·, θ), also referred to as the simulator, is a function designed by scientific experts to model the unknown physical system η(·) when the calibration parameter θ is appropriately estimated. Despite the success of computer models in many scientific studies, researchers often ask 2 the following question: is the computer model a suitable surrogate for the real physical system? Compared to the physical system, traditional computer models are rarely perfect or exact due to their fixed parametric nature or simplifications of complex physical phenomenon (Tuo and Wu, 2015): i.e., there exists discrepancy between a physical system η(·) and its corresponding computer model y s (·, θ) even if the computer model is well calibrated. Kennedy and O’Hagan (2001) first tackle this discrepancy issue under a Bayesian framework, which has been influential among many other statisticians and quality control engineers. For an incomplete list of references, we refer to Higdon et al. (2004); Bayarri et al. (2007); Qian and Wu (2008); Joseph and Melkote (2009); Wang et al. (2009); Chang and Joseph (2014); Brynjarsdóttir and OHagan (2014); Storlie et al. (2015) among others. Theoretical properties of calibration problem was not well understood until Tuo and Wu (2015, 2016), who pointed out that the calibrated computer models estimated by Kennedy and O’Hagan (2001) could lead to poor approximations to physical systems. Identifiability issue of the calibration parameter in Kennedy and O’Hagan (2001) was also noticed by Wong et al. (2017) and H. P. Wynn, among several other discussants, in their written discussion of Kennedy and O’Hagan (2001). In short, identifiability issue refers to the phenomenon that the distribution of the observed data from physical system does not uniquely determine the value of the corresponding calibration parameter given the computer model. In contrast to the Bayesian methods, which are traditionally applied to computer model calibration problems, Tuo and Wu (2015, 2016) and Wong et al. (2017) address the identifiability issue rigorously in frequentist frameworks and provide corresponding theoretical justifications. We propose a Bayesian method for computer model calibration called Bayesian projected calibration. To the best of our knowledge, our work is the first one in the literature that simultaneously achieves the following objectives: a) Identifiability: The proposed approach is formulated in an identifiable fashion. Tuo and Wu (2015, 2016) and Wong et al. (2017) define the “true” value of the calibration parameter to be the one that minimizes the L2 distance between the computer model y s (·, θ) and the physical system η(·). Following their work, the proposed Bayesian projected calibration provides a Bayesian method to estimate this “true” value of the 3 calibration parameter. b) Uncertainty quantification: The Bayesian projected calibration provides a natural way for uncertainty quantification of the calibration parameter through its full posterior distribution. Tuo and Wu (2015) showed the asymptotic normality of the L2 -projected calibration estimate for uncertainty quantification of the calibration parameter, which may not work in practice, since the amount of physical data is usually very limited (Tuo, 2017). Hence a Bayesian approach is desired, especially when data are scarce. c) Theoretical guarantee: We show that the full posterior distribution of the cali- bration parameter is asymptotically normal with efficient covariance matrix. Earlier literatures either only provide asymptotic results of specific point estimators (Tuo and Wu, 2015, 2016; Wong et al., 2017; Tuo, 2017), or formulate a Bayesian methodology for calibration problem without large sample evaluation (Plumlee, 2017). Our method represents the first effort in providing the theoretical guarantee for the full posterior distribution of Bayesian methods in computer model calibration. The rest of the paper is organized as follows. In section 2 we formulate the calibration problem rigorously in an identifiable fashion and introduce the Bayesian projected calibration method. Section 3 elaborates on the asymptotic properties of the posterior distribution of the calibration parameter. In section 4, we demonstrate the advantages of the Bayesian projected calibration in terms of estimation accuracy and uncertainty quantification via simulation studies and two real-world data examples. Conclusion and further discussion of the paper are in section 5. 2 2.1 Problem Formulation Background We first briefly review the frequentist L2 -projected calibration approach proposed by Tuo and Wu (2015) before introducing the proposed Bayesian projected calibration method, which can be regarded as the Bayesian version of the L2 -projected calibration. 4 Suppose one has collected responses (yi )ni=1 from a physical system η on a set of design points (xi )ni=1 ⊂ Ω ⊂ Rp , where η : Ω → R is a deterministic function, and the design space Ω is the closure of a connect bounded convex open set in Rp . The physical responses (yi )ni=1 are noisy due to measurement or observational errors, and hence can be modeled by the following nonparametric regression model: yi = η(xi ) + ei , i = 1, . . . , n, (2.1) where ei are independent N(0, σ 2 ) noises. Such a model has been widely adopted in the literature of calibration (Kennedy and O’Hagan, 2001; Tuo and Wu, 2015; Tuo, 2017; Wong et al., 2017). Let Θ be the parameter space of the calibration parameter θ. We assume that Θ ⊂ Rq is compact. A computer model is a deterministic function y s : Ω × Θ → R that produces an output y s (x, θ) given a controllable input x ∈ Ω and the calibration parameter θ ∈ Θ. The goal of calibration is to estimate θ given the computer model y s and the physical data (yi )ni=1 , such that the calibrated computer model approximates the physical system well. However, as pointed out by Tuo and Wu (2016) and Wong et al. (2017), the calibration parameter θ cannot be identified without further restriction, in the sense that θ cannot be uniquely determined by the distribution of Dn . More precisely, by alternatively expressing the physical system η in terms of the computer model y s (x, θ) and a discrepancy δ(x) as follows (Kennedy and O’Hagan, 2001; Wong et al., 2017; Plumlee, 2017; Tuo, 2017): η(x) = y s (x, θ) + δ(x), where the discrepancy function δ is completely nonparametric, it is clear that (θ, δ) cannot be uniquely identified by the physical system η. Therefore, the “true” value of the calibration parameter that gives rise to the physical data is not well-defined. To address the identifiability issue, Tuo and Wu (2015) define the “true” value of θ through the L2 -projection: ∗ θ = arg min kη(·) − y θ∈Θ s (·, θ)k2L2 (Ω) Z = arg min θ∈Θ [η(x) − y s (x, θ)]2 dx. (2.2) Ω The L2 -projected calibration method provides an estimate θbL2 for θ ∗ using a two-step proce- 5 dure. First, an estimate ηb of the physical system η is obtained via the kernel ridge regression (Wahba, 1990) given the physical data (xi , yi )ni=1 : n ηb = arg min f ∈HΨ (Ω) 1X [yi − f (xi )]2 + λkf kHΨ (Ω) , n i=1 (2.3) where Ψ : Ω × Ω → R is a positive definite covariance function, and k · kHΨ (Ω) is the native norm of the reproducing kernel Hilbert space (RKHS) associated with Ψ. We refer to Wahba (1990) and Wendland (2004) for detailed treatment of these concepts. Then, the L2 -projected calibration estimate θbL for θ ∗ is given by 2 θbL2 := arg min kb η (·) − y s (·, θ)k2L2 (Ω) . (2.4) θ∈Θ √ The L2 -projected calibration has very nice theoretical properties: θbL2 is not only nconsistent for θ ∗ , but is also semiparametric efficient (Tuo and Wu, 2016). In other words, it provides an optimal estimator to the “true” calibration parameter. 2.2 Bayesian Projected Calibration The L2 -projected calibration estimate θbL2 enjoys nice asymptotic properties. Nevertheless, it is a frequentist approach, therefore uncertainty quantification needs to be assessed via additional procedures, e.g., bootstrap (Wong et al., 2017), etc. In what follows, we address this issue by formulating its Bayesian counterpart. We follow the definition of the “true” value θ ∗ of θ given in (2.2), as it minimizes the uncertainty beyond the computer model for explaining the physical system. There are two unknown parameters: the physical system η, taking values in some function space F, and the calibration parameter θ ∈ Θ. The statistical model for calibration can be defined by   ∗ s 2 P = Ψσ (y − η(x)) : η ∈ F, θ = arg min kη(·) − y (·, θ)kL2 (Ω) , θ∈Θ where Ψσ (·) is the density function of N(0, σ 2 ). Namely, the parameter (η, θ ∗ ) is constrained on a manifold in F × Θ defined by   ∗ ∗ s 2 M = (η, θ ) ∈ F × Θ : θ = arg min kη(·) − y (·, θ)kL2 (Ω) . (2.5) θ∈Θ It is therefore natural to treat the “true” calibration parameter θ ∗ as a functional θ ∗ : F → Θ, 6 η 7→ arg minθ kη(·) − y s (·, θ)k2L2 (Ω) , of a physical system η, and we denote this functional by θη∗ . To distinguish the parameter (η, θη∗ ) and the truth that generates the data, we denote η0 to be the true physical system producing physical data (yi )ni=1 , and θ0∗ = θη∗0 . We now introduce the Bayesian projected calibration. The unknown physical process η is imposed a mean-zero Gaussian process prior Π = GP(0, τ 2 Ψ), where Ψ : Ω × Ω → R+ is a positive definite covariance function, and τ > 0 is a scaling factor. Let Dn denote the physical data (xi , yi )ni=1 , and Π(· | Dn ) denote the posterior distribution given Dn . It is straightforward to show that the posterior distribution of η is also a Gaussian process with e where mean function ηe and covariance function Ψ, ηe(x) = τ 2 Ψ(x1:n , x)T (τ 2 Ψ(x1:n , x1:n ) + σ 2 In )−1 y, e Ψ(x, x0 ) = τ 2 Ψ(x, x0 ) − τ 2 Ψ(x1:n , x)T (τ 2 Ψ(x1:n , x1:n ) + σ 2 In )−1 τ 2 Ψ(x1:n , x0 ). (2.6) (2.7) Here Ψ(x1:n , x) = [Ψ(x1 , x), · · · , Ψ(xn , x)]T ∈ Rn , Ψ(x1:n , x1:n ) = [Ψ(xi , xj )]n×n ∈ Rn×n , and y = [y1p , · · · , ynp ]T ∈ Rn . Notice here the predictive mean ηe(x) given physical data Dn coincides with the kernel ridge regression estimate ηb for some suitably chosen τ (see, for example, Rasmussen and Williams, 2006). The Gaussian process prior GP(0, τ 2 Ψ) on η naturally induces a prior distribution on θη∗ through the constrained manifold M in (2.5). The Bayesian projected calibration can be regarded as a Bayesian version of the L2 -projected calibration method, because both methods estimate the “true” value of θ over the constrained manifold M using Bayesian and frequentist approach, respectively. Furthermore, in Section 3 we will show that the posterior of θη∗ under the Bayesian projected calibration is asymptotically centered at the L2 -projected calibration estimate θbL2 . Remark 1 (Expensive computer model). In the literature of computer experiments, it is common that the computer model y s is not directly available to us or time-consuming to run, in which case the computer model can be only computed at given design points. Thus finding an emulator ŷ s for y s using the data from the computer outputs at given design points is needed. One first collects a set of data (xsj , θjs , yjs )m j=1 from m runs of the computer model, where yjs = y s (xsj , θjs ) is the output at the design point xsj , then estimate the emulator ybs using the data (xsj , θjs , yjs )m j=1 . There are varieties of methods for constructing emulators for 7 computer experiments, including Gaussian process models (Santner et al., 2013), radial basis function interpolation (Wendland, 2004), polynomial chaos approximation (Xiu, 2010), or the smoothing spline ANOVA (Wahba, 1990). To perform computer model calibration when the computer model y s is not directly available or time-consuming to run, the calibration parameter θη∗ can be estimated by replacing y s with the corresponding emulator ybs . 3 Theoretical Properties In this section we provide large sample justifications of the proposed Bayesian projected calibration. In particular, asymptotic characterization of the posterior distribtuion Π(θη∗ ∈ · | Dn ) of the calibration parameter θη∗ given the physical data Dn is offered. The posterior of θη∗ has similar behavior as the L2 -projected calibration estimate θbL2 : Π(θη∗ ∈ · | Dn ) √ is not only n-consistent, but also asymptotically normal with efficient covariance matrix. The asymptotic normality of Bayesian posterior is also referred to as Bernstein-von Mises (BvM) limit (see, for example, chapter 10 in van der Vaart, 2000). The development of semiparametric BvM theorem had not been established until Bickel and Kleijn (2012). For a thorough treatment of BvM limits of smooth functionals in semiparametric models, we refer to Castillo and Rousseau (2015a). Before proceeding to the main results, we introduce some notations and definitions. Given an integer vector k = [k1 , · · · , kp ]T and a function f (x1 , · · · , xp ) : Ω → R, denote Dk k to be the mixed partial derivative operator defined by Dk f = ∂ |k| f /∂xk11 · · · ∂xpp , where P |k| := pj=1 kj . Let α > 0 be positive, and α be the greatest integer strictly smaller than α. The α-Hölder norm of a function f : Ω → R is defined by kf kCα (Ω) := max k:|k|≤α Dk f + max sup L∞ (Ω) k:|k|=α x6=x0 |Dk f (x) − Dk f (x0 )| . kx − x0 kα−α The α-Hölder space of functions on Ω, denoted by Cα (Ω), is the set of functions with finite α-Hölder norm. The α-Sobolev space of functions, denoted by Hα (Ω), is the set of functions f : Ω → R that can be extended to Rp such that the Fourier transform 8 fb(t) = (2π)−p R Rp T eit x f (x)dx satisfies (van der Vaart and Zanten, 2011) Z 2 α 1 + ktk2 fb(t) dt < ∞. Rp Denote Ψα to be the Matérn correlation function with roughness parameter α √ α √ 1 0 0 Ψα (x, x ) = 2αkx − x k K ( 2αkx − x0 k), α Γ(α)2α−1 (3.1) where Kα is the modified Bessel function of the second kind. To study the asymptotic behavior of the posterior of θη∗ , we first explore convergence properties of the physical system η. For simplicity we assume that the design space Ω is the unit hypercube [0, 1]p , and the design points (xi )ni=1 are independently and uniformly sampled from Ω. The computer model y s is assumed to be directly available to us or cheap to run. Such a simplified assumption is also adopted in Wong et al. (2017), and it does no harms to the theoretical analysis, as the amount of data from computer experiments is typically much larger than the sample size of the physical data. In addition, the computer s data (xsj , θjs , yjs )m bs , when j=1 are deterministic, and the approximation error between y and y sufficiently small as m gets large, does not affect the stochastic analysis here. Therefore one may assume that the approximation error of ybs to y s is negligible. The true but unknown physical system η0 is assumed to lie in the intersection of the α-Hölder space Cα (Ω) and αSobolev space Hα (Ω) for some α > p/2. We assume that the prior Π for η is the mean-zero Gaussian process GP(0, τ 2 Ψα ) and without loss of generality, the scaling factor τ is fixed at 1. Theorem 1 (Convergence of η). Suppose η is imposed the Gaussian process prior Π = GP(0, Ψα ), and η0 ∈ Cα (Ω) ∩ Hα (Ω), where α > p/2. Then for any sequence Mn → ∞,   E0 Π kη − η0 kL2 (Ω) > Mn n−α/(2α+p) | Dn → 0, and there exists some constant M > 0 such that  Π kη − η0 kL∞ (Ω) > M | Dn → 0 in P0 -probability. The resulting rate n−α/(2α+p) is proven to be optimal when the underlying true function 9 η0 is an α-Hölder or α-Sobolev function (See, for example, Stone, 1982, van der Vaart and Wellner, 1996, and Ghosal and van der Vaart, 2017). We next discuss the property of θη∗ as a functional: η 7→ θη∗ . Under certain regularity conditions to be stated next, θη∗ yields a first-order Taylor expansion with respect to η locally around η0 . Such a smooth property of the functional θη∗ serves as the building block to derive the asymptotic normality of the posterior of θη∗ . A1 θη∗ is the unique solution to (2.2) and is in the interior of Θ for η in an L2 -neighborhood of η0 . A2 supθ∈Θ ky s (·, θ)kL2 (Ω) < ∞. A3 The Hessian matrix Z  Vη = Ω  ∂2 s ∗ [η(x) − y (x, θη )] dx ∂θ∂θ T is strictly positive definite in an L2 -neighborhood of η0 . A4 For all j, k = 1, . . . , q, it holds that ∂y s (·, θ) ∂θj sup θ∈Θ < ∞, HΨα (Ω) ∂ 2ys (·, ·) ∈ C1 (Ω × Θ). ∂θj ∂θk Lemma 1 (Taylor Expansion). Under conditions A1-A4, there exists some  > 0 and some (1) (1) (2) positive constants Lη0 and Lη0 depending on η0 only, such that kθη∗ − θ0∗ k ≤ Lη0 kη − η0 kL2 (Ω) and θη∗ − θ0∗ Z −2 [η(x) − η0 (x)]V0−1 Ω ∂y s 2 (x, θ0∗ )dx ≤ L(2) η0 kη − η0 kL2 (Ω) ∂θ (3.2) whenever kη − η0 kL2 (Ω) < , where V0 = Vη0 . It follows immediately from the convergence results of the physical system η (theorem 1) and the Taylor expansion property of θη∗ (lemma 1) that the posterior of θη∗ is consistent. Corollary 1 (Consistency of θη∗ ). Suppose η is imposed the Gaussian process prior Π = GP(0, Ψα ), and η ∈ Cα (Ω)∩Hα (Ω). Then the posterior of θη∗ is consistent, i.e., Π(kθη∗ −θ0∗ k >  | Dn ) → 0 in P0 -probability for any  > 0. 10 Now we are in a position to characterize the asymptotic behavior of the posterior distribution of θη∗ , which is the main result of this paper. Under certain regularity conditions, the √ posterior distribution of n(θ ∗ − θbL ) is asymptotically normal, where θbL is the frequentist η 2 2 L2 -projected calibration estimator of θ proposed by Tuo and Wu (2015) (see section 2). We describe the L2 -projected calibration procedure in our context for completeness: n 1X [yi − f (xi )]2 + λn kf k2HΨν (Ω) , ηb = arg min n f ∈HΨν (Ω) i=1 θbL2 = arg min kb η (·) − y s (·, θ)k2L2 (Ω) , θ∈Θ where ν = α − p/2, and λn = O(n−2α/(2α+p) ) is a sequence depending on the sample size of the physical data Dn . Theorem 2 (Asymptotic Normality). Suppose η is imposed the Gaussian process prior Π = GP(0, Ψα ), and η0 ∈ Cα (Ω) ∩ Hα (Ω), where α > p/2. Under conditions A1-A4, it holds that sup Π A √   n(θη∗ − θbL2 ) ∈ A | Dn − N 0, 4σ 2 V0−1 WV0−1 (A) = oP0 (1), provided that Z  W= Ω  s ∂y s ∗ ∂y ∗ (x, θ0 ) T (x, θ0 ) dx ∂θ ∂θ is strictly positive definite, where the supremum is taken over all measurable subsets in Rq . Tuo and Wu (2015) proved that the L2 -projected calibration estimate θbL2 is also asymp√ L totically normal: n(θbL − θ ∗ ) → N(0, 4σ 2 V−1 WV−1 ). Furthermore, the covariance matrix 2 4σ 2 V0−1 WV0−1 0 0 0 achieves semiparametric efficiency in the sense that there does not exist a regular estimate with a smaller asymptotic covariance matrix (in spectrum). The posterior of θη∗ possesses a similar optimal behavior, since the covariance matrix of the asymptotic √ posterior of n(θη∗ − θbL2 ) coincides with that of θbL2 . √ We finish this section with the following n-consistency result of θη∗ , which is a refinement of corollary 1. It is a consequence of theorem 2 and the asymptotic normality of θbL . 2 √ Corollary 2 ( n-Consistency of θη∗ ). Suppose η is imposed the Gaussian process prior Π = GP(0, Ψα ), and η0 ∈ Cα (Ω) ∩ Hα (Ω), where α > p/2. Under the conditions of theo11 √ rem 2, the posterior of θη∗ is n-consistent, i.e., for any sequence Mn → ∞, it holds that   √ E0 Π nkθη∗ − θ0∗ k > Mn | Dn → 0. We defer the proof of Theorem 2 to the Appendix. The proofs of all other theorems, lemmas, and propositions are deferred to the supplementary material. 4 Numerical Examples This section provides extensive numerical examples to evaluate the proposed Bayesian projected calibration. Subsection 4.1 presents simulation studies via three synthetic examples. Two real-world data examples are included in subsections 4.2 and 4.3, respectively. 4.1 Simulation Studies We consider three configurations. • Configuration 1. The computer model is y s (x, θ) = 7[sin(2πθ1 − π)]2 + 2[(2πθ2 − π)2 sin(2πx − π)], and the physical system coincides with the computer model when θ0∗ = [0.2, 0.3]T , i.e., η0 (x) = y s (x, θ0∗ ). The design space Ω is [0, 1], and the parameter space Θ for θ is [0, 0.25] × [0, 0.5]. We simulate n = 50 observations from the randomly perturbed physical system yi = η0 (xi ) + ei , where (xi )ni=1 are uniformly sampled from Ω, and the variance for the noises (ei )ni=1 is set to 0.22 . • Configuration 2. We follow an example provided in Gu and Wang (2017). The computer model is y s (x, θ) = sin(5θx) + 5x, and the physical system is η0 (x) = 5x cos(15x/2) + 5x. The design space Ω is [0, 1], and the parameter space Θ for θ is [0, 3]. We simulate n = 30 observations from yi = η0 (xi ) + ei with var(ei ) = 0.22 , and (xi )ni=1 are equidistant on Ω. The L2 -discrepancy kη0 (·) − y s (·, θ)kL2 (Ω) between the computer model y s and the physical system η0 as a function of θ is depicted in Figure 1. The minimizer of the L2 -discrepancy is at θ0∗ = 1.8771. 12 • Configuration 3. We use the pedagogical example in Plumlee (2017). The physical system is η0 (x) = 4x + x sin(5x) and the computer model is y s (x, θ) = θx, where x ∈ Ω = [0, 1] and θ ∈ Θ = [2, 4]. We take (xi )ni=1 = {0, 0.05, 0.1, 0.15, 0.2, · · · , 0.8}, and the responses are given by yi = η0 (xi )+ei with var(ei ) = 0.022 . The L2 -discrepancy as a function of θ is given by kη(·) − y s (·, θ)kL2 (Ω) = p 0.33(4 − θ)2 − 0.2898(4 − θ) + 0.201714, and is minimized at θ0∗ = 3.5609. 2.2 1.8 L2 Loss 2.6 L2 Loss of Configuration 2 0.0 0.5 1.0 1.5 2.0 2.5 3.0 θ Figure 1: The L2 -discrepancy kη0 (·) − y s (·, θ)kL2 (Ω) between the computer model y s and the physical system η0 as a function of θ for configuration 2. For the three configurations described above, we impose the Gaussian process prior GP(0, τ 2 Ψα ) on η, where Ψα is the Matérn covariance function given by (3.1) with α = 5/2. Here the scaling factor τ is set to τ = 1 for all 3 configurations for the ease of implementation. To draw posterior samples of θη∗ , we first draw posterior samples of η using formula (2.6) and (2.7), then compute θη∗ by θη∗ = arg minθ kη(·) − y s (·, θ)k2L2 (Ω) . For all three configurations, 1000 samples of θη∗ are drawn from the posterior distribution after burn-in for subsequent analysis. For comparison, we implement the calibration method by Kennedy and O’Hagan (2001) (abbreviated as KO) and the orthogonal Gaussian process method by Plumlee (2017) (abbreviated as OGP). For both methods in all three configurations, Markov chain Monte Carlo is applied to draw 1000 posterior samples after discarding 1000 burn-in samples. 13 For configuration 1, the summary statistics of the posterior distribution of θη∗ are provided in Table 1, together with those using the KO method and the OGP method. We can see that both the Bayesian projected calibration and the OGP outperform the KO in terms of both accuracy of point estimates (posterior means) and uncertainty quantification (length of credible intervals and standard deviations of posterior samples). Although OGP provides similar posterior inference compared to the Bayesian projected calibration, the computation runtime is significantly longer than the other two methods. The computational bottleneck was also discussed in section 6 of Plumlee (2017). Figure 2(a) presents the scatter plot of Table 1: Summary Statistics of Posterior of θ for Configuration 1 (the simulation truth is θ0∗ = [0.2, 0.3]T ) Projected Calibration KO Calibration OGP Calibration θ θ1 θ2 θ1 θ2 θ1 θ2 Mean 0.1984 0.3009 0.1927 0.2953 0.2068 0.3024 Standard Deviation 0.0011 0.0013 0.0235 0.01537 0.0005 0.0006 97.5%-Quantile 0.2006 0.3034 0.2474 0.3360 0.2013 0.2999 0.1963 0.2984 0.1653 0.2722 0.1992 0.2975 2.5%-Quantile Runtime 279s 0.834s 40562s √ n(θη∗ − θbL2 ). The level curves of the BvM limit shows that the √ asymptotic distribution of Π( n(θη∗ − θbL2 ) | Dn ) developed in section 3 offers a decent apthe posterior samples of proximation to the exact posterior. Comparing Figures 2 (a) and (b), the Bayesian projected calibration outperforms the KO in terms of uncertainty quantification. We also investigate the performance of the calibrated computer model in Figures 2 (c) and (d). The point-wise 95%-credible bands for the computer model also validate that Bayesian projected calibration provides a better estimate to y s in contrast to the KO approach. Similarly, for configuration 2, the advantages of the Bayesian projected calibration in terms of uncertainty quantification and computational cost can be summarized from the statistics reported in Table 2. We also provide the densities of the posterior using the proposed method and KO approach in Figures 3 (a) and (b), respectively. Again, it can be seen that the Bayesian projected calibration provides smaller uncertainty compared to the KO calibration. In addition, Figure 3 (c) shows that the asymptotic BvM limit approximates the exact posterior well even though the sample size is only n = 30. 14 0.04 ^ (a) Posterior Distribution of n (θstar η − θL2) (b) Posterior Samples of θ based on KO Calibration ● Posterior Samples of θstar η ● ● Level Curve of BvM limit ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ●●● ●● ●● ● ● ●● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ●● ●●●●● ● ●●● ●●● ●●● ● ● ● ● ● ● ●● ●● ●● ●●● ●●● ●● ●●●● ● ● ● ●● ●●● ●● ● ● ●● ●●● ●● ● ●● ● ●●● ● ●●● ● ● ●● ● ● ●● ● ● ●●● ●●● ●● ● ● ●● ● ●● ● ● ●● ●● ● ●● ● ● ● ● ● ●● ● ● ● ●● ● ● ● ● ● ● ● ● ●● ● ● ● ●● ● ●● ●● ●● ● ●● ● ●● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ●● ● ● ●●● ● ● ● ●● ● ●●● ● ●● ● ●●● ● ●● ● ● ●●●● ● ●● ●● ● ●● ● ●● ●● ● ● ●● ●●● ● ● ●●● ● ●● ● ●● ● ● ●● ●● ● ●● ● ● ● ● ● ● ● ● ● ●● ● ● ● ●● ● ● ●●● ● ● ●●●● ● ● ● ●● ● ● ● ●● ● ● ● ●●● ●● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ●●●●●●● ● ● ● ● ● ● ● ● ● ●● ● ● ●●● ● ● ● ● ● ● ● ● ● ●●● ● ● ●● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ●● ●● ● ●● ●● ● ● ●● ●● ● ●●● ●●● ●● ● ●●● ● ●●●● ● ● ●● ● ● ● ●●●● ● ●● ● ● ● ● ●● ● ● ● ●●● ●● ● ● ● ●● ●●● ● ● ● ● ● ● ●● ● ● ● ●● ● ●●● ●● ● ●● ● ● ● ●●● ●● ●● ●● ● ● ●● ●●● ● ● ●● ●● ● ●●● ● ● ● ● ●● ●● ● ● ● ● ● ● ● ● ● ● ●● ● ● ●● ● ● ● ● ● ●● ● ● ●● ●●● ●● ● ● ●● ● ●●●●● ● ● ●●●● ●● ● ● ● ● ●● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●●●● ●● ●● ● ●●● ● ●●● ●● ●● ● ● ●● ● ●● ● ●● ● ●●●● ●●● ●● ●● ●●● ● ● ●● ● ● ●● ● ● ● ● ● ● ●● ● ● ● ●● ● ●● ●●● ● ●● ● ● ●●● ●● ● ●●● ● ● ● ● ●● ●● ● ●●● ●● ● ● ● ●● ● ● ● ● ●●● ●●● ● ● ●● ● ● ●● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ●● ● ● ●● ●● ● ●● ●● ● ● ● ● ●● ● ● ● ● ●● ● ●●● ●● ● ● ●● ● ●● ●● ● ● ● ●● ● ● ●● ● ● ● −0.02 −0.01 0.00 ^ n (θstar η1 − θL21) 0.01 0.34 θ2 ●● 0.30 ● 0.26 0.02 0.00 ● ● −0.02 ^ n (θstar η2 − θL22) ● ● 0.02 ● 0.16 0.18 ● 8 ● ● ● 7 ●●● ● ● ● ● ● ●● ● ●● 0.2 ● ● ● ● ● ● ● 4 6 ● ● ● ●● ●● ● ● ● ● ● ●● ● ● ● ● ● ●● ● ● ● ● ● ●● ● ●●● ● ● ● ● ● ● ● ● ● ● 2 5 4 3 ● ● ● ● 0.0 ● ● ● ● ● ● ● η ● ● η ● ● ● ● Observation True Process KO Calibrated Model (mean) ● ● ● ● ● ● ● 0.24 (d) KO Calibration 10 ● ● ● ● 0.22 8 ● ● ● ● ● 0.20 θ1 6 9 10 Observation True Process Projected Calibrated Model (mean) ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ●● ● ● ●●● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ●●● ● ● ● ● ●● ● ● ●●● ● ● ● ● ●● ●● ● ●● ● ● ● ● ● ● ● ● ●● ● ●●● ● ●●● ●● ● ●● ●● ● ●● ● ●● ● ● ●● ●● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ●●●● ● ● ●● ● ● ●● ●● ● ● ● ● ● ●●● ● ●● ●●●● ●●● ● ●● ● ● ● ● ●●●● ●● ●●● ●● ● ● ●●● ● ●● ● ●●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ●● ● ● ●● ●● ●●● ● ● ●● ● ● ● ● ●● ● ● ● ● ●●● ●● ●●● ●●●● ●● ● ●●● ● ●●●●●● ●●●● ● ● ● ●● ●● ● ●● ●●●● ● ● ● ●● ● ●●● ● ●● ●● ● ●● ● ● ●●● ● ● ● ●●● ●●● ●●● ● ●● ●● ● ●● ● ● ● ●●●● ●●● ● ●●●●● ●●●● ●●● ● ● ● ● ●● ● ●● ● ● ● ●● ● ● ● ● ● ● ● ● ● ●● ● ●● ● ● ● ●● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ●●● ●●●●● ●●●●●●● ●● ● ● ● ● ●● ● ●● ● ● ●● ● ● ●●● ● ● ● ● ● ●●●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ●● ● ● ●●●● ●● ● ● ● ● ●● ● ●●●●● ● ●●● ●●● ●● ●● ●● ●●●● ● ● ● ● ● ● ●● ● ●● ●● ● ●● ●● ● ●●●●● ● ●●●● ●●● ●●●●●●● ●● ●● ● ● ●● ●● ●● ●●●● ●● ●●● ● ● ● ●●● ● ●●● ● ●● ● ●● ● ● ●● ●● ● ● ● ● ●● ●● ●●●●● ● ●● ● ●●● ● ●●● ● ● ● ●● ● ●● ● ● ●● ● ● ● ● ● ● ● ● ● ●● ●● ●●● ● ● ● ●●● ● ● ●● ●●● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ●●● ● ● ●● ● ● ● ● ● ●● ● ● ● ● ●● ● ●●● ● ●●● ● ● ● ● ● ● ●● ● ● ●● ● ●● ● ●●●●● ● ● ● ● ● ● ●● ● ●●● ● ● ●●● ●●● ● ● ●● ● ●● ● ● ● ● ● ●● ● ●● ●● ● ● ● ●● ● ●● ● ● ● ●● ●● ●●● ● ● ● ● ● ●● ●● ●● ● ● ● ● ● ● ● ●● ● ● ● ● ● ●● ●● ● ● ● ●● ●● ● ● ● ● ● ● ● ● ● ● ● ● (c) Bayesian Projected Calibration ● ● ● ● ● ● ● 0.4 0.6 0.8 1.0 0.0 x 0.2 0.4 0.6 0.8 1.0 x Figure 2: Visualization of the posterior inference for configuration 1 in the simulation studies. √ Panel (a) shows the scatter plot of the posterior samples of n(θη∗ − θbL2 ) and the level curves of the corresponding BvM limit. Panel (b) presents the scatter plot of the posterior samples of θ using the KO approach. Panels (c) and (d) display the calibrated computer models (in dashed lines) using the Bayesian projected calibration and the KO approach, respectively, together with their corresponding point-wise 95%-credible intervals (in shaded area). The scenario for configuration 3 is slightly challenging due to the fact that no physical data are available on (0.8, 1]. We provide the corresponding summary statistics in Table 3. It can be seen that when the design points are not regularly spread over Ω, the KO method provides a biased estimate of θ0∗ compared to the Bayesian projected calibration and the OGP. For the uncertainty quantification performance measured by the width of credible intervals and standard deviation, the OGP method and the Bayesian projected calibration are similar, and both outperform the KO approach. 15 Table 2: Summary Statistics of Posterior of θ for Configuration 2 (simulation truth is θ0∗ = 1.8771) Projected Calibration KO Calibration OGP Calibration Mean 1.8805 1.8805 1.8721 Standard Deviation 0.0048 0.0593 0.0023 1.8903 1.9832 1.8766 97.5%-Quantile 2.5%-Quantile 1.8712 1.7608 1.8678 Runtime 20.697s 1.034s 31843s 10 BvM Limit Density 0 5 Density 15 Bayesian Projected Calibration: Posterior of n (θstar η − θL2) −0.05 0.00 n( 0.05 0.10 ) θstar η − θL2 Figure 3: Simulation study configuration 2: The histogram of the posterior samples of √ n(θη∗ − θbL2 ), together with the theoretical BvM limit density (red solid line). 4.2 Ion Channel Example We apply the Bayesian projected calibration to the ion channel example used in Plumlee et al. (2016). The dataset involves measurements from experiments concerning ion channels of cardiac cells. Specifically, the output of the experiment is the current through the sodium channels in a cardiac cell membrane, and the input is the time. For detailed description of the experiment, we refer to Plumlee et al. (2016). Here we consider a subset of the original dataset, which consists of 19 normalized current records needed to maintain the membrane potential fixed at −35mV, together with the logarithm of the corresponding time as the inputs. The same dataset is also studied in Plumlee (2017). For the computer model, 16 Table 3: Summary Statistics of Posterior of θ for Configuration 3 (simulation truth is θ0∗ = 3.5609) Projected Calibration KO Calibration OGP Calibration Mean 3.4064 3.1109 3.6001 Standard Deviation 0.0614 0.4760 0.0911 3.5964 3.9385 3.7733 97.5%-Quantile 2.5%-Quantile 3.3624 2.1467 3.4167 Clancy and Rudy (1999) suggests the following Markov model for ion channels: y s (x, θ) = eT 1 exp[exp(x)A(θ)]e4 , where ei is the column vector with 1 at the ith coordinate and 0 for the rest components, the outer exp is the matrix exponential function, and  −θ2 − θ3 θ1 0 0   θ2 −θ1 − θ2 θ1 0  A(θ) =   0 θ2 −θ1 − θ2 θ1  0 0 θ2 −θ1     .   We follow the Monte Carlo methods described in subsection 4.1 to collect 1000 posterior samples of θ using the Bayesian projected calibration and the KO calibration approach. The OGP calibration approach, however, fails to provide adequate samples from the posterior distribution for subsequent inference within 20 hours. The roughness parameter α for the Matérn covariance function is set to 5/2, and we set τ = 0.02, σ = 0.001, as suggested by Plumlee (2017). Table 4 presents the corresponding comparison of summary statistics. The calibrated computer models are also visualized in Figure 4. Clearly, the Bayesian projected calibration provides better estimates to both the calibration parameter θ and the computer model in terms of lower uncertainty (smaller standard deviation and thinner credible intervals). It can also be seen that the Bayesian projected calibrated computer model approximates to the physical data better than the KO method. 17 Table 4: Summary Statistics of Posterior of θ for the Ion Channel Example Projected Calibration KO Calibration θ θ1 θ2 θ3 θ1 θ2 θ3 Mean 6.011166 5.578567 3.500813 3.4203734 0.5779939 7.4971337 Standard Deviation 0.000012 0.000006 0.000006 0.2671795 0.5668012 1.5645618 97.5%-Quantile 6.011191 5.578578 3.500824 2.963897 −0.4371212 4.718231 6.011143 5.578556 3.500802 4.023088 1.7700171 10.925112 2.5%-Quantile KO Calibration 0.15 Bayesian Projected Calibration 0.04 ● ● ● ● −2 −1 0 1 ● ● ● ● ● ● ● ● 2 0.10 ● ● ● ● ● ● ● ● 0.00 ● Observation GP Posterior Mean KO Calibrated Model ● ● ● 0.05 0.12 ● Normalized current ● ● 0.08 Observation GP Posterior Mean Calibrated Model ● ● 0.00 Normalized current ● ● 3 −2 Logarithmic time −1 0 1 ● ● ● ● ● ● ● ● ● 2 3 Logarithmic time Figure 4: Visualization of computer model calibration for the ion channel example. The left and right panels present the calibrated computer models (dashed lines) using the proposed approach and the KO calibration approach, respectively. The shaded area is the point-wise 95%-credible intervals for the KO calibrated computer model. The physical data (circles) and the Gaussian process (GP) estimates of the physical system (dashed lines) are also displayed. 4.3 Spot Welding Example Now we consider the spot welding example studied in Bayarri et al. (2007) and Chang and Joseph (2014). Three control variables in the experiment are the load, current, and gauge. The physical experiments are only conducted for gauge being 1 and 2. Since the computer model fails to produce meaningful output when the gauge is set to 1, here we only consider the case where the gauge is 2, i.e., the control variables are the load and the current only. The physical data are provided in Table 4 of Bayarri et al. (2007). For each fixed design point, the mean of the 10 replicates of the output is taken as the response. The computer model for the spot welding system, on the other hand, is not directly available to us. In short, the computer model consists of a time-consuming finite element 18 method (FEM) for numerically solving a system of partial differential equations (PDEs). There are 21 available runs for the computer code, as is presented in Table 3 of Bayarri et al. (2007). As discussed in section 2, an emulator is needed as a surrogate for the computer model in such a situation where the code is expensive. Here we apply the RobustGaSP package (Gu et al., 2018a) to emulate the expensive FEM computer model. For theoretical background on the RobustGaSP emulator, we refer to Gu et al. (2018b). We follow similar approach in subsections 4.1 and 4.2 to draw posterior samples using Bayesian projected calibration and the KO method. The only difference is that the nonavailable computer model y s is replaced by the predictive mean of the RobustGaSP emulator based on the results of the 21 runs on the FEM computer code. The summary statistics are presented in Table 5, indicating that the Bayesian projected calibration outperforms the KO approach in terms of uncertainty quantification, i.e., smaller standard deviation and thinner credible interval. The calibrated computer models using the Bayesian projected calibration and the KO approach, together with their corresponding point-wise 95%-credible intervals, are depicted in Figure 5. We can see that in terms of computer model calibration, both approaches behave similarly. The point-wise credible intervals, however, indicate that the Bayesian projected calibration method outperforms the KO approach regarding uncertainty quantification. The imperfection of the computer model can also be seen from the discrepancy presented on the right two panels of Figure 5. Table 5: Summary Statistics of Posterior of θ for the Spot Welding Example Projected Calibration KO Calibration Mean 4.385933 4.107683 Standard Deviation 0.08455849 1.333926 4.505187 6.880466 97.5%-Quantile 2.5%-Quantile 4.183981 1.439716 5 Conclusion and Discussion We develop a novel Bayesian projected calibration method following the frequentist L2 projected calibration method in Tuo and Wu (2015). The proposed approach is formulated 19 Bayesian Projected Calibration (Load = 4N) 6 ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 5 ● ● 24 25 26 27 28 23 24 25 26 27 28 29 KO Calibration (Load = 4N) KO Calibration (Load = 5.3N) ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 5 5 ● ● ● ● 7 ● ● ● ● ● ● ● ● ● ● ● 6 ● ● 30 ● ● 8 ● ● ● ● ● ● ● ● ● Nugget diameter 7 30 Observation GP Posterior Mean Calibrated Computer Model Current ● ● ● ● ● 6 29 ● Current 8 23 Observation GP Posterior Mean Calibrated Computer Model 4 4 ● Nugget diameter 7 8 ● ● ● ● 6 7 ● ● ● ● Nugget diameter ● ● ● ● ● ● ● 5 Nugget diameter 8 ● ● ● ● ● ● ● ● ● Bayesian Projected Calibration (Load = 5.3N) 23 24 25 Observation GP Posterior Mean Calibrated Computer Model 26 27 28 29 ● 4 4 ● 30 23 Current 24 25 Observation GP Posterior Mean Calibrated Computer Model 26 27 28 29 30 Current Figure 5: Visualization of computer model calibration for the spot welding example. The left and right panels present the calibrated computer models (red dashed lines) as a function of the current with the load fixed at 4N and 5.3N, respectively. The shaded areas are the pointwise 95%-credible intervals for the corresponding calibrated computer models. The physical data (circles) and the Gaussian process (GP) estimates of the physical system (solid lines) are also displayed. 20 in an identifiable way and naturally quantifies uncertainty in the calibration problem through the posterior distribution. Theoretical justification of the Bayesian projected calibration is √ provided: the marginal posterior distribution of the calibration parameter is not only nconsistent, but also asymptotically normal with efficient covariance matrix. The estimation methods in this work and Tuo and Wu (2015) can be viewed as the following two-step procedure: First estimate the physical system through Gaussian process models; Then estimate the calibration parameter using the L2 -projection criterion. On the other hand, it is possible to jointly estimate the calibration parameter and the discrepancy between the physical system and the computer model. For example, Plumlee (2017) proposes an orthogonal Gaussian process (OGP) model to tackle this joint estimation issue. The theoretical development for OGP, nevertheless, is only restricted to a point estimate (Tuo, 2017): the maximum a posteriori (MAP) estimate of θ is asymptotically normal and semiparametric efficient. It will be non-trivial to apply the technical results developed here to the OGP calibration approach, and asymptotic characterization of the corresponding full posterior distribution will be an interesting topic. Similar to the OGP calibration method, the Bayesian projected calibration also involves intractable integrals. Plumlee (2017) suggested that the intractable integrals can be numerically computed using Monte Carlo integration. However, this involves drawing N uniform samples from Ω, and N is typically much larger than n for accurate evaluation of these integrals, adding heavy computational burden for posterior inference. In particular, the numerical integration yields extra O(N ) operations. It is therefore desired that the computation barriers for the two approaches can be tackled via efficient algorithms. APPENDIX A Auxiliary Results In this section we list some auxiliary results that are used to prove theorem 2. The proofs of the lemmas stated in this section are deferred to the supplementary material. Before proceeding, we introduce some notions and definitions that are widely used in the study 21 of empirical processes. Suppose F is a function space equipped with metric d. Given two functions l, u ∈ F, a bracket [l, u] is a set of functions f such that l ≤ f ≤ u everywhere, and the size of the bracket is defined to be d(l, u). The -bracketing number of F with respect to the metric d, denoted by N[·] (, F, d), is the minimum number of brackets of size  that are needed to cover F. The bracketing integral J[·] (, F, d) is defined to be the integral of the logarithmic bracketing number as follows: Z p log N (δ, F, d)dδ. J[·] (, F, d) = 0 Suppose X is the space where random variables take values. Given a sequence (xi )ni=1 of independent and identically distributed random variables, the empirical measure and the empirical process of a function f : X → R, denoted by Pn f and Gn f , are defined by n 1X Pn f = f (xi ), n i=1 n 1 X Gn f = √ [f (xi ) − Ef (xi )], n i=1 respectively. For two variables a and b, we use a . b and a & b to denote the inequalities up to a universal multiplicative constant, and a  b if a . b and a & b. In the empirical processes theory, maximum inequalities are widely adopted to study the asymptotic behavior of nonparametric estimates. Here we cite one of them that is used in the proof of theorem 2 (see, for example, lemma 19.36 in van der Vaart, 2000). Theorem 3. Let (xi )ni=1 be independent and identically distributed according to a distribution Px over X , and let F be a class of measurable functions f : Y → R. If kf k2L2 (Px ) < δ 2 and kf k∞ ≤ M for all f ∈ F, where δ and M does not depend on F, then       M E sup |Gn f | . J[·] δ, F, k · kL2 (Px ) 1 + 2 √ J[·] δ, F, k · kL2 (Px ) . δ n f ∈F The following lemma is the modification of a standard probabilistic theorem for Gaussian processes. For the related literature, we refer to van der Vaart and van Zanten (2008) and Ghosal and van der Vaart (2017). Lemma 2. Suppose η is imposed the Matérn Gaussian process with roughness parameter α, and η0 ∈ Cα (Ω) ∩ Hα (Ω), where α > p/2. Let n = n−α/(2α+p) . Then there exists a 22 measurable set Bn in C(Ω) such that for sufficiently large n, the following hold: Π(Bn | Dn ) = 1 − oP0 (1), √ J[·] (n log n, Bn , k · kL2 (Ω) ) . (log n)2α/(2α+p) n2n . Now denote `n (η) = n X log pη (yi , xi ) = i=1 n X log Ψσ (yi − η(xi )) i=1 to be the log-likelihood function of η given the physical data (xi , yi )ni=1 . Define the event   An = kη − η0 kL2 (Ω) ≤ Mn n ∩ kη − η0 kL∞ (Ω) ≤ M ∩ Bn , where Mn = log n, M is given by theorem 1, and Bn is given by lemma 2. Then by theorem 1 and lemma 2 we know that Π(An | Dn ) = 1 − oP0 (1). Lemma 3. Suppose the conditions of theorem 2 hold. For each vector t ∈ Rq and each η ∈ F define 2σ 2 ∂y s ηt (x) = η(x) − √ tT V0−1 (x, θ0∗ ). ∂θ n Then it holds that  Z Z exp [`n (ηt ) − `n (η0 )] Π(dη) = [1 + oP0 (1)] exp [`n (η) − `n (η0 )] Π(dη) . An The asymptotic normality result of the L2 -projected calibration estimate θbL2 from Tuo √ and Wu (2015) is also useful to study the asymptotic behavior of Π( n(θη∗ − θbL2 ) ∈ · | Dn ). Theorem 4. Under the conditions of theorem 2, it holds that " n # X ∂y s 1 θbL2 − θ0∗ = 2V0−1 ei (xi , θ0∗ ) + oP0 (n−1/2 ). n i=1 ∂θ B Proof of Theorem 2  By theorem 1 and lemma 2 we know that Π(An | Dn ) = 1 − oP0 (1). Let Θn = θη∗ : η ∈ An . It follows directly that Π(θη∗ ∈ Θn | Dn ) = 1 − oP0 (1). Denote Π(θη∗ ∈ · | Dn , Θn ) = Π(θη∗ ∈ · ∩ Θn | Dn ) . Π(θη∗ ∈ Θn | Dn ) 23 Then we obtain √   b sup Π − θL2 ) ∈ A | Dn − N 0, 4σ 2 V0−1 WV0−1 A  √  √ n(θη∗ − θbL2 ) ∈ A | Dn − Π n(θη∗ − θbL2 ) ∈ A | Dn , Θn ≤ sup Π A  √  + sup Π n(θη∗ − θbL2 ) ∈ A | Dn , Θn − N 0, 4σ 2 V0−1 WV0−1 . n(θη∗ A √ Denote Bn (A) = {θη∗ : n(θη∗ − θbL2 ) ∈ A}. Since √  √  sup Π n(θη∗ − θbL2 ) ∈ A | Dn − Π n(θη∗ − θbL2 ) ∈ A | Dn , Θn A   Π θη∗ ∈ Bn (A) ∩ Θn | Dn ∗ = sup Π θη ∈ Bn (A) | Dn − Π(θη∗ ∈ Θn | Dn ) A    1 ∗ c ∗ c ≤ sup Π θη ∈ Bn (A) ∩ Θn | Dn + Π(θη ∈ Θn | Dn ) → 0, Π(θη∗ ∈ Θn | Dn ) A it suffices to show that  √  ∗ b n(θη − θL2 ) ∈ A | Dn , Θn − N 0, 4σ 2 V0−1 WV0−1 . sup Π A We prove the result by the method of moment generating function, namely, showing that for any fixed vector t ∈ Rq , it holds that   Z i h √   1 T ∗ 2 −1 −1 T b exp t n θη − θL2 Π(dη | Dn ) → exp t 4σ V0 WV0 t 2 An in P0 -probability. The rest part of the proof is completed by lemma 1 and lemma 2 in Castillo and Rousseau (2015b). Let n = n−α/(2α+p) . The left-hand side of the preceeding display can be re-written as  Z −1 Z h √   i ∗ T exp [`n (η) − `n (η0 )] Π(dη) exp t n θη − θbL2 + `n (η) − `n (η0 ) Π(dη) . An q For the vector t ∈ R , define 2σ 2 T −1 ∂y s ηt (x) = η(x) − √ t V0 (x, θ0∗ ), ∂θ n and for each η, define the remainder Rn (η, η0 ) = n n kη − η0 k2L2 (Ω) − Pn (η − η0 )2 . 2 2 24 Then simple algebra shows [`n (ηt ) − `n (η0 )] − [`n (η) − `n (η0 )] n  n  2 X T −1 ∂y s 2 2 (xi , θ0∗ ) = − 2 kηt − η0 kL2 (Ω) − kη − η0 kL2 (Ω) − √ ei t V0 2σ ∂θ n i=1 1 [Rn (ηt , η0 ) − Rn (η, η0 )] σ2 Z  √ ∂y s 1 (x, θ0∗ )dx − tT 4σ 2 V0−1 WV0−1 t = 2 n [η(x) − η0 (x)]tT V0−1 ∂θ 2 Ω n s 2 X T −1 ∂y 1 −√ ei t V0 (xi , θ0∗ ) + 2 [Rn (ηt , η0 ) − Rn (η, η0 )]. ∂θ σ n i=1 + Denote the remainder of the Taylor expansion of θη∗ at θ0∗ by Z s ∗ ∗ −1 ∂y (x, θ0∗ )dx. r(η, η0 ) = θη − θ0 − 2 [η(x) − η0 (x)]V0 ∂θ Ω Then by theorem 4 we have  √  ∗ T b t n θη − θL2 + `n (η) − `n (η0 ) √ n 2 X T −1 ∂y s √ ei t V0 (xi , θ0∗ ) + oP0 (1) + `n (η) − `n (η0 ) =t n − − ∂θ n i=1 Z  √ √ ∂y s (x, θ0∗ )dx = tT n θη∗ − θ0∗ + oP0 (1) − 2 n [η(x) − η0 (x)]tT V0−1 ∂θ Ω  1 T 1 + t 4σ 2 V0−1 WV0−1 t − 2 [Rn (ηt , η0 ) − Rn (η, η0 )] + `n (ηt ) − `n (η0 ) 2 σ  √ 1 T 1 = t 4σ 2 V0−1 WV0−1 t + ntT r(η, η0 ) + 2 [Rn (η, η0 ) − Rn (ηt , η0 )] 2 σ T θη∗ θ0∗  + `n (ηt ) − `n (η0 ) + oP0 (1). Now set Mn = log n. By lemma 1 we see that sup η∈An √ √ 2 −2α/(2α+p) ntT r(η, η0 ) ≤ L(2) . Mn2 n(p/2−α)/(2α+p) = o(1). η0 ktk nMn n In addition, simple algebra and the law of large numbers imply that Rn (η, η0 ) − Rn (ηt , η0 )  2  n  s 2σ 4 X T −1 ∂y s 2 T −1 ∂y ∗ 4 T −1 −1 ∗ = t V0 (xi , θ0 ) − 2σ t V0 WV0 t − 2σ Gn (η − η0 )(·)t V0 (·, θ0 ) n i=1 ∂θ ∂θ 25   s T −1 ∂y ∗ = −2σ Gn (η − η0 )(·)t V0 (·, θ0 ) + oP0 (1). ∂θ 2 We now claim that sup |Rn (η, η0 ) − Rn (ηt , η0 )| = oP0 (1). η∈An Since over An , we know that kη − η0 kL2 (Ω) ≤ Mn n , kη − η0 kL∞ (Ω) ≤ M , and by lemma 2 it holds that √ √ J[·] (Mn n , An , k · kL∞ (Ω) ) . Mn2α/(2α+p) n2n = (log n)2α/(2α+p) n2n , it follows by the maximal inequality for empirical process (theorem 3) that    s T −1 ∂y ∗ E0 sup Gn (η − η0 )(·)t V0 (·, θ0 ) ∂θ η∈An   J[·] (Mn n , An , k · kL2 (Ω) ) √ . J[·] (Mn n , An , k · kL2 (Ω) ) 1 + M Mn2 2n n # " 2α/(2α+p) √ 2 √ 2 nn Mn 2α/(2α+p) √ . Mn nn 1 + Mn2 n2n √ . Mn n2n = o(1), and hence, it holds that supη∈An |Rn (η, η0 ) − Rn (ηt , η0 )| = oP0 (1). Therefore by applying lemma 3 we obtain Z h √   i exp tT n θη∗ − θbL2 + `n (η) − `n (η0 ) Π(dη) An Z   1 T 2 −1 −1 exp [`n (ηt ) − `n (η0 )] Π(dη) = exp t 4σ V0 WV0 t + oP0 (1) 2 An   Z  1 T 2 −1 −1 = exp t 4σ V0 WV0 t + oP0 (1) [1 + oP0 (1)] exp [`n (η) − `n (η0 )] Π(dη) 2  Z    1 T 2 −1 −1 exp[`n (η) − `n (η0 )]Π(dη). = exp t 4σ V0 WV0 t + oP0 (1) 2 The proof is thus completed. 26 References Bayarri, M. J., Berger, J. O., Paulo, R., Sacks, J., Cafeo, J. A., Cavendish, J., Lin, C.H., and Tu, J. (2007). A framework for validation of computer models. Technometrics, 49(2):138–154. Bickel, P. and Kleijn, B. (2012). The semiparametric Bernstein-von Mises theorem. The Annals of Statistics, 40(1):206–237. Brynjarsdóttir, J. and OHagan, A. (2014). Learning about physical parameters: The importance of model discrepancy. Inverse Problems, 30(11):114007. Castillo, I. (2012). A semiparametric Bernstein–von Mises theorem for Gaussian process priors. Probability Theory and Related Fields, 152(1):53–99. Castillo, I. and Rousseau, J. (2015a). A Bernstein-von Mises theorem for smooth functionals in semiparametric models. The Annals of Statistics, 43(6):2353–2383. Castillo, I. and Rousseau, J. (2015b). Supplement to “A Bernstein-von Mises theorem for smooth functionals in semiparametric models”. Chang, C.-J. and Joseph, V. R. (2014). Model calibration through minimal adjustments. Technometrics, 56(4):474–482. Clancy, C. E. and Rudy, Y. (1999). Linking a genetic defect to its cellular phenotype in a cardiac arrhythmia. Nature, 400(6744):566–569. Edmunds, D. E. and Triebel, H. (2008). Function spaces, entropy numbers, differential operators, volume 120. Cambridge University Press. Fang, K.-T., Li, R., and Sudjianto, A. (2005). Design and modeling for computer experiments. CRC Press. Ghosal, S. and van der Vaart, A. (2017). Fundamentals of nonparametric Bayesian inference, volume 44. Cambridge University Press. 27 Gu, M., Palomo, J., and Berger, J. O. (2018a). RobustGaSP: Robust Gaussian stochastic process emulation in R. arXiv preprint arXiv:1801.01874. Gu, M. and Wang, L. (2017). An improved approach to bayesian computer model calibration and prediction. arXiv preprint arXiv:1707.08215. Gu, M., Wang, X., and Berger, J. O. (2018b). Robust gaussian stochastic process emulation. The Annals of Statistics, In Press. Higdon, D., Kennedy, M., Cavendish, J. C., Cafeo, J. A., and Ryne, R. D. (2004). Combining field data and computer simulations for calibration and prediction. SIAM Journal on Scientific Computing, 26(2):448–466. Hoffman, A. J. and Wielandt, H. W. (2003). The variation of the spectrum of a normal matrix. In Selected Papers Of Alan J Hoffman: With Commentary, pages 118–120. World Scientific. Joseph, V. R. and Melkote, S. N. (2009). Statistical adjustments to engineering models. Journal of Quality Technology, 41(4):362. Kennedy, M. C. and O’Hagan, A. (2001). Bayesian calibration of computer models. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 63(3):425–464. Plumlee, M. (2017). Bayesian calibration of inexact computer models. Journal of the American Statistical Association, 112(519):1274–1285. Plumlee, M., Joseph, V. R., and Yang, H. (2016). Calibrating functional parameters in the ion channel models of cardiac cells. Journal of the American Statistical Association, 111(514):500–509. Qian, P. Z. and Wu, C. F. J. (2008). Bayesian hierarchical modeling for integrating lowaccuracy and high-accuracy experiments. Technometrics, 50(2):192–204. Rasmussen, C. E. and Williams, C. K. (2006). Gaussian processes for machine learning, volume 1. MIT press Cambridge. 28 Santner, T. J., Williams, B. J., and Notz, W. I. (2013). The design and analysis of computer experiments. Springer Science & Business Media. Sheridan, M., Bloebaum, C., Kesavadas, T., Patra, A., and Winer, E. (2002). Visualization and communication in risk management of landslides. WIT Transactions on Modelling and Simulation, 31. Stone, C. J. (1982). Optimal global rates of convergence for nonparametric regression. The Annals of Statistics, pages 1040–1053. Storlie, C. B., Lane, W. A., Ryan, E. M., Gattiker, J. R., and Higdon, D. M. (2015). Calibration of computational models with categorical parameters and correlated outputs via Bayesian smoothing spline ANOVA. Journal of the American Statistical Association, 110(509):68–82. Tuo, R. (2017). Adjustments to computer models via projected kernel calibration. arXiv preprint arXiv:1705.03422. Tuo, R. and Wu, C. F. J. (2015). Efficient calibration for imperfect computer models. The Annals of Statistics, 43(6):2331–2352. Tuo, R. and Wu, C. F. J. (2016). A theoretical framework for calibration in computer models: parametrization, estimation and convergence properties. SIAM/ASA Journal on Uncertainty Quantification, 4(1):767–795. van der Vaart, A. and Wellner, J. (1996). Weak Convergence and Empirical Processes: With Applications to Statistics. Springer Science & Business Media. van der Vaart, A. and Zanten, H. v. (2011). Information rates of nonparametric gaussian process methods. Journal of Machine Learning Research, 12(Jun):2095–2119. van der Vaart, A. W. (2000). Asymptotic statistics, volume 3. Cambridge university press. van der Vaart, A. W. and van Zanten, J. H. (2008). Rates of contraction of posterior distributions based on gaussian process priors. The Annals of Statistics, pages 1435–1463. 29 Wahba, G. (1990). Spline models for observational data. SIAM. Wang, S., Chen, W., and Tsui, K.-L. (2009). Bayesian validation of computer models. Technometrics, 51(4):439–451. Wendland, H. (2004). Scattered data approximation, volume 17. Cambridge university press. Wong, R. K., Storlie, C. B., and Lee, T. (2017). A frequentist approach to computer model calibration. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 79(2):635–648. Xie, F., Jin, W., and Xu, Y. (2017). A theoretical framework for Bayesian nonpara- metric regression: Orthonormal random series and rates of contraction. arXiv preprint arXiv:1712.05731. Xiu, D. (2010). Numerical methods for stochastic computations: a spectral method approach. Princeton university press. 30 Supplementary Material for “Bayesian Projected Calibration of Computer Models” A Proof of theorem 1 We first present a classic result regarding convergence rate of the Matérn Gaussian process regression from van der Vaart and Zanten (2011). Theorem A.1. Suppose η is imposed the Matérn Gaussian process with roughness parameter α, and η0 ∈ Cα (Ω) ∩ Hα (Ω), where α > p/2. Then there exists some constant C > 0, such that Z E0   kη − η0 k2L2 (Ω) Π(dη | Dn )  ≤ Cn−2α/(2α+p) . (A.1) Ω The first assertion follows immediately from the Markov’s inequality:   E0 Π kη − η0 kL2 (Ω) > Mn n−α/(2α+p) | Dn  Z   1 2 kη − η0 kL2 (Ω) Π(dη | Dn ) ≤ 2 −2α/(2α+p) E0 Mn n Ω C ≤ 2 → 0. Mn The posterior distribution of η can be expressed by "Z n # "Z n #−1 Y pη (yi , xi ) Y pη (yi , xi ) Π(η ∈ U | Dn ) = Π(dη) Π(dη) , p (y , x ) 0 i i U i=1 p0 (yi , xi ) i=1 where p0 (yi , xi ) = Ψσ (yi − η0 (xi )) is the density of the true distribution. To prove the second assertion, we need the following result from Xie et al. (2017) to bound the denominator of the preceeding display. Lemma A.1. Assume the conditions of theorem 1 hold. For any D > 0, define the event (Z n    ) Y pη (yi , xi ) 1 Hn = Π(dη) ≥ Π(kη − η0 kL∞ (Ω) < n ) exp − D + 2 n2n . p (y , x ) σ 0 i i i=1 2 c Suppose (n )∞ n=1 is a sequence such that nn → ∞ and n → 0. Then P0 (Hn ) → 0. Since α > p/2, we can some positive β such that β ∈ (max{α, p/2}, α). Define n = n−β/(2β+p) . Since the Matérn Gaussian process assigns prior probability one to the space 31 Cβ (Ω) (see, for example, section 3.1 in van der Vaart and Zanten, 2011), then the Gaussian process prior on η can be regarded as a mean-zero Gaussian random element in the Banach space Cβ (Ω) equipped with the β-Hölder norm k · kCβ (Ω) . Therefore by the Borell’s inequality (see, for example, Ghosal and van der Vaart, 2017) it holds that 1/2 ! Z 2 ≤ 2e−2x . Π kηkCβ (Ω) > 4x kηk2Cβ (Ω) Π(dη) (A.2) for any positive x. By lemma 15 in van der Vaart and Zanten (2011) there exists a constant M̃ > 0 such that p/(2β+p) kf kL∞ (Ω) ≤ M̃ kf kCβ (Ω) 2β/(2β+p) kf kL2 (Ω) for any function f ∈ Cβ (Ω). Let s > 0 be a constant determined later. Then (  kη − η0 kL2 (Ω) ≤ Mn n−α/(2α+p) ∩ kηkCβ (Ω) √ ≤ 4s nn Z kηk2Cβ (Ω) Π(dη) 1/2 ) n o p/(2β+p) ⊂ kη − η0 kL∞ (Ω) ≤ M̃ kη − η0 kCβ (Ω) Mn2β/(2β+p) n−(2αβ)/[(2α+p)(2β+p)] ( Z 1/2 ) √ ∩ kηkCβ (Ω) ≤ 4s nn kηk2Cβ (Ω) Π(dη) n p/(2β+p) 2β/(2β+p) −2αβ/[(2α+p)(2β+p)] o ⊂ kη − η0 kL∞ (Ω) ≤ M̃ kηkCβ (Ω) + kη0 kCβ (Ω) Mn n ) ( 1/2 Z √ 2 kηkCβ (Ω) Π(dη) ∩ kηkCβ (Ω) ≤ 4s nn n ⊂ kη − η0 kL∞ (Ω) ≤ 2 2 M1 Mn2β/(2β+p) n−2αβ/[(2α+p)(2β+p)] np /[2(2β+p) ] o for some constant M1 > 0 depending on η0 only when n is sufficiently large. Noticing that −α/(2α + p) < −β/(2β + p), then taking Mn = log n yields n o 2 2 kη − η0 kL∞ (Ω) ≤ M1 Mn2β/(2β+p) n−2αβ/[(2α+p)(2β+p)] np /[2(2β+p) ] n o 2β/(2β+p) −(2β 2 −p2 /2)/(2β+p)2 ⊂ kη − η0 kL∞ (Ω) ≤ M1 (log n) n  ⊂ kη − η0 kL∞ (Ω) ≤ M for some constant M > 0, where the fact β > p/2 is applied. Since by the first assertion Π(kη −η0 kL2 (Ω) ≤ Mn n−α/(2α+p) | Dn ) = 1−oP0 (1), it suffices to show that E0 [Π(Un | Dn )] → 32 0, where Un is the event ( Un = √ Z kηkCβ (Ω) > 4s nn 1/2 ) kηk2Cβ (Ω) Π(dη) . Let Hn be defined as in lemma A.1 with the constant D be determined later. Then P0 (Hnc ) → 0, and we directly compute by Fubini’s theorem E0 [Π (Un | Dn )] ≤ E0 [1(Hn )Π (Un | Dn )] + P0 (Hnc )  #−1 "Z # "Z n n   Y pη (yi , xi ) Y pη (yi , xi ) Π(dη) Π(dη) + o(1) = E0 1(Hn )   p (y , xi ) Un i=1 p0 (yi , xi ) i=1 0 i " n # Z Y pη (yi , xi ) exp[(D + 1/σ 2 )n2n ] ≤ E0 Π(dη) + o(1) Π(kη − η0 kL∞ (Ω) < n ) Un p (y , x ) 0 i i i=1 exp[(D + 1/σ 2 )n2n ]Π(Un ) + o(1). ≤ Π(kη − η0 kL∞ (Ω) < n ) By lemma 3 and lemma 4 in van der Vaart and Zanten (2011) we know that   Π(kη − η0 kL∞ (Ω) ≤ n ) ≥ exp −C−p/α ≥ exp −Cnpβ/[α(2β+p)] . n for some constant C > 0. Now take D = 1/(2σ 2 ), s = 1/σ, and we conclude   3 2 pβ/[α(2β+p)] Π(Un ) + o(1) E0 {Π(Un | Dn )} ≤ exp n + Cn 2σ 2 n   3 2 2 2 (pβ/[α(2β+p)] ≤ 2 exp n + Cn − 2 nn + o(1) → 0, 2σ 2 n σ where the last inequality is due to (A.2) and the fact β < α is applied. B Proof of Lemma 1 Recall that θη∗ = arg minθ∈Θ kη(·) − y s (·, θ)k2L2 (Ω) . Since by condition A4 it is permitted to interchange the differentiation with respect to θ and the integral, it follows that Z  ∂y s  ∂ s 2 kη(·) − y (·, θ)kL2 (Ω) = −2 η(x) − y s (x, θη∗ ) (x, θη∗ )dx. 0= ∂θ ∂θ Ω θ=θη∗ Now define the function F : F × Θ → Rq by Z ∂y s s F(η, θ) = −2 [η(x) − y (x, θ)] (x, θ)dx. ∂θ Ω 33 It follows immediately that F(η, θη∗ ) = 0. The partial derivative of F with respect to θ is given by ∂ F(η, θ) = Fθ (η, θ) := ∂θ Z  Ω  ∂2 s 2 [η(x) − y (x, θ)] dx, ∂θ∂θ T and the partial Fréchet derivative of F with respect to η is a function Fη : F → Rq given by Z ∂y s [Fη (η, θ)](h) = −2 h(x) (x, θ)dx, ∂θ Ω since F is linear with respect to η. Therefore by the implicit function theorem on Banach space, there exists some  > 0 such that over {η ∈ F : kη − η0 kL2 (Ω) < }, the functional θη∗ : η 7→ arg minθ∈Θ kη(·) − y s (·, θ)k2L2 (Ω) is continuous, the Fréchet derivative θ̇η∗ : F → Rq for θη∗ exists, and can be computed by θ̇η∗ (h) =−  −1 Fθ (η, θη∗ )  Fη (η, θη∗ )  (h) = 2Vη−1 Z h(x) Ω ∂y s (x, θη∗ )dx. ∂θ Therefore we obtain by the fundamental theorem of calculus and the mean-value theorem that θη∗ − θ0∗ Z 1 d ∗ θη[u] du 0 du   Z 1 d ∗ θ̇η[u] = η[u] du du 0 Z 1 Z ∂y s −1 ∗ (x, θη[u] )dxdu =2 Vη[u] [η(x) − η0 (x)] ∂θ 0 Ω Z s −1 ∂y ∗ = 2 [η(x) − η0 (x)]Vη[u (x, θη[u 0 ] )dx, 0] ∂θ Ω = where η[u] = η0 + (η − η0 )u for 0 ≤ u ≤ 1 and u0 ∈ [0, 1]. By condition A3, we know that the smallest eigenvalue λmin (Vη ) of Vη is strictly positive in an L2 -neighborhood of η0 , and we can without loss of generality require that inf kη−η0 kL2 (Ω) ≤ λmin (Vη ) > 0. Hence we proceed by condition A4 and Jensen’s inequality that kθη∗ − θ0∗ k ≤2 sup kη−η0 kL2 (Ω) ≤ Vη−1 sup (x,θ)∈Ω×Θ −1  ≤2 ∂y s (x, θ) ∂θ inf kη−η0 kL2 (Ω) ≤ λmin (Vη ) sup (x,θ)∈Ω×Θ = L(1) η0 kη − η0 kL2 (Ω) 34 Z |η(x) − η0 (x)|dx Ω ∂y s (x, θ) ∂θ Z 2 [η(x) − η0 (x)] dx Ω 1/2 (1) for some constant Lη0 > 0 depending on η0 only. We now analyze the property of Vη as a functional {η ∈ F : kη − η0 kL2 (Ω) < } →∈ Rq×q , η 7→ Vη . For a matrix A ∈ Rq×q , denote [A]ij to be the (i, j)-th element of A. Directly compute  s s ∂y s ∂y s ∗ ∂y ∗ ∗ ∂y ∗ =2 (x, θη ) (x, θη ) − (x, θ0 ) (x, θ0 ) dx ∂θk ∂θj ∂θk Ω ∂θj  2 s  Z  ∂ y ∂ 2ys s ∗ ∗ ∗ [η(x) − y (x, θη )] (x, θη ) − (x, θ0 ) dx −2 ∂θj ∂θk ∂θj ∂θk Ω  Z  ∂ 2ys s ∗ s ∗ ∗ (x, θ0 ) dx −2 [η(x) − η0 (x) + y (x, θ0 ) − y (x, θη )] ∂θj ∂θk Ω Z  [Vη ]jk − [V0 ]jk := 2V1 − 2V2 − 2V3 . For V1 , by condition A4 we know that ∂y s /∂θ is Lipschitz continuous on Ω×Θ, and therefore Z ∂y s ∂y s ∂y s |V1 | ≤ (x, θη∗ ) (x, θη∗ ) − (x, θ0∗ ) dx ∂θk ∂θk Ω ∂θj Z s s ∂y ∂y ∂y s (x, θη∗ ) − (x, θ0∗ ) (x, θ0∗ ) dx + ∂θ ∂θ ∂θ j j k Ω " # s s s ∂y s ∂y ∂y ∂y ∂y s (x, θ) ≤ sup (·, θη∗ ) − (·, θ0∗ ) + (·, θη∗ ) − (·, θ0∗ ) ∂θ ∂θ ∂θ ∂θ ∂θ k k j j (x,θ)∈Ω×Θ L1 (Ω) L1 (Ω) ≤2 sup (x,θ)∈Ω×Θ ∂y s (x, θ) ∂θ sup (x,θ)∈Ω×Θ ∂ 2ys (x, θ) kθη∗ − θ0∗ k ∂θ∂θ T . kη − η0 kL2 (Ω) . Condition A4 also implies that ∂ 2 y s /(∂θj ∂θk ) is Lipschitz continuous on Ω × Θ. Hence Z |V2 | . [|η(x) − η0 (x)| + |η0 (x) − y s (x, θη∗ )]kθη∗ − θ0∗ kdx Ω ≤ L(1) η0 kη  Z 1/2 Z 2 s ∗ 2 − η0 kL2 (Ω) 2 [η(x) − η0 (x)] dx + 2 [η0 (x) − y (x, θη )] dx Ω Ω  1/2 (1) 2 2 s 2 ≤ Lη0 kη − η0 kL2 (Ω) 2 + 4kη0 kL2 (Ω) + 4 sup ky (·, θ)kL2 (Ω) θ∈Θ . L(1) η0 kη − η0 kL2 (Ω) . Now we consider V3 : |V3 | ≤ sup (x,θ)∈Ω×Θ ∂ 2ys ∂θj ∂θk Z [|η(x) − η0 (x)| + |y s (x, θ0 ) − y s (x, θη∗ )|]dx Ω 35 ≤ sup (x,θ)∈Ω×Θ ≤ sup (x,θ)∈Ω×Θ ∂ 2ys ∂θj ∂θk " ∂ 2ys ∂θj ∂θk " kη − η0 kL2 (Ω) + sup (x,θ)∈Ω×Θ 1+ sup (x,θ)∈Ω×Θ ∂y s (x, θ) kθη∗ − θ0∗ kdx ∂θ # # ∂y s (x, θ) L(1) kη − η0 kL2 (Ω) . η0 ∂θ We conclude that |[Vη ]jk − [V0 ]jk | ≤ Cη0 kη − η0 kL2 (Ω) for all j, k = 1, . . . , q for some constant Cη0 > 0 depending on η0 only. By the fact that q X |λj (A) − λj (B)| ≤ kA − Bk2F j=1 holds for any positive definite matrices A, B ∈ Rq×q (see, for example, Hoffman and Wielandt, 2003), we obtain |λmin (Vη ) − λmin (V0 )| ≤ kVη − V0 k2F = q q X X |[Vη ]jk − [V0 ]jk |2 ≤ q 2 Cη20 kη − η0 k2L2 (Ω) . j=1 k=1 We may also assume without loss of generality that  is sufficiently small such that |λmin (Vη )− λmin (V0 )| ≤ λmin (V0 )/2 whenever kη − η0 kL2 (Ω) ≤ , in which case it holds that kVη−1 k ≥ 2kV0−1 k. Hence Vη−1 − V0−1 = V0−1 (V0 − Vη )Vη−1 ≤ V0−1 kkV0 − Vη kkVη−1 ≤ 2 V0−1 2 kVη − V0 kF ≤ 2qCη0 V0−1 kη − η0 kL2 (Ω) whenever kη − η0 kL2 (Ω) < . Hence Z ∂y s ∗ ∗ r(η, η0 ) = θη − θ0 − 2 [η(x) − η0 (x)]V0−1 (x, θ0∗ )dx ∂θ Ω   Z s s −1 ∂y −1 ∂y ∗ ∗ = 2 [η(x) − η0 (x)] Vη[u0 ] (x, θη[u0 ] ) − V0 (x, θ0 ) dx ∂θ ∂θ Ω   Z s −1 ∗ −1 ∂y = 2 [η(x) − η0 (x)] (Vη[u0 ] − V0 ) (x, θη[u0 ] ) dx ∂θ Ω  s  Z ∂y s −1 ∂y ∗ ∗ + 2 [η(x) − η0 (x)]V0 (x, θη[u0 ] ) − (x, θ0 ) dx, ∂θ ∂θ Ω 36 and hence, " Z |η(x) − η0 (x)| kr(η, η0 )k ≤ 2 Ω −1 −1 Vη[u 0 ] − V0 ∂y s (x, θ) ∂θ sup (x,θ)∈Ω×Θ # dx   ∂y s ∂y s −1 ∗ ∗ + 2 |η(x) − η0 (x)| kV0 k (x, θη[u0 ] ) − (x, θ0 ) dx ∂θ ∂θ Ω Z . kη − η0 kL2 (Ω) q 2 Cη20 kV0−1 kkη − η0 kL2 (Ω) + kV0−1 kkη − η0 k2L2 (Ω) , (2) (2) implying that kr(η, η0 )k ≤ Lη0 kη − η0 k2L2 (Ω) for some constant Lη0 depending on η0 only. The proof is thus completed. C Proof of Lemma 2 Before proceeding, we introduce the notion of covering number for a metric space (X, d). The -covering number of (X, d) for  > 0, is the smallest number of -balls (with respect to the metric d) that are needed to cover X. Since η is imposed the Matérn Gaussian process with roughness parameter α, it follows that the concentration function ϕη0 () = 1 kηk2H − log Π(kηkL∞ (Ω) < ) η∈H:kη−η0 kL∞ (Ω) ≤ 2 inf satisfies ϕη0 () ≤ C−p/α for some constant C > 0 for sufficiently small  > 0. Then by theorem 2.1 in van der Vaart and van Zanten (2008), it holds that Π(kη − η0 kL∞ (Ω) < n ) ≥ exp(−C 2 n2n ), (C.1) where n = n−α/(2α+p) . Pick β > 0 such that β ∈ (max{α, p/2}, α). Then we know that the Matérn Gaussian process GP(0, Ψα ) assigns prior probability one to Cβ (Ω). Now set Bn = n C1β (Ω) + mn H1Ψα (Ω), where  C1β (Ω) = f ∈ Cβ (Ω) : kf kCα (Ω) ≤ 1 ,  H1Ψα (Ω) = f ∈ HΨα (Ω) : kf kHΨα (Ω) ≤ 1 , mn is some sequence determined later, and HΨα (Ω) is the reproducing kernel Hilbert space (abbreviated as RKHS) associated with the Matérn covariance function Ψα . Denote Φ to be the cumulative distribution function of the standard normal distribution and set mn = 37 −2Φ−1 (exp[−(2C + 1/σ 2 )n2n ]). Since η ∼ GP(0, Ψα ) can be viewed as a Gaussian random element in the Banach space Cβ (Ω) with the norm k · kCβ (Ω) , then by the Borell’s inequality (van der Vaart and van Zanten, 2008) we have   Π(Bn ) ≥ Φ Φ−1 exp −Cn2n + mn        1 2 −1 −1 2 exp − 2C + 2 nn exp −Cnn − 2Φ =Φ Φ σ       1 ≥ Φ −Φ−1 exp − 2C + 2 n2n σ     1 2 = 1 − exp − 2C + 2 nn . σ Hence Π(η ∈ Bnc )     1 2 ≤ exp − 2C + 2 nn . σ (C.2) Now we prove the first inequality using (C.1) and (C.2). Let Hn be defined as in lemma A.1. Denote Mn = log n. Then E0 [Π(Bnc | Dn )] ≤ E0 [1(Hn )Π(Bnc | Dn )] + P0 (Hnc )  #−1 "Z # "Z n n   Y Y pη (yi , xi ) pη (yi , xi ) + o(1) Π(dη) Π(dη) = E0 1(Hn )   p0 (yi , xi ) p0 (yi , xi ) c Bn i=1 i=1 exp[(D + σ −2 )n2n ] Π(Bnc ) + o(1) Π(kη − η0 kL∞ (Ω) < n )      1 1 2 2 2 ≤ exp D + 2 nn + Cnn − 2C + 2 nn + o(1) σ σ   ≤ exp (D − C) n2n + o(1). ≤ Hence taking D = C/2 yields E0 [Π(Bnc | Dn )] → 0. Finally we prove the second inequality involving the bracketing integral. Since HΨα (Ω) is the RKHS of the Matérn covariance function with roughness parameter α, then HΨα (Ω) coincides with the Sobolev space Hα+p/2 (Ω) (see, for example, corollary 1 of Tuo and Wu, 2016). The logarithm of the covering number of ρH1Ψα (Ω) is bounded by (Edmunds and Triebel, 2008)   ρ 2p/(2α+p) log N , ρH1Ψα (Ω), k · kL∞ (Ω) .  38 for sufficiently small  > 0. The metric entropy for the α-Hölder space n C1α (Ω) is also known in the literature (see, for example, van der Vaart and Wellner, 1996):   n p/β log N , n C1β (Ω), k · kL∞ (Ω) . .  Hence for sufficiently small  > 0, log N (, Bn , k · kL∞ (Ω) ) .  m 2p/(2α+p) n  +   p/β n  , and it follows by simple algebra that Z Mn n q  J[·] (Mn n , Bn , k · kL2 (Ω) ) ≤ log N , Bn , k · kL∞ (Ω) d 0 . mp/(2α+p) (Mn n )2α/(2α+p) + p/2β (Mn n )(2β−p)/(2β) n n √  Mn2α/(2α+p) n2n + Mn(2β−p)/(2β) n √ . Mn2α/(2α+p) n2n for sufficiently large n. D Proof of Lemma 3 Before proceeding, we establish the following fact: if (Wn )∞ n=1 is a sequence of event such that Π(Wn | Dn ) = oP0 (1), then Z Z exp(`n (η) − `n (η0 ))Π(dη) = Π(Wn | Dn ) exp(`n (η) − `n (η0 ))Π(dη) Wn = oP0 (Dn ), (D.1) where Z Dn := exp(`n (η) − `n (η0 ))Π(dη). Recall that the RKHS HΨα (Ω) of the Matérn Gaussian process with roughness parameter α > p/2 coincides with the Sobolev space Hα+p/2 (Ω) (Wendland, 2004; Tuo and Wu, 2016), and the RKHS norm k · kHΨα (Ω) is equivalent to the Sobolev norm k · kHα+p/2 (Ω) . Given a realization η of the Matérn Gaussian process GP(0, Ψα ), define the following isometry 39 associated to η: U : H0 = (K X ) ak Ψ(·, tk ) : tk ∈ Ω, ak ∈ R, K ∈ N+ → L2 (P0 ), k=1 K X ak Ψ(·, tk ) 7→ k=1 K X ak η(tk ), k=1 and extend U from H0 to H0 = HΨα (Ω) continuously. Then under the prior distribution Π,  for any h ∈ HΨα (Ω), U (h) ∼ N 0, khkHΨα (Ω) . Hence by lemma 17 in Castillo (2012), for any measurable function T : C(Ω) → R, any g, h ∈ HΨα (Ω), and any ρ > 0, EΠ [1{|U (g)| ≤ ρ}Ψ(η − h)]      1 2 = EΠ 1 U (g) + hg, hiHΨα (Ω) ≤ ρ T (η) exp U (−h) − khkHΨα (Ω) . 2 (D.2) Let n = n−α/(2α+p) . Denote A1n = {kη − η0 kL2 (Ω) ≤ Mn n }, A2n = {kη − η0 kL∞ (Ω) ≤ M }, and take 2σ 2 ∂y s ∂y s (x, θ0∗ ), h(x) = √ tT V0−1 (x, θ0∗ ), ∂θ ∂θ n  √ Cn = |U (g)| ≤ L nn kgkHΨ (Ω) , g(x) = 2σ 2 tT V0−1 where L is some constant to be specified later. Since U (g/kgkHΨα (Ω) ) follows the standar normal distribution under the prior, it follows that for sufficiently large L,       √ g L 2 c > L nn ≤ 2 exp − nn . Π(Cn ) = Π U kgkHΨα (Ω) 2 Then by the proof of lemma 2, we know that Π(Cnc | Dn ) = oP0 (1) by taking a sufficiently large L. Furthermore, we know that hg, hiHΨα (Ω) ∂y s 4σ 4 (·, θ0∗ ) = √ tT V0−1 ∂θ n 4 q 2 HΨα (Ω) X 4σ ∂y s = √ kV0−1 tk2 sup (·, θ) ∂θ n θ∈Θ j j=1 2 √ = o( nn ), HΨα (Ω) which implies that for sufficiently large n,   √ √ |U (g)| ≤ (L/2) nn kgkHΨα (Ω) ⊂ U (g) + hg, hiHΨα (Ω) ≤ L nn kgkHΨα (Ω)  √ ⊂ |U (g)| ≤ 2L nn kgkHΨα (Ω) . 40 (D.3) On the other hand, khkL2 (Ω) ∂y s 2qσ 2 −1 ≤ √ kV0 tk max sup (·, θ) j=1,··· ,q θ∈Θ ∂θj n = o(n ), L2 (Ω) implying that  A1n = kηt − η0 + hkL2 (Ω) ≤ Mn n  ⊂ kηt − η0 kL2 (Ω) ≤ Mn n + khkL2 (Ω)  ⊂ kηt − η0 kL2 (Ω) ≤ 2Mn n := Au1n (t) (D.4) for sufficiently large n, where the fact n−1/2 ≤ n is applied. Similarly, for sufficiently large n it holds that A1n ⊃ {kηt − η0 kL2 (Ω) ≤ Mn n /2} := Al1n (t). (D.5) R Hence we can bound An exp(`n (ηt ) − `n (η0 ))Π(dη) from above as follows: Z exp(`n (ηt ) − `n (η0 ))Π(dη) An Z = 1(Cn ) exp(`n (ηt ) − `n (η0 ))Π(dη) + oP0 (Dn ) An Z  √ ≤ 1 |U (g)| ≤ L nn kgkHΨα (Ω) 1(Au1n (t)) exp(`n (ηt ) − `n (η0 ))Π(dη) + oP0 (Dn ). The first term in the preceeding display can be further upper bounded using the change of measure formula (D.2), (D.3), and (D.4): Z  √ 1 |U (g)| ≤ L nn kgkHΨα (Ω) 1(Au1n (t)) exp(`n (ηt ) − `n (η0 ))Π(dη) Z  √ ≤ 1 U (g) + hg, hiHΨα (Ω) ≤ L nn kgkHΨα (Ω) 1(kη − η0 kL2 (Ω) ≤ 2Mn n ) # " 2 2σ 4 T −1 ∂y s Π(dη) × exp(`n (η) − `n (η0 )) exp U (−h) − t V0 (·, θ0∗ ) n ∂θ HΨα (Ω) Z  √ ≤ 1 |U (g)| ≤ 2L nn kgkHΨα (Ω) 1(kη − η0 kL2 (Ω) ≤ 2Mn n )    g × exp(`n (η) − `n (η0 )) exp U − √ Π(dη) n Z  ≤ exp(`n (η) − `n (η0 )) exp 2Ln kgkHΨα (Ω) Π(dη) {kη−η0 kL2 (Ω) ≤2Mn n } 41 Z ≤ [1 + o(1)] exp(`n (η) − `n (η0 ))Π(dη). Therefore we conclude that Z Z exp(`n (ηt ) − `n (η0 ))Π(dη) ≤ [1 + o(1)] exp(`n (η) − `n (η0 ))Π(dη) + oP0 (Dn ) An Z = [1 + oP0 (1)] exp(`n (η) − `n (η0 ))Π(dη). (D.6) R On the other hand, we need to bound An exp(`n (ηt ) − `n (η0 ))Π(dη) from below: Z exp(`n (ηt ) − `n (η0 ))Π(dη) An Z ≥ 1(Cn ) exp(`n (ηt ) − `n (η0 ))Π(dη) An Z = 1(Cn ) exp(`n (ηt ) − `n (η0 ))Π(dη) A1n Z − 1(Ac2n ∪ Bnc )1(Cn ) exp(`n (ηt ) − `n (η0 ))Π(dη) Z A1n = 1(Cn ) exp(`n (ηt ) − `n (η0 ))Π(dη) − oP0 (Dn ) A1n Z  √ ≥ 1 |U (g)| ≤ L nn kgkHΨ (Ω) 1(Al1n (t)) exp(`n (ηt ) − `n (η0 ))Π(dη) − oP0 (Dn ). We lower bound the first term in the preceeding display using (D.2), (D.3), and (D.5): Z  √ 1 |U (g)| ≤ L nn kgkHΨα (Ω) 1(Al1n (t)) exp(`n (ηt ) − `n (η0 ))Π(dη) Z   √ = 1 U (g) + hg, hiHΨα (Ω) ≤ L nn kgkHΨα (Ω) 1 kη − η0 kL2 (Ω) ≤ Mn n /2 "  #  2 2σ 2 T −1 ∂y s g × exp(`n (η) − `n (η0 )) exp U − √ − t V0 (·, θ0∗ ) Π(dη) n ∂θ n HΨα (Ω) Z   √ ≥ 1 |U (g)| ≤ (L/2) nn kgkHΨα (Ω) 1 kη − η0 kL2 (Ω) ≤ Mn n /2   1 × exp(`n (η) − `n (η0 )) exp − √ |U (g)| [1 − o(1)]Π(dη) n Z   √ ≥ [1 − o(1)] 1 |U (g)| ≤ (L/2) nn kgkHΨα (Ω) 1 kη − η0 kL2 (Ω) ≤ Mn n /2 × exp(`n (η) − `n (η0 ))Π(dη). Since Π(kη − η0 kL2 (Ω) > Mn n /2 | Dn ) = oP0 (1), and for sufficiently large L, Π(|U (g)| > 42 √ (L/2) nn kgkHΨ (Ω) | Dn ) = oP0 (1), the last display can be further computed Z   √ 1 |U (g)| ≤ (L/2) nn kgkHΨα (Ω) 1 kη − η0 kL2 (Ω) ≤ Mn n /2 exp(`n (η) − `n (η0 ))Π(dη) Z Z ≥ exp(`n (η) − `n (η0 ))Π(dη) − n o exp(`n (η) − `n (η0 ))Π(dη) √ |U (g)|>(L/2) nn kgkHΨ α (Ω) Z − {kη−η0 kL2 (Ω) >Mn n /2} exp(`n (η) − `n (η0 ))Π(dη) Z = exp(`n (η) − `n (η0 ))Π(dη) − oP0 (Dn ). Hence we conclude that Z Z exp(`n (η) − `n (η0 ))Π(dη) ≥ [1 − o(1)] exp(`n (η) − `n (η0 ))Π(dη) − oP0 (Dn ) An Z = [1 − oP0 (1)] exp(`n (η) − `n (η0 ))Π(dη). (D.7) The proof is completed by combining (D.6) and (D.7). 43
10math.ST
HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS ASSOCIATED WITH DISCRETE SUBGROUPS OF SEMISIMPLE LIE GROUPS arXiv:1607.07830v1 [math.GR] 26 Jul 2016 ADRIEN BOYER Abstract. We prove that the Harish-Chandra–Schwartz space associated with a discrete subgroup of a semisimple Lie group is a dense subalgebra of the reduced C ∗ algebra of the discrete subgroup. Then, we prove that for the reduced C ∗ -norm is controlled by the norm of the Harish-Chandra–Schwartz space. This inequality is weaker than property RD and holds for any discrete group acting isometrically, properly on a Riemannian symmetric space. 1. Introduction A length function on a locally compact group G is a measurable function L : G → R∗+ satisfying L(e) = 0 where e is the neutral element of the group, L(g −1 ) = L(g) and L(gh) ≤ L(g) + L(h) for all g, h in G. Define the Sobolev norm of parameter d > 0 as 1 Z 2 2 2d |f (g)| (1 + L(g)) dg kf kH d (G) := L G where f is in Cc (G) the space of complex-valued continuous functions on G with compact support and dg a (left) Haar measure on G. The Sobolev space associated with G denoted by HLd (G) is the completion of Cc (G) with respect to k · kH d (G) . L A locally compact group G has property RD (rapid decay) with respect to L if there exists d > 0 such that HLd (G) convolves L2 (G) in L2 (G) in the following manner: there exists C > 0 such that for all compactly supported functions f in Cc (G), we have (1) kλG (f )kop ≤ Ckf kH d (G) , L where λG denotes the left regular representation of G, namely λG (f )v = f ∗ v where f in Cc (G), where v ∈ L2 (G) and k · kop denotes the operator norm. Notice that kλG (f )kop is nothing but kf kCr∗ (G) i.e. the norm of f in the reduced C ∗ -algebra of G denoted by Cr∗ (G). For an introduction to property RD we refer to the recent and exhaustive survey of Chatterji [8] and to the survey of Sapir [26] for different methods of proving or disproving property RD. The semisimple Lie groups satisfy property RD and this fact could be traced back to the work of Herz [17] (of course he did not use this terminology) and it is essentially based 2010 Mathematics Subject Classification. Primary 46H15, 43A90, 22E40; Secondary 22D20, 22D25, 46L80. Key words and phrases. Harish-Chandra–Schwartz’s spaces, semisimple Lie groups, Harish-Chandra functions, Furstenberg boundary, property RD, K-theory, Baum-Connes conjecture. This work is supported by ERC Grant 306706. 1 HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS 2 on the estimates of the Harish-Chandra function [5]. This suggests that the essence of property RD is in harmonic analysis. For a characterization of Lie groups having property RD we refer to [11]. As for discrete groups, it has been first established for the free groups by Haagerup in [16]. The terminology Property RD has been introduced and studied as such by Jolissaint in [18], who notably established it for groups of polynomial growth and some hyperbolic gloups although the general case of hyperbolic groups is due to de la Harpe [13]. In [19], Jolissaint showed in particular that the space of rapidly decreasing functions associated with a discrete group Γ endowed with a length function L, namely the space ∩d>0 HLd (Γ), is a dense subalgebra of Cr∗ (Γ) and the inclusion induces isomorphisms in topological K-theory. The first example of higher rank discrete groups having property RD is due to Ramagge, Robertson and Steger [24]. Then, Lafforgue, inspired by the methods of [24], proved that cocompact lattices in SL3 (R) and SL3 (C) satisfy property RD. Note that Lafforgue proved in [22] that for d large enough, the Sobolev space HLd (Γ) associated with any discrete group Γ is a dense Banach subalgebra of Cr∗ (Γ) and the inclusion induces isomorphisms in topological K-theory. For examples of other groups satisfying property RD we refer to [1], [2], [9], [10], [14]. This property also plays a crucial role in the proof of the Novikov conjecture for hyperbolic groups by Connes and Moscovici in [12], and Lafforgue used it to prove BaumConnes conjecture for some groups having property (T). The major problem related to property RD is the Valette conjecture: Conjecture 1.1. (The Valette conjecture) Property RD holds for any discrete group acting isometrically, properly and cocompactly either on a Riemannian symmetric space or on an affine building. This problem in this generality is considered very difficult. In this paper we restrict our attention to discrete subgroups of semisimple Lie groups. We investigate another inequality involving convolutor norm of finitely supported functions and the decay of the Harish-Chandra function. Let G be a (non compact) connected semisimple real Lie group with finite center. Let g be its Lie algebra. Let θ be a Cartan involution. Define the bilinear form denoted: for p all X, Y ∈ g, hX, Y i = −B(X, θ(Y )) where B is the Killing form. Set |X| = hX, Xi. Write g = l ⊕ p the eigenvector space decomposition associated to θ (l for the eigenvalue 1). Let K be the compact subgroup defined as the connected subgroup whose Lie algebra l is the set of fixed points of θ. Fix a ⊂ p a maximal abelian subalgebra of p. Consider the root system Σ associated to a and let Σ+ be the set of positive roots, and define the corresponding positive Weyl chamber as  a+ := H ∈ a such that α(H) > 0, ∀α ∈ Σ+ . Let A+ = exp(a+ ) be the closure of exp(a+ ). Consider the corresponding Cartan decomposition KA+ K, with the Cartan projection H : g ∈ G 7→ H(g) ∈ a+ . From now on let L be the length function L(g) = L(keH(g) k′ ) := |H(g)| where g = keH(g) k′ with eH(g) ∈ A+ and k, k′ ∈ K. Notice that L is K bi-invariant. HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS 3 Let (G/P, ν) be the Furstenberg boundary where P denotes a minimal parabolic subgroup of G and ν denotes the unique K-invariant probability measure which is Gquasi-invariant. Then consider the Harish-Chandra function  1 Z dg∗ ν 2 (b)dν(b) ∈ R+ . Ξ : g ∈ G 7→ dν G/P Define now the Harish-Chandra–Schwartz norm associated with a subgroup H of G as kf kS d (H) := sup L g∈H |f (g)|(1 + L(g))d , Ξ(g) where f is in Cc (H). The Harish-Chandra–Schwartz space associated with H denoted by SLd (H) is defined as the completion of Cc (H) with respect to the norm k · kS d (H) . L It is a well known fact that for G there exist C, d > 0 so that for all f in Cc (G) the following inequality holds: kλG (f )kop ≤ Ckf kS d (G) , (2) L and we refer to [23, Chapitre 4] for proofs. The aim of this note is to give a proof of the following result. Theorem 1.2. Let Γ be a discrete group of a connected real semisimple Lie group. Then there exist d > 0 and C > 0 such that (1) SLd (Γ) is a Banach convolution algebra. (2) kλΓ (f )kop ≤ Ckf kS d (Γ) for all f ∈ SLd (Γ). L In particular SLd (Γ) is a dense subalgebra of Cr∗ (Γ). Note that this algebra has already been studied in the context of hyperbolic groups and rank one semisimple Lie groups in [7]. Property RD and Inequality (2). One of the fundamental properties of the HarishChandra function is the following integrability condition Z Ξ2 (g) dg < ∞, 2d G (1 + L(g)) for d > 0 large enough depending on G, see Subsection 2.2 for more details. Moreover, it is still true that for any discrete group Γ in the ambient semisimple Lie group G we have for all d > 0 large enough X Ξ2 (γ) < ∞, (1 + L(γ))2d Γ see [6, Proposition 3.1] for further details. In the context of semisimple Lie groups it is clear that there exist d, d′ and C > 0 such that kf kH d ≤ Ckf kS d′ for either f in Cc (G) L L or in Cc (Γ) of a discrete subgroup Γ of G. Hence Inequality (1), namely Property RD, implies Inequality (2) for G and its discrete subgroups. The converse is wrong since all non-uniform lattices satisfy Inequality (2) whereas they cannot satisfy property RD. HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS 4 The Baum-Connes conjecture and the work of V. Lafforgue. We freely rely on [28] where the reader could consult for further details about property RD, its connection with K-theory and the Baum-Connes conjecture. We refer also to the Bourbaki seminar of Skandalis [27] for a summary of the work of Lafforgue. Let Γ be a countable group. The Baum-Connes conjecture identifies two objects associated with Γ, one analytical and one geometrical/topological. The right-hand side of the conjecture, or analytical side, involves the K-theory of Cr∗ (Γ). The K-theory used here denoted by Ki (Cr∗ (Γ)) for i = 0, 1; is the usual topological K-theory for Banach algebras. The left-hand side of the conjecture, or geometrical/topological side, is the Γequivariant K-homology with Γ- compact supports of the classifying space EΓ for proper actions of Γ. The link between both sides of the conjecture is provided by the analytic assembly map, or index map or Baum-Connes map which is a well-defined group homomorphism: µΓi : RKiΓ (EΓ) → K i (Cr∗ (Γ)). (3) The definition of the assembly map can be traced back to [20] and to [3]. Conjecture 1.3. (The Baum-Connes conjecture) For i = 0, 1 the assembly map µΓi is an isomorphism. In the important paper [23] of Lafforgue, containing breakthrough ideas about the Baum-Connes conjecture, a Banach algebra AΓ is an unconditional completion of the group algebra CΓ if it contains CΓ as a dense subalgebra and if, for f1 , f2 in CΓ such that |f1 (γ)| ≤ |f2 (γ)| for all γ in Γ, we have kf1 kAΓ ≤ kf2 kAΓ . If AΓ is an unconditional completion one may define an assembly map µAΓ : RKiΓ (EΓ) → K i (AΓ). i (4) In the proof of Lafforgue of the Baum-Connes conjecture for discrete groups having property (T), one of the fundamental step is the following: Theorem 1.4. (V. Lafforgue) If Γ is a group acting properly isometrically either on a simply connected complete Riemannian manifold with non-positive curvature, bounded from below, or on a Euclidean building then for i = 0, 1 the map µAΓ : RKiΓ (EΓ) → K i (AΓ) is an isomorphism. i Since the Harish-Chandra–Schwartz algebras are unconditional completions, we obtain as an immediate corollary: Corollary 1.5. If Γ is a discrete subgroup of G then for i = 0, 1 there exists d > 0 such S d (Γ) that the map µi L : RKiΓ (EΓ) → K i (SLd (Γ)) is an isomorphism. After having observed that the assembly maps µΓi and µAΓ are compatible, it remains i to determine when one can find an embedding AΓ ֒→ Cr∗ (Γ) that induces an isomorphism of K-theory of Ki (AΓ) and Ki (Cr∗ (Γ)). It turns out that if a discrete group Γ satisfies property RD the inclusion of the unconditionnal algebra HLd (Γ) for d large enough induces isomorphism in topological K-theory and enables Lafforgue to prove the HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS 5 Baum-Connes conjecture for discrete group having property RD, as the cocompact lattices in rank one semisimple Lie group and in SL3 (k) where k is a local field. Unfortunately, the Harish-Chandra–Schwartz algebra is not stable by holomorphic functional calculus and does not automatically induce isomorphism in topological K-theory. Consider an element γ in Γ so that lim L(γ n )/n → 0. It is clear that the unit Dirac mass centered at γ does not have the same spectral radius in Cr∗ (Γ) and in SLd (Γ). Nevertheless, it might be true that the embedding SLd (Γ) ֒→ Cr∗ (Γ), for d large enough, induces isomorphism of K-theory of Ki (SLd (Γ)) and Ki (Cr∗ (Γ)). It is probably worth noting that in some cases it is true (e.g. uniform lattices in SL(3, R)), thanks to Lafforgue’s work, and this is equivalent to the Baum-Connes conjecture. Structure of the paper. In Section 2 we recall some standard facts about the quasiregular representation, the Harish-Chandra function and we state a lemma due to Shalom. In Section 3 we prove several elementary inequalities. Finally in Section 4 we give the proof of Theorem 1.2. Acknowledgements. I am grateful to Nigel Higson who suggested that I investigate the structure of convolution algebra of Harish-Chandra–Schwartz’s spaces of discrete groups and for helpful discussions concerning the work of Vincent Lafforgue and the BaumConnes conjecture. I would like to thank Vincent Lafforgue for fruitful discussions and for pointing out that these algebras are not stable by holomorphic functional calculus. Finally, I thank Vladimir Finkelshtein for helpful comments on this paper. 2. Preliminaries: Quasi-regular representation, the Harish-Chandra function and Shalom’s lemma 2.1. Quasi-regular representation. A connected semisimple real Lie group with finite center can be written G = KP , where K is a compact connected subgroup and P is a minimal parabolic subgroup. We denote by ∆P the right-modular function of P . The map ∆P extends to ∆ : G → R∗+ by ∆(g) = ∆(kp) := ∆P (p). It is well defined because K ∩ P is compact (observe that ∆P |K∩P = 1). The quotient G/P , called the Furstenberg boundary, carries a unique quasi-invariant probability measure ν which is K-invariant, such that the Radon-Nikodym derivative at (g, b) ∈ G × G/P denoted by c(g, b) = ∆(gb) dg∗ ν (b) = , dν ∆(b) ∗ where g∗ ν(A) = ν(g −1 A) (notice that for all g ∈ G, the function b ∈ G/P 7→ ∆(gb) ∆(b) ∈ R+ is well defined). We refer to [4, Appendix B, Lemma B.1.3, p. 344-345] for more details. Let L2 (G/P, ν) the Hilbert space endowed with its inner product denoted by h·, ·i and consider the quasi-regular representation πν : G → U (L2 (G/P, ν)) associated to P , defined by (5) 1 (πν (g)ξ)(b) = c(g, b) 2 ξ(g−1 b). Denote by dk the Haar measure on K, and under the identification G/P = K/(K ∩ P ), denote by d[k] the measure ν on G/P . HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS 6 Let Γ be a discrete subgroup of a semisimple Lie group G. In this note we consider the following unitary representation of Γ (6) πν : γ ∈ Γ 7→ πν (γ) ∈ U (L2 (G/P, ν)), which is nothing but the restriction of the quasi-regular representation πν of G to Γ. Observe that if L2+ (G/P ) denotes the cone of positive functions observe that πν (g)L2+ (G/P ) ⊂ L2+ (G/P ) for all g in G. 2.2. The Harish-Chandra function. The well-known Harish-Chandra function can also be defined as (7) Ξ : g ∈ G 7→ πν (g)1G/P , 1G/P ∈ R+ , where 1G/P denotes the characteristic function of the space G/P . Observe that Ξ is bi-K-invariant and so Ξ(g) = Ξ(eH(g) ) and Ξ(g) = Ξ(g−1 ) for all g ∈ G. Let r be the number of indivisible positive roots in a. We know that there exists C > 0 such that for all H ∈ a where eH ∈ A+ we have r Ξ(eH ) ≤ Ce−ρ(H) 1 + L(eH ) , P with ρ = 12 α∈Σ+ nα α ∈ a+ , see [15, Chap 4, Theorem 4.6.4, p.161]. Hence for 2d > dim(a) + 2r, we set Z Ξ2 (eH ) (8) Cd := J(H)dH < ∞, H 2d a+ (1 + L(e )) where J denotes the density that occurs in the disintegration of the Haar measure on G according to the Cartan decomposition. More precisely the Haar measure dg can be written dg = dkJ(H)dHdk, where dk is the normalized Haar measure on K, dH the Lebesgue measure on a+ , and !n Y eα(H) − e−α(H) α , J(H) = 2 + α∈Σ where nα denotes the dimension of the root space associated to α. See [21, Chap.V, section 5, Proposition 5.28, p.141-142], [15, Chap. 2, §2.2, p.65] and [15, Chap 2, Proposition 2.4.6, p.73] for more details. 2.3. Shalom’s Lemma. The following lemma due to Shalom [26, Lemma 2.3] will be a tool to study convolution operator norm via the Furstenberg boundary in the semisimple Lie groups. Lemma 2.1. Let π : G → U (H) be a unitary representation of a locally compact group. Assume that there exists a non-zero positive vector ξ in the following sense: hπ(g)ξ, ξi ≥ 0 for all g ∈ G. Then for any bounded positive measure µ on G we have kλG (µ)k ≤ kπ(µ)k. It is obvious that 1G/P is a positive vector for πν . HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS 7 3. Elementary inequalities A function f : G → C is called L-radial if f (g) = f (g′ ) whenever g and g′ satisfy L(g) = L(g ′ ). Note that the space of L-radial compactly supported functions is identified by definition of L to the space of compactly supported bi-K-invariant functions denoted by Cc (K\G/K). The following proposition is based on standard facts in representation theory. Nevertheless, we give a proof for the convenience of the reader. In the following, we denote by h·, ·iL2 (G) the scalar product of L2 (G) with respect to the Haar measure. Proposition 3.1. For all ξ, η in L2 (G/P, ν) and f in Cc (K\G/K) we have Z G f (g)hπν (g)ξ, ηidg = hξ, 1G/P ih1G/P , ηihf, ΞiL2 (G) . In particular for all d satisfying 2d > dim(a) + 2r we have for all ξ, η in L2 (G/P, ν) and for all L-radial functions f in HLd (G) Z G f (g)hπν (g)ξ, ηidg ≤ Cd kf kH d kξk1 kηk1 . L Proof. Let ξ in L2 (G/P, ν) and observe that the function ξ K : x ∈ G/P 7→ C is constant. By integration we compute its value and we have R K ξ(k−1 x)dk ∈ ξ K = hξ, 1G/P i1G/P . Thus, for all functions f ∈ Cc (K\G/K) and for all vectors ξ, η ∈ L2 (G/P ) we have: Z G Z Z Z f (keH k′ )hπν (keH k′ )ξ, ηidkdk′ J(H)dH f (g)hπν (g)ξ, ηidg = K a+ K Z Z Z f (eH )hπν (eH )πν (k′ )ξ, πν (k−1 )ηidkdk′ J(H)dH = K a+ K   Z Z Z πν (k−1 )ηdk iJ(H)dH πν (k′ )ξdk , f (eH )hπν (eH ) = + K K Za f (eH )hπν (eH )ξ K , η K iJ(H)dH = a+ Z = hξ, 1G/P ihη, 1G/P i f (eH )hπν (eH )1G/P , 1G/P iJ(H)dH a+ = hξ, 1G/P ih1G/P , ηihf, ΞiL2 (G) . Then for all d satisfying 2d > dim(a) + 2r we have by taking the absolute value of the above expression HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS Z G f (g)hπν (g)ξ, ηidg = |hξ, 1G/P i||h1G/P , ηi| Ξ2 (eH ) J(H)dH H 2d a+ (1 + L(e )) = Cd kf kH d kξk1 kηk1 , ≤ kξk1 kηk1 Z Z 1  Z 8 f (eH )Ξ(eH )J(H)dH a+ 2 |f |2 (eH )(1 + L(eH ))2d J(H)dH a+ 1 2 L where Cd is the constant defined in (8) and where the last inequality follows from CauchySchwarz inequality. The proof is complete.  3.1. Stability. Let Γ be a discrete subgroup of G. A positive function g ∈ G 7→ f (g) ∈ R+ is stable on G relative to Γ if there exists a relatively compact neighborhood U of the neutral element e ∈ G and C > 0 such that f (γ) ≤ Cf (g) for all γ ∈ Γ and for all g in γU . The next lemma gives examples of interesting stable functions. Lemma 3.1. Let Γ be a discrete group in a semisimple Lie group G. Let d be a real number and consider the function on G defined as g ∈ G 7→ hπν (g)1G/P , ξi ∈ R+ , (1 + L(g))d with ξ ∈ L1+ (G/P, ν) a positive function. Then this function is stable on G relative to Γ. Proof. Observe that the triangle inequality implies for all γ ∈ Γ and x ∈ G 1 + L(x) 1 ≤ . 1 + L(γx) (1 + L(γ)) Then combine the above observation with [6, Lemma 3.8] to complete the proof.  The notion of stability introduced above enables us to discretize inequalities given by integrals on the ambient group to sums on discrete subgroups. More precisely we have the following proposition. Proposition 3.2. Let f be a positive L-radial function satisfying hf, ΞiL2 (G) < ∞ and assume that f is stable relative to Γ. Assume also that ξ is a positive vector in L1+ (G/P ). There exists a constant C > 0 such that X f (γ)hπν (γ)1G/P , ξi ≤ Chf, ΞiL2 (G) kξk1 . γ Proof. Since g 7→ hπν (g)1G/P , ξi is stable by Proposition 3.1, there exists U a neighbourhood of the identity e, small enough so that γU ∩ γ ′ U = ∅ for all γ 6= γ ′ ∈ Γ and a constant C > 0 such that for all γ in Γ and for all x in U we have hπν (γ)1G/P , ξi ≤ Chπν (γx)1G/P , ξi and f (γ) ≤ Cf (γx). HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS 9 It follows by integration that there exists C > 0 such that Z C f (γ)hπν (γ)1G/P , ξi ≤ f (γx)hπν (γx)1G/P , ξidx, Vol(U ) U where dx is the Haar measure. Hence, we have Z X C X f (γx)hπν (γx)1G/P , ξidx f (γ)hπν (γ)1G/P , ξi ≤ Vol(U ) γ∈Γ U γ∈Γ Z C X f (g)hπν (g)1G/P , ξidg = Vol(U ) γ∈Γ γU Z C ≤ f (g)hπ(g)1G/P , ξidg Vol(U ) G C hf, ΞiL2 (G) kξk1 , ≤ Vol(U ) where the last inequality follows from Proposition 3.1.  3.2. Inequalities. We start by stating and proving an elementary lemma using CauchySchwarz inequality. Lemma 3.2. For all ξ, η ∈ L2 (G/P, ν) we have:  1  1 2 2 2 −1 2 |hπν (g)ξ, ηi| ≤ hπν (g)1G/P , |η| i hπν (g )1G/P , |ξ| i . Proof. Since πν preserves the cone of positive functions, we may assume that ξ and η are in L2+ (G/P ). Then the Cauchy-Schwarz inequality implies !2 Z 1 hπν (g)ξ, ηi2 = ξ(g−1 x)c(g, x) 2 η(x)dν(x) G/P ≤ Z G/P  Z 1 ξ(g−1 x)2 c(g, x) 2 dν(x) G/P 2 πν (g)1G/P , η = πν (g)ξ , 1G/P = πν (g −1 )1G/P , ξ 2 2  1 c(g, x) 2 η(x)2 dν(x) πν (g)1G/P , η 2 .  4. Proofs Before proceeding to the proof of Theorem 1.2, let us define for all d > 0 the function φd as (9) φd : g ∈ G 7→ Ξ(g) ∈ R+ . (1 + L(g))d Observe that for all d > 0, the function φd is a bi-K-invariant function and observe that whenever 2d > dim(a) + 2r, we have (10) hφ2d , ΞiL2 (G) = Cd < +∞. HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS 10 Observe also that Proposition 3.1 implies that φd is stable on G relative to any discrete subgroup Γ of G. This function will play a major role in the proof. Proof of Item (1) of Theorem 1.2. Pick d > 0 such that 2d > dim(a) + 2r and let f1 , f2 be in SL2d (Γ). For all g ∈ Γ we have X |f1 ∗ f2 |(g) = f1 (γ)f2 (γ −1 g) γ∈Γ ≤ kf1 kS 2d (Γ) kf2 kS 2d (Γ) L L X γ∈Γ Ξ(γ) Ξ(γ −1 g) . 2d (1 + L(γ)) (1 + L(γ −1 g))2d Write now X Ξ(γ −1 g) Ξ(γ) = (1 + L(γ))2d (1 + L(γ −1 g))2d γ∈Γ X n γ|L(γ)≤ L(g) 2 Ξ(γ −1 g) Ξ(γ) + o (1 + L(γ))2d (1 + L(γ −1 g))2d n γ|L(γ)> L(g) 2 −1 g) ≥ Observe that L(γ) ≤ L(g) 2 ⇒ L(γ We have for the first term: X Ξ(γ −1 g) Ξ(γ) o n γ|L(γ)≤ L(g) 2 X Ξ(γ −1 g) Ξ(γ) . o (1 + L(γ))2d (1 + L(γ −1 g))2d L(g) 2 . (1 + L(γ))2d (1 + L(γ −1 g))2d ≤ ≤ 22d (1 + L(g))2d X n γ|L(γ)≤ L(g) 2 Ξ(γ)Ξ(γ −1 g) o (1 + L(γ))2d X Ξ(γ)Ξ(γ −1 g) 22d (1 + L(g))2d (1 + L(γ))2d γ∈Γ = with ξ := πν (g)1G/P ∈ L2 (G/P, ν). We have for the second term: X Ξ(γ −1 g) Ξ(γ) o n γ|L(γ)> L(g) 2 (1 + L(γ))2d (1 + L(γ −1 g))2d ≤ ≤ 22d (1 + L(g))2d 22d (1 + L(g))2d X φ2d (γ)hπν (γ)1G/P , ξi, γ∈Γ X n γ|L(γ)> L(g) 2 Ξ(γ)Ξ(γ −1 g) o (1 + L(γ −1 g))2d X Ξ(γ)Ξ(γ −1 g) 22d (1 + L(g))2d (1 + L(γ −1 g))2d γ∈Γ = = 22d (1 + L(g))2d X Ξ(gγ −1 )Ξ(γ) γ∈Γ (1 + L(γ))2d X 22d φ2d (γ)hπν (γ)1G/P , ηi 2d (1 + L(g)) γ∈Γ HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS 11 where the first equality comes from the change of variable γ ′ = γ −1 g and where η := πν (g−1 )1G/P ∈ L2 (G/P, ν). Since φd is a stable bi-K-invariant function, Proposition 3.2 combined with the fact kπν (g)1G/P k1 = Ξ(g) = kπν (g−1 )1G/P k1 imply for the first term that there exists C > 0 so that for all g ∈ Γ X n γ|L(γ)≤ Ξ(γ) 22d Ξ(γ −1 g) ≤ C C Ξ(g). 2d d (1 + L(g)) o (1 + L(γ))2d (1 + L(γ −1 g))2d L(g) 2 A similar inequality holds for the second term. Therefore there exist d, C > 0 such that for all g ∈ Γ Ξ(g) , |f1 ∗ f2 |(g) ≤ C × Cd kf1 kS 2d (Γ) kf2 kS 2d (Γ) L L (1 + L(g))2d hence kf1 ∗ f2 kS 2d (Γ) ≤ C × Cd kf1 kS 2d (Γ) kf2 kS 2d (Γ) L L L and the proof is complete.  Proof of Item (2) of Theorem 1.2. It is enough to prove that there exist C, d > 0 so that for all finitely supported positive functions f on Γ kλΓ (f )k ≤ Ckf kS d (Γ) . L By Shalom’s Lemma 2.1 it is sufficient to prove that there exist C, d > 0 so that for all finitely supported positive functions f on Γ kπν (f )k ≤ Ckf kS d (Γ) . L Fix d > 0 such that 2d > dim(a) + 2r and let f be a positive function in SL2d (Γ). We have for all positive vectors ξ ∈ L1+ (G/P, ν) X f (γ)hπν (γ)1G/P , ξi ≤ kf kS 2d (Γ) L γ X γ Ξ(γ) hπν (γ)1G/P , ξi. (1 + L(γ))2d Notice also that the change of variable γ ′ = γ −1 combined with the symmetry properties of Ξ and L imply X f (γ)hπν (γ −1 )1G/P , ξi ≤ kf kS 2d (Γ) L γ X γ Ξ(γ) hπν (γ)1G/P , ξi. (1 + L(γ))2d Therefore Proposition 3.2 implies that there exist d, C > 0 such that for all f ∈ SL2d (Γ) and for all positive vectors ξ ∈ L1+ (G/P, ν) X (11) f (γ)hπν (γ)1G/P , ξi ≤ C × Cd kf kS 2d (Γ) kξk1 . γ L HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS 12 We have for all ξ and η in L2 (G/P ) X |hπν (f )ξ, ηi| ≤ |f (γ)|hπν (γ)|ξ|, |η|i γ∈Γ ≤ X γ∈Γ ≤ 1 1 |f (γ)| hπν (γ)1G/P , |η|2 i 2 hπν (γ −1 )1G/P , |ξ|2 i 2 X γ∈Γ 1 1  X 2 2 −1 2 |f (γ)|hπν (γ )1G/P , |ξ| i , |f (γ)|hπν (γ)1G/P , |η| i 2 γ∈Γ where the second inequality follows from Lemma 3.2 and the last inequality follows from Cauchy-Schwarz inequality. Then Equation (11) implies the existence of C > 0 such that 1 1 |hπν (f )ξ, ηi| ≤ (Ckf kS 2d (Γ) Cd kξk22 ) 2 (Ckf kS 2d (Γ) Cd kηk22 ) 2 L L = C × Cd kf kS 2d (Γ) kξk2 kηk2 . L By the definition of k · kop we have fund d, C > 0 such that for all finitely supported functions f on Γ we have kπν (f )k ≤ Ckf kS d (Γ) , L and the proof is done.  References [1] S. Barré; M. Pichot, The 4-string braid group B4 has property RD and exponential mesoscopic rank. Bull. Soc. Math. France 139 (2011), no. 4, 479-502. [2] S. Barré; M. Pichot, La propriété de décroissance rapide pour le groupe de Wise. (French) [The rapid decay property for the Wise group] Ann. Inst. Fourier (Grenoble) 65 (2015), no. 2, 709-724. [3] P. Baum, A. Connes, N. Higson, Classifying space for proper actions and K-theory of group C∗ algebras. C∗ -algebras: 1943-1993 (San Antonio, TX, 1993), 240-291, Contemp. Math., 167, Amer. Math. Soc., Providence, RI, 1994. [4] B. Bekka, P. de la Harpe, and A. Valette, Kazhdan’s property (T), New Mathematical Monographs, vol. 11, Cambridge University Press, Cambridge, 2008. [5] A. Boyer, Semisimple Lie groups satisfy property RD, a short proof. C. R. Math. Acad. Sci. Paris 351 (2013), no. 9-10, 335-338. [6] A. Boyer, Quasi-regular representations and property RD, Potential Anal. 44 (2016), no. 2, 355-372. [7] A. Boyer, On the square root of Poisson kernel in δ-hyperbolic spaces and some aspects of boundary representations., preprint, arXiv:1505.00739. [8] I. Chatterji, Introduction to the Rapid Decay property, preprint, arXiv:1604.06387. [9] I. Chatterji, Property (RD) for cocompact lattices in a finite product of rank one Lie groups with some rank two Lie groups. Geom. Dedicata 96 (2003), 161-177. [10] I. Chatterji, K. Ruane, Some geometric groups with rapid decay. Geom. Funct. Anal. 15 (2005), no. 2, 311-339. [11] I. Chatterji, C. Pittet, and L. Saloff-Coste, Connected Lie groups and property RD, Duke Math. J. 137 (2007), no. 3, 511-536. [12] A. Connes; H. Moscovici, Cyclic cohomology, the Novikov conjecture and hyperbolic groups. Topology 29 (1990), no. 3, 345-388. [13] P. de la Harpe, Groupes hyperboliques, algbres d’oprateurs et un thorme de Jolissaint. (French) [Hyperbolic groups, operator algebras and Jolissaint’s theorem] C. R. Acad. Sci. Paris Sr. I Math. 307 (1988), no. 14, 771-774. HARISH-CHANDRA–SCHWARTZ’S ALGEBRAS 13 [14] C. Drutu; M. Sapir, Relatively hyperbolic groups with rapid decay property. Int. Math. Res. Not. 2005, no. 19, 1181-1194. [15] R. Gangolli, V.S. Varadarajan, Harmonic Analysis of Spherical Functions on Real Reductive Groups, Springer-Verlag, New-York, 1988. [16] U. Haagerup, An example of a nonnuclear C*-algebra which has the metric approximation property, Invent. Math. 50 (1978/79), no. 3, 279-293. [17] C. Herz, Sur le phénomène de Kunze-Stein, C. R. Acad. Sci. Paris Sr. A-B 271 (1970), A491-A493. [18] P. Jolissaint, Rapidly decreasing functions in reduced C*-algebras of groups, Trans. Amer. Math. Soc. 317 (1990), no. 1, 167-196. [19] P. Jolissaint, K-theory of reduced C∗ -algebras and rapidly decreasing functions on groups. K-Theory 2 (1989), no. 6, 723-735. [20] G. G. Kasparov, Index of invariant elliptic operators, K-theory and representations of Lie groups. (Russian) Dokl. Akad. Nauk SSSR 268 (1983), no. 3, 533-537. [21] A-W. Knapp, Representation theory of semisimple groups, Princeton landmarks in mathematics, 2001. [22] V. Lafforgue, A proof of property (RD) for cocompact lattices of SL(3,R) and SL(3,C). J. Lie Theory 10 (2000), no. 2, 255-267. [23] V. Lafforgue, K-théorie bivariante pour les algèbres de Banach et conjecture de Baum-Connes, Invent. Math. 149 (2002), no. 1, 1-95 (French). [24] J. Ramagge; G. Robertson; T. Steger, A Haagerup inequality for Ã1 × Ã1 and Ã2 buildings. Geom. Funct. Anal. 8 (1998), no. 4, 702-731. [25] M. Sapir, The rapid decay property and centroids in groups. J. Topol. Anal. 7 (2015), no. 3, 513-541. [26] Y. Shalom, Rigidity, unitary representations of semisimple groups, and fundamental groups of manifolds with rank one transformation group, Ann. of Math. (2) 152 (2000), no. 1, 113-182. [27] G. Skandalis, Progrès récents sur la conjecture de Baum-Connes. Contribution de Vincent Lafforgue. (French) [Recent progress on the Baum-Connes conjecture: the contribution of Vincent Lafforgue] Séminaire Bourbaki, Vol. 1999/2000. Astérisque No. 276 (2002), 105-135. [28] A. Valette, Introduction to the Baum-Connes conjecture, Lectures in Mathematics ETH Zurich. Birkhauser Verlag, Basel, (2002). Weizmann Institute of Science, Rehovot, Israel E-mail address: [email protected]
4math.GR
1 Maximizing the Link Throughput between Smart meters and Aggregators as Secondary arXiv:1506.04830v3 [cs.SY] 16 Feb 2016 Users under Power and Outage Constraints Pedro H. J. Nardelli, Mauricio de Castro Tomé, Hirley Alves, Carlos H. M. de Lima and Matti Latva-aho Abstract This paper assesses the communication link from smart meters to aggregators as (unlicensed) secondary users that transmit their data over the (licensed) primary uplink channel. The proposed scenario assumes: (i) meters’ and aggregators’ positions are fixed so highly directional antennas are employed, (ii) secondary users transmit with limited power in relation to the primary, (iii) meters’ transmissions are coordinated to avoid packet collisions, and (iv) the secondary links’ robustness is guaranteed by an outage constraint. Under these assumptions, the interference caused by secondary users in both primary (base-stations) and other secondary users can be neglected. As unlicensed users, however, meter-aggregator links do experience interference from the mobile users of the primary network, whose positions and traffic activity are unknown. To cope with this uncertainty, we model the mobile users spatial distribution as a Poisson point process. We then derive a closed-form solution for the maximum achievable throughput with respect to a reference secondary link subject to transmit power and outage constraints. Our numerical results illustrate the effects of such constraints on the optimal throughput, evincing that more frequent outage events improve the system performance in the scenario under study. We also show that relatively high outage probabilities have little effect on the reconstruction of the average power demand curve that is transmitted from the smart meter to the aggregator. Index Terms cognitive network, Poisson point process, smart grid communication, spectrum sharing P. H. J. Nardelli, M. C. Tomé, H. Alves and M. Latva-aho are with the Centre for Wireless Communications (CWC), University of Oulu, Finland. Contact: [email protected]. C. H. M. de Lima is with São Paulo State University (UNESP), São João da Boa Vista, Brazil. This work is partly funded by Finnish Academy and CNPq/Brazil (n.490235/2012-3) as part of the joint project SUSTAIN, by Strategic Research Council/Aka BC-DC project (n.292854), and by the European Commission through the P2P-SmarTest project (n.646469). 2 I. I NTRODUCTION Over the last few years, cognitive radios have appeared as the solution for more effective use of the frequency spectrum [1], [2]. Following the concept proposed by Haykin [3], the radio nodes should understand their environment to establish a wireless network “(...) with two primary objectives in mind: highly reliable communication whenever and wherever needed; efficient utilization of the radio spectrum.” Owing to their cognitive ability, radios would be then capable of sensing the environment to decide on their transmission. An interesting approach to the cognitive radio concept is the so-called spectrum sharing [4], where unlicensed – secondary – users want to transmit some information without disturbing the licensed – primary – users over the same frequency band. Secondary users then need to sense the spectrum usage to decide about their transmissions. The transmission occurs if the channel is sensed free, which depends on the primary user activity [5]. Otherwise, the secondary user either searches for a different band or postpones its transmission. Although the basic idea is simple, both analysis and implementation are challenging due to interactive dynamics of the decision-making procedures [6]. The solution gets even harder when we consider different possible applications and their specific requirements, yielding no universal solution [7]. Notwithstanding, the idea of spectrum sharing is now widespread in both new generations of cellular system (allowing for co-existence of macro- and small-cells as in [8]) and different sensor applications (e.g. [9]–[11]). In this paper, we focus on the specific application of spectrum sharing in the deployment of part of the communication network in the modern electric power grids [12], [13] – the socalled smart grids. As one would expect, the different applications of the electric power grid have different requirements from the communication network perspective [14]. For instance, control operations in the high-voltage grid must be close to real-time (scale of milliseconds) so the communication link must have both extremely low latency and very high reliability (greater than 99.9%). In contrast, remote reading of meters would allow for less stringent communication requirements (latency of minutes and a reliability of 98%). As a consequence, the communication network design should be fine-tuned with the specific power grid application and its needs. An informative survey about the different applications and requirements is found in [15]. 3 Looking specifically at how to implement cognitive radio for smart grid applications, the authors in [16] presented an interesting hardware study case using software defined radio in a micro-grid testbed. In [17], a Lyapunov-drift framework was proposed to differentiate traffic priorities and then use the cognitive radio strategy called “dynamic spectrum access” to improve the communications in smart grids. Additionally, [18] provides a recent survey on how to combine cognitive radio approach into smart grid scenarios. In our case, references [19] and [20] introduce the idea of employing a spectrum sharing scheme within households where home appliances use unlicensed channel bands to build a home area network (HAN). In neighborhood area networks (NANs), different scenarios may be considered for the smart meters: (i) licensed users within the cellular systems directly connected with the distribution operator [21], (ii) users of unlicensed bands of unused TV frequencies (TV white spaces) [22], (iii) secondary users of licensed band [19], [20] and (iv) hybrid licensedunlicensed users [20]. When using solutions (i) and (iv), the smart grid elements are subscribers (licensed users) of cellular networks. In this case, although quality of service shall be guaranteed, they may involve prohibitive high costs and a dramatic increase in data traffic [21], making them not so attractive for electricity providers if compared to (ii) and (iii). And yet, the latter solutions will have a strong dependence on specific country legislation. Despite such drawbacks, these solutions are interesting and related to ours. We believe, however, that the analysis provided by the aforementioned works are focused on network-layer considerations without a dedicated performance study involving specific topological considerations as node positions and mobility. Herein, we attempt to cope with such limitations by studying a novel application of spectrum sharing technique for distribution grids considering that some elements are fixed and others are mobile. In specific terms, a spectrum sharing scheme (e.g [4]) will be assumed such that secondary users transmit in the up-link channel of the cellular system. As meters and aggregators are generally static nodes, their communication link may be built using directional antennas (e.g. [23]) while respecting a transmit power constraint. In this way, the harmful effects caused by the secondary user transmissions on the primary users, as well as on other secondary users, due to co-channel interference are limited. By properly designing the antenna beamforming and 4 setting the power constraint, the probability that the secondary users interfere in the primary transmissions would be low as far as directional antennas with limited power have a restrict radiation pattern. Besides, by using the up-link channel, the cellular base-stations are disturbed by the secondary transmissions and, due to their more robust reception procedures [24], the interference can be further mitigated. On the other hand, the secondary users do experience the interference caused by the primary users. Since the up-link is employed by the former, the interference normally comes from mobile devices, whose positions and traffic are unknown. To account for such uncertainties, the interferers’ spatial distribution and traffic characteristics will be modeled using point process theory [25]. Thereby, it is possible to derive closed-form expressions for important performance metrics of wireless systems as outage probability and link throughput. It is worth mentioning that the communication between different smart meters and their respective aggregator is coordinated so they do not interfere to each other. Our goal in this work is to optimize the link throughput (which is defined as the spectral efficiency, given in bits per second per hertz, times the probability that the packet is successfully decoded by the aggregator) of the secondary link under power (to not affect the primary users) and outage (secondary link reliability) constraints. Using a similar optimization procedure as in [26]–[28], we find the signal-to-interference ratio threshold and the transmit power employed by the secondary link so as to maximize its throughput while respecting the imposed constraints. Then, we found a closed-form equation for the optimal link throughput as a non-linear function of the system constraints and the density of interferers, as well as other system parameters. Interestingly, our results show that frequent outage situations have an unexpected positive effect on the system performance for the scenario of interest (maximum value of outage constraint is 25%). We use actual data from the average power demand of a household (obtained from “The Reference Energy Disaggregation Data Set” database [29], [30]) to show that relatively high outage probabilities do not lead to a poor signal reconstruction if the information is sampled and sent periodically, for example, every 15 minutes. All in all, our main contribution and novelty are the theoretical evidences that up-link spectrum sharing is a good candidate for deploying the communication network in the distribution electricity grids. 5 The rest of this paper is divided as follows. Section II explains the scenario under analysis, justifying our assumptions and presenting the optimization problem to be solved. In Section III, we focus on the solution of the optimization problem and illustrate how the system performance changes with the configuration parameters. Section IV shows how the outage events affect the reconstruction of the average power demand curve. In section V, we discuss some implications of our theoretical results, indicating how they might be used in actual deployments. Section VI concludes this paper. II. S YSTEM MODEL In this section, we describe the basic assumptions used to build our model and their implications. The assumptions are stated as follows: ‚ Assumption 1: Spectrum-sharing scenario where licensed (primary) and unlicensed (secondary) users share the frequency bands allocated to the up-link channel. ‚ Assumption 2: Primary link is established between static cellular base-stations and mobile users. Secondary terminals are smart meters that need to forward data to a given aggregator through the uplink channel and their positions are fixed. ‚ Assumption 3: The smart meters transmit with limited power Ws such that Ws ď Ws,max where Ws,max is the maximum power allowed for the secondary users (which can be seen as an imposition from the primary network). ‚ Assumption 4: Smart meters associated with the same aggregator are able to perfectly coordinate their transmissions using time scheduling. In this case, Assumption 2 indicates the possibility of employing directional antennas in the secondary links as far as their positions are fixed. Orientation errors as defined in [23] can be then completely avoided when deploying the secondary network, making highly directional antennas worth. In its turn, Assumption 3 imposes the maximum range that the signal transmitted by the smart meters can reach. Putting all together, the radiation pattern generated by the secondary transmission can be seen as a line segment starting in the smart meter, passing through the aggregator and ending in a point related to Ws,max . 6 Let us now look at the interference related to the proposed spectrum sharing. Assumptions 1, 2 and 4 indicate the co-channel interference occurs: (i) from smart meters to cellular base-stations, (ii) from smart meters to aggregators that they are not associated, and (iii) from mobile users to aggregators. From the implications discussed in the previous paragraph, the cases (i) and (ii) can be neglected by designing the specific locations when the deploying either the secondary or primary networks. Even if the positions are considered random in two-dimensions, the chance of having a base-station or an aggregator in the line segment related to the smart meter transmitted signal approaches zero, which further indicated that such cases should not be considered. Hence, only case (iii) is relevant for our analysis. To evaluate its impact in the system performance, we first need to model uncertainty of the mobile users’ positions and traffic activity. We assume here a Poisson field of interferers [31] such that the interferer nodes are distributed over an infinite plane following a 2-dimensional Poisson point process Φ with density λ, given in interferers per square-meter. The wireless channel model employed in this paper consists of two components: one related to the distance-dependent path-loss such that the received power decays with the distance and other related to fast-fading [25]. The received power at the node of interest can be computed as gi ri´α , where ri is the distance between the reference receiver and the ith node, gi is the channel gain between them, and α ą 2 the path-loss exponent. Hereafter, we focus our analysis on a reference smart meter-aggregator link, as shown in Fig. 1. During transmissions intervals, we assume that the interferers’ positions and the channel gains do not change. We also consider an interference-limited scenario wherein the noise effects can be neglected. As pointed in [32], the inclusion of the noise power leads to a more complex analysis without providing any significant qualitative difference. If the primary users are equipped with omni-directional antennas and transmit with the same fixed power Wp , the signal-to-interference ratio (SIR) at the aggregator can be computed as [25]: SIR0 “ Ws g0 r0´α ÿ , Wp gi ri´α (1) iPΦ where the index 0 denotes the reference link. We assume that the reference link employs both point-to-point Gaussian codes and the interferenceas-noise decoding rule [28], [33] so that a spectral efficiency of log2 p1`βq in bits/s/Hz is achieved 7 Fig. 1. An illustration of the proposed scenario, where primary and secondary users share the up-link channel. The reference smart meter (secondary transmitter) is depicted by the house, the aggregator (secondary receiver) by the the CPU , the handsets are the mobile primary users (interferers to the aggregator) and the big antenna is the cellular base-station. As the smart meter uses directional antenna with limited transmit power (bold arrow), its interference towards the base-station can be ignored. The thin black arrows represent the primary users’ desired signal, while the red ones their interference towards the aggregator. only if the SIR is greater than β. In this case, the probability Psuc that a packet is successfully decoded by the aggregator is the probability that SIR0 ą β. Then, an outage event happens with probability 1 ´ Psuc . In our scenario, retransmissions are not allowed so that the information contained in packets received in outage is lost. To compute Psuc , we assume quasi-static channel gains (squared envelops) g that are independent and identically distributed exponential random variables (Rayleigh fading), and also a dynamic topology where interferers’ positions change every transmission interval. Therefore, every transmission attempt can be viewed as a different realization of the point processes Φ and the channel gains g. We consider here that the distance between the reference meter and aggregator is known and has a fixed value r0 “ d. Finally, the success probability is computed as [25]: Psuc “ e ´λκπd2 β 2{α ´ Wp Ws ¯2{α , (2) where κ “ Γp1 ` 2{αqΓp1 ´ 2{αq with Γp¨q being the Gamma function. It is also worth noting that the primary users might employ different power control strategies, but it will not affect the 8 qualitiative results of our analysis due to the stochastic geometry approach employed (e.g. [34]). We are now ready to define the performance metric and carry out the optimization problem under consideration. Definition 1 (Link throughput): The throughput T of the reference link using the system model described in this section is defined as: ´λκπd2 β 2{α ´ T “ logp1 ` βq Psuc “ log2 p1 ` βq e Wp Ws ¯2{α . (3) Our goal in this paper is to find the setting of parameters for the secondary users to maximize their link throughput T while respecting the imposed power limit and outage constraints. In our case, the variables in hand are the coding rate β and the transmit power Ws of the reference link. Mathematically, we have the following problem: max pβ,Ws q s.t. log2 p1 ` βq e ´λκπd2 β 2{α Ws ď Wmax ´ Wp Ws ¯2{α , (4) 1 ´ Psuc ď  where  is the maximum acceptable outage probability, reflecting the reference link robustness. III. M AXIMUM THROUGHPUT UNDER POWER AND OUTAGE CONSTRAINTS In this section, we solve the optimization problem previously stated. We then provide some numerical results to illustrate how the constraints imposed to our smart meter-aggregator reference link will affect the maximum achievable throughput. Before we start, we still need to present a Lemma that tells us how the throughput behaves as a function of the secondary transmit power Ws and the SIR threshold β when no constraint is considered. Lemma 1: Let us consider the throughput equation, given by (3), as a function of the variables Ws ą 0 and β ą 0, i.e. T “ f pWs , βq. The function f is monotonically crescent in respect to Ws , and it is concave in respect to β if B 2 T {Bβ 2 ă 0. Outline of proof: The proof of this Lemma is straightforward from the analysis of the function in terms of the (strictly positive) variables Ws and β, and knowing that the function T is twice differentiable in terms of β. Any increase in Ws leads to an increase in the exponential term of (3) and then in T . Increasing β, on the other hand, has a two-fold effect: it increases the 9 logarithmic term while decreases the exponential one. The function T , however, is not always concave in relation to β ą 0; nevertheless, in the region that B 2 T {Bβ 2 ă 0, T is concave. Since T is concave for some values of β, we may try to find the value of β that leads to the maximum T . This is shown in the next Lemma. ˚ ˚ Lemma 2: Let βun denote the value of β that maximizes T assuming that βun is in the region ˚ where B 2 T {Bβ 2 ă 0. Then, βun is the solution of the following (transcendental) equation: αβ “ k β 2{α p1 ` βq lnp1 ` βq, (5) where k “ 2λκπd2 pWp {Ws q2{α . ˚ Outline of proof: Let us first consider that βun is in the region where the inequality B 2 T {Bβ 2 ă 0 holds. Then, from Lemma 1, the value of β that maximizes T is the solution of the derivative equation BT {Bβ “ 0. By doing so in (3), we end up in (5), which has no closed-form solution. If a solution does not exist, then our initial assumption the inequality ˚ B 2 T {Bβ 2 ă 0 does not hold and βun cannot be obtained. ˚ Nonetheless, in the cases of interest, (5) has a solution and therefore βun is in the region where B 2 T {Bβ 2 ă 0 as we shall see next. It is noteworthy that even though (5) does not have a closed-form solution, it can be easily evaluated numerically through standard mathematical software as, for instance, [35]. Fig. 2 exemplifies the behavior of the link throughput T with the transmit power Ws and the threshold β. The curve behaves as predicted by Lemmas 1 and 2. Intuitively, when all parameters are kept the same, it is advantageous for the smart meter to increase its transmit power so that the SIR experienced by the aggregetor tends to increase. This behavior, although individually optimal, is not good for the other links as transmitting with more power would increase the interference level throughout the network (refer to [27] for a deeper assessment of an optimization problem wherein the optimal individual solution can be socially harmful). For this reason, the power constraint that our problem assumes is needed, as we will discuss later. When analyzing the effects of the threshold β, there is a trade-off involved. An increase of β leads to a more efficient transmission where more bits/s/Hz can be transmitted in the same message. This gain, however, comes at expense of more frequent outage events, which in turn 10 β =1 0.45 Ws =1 0.45 0.40 0.35 0.35 0.30 0.30 0.25 0.25 0.20 0.20 0.15 0.15 0.10 0.10 0.05 0.05 T 0.40 0.00 0.0 0.5 1.0 Ws 1.5 2.0 0.00 0.0 0.5 1.0 β 1.5 2.0 2.5 Fig. 2. Link throughput T given in (3) as a function of the transmit power Ws (left) and the SIR threshold β (right) for α “ 4, d “ 1, λ “ 0.25 and Wp “ 1. The black dot in the right plot is the optimal operating point predicted by Lemma 2. decreases the link throughput. From Lemma 2, the value of β that leads to the optimal operating point can be found by numerically solving (5). In our case, we use the function fsolvep q from the Python library SciPy [35]. We are now almost ready to present the main result of this paper, which is the solution of the constrained optimization problem presented in the previous section. But first, we still need to state a lemma about the relation between the optimal values of the constrained and unconstrained SIR thresholds β. Lemma 3: Let β ˚ denote the value of β that leads to the maximum constrained throughput ˚ given in (4) and βun , given in Lemma 2, denote the value that optimizes the unconstrained throughput. Then: ´ 1´e ˚ αβun ˚ q lnp1`β ˚ q 2p1`βun un ˚ ą  ùñ β ˚ ă βun . (6) ˚ Proof: In the optimal unconstrained operating point βun given in Lemma 2, the following equality must hold: β 2{α “ αβ . kp1 ` βq lnp1 ` βq (7) 11 ˚ Then, although we cannot analytically compute the actual value of βun , we do know that the ´ outage probability 1 ´ Psuc , given in (2), related to it will be given by: 1 ´ e ˚ αβun ˚ q lnp1`β ˚ q 2p1`βun un , ˚ . which is a monotonically decreasing function of βun In this case, if that probability is smaller than the constraint , then the constrained optimal ˚ threshold is the unconstrained one, i.e. β ˚ “ βun . Otherwise, the optimal constrained threshold ˚ ˚ β ˚ must be smaller than βun since the outage probability is a decreasing function of βun . Proposition 1: Let us assume that the pair pWs˚ , β ˚ q is the solution of the optimization problem given by (4). If 1 ´ e ´ ˚ αβun ˚ q logp1`β ˚ q 2p1`βun un ą , the pair pWs˚ , β ˚ q is computed as: Ws˚ “ Wmax , ˆ ˙α{2 Wmax lnp1 ´ q ˚ β “ ´ . Wp λκπd2 (8) (9) The optimal throughput T ˚ is then: ˜ T ˚ “ p1 ´ q ˆ log2 Wmax 1` Wp ˆ lnp1 ´ q ´ λκπd2 ˙α{2 ¸ . (10) Proof: Let us start by considering the variable Ws . From Lemma 1, we know that the throughput is a monotonically increasing function of Ws , regardless of β. Then, Ws must assume its highest possible value: Ws˚ “ Wmax . To find β ˚ , we first use the assumption that 1 ´ e ´ ˚ αβun ˚ q lnp1`β ˚ q 2p1`βun un ą . From Lemma 3, ˚ the inequality β ˚ ă βun holds. Then, we use the fact that T is also a monotonically crescent ˚ function of β in the range 0 ă β ă βun so that β ˚ should be the highest value that satisfies the inequality 1 ´ Psuc ď . Manipulating the constraint by assuming Ws˚ “ Wmax , we obtain ´ ¯α{2 lnp1´q Wmax β ď Wp ´ λκπd2 . In this case, equality gives β ˚ . ´ Remark 1: This result is only valid if the initial assumption 1 ´ e ˚ αβun ˚ q lnp1`β ˚ q 2p1`βun un ą  holds, which is true for the cases of interest, namely α P p2, 6s and  P p0, 0.25q. Notice that α P p2, 6s comprises indoor and outdoor scenarios as well as rural and urban areas [36]. For example, when ˚ α “ 4 and β “ 1.24 (the value of βun in the example used in Fig. 2), the outage probability is ˚ 0.75. If that inequality does not hold, the optimal solution is β ˚ “ βun and the optimal power Ws˚ should be computed accordingly. In other words, the value of β ˚ is kept fixed, while the optimal power Ws˚ is the variable used to optimize the link throughput. 12 0.012 Wmax =0.3,² =0.15 Wmax =0.1,² =0.15 Wmax =0.3,² =0.05 Wmax =0.1,² =0.05 0.010 T∗ 0.008 0.006 0.004 0.002 0.000 0.2 Fig. 3. 0.3 0.4 λ 0.5 0.6 0.7 Maximum link throughput T ˚ given in (10) as a function of the density of active mobile primary users (interferers) λ for α “ 4, d “ 1, Wp “ 1 and different values of the constraints Wmax and . Corollary 1: The optimal throughput T ˚ can be approximated by: ˙α{2 ˆ p1 ´ q Wmax lnp1 ´ q ˚ , T « ´ lnp2q Wp λκπd2 ´ ¯α{2 lnp1´q when WWmax ´ is small. λκπd2 p (11) Remark 2: Corollary 1 holds for the cases under study. For example, when the system variables are set as follows: λ “ 0.25, α “ 4, d “ 1, Wp “ 1, Wp “ 0.5 and  “ 0.05, the term is ´ ¯α{2 lnp1´q Wmax ´ λκπd2 “ 0.00086, therefore the approximation lnp1 ` xq « x works well. Wp Next we will illustrate the analytic results just presented to get more insights on how the maximum link throughput T ˚ is affected by the activity of the primary users, as well as the system constraints. Fig. 3 shows how the optimal constrained throughput T ˚ in the smart meterto-aggregator link behaves in relation to the density λ of active mobile users that interfere in its communication. As expected, increasing the density of interfering nodes decreases the maximum throughput achieved by the reference link, regardless of values of Wmax and  assumed. It is 13 0.012 0.010 T∗ 0.008 λ =0.25,² =0.15 λ =0.50,² =0.15 λ =0.25,² =0.05 λ =0.50,² =0.05 0.006 0.004 0.002 0.000 0.0 Fig. 4. 0.1 0.2 Wmax 0.3 0.4 0.5 Maximum link throughput T ˚ given in (10) as a function of the secondary power constraint Wmax for α “ 4, d “ 1, Wp “ 1 and different values of λ and . interesting to see that T ˚ exponentially decays with λ, which indicates that the secondary link performance is dramatically affected by the primary users’ increase of activity. We can also see from Fig. 3 that the values of the constraints Wmax and  affect the maximum throughput curves. Higher values of either Wmax or  leads to higher T ˚ , when λ is fixed. While the result is intuitive for Wmax (by increasing the transmission power, we obtain higher SIR and link throughput), it is not so when the outage constraint  is considered: a less strict constraint leads to higher throughputs. To better understand those behaviors, we present in Figs. 4 and 5 the maximum throughput T ˚ versus Wmax and , respectively. Fig. 4 shows that the maximum throughput T ˚ linearly grows with Wmax , which was predicted by Corollary 1. This means that any relaxation in the power constraint Wmax provides a linear gain in the secondary link throughput, whose slope is directly defined by the system variables; therefore, a combination between a relatively high outage constraint and low density of interferers provides the best performance. 14 0.012 0.010 T∗ 0.008 λ =0.25,Wmax =0.3 λ =0.25,Wmax =0.1 λ =0.50,Wmax =0.3 λ =0.50,Wmax =0.1 0.006 0.004 0.002 0.000 0.00 Fig. 5. 0.05 0.10 ² 0.15 0.20 Maximum link throughput T ˚ given in (10) as a function of the outage constraint  for α “ 4, d “ 1, Wp “ 1 and different values of λ and Wmax . The behavior of T ˚ as a function of the outage constraint is more complicated since there is a trade-off involved, as shown in (10) and (11). However, from our assumption that  is a relatively small probability, i.e.  P p0, 0.25q, then T ˚ is a (non-linear) crescent function of . Fig. 5 illustrates this growth, evincing that an increase ∆ for smaller values of  leads to lower variation ∆T ˚ in the maximum throughput. In this case, allowing for more outage events is more advantageous for the link: the spectral efficiency gains obtained by setting higher SIR thresholds dominates the system performance. It is worth reinforcing that this behavior – which is somehow counter-intuitive – is only valid for lower values of  P p0, 0.25q. If outages are not a constraint in our system, the results of Proposition 1 should be reviewed under the perspective of Lemmas 1 and 2, and Remark 1. 15 IV. O UTAGE EVENTS AND SIGNAL RECONSTRUCTION We just showed in the previous section that allowing for more frequent outage events increases the link throughput. However, outage events will affect the information that needs to be sent by the smart meter to the aggregator. Let xrns be the discrete signal transmitted by the smart meter and x̂rns be the signal received by the aggregator, where n “ 1, ..., N with N being the last sample. We consider the xrns is the average power demand over a fixed period of time τ . The aggregator needs then to use x̂rns to reconstruct the signal xrns. We assume here that the signal is reconstructed via linear interpolation between two adjacent points. If the communication is perfect (i.e. x̂rns “ xrns) the interpolation is always between x̂rks and x̂rk ´ 1s, with k “ 2, ..., N . This, however, is not the case in our model since outage events may occur due to the primary users activity. If a sample is lost, the aggregator will interpolate the missing value(s) using the latest two received samples. Consider the transmitted sequence: xrk ´ 2s, xrk ´ 1s, xrks with k “ 2, ..., N . If the samples xrk ´ 2s and xrks are successfully received but xrk ´ 1s is not, the reconstruction is based on the linear interpolation of x̂rks “ xrks and x̂rk ´ 2s “ xrk ´ 2s. The estimation of the missing point is then x̂rk ´ 1s “ pxrks ` xrk ´ 2sq{2. To carry out this procedure, we use the “The Reference Energy Disaggregation Data Set” database [29], [30] from where we build our signal xrns, which is the 15-minute average power demand over a timespan of 24 hours (one day). The information from the smart meter is transmitted to the aggregator every 15 minutes (yielding τ “ 0.25 hour and N “ 96 samples), which reconstructs the signal as previously described. Fig. 6 illustrates the effects of the outage probability on the signal reconstruction by showing the original signal and a snapshot of outputs assuming the constraints  “ 0.05 and  “ 0.15, where the missing points in the  “ 0.05 and  “ 0.15 curves are identified by the red squares. At first sight, one cannot notice a big difference between the three signals, and the most noticeable differences are in the  “ 0.05 curve (specifically in the “peaks”), not in the  “ 0.15 one. This interesting fact happens due to the nature of the signal itself and the randomness of outage events. The power demand signal seems to have a burst nature with a floor level and few peaks, which is related to personal habits when the house is occupied and people are engaged in activities 16 Original signal Average power demand 6000 5000 4000 3000 2000 1000 0 0 1 2 3 4 5 6 7 8 9 10 11 Average power demand 13 14 15 16 17 18 19 20 21 22 23 24 13 14 15 16 17 18 19 20 21 22 23 24 13 14 15 16 17 18 19 20 21 22 23 24 ² =0.05 6000 5000 4000 3000 2000 1000 0 0 1 2 3 4 5 6 7 8 9 10 11 12 ² =0.15 6000 Average power demand 12 5000 4000 3000 2000 1000 0 0 Fig. 6. 1 2 3 4 5 6 7 8 9 10 11 12 Time [h] Average power demand of a house measured in watts during a period of 24 hours. The signal is reconstructed in the aggregator as a linear interpolation between two subsequent points. If an outage happens, the point related to the power demand at that time is lost. On the top: perfect reconstruction. At the center: outage probability  “ 0.05. On the bottom: outage probability  “ 0.15. The red squares in the last two plots are the missing points (samples). like cooking or showering. For example, we can see in Fig. 6 that the peaks are around 8:00 in the morning and noon. These peaks are probably related to people getting ready to work and having lunch. Other than this, specially between 10:00 in the evening and 6:00 in the morning of the following day, 17 we can see that the energy consumption is quite low and constant, most probably related to appliances in stand-by and refrigerator cycles [37]. In this way, most of the samples xrks will have similar values. If independent and identically distributed erasures occur, the probability that the estimated point approximates the missing one is high. Consider again the transmitted sequence: xrk ´2s, xrk ´1s, xrks with k “ 2, ..., N and that the samples xrk ´ 2s and xrks are successfully received but xrk ´ 1s is not. Then, the reconstruction is x̂rk ´ 1s “ pxrks ` xrk ´ 2sq{2. As in most of the cases xrks « xrk ´ 1s « xrk ´ 2s, then x̂rk ´ 1s “ pxrks ` xrk ´ 2sq{2 « xrk ´ 1s. However, during the peaks, this does not hold and errors become evident. The snapshot presented for  “ 0.05 is an unlucky one as far as the transmissions failure happened in the peak periods. Conversely, although more samples were lost when  “ 0.15, they were mostly in the floor-level periods and the signal reconstruction was not affected in this specific snapshot. To statistically analyze the effects of the outage events in the signal reconstruction, we use the root-mean-square deviation (RMSD) such that the reconstruction error of the x̂rns is computed as: g f N f1 ÿ e RMSD “ px̂rks ´ xrksq2 . N k“1 (12) Fig. 7 presents how the RMSD changes with the maximum allowed outage probability . As expected, more frequent outage events (indicated by higher ) leads to a worse signal reconstruction (indicated by higher RMSDs). Our results show, however, that  has relatively little effect on reconstructing the signal. Let us first analyze the example presented in Fig. 6 (black curve in Fig. 7). For the highest value considered  “ 0.25, the RMSD is 227 watts for a signal with mean of 587 watts and with range max xrns ´ min xrns “ 4895 watts. In this case, the normalized RMSD with respect to the mean is approximately 0.39 while with respect to the range is less than 0.05. Looking back to the signal itself in top plot of Fig. 6, one can see that there are few points that, if erased, would cause a significant distortion on its reconstruction. In order to have a more robust analysis, we also present in Fig. 7 the best and the worst cases in terms of RMSD among 53 households, whose data is available in [30]. For this scenario, 18 350 300 RMSD 250 Worst Example Best 200 150 100 50 0 0.00 Fig. 7. 0.05 0.10 ² 0.15 0.20 0.25 Root-mean-square deviation (RMSD) versus the outage constraint . The results are presented for the example given in Fig. 6 together with the best and worst cases in terms of RMSD among 53-household demand data from [30]. The curves are the result of Monte Carlo simulations considering 105 realizations for each point. our example is closer to the worst case than to the best one. We further show in Fig. 8 the frequency diagram (histogram) of RMSD for the scenario where  “ 0.25. As one can see, most households perform better than the example presented Fig. 6 (RMSD “ 227 W); they are in fact much closer to the best case presented in Fig. 7. All in all, these results reinforces even more our argument that, for the scenario under consideration, the signal reconstruction is weakly affected by relatively frequent outage events. V. D ISCUSSIONS Throughout the last two sections, we studied a spectrum sharing scenario where a given smart meter-aggregator pair communicates using a licensed cellular uplink channel. For this scenario, we analytically assessed how the system constraints for being a secondary user affect the link throughput and the signal reconstruction. In this section, we start from the presented results to 19 16 Number of households 14 12 10 8 6 4 2 0 Fig. 8. 50 100 150 200 RMSD 250 300 Frequency diagram of the root-mean-square deviation (RMSD) considering data from 53 households from [30] for  “ 0.25 versus the outage constraint . The results are based on Monte Carlo simulations using 105 realizations for each point. discuss how the proposed spectrum-sharing scheme could be implemented in actual systems. A. Relation between licensed and unlicensed users In our theoretical model, we assume that the secondary, unlicensed, users do not affect the primary users (base-stations). As discussed before, this can indeed be the case when deploying our strategy in a real system. Since the positions of the smart meters, aggregators and basestations are fixed, the use of highly directional antennas in the smart meter-aggregator link with low transmit power will decrease the interference level at the base-station, which in turn still has capabilities of dealing with such residual interference. Looking at the interference caused by the mobile users in the aggregator, our analysis assume that the density of these nodes are fixed. This, however, will probably not hold because the primary user activity probably would intensify during periods that match with power demand peaks. Then, in a practical scenario, this traffic variations is somehow predicted and the smart 20 meter may adaptively change its operation point either by setting a pre-determined, predicted, density of interferers to optimize its communication link (simpler solution) or by sensing and estimating such a density from time to time (more complex solution). Another important point that our model can be useful relates to Denial-of-Service (DoS) attacks in the physical layer [38]. In this scenario, a node or a group of nodes intentionally interfering in the aggregator reception could characterize a DoS. From the analysis presented here, we could infer how frequent outage events need to be to affect the signal reconstruction. A dedicate study would be also possible by modeling the attackers as another Poisson point process. B. Outage constraint and link robustness While the power constraint is required by the secondary link to not interfere in the primary users, the outage constraint is set to guarantee a minimum robustness at the secondary link. Conversely to what one would expect, our results show that allowing for more frequent outage events improves the link throughput due to the contradictory effects of the SIR requirement on the system performance (lower outage constraints lead to higher SIR constraints, which results in higher spectral efficiency, while it decreases the success probability). The question that arises from this result is how robust against outage events the secondary link should be? One can only reply this answer knowing the information that is sent to the aggregator. Our example shows that, if the information to be sent is the average power demand, the signal reconstruction is possible even with relatively loose outage constraints. While this happens due to the nature of the input signal as discussed in the previous section, higher outage probabilities might be not desirable for other kind of signals or if the aggregator should provide some kind of feedback to the smart meter change the power demand behavior, as in strategies of demand-side management [39]. C. Power demand signal processing and transmission The signal presented in Fig. 6 exemplifies a 15-minute sampling interval of the power demand of a household. The signal characteristic indicates that time-based sampling might not be the 21 most efficient way of collecting and then send the data to the aggregator. For instance, by using event-based sampling [40], [41], the communication link should be much more robust (i.e. lower values of the outage constraint) since there will be much less redundant data and therefore the loss of any sample will have a more dramatic effect on the signal reconstruction. Although this is not the focus of the present paper, we would like to mention that there is a trade-off between the sampling strategies and communication. A more efficient way of sampling leads to less points for reconstructing the original signal and vice-versa. If this is the case, the transmission strategies and then the outage constraint should be evaluated in combination with the sampling procedure. In the scenario used here, the time-based sampling generate redundant information about the signal so that outage events do not have drastic effects on the signal reconstruction. For this new study, however, it is important to have a stochastic characterization of power demand signal as in [42], [43]. By doing so, the signal processing framework would be generalized and adapted to different consumption patterns. This would allow us to study ways to optimize different sampling strategies (time-based, event-based and hybrid) and transmission system designs (coding rate, medium access protocol and retransmissions), while considering the different requirements as reconstruction error and information privacy. Looking at the reconstruction procedure, more advanced strategies like machine learning would probably offer better options to reconstruct the data than linear interpolation, but at expense of higher computational costs [44]. From this perspective, it would be worth evaluating the cost of the sampling-reconstruction and the benefits of link throughput. In this paper, however, we have chosen to employ a two-dimensional analysis so as to understand the relations between optimal throughput and the reconstruction error itself; our goal is provide the knowledge of what combination of requirements is possible to achieve. For example, an application that requires a very high reliability would imply in a lower throughput. Consequently, a cost-benefit analysis involving those aspects would require more information about the application requirement. Another different scenario might consider (hybrid) Automatic Repeat Request (ARQ) strategies in order to enhance the communication link, which reduces outage events [26]. This scenario may 22 also include MAC protocols in order to control re-transmissions as well as coordination among nodes. One recent example of a MAC protocol designed in a similar scenario was developed in [45], where the authors introduced a centralized strategy that resorts to a specialized frame structure that support co-existence between a cognitive and primary networks. Along the same line, the idea to include a routing protocol that protects the primary users while meeting the utility requirements of smart grid network was proposed in [46]. Another scenario of interest deals with security and privacy of the transmitted data, since there is a trade-off between security and reliability as pointed out in [47], where the authors resort to information theoretical tools in order to guarantee security already at the physical layer. All in all, combining these more advanced communication techniques to decrease the outage events with a more efficient sampling and enhanced security at the physical layer would be an interesting next step for the present work. VI. C ONCLUSIONS This paper assesses a spectrum sharing scenario where smart meters send periodic information to an aggregator over licensed cellular uplink channels. We assume that the secondary link uses directional antennas with limited transmit power so its interference in the primary users can be neglected. Mobile primary users, on the other hand, interfere with the aggregator reception. Modeling the interferers’ spatial distribution as a Poisson point process, we analyzed the secondary link throughput, finding then its optimal value under power and outage constraints. Our results show that relatively high outage constraints surprisingly improve the link throughput for the cases of interest, even though more samples will be lost. It is worth mentioning the fact that smart meter reading application with scheduled intervals requires nowadays a reliability of at least 98% [15, Table 3]; this is a fairly high value if compared to our results. In fact, the discrepancy between the actual requirement and our results was a surprise. We also show that, due to the burst nature of the power demand signal that is transmitted in the smart meter-aggregator link, outage events do not have a dramatic effect in the signal reconstruction in comparison to the perfect transmission. We plan to study in future works how outage events will affect the signal reconstruction 23 under different sampling strategies. In this way, we plan to build a joint sampling-transmission technique that can improve the system efficiency, as discussed in Section V-C. We also expect to implement the ideas proposed here in an actual demonstration to verify the validity of our assumptions and proposed optimization strategy. R EFERENCES [1] I. F. Akyildizet et al., “Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey,” Computer Netw., vol. 50, no. 13, pp. 2127–2159, 2006. [2] C. Cormio and K. R. Chowdhury, “A survey on MAC protocols for cognitive radio networks,” Ad Hoc Netw., vol. 7, no. 7, pp. 1315 – 1329, 2009. [3] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, Feb. 2005. [4] J. Peha, “Sharing spectrum through spectrum policy reform and cognitive radio,” Proc. IEEE, vol. 97, no. 4, pp. 708–719, Apr. 2009. [5] Y. Saleem and M. H. Rehmani, “Primary radio user activity models for cognitive radio networks: A survey,” J. Netw. Comput. Appl., vol. 43, pp. 1–16, 2014. [6] B. Wang et al., “Game theory for cognitive radio networks: An overview,” Computer Netw., vol. 54, no. 14, pp. 2537–2561, 2010. [7] A. Ahmad et al., “A survey on radio resource allocation in cognitive radio sensor networks,” Commun. Surveys Tuts., vol. 17, no. 2, pp. 888–917, 2015. [8] C. H. de Lima et al., “Coordination mechanisms for self-organizing femtocells in two-tier coexistence scenarios,” IEEE Trans. Wireless Commun., vol. 11, no. 6, pp. 2212–2223, 2012. [9] L. D. Xu et al., “Internet of things in industries: A survey,” IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233–2243, Nov. 2014. [10] S. D. T. Kelly et al., “Towards the implementation of IoT for environmental condition monitoring in homes,” IEEE Sensors J., vol. 13, no. 10, pp. 3846–3853, Oct. 2013. [11] A. Bradai et al., “EMCOS: Energy-efficient mechanism for multimedia streaming over cognitive radio sensor networks,” Pervasive Mob. Comput., vol. 22, pp. 16–32, 2015. [12] S. F. Bush, Smart grid: Communication-enabled intelligence for the electric power grid. John Wiley & Sons, 2014. [13] P. H. J. Nardelli et al., “Models for the modern power grid,” EPJ-ST, vol. 223, no. 12, pp. 2423–2437, 2014. [14] Y. Yan et al., “A survey on smart grid communication infrastructures: Motivations, requirements and challenges,” Commun. Surveys Tuts., vol. 15, no. 1, pp. 5–20, 2013. [15] M. Kuzlu et al., “Communication network requirements for major smart grid applications in HAN, NAN and WAN,” Computer Netw., vol. 67, pp. 74–88, 2014. [16] R. C. Qiu et al., “Cognitive radio network for the smart grid: Experimental system architecture, control algorithms, security, and microgrid testbed,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 724–740, Dec. 2011. 24 [17] G. Shah et al., “A cross-layer QoS-aware communication framework in cognitive radio sensor networks for smart grid applications,” IEEE Trans. Ind. Informat., vol. 9, no. 3, pp. 1477–1485, Aug. 2013. [18] A. A. Khan et al., “Cognitive radio for smart grids: Survey of architectures, spectrum sensing mechanisms, and networking protocols,” Commun. Surveys Tuts., 2015, to appear. [19] R. Yu et al., “Cognitive radio based hierarchical communications infrastructure for smart grid,” IEEE Netw., vol. 25, no. 5, pp. 6–14, 2011. [20] V. C. Gungor and D. Şahin, “Cognitive radio networks for smart grid applications: A promising technology to overcome spectrum inefficiency,” IEEE Veh. Technol. Mag, vol. 7, no. 2, pp. 41–46, Jun. 2012. [21] J. J. Nielsen et al., “What can wireless cellular technologies do about the upcoming smart metering traffic?” IEEE Commun. Mag., vol. 53, no. 9, pp. 41–47, Sep. 2015. [22] Y. Zhang et al., “Cognitive machine-to-machine communications: Visions and potentials for the smart grid,” IEEE Netw., vol. 26, no. 3, pp. 6–13, May 2012. [23] J. Wildman et al., “On the joint impact of beamwidth and orientation error on throughput in directional wireless Poisson networks,” IEEE Trans. Wireless Commun, vol. 13, no. 12, pp. 7072–7085, Dec. 2014. [24] J. Andrews, “Interference cancellation for cellular systems: A contemporary overview,” IEEE Wireless Commun., vol. 12, no. 2, pp. 19–29, April 2005. [25] M. Haenggi, Stochastic geometry for wireless networks. Cambridge University Press, 2012. [26] P. H. J. Nardelli et al., “Optimal transmission capacity of ad hoc networks with packet retransmissions,” IEEE Trans. Wireless Commun., vol. 11, no. 8, pp. 2760 –2766, Aug. 2012. [27] ——, “Throughput optimization in wireless networks under stability and packet loss constraints,” IEEE Trans. Mobile Comput., vol. 13, no. 8, pp. 1883–1895, Aug. 2014. [28] P. H. J. Nardelli et al., “Throughput analysis of cognitive wireless networks with Poisson distributed nodes based on location information,” Ad Hoc Netw., 2015. [29] J. Z. Kolter and M. J. Johnson, “REDD: A public data set for energy disaggregation research,” in Workshop on Data Mining Applications in Sustainability (SIGKDD), San Diego, CA, vol. 25. Citeseer, 2011, pp. 59–62. [30] ——. [Online]. Available: http://redd.csail.mit.edu/ [31] P. Cardieri, “Modeling interference in wireless ad hoc networks,” Commun. Surveys Tuts., vol. 12, no. 4, pp. 551–572, 2010. [32] S. Weber et al., “An overview of the transmission capacity of wireless networks,” IEEE Trans. Commun., vol. 58, no. 12, pp. 3593–3604, Dec. 2010. [33] F. Baccelli et al., “Interference networks with point-to-point codes,” IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2582–2596, May 2011. [34] S. Weber et al., “The effect of fading, channel inversion, and threshold scheduling on ad hoc networks,” IEEE Trans. Inf. Theory, vol. 53, no. 11, pp. 4127–4149, Nov. 2007. [35] [Online]. Available: http://docs.scipy.org/doc/scipy-0.14.0/reference/generated/scipy.optimize.fsolve.html [36] A. Goldsmith, Wireless Communications. Cambridge University Press, 2005. [37] M. Pipattanasomporn et al., “Load profiles of selected major household appliances and their demand response opportunities,” IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 742–750, March 2014. 25 [38] E.-K. Lee et al., “Physical layer security in wireless smart grid,” IEEE Commun. Mag., vol. 50, no. 8, pp. 46–52, 2012. [39] G. Strbac, “Demand side management: Benefits and challenges,” Energy policy, vol. 36, no. 12, pp. 4419–4426, 2008. [40] Y. Tsividis, “Event-driven data acquisition and digital signal processing: A tutorial,” IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 57, no. 8, pp. 577–581, 2010. [41] M. Simonov et al., “Gathering process data in low-voltage systems by enhanced event-driven metering,” IEEE Syst. J, vol. PP, no. 99, pp. 1–12, 2015. [42] J. Munkhammar et al., “Characterizing probability density distributions for household electricity load profiles from highresolution electricity use data,” Appl. Energ., vol. 135, pp. 382–390, 2014. [43] I. Sajjad et al., “Probabilistic generation of time-coupled aggregate residential demand patterns,” IET Gener. Transm. Dis., vol. 9, no. 9, pp. 789–797, 2015. [44] M. Abu Alsheikh et al., “Machine learning in wireless sensor networks: Algorithms, strategies, and applications,” Commun. Surveys Tuts, vol. 16, no. 4, pp. 1996–2018, 2014. [45] A. Aijaz and H. Aghvami, “PRMA based cognitive machine-to-machine communication in smart grid networks,” IEEE Trans. Veh. Technol, vol. PP, no. 99, pp. 1–1, 2014. [46] A. Aijaz et al., “CORPL: A routing protocol for cognitive radio enabled AMI networks,” IEEE Trans. Smart Grid, vol. 6, no. 1, pp. 477–485, Jan 2015. [47] H. Alves et al., “Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter and its Applications on Smart Grids,” IEEE Trans. Inf. Forensics and Security, pp. Submitted – Online:, Nov 2015. [Online]. Available: http://arxiv.org/pdf/1511.06518
3cs.SY
Low-complexity Image and Video Coding Based on an Approximate Discrete Tchebichef Transform Paulo A. M. Oliveira∗ Renato J. Cintra† Fábio M. Bayer‡ Sunera Kulasekera§ Arjuna Madanayake§ arXiv:1609.07630v2 [cs.MM] 20 Apr 2017 Abstract The usage of linear transformations has great relevance for data decorrelation applications, like image and video compression. In that sense, the discrete Tchebichef transform (DTT) possesses useful coding and decorrelation properties. The DTT transform kernel does not depend on the input data and fast algorithms can be developed to real time applications. However, the DTT fast algorithm presented in literature possess high computational complexity. In this work, we introduce a new low-complexity approximation for the DTT. The fast algorithm of the proposed transform is multiplication-free and requires a reduced number of additions and bit-shifting operations. Image and video compression simulations in popular standards shows good performance of the proposed transform. Regarding hardware resource consumption for FPGA shows 43.1% reduction of configurable logic blocks and ASIC place and route realization shows 57.7% reduction in the area-time figure when compared with the 2-D version of the exact DTT. Keywords Approximate transforms, discrete Tchebichef transform, fast algorithms, image and video coding multiplications. Such multiplications are known to be more demanding computational structures than additions or fixed-point Discrete variable orthogonal polynomials emerge as solutions of multiplications, both in software and hardware. Thus, the higher several hypergeometric difference equations [1]. Classic applica- computational complexity of the DTT precludes its applications tions of this class of orthogonal polynomials include functional in low power consumption systems [22, 23] and/or real-time proanalysis [2] and graphs [3]. Additionally, such polynomials are cessing, such as video streaming [24, 25]. Therefore, fast algoemployed in the computation of moment functions [4], which rithms for the DTT could improve its computational efficiency. are largely used in image processing [5–7]. For instance, the A comprehensive literature search reveals only two fast algodiscrete Tchebichef moments [8], which are derived from the dis- rithms for the 4-point DTT [14, 26] and one for the 8-point crete Tchebichef polynomials, form a set of orthogonal moment DTT [15]. Although these fast algorithms possess lower arithfunctions. Such functions are not discrete approximation based metic complexities when compared with the direct DTT calcuon continuous functions; they are naturally orthogonal over the lation, they still possess high arithmetic complexity, requiring a discrete domain. significant amount of additions and bit-shifting operations. The Tchebichef moments have been used for quantifying image In a comparable scenario, the computation of DCT-based block artifact [9], image recognition [10–12], blind integrity vertransforms—which has been employed in several popular coding ification [13], and image compression [14–18]. In the data comschemes such as JPEG [27], MPEG-2 [28], H.261 [29], H.263 [30], pression context, bi-dimensional (2-D) moments are computed H.264 [31], HEVC [32, 33], and VP9 [34]—has profited from by means of the 2-D discrete Tchebichef transform (DTT). In matrix approximation theory [35–41]. In this context, discrete fact, the 8-point DTT can achieve better performance when comtransforms are not exactly calculated, but instead an approxiparison with the discrete cosine transform (DCT) [19], in terms mate, low-cost computation, is performed. The approximations of average bit length as reported in [16, 20, 21]. Moreover, the are designed in such a way to allow similar spectral and coding 8-point DTT-based embedded encoder proposed in [18], shows characteristics as well as lower arithmetic complexity. Usually, improved image quality and reduced encoding/decoding time in approximations are multiplierless, requiring only addition and comparison with state-of-the-art DCT-based embedded coders. bit-shifting operations for its computation. In [42], a multiplierThe 8-point DTT has also been employed in blind forensics, as less approximation for the 8-point DTT is proposed. To the best a tool to determine the integrity of medical imagery subject to of our knowledge, this is the only DTT aproximation archived filtering and compression [13]. in literature. However, the exact DTT possesses high arithmetic complexThe aim of this work is to introduce an efficient low-complexity ity, due to its significant amount of additions and float-point approximation for the 8-point DTT capable of outperform∗ Paulo A. M. Oliveira is with the Signal Processing Group, Departa- ing [42]. To derive multiplierless approximate DTT matrix, a mento de Estatı́stica, Universidade Federal de Pernambuco, Recife, PE, Brazil; Multimedia Communications and Signal Processing, University of multicriteria optimization problem is sought, combining differErlangen–Nuremberg, Erlangen, BY, Germany. ent coding metrics: coding gain and transform efficiency. Addi† Renato J. Cintra is with the Signal Processing Group, Departamento tionally, a fast algorithm for efficient computation of the sought de Estatı́stica, Universidade Federal de Pernambuco, Recife, PE, Brazil; Équipe Cairn, INRIA-IRISA, Université de Rennes, Rennes, France; and approximation is also pursued. For coding performance evaluLIRIS, Institut National des Sciences Appliquées, Lyon, France (e-mail: ation, we propose two computational experiments: (i) a JPEG [email protected]). image compression simulation and (ii) a video coding experiment ‡ Fábio M. Bayer is with the Departamento de Estatı́stica and LACESM, which consists of embedding the sought approximation into the Universidade Federal de Santa Maria, Santa Maria, RS, Brazil (e-mail: [email protected]). H.264/AVC standard. 1 Introduction § Sunera Kulasekera and Arjuna Madanayake are with the Department of Electrical and Computer Engineering at the University of Akron, OH (e-mail: [email protected]). The paper unfolds as follows. Section 2 reviews the mathematical background of the DTT. Section 3 introduces a parametriza1 tion of the DTT to derive a family of DTT approximations and sets up an optimization problem to identify optimal approximations. In Section 4, we assess the obtained approximation in terms of coding performance, proximity with the exact transform, and computation cost. Moreover, a fast algorithm for the proposed approximate DTT is introduced. Section 5 shows the results of the image and video compression simulations. Section 6 shows hardware resource consumption comparison with the exact DTT for both FPGA and ASIC realizations. A discussion and final remarks are shown in Section 7. 2 2.1 where T is the N -point unidimensional DTT matrix given by   te [0] te [1] ··· te [N−1] 0  T= 0 0 te1 [0] te1 [1] .. . .. . ··· .. te1 [N−1] .. . . teN −1 [0] teN −1 [1] ··· e tN −1 [N−1]  . The matrix operations induced by (2) represents the 2-D DTT. Because of the kernel separation property, the 2-D DTT can be calculated by means the successive applications of the 1-D DTT to the rows of f ; and then to columns of the resulting intermediate matrix. The original intensity distribution f can be recovered by the inverse procedure: Discrete Tchebichef Transform f =T−1 · M · (T−1 )⊤ = T⊤ · M · T. Discrete Tchebichef Polynomials The discrete Tchebichef polynomials are a set of discrete variable The last equality above stems from the DTT orthogonality proporthogonal polynomials [43]. The kth order discrete Tchebichef erty: T⊤ = T−1 [14]. Therefore, the same structure can be used polynomials are given by the following closed form expres- at the forward transform as well in the inverse. sion [14]: For N = 4 and N = 8, we have the particular cases of interest in the context of image and video coding. Thus, the 4- and tk [n] = (1 − N )k · 3 F2 (−k, −n, 1 + k; 1, 1 − N ; 1), 8-point DTT matrices are, respectively, furnished by:  1 1 1 1 where n = 0, 1, . . . , N − 1, 3 F2 (a1 , a2 , a3 ; b1 , b2 ; z) = P∞ (a1 )k (a2 )k (a3 )k z k −3 −1 1 3 T =F · 4 4 is the generalized hypergeometric func1 −1 −1 1 n=0 (b1 )k (b2 )k k! tion and (a)k = a(a + 1) · · · (a + k − 1) is the descendant factorial. Tchebichef polynomials can be obtained according to the and following recursion [14]:      2k − 1 k−1 tk [n] = tk [1] tk−1 [n] − N 2 − (k − 1)2 tk−2 [n], k k −1 T8 = 1 · F8 · 2 3 −3  1 1 1 1 1 1 −7 −5 −3 −1 1 −5  −77 51 −37 −53 −3   7 −13 −3 9 9 −7 23 −17 −15 15 1 −5 9 −5 −5 −1 7 −21 35 −35 1 1 3 5 −3 1 −7 −5 −3 −13 17 −23 9 −5 21 −7 1 7 7 7 7, 7 1 1 for t0 [n] = 1 and t1 [n] = 2n − N + 1. Indeed, the set {tk [n]},   k = 0, 1, . . . , N − 1, is an orthogonal basis in respect with the 1 √1 1 √1 , , where F = diag , and F8 = 4 2 2 20 20 unit weight. Consequently, the discrete Tchebichef polynomials   1 1 1 1 1 1 1 1 satisfy the following mathematical relation: We observe diag √2 , √42 , √42 , √66 , √142 , √546 , √66 , √858 . that T and T are written as a result from the product of an 4 8 N−1 X integer matrix and a diagonal matrix which requires float-point ti [n]tj [n] = ρ(j, N ) · δi,j , representation. i=0 (N+k)! and δi,j is the Kronecker delta where ρ(k, N ) = (2k+1)·(N−k−1)! function which yields δi,j = 1, if i = j, and δi,j = 0, otherwise. 2.2 3 DTT Approximations and Coding Optimality In this section, we aim at proposing an extremely low-complexity DTT approximation. Our methodology consists of generating a class of parametric approximate matrices and then identify the optimal class member in terms of coding performance. 2-D Discrete Tchebichef Transform Let f [m, n], m, n = 0, 1, . . . , N − 1, be an intensity distribution from a discrete image of size N × N pixels. The 2-D DTT of f [m, n], denoted by M[p, q], p, q = 0, 1, . . . , N − 1, is given by [8, 3.1 14]: Related Work To the best of our knowledge, the only DTT approximation archived in literature was proposed in [42]. That approximation was obtained by means of a parameterization of integer funcm,n=0 tions combined with a normalization of transformation matrix where e tk [n], k = 0, 1, . . . , N −1, are the orthonormalized discrete columns. The derived approximation in [42] furnishes good codp Tchebichef polynomials given by e tk [n] = tk [n]/ ρ(k, N ). ing capabilities, but it lacks orthogonality or near-orthogonality Note that the transform kernel described in (1) is separable. properties. As a consequence, the forward and inverse transforHence, the following is relation holds true: mations are quite distinct and possess unbalanced computational complexities. N−1 N−1 X X e e tq [n] · f [m, n], tp [m] M[p, q] = 3.2 Parametric Low-complexity Matrices n=0 m=0 M[p, q] = N−1 X e tp [m] · e tq [n] · f [m, n], (1) for p, q = 0, 1, . . . , N − 1. Therefore, the transform-domain coef- In [35, 36, 38, 44], DCT approximations were proposed according ficients of f can be calculated by the following matrix operation: to following operation: M = T · f · T⊤ , int(α · C), (2) 2 where int(·) is an integer function, α is a real scaling factor, and C is the exact DCT matrix. Usual integer functions include the floor, ceiling, signal, and rounding functions [38]. In this work, these functions operate element-wise when applied to a matrix argument. A similar approach is sought for the proposed DTT approximation. However, in contrast with the DCT, the rows of DTT matrix (basis vectors) have a widely varying dynamic range. Thus, the integer function may excessively penalize the rows with small dynamic range. To compensate this phenomenon, we normalize the rows of T4 √and T√8 accord ing to left multiplications by D4 = diag 2, 320 , 2, 320 and √ √  √ √ √ √ √ √ 568 D8 = diag , re8, 168 , 168 , 264 , 13 , 2184 , 264 , 3432 7 7 7 23 9 35 spectively. The sought approximations are required to possess extremely low complexity. One way of ensuring this property is to adopt an integer function whose co-domain is a set of low-complexity integer. In the DCT literature, common sets are: P0 = {±1} [35], P1 = {0, ±1} [36], and P2 = {0, ±1, ±2} [38]. Note that elements from these sets have very simple realization in hardware; implying multiplierless designs with only addition and bitshifting operations [45]. Adopting P2 , we have that a suitable integer function is given by: 3.4 Now our goal is to identify in the family TN (α) the matrix that furnishes the best approximation. We adopted two metrics as figures of merit to guide the optimal choice: (i) the unified coding gain Cg [51,52] and (ii) the transform efficiency η [53]. These metrics are relevant, because they quantify the transform capacity of removing signal redundancy, as well as data compression and decorrelation [53]. Hence, following the methodology in [54], we propose the following multicriteria optimization problem: n    o Cg T̂N (α) , η T̂N (α) , N ∈ {4, 8}, α∗ = arg max 0<α<5/2 ∗ where α is the scaling parameter that results in the optimal low complexity matrix T∗N , T̂N (α∗ ) according to (3). The above optimization problem is not analytically tractable. Thus, we resort to exhaustive numerical search to obtain α∗ . We consider linearly spaced values of α with a step of 10−3 in the interval 0 < α < 5/2. For N = 4 and N = 8, we obtain that op23 69 timality is found in the intervals ( 23 , 25 ) and ( 14 , 34 ), respectively. Therefore, any value of α in the aforementioned intervals effects the same approximations. For operational reasons, we selected α = 2. Thus, the resulting low-complexity matrices are given below:  1 1 1 1 1 1 1 1 −2 −1 −1 0 0 1 1 2  1 1 1 1 −1 0 2   −22 01 −12 −11 −1 ∗ ∗ −1 −2 −1 2  −2 −1 1 2 T4 = and T8 =  1 −1 −1 1  1 −2 0 1 1 0 −2 1  . round : [−1, 1] → P2 = {0, ±1, ±2} , x 7→ round(α · x), 0 < α < 5/2, −1 where round(x) = sign(x) · ⌊|x| + 21 ⌋ is the rounding function as implemented in MATLAB [46], Octave [47], and Python [48] programming languages. Following the methodology described in [38], we obtain the following parametric class of matrices: TN (α) = round(α · DN · TN ), 3.3 N ∈ {4, 8}. Optimization Problem 2 −2 1 −1 2 −1 −1 1 0 −1 2 −1 −1 0 0 −1 2 −2 1 −2 2 −1 1 0 1 0 0 The associate optimal approximations are denoted by T̂∗N , T̂N (α∗ ) and can be computed according Hence,  to (4).  we obtain: T̂∗4 = diag 12 , √110 , 12 , √110 · T∗4 and T̂∗8 =   diag √18 , √112 , √112 , √120 , √112 , √114 , √112 , √110 · T∗8 (3) 4 DTT Approximation Evaluation and Computational Complexity A given low-complexity matrix TN (α) can be used to approxi- 4.1 Discussion mate the DTT matrix by means of orthogonalization or quasi∗ ∗ orthogonalization as described in [36–38]. As a result, an ap- The obtained matrix T4 satisfies (5) and therefore T̂4 is orthogproximation for TN , referred to as T̂N (α), can be obtained by: onal. In fact, the proposed matrix is identical to the 4-point integer transform for H.264 encoding introduced by Malvar et al. [44]. T̂N (α) = SN (α) · TN (α), (4) Therefore, it is also an optimal approximate DTT. Because the 4-point DCT approximation matrix by Malvar et al. was submitq where SN (α) = {ediag(TN (α) · TN (α)⊤ )}−1 is a diagonal ma- ted to in-depth analyses in the context of video coding [31], such ∗ trix, ediag(·) returns a√diagonal matrix with the diagonal entries results also apply to T4 . Therefore, hereafter we focus the forthcoming discussions to the proposed 8-point approximation T∗8 . of its argument and · is the matrix element-wise square root operator [38]. If TN (α) · TN (α)⊤ = [diagonal matrix] 4.2 (5) Orthogonality and Invertibility The matrix T∗8 does not satisfy (5). Therefore, the associate approximation T̂∗8 is not orthogonal, i.e. (T̂∗8 )−1 6= (T̂∗8 )⊤ . As holds true, then T̂N (α) is an orthogonal matrix [49]. Otherwise, a consequence, the inverse does not inherit the low-complexity it is possibly a near orthogonal matrix [38]. An approximation properties of T∗8 . In other words, the entries of (T∗8 )−1 are not is said quasi-orthogonal when the deviation from diagonality of in P2 . Hence, the proposed transform possesses asymmetrical TN (α) · TN (α)⊤ is considered small. Let A be a square real computational costs when comparing the direct and inverse opmatrix. The deviation from diagonality δ(A) is given by [50]: erations [55]. The inverse transformation is a much required tool, specially for reconstruction encoded images back to the spatial k ediag(A)kF δ(A) = 1 − , domain [27, 56]. kAkF However, T∗8 · (T∗8 )⊤ has a low deviation from diagonalwhere k · kF is the Frobenius norm for matrices [49]. In the ity [38, 50]: only 0.024—roughly 4.4 times less than the devicontext of image compression, a deviation from diagonality value ation implied by the SDCT [35], which is taken as the stanbelow 1 − √25 ≈ 0.1056 indicates quasi-orthogonality [35, 38]. dard reference. Therefore, the following approximation is valid: 3 (T̂∗8 )−1 ≈ (T∗8 )⊤ · [diag(8, 3, 3, 5, 3, 7/2, 3, 5/2)]−1 . Moreover, where since diagonal matrices can be absorbed into other computational steps [38, 40, 42], (T∗8 )−1 can be replaced with the lowcomplexity matrix (T∗8 )⊤ . This has the advantage of using the same algorithm for both forward and inverse approximations. 4.3 Performance Assessment A1 = The proposed approximations were compared with their corresponding exact DTT in terms of coding performance as measured according to the coding gain and the transform efficiency. For N = 8, we also include in our comparisons the DTT approximation proposed in [42]. The coding performance of the proposed approximations was evaluated according to the figures of merit Cg and η. Table 1 displays the results. The proposed approximations are capable of furnishing coding measures very close to the exact transformations. For comparison purposes, the exact DCT has its coding gain and transform efficiency of 8.83 dB and 93.99, respectively. Although our goal is to derive good approximations for coding, we also analyzed the resulting approximations in terms of proximity metrics. We separated the mean square error (MSE) [57], the total energy error ǫ [36], and the transform distortion d [58]. All these measures aim at quantifying the distance between the exact transformations and their respective approximations. Analytic expressions for the MSE and ǫ are detailed in [54]. We also evaluated the proximity of the proposed approximations with respect to the exact DTT according to the transform distortion measure suggested in [58]. This metric was originally proposed as the DCT distortion in the context of DCT approximations and quantifies in percentage a distance between exact and approximate DCT. Adapting it for the DTT, we obtain the transform distortion as follows: d(T̂∗N ) =  1− n o 1 · ediag TN · (T̂∗N )⊤ N 2 2  A2 = P= 0  00 0 0 0 1 0 1  00 2  0 0 0 0 0 1 0  00   00 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 1 −1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 1 0 1 0 0 1 0 0 0 1 1 0 0 0 0 1 −1 0 0 0  , 1 0 0 −1 0 0 0 0 0 0 −1 0 0 0 0 0 0 −1 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 2 −1 0 0 0 0  −1 −1 0 0 0 0  0 0 2 −1 0 0  0 0 1 1 0 0 0 0 0 1 1 0 0 0 0 0 2 −1 0 0 0 0 0 −2 1 0 0 0 0 0 0 −2 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 −1 0 0 0 0 0 −1 0 1  0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0. 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0, 1 1 0 Matrix B8 represents a layer of butterfly structures, A1 and A2 denote additive matrices with bit-shifting operations, and P represents a final permutation, which is cost-free. The resulting algorithm preserves all algebraic and coding properties of the direct computation, while requiring less arithmetic operations. Moreover, the factor of 2 of the first matrix row can be absorbed into the diagonal matrix. The obtained factorization is represented by the signal flow graph shown in Figure 1. Such algorithm reduces the arithmetic cost of the proposed approximation to only 24 additions and six bit-shifting operations. Table 2 compares the arithmetic complexity of the discussed methods evaluated according to both their respective fast algorithms. The additive and total arithmetic complexity of the proposed approximation are 45.5% and 58.9% lower than the exact transform, respectively. Although, the computational cost of the proposed approximation is slightly higher than the forward DTT approximation in [42], it is important to notice that the inverse transformation in [42] is relatively more complex. Considering the combination of forward and inverse transformation, the design in [42] requires 49 additions, whereas the proposed design requires 48 additions. Bit-shifting costs are virtually null, because in a hardware implementation they represent only wiring. For comparison, the popular Loeffler DCT algorithm [61] requires 11 floating-point multiplications and 29 additions. Although the actual approximation consists of the multiplication of the low-complexity matrix and a diagonal matrix as shown in (4), the multiplications introduced by diagonal matrices represent no additional arithmetic complexity in image compression applications. This is because they can be absorbed into the image quantization step [27, 56] of JPEG-like image compression [36–41]. Furthermore, the new approximation is capable of a better coding performance and possesses one order of magnitude lower proximity measure as shown in Table 1. Therefore, both performance and arithmetic complexity measures are favorable to the proposed approximation. × 100%, where k·k2 is the euclidean norm for matrices [49]. Low values of distortion indicates proximity with the DTT. As a comparison for N = 4, the 4-point DCT approximation proposed in [59] has a distortion of 7.32%. Proximity results are also shown in Table 1. 4.4 B8 = 1 Fast Algorithm and Arithmetic Complexity Now we aim at deriving fast algorithms for the obtained DTT approximations. Being identical to the H.264 4-point DCT approximation, the derived matrix T∗4 was given fast algorithms in [44]. Although T∗8 is multiplication free, without a fast algorithm, its direct implementation requires 44 additions and 24 bit-shifting operations. Thus we focus our efforts on the efficient computation of T∗8 . To such end, a sparse matrix factorization is sought, where the number of additions and bit-shifting operations can be significantly reduced [45, 60]. The sparse matrix factorization proposed in the manuscript was derived from scratch based on usual butterfly structures [45]. 5 Image and Video Compression Experiments We obtained the following decomposition: In this section, we perform two computation experiments. The first one consists of still image compression considering a JPEG T∗8 = P · A2 · A1 · B8 , procedure. The second simulation assess the effectiveness of the 4 Table 1: Performance assessment Cg (dB) η MSE ǫ N Method d δ 4 Exact DTT [26] Proposed 7.55 7.55 97.25 97.33 0.001 0.13 0.29% 0 0 8 Exact DTT [15] DTT Approx. [42] Proposed 8.68 6.60 8.57 92.86 83.50 89.52 0.015 0.002 3.32 0.77 12.61% 3.03% 0 0.09 0.024 x0 X0 x1 X4 x2 X6 x3 X2 x4 X7 x5 X3 x6 X1 x7 X5 Figure 1: Signal flow graph for T∗8 . Input data xn , n = 0, 1, . . . , 7, relates to output Xm , m = 0, 1, . . . , 7. Dashed arrows and black nodes represent multiplications by −1 and 2, respectively. Table 2: Fast algorithm arithmetic complexity comparison Method Mult. Adit. Shifts Total 0 0 0 0 44 20 29 24 29 0 8 6 73 20 37 30 Exact DTT [15] Forward DTT approx. [42] Inverse DTT approx. [42] Proposed 5 proposed approximations under realistic video encoding condi- high compression ratios. It could outperform the DTT approximation in [42] in terms of SSIM and SR-SIM for QF < 80 tions. and QF < 55, respectively. It shows that the proposed approximation is more efficient in the scenario of high and moderate 5.1 Image Compression compression, which are the very common cases [67], suitable for We adopted the image compression method according to the low-power devices. The approximation in [42] could attain a JPEG standard [27, 56]. A set of 45 512×512 8-bit images were better performance at low compression ratios because it satisfies obtained from a public image bank [62] and submitted to process- the perfect reconstruction property—albeit at the expense of an ing. The selected images encompass a wide range of categories, inverse transformation with higher arithmetic complexity. On including 13 textures, 12 satellite images, three human faces and the other hand, the proposed approximation explores the nearseveral other miscellaneous scenarios. For each image, the lumi- orthogonality property which could excel in moderate to high nance component was extracted and subdivided into 8×8 blocks, compression scenarios—which are often more relevant [67]. Ii,j , i, j = 1, 2, . . . , 64. After preprocessing, each block was subFor qualitative evaluation purposes, Figure 3 shows the mitted to the the following operation: compressed Lena image according to the exact DTT and the proposed approximation. We adopted the scenario of Mi,j = P · Ii,j · P⊤ , high/moderate compression with QF = 15 and QF = 50, respectively. In both cases, the approximate transform was capable of where Mi,j is the 2-D transform-domain data and P is a given producing comparable results to the exact DTT with visually 1-D transformation matrix, such as the exact or approximate similar images. DTT. Then each subblock Mi,j was element-wise divided by a quantization matrix, yielding the quantized JPEG coefficients 5.2 Video Compression Simulation Ji,j , as follows: To evaluate the proposed transform performance in video codJi,j = round (Mi,j ⊘ Q) , ing, we have embedded the DTT approximation in the widely used x264 software library [68] for encoding video streams into where Q = ⌊(S · Q0 + 50)/100⌋ is the quantization matrix, ⌊·⌋ the H.264/AVC standard [31]. The default 8-point transform emdenotes the floor function, the default quantization table is ployed in H.264 is the following integer DCT approximation [69]:  16 11 10 16 24 40 51 61   8 8 8 8 8 8 8 8 12 12 14 19 26 58 60 55 12 10 6 3 −3 −6 −10 −12 13 16 24 40 57 69 56   14 −4 −8 −8 −4 4 8 14 17 22 29 51 84 80 62   108 −34 −12 1 , Q0 =  −6 6 12 3 −10  18 22 37 56 68 109 103 77   Ĉ = ·  8 −8 −8 8 8 −8 −8 8. 24 35 55 64 81 104 113 92  8 49 64 78 87 103 121 120 101 6 −12 3 10 −10 −3 12 −6 72 92 95 98 112 100 103 99 4 3 S = 5000/QF , if QF < 50, and 200 − 2 · QF otherwise, and QF is the quality factor [56]. If QF = 50, then Q = Q0 . Decreasing values of QF lead to higher compression ratios (with image total destruction at QF = 0); whereas increasing values leads to lower compression ratios (with best possible quality at QF = 100). In our experiments, we adopted QF varying from 10 to 90 in steps of 5. In the JPEG decoder, each sub-block is initially arithmetic decoded and dequantized according to: M̂i,j = Ji,j ⊙ Q. Then, the sub-blocks are inverse transformed: Îi,j = P−1 · M̂i,j · P−⊤ . Original and compressed images were compared for image degradation. The structural similarity index (SSIM) [63] and the spectral residual based similarity (SR-SIM) [64] were separated as image quality measures. The SSIM takes into account luminance, contrast, and the image structure to quantify the image degradation, being consistent with subjective quality measurements [65]. On its turn, the SR-SIM is based on the hypothesis that the visual saliency maps of natural images are closely related to their perceived quality. This measure could outperform several state-of-the-art figures of merit in experiments with standardized datasets [64]. We did not consider the peak signal-tonoise ratio (PSNR) as a quality measure, because it is not a suitable metric to capture the human perception of image fidelity and quality [57]. For each value of QF , we considered average measure values instead of values from particular images. This approach is less prone to variance effects and fortuitous data [36,66]. For direct comparison, we selected the exact DTT [15], the approximation proposed in [42], and the proposed approximation. As an extra reference, we also included the results from the standard JPEG, which is based on the exact DCT. Figure 2 displays the results. For both selected measures, the proposed approximation performed very closely to the exact DTT, specially at −8 −6 8 −4 10 −12 −4 8 12 −10 −8 6 4 −3 The fast algorithm for the above transformation requires 32 additions and 14 bit-shifting operations [69]. Therefore, the proposed 8-point transform requires 25% less additions and 57% less bitshifting operations than the fast algorithm for Ĉ. Eleven 300-frame common intermediate format (CIF) videos obtained from an online test video database [70] were encoded with the standard software and then with the modified software. We employed the software default settings and conducted the simulation under two scenarios: (i) target bitrate varying from 50 to 500 kbps with steps of 50 kbps and (ii) quantization parameter (QP) varying from 5 to 50 with steps of 5. Psychovisual optimization was disabled in order to obtain valid SSIM values. Besides PSNR evaluation, the discussed software library [68] offers natively SSIM measurements for video quality assessment. Average SSIM of the luma component were computed for all reconstructed frames. The results are shown in Figure 4 in terms of the absolute percentage error (APE) [38] of the SSIM with respect to the standard DCT-based transformation in the original H.264/AVC codec. This measure is given by: APE(SSIM) = SSIMH.264 − SSIMP , SSIMH.264 where SSIMH.264 returns the SSIM figures as computed according to the H.264 standard and SSIMP represents the SSIM when the exact DTT, the approximation in [42], or the proposed approximation are considered. SSIM curves for the DCT are absent, because they were employed as performance references. The use of the proposed transform effects a minor degradation in the video quality. It also could perform better than the previous approximation in all cases. 6 1.00 1.000 0.95 0.995 Average Y-SR-SIM Average Y-SSIM 0.990 0.90 0.85 0.80 JPEG Exact DTT [15] Approx. [42] Proposed 0.75 0.70 10 20 30 40 50 60 Quality factor 70 80 0.985 0.980 0.975 JPEG Exact DTT [15] Approx. [42] Proposed 0.970 0.965 0.960 90 10 20 30 40 50 60 Quality factor (a) 70 80 90 (b) Figure 2: Average SSIM (top) and SR-SIM (bottom) measurements for image compression for the considered transforms at several values of QF . (a) Exact DTT [15], QF = 15 (b) Exact DTT [15], QF = 50 (c) Proposed, QF = 15 (d) Proposed, QF = 50 Figure 3: Compressed ‘Lena’ image for QF = 15 and QF = 50. 0.04 Exact DTT [15] Approx. [42] Proposed 0.035 Average Y-SSIM APE Average Y-SSIM APE 0.040 Exact DTT [15] Approx. [42] Proposed 0.05 0.03 0.02 0.030 0.025 0.020 0.015 0.010 0.01 0.005 0.00 100 200 300 Target bitrate (kbps) 400 0.000 500 10 20 30 QP (a) (b) Figure 4: Video quality assessment in terms of target bitrate and QP. 7 40 50 DTT approximation in [42], respectively. Moreover, the proposed transform exhibited similar coding performance with the exact DTT and outperformed previous approximations [42] according to computational experiments with popular visual image compression standards. In terms of video coding, the results from the proposed tool were virtually indistinguishable from the ones furnished by the approximation in [42]. Thus, the new tool outperform the competing methods both in computational cost and coding performance. The proposed method was embedded into the JPEG standard and the standard software library for H.264/AVC video coding. Obtained results showed negligible degradation when compared to the standard DCT-based compression methods in both cases. The 2-D versions were realized in FPGA using ROACH2 hardware platform and ASIC place and route was realized using Cadence encounter with AMS standard cells and the results show a 43.1% reduction in the number of CLB for the FPGA realization and a 57.7% reduction in areatime figure for the ASIC place and route realization when compared with the exact DTT. The proposed design could excel in providing high operation frequency and very low power consumption. Therefore, the proposed approximation offers low computational complexity while maintaining good coding performance. Systems that operate under low processing constraints and require video streaming can benefit of the proposed low-complexity codecs and low-power hardware. In particular, applications in the following contexts meet such requirements that need lowcomplexity [72]: environmental monitoring, habitat monitoring, surveillance, structural monitoring, equipment diagnostics, disaster management, and emergency response [73]. Figure 5 displays the first encoded frame of two standard video sequences at low bitrate (200 kbps). The compressed frames resulting from the original and modified codecs are visually indistinguishable. 6 Hardware Section To compare the hardware resource consumption of the proposed approximate DTT against the exact DTT fast algorithm proposed in [15], algorithm proposed in [42] and the Loeffler DCT [61], the 2-D version of both algorithms were initially modeled and tested in Matlab Simulink and then were physically realized on a Xilinx Virtex-6 XC6VSX475T-1FF1759 Reconfigurable Open Architecture Computing Hardware-2 (ROACH2) board [71]. The ROACH2 board consists of a Xilinx Virtex 6 FPGA, 16 complex analog-to-digital converters (ADC), multigigabit transceivers and a 72-bit DDR3 RAM. The 1-D versions were initially modeled and the 2-D versions were generated using two 1-D designs along with a transpose buffer. Designs were verified using more than 10000 test vectors with complete agreement with theoretical values. Results are shown in Table 3. Metrics, including configurable logic blocks (CLB) and flip-flop (FF) count, critical path delay (Tcpd , in ns), and maximum operating frequency (Fmax , in MHz) are provided. The percentage reduction in the number of CLBs and FFs were 43.2% and 25.0%, respectively, compared with the exact DTT fast algorithm proposed in [15]. In is important to emphasize that the approximation in [42] is asymmetric; the forward and inverse transform possess different structures, being the inverse operation more complex (cf. Table 2). For comparisons, we adopt the average measurement between forward and inverse realizations. The proposed approximation could provide higher maximum operating frequency with improvements of 85.9%, 43.5%, and 9.7% when compared to the Loeffler DCT [61], the exact DTT [15], and the design in [42], respectively. The ASIC realization was done by porting the hardware description language code to 0.18 um CMOS technology and was subjected to synthesis and place-and-route according to the Cadence Encounter Digital Implementation (EDI) for AMS libraries. Libraries for the best case scenario were employed in getting the place-and-route results with gate voltage of 1.8 V. The adopted figures of merit for the ASIC synthesis were: area (A) in mm2 , area-time complexity (AT ) in mm2 · ns, area-timesquared complexity (AT 2 ) in mm2 · ns2 , dynamic (Dp ) power consumption in mW/MHz, critical path delay (Tcpd ) in ns, and maximum operating frequency (Fmax ) in MHz. Results are displayed in Table 4. The figures of merit AT and AT 2 had percentage reductions of 57.7% and 57.4% when compared with the exact DTT. Thus, the proposed design could attain reductions of 17.3%, 20.6%, and 82.1% for area, AT 2 , Tcpd , and dynamic power consumption, respectively, when compared to [42]. 7 Acknowledgment Arjuna Madanayake thanks the Xilinx University Program (XUP) for the Xilinx Virtex-6 Sx475 FPGA device installed in on the ROACH2 board. References [1] A. F. Nikiforov, S. K. Suslov, and V. B. Uvarov, Classical Orthogonal Polynomials of a Discrete Variable, ser. Springer Series in Computational Physics. Springer Berlin Heidelberg, 1991. [2] P. D. Dragnev and E. B. Saff, “Constrained energy problems with applications to orthogonal polynomials of a discrete variable,” Journal d’Analyse Mathematique, vol. 72, pp. 223–259, 1997. [Online]. Available: http://dx.doi.org/10.1007/BF02843160 [3] M. Câmara, J. Fábrega, M. A. Fiol, and E. Garriga, “Some families of orthogonal polynomials of a discrete variable and their applications to graphs and codes,” The Electronic Journal of Combinatorics, vol. 16, pp. 1–30, 2009. [4] H. Zhu, M. Liu, H. Shu, H. Zhang, and L. Luo, “General form for obtaining discrete orthogonal moments,” IET Image Processing, vol. 4, pp. 335–352, Oct 2010. [5] A. Goshtasby, “Template matching in rotated images,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 7, no. 3, pp. 338–344, May 1985. [6] M. I. Heywood and P. D. Noakes, “Fractional central moment method for movement-invariant object classification,” IEE Proceedings– Vision, Image and Signal Processing, vol. 142, no. 4, pp. 213–219, Aug 1995. Discussion and Conclusion In this work, a low-complexity near-orthogonal 8-point DTT approximation suitable for image and video coding was proposed. A fast algorithm for proposed DTT approximation which requires only 24 additions and six bit-shifting operations was also introduced. This fast algorithm can be used for both forward and near inverse transformations. The additive arithmetic cost of the proposed approximation is 45.5% and 2.05% lower when compared with the exact DTT fast algorithm and the [7] V. Markandey and R. I. P. de Figueiredo, “Robot sensing techniques based on high-dimensional moment invariants and tensors,” IEEE Transactions on Robotics and Automation, vol. 8, no. 2, pp. 186– 195, Apr 1992. [8] R. Mukundan, S. H. Ong, and R. A. Lee, “Image analysis by Tchebichef moments,” IEEE Transactions on Image Processing, vol. 10, pp. 1357–1364, 2001. [9] L. Leida, Z. Hancheng, Y. Gaobo, and Q. Jiansheng, “Referenceless measure of blocking artifacts by Tchebichef kernel analysis,” IEEE Signal Processing Letters, vol. 21, no. 1, pp. 122–125, Jan 2014. 8 (a) Foreman, H.264 (b) Foreman, Approx. [42] (c) Foreman, Proposed Figure 5: First frame of the compressed ‘Foreman’ sequence, with a target bitrate of 200 kbps. Table 3: Hardware resource consumption using Xilinx Virtex-6 XC6VSX475T 1FF1759 device Method CLB FF Tcpd (ns) Fmax (MHz) Exact DTT [15] 2941 7271 7.688 130.07 Approximation in [42] 1515 6058 5.596 178.69 Inverse Approximation in [42] 1713 4834 6.184 161.71 Loeffler DCT [61] 3250 4413 9.956 100.44 Proposed DTT 1671 5455 5.356 186.70 Table 4: Hardware resource consumption for CMOS 0.18 um ASIC place and route Area (mm2 ) AT AT 2 Tcpd (ns) Fmax (MHz) Dp (mW/MHz) Exact DTT [15] 0.872 3.84 16.92 4.405 227.01 0.182 Approximation in [42] 0.237 1.34 7.52 5.635 177.46 0.171 Inverse Approximation in [42] 0.323 1.79 9.89 5.536 180.64 0.724 Loeffler DCT [61] 0.684 4.20 25.85 6.148 162.65 1.961 Proposed 0.366 1.62 7.20 4.434 225.53 0.080 FRS Method 9 [10] J.-L. Rose, C. Revol-Muller, D. Charpigny, and C. Odet, “Shape prior criterion based on Tchebichef moments in variational region growing,” in 2009 16th IEEE International Conference on Image Processing (ICIP), Nov 2009, pp. 1081–1084. [30] ——, “ITU-T recommendation H.263 version 1: Video coding for low bit rate communication,” Technical Report, ITU-T, 1995. [31] I. Richardson, The H.264 Advanced Video Compression Standard, 2nd ed. John Wiley and Sons, 2010. [11] H. Zhang, X. Dai, P. Sun, H. Zhu, and H. Shu, “Symmetric image recognition by Tchebichef moment invariants,” in 2010 17th IEEE International Conference on Image Processing (ICIP), Sept 2010, pp. 2273–2276. [32] G. J. Sullivan, J. Ohm, W.-J. Han, and T. Wiegand, “Overview of the high efficiency video coding (HEVC) standard,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, pp. 1649– 1668, 2012. [12] Q. Li, H. Zhu, and Q. Liu, “Image recognition by combined affine and blur Tchebichef moment invariants,” in 2011 4th International Congress on Image and Signal Processing (CISP), vol. 3, Oct 2011, pp. 1517–1521. [33] F. Bossen, B. Bross, K. Suhring, and D. Flynn, “HEVC complexity and implementation analysis,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 12, pp. 1685–1696, Dec 2012. [13] H. Huang, G. Coatrieux, H. Shu, L. Luo, and C. Roux, “Blind integrity verification of medical images,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 6, pp. 1122–1126, Nov 2012. [34] Google Inc., “VP9,” The http://www.webmproject.org/vp9/, 2015. [14] S. Ishwar, P. K. Meher, and M. N. S. Swamy, “Discrete Tchebichef transform–a fast 4 × 4 algorithm and its application in image/video compression,” in 2008 IEEE International Symposium on Circuits and Systems (ISCAS), 2008, pp. 260–263. [15] S. Prattipati, S. Ishwar, P. K. Meher, and M. N. S. Swamy, “A fast 8×8 integer Tchebichef transform and comparison with integer cosine transform for image compression,” in 2013 IEEE 56th International Midwest Symposium on Circuits and Systems (MWSCAS), 2013, pp. 1294–1297. [16] N. A. Abu, S. L. Wong, N. Herman, and R. Mukundan, “An efficient compact Tchebichef moment for image compression,” in 2010 10th International Conference on Information Sciences Signal Processing and their Applications (ISSPA), May 2010, pp. 448–451. [17] Q. Li and H. Zhu, “Block-based compressed sensing of image using directional Tchebichef transforms,” in 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Oct 2012, pp. 2207–2212. [18] R. K. Senapati, U. C. Pati, and K. K. Mahapatra, “Reduced memory, low complexity embedded image compression algorithm using hierarchical listless discrete Tchebichef transform,” IET Image Processing, vol. 8, no. 4, pp. 213–238, Apr 2014. [19] N. Ahmed, T. Natarajan, and K. R. Rao, “Discrete cosine transform,” IEEE Transactions on Computers, vol. C-23, no. 1, pp. 90–93, Jan. 1974. WebM Project, [35] T. I. Haweel, “A new square wave transform based on the DCT,” Signal Processing, vol. 81, pp. 2309–2319, 2001. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0165168401001062 [36] R. J. Cintra and F. M. Bayer, “A DCT approximation for image compression,” IEEE Signal Processing Letters, vol. 18, no. 10, pp. 579–582, Oct 2011. [37] F. M. Bayer and R. J. Cintra, “DCT-like transform for image compression requires 14 additions only,” Electronics Letters, vol. 48, no. 15, pp. 919–921, July 2012. [38] R. J. Cintra, F. M. Bayer, and C. J. Tablada, “Low-complexity 8-point DCT approximations based on integer functions,” Signal Processing, vol. 99, pp. 201–214, 2014. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0165168413005161 [39] S. Bouguezel, M. O. Ahmad, and M. N. S. Swamy, “Low-complexity 8×8 transform for image compression,” Electronics Letters, vol. 44, no. 21, pp. 1249–1250, Oct 2008. [40] ——, “A low-complexity parametric transform for image compression,” in 2011 IEEE International Symposium on Circuits and Systems (ISCAS), May 2011, pp. 2145–2148. [41] ——, “Binary discrete cosine and hartley transforms,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 60, no. 4, pp. 989–1002, Apr 2013. [42] P. A. M. Oliveira, R. J. Cintra, F. M. Bayer, S. Kulasekera, and A. Madanayake, “A discrete Tchebichef transform approximation for image and video coding,” IEEE Signal Processing Letters, vol. 22, no. 8, pp. 1137–1141, Aug 2015. [20] F. Ernawan, N. A. Abu, and N. Suryana, “TMT quantization table generation based on psychovisual threshold for image compression,” in 2013 International Conference of Information and Communication Technology (ICoICT), Mar 2013, pp. 202–207. [43] H. Bateman and A. Erdélyi, Higher transcendental functions. McGraw-Hill, 1953, vol. 2. [Online]. Available: http://books.google.com.br/books?id=p lQAAAAMAAJ [21] R. K. Senapati, U. C. Pati, and K. K. Mahapatra, “A low complexity embedded image coding algorithm using hierarchical listless DTT,” in 2011 8th International Conference on Information, Communications and Signal Processing (ICICS), Dec 2011, pp. 1–5. [44] H. S. Malvar, A. Hallapuro, M. Karczewicz, and L. Kerofsky, “Lowcomplexity transform and quantization in H.264/AVC,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 7, pp. 598–603, Jul 2003. [22] F. Ernawan, E. Noersasongko, and N. A. Abu, “An efficient 2×2 Tchebichef moments for mobile image compression,” in 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS), Dec 2011, pp. 1–5. [45] R. Blahut, Fast Algorithms for Signal Processing. versity Press, 2010. [23] L. W. Chew, L.-M. Ang, and K. P. Seng, “Survey of image compression algorithms in wireless sensor networks,” in 2008 International Symposium on Information Technology (ITSim), vol. 4, Aug 2008, pp. 1–9. [47] J. W. Eaton, D. Bateman, S. Hauberg, and R. Wehbring, GNU Octave version 3.8.0 Documentation, 3rd ed. Free Software Foundation, Inc., Feb 2011. [24] M. Guo, M. H. Ammar, and E. W. Zegura, “V3: a vehicle-tovehicle live video streaming architecture,” in 2005 3rd IEEE International Conference on Pervasive Computing and Communication (PerCom), Mar 2005, pp. 171–180. [25] D. H. Friedman, “Streaming implementation of video algorithms on a low-power parallel architecture,” in 2013 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Dec 2013, pp. 650–653. [26] K. Nakagaki and R. Mukundan, “A fast 4×4 forward discrete Tchebichef transform algorithm,” IEEE Signal Processing Letters, vol. 14, pp. 684–687, 2007. [27] G. K. Wallace, “The JPEG still picture compression standard,” IEEE Transactions on Consumer Electronics, vol. 38, no. 1, pp. xviii– xxxiv, Feb 1992. [28] International Organisation for Standardisation, “Generic coding of moving pictures and associated audio information part 2: Video, ISO/IEC JTC1/SC29/WG11 coding of moving pictures and audio,” 1994. [29] International Telecommunication Union, “ITU-T recommendation H.261 version 1: Video codec for audiovisual services at p × 64 kbits,” Technical Report, ITU-T, 1990. 10 Cambridge Uni- [46] MATLAB, “version 8.1 (R2013a) documentation,” Natick, MA, 2013. [48] Python, “version 2.7.6 documentation,” Delaware, US, 2015. [49] G. A. F. Seber, A Matrix Handbook for Statisticians, ser. Wiley Series in Probability and Mathematical Statistics. Hoboken, NJ: John Wiley and Sons, Inc., 2008. [50] B. N. Flury and W. Gautschi, “An algorithm for simultaneous orthogonal transformation of several positive definite symmetric matrices to nearly diagonal form,” SIAM Journal on Scientific and Statistical Computing, vol. 7, no. 1, pp. 169–184, Jan. 1986. [Online]. Available: http://dx.doi.org/10.1137/0907013 [51] V. K. Goyal, “Theoretical foundations of transform coding,” IEEE Signal Processing Magazine, vol. 18, no. 5, pp. 9–21, Sept 2001. [52] J. Katto and Y. Yasuda, “Performance evaluation of subband coding and optimization of its filter coefficients,” Journal of Visual Communication and Image Representation, vol. 2, pp. 303–313, 1991. [Online]. Available: http://www.sciencedirect.com/science/article/pii/1047320391900114 [53] V. Britanak, P. C. Yip, and K. R. Rao, Discrete Cosine and Sine Transforms. Academic Press, 2007. [Online]. Available: http://books.google.com.br/books?id=iRlQHcK-r kC [54] C. J. Tablada, F. M. Bayer, and R. J. Cintra, “A class of DCT approximations based on the Feig–Winograd algorithm,” Signal Processing, vol. 113, pp. 38–51, 2015. [55] R. J. Cintra, H. M. Oliveira, and C. O. Cintra, “The rounded Hartley transform,” in Proceedings of the IEEE International Telecommunications Symposium–ITS’2002, Sept 2002, pp. 1357–1364. [64] L. Zhang and H. Li, “SR-SIM: A fast and high performance IQA index based on spectral residual,” in 2012 19th IEEE International Conference on Image Processing (ICIP), Sep 2012, pp. 1473–1476. [56] W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression Standard, ser. Chapman & Hall digital multimedia standards series. Springer, 1993. [65] Z. Wang and A. C. Bovik, “Reduced- and no-reference image quality assessment,” IEEE Signal Processing Magazine, vol. 28, no. 6, pp. 29–40, Nov 2011. [57] Z. Wang and A. C. Bovik, “Mean squared error: Love it or leave it? a new look at signal fidelity measures,” IEEE Signal Processing Magazine, vol. 26, no. 1, pp. 98–117, Jan 2009. [66] S. M. Kay, Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory, ser. Prentice Hall Signal Processing Series. Upper Saddle River, NJ: Prentice-Hall, 1993, vol. 1. [58] C.-K. Fong and W.-K. Cham, “LLM integer cosine transform and its fast algorithm,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 6, pp. 844–854, Jun 2012. [67] R. Pandit, N. Khosla, G. Singh, , and H. Sharma, “Image compression and quality factor in case of JPEG image format,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, pp. 2578–2581, Jul 2013. [59] F. M. Bayer, R. J. Cintra, A. Madanayake, and U. S. Potluri, “Multiplierless approximate 4-point DCT VLSI architectures for transform block coding,” Electronics Letters, vol. 49, no. 24, pp. 1532–1534, Nov 2013. [60] A. V. Oppenheim and R. W. Schafer, Discrete-time signal processing, 3rd ed., ser. Prentice-Hall signal processing series. Prentice Hall, 2010. [61] C. Loeffler, A. Ligtenberg, and G. S. Moschytz, “A practical fast 1D DCT algorithms with 11 multiplications,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, May 1989, pp. 988–991. [62] University of Southern California, Signal and Image Processing Institute, “The USC-SIPI image database,” http://sipi.usc.edu/database/, 2015. [63] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, Apr 2004. 11 [68] x264 team, “x264,” http://www.videolan.org/developers/x264.html, 2015. [69] S. Gordon, D. Marpe, and T. Wiegand, “Simplied use of 8×8 transform–updated proposal and results,” Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG, doc. JVT–K028, Munich, Germany, Mar 2004. [70] “Xiph.org Video Test Media,” https://media.xiph.org/video/derf/, 2015. [71] (2015) ROACH2. https://casper.berkeley.edu. [72] I. F. Akyildiz, T. Melodia, and K. R. Chowdhury, “A survey on wireless multimedia sensor networks,” Computer Networks, vol. 51, pp. 921–960, 2007. [73] N. Kimura and S. Latifi, “A survey on data compression in wireless sensor networks,” in 2005 International Conference on Information Technology: Coding and Computing (ITCC), vol. 2, Apr 2005, pp. 8–13.
8cs.DS
ON THE FINITENESS OF BASS NUMBERS OF LOCAL COHOMOLOGY MODULES AND COMINIMAXNESS KAMAL BAHMANPOUR, REZA NAGHIPOUR∗ AND MONIREH SEDGHI arXiv:1309.0431v1 [math.AC] 2 Sep 2013 DEDICATED TO PROFESSOR HYMAN BASS Abstract. In this paper, we continue the study of cominimaxness modules with respect to an ideal of a commutative Noetherian ring (cf. [2]), and Bass numbers of local cohomology modules. Let R denote a commutative Noetherian local ring and I an ideal of R. We first show that the Bass numbers µ0 (p, HI2 (R)) and µ1 (p, HI2 (R)) are finite for all p ∈ Spec R, whenever R is regular. As a consequence, it follows that the Goldie dimension of HI2 (R) is finite. Also, for a finitely generated R-module M of dimension d, it is shown that the Bass numbers of HId−1 (M ) are finite if and only if ExtiR (R/I, HId−1 (M )) be minimax for all i ≥ 0. Finally, we prove that if dim R/I = 2, then the Bass numbers of HIn (M ) are finite if and only if ExtiR (R/I, HIn (M )) be minimax, for all i ≥ 0, where n is a non-negative integer. 1. Introduction Throughout this paper, let R denote a commutative Noetherian ring (with identity) and I an ideal of R. For an R-module M, the ith local cohomology module of M with respect to I is defined as HIi (M) = lim ExtiR (R/I n , M). −→ n≥1 We refer the reader to [10] and [6] for more details about local cohomology. An important problem in commutative algebra is to determine when the Bass numbers of the ith local cohomology module HIi (M) is finite. In [12] Huneke conjectured that for any ideal I in a regular local ring (R, m, k), the Bass numbers i (Rp )) µi (p, HIi (R)) = dimk(p) ExtiRp (k(p), HIR p are finite for all i and j, where k(p) := Rp /pRp . In particular the injective resolution of the local cohomology has only finitely many copies of the injective hull of R/p for any p. There is evidence that this conjecture is true. It is shown that by Huneke and Sharp [13] and Lyubeznik [16, 17] that the conjecture holds for a regular local ring containing Key words and phrases. Bass numbers, cominimax modules, Krull dimension, local cohomology, minimax modules. 2000 Mathematics Subject Classification: 13D45, 14B15, 13E05. This research was in part supported by a grant from IPM (No. 89130053, 89130048). ∗ Corresponding author: e-mail: [email protected] (Reza Naghipour). 1 2 KAMAL BAHMANPOUR, REZA NAGHIPOUR AND MONIREH SEDGHI a field. We remark that the Bass numbers might be infinite if R is not regular. For example, if I := (x, y)R ⊆ R := k[x, y, z, w]/(xz − yw), then µ0 (m, HI2 (R)) = ∞ for m := (x, y, z, w)R (see [11]). We say that M is a minimax module if there is a finitely generated submodule N of M, such that M/N is Artinian. The interesting class of minimax modules was introduced by H. Zöshinger in [23] and he has in [23] and [24] given many equivalent conditions for a module to be minimax. Finally, the R-module M is said to be an I-cominimax if support of M is contained in V (I) and ExtiR (R/I, M) is minimax for all i ≥ 0. The concept of the I-cominimax modules were introduced in [2] as a generalization of important notion of I-cofinite modules. The main subject of the paper is to continue the study of I-cominimaxness properties and the finiteness of Bass numbers of local cohomology modules. First, we provide a partial answer to Huneke’s conjecture. Namely, it will be shown that the Bass numbers of µ0 (p, HI2 (R)) and µ1 (p, HI2 (R)) are finite for all ideals I in a regular local ring R and for all p ∈ Spec R. Pursuing this point of view further we establish the R-module HI2 (R) has finite Goldie dimension. Recall that an R-module M is said to have finite Goldie dimension if M does not contain an infinite direct sum of non-zero submodules, or equivalently the injective hull E(M) of M decompose as a finite direct sum of indecomposable (injective) submodules. Since the Bass numbers of the local cohomology modules HIi (M) are not finite in general, several attempts made to find some conditions for the ideal I to have finiteness for the Bass numbers of the local cohomology modules with support in I in terms of I-cominimaxness properties. The following result is in this way: Theorem 1.1. Let (R, m) be a local (Noetherian) ring, I an ideal of R and M a finitely generated R-module of dimension d. Then the Bass numbers of HId−1 (M)/Γm (HId−1 (M)) are finite. One of our tools for proving Theorem 1.1 is the following: Proposition 1.2. Let (R, m), I and M be as in Theorem 1.1. Then Hm1 (HId−1 (M)) is an Artinian R-module, where d = dim M. Pursuing this point of view further we derive the following consequence of Theorem 1.1. Theorem 1.3. Let (R, m) be a local (Noetherian) ring, I an ideal of R and M a finitely generated R-module of dimension d. Then the following conditions are equivalent: (i) The Bass numbers of HId−1 (M) are finite. (ii) Soc(HId−1 (M)) is finitely generated. (iii) HId−1 (M) is I-cominimax. As the second main result of this paper we obtain a characterization of the finiteness of Bass numbers of ith local cohomology modules of M with respect to I of dimension 2, i.e. dim R/I = 2. More precisely we shall show that: Theorem 1.4. Let (R, m) be a local (Noetherian) ring and let I be an ideal of R with dim R/I = 2. Let M be a finitely generated R-module and i a non-negative integer. Then the Bass numbers of HIi (M) are finite if and only if the R-module HIi (M) is I-cominimax. BASS NUMBERS AND COMINIMAXNESS 3 The proof of Theorem 1.4 is given in 2.17. As an application, we derive the following consequences of Theorem 1.4, which is a characterization of I-cominimaxness of HIi (M) in terms of finiteness of Bass numbers of local cohomology modules HIi (M) for certain ideal I of R. Theorem 1.5. Let (R, m) be a local (Noetherian) ring, and let I be an ideal of R such that dim R/I = 2. Let M be a finitely generated R-module and t a non-negative integer. Then the following conditions are equivalent: (i) Soc HIi (M) is finitely generated for all i ≤ t. (ii) ExtjR (R/m, HIi (M)) is finitely generated for all j ≥ 0 and all i ≤ t − 1. (iii) HIi (M) is I-cominimax for all i ≤ t − 1. Using Theorem 1.5 we obtain some results as following: Corollary 1.6. Let (R, m) be a regular local ring of dimension d ≥ 2 containing a field and let I be an ideal of R with dim R/I = 2. Then the R-module HIi (R) is I-cominimax for all i ≥ 0. Corollary 1.7. Let R be a Noetherian ring, M a finitely generated R-module and I an ideal of R such that dim M/IM = 2. Let Σ := {p ∈ Spec R : µj (p, HIi (M)) = ∞ for some integers i ≥ 0 and j ≥ 0}. Then Σ is countable and Σ ⊆ Max(R). Corollary 1.8. Let (R, m) be a local (Noetherian) ring, M a finitely generated R-module and I an ideal of R such that dim M/IM = 3. Then the set Σ := {p ∈ Spec R : µj (p, HIi (M)) = ∞ for some integers i ≥ 0 and j ≥ 0}, is countable. Throughout this paper, R will always be a commutative Noetherian ring with non-zero identity and I will be an ideal of R. For each R-module L, we denote by AsshR L (resp. mAssR L) the set {p ∈ AssR L : dim R/p = dim L} (resp. the set of minimal primes of AssR L). We shall use Max R to denote the set of all maximal ideals of R. Also, for any ideal a of R, we denote {p ∈ Spec R : p ⊇ a} by V (a). Finally, for any ideal b of R, the radical of b, denoted by Rad(b), is defined to be the set {x ∈ R : xn ∈ b for some n ∈ N}. For any unexplained notation and terminology we refer the reader to [6] and [18]. 2. The Results Let (R, m) be a local (Noetherian) ring and I an ideal of R. As noted in the introduction, it is well known that the Bass numbers µi (p, HI2 (R)) are finite whenever R is a regular ring containing a field. Our first result shows that if R is regular, then µi (p, HI2 (R)) is finite for i ∈ {0, 1}. Theorem 2.1. Let (R, m) be a regular local ring and I an ideal of R. Then the Bass numbers µ0 (p, HI2 (R)) and µ1 (p, HI2 (R)) are finite for all p ∈ Spec R. 4 KAMAL BAHMANPOUR, REZA NAGHIPOUR AND MONIREH SEDGHI i Proof. In view of [5, Proposition 2.20] the Rp -modules ExtjRp (κ(p), HIR (Rp )) are finitely p generated for all j ≥ 0 and i = 0, 1. Hence it follows from [15, Corollary 3.5] that µ0 (p, HI2 (R)) and µ1 (p, HI2(R)) are finite.  As a corollary of the previous theorem, we deduce that the Goldie dimension of HI2 (R) is finite. Corollary 2.2. Let (R, m) be a regular local ring and I an ideal of R. Then the R-module HI2 (R) has finite Goldie dimension. Proof. As AssR (HI2 (R)) is finite, by [4, Theorem 2.4], it follows from Theorem 2.1 and the definition that HI2 (R) has finite Goldie dimension.  For an arbitrary R-module M, the next reult gives us a necessary and sufficient condition for the finiteness of µi (p, M), the Bass numbers of M, in terms of the minimaxness of ExtiR (R/I, M). Recall that for any module L over a local ring (R, m), the socle of L, denoted by Soc(L), is defined to be the R-module HomR (R/m, L). Theorem 2.3. Let (R, m) be a local (Noetherian) ring and I an ideal of R such that dim R/I = 1. Suppose that M is an R-module and n ≥ 0 an integer. Then the following conditions are equivalent: (i) µi (p, M) is finite for all p ∈ V (I) and for all i ≤ n. (ii) ExtiR (R/I, M) is minimax for all i ≤ n. Proof. First we show (i)=⇒(ii). Let q ∈ mAssR (R/I) and i ≤ n. Then q 6= m, and so Rad(q + Rx) = m for all x ∈ m\q. Hence it follows from [7, Proposition 1] that the Rmodule ExtiR (R/q + Rx, M) is finitely generated for all i ≤ n. (Note that ExtiR (R/m, M) is finitely generated for all i ≤ n.) Now, for x ∈ m\q the exact sequence x 0 → R/q −→ R/q −→ R/q + Rx → 0, provides the following exact sequence: x ExtiR (R/q + Rx, M) −→ ExtiR (R/q, M) −→ ExtiR (R/q, M), which implies that the R-module Soc(ExtiR (R/q, M)) is finitely generated, for all i ≤ n. On the other hand, if L := ExtiR (R/q, M), then as by assumption the Rq -module Lq is finitely generated, it follows that there exists a finitely generated submodule K of L, such that (L/K)q = 0, and so Supp(L/K) ⊆ V (m). Finally, the exact sequence 0 → K −→ L −→ L/K −→ 0. induces the exact sequence Soc(L) −→ Soc(L/K) −→ Ext1R (R/m, K). Hence the R-module Soc(L/K) is finitely generated. Consequently in view of [19, Proposition 4.1] the R-module L/K is Artinian, that is L is a minimax R-module. Now, the assertion follows from [2, Corollary 2.8]. In order to prove (ii)=⇒(i), use [2, Corollary 2.8] and the definition of the minimax BASS NUMBERS AND COMINIMAXNESS modules. 5  Corollary 2.4. Let R, I and M be as in Theorem 2.3. Then the following conditions are equivalent: (i) µi (p, M) is finite for all i ≥ 0 and all primes p ∈ V (I). (ii) ExtiR (R/I, M) is minimax for all i ≥ 0. Proof. The result follows from Theorem 2.3.  Corollary 2.5. Let (R, m) be a local (Noetherian) ring. Let I and J be tow ideals of R such that dim R/I ≤ 1 and dim R/J = 1. Then the R-modules ExtiR (R/J, HIj (R)) are minimax for all integers i, j ≥ 0. Proof. The assertion follows from [5, Corollary 2.10] and Theorem 2.3.  Before we state the next corollary, recall that for an ideal I of a commutative ring R, the ideal transform DI (R) of I defined by DI (R) := lim HomR (I n , R). −→ n≥1 See [6, Section 2.2] for the basic properties of ideal transforms. Corollary 2.6. Let (R, m) be a regular local ring and let I, J be two ideals of R such that dim R/I = 1. Then (i) For any integer i ≥ 0, the R-modules ExtiR (R/I, DJ (R)) and ExtiR (R/I, HJ1 (R)) are minimax. (ii) The R-modules HomR (R/I, HJ2 (R)) and Ext1R (R/I, HJ2 (R)) are minimax. (iii) For all integers i, j ≥ 0, the R-module ExtiR (R/I, HJj (R)) is minimax, whenever R contains a field. Proof. (i) follows from [5, Proposition 2.20] and Theorem 2.3. In order to prove (ii) use Theorems 2.3 and 2.1. Finally, (iii) follows from Corollary 2.4 and [13, 17].  In order to state next results, we need here some preliminary results about the Artinianess of local cohomology modules. Theorem 2.7. Let (R, m) be a local (Noetherian) ring and I an ideal of R such that dim R/I = 2. Then for any finitely generated R-module M, the R-module Hm1 (HIi (M)) is Artinian for all i ≥ 0. Proof. Since dim R/I = 2, there exists x ∈ m such that dim R/I + Rx = 1. Let J := I + Rx. As Hm1 (HI0 (M)) is Artinian, we may assume that i ≥ 1. Then by [21, Corollary 1.4], there exists the following exact sequence, 0 → HJ1 (HIi−1 (M)) → HJi (M) → HJ0 (HIi (M)) → 0. 6 KAMAL BAHMANPOUR, REZA NAGHIPOUR AND MONIREH SEDGHI Now, as dim HJ1 (HIi−1 (M)) ≤ 1, it follows from this exact sequence that the sequence Hm1 (HJi (M)) → Hm1 (HJ0 (HIi (M))) → 0, is exact, and so by [5, Corollary 2.16] the R-module Hm1 (HJ0 (HIi (M))) is Artinian. On the other hand, since dim R/J = 1 there exists y ∈ m such that J + Ry is m-primary and so 1 HJ+Ry (HJ0 (HIi (M))) = Hm1 (HJ0 (HIi (M))), is Artinian R-module. Moreover, using again [21, Corollary 1.4] it follows that the sequences: 0 → HJ1 (HIi (M)) → HJi+1 (M) → HJ0 (HIi+1(M)) → 0, 1 0 0 → HJ+Ry (HJ0 (HIi (M))) → Hm1 (HIi (M)) → HJ+Ry (HJ1 (HIi (M))) → 0, 0 are exact. Now, since by [5, Corollary 2.16], HJ+Ry (HJi+1 (M)) is Artinian, it follows that 0 HJ+Ry (HJ1 (HIi (M))) is Artinian. Consequently the R-module Hm1 (HIi (M)) is Artinian, as required.  Theorem 2.8. Let (R, m) be a local (Noetherian) ring, I an ideal of R and M a finitely generated R-module of dimension d ≥ 1. Then Hm1 (HId−1 (M)) is an Artinian R-module. Proof. We use induction on d. When d = 1, there is nothing to prove. Now suppose that d > 1 and the result has been proved for non-zero finitely generated R-modules of dimension d − 1. By replacing M by M/ΓI (M) we may assume that M is a non-zero finitely generated I-torsion-free R-module. Then, by [6, Lemma 2.1.1], the ideal I contains an element x which is a non-zerodevisor on M. Hence the exact sequence x 0 −→ M −→ M −→ M/xM −→ 0 induces an exact sequence x x · · · −→ HIj (M) −→ HIj (M) −→ HIj (M/xM) −→ HIj+1(M) −→ HIj+1(M) −→ · · · . Therefore we have the following exact sequence, 0 −→ HIj (M)/xHIj (M) −→ HIj (M/xM) −→ (0 :H j+1 (M ) x) −→ 0, I from dim M/xM = d − 1 that HId−1 (M)/xHId−1 (M) is inductive hypothesis, the R-module Hm1 (HId−2 (M/xM)) is [20, Corollary 3.3], Supp HId−2 (M/xM) is finite. Hence and so it follows Moreover, by the Next, in view of dim HId−2 (M/xM) ≤ 1. Therefore the exact sequence Artinian. Artinian. we have 0 −→ HId−2 (M)/xHId−2 (M) −→ HId−2 (M/xM) −→ (0 :H d−1 (M ) x) −→ 0, I provides the exact sequence Hm1 (HId−2 (M)/xHId−2 (M)) −→ Hm1 (HId−2 (M/xM)) −→ Hm1 ((0 :H d−1 (M ) x)) −→ 0. I Hence the R-module Hm1 ((0 :H d−1 (M ) I x)) is Artinian. Now, from the exact sequences f 0 → (0 :H d−1 (M ) x) → HId−1 (M) → xHId−1 (M) → 0, I BASS NUMBERS AND COMINIMAXNESS 7 g 0 → xHId−1 (M) → HId−1 (M) → HId−1 (M)/xHId−1 (M) → 0, we obtain the following exact sequences H 1 (f ) m Hm1 ((0 :H d−1 (M ) x)) −→ Hm1 (HId−1 (M)) −→ Hm1 (xHId−1 (M)), I H 1 (g) m Hm0 (HId−1 (M)/xHId−1 (M)) −→ Hm1 (xHId−1 (M)) −→ Hm1 (HId−1 (M)). Then Ker(Hm1 (f )) and Ker(Hm1 (g)) are Artinian (note that Hm1 ((0 :H d−1 (M ) x)) and I HId−1 (M)/xHId−1 (M) are Artinian), and the sequence 0 → ker(Hm1 (f )) → ker(Hm1 (g) ◦ Hm1 (f )) → ker(Hm1 (g)), is exact. Since ker(Hm1 (g ◦ f )) = (0 :Hm1 (H d−1 (M )) x) and ker(Hm1 (g) ◦ Hm1 (f )) is Artinian, it I follows that (0 :Hm1 (H d−1 (M )) x) is also Artinian. Whence according to Melkersson’s TheI orem [19, Proposition 1.4] the R-module Hm1 (HId−1 (M)) is Artinian, and this completes the inductive step.  Theorem 2.9. Let (R, m) be a local (Noetherian) ring, I an ideal of R and M a finitely generated R-module of dimension d. Then the Bass numbers of HId−1 (M)/Γm (HId−1 (M)) are finite. Proof. In view of Theorem 2.8, the R-module Hm1 (HId−1 (M)/Γm (HId−1 (M))) is Artinian. On the other hand, since Supp HId−1 (M) is finite (see [20, Corollary 3.3]), it follows that dim HId−1 (M) ≤ 1, and so for i ≥ 2, Hmi (HId−1 (M)/Γm (HId−1 (M))) = 0. Therefore for all i 6= 1 we have Hmi (HId−1 (M)/Γm (HId−1 (M))) = 0. Consequently, in view of [19, Corollary 3.10] the R-modules ExtiR (R/m, HId−1 (M)/Γm (HId−1 (M))) are finitely generated. (Note that a module is m-cofinite if and only if it is Artinian.) Furthermore, because of dim HId−1 (M) ≤ 1, it follows that dim R/p = 1 for all p ∈ Supp HId−1 (M)/Γm (HId−1 (M)) with p 6= m. Since (HId−1 (M)/Γm (HId−1 (M)))p ∼ = (HId−1 (M))p , d−1 for all p ∈ Supp HId−1 (M)/Γm (HId−1 (M)) with p 6= m, it follows that HIR (Mp ) 6= 0, and p d−1 so dim Mp = d − 1. Consequently HIRp (Mp ) is an Artinian Rp -module. Hence for each i ≥ 0 and each p ∈ SpecR, the ith Bass number µi (p, HId−1 (M)/Γm (HId−1 (M))) = dimκ(p) ExtiRp (κ(p), (HId−1 (M)/Γm (HId−1 (M)))p ), is finite, where κ(p) = Rp /pRp .  The following lemma and proposition will be sueful in the proof of the next main result of this paper. An R-module M is said to be weakly Laskerian if the set of associated primes of any quotient module of M is finite (cf. [8, 9]). Lemma 2.10. Let R be a Noetherian ring and I an ideal of R. Then, for any R-module T , the following conditions are equivalent: (i) ExtnR (R/I, T ) is weakly Laskerian for all n ≥ 0. 8 KAMAL BAHMANPOUR, REZA NAGHIPOUR AND MONIREH SEDGHI (ii) For any finitely generated R-module N with support in V (I), ExtnR (N, T ) is weakly Laskerian for all n ≥ 0. Proof. For proving the assertion we use the proof of [14, Lemma 1] and [9, Lemma 2.2].  Proposition 2.11. Let (R, m) be a local (Noetherian) ring and M a finitely generated R-module. Let I ⊆ J be two ideals of R such that dim R/I = 2. Then, for all i, j ≥ 0, there exists a finitely generated submodule L of ExtjR (R/J, HIi (M)) such that Supp(ExtjR (R/J, HIi (M))/L) ⊆ V (m). Proof. In view of [5, Corollary 3.3] and Lemma 2.10 the set AssR ExtjR (R/J, HIi (M)) is finite. Let AssR ExtjR (R/J, HIi (M))\{m} = {p1 , . . . , pn }. Since pk 6= m for all k = 1, . . . , n and height m/I = 2, it follows that height pk /I ≤ 1, and so dim Rpk /IRpk ≤ 1 for all k = 1, . . . , n. Hence by [5, Corollary 2.7] the Rpk modules of (ExtjR (R/I, HIi (M)))pk are finitely generated for all k = 1, . . . , n. Therefore, by [14, Lemma 1], the Rpk -modules of (ExtjR (R/J, HIi (M)))pk are finitely generated for all k = 1, . . . , n. Consequently for every k = 1, . . . , n, there exists a finitely generated submodule Tk of ExtjR (R/J, HIi (M)) such that (Tk )pk = (ExtjR (R/J, HIi (M)))pk . Let K := T1 + · · · + Tn . Then K is a finitely generated submodule of ExtjR (R/J, HIi (M)) and Supp(ExtjR (R/J, HIi (M))/K) ∩ {p1 , . . . , pn } = ∅. So that dim ExtjR (R/J, HIi (M))/K ≤ 1. Now if Supp(ExtjR (R/J, HIi (M))/K) ⊆ {m}, then the result follows for L = K. We may therefore assume that dim ExtjR (R/J, HIi (M))/K = 1. Let AssR ExtjR (R/J, HIi (M))/K\{m} = {q1 , . . . , qs }. Then, as the above, the Rqt -module of (ExtjR (R/J, HIi (M))/K)qt is finitely generated for t = 1, . . . , s. Hence there exists a finitely generated submodule Lt /K of ExtjR (R/J, HIi (M))/K such that (ExtjR (R/J, HIi (M))/K)qt = (Lt )qt . Let L := L1 +· · ·+Ls +K. Then L is a finitely generated submodule of ExtjR (R/J, HIi (M)) and Supp(ExtjR (R/J, HIi (M))/L) ∩ {q1 , ..., qs } = ∅. Since Supp ExtjR (R/J, HIi (M))/L ⊆ Supp ExtjR (R/J, HIi (M))/K, it follows that Supp ExtjR (R/J, HIi (M))/L ⊆ {m}, as required.  We are now ready to state and prove the second main theorem of the paper, which is a characterization of the finiteness of the Bass numbers of (d − 1)th local cohomology of M with respect to an arbitrary ideal I in terms of the I-cominimaxness of HId−1 (M), where BASS NUMBERS AND COMINIMAXNESS 9 d = dim M. Before we state theorem, let us recall that a sequence x1 , . . . , xn of element of an ideal I of R is called an I-filter regular M-sequence, provided: Supp((x1 , . . . , xi−1 )M :M xi )/(x1 , . . . , xi−1 )M) ⊆ V (I), for all i = 1, . . . , n. In the case of (R, m) a local ring and I = m, we recover filter regular sequences as studied in several papers (cf. e.g. [22]). Theorem 2.12. Let (R, m) be a local (Noetherian) ring, I an ideal of R and M a finitely generated R-module of dimension d. Then the following conditions are equivalent: (i) The Bass numbers of the R-module HId−1 (M) are finite. (ii) Soc(HId−1 (M)) is finitely generated. (iii) HId−1 (M) is I-cominimax. Proof. The conclusion (i)=⇒(ii) is obviously true. In order to prove (ii)=⇒ (i), let Soc HId−1 (M) is a finitely generated R-module. Then, according to Melkersson’s Theorem [19, Proposition 1.4], Γm (HId−1 (M)) is Artinian. Therefore the Bass numbers of Γm (HId−1 (M)) are finite. Now, it follows from Theorem 2.9 that the Bass numbers of HId−1 (M) are finite, as required. In order to prove the implication (iii)=⇒(ii), it follows from [2, Corollary 2.8] that the Rmodule ExtjR (R/m, HId−1 (M)) is minimax for all j ≥ 0. Now it easily seen from definition that ExtjR (R/m, HId−1 (M)) is of finite length for all j ≥ 0. In particular the R-module HomR (R/m, HId−1 (M)) is finitely generated, as required. Finally for the proof of (i)=⇒ (iii), let dim R/I = n. For n ≤ 1 this follows by [5, Corollary 2.7]. Hence we may assume that n ≥ 2. Let x1 , ..., xn−1 ∈ m be a filter regular sequence on R/I. Let Ks := I + (x1 , . . . , xs ) for s = 0, 1, . . . , n − 1. We first show by induction on t, that the R-module ExtjR (R/Kn−t−1 , HId−1 (M)) is minimax for all j ≥ 0. Since x1 + I, . . . , xn−1 + I is a part of system of parameters for R/I, it follows that dim R/Kn−1 = 1, and so the result is evidently true for t = 0, by Theorem 2.3. Suppose that n − 1 ≥ t > 0 and the case t − 1 is settled. Since Γm (R/Kn−t−1 ) is a finitely generated R-module with Supp(Γm (R/Kn−t−1 )) ⊆ {m}, it follows that from [14, Lemma 1] and hypothesis (i) that the R-module ExtjR (Γm (R/Kn−t−1 ), HId−1 (M)) is finitely generated for all j ≥ 0. Now, as Γm (R/Kn−t−1 ) = J/Kn−t−1 for some ideal J of R, from the exact sequence 0 −→ J/Kn−t−1 −→ R/Kn−t−1 −→ R/J −→ 0, we get the following long exact sequence, j−1 · · · −→ ExtR (J/Kn−t−1 , HId−1 (M)) −→ ExtjR (R/J, HId−1 (M)) −→ −→ ExtjR (R/Kn−t−1 , HId−1 (M)) −→ ExtjR (J/Kn−t−1 , HId−1 (M)) −→ · · · . Hence we get that the R-module ExtjR (R/Kn−t−1 , HId−1(M)) is minimax if and only if the R-module ExtjR (R/J, HId−1 (M)) is minimax for all j ≥ 0. Now, as x1 , . . . , xn−1 is a filter regular sequence on R/I in m, it follows from definition that [ xn−t 6∈ p. p∈AssR (R/Kn−t−1 )\{m} 10 KAMAL BAHMANPOUR, REZA NAGHIPOUR AND MONIREH SEDGHI Therefore, it follows from AssR (R/J) = AssR (R/Kn−t−1 )\{m} that xn−t 6∈ ∪p∈AssR R/J p, and so xn−t is an R/J-regular element in m. Consequently, the exactness xn−t 0 −→ R/J −→ R/J −→ R/J + Rxn−t −→ 0, implies that the sequence j−1 j−1 0 −→ ExtR (R/J, HId−1 (M))/xn−t ExtR (R/J, HId−1(M)) −→ −→ ExtjR (R/J + Rxn−t , HId−1 (M)) −→ (0 :Extj (R/J,H d−1 (M )) xn−t ) −→ 0, R I is exact. Since Supp(R/J + Rxn−t ) ⊆ V (Kn−t ), (note that Kn−t ⊆ J + Rxn−t ,) the induction hypothesis and [14, Lemma 1] yield that the R-module ExtjR (R/J + Rxn−t , HId−1 (M)), is minimax, for all j ≥ 0. Therefore the R-module (0 :Extj (R/J,H d−1 (M )) xn−t ) is minimax. R I Now, let p ∈ Supp HId−1 (M)\{m}. Then, by [19, Proposition 5.1] and Vanishing theorem the Rp -module (HId−1 (M))p , is IRp -cofinite. As I ⊆ J ⊆ J + Rxn−t , it follows from [14, Lemma 1] that the Rp -module (ExtjR (R/J, HId−1 (M)))p is finitely generated. Moreover, as in view of [20, Corollary 3.3] the set Supp HId−1 (M) is finite, it follows that the set AssR ExtjR (R/J, HId−1 (M)) is finite. Therefore, by the proof of Lemma 2.11, there exists a finitely generated submodule L of ExtjR (R/J, HId−1 (M)) such that Supp ExtjR (R/J, HId−1 (M))/L ⊆ {m}. Next, from the exact sequence 0 −→ L −→ ExtjR (R/J, HId−1 (M)) −→ ExtjR (R/J, HId−1 (M))/L −→ 0, we get the exact sequence (0 :Extj (R/J,H d−1 (M )) xn−t ) −→ (0 :Extj (R/J,H d−1 (M ))/L xn−t ) −→ Ext1R (R/Rxn−t , L). R I R I Hence, it yields that the R-module (0 :Extj (R/J,H d−1 (M ))/L xn−t ) is minimax. Since R I Supp(0 :Extj (R/J,H d−1 (M ))/L xn−t ) ⊆ {m}, it follows from the definition that the R-module R I (0 :Extj (R/J,H d−1 (M ))/L xn−t ) is Artinian. As (0 :Extj (R/J,H d−1 (M ))/L xn−t ) is Rxn−t −torsion, R I R I according to Melkersson [19, Proposition 1.4] ExtjR (R/J, HId−1 (M))/L is an Artinian Rmodule. That is ExtjR (R/J, HId−1(M)) is a minimax R-module, as required.  Corollary 2.13. Let (R, m) be a regular local ring of dimension d ≥ 1 containing a field and let I be an ideal of R. Then the R-module HId−1 (R) is I-cominimax . Proof. The result follows from Theorem 2.12 and the fact that the Bass numbers of the R-module HId−1 (R) are finite (see [13, 17]).  BASS NUMBERS AND COMINIMAXNESS 11 Corollary 2.14. Let (R, m) be a local (Noetherian) ring and I an ideal of R. Let M be a finitely generated R-module of dimension d. Then the Bass numbers of the R-module HId−1 (M) are finite, whenever m 6∈ AssR HId−1 (M). Proof. Since AssR (Soc HId−1 (M)) = V (m) ∩ AssR HId−1 (M), it follows from m 6∈ AssR (HId−1 (M)) that AssR (Soc HId−1 (M)) = ∅. Hence Soc HId−1 (M) = 0, and so the result now follows from Theorem 2.12.  Corollary 2.15. Let (R, m) be a local (Noetherian) ring. Let I be an ideal of R and x ∈ m such that I ⊆ Rx. Then for each non-zero finitely generated R-module M of dimension d ≥ 1, the R-module HId−1 (M) is I-cominimax. In particular, the Bass numbers of HId−1 (M) are finite. Proof. When d = 1 there is nothing to prove. In the case that d = 2, it follows from [3, Theorem 2.3] that the R-module HomR (R/I, HI1 (M)) is finitely generated and so the Rmodule Soc(HI1 (M)) is finitely generated. Now the assertion follows from Theorem 2.12. x Finally, for d ≥ 3, it follows from [1, Lemma 2.5] that the map HId−1 (M) −→ HId−1 (M) is an isomorphism, and so Soc(HId−1 (M)) = 0. Now the assertion again follows from Theorem 2.12.  Corollary 2.16. Let (R, m) be a regular local ring and I an ideal of R such that height(I) = 1. Then for each non-zero finitely generated R-module M of dimension d ≥ 1, the R-module HId−1 (M) is I-cominimax. In particular, the Bass numbers of HId−1 (M) are finite. Proof. Since R is a UFD and height(I) = 1, it follows that I is contained in a principal prime ideal. Now the assertion follows from Corollary 2.15.  We are now ready to show that the subjects of the previous results can be used to prove a characterization of the finiteness of the Bass numbers of ith local cohomology of M with respect to an ideal I of dimension 2, i.e., where dim R/I = 2, in terms of the I-cominimaxness of HIi (M). The main result is Theorem 2.19. The following theorem will serve to shorten the proof of the main theorem. Theorem 2.17. Let (R, m) be a local (Noetherian ) ring and let I be an ideal of R with dim R/I = 2. Let M be a finitely generated R-module and i a non-negative integer. Then the following conditions are equivalent: (i) The Bass numbers of HIi (M) are finite. (ii) The R-module HIi (M) is I-cominimax. Proof. First we show the implication (i)=⇒ (ii). Suppose that Γm (R/I) := J/I. Then Supp J/I ⊆ {m}, and so it follows from [14, Lemma 1] and the assumption (i) that the 12 KAMAL BAHMANPOUR, REZA NAGHIPOUR AND MONIREH SEDGHI R-module ExtjR (J/I, HIi (M)) is finitely generated for all j ≥ 0. Now, the exact sequence 0 −→ J/I −→ R/I −→ R/J −→ 0 induces a long exact sequence j−1 · · · −→ ExtR (J/I, HIi (M)) −→ ExtjR (R/J, HIi (M)) −→ −→ ExtjR (R/I, HIi (M)) −→ ExtjR (J/I, HIi (M)) −→ · · · . Therefore HIi (M) is I-cominimax if and only if the R-module ExtjR (R/J, HIi (M)) is minimax for all j ≥ 0. It is easy to see that Γm (R/J) = 0. Hence, by [6, Lemma 2.1.1] m contains an R/Jregular element x. Then dim R/J/x(R/J) = dim R/J − 1, and so dim R/J + Rx = 1. Furthermore, the exact sequence x 0 −→ R/J −→ R/J −→ R/J + Rx −→ 0 gives us an exact sequence j−1 j−1 0 −→ ExtR (R/J, HIi (M))/x ExtR (R/J, HIi (M)) −→ −→ ExtjR (R/J + Rx, HIi (M)) −→ (0 :Extj (R/J,H i (M )) x) −→ 0 R I Now, since dim R/J +Rx = 1, it follows from the assumption (i) and Theorem 2.3 that the R-module ExtjR (R/J + Rx, HIi (M)) is minimax, for all j ≥ 0. On the other hand, in view of Proposition 2.11, there exists a finitely generated submodule L of ExtjR (R/J, HIi (M)) such that Supp(ExtjR (R/J, HIi (M))/L) ⊆ {m}. Now, from the exact sequence 0 −→ L −→ ExtjR (R/J, HIi (M)) −→ ExtjR (R/J, HIi (M))/L −→ 0 we obtain the exact sequence (0 :Extj (R/J,H i (M )) x) −→ (0 :Extj (R/J,H i (M ))/L x) −→ Ext1R (R/Rx, L), R I I R which implies that the R-module (0 :Extj (R/J,H i (M ))/L x) is minimax. As I R Supp(0 :Extj (R/J,H i (M ))/L x) ⊆ {m}, R I it follows from the definition that the R-module (0 :Extj (R/J,H i (M ))/L x) is Artinian. Since I R (0 :Extj (R/J,H i (M ))/L x) is Rx-torsion, it follows from Melkersson’s result (see [19, ProposiR I tion 1.4]) that ExtjR (R/J, HIi (M))/L is an Artinian R-module, and so ExtjR (R/J, HIi (M)) is a minimax R-module, as required. For prove (ii)=⇒(i) first observe that the R-module ExtjR (R/m, HIi (M)) is minimax, for all j ≥ 0, and so by the definition, ExtjR (R/m, HIi (M)) has finite length. Therefore µj (m, HIi (M)) is finite, for all j ≥ 0. Now, let p ∈ Supp HIi (M)\V (m). Then dim Rp /IRp ≤ 1 as easily seen. Therefore the Rp -module of HIi (M)p is IRp -cofinite, and so the Bass numbers of HIi (M)p are finite. Since the Bass numbers are stable under the localization, it follows that the Bass numbers of HIi (M) are finite, as required.  BASS NUMBERS AND COMINIMAXNESS 13 The next result is an immediate consequence of Theorem 2.17 and Huneke-SharpLyubeznik’ results. Corollary 2.18. Let (R, m) be a regular local ring of dimension d ≥ 2 containing a field and let I be an ideal of R with dim R/I = 2. Then the R-module HIi (R) is I-cominimax for all i ≥ 0. Proof. The result follows from Theorem 2.17 and the fact that the Bass numbers of the R-module HIi (R) are finite (see [13, 17]), for all i ≥ 0.  We are now ready to state and prove the third main theorem of the paper, which is a characterization of the finiteness of the Bass numbers of ith local cohomology of M with respect to an ideal I of dimension 2, in terms of the I-cominimaxness of HIi (M). Theorem 2.19. Let (R, m) be a local (Noetherian) ring, and let I be an ideal of R such that dim R/I = 2. Let M be a finitely generated R-module and t a non-negative integer. Then the following conditions are equivalent: (i) SocHIi (M) is finitely generated for all i ≤ t. (ii) ExtjR (R/m, HIi (M)) is finitely generated for all j ≥ 0 and for all i ≤ t − 1. (iii) HIi (M) is I-cominimax, for all i ≤ t − 1. Proof. The implication (ii)=⇒ (i) follows from [15, Corollary 3.5]. In order to prove (i)=⇒ i (ii), as Ass 4.3]), we can find an element x ∈ m, such SR HI (M) is finite (see [5, Corollary St that x 6∈ p∈Assh(R/I) p, and V (Rx) ∩ ( i=0 AssR HIi (M)) ⊆ V (m). Now, let L := I + Rx. Then it is easy to see that dim R/L = 1, and 0 HL0 (HIi (M)) = HRx (HIi (M)) = Hm0 (HIi (M)), is an Artinian R-module for all i ≤ t, by [19, Proposition 4.1] and assumption (i). Now, for all i ≤ t − 1, there exists the short exact sequence 1 0 0 −→ HRx (HIi (M)) −→ HLi+1 (M) −→ HRx (HIi+1 (M)) −→ 0, (cf. for instance [21, Corollary 3.5]). Since HLi+1 (M) is L-cofinite and 0 HRx (HIi+1 (M)) = Hm0 (HIi+1 (M)) 1 is Artinian, it follows from [5, Lemma 2.1] that ExtjR (R/L, HRx (HIi (M))) is minimax for k all j ≥ 0 and i ≤ t − 1. Furthermore, since HRx (HIi (M)) = HLk (HIi (M)), for all k ≥ 0, it follows that HLk (HIi (M)) = 0 for all k ≥ 2. Hence ExtjR (R/L, HLk (HIi (M))) is minimax for all j ≥ 0, k ≥ 0 and i ≤ t − 1, and so in view of [19, Proposition 3.9], the R-module ExtjR (R/L, HIi (M)) is minimax for all j ≥ 0 and i ≤ t − 1. Consequently, by [2, Theorem 2.7] the R-module Ki, j := ExtjR (R/m, HIi (M)) is minimax for all j ≥ 0 and i ≤ t − 1. Hence there is a finitely generated submodule Ni, j of Ki, j , such that Ki,j /Ni, j is Artinian. As mKi, j = 0 and m(Ki, j /Ni, j ) = 0, it follows that Ki, j has finite length, as required. For proving (ii)=⇒(iii), first we use the proof of implication (ii)=⇒(i) in Theorem 2.17, to see that the Bass numbers of HIi (M) are finite, for all i ≤ t − 1. Now, the 14 KAMAL BAHMANPOUR, REZA NAGHIPOUR AND MONIREH SEDGHI assertion follows from Theorem 2.17. Finally the implication (iii)=⇒(ii) follows again from Theorem 2.17.  We end the paper by drawing some concequences of Theorem 2.19. The first consequence will help us to construct a certain subset of Spec R which is countable. Corollary 2.20. Let (R, m) be a local (Noetherian) ring and let I be an ideal of R with dim R/I = 2. Let M be a finitely generated R-module such that m 6∈ ∪i≥0 AssR (HIi (M)). Then ExtjR (R/m, HIi (M)) is finitely generated for all j ≥ 0 and all i ≥ 0. Proof. Since m 6∈ ∪i≥0 AssR (HIi (M)), it follows that SocHIi (M) = 0 for all i ≥ 0. Now the assertion follows from Theorem 2.19.  Proposition 2.21. Let R be a Noetherian ring and I an ideal of R such that dim R/I = 2. For a finitely generated R-module M, let Σ := {p ∈ Spec(R) : µj (p, HIi (M)) = ∞ for some integers i ≥ 0 and j ≥ 0}. Then Σ is countable and Σ ⊆ Max(R). Proof. In order to show that Σ ⊆ Max(R), let p ∈ Σ\Max(R). Then it follows from the definition that p ∈ V (I), and it is easy to see that height(p/I) ≤ 1. Hence it follows from [5, Corollary 2.10] that p 6∈ Σ, which is a contradiction. Thus Σ ⊆ Max(R). i n On the other hand, as for all integers n ≥ 1 and i ≥ 0, the sets AssS R ExtR (R/I , M) are finite and HIi (M) = lim ExtiR (R/I n , M), it follows that the set i≥0 AssR HIi (M) −→ n≥1 is countable. Now, in order to complete the proof, it is enough to show that Σ ⊆ S Ass H i (M). To do this suppose that the contrary is true. Then there is m ∈ i≥0 S R I i Σ\ i≥0 AssR HI (M). Hence, by [5, Corollary 2.10] we have height(m/I) = 2, and so it follows from Corollary 2.20 that m 6∈ Σ, which is a contradiction.  Corollary 2.22. Let R be a Noetherian ring, M a finitely generated R-module and I an ideal of R such that dim M/IM = 2 . Let Σ := {p ∈ Spec(R) : µj (p, HIi (M)) = ∞ for some integers i ≥ 0 and j ≥ 0}. Then Σ is countable and Σ ⊆ Max(R). Proof. As dim M/IM = 2 it follows from that dim R/I + AnnR M = 2. Now the result i (M) and Proposition 2.21.  follows from HIi (M) ∼ = HI+Ann R (M ) Corollary 2.23. Let (R, m) be a local (Noetherian) ring, and let I be an ideal of R such that dim R/I = 3. Let M be a finitely generated R-module. Then the set Σ := {p ∈ Spec(R) : µj (p, HIi (M)) = ∞ for some integers i ≥ 0 and j ≥ 0}, is countable. BASS NUMBERS AND COMINIMAXNESS 15 Proof. Let p ∈ Σ\{m}. Then by [5,SCorollary 2.10] we have height(p/I) S = 2, and so it follows from Corollary 2.20 that p ∈ i≥0 AssR HIi (M). Thus Σ\{m} ⊆ i≥0 AssR HIi (M), and so the set Σ is countable.  Corollary 2.24. Let (R, m) be a local (Noetherian) ring, M a finitely generated R-module and I an ideal of R such that dim M/IM = 3. Then the set Σ := {p ∈ Spec(R) : µj (p, HIi (M)) = ∞ for some integers i ≥ 0 and j ≥ 0} is countable. Proof. As dim M/IM = 3 it follows that dim R/I +AnnR (M) = 3. Now the result follows i from HIi (M) ∼ (M) and Corollary 2.23 .  = HI+Ann R (M ) Acknowledgments The authors are deeply grateful to the referee for a very careful reading of the manuscript and many valuable suggestions. We also would like to thank Professors Hossein Zakeri and Kamran Divaani-Aazar for their careful reading of the first draft and many helpful suggestions. References [1] N. Abazari and K. Bahmanpour, On the finiteness of Bass numbers of local cohomology modules, J. Alg. Appl. 10(2011), 783-791. [2] J. Azami, R. Naghipour and B. Vakili, Finiteness properties of local cohomology modules for aminimax modules, Proc. Amer. Math. Soc. 137(2009), 439-448. [3] K. Bahmanpour and R. Naghipour, On the cofiniteness of local cohomology modules, Proc. Amer. Math. Soc. 136(2008), 2359-2363. [4] K. Bahmanpour and R. Naghipour, Associated primes of local cohomology modules and Matlis duality, J. Algebra, 320(2008), 2632-2641. [5] K. Bahmanpour and R. Naghipour, Cofiniteness of local cohomology modules for ideals of small dimension, J. Algebra, 321(2009), 1997-2011. [6] M.P. Brodmann and R.Y. Sharp, Local cohomology; an algebraic introduction with geometric applications, Cambridge University Press, Cambridge,1998. [7] D. Delfino and T. Marley, Cofinite modules and local cohomology, J. Pure and Appl. Algebra 121(1997), 45-52. [8] K. Divaani-Aazar and A. Mafi, Associated primes of local cohomology modules, Proc. Amer. Math. Soc. 133(2005), 655-660. [9] K. Divaani-Aazar and A. Mafi, Associated primes of local cohomology modules of weakly Laskerian modules, Comm. Algebra 34(2006), 681-690. [10] A. Grothendieck, Local cohomology, Notes by R. Hartshorne, Lecture Notes in Math., 862, Springer, New York, 1966. [11] R. Hartshorne, Affine duality and cofiniteness, Invent. Math. 9(1970), 145-164. [12] C. Huneke, Problems on local cohomology, Free resolutions in commutative algebra and algebraic geometry, Res. Notes Math. 2(1992), 93-108. [13] C. Huneke and R.Y. Sharp, Bass numbers of local cohomology modules, Trans. Amer. Soc. 339(1993), 765-779. [14] K.I. Kawasaki, On the finiteness of Bass numbers of local cohomology modules, Proc. Amer. Math. Soc. 124(1996), 3275-3279. 16 KAMAL BAHMANPOUR, REZA NAGHIPOUR AND MONIREH SEDGHI [15] K. Khashyarmanesh, On the finiteness properties of extension and tortion functors of local cohomology modules, Proc. Amer. Math. Soc. 135 (2007), 1319-1327. [16] G. Lyubeznik, Finiteness properties of local cohomology modules (an application of D-modules to commutative algebra), Invent. Math. 113(1993), 41-55. [17] G. Lyubeznik, F-modules: applications to local cohomology modules and D-modules in characteristic p > 0, J. Reine Angew. Math. 491(1997), 65-130. [18] H. Matsumura, Commutative ring theory, Cambridge Univ. Press, Cambridge, UK, 1986. [19] L. Melkersson, Modules cofinite with respect to an ideal, J. Algebra, 285(2005), 649-668. [20] R. Naghipour and M. Sedghi, A characterization of Cohen-Macaulay modules and local cohomology, Arch. Math., 87(2006), 303-308. [21] P. Schenzel, Proregular sequences, local cohomology, and completion, Math. Scand. 92 (2003), 161180. [22] P. Schenzel, N.V. Trung and N.T. Cuong, Verallgemeinerte Cohen-Macaulay-Moduln, Math. Nachr. 85 (1978), 57-73. [23] H. Zöschinger, Minimax moduln, J. Algebra. 102 (1986), 1-32. [24] H. Zöschinger, Ü ber die maximalbedingung für radikalvolle untermoduln, Hokkaido Math. J. 17 (1988), 101-116. Department of Mathematics, Ardabil Branch, Islamic Azad University, Ardabil, Iran. E-mail address: [email protected] Department of Mathematics, University of Tabriz, Tabriz, Iran; and School of Mathematics, Institute for Research in Fundamental Sciences (IPM), P.O. Box: 19395-5746, Tehran, Iran. E-mail address: [email protected] E-mail address: [email protected] Department of Mathematics, Azarbaijan University of Shahid Madani, Tabriz, Iran. E-mail address: [email protected]
0math.AC
NUMERICAL INTEGRATION ON GRAPHS: WHERE TO SAMPLE AND HOW TO WEIGH arXiv:1803.06989v1 [math.ST] 19 Mar 2018 GEORGE C. LINDERMAN AND STEFAN STEINERBERGER Abstract. Let G = (V, E, w) be a finite, connected graph with weighted edges. We are interested in the problem of finding a subset W ⊂ V of vertices and weights aw such that X 1 X f (v) ∼ aw f (w) |V | v∈V w∈W for functions f : V → R that are ‘smooth’ with respect to the geometry of the graph. The main application are problems where f is known to somehow depend on the underlying graph but is expensive to evaluate on even a single vertex. We prove an inequality showing that the integration problem can be rewritten as a geometric problem (‘the optimal packing of heat balls’). We discuss how one would construct approximate solutions of the heat ball packing problem; numerical examples demonstrate the efficiency of the method. 1. Introduction 1.1. Introduction. The purpose of this paper is to report on a very general idea in the context of sampling on graphs. It is a companion paper to [16] dealing with a problem in Spectral Graph Theory. We extend some of the ideas from [15, 16] to sampling, prove an inequality bounding the integration error in terms of the geometry of the sampling points and give several examples. We will, throughout the paper, use G = (V, E, w) to denote a connected graph with weighted edges. Problem (Quadrature). If we are allowed to sample in a set W with |W | = k vertices, which vertices and weights aw should we pick so that X 1 X f (v) ∼ aw f (w) |V | v∈V w∈W for functions f : V → R that are ‘smooth with respect to to the geometry’ of G? In many cases, this question does not make a lot of sense: since the graph is finite, one can simply compute the true average of f by summing over all n vertices. This question is only interesting whenever sampling f is difficult or expensive. A toy example is the following: suppose we have a medical database of n  1 people containing all sorts of information and are interested in the average blood pressure (not in the database) of those n people. Actually going out and measuring the blood pressure of all n people would take a very long time. However, it is known that blood pressure is strongly correlated with some of the factors we have on file (say, age, weight, and smoking habits) and weakly connected or unconnected to others (say, eye color). We can then build a weighted graph on n vertices where the weight on the edge connecting two people depends on how similar they are with regards to relevant factors – the hope is that blood pressure, as a function on the graph, is then smoothly varying. Which of the, say, n/1000 people should we do a blood pressure measurement on so that the sample average is representative of the global average? Is there a way to pick them in a way that decreases the expected error over a pure random selection? It is likely possible to make stronger statements if one restricts to certain classes of graphs and functions and this could be of substantial interest; our paper will only address the most general case. 2010 Mathematics Subject Classification. 05C50, 05C70, 35P05, 65D32. Key words and phrases. Graph, Sampling, Graph Laplacian, Sampling, Heat Kernel, Packing. 1 2 1.2. Formal Setup. We will now make these notions precise. As is not surprising, the precise definition of ‘smoothness’ of the function is crucial. If f has no particular structure, then there is little hope of being able to achieve anything at all. However, a weighted graph does induce a natural notion of smoothness: we want the function to vary little over edges with a large weight (since vertices connected by a large weight should be ‘similar’) whereas a large variation over edges with a smaller weight would not be that surprising. We now introduce a notion of a Laplacian on a Graph; it slightly deviates from more classical notions and could be of independent interest (see Section §2.4 for a more detailed discussion). Let A denote the (weighted) adjacency matrix of G ( w(eij ) if i ∼E j Aij = 0 otherwise, where w(eij ) ≥ 0 is the weight of the edge eij = eji connecting vertices i and j. A is a symmetric matrix. We introduce the maximum sum of any of the rows of this symmetric matrix (coinciding, by symmetry, with the maximum sum of any of the columns) and use it to define a normalized adjacency matrix: more precisely, we have dmax = max 1≤i≤n n X Aij and set j=1 A0 = 1 A. dmax Finally, we introduce the (diagonal) degree matrix D0 associated to the renormalized adjacency matrix and use it to define a Laplacian: we set 0 Dii = 1 n X dmax j=1 Aij and define L = A0 − D 0 . We will never work directly with the Laplacian: our main object of interest is the associated diffusion process whose generator is given by P = L + Idn×n , where Idn×n is the identity matrix of size n. P is a symmetric stochastic matrix and represents a lazy random walk where the probability of “staying put” depends on the vertex (as opposed to being, say, 0.5 as in the classical lazy random walk). We denote the eigenvalues of P , which are merely the eigenvalues of the Laplacian L shifted by 1, by λ1 , . . . , λn . Since P is a stochastic matrix, we have |λi | ≤ 1. The eigenvectors whose eigenvalues are close to 0 ‘diffuse quickly’ and are thus the natural high-frequency objects on the graph. This motivates an ordering of eigenvalues from low frequency to high frequency 1 = |λ1 | ≥ |λ2 | ≥ |λ3 | ≥ · · · ≥ |λn | ≥ 0. We denote the corresponding orthogonal eigenvectors of P , which clearly coincide √ with the eigenvectors of the Laplacian L, by φ1 , . . . , φn ∈ Rn (normalized in `2 , φ1 = 1/ n is the constant vector). We define a function space Xλ , the canonical analogue of trigonometric polynomials on Td or spherical harmonics on Sd , via     X X 2 Xλ = f : V → R f = |hf, φk i| , hf, φk i with norm kf k2Xλ =   |λk |≥λ |λk |≥λ where 0 ≤ λ ≤ 1 is a parameter controlling the degree of smoothness. If λ > µ, then Xλ ⊂ Xµ . Moreover, X0 = {f : V → R} contains all functions while, at least on generic graphs, X1 contains only the constant functions (depends on whether the induced random walk is ergodic; this is not important for our purposes). The norm is just the classical L2 −norm on the subspace – in more classical terms, we are simply considering the L2 −space obtained via a Littlewood-Paley projection. This function space Xλ is natural: if the graph G approximates a torus Td , then this function space will indeed approximate trigonometric functions. If G is close to a discretization of a sphere Sd , then the space Xλ approximates the space of low-degree spherical harmonics. 3 2. Main Results 2.1. Main Result. Our main result bounds the integration error in terms of kf kXλ and a purely geometric quantity (explained in detail below) formulated in terms of the quadrature points and independent of f . This has the nice effect of multiplicatively separating the size of the function kf kXλ and a quantity that can be interpreted as the ’quality’ of the quadrature scheme. Theorem. Let W ⊂ V be equipped with weights aw summing to 1. Then, for ` ∈ N, 0 < λ < 1,   12 2 X X X 1 kf kXλ  1 (Idn×n + L)` −  . aw δw f (v) − aw f (w) ≤ ∀ f ∈ Xλ n λ` n v∈V w∈W w∈W L2 The proof shows that the inequality is essentially close to sharp if there is a spectral gap close to λ. If there is no spectral gap, there is little reason to assume that the inequality is sharp. If one has access to the eigenfunctions of the Laplacian, then it is possible to use a much stronger inequality discussed below in §2.4. We observe that the inequality only holds for f ∈ Xλ : this does not mean that the integration scheme will perform poorly on functions outside this function class. Indeed, it is a fairly common technique to design quadrature rules for a certain class of very smooth functions – they will usually still be somewhat effective on functions that are not as smooth as the functions used in the design of the rule. This is, of course, the main idea in the construction of spherical designs [6, 14, 16] but also appears in other contexts: the Simpson rule for the integration of a real function on an interval is designed to be exact on quadratic polynomials. 2.2. Geometric interpretation: Heat Ball Packing. Altogether, this suggests that we should use the quantity on the right-hand side in the inequality in Theorem 1, depending only on the set W , the weights aw and the free parameter ` (but not on the function f ) as a guideline for how to construct the quadrature rule. This motivates studying the minimization problem 2 min min (Idn×n + L) W ⊂V |W |=k aw ` X w∈W aw δw subject to L2 X aw = 1. w∈W Note that we do not actually need to find the precise minimizer of the solution, indeed, we just want the quantity to be small. The topological structure of the minimization problem suggests that there will be many local minimizer that are not global: this has been empirically observed in related problems in the continuous setting (see e.g. [7]) and there is little reason to assume the discrete case will be different. Moreover, if the continuous analogies continue to hold, then the actual numerical value of minimizing configuration can be expected to be quite close to that of almost-minimizers which is good news: there are many almost-minimizers (thus easy to find) and they are almost as good as the global minimizer. (Idn×n + L)` δw is the probability distribution of a random walker starting in w after ` jumps which lends itself to a geometric interpretation. Guideline. If we manage to find a placement of vertices W with the property that the random walks, weighted by aw , overlap very little, then we have found a good quadrature rule on the graph G = (V, E). We observe that this can be reinterpreted as a ‘packing problem for heat balls’. This principle has already appeared naturally in the continuous setting of Riemannian manifolds in work of the second author [15]. It is even meaningful if we can only sample in a single vertex: we should pick the most central vertex and that is equivalent to heat diffusing quickly to many other points. In the ideal setting with perfectly distributed heat balls all the weights would be identical (as can be seen in examples with lots of symmetry, see [16]); this nicely mirrors an unofficial guideline in numerical integration stating that how far the weights deviate from constant weights can be used as measure of quality and stability of the method. We summarize that (1) it is desirable to construct W ⊂ V equipped with weights aw such that random walks, starting in w ∈ W and weighted by aw , intersect each other as little as possible. (2) if we are not allowed to chose W , we can still use the procedure above to find weights that yield a better result than just uniform sampling. 4 We emphasize that we do not attempt to solve the heat ball packing problem here – nor do we expect it to be easily solvable at this level of generality. The main contribution of this paper is to introduce the heat ball packing problem as a fundamental issue with implications for sampling. Problem. How does one find effective heat ball packing configurations quickly? Are there algorithms leading to effective almost-minimizing configurations? What theoretical guarantees can be proven? 2.3. Another interpretation. There is a nice bit of intuition coming from a more abstract perspective: the reason why the above method works is that the heat propagator et∆ is selfadjoint. More precisely, let us assume (M, g) is a compact manifold normalized to vol(M ) = 1 and let µ be a probability measure (our quadrature rule) on it. Smooth functions f have the property that they do not change substantially if we apply the heat propagator for a short time t > 0 (this is one way of quantifying smoothness) and therefore hf, µi ∼ et∆ f, µ = f, et∆ µ . In order for this quadrature rule to be effective, we want that et∆ µ is very close to the Lebesgue measure dx. However, the heat propagator preserves the L1 −mass and thus 1 = kµk = ket∆ µkL1 ≤ ket∆ µkL2 . The Cauchy-Schwarz inequality is only sharp if et∆ µ coincides with the constant function and thus minimizing ket∆ µkL2 is a natural way to obtain good quadrature rules. If µ is a weighted sum of Dirac measures, then et∆ turns this, roughly, into a sum of Gaussians (‘heat balls’) and finding locations to minimize the L2 −norm becomes, essentially, a packing problem. We observe that the argument does not single out L2 and minimizing ket∆ µkLp for p > 1 will lead to a very similar phenomenon – it remains to be seen whether there is any advantage to that perspective since L2 is usually easiest to deal with in practice. 2.4. The Laplacian: a second method. We believe that our notion of Laplacian may be quite useful in practice (it already appeared in [11]). It combines the two desirable properties of (1) having a symmetric matrix (and thus orthogonal eigenvectors) (2) inducing a diffusion operator that preserves the mean value of the function. The Kirchhoff matrix L1 = D − A has the second property but not the first; the normalized Laplacian L2 = Idn×n − D−1/2 AD−1/2 satisfies the first property but not the second. We believe that, for this reason alone, our notion of a Laplacian may be useful in other contexts as well. We observe that if we can compute eigenvectors directly, then there is a very direct way of approaching the problem directly. Proposition. Let W ⊂ V be equipped with weights aw summing to 1. Then, for all 0 < λ < 1, sup f ∈Xλ f 6=0 X X 1 X 1 1 f (v) − aw f (w) = − aw δw kf kXλ n n v∈V w∈W w∈W Xλ 2 This statement follows easily from L −duality and will be obtained in the proof of the Theorem as a by-product. The result is true in general but, of course, one cannot compute the quantity on the right-hand side unless one has access to the eigenvectors of the Laplacian. If one has indeed access to either the Laplacian eigenfunctions or at least some of the leading eigenvectors φ1 , . . . , φk where k  n is chosen so that λk ∼ λ (simpler to obtain in practice), then optimizing the functional in W ⊂ V and weights aw is essentially equivalent to finding good quadrature points. This simple observation is very effective in practice, we refer to numerical examples below. 3. How to use the Theorem The result discussed above has the nice effect of cleanly separating the problem of numerical integration on a graph from the actual graph structure: the geometry of the graph is encoded implicitly in the geometry of the random walk. This has the nice effect of providing a uniform treatment but, as a downside, does not provide an immediate method on how to proceed in 5 particular instances. The purpose of this section is to comment on various aspects of the problem and discuss approaches. Recall that our main result can be written as   12 2 X X X 1 1 1 aw δw −  ∀ f ∈ Xλ f (v) − aw f (w) ≤ kf kXλ min `  (Idn×n + L)` `∈N λ n n v∈V w∈W w∈W L2 3.1. The parameters λ and `. A priori we have no knowledge about the degree of smoothness of the function and have no control over it. The parameter `, on the other hand, is quite important and has a nontrivial impact on the minimizing energy configurations for the quantity on the righthand side. In practice, we have to choose ` without knowing λ (fixing an allowed number of sample points implicitly fixes a scale for λ). We propose the following basic heuristic. Heuristic. If ` is too small, then there is not enough diffusion and heat balls interact strongly with themselves. If ` is too large, the exponentially increasing weight λ−` is too large. There is an intermediate regime when heat balls starting to interact with nearby heat balls. The heuristic is accurate if the graph is locally (at the scale of typical distance between elements of W ) close to Euclidean. On general graphs, the optimal scale of ` might be more nontrivial to estimate – we have observed that, in practice, there is a wide range of ` yielding good results. 3.2. The placement of W . Naturally, to avoid intersections of random walkers, we want to place the elements of W as far from each other as possible. In particular, if the graph is close to having a Euclidean structure, we would expect fairly equi-spaced points to do well. A method that was used in [16] is to start with a random set of k vertices {v1 , v2 , . . . , vk } and compute the total mutual distance = k X d(vi , vj ), i,j=1 where d is a metric on G = (V, E). The algorithm then goes through all the vertices and checks whether moving one of them to a neighboring vertices increases the total mutual distance and, if so, moves the vertex. This is repeated as long as possible. The simple numerical examples in [16] all have edges with equal weight and the standard combinatorial graph distance can be used; the optimal type of metric could strongly depend on the type of graph under consideration. There is a fairly natural reason why an algorithm of this type has the ability to successfully produce sets of vertices that are very well spread out. We quickly return to the sphere Sd where a particularly spectacular justification exists. Let σ be the normalized measure on Sd . Then, for any set X = {x1 , . . . , xn } ⊂ Sd , we have Stolarsky’s invariance principle [1, 17] Z Z n  2 1 X kxi − xj k = cd DL2 ,cap (X) , kx − ykdσ(x)dσ(y) − 2 n Sd Sd i,j=1 where the quantity on the right is the L2 −based spherical cap discrepancy and cd is a constant only depending on the dimension. The L2 −based spherical cap discrepancy is a measure that has been studied in its own right: if the points are evenly distributed, then it is small. This may be a somewhat peculiar case. However, it is not difficult to see that on fairly generic manifolds functionals along the lines of n X 1 → min d(xi , xj )α i,j=1 or n X e−αd(xi ,xj ) → min i,j=1 converge to the uniform distributions if the number of points is large. Moreover, and this is particularly useful, these types of functionals tend to produce minimal energy configurations that only weakly depend on the functional being used. On two-dimensional manifolds, the hexagonal lattice seems to be particularly universal (see [2]). We do not know what kind of interaction functional is optimal on graphs. In practice, one would like to have fast and reliable algorithms that scale well and this seems like a problem of substantial interest. 6 3.3. The weights aw . Once we are given a set W ⊂ V and a parameter `, the optimization of the weights is completely straightforward. Observe that 2 (Idn×n + L) ` X = aw δw w∈W L2 X aw1 aw2 (Idn×n + L)` δw1 , (Idn×n + L)` δw2 . w1 ,w2 ∈W This is merely a quadratic form indexed by a |W | × |W | matrix – we thus need to solve the semidefinite program X X aw1 aw2 (Idn×n + L)` δw1 , (Idn×n + L)` δw2 → min subject to aw = 1. w1 ,w2 ∈W w∈W These weights aw play an important role in further fine-tuning an existing set of vertices W ⊂ V . This is the reason why minimizing the functional can be used to find appropriate weights for any given set of vertices W : if two vertices in W happen to be somewhat close to each other, then the quadratic form will take this into account when distributing the weights. Conversely, if one the vertices in W is surprisingly isolated from the other vertices in W , then the quadratic form will increase the weight assigned to that vertex. This is exactly how things should be: points that are oversampling a region in the graph should be given a smaller weight whereas isolated vertices cover a wider range and are, correspondingly, more important. We refer to §4 for numerical examples illustrating this point. 3.4. Related results. Sampling on graphs is a fundamental problem and a variety of approaches have been discussed in the literature [9]. Sampling is usually done for the purpose of compression or visualization and not numerical integration (in particular, vertices are usually not equipped with weights). Our approach seems to be very different from anything that has been proposed. The closest construction seems to be a line of research using biased random walks [8, 10, 13] based on the idea of sending random walkers and accepting the vertices they traverse with certain biased probabilities as sampling points. In contrast, we select points so that random walkers starting thereavoid each other. Other results seem related in spirit [3]. Our approach is motivated by a recent approach [15] to the study of spherical t−designs of Delsarte, Goethals & Seidel [6] (and Sobolev [14]). These are sets of points defined on Sd with the property that they integrate a large number of low-degree polynomials exactly (we refer to a survey of Brauchart & Grabner). [4]. The second author recently extended some of these results to weighted points and general manifolds [15]. These ideas are shown to be an effective source of good quadrature points in the Euclidean setting in a paper of Lu, Sachs and the second author [12]. 3 9 1 7 5 8 10 6 11 12 2 4 Figure 1. (Left:) The Icosahedron integrates all polynomials up to degree 5 on S2 exactly (this space is 36-dimensional). (Right:) a subset of 8 vertices integrates 21 of 24 eigenvectors of the McGee graph exactly. Such examples require extraordinary amounts of symmetry and are not generic. The second author recently proved [16] a generalized Delsarte-Goethals-Seidel bound for graph designs (the analogue of spherical t−designs on combinatorial graphs). The main condition in that 7 paper is algebraic (exact integration of a certain number of Laplacian eigenvectors) as opposed to quantitative (small integration error). [16] shows a number of truly remarkable quadrature rules on highly structured graphs that were found by numerical search: one of these rules is depicted in Figure 1 and manages with only 8 evaluations to integrate 21 out of a total of 24 eigenvectors exactly. However, these examples are very non-generic, the consequence of strong underlying symmetries and not likely to be representative of what can be achieved in a typical setting. 4. Numerical Examples 4.1. Importance of weights. We start with a toy example shown in the Figure below to illustrate the importance of the weights to counterbalance bad geometric distributions. We assume we are given two clusters and an uneven distribution of six sampling points: five end up in one cluster while the other cluster contains a total of five points. We construct a graph based on nearest neighbor distances weighted with a Gaussian kernel. The spreading of heat is rather uneven if all points are given equal weight. Conversely, by adjusting the weight to minimize the L2 −norm (constraint to summing to 1 and being nonnegative), a much more balanced distribution is achieved. Figure 2. Six points selected unevenly in two clusters (left), the heat flow emanating from weighting them all evenly (middle) and the optimal coefficients (0.11, 0.24, 0.05, 0.00, 0.18 and 0.43) for the heat ball packing problem (right). The weights show that, in particular, one point is given weight 0 and another point is given a rather small weight (0.05). This is to counterbalance the clustering of points. The isolated point is given almost half the weight (0.43). We see that the heat distribution in the second cluster is still highly uneven: this shows that it would be preferable to pick another point since the single sampling point is actually quite far from the center of the cluster: if it was closer to the center, it would have received an even larger weight. 0 0.4 0.81 0.19 0.4 0.2 Figure 3. Two optimal configurations for ` = 3 on 3 vertices. 8 Figure 3 shows an example P on a small graph with 10 vertices and 15 edges. More precisely, we optimize k(Id10×10 + L)3 w aw δw kL2 over all sets W with three vertices. In the first example, we see that there is one very central node that distributes well throughout the network, another weight is actually set to 0. This is a consequence of constraining the optimization to non-negative weights aw ≥ 0. This constraint is not required by the Theorem, but makes the optimization easier, and is well-motivated by classical methods in numerical integration. If we move the point that was assigned weight 0, then the weight splits evenly (the value of the functional barely changes). 4.2. MNIST. Our explicit example is as follows: we consider the data set MNIST, a collection of handwritten digits represented as 28 × 28 pixels (each pixel being either 0 or 1). For simplicity, we only consider the subset comprised of the digits 0 and 1. The challenge problem is to figure out the proportion of elements in the set that are handwritten digits that are 1’s (which is one half). This ties in to our example in the beginning: suppose we did not know the precise proportion of 1’s and the data is unlabeled. Labeling the data is expensive: the function evaluation would be one human being looking at a picture and labeling it, which is costly. However, these pictures Relative error 0.3 0.2 0.1 0 0 50 100 150 200 Number ` of diffusion steps. Figure 4. Estimating digits in MNIST: the relative integration error for 20 different sets of points of size 50 and how it evolves as a function depending on ` (leading to different selection of weights). The average of these 20 curves is shown as the bold black line, sampling error for randomly chosen points is the red line. are merely {0, 1} −vectors in R784 . As is commonly done, we reduce the dimensionality of the data by projecting onto its first ten principal components. We build a graph by connecting every element to its 10-nearest neighbors (in Euclidean distance) weighted with a Gaussian kernel and then symmetrize by averaging the resulting adjacency matrix with its transpose. It is reasonable to assume that the indicator function of 1’s is smooth over a graph defined by that notion of distance: handwritten digits looking like a 1 should be close to other handwritten digits that look like 1. We then proceed as outlined above: we sample random points, move them iteratively so that they are far away from each other and then adjust weights by solving the semidefinite program. The result is plotted against the parameter ` and compared to uniform weights on random points (red); the picture shows 20 different sets of points, the evolution of their integration error depending on ` as well as their average (black). We observe that for the right parameter range of `, the obtained 9 numerical integration scheme performs much better but the precise performance depends on the points chosen. This highlights the need for fast, stable and guaranteed ways of approximately solving the heat ball packing problem. 4.3. Using Eigenvectors of Laplacian. This section studies the same example as above, estimating the proportion of handwritten digits ‘1’ in MNIST, but assumes additionally that we are able to access the eigenvectors of the Laplacian associated to the largest few eigenvalues exactly. We set λ = 0.994 close to 1 leading to a space Xλ spanned by very few of the smoothest eigenvectors, sample random points, move them far apart and make use of sup f ∈Xλ f 6=0 X X 1 X 1 1 f (v) − aw f (w) = − + aw δw kf kXλ n n v∈V w∈W w∈W Xλ to explicitly optimize the weights. Our method (blue) is shown to perform exceedingly well; the 0.6 0.5 Relative error 0.4 0.3 0.2 0.1 0 0 20 40 60 80 100 Sampling size Figure 5. Numerical Integration with access to eigenvectors: our method (blue) compared to sampling in random points (yellow) and sampling in the location in which we move the points (red). weights are crucial, sampling over the same points (red) is even worse than sampling over random points (yellow) which decays as (#size of subset)−1/2 (averaged over 200 random samples). As mentioned above, having direct access to the eigenvectors implies that the bound is often close to sharp. This is illustrated in the subsequent Figure 6 where we replace the indicator function of the ‘1’-digits in the subset of MNIST comprised of digits 0 and 1 by its mollification obtained from projecting onto the first 6 eigenvectors. We optimize in the weights and obtain X 1 − aw δw n w∈W as an upper bound (red) Xλ that is then compared to the error on the function f (blue). We observe that as soon as the sample size exceeds a certain limit, integration becomes exact. It is quite desirable to obtain a better understanding of the interplay of parameters involved: suppose wePare given a set of k welldistributed points and optimize the weights so as to minimize −n−1 + w∈W aw δw X , what is λ the interplay between k, the Xλ space and the performance of the arising quadrature rule? Or, put differently, how does the integration error in a Xµ space depend on the space Xλ that was used to determine the weights? This question is clearly of great relevance in applications. 10 100 Integration error 10-2 10-4 10-6 10-8 10-10 10 20 30 40 50 60 70 80 90 100 Sampling size Figure 6. Error for the smoothed indicator function on the 1’s (blue) and the theoretical upper bound on the integration error (red). It depends strongly on W and, after some initial fluctuation settles down to essentially exact integration; the theoretical upper bound matches the performance on the particular instance. The phenomenon, which seems to be generic and easily observed in most examples, is illustrated in Figure 7. We downsampled the MNIST dataset of digits ‘0’ and ‘1’ to consist of a total of 1000 points, and constructed the graph as before. We then choose a subset of points W of size 100, increase their mutual distance and fix them as quadrature points. Integration error 10 0 10-5 10-10 10 20 25 10 -15 0 10 20 30 40 50 Eigenvector Figure 7. Integration error of three quadrature rules with weights fine-tuned in three different Xλ −spaces on the first 50 eigenfunctions. Finally, we optimize their weights in three different Xλ spaces where λ is chosen such that the dimensions of the spaces are 10, 20 and 25 (i.e. they contain the first 10, 20 and 25 eigenfunctions, 11 respectively). We then plot the integration error of these three quadrature rules on the first 50 eigenfunctions. If we optimize the weights according to the Xλ space containing the first 10 eigenfunctions, then the first 10 eigenfunctions are essentially integrated exactly, the subsequent integration error is small. The same is true for optimization in the space containing the first 20 eigenfunctions. Then the behavior changes abruptly: if we optimize over the first 25 eigenfunctions, then the error on those 25 eigenfunctions is small (∼ 10−4 ) and, as in the other examples, increases afterwards. This seems to be typical: for any given set W ⊂ V , there seems to be a range of Xλ −spaces such that optimizing parameters leads to exact integration in Xλ . Once their dimension exceeds a certain (sharp) threshold, the error is still small in Xλ but many orders of magnitude larger than before. This sharp phase transition could serve as another measure of quality of W that may be useful in judging the quality of algorithms finding W (the largest number of eigenfunctions that can be integrated exactly using W for some choice of weights, a measure already studied in [16]). 5. Proof of the Theorem Proof. We write the integration error as the inner product of two vectors and decompose it as ! X X 1 X 1 X f (v) − aw f (w) = − aw δw (v) f (v) n n v∈V w∈W v∈V w∈W * + n X X 1 = − aw δw , φk hf, φk i. n w∈W k=1 Since f ∈ Xλ , we have that hf, φk i = 0 unless |λk | ≥ λ. A simple application of the CauchySchwarz inequality then shows that X X 1 X 1 − f (v) − aw f (w) ≤ aw δw n n v∈V w∈W w∈W kf kXλ . Xλ More precisely, L2 −duality implies that this step is not lossy since sup f ∈Xλ f 6=0 X X 1 1 X 1 f (v) − aw f (w) = − aw δw kf kXλ n n v∈V w∈W w∈W . Xλ For any function g : V → R, we have 2 kgkXλ = X |λk |≥λ 2 |hg, φk i| ≤ n 1 X 2 |λk |2` |hg, φk i| λ2` k=1 2 n 1 X ` = 2` λk hg, φk iφk λ k=1 1 = 2` (Idn×n + L)` g λ L2 2 L2 . We observe that this inequality is also valid if g ∈ / Xλ since ever step is a valid bound from above and k · kXλ is defined on all functions as a semi-norm (we note, however, that if g ∈ / Xλ , then the inequality will usually be far from sharp). We use this inequality for X 1 aw δw g= − n w∈W to conclude that X 1 − aw δw n w∈W kf kXλ Xλ kf kXλ ≤ (Idn×n + L)` λ` X 1 − aw δw n w∈W ! . L2 12 We observe that Idn×n + L is the generator of the diffusion. It is a linear operator for which constant functions are invariants. This implies ! X X 1 1 ` (Idn×n + L) − aw δw = − (Idn×n + L)` aw δw n n w∈W w∈W We now show that the operator (Idn×n + L) preserves the average value of the function. It suffices to show that L maps the average value of a function to 0. We use the definition 1 (A − D) . L = A0 − D 0 = dmax It thus suffices to show that A − D maps every function to a function with mean value 0. This follows from changing the order of summation X XX XX X X (Af )(i) = eij f (j) = eij f (j) = Dii f (i) = (Df )(i). i∈V i∈V j∈V j∈V i∈V i∈V i∈V This implies that if we normalize the weights so that constants are being integrated exactly, i.e. X aw = 1, w∈W then the mean value of (Idn×n + L)` X aw δw is exactly w∈W 1 . n Squaring out implies X 1 − (Idn×n + L)` aw δw n w∈W 2 L2 2 X 1 = + (Idn×n + L)` aw δw n w∈W 2 * +L X 1 −2 , (Idn×n + L)` aw δw n w∈W 2 ` = (Idn×n + L) X − aw δw w∈W L2 1 . n Altogether, we have shown  X X 1 X kf kXλ  sup f (v) − f (w) ≤ (Idn×n + L)` aw δw ` λ f ∈Xλ n v∈V w∈W w∈W 2 L2  21 1 − . n  Acknowledgement GCL was supported by NIH grant #1R01HG008383-01A1 (PI: Yuval Kluger) and U.S. NIH MSTP Training Grant T32GM007205. References [1] D. Bilyk, F. Dai and R. Matzke, Stolarsky Principle and Energy Optimization on the Sphere, Constructive Approximation, to appear [2] X. Blanc and M. Lewin, The crystallization conjecture: a review. EMS Surv. Math. Sci. 2 (2015), no. 2, 225–306. [3] A. Bermanis, A. Averbuch, and R. Coifman. ”Multiscale data sampling and function extension.” Applied and Computational Harmonic Analysis 34.1 (2013): 15-29. [4] J. Brauchart and P. Grabner, Distributing many points on spheres: minimal energy and designs. J. Complexity 31, no. 3, 293–326, (2015). [5] F. Chung, Spectral Graph Theory, CBMS Regional Conference Series in Mathematics 92, American Mathematical Society, 1996. [6] P. Delsarte, J. M. Goethals and J. J. Seidel, Spherical codes and designs. Geometriae Dedicata 6, no. 3, 363–388, (1977). 13 [7] T. Erber and G. Hockney, Complex systems: Equilibrium configurations of n equal charges on a sphere (2 ≤ n ≤ 112), Advances in Chemical Physics 98 (1997), 495–594. [8] M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou. Walking in facebook: A case study of unbiased sampling of osns. In INFOCOM, 2010 Proceedings IEEE, pages 1–9. IEEE, 2010. [9] P. Hu and W.C.Lau, A Survey and Taxonomy of Graph Sampling, arXiv:1308.5865 [10] L. Jin, Y. Chen, P. Hui, C. Ding, T. Wang, A. V. Vasilakos, B. Deng, and X. Li. Albatross sampling: robust and effective hybrid vertex sampling for social graphs. In Proceedings of the 3rd ACM international workshop on MobiArch, pages 11–16. ACM, 2011. [11] G. Linderman and S. Steinerberger, Clustering with t-SNE, Provably, arXiv:1706.02582 [12] J. Lu, M. Sachs and S. Steinerberger, Quadrature Points via Heat Kernel Repulsion, in preparation. [13] A. H. Rasti, M. Torkjazi, R. Rejaie, N. Duffield, W. Willinger, and D. Stutzbach. Respondent-driven sampling for characterizing unstructured overlays. In INFOCOM 2009, IEEE, pages 2701–2705. IEEE, 2009. [14] S. Sobolev, Cubature formulas on the sphere which are invariant under transformations of finite rotation groups. Dokl. Akad. Nauk SSSR 146, 310–313, (1962). [15] S. Steinerberger, Spectral Limitations of Quadrature Rules and Generalized Spherical Designs, arXiv:1708.08736 [16] S. Steinerberger, Designs on Graphs: Sampling, Spectra, Symmetries, arXiv:1803.02235 [17] K. B. Stolarsky. Sums of distances between points on a sphere. II. Proc. Amer. Math. Soc., 41, 575–582, 1973. Program in Applied Mathematics, Yale University, New Haven, CT 06511, USA E-mail address: [email protected] Department of Mathematics, Yale University, New Haven, CT 06511, USA E-mail address: [email protected]
10math.ST
. arXiv:1710.02505v1 [math.NT] 6 Oct 2017 RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP Contents 1. Introduction 2. The local systems in general 3. The candidate local systems for Alt(2q) 4. Basic facts about Hn 5. basic facts about H2q−1 6. Basic facts about the group Ggeom for F (k, 2q − 1, ψ) 7. The third moment of F (k, 2q − 1, ψ) and of G(k, 2q − 1, ψ) 8. Exact determination of Garith 9. Identifying the group References 1 2 4 5 6 7 8 11 12 25 1. Introduction In earlier work [Ka-RLSFM], Katz exhibited some very simple one parameter families of exponential sums which gave rigid local systems on the affine line in characteristic p whose geometric (and usually, arithmetic) monodromy groups were SL2 (q), and he exhibited other such very simple families giving SU3 (q). [Here q is a power of the characteristic p, and p is odd.] In this paper, we exhibit equally simple families whose geometric monodromy groups are the alternating groups Alt(2q). We also determine their arithmetic monodromy groups. See Theorem 3.1. [Of course from the resolution [Ray] of the Abhyankar Conjecture, any finite simple group whose order is divisible by p will occur as the geometric monodromy group of some local system on A1 /Fp ; the interest here is that it occurs in our particularly simple local systems.] In the earlier work of Katz, he used a theorem to Kubert to know that the monodromy groups in question were finite, then work of Gross [Gross] to determine which finite groups they were. Here we do not The first author was partially supported by NSF grant DMS-1600056 and the third author was partially supported by NSF grant DMS-1665014. The first author would also like to thank the Institute for Advanced Study, Princeton for its support. 1 2 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP have, at present, any direct way of showing this finiteness. Rather, the situation is more complicated and more interesting. Using some basic information about these local systems (cf. Theorem 6.1), the first and third authors prove a fundamental dichotomy: the geometric monodromy group is either Alt(2q) or it is the special orthogonal group SO(2q − 1). The second author uses an elementary polynomial identity to compute the third moment as being 1 (cf. Theorem 7.1), which rules out the SO(2q − 1) case. This roundabout method establishes the theorem. It would be interesting to find a “direct” proof that these local systems have integer (rather than rational) traces; this integrality is in fact equivalent to their monodromy groups being finite, cf. [Ka-ESDE, 8.14.6]. But even if one had such a direct proof, it would still require serious group theory to show that their geometric monodromy groups are the alternating groups. 2. The local systems in general Throughout this paper, p is an odd prime, q is a power of p, k is a finite field of charactertistic p, ℓ is a prime 6= p, ψ = ψk : (k, +) → µp ⊂ Qℓ × is a nontrivial additive character of k, and χ2 = χ2,k : k × → ±1 ⊂ Qℓ × is the quadratic character, extended to k by χ2 (0) := 0. For L/k a finite extension, we have the nontrivial additive character ψL/k := ψk ◦ TraceL/k of L, and the quadratic character χ2,L = χ2,k ◦NormL/k of L× , extended to L by χ2,L (0) = 0. On the affine line A1 /k, we have the Artin-Schreier sheaf Lψ(x) . On Gm /k we have the Kummer sheaf Lχ2 (x) and its extension by zero j! Lχ2 (x) (for j : Gm ⊂ A1 the inclusion) on A1 /k. For an odd integer n = 2d + 1 which is prime to p, we have the rigid local system F (k, n, ψ) := F Tψ (Lψ(xn ) ⊗ j! Lχ2 (x) ) on A1 /k. Let us recall the basic facts about it, cf. [Ka-NG2, 1.3 and 1.4]. It is lisse of rank n, pure of weight one, and orthogonally self dual, with its geometric monodromy group Ggeom ⊂ SO(n, Qℓ ). RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 3 Recall that Ggeom is the Zariski closure in SO(n, Qℓ ) of the image of the geometric fundamental group π1 (A1 /k) in the representation which “is” the local system F (k, n, ψ). For ease of later reference, we recall the following fundamental fact. Lemma 2.1. For any lisse local system on A1 /k, the subgroup Γp of its Ggeom generated by elements of p-power order is Zariski dense. Proof. Denote by N the Zariski closure of Γp . Then N is a normal subgroup of Ggeom . We must show that the quotient M := Ggeom /N is trivial. We first note that M/M 0 is trivial, as it is a finite, prime to p quotient of π1 (A1 /k). Thus M is connected. We next show that M red := M/Ru , the quotient of M by its unipotent radical, is trivial. For this, it suffices to show that M has no nontrivial irreducible representations. But any such representation is a local system on A1 /k which is tamely ramified at ∞, so is trivial. Thus M is unipotent. But H 1 (A1 /k, Qℓ ) vanishes, so any unipotent local system on A1 /k is trivial, and hence M is trivial.  Let us denote by A(k, n, ψ) the Gauss sum X ψ(x)χ2 (x). A(k, n, ψ) := −χ2 (n(−1)d ) x∈k × By the Hasse-Davenport relation, for L/k an extension of degree d, we have A(L, n, ψL/k ) = (A(k, n, ψ))d . The twisted local system G(k, n, ψ) := F (k, n, ψ) ⊗ A(n, k, ψ)−deg is pure of weight zero and has Ggeom ⊂ Garith ⊂ SO(n, Qℓ ). Concretely, for L/k a finite extension, and t ∈ L, the trace at time t of G(k, n, ψ) is X ψL/k (xn +tx)χ2,L (x) = Trace(F robt,L |G(k, n, ψ)) = −(1/A(L, n, ψL/k )) x∈L× = −(1/A(L, n, ψL/k )) X ψL/k (xn + tx)χ2,L (x), x∈L the last equality because the χ2 factor kills the x = 0 term. Let us recall also [Ka-NG2, 3.4] that the geometric monodromy group of F (k, n, ψ), or equivalently of G(k, n, ψ), is independent of the choice of the pair (k, ψ). 4 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP To end this section, let us recall the relation of the local system F (k, n, ψ) to the hypergeometric sheaf Hn := H(!, ψ; all char′ s of order dividing n; χ2 ). According to [Ka-ESDE, 9.2.2], F (k, n, ψ)|Gm is geometrically isomorphic to a multiplicative translate of the Kummer pullback [n]⋆ Hn . [An explicit descent of F (k, n, ψ)|Gm through the n’th power map is given by the lisse sheaf on Gm whose trace function at time t ∈ L× , for L/k a finite extension, is X ψL/k (xn /t + x)χ2,L (x/t). t 7→ − x∈L× The structure theory of hypergeometric sheaves show that this descent is, geometrically, a multiplicative translate of the asserted Hn .] 3. The candidate local systems for Alt(2q) In this section, we specialize the n of the previous section to n = 2q − 1 = 2(q − 1) + 1. The target theorem is this. Theorem 3.1. Let p be an odd prime, q a power of p, k a finite field of characteristic p, ℓ a prime 6= p, and ψ a nontrivial additive character of k. For the ℓ-adic local system G(k, 2q − 1, ψ) on A1 /k, its geometric and arithmetic monodromy groups are given as follows. (1) Ggeom = Alt(2q) in its unique irreducible representation of dimension 2q − 1. (2a) If −1 is a square in k, then Ggeom = Garith = Alt(2q). (2b) If −1 is not a square in k, then Garith = Sym(2q), the symmetric group, in its irreducible representation labeled by the partition (2, 12q−2 ), i.e. (the deleted permutation representation of Sym(2q)) ⊗ sgn. Remark 3.2. The traces of elements of Alt(n) (respectively of Sym(n)) in its deleted permutation representation (respectively in every irreducible representation) are integers. One sees easily (look at the action of Gal(Q(ζp )/Q)) that the local system G(k, 2q − 1, ψ) has traces which all lie in Q, but as mentioned in the introduction, we do not know a direct proof that these traces all lie in Z. RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 5 4. Basic facts about Hn In this section, we assume that n ≥ 3 is odd and that n(n − 1) is prime to p. The geometric local monodromy at 0 is tame, and a topological generator of the tame inertia group I(0)tame , acting on Hn , has as eigenvalues all the roots of unity of order dividing n. The geometric local monodromy at ∞ is the direct sum Lχ2 ⊕ W ; W has rank n − 1, and all slopes 1/(n − 1). Because n is odd, the local system Hn is (geometrically) orthogonally self dual, and det(Hn ) is geometrically trivial (because trivial at 0, lisse on Gm , and all ∞ slopes are ≤ 1/(n − 1) < 1). Therefore det(W ) is geometrically Lχ2 . From [Ka-ESDE, 8.6.4 and 8.7.2], we see that up to multiplicative translation, the geometric isomorphism class is determined entirely by its rank n − 1 and its determinant Lχ2 . Because n − 1 is even and prime to p, it follows that up to multiplicative translation, the geometric isomorphism class of W is that of the I(∞)-representation of the Kloosterman sheaf Kln−1 := Kl(ψ; all char′ s of order dividing n − 1). By [Ka-GKM, 5.6.1], we have a global Kummer direct image geometric isomorphism Kln−1 ∼ = [n − 1]⋆ Lψn−1 , where we write ψn−1 for the additive character x 7→ ψ((n−1)x). Therefore, up to multiplicative translation, the geometric isomorphism class of W is that of [n − 1]⋆ Lψ . Pulling back by [n − 1], which does not change the restriction of W to the wild inertia group P (∞), we get [n − 1]⋆ W ∼ = ⊕ζ∈µn−1 Lψ(ζx) . A further pullback by n’th power, which also does not change the restriction of W to P (∞), gives [n − 1]⋆ [n]⋆ W ∼ = ⊕ζ∈µn−1 Lψ(ζxn ) . Thus we find that the I(∞) representation attached to a multiplicative translate of [n − 1]⋆ F (k, n, ψ) is the direct sum M M Lψ(ζxn ) = Lψ(αxn ) . 1 ζ∈µn−1 α∈µn−1 ∪{0} This description shows that the image of P (∞) in the I(∞)-representation attached to F (k, n, ψ) is an abelian group killed by p. 6 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP Lemma 4.1. Let L/Fp be a finite extension which contains the n−1’st roots of unity. Denote by V ⊂ L the additive subgroup of L spanned by the n − 1’st roots of unity. Denote by V ⋆ the Poincaré dual of V : V ⋆ := HomFp (V, µp (Qℓ )). Then the image of P (∞) in the I(∞)-representation attached to F (k, n, ψ) is V ⋆ , and the representation restricted to V ⋆ is the direct sum of M M 1 (evaluation at ζ) = (evaluation at α). ζ∈µn−1 (L) α∈µn−1 (L)∪{0} Proof. Each of the characters Lψ(αxn ) of I(∞) has order dividing p. Given an n-tuple of elements (aα )α∈µn−1 (L)∪{0} , consider the character Λ := ⊗α∈µn−1 (L)∪{0} (Lψ(αxn ) )⊗aα = = Lψ((Pα∈µ n−1 (L)∪{0} aα α)xn ) . The following conditions are equivalent. P (1) α∈µn−1 (L)∪{0} aα α = 0. (2) The character Λ is trivial on I(∞). (3) The character Λ is trivial on P (∞). Indeed, P it is obvious that (1) =⇒ (2) =⇒ (3). If (3) holds, then for A := α∈µn−1 (L)∪{0} aα α, we have that Lψ(Ax) is trivial on P (∞), so is a character of I(∞)/P (∞) = I(∞)tame , a group of order prime to p. But Lψ(Ax) has order dividing p, so is trivial on I(∞), hence A = 0. This equivalence shows that the character group of the image of P (∞) is indeed the Fp span of the α’s, i.e., it is V . The rest is just Poincaré duality of finite abelian groups.  5. basic facts about H2q−1 Taking n = 2q − 1, the geometric local monodromy at 0 of H2q−1 is tame, and a topological generator of the tame inertia group I(0)tame , acting on Hn , has as eigenvalues all the roots of unity of order dividing 2q − 1. Turning now to the action of P (∞), we have Lemma 5.1. Denote by ζ2q−2 ∈ Fq2 a primitive 2q − 2’th root of unity. In the I(∞)-representation attached to F (k, 2q − 1, ψ), the character group V of the image of P (∞) is the Fp -space V = Fq ⊕ ζ2q−2 Fq . Fix a nontrivial additive character ψ0 of Fq , and denote by ψ1 the nontrivial additive character of Fq2 given by ψ1 := ψ0 ◦ TraceFq2 /Fq . RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 7 Then the image V ⋆ of P (∞) is itself isomorphic to V , and the representation of P (∞) is the direct sum of the characters M ⊕β∈F×q ψ1 (ζ2q−2 βx). ⊕α∈Fq ψ1 (αx) Proof. When n = 2q − 1, then n − 1 = 2(q − 1). The field Fq2 contains the 2(q − 1)’th roots of unity. The group µ2(q−1) (Fq2 ) contains the × subgroup µq−1 (Fq2 ) = F× q with index 2, the other coset being ζ2(q−1) Fq . Thus the Fp span of µ2(q−1) (Fq2 ) inside the additive group of Fq2 is indeed the asserted V . The characters ψ1 (αx), as α varies over Fq , are each trivial on ζ2q−2 Fq (because TraceFq2 /Fq (ζ2q−2 ) = 0) and give all the additive characters of Fq (on which TraceFq2 /Fq is simply the map x 7→ 2x). The characters ψ1 (ζ2q−2 βx), as β varies over Fq , are trivial on Fq (because TraceFq2 /Fq (ζ2q−2 ) = 0) and give all the characters of 2 ζ2q−2 Fq (because ζ2(q−1) lies in F×  q ). Corollary 5.2. The image of P (∞) in the I(∞)-representation attached to F (k, 2q − 1, ψ) ⊕ 1 is the direct sum V = Fq ⊕ ζ2q−2 Fq acting through the representation RegFq ⊕ Regζ2q−2 Fq . 6. Basic facts about the group Ggeom for F (k, 2q − 1, ψ) Recall that Ggeom is the Zariski closure in SO(2q −1, Qℓ ) of the image of π1geom := π1 (A1 /Fp ) in the representation attached to F (k, 2q −1, ψ). Thus Ggeom is an irreducible subgroup of SO(2q − 1, Qℓ ). Theorem 6.1. We have the following two results. (1) Ggeom is normalized by an element of SO(2q − 1, Qℓ ) whose eigenvalues are all the roots of unity of order dividing 2q − 1 in Qℓ . (2) Ggeom contains a subgroup isomorphic to Fq ⊕Fq , acting through the virtual representation Regfirst ⊕ Regsecond − 1. Proof. The local system F (k, 2q − 1, ψ) is, geometrically, a multiplicative translate of the Kummer pullback [2q − 1]⋆ H2q−1 . Therefore Ggeom is a normal subgroup of the group Ggeom for H2q−1 , so is normalized by any element of this possibly larger group. As already noted, local monodromy at 0 for H2q−1 is an element of the asserted type. This 8 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP proves (1). Statement (2) is just a repeating of what was proved in the previous lemma.  7. The third moment of F (k, 2q − 1, ψ) and of G(k, 2q − 1, ψ) Let us recall the general set up. We are given a lisse G on a lisse, geometrically connected curve C/k. We suppose that G is ι-pure of weight zero, for an embedding ι of Qℓ into C. We denote by V the Qℓ representation given by G, and by Ggeom the Zariski closure in GL(V ) of the image of π1geom (C/k). For an integer n ≥ 1, the n’th moment of G is the dimension of the space of invariants Mn (G) := dim((V ⊗n )Ggeom ). Recall [Ka-MMP, 1.17.4] that we have an archimedean limit formula for Mn (G) as the lim sup over finite extensions L/k of the sums X (1/#L) (Trace(F robt,L |G))n , t∈C(L) which we call the empirical moments. Theorem 7.1. For the lisse sheaf G(k, 2q − 1, ψ) on A1 /k, we have M3 (G(k, 2q − 1, ψ)) = 1. Proof. Fix a finite extension L/k. For t ∈ L, we have Trace(F robt,L |G(k, 2q−1, ψ)) = (−1/A(L, 2q−1, ψL/k )) X ψL/k (x2q−1 +tx)χ2,L (x), x∈L with the twisting factor given explicitly as X ψL/k (x)χ2,L (x). A(L, 2q − 1, ψL/k ) = −χ2,L (−1) x∈L× Write gL for the Gauss sum gL := X ψL/k (x)χ2,L (x). x∈L× Then the empirical M3 is the sum X X (1/#L)(χ2,L (−1)/gL )3 (ψL/k (x2q−1 +y 2q−1 +z 2q−1 +t(x+y+z))χ2,L (xyz) = t∈L x,y,z∈L X = (χ2,L (−1)/gL )3 ψL/k (x2q−1 + y 2q−1 + z 2q−1 )χ2,L (xyz) = x,y,z∈L,x+y+z=0 = (χ2,L (−1)/gL )3 X ψL/k (x2q−1 +y 2q−1 +(−x−y)2q−1 )χ2,L (xy(−x−y)). x,y∈L The key is now the following identity. RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 9 Lemma 7.2. In Fq [x, y], we have the identity x2q−1 + y 2q−1 + (−x − y)2q−1 = xy(x + y) Y (x − αy)2. α∈Fq \{0,−1} If we write q = pf , then collecting Galois-conjugate terms this is Y h(x, y)2 , xy(x + y) h∈Pf where Pf is the set of irreducible h(x, y) ∈ Fp [x, y] which are homogeneous of degree dividing f , monic in x, other than x or x + y. Proof. Because x2q−1 + y 2q−1 + (−x − y)2q−1 is homogeneous of odd degree 2q − 1 and visibly divisible by y, it suffices to prove the inhomogenous identity, that in Fq [x] we have Y x2q−1 + 1 − (x + 1)2q−1 = x(x + 1) (x − α)2 . α∈Fq \{0,−1} The left side P (x) := x2q−1 + 1 − (x + 1)2q−1 has degree 2q. So it suffices to show that for each α ∈ Fq \ {0, −1},P (x) is divisible by (x − α)2 . The key point is that for β ∈ Fq , we have β 2q−1 = β, and for α ∈ F× q we have α2q−2 = 1. Thus for any β ∈ Fq , we trivially have P (β) = 0. The derivative P ′ (x) is equal to P ′ (x) = −x2q−2 + (x + 1)2q−2 . ′ So if both α and α + 1 lie in F×  q , then P (α) = −1 + 1 = 0. With this identity in hand, we now return to the calculation of the empirical moment, which is now X Y h(x, y)2 )χ2,L (xy(−x − y)). (χ2,L (−1)/gL )3 ψL/k (xy(x + y) x,y∈L h∈Pf The set of (x, y) ∈ A2 (L) at which h∈Pf h(x, y) = 0 has cardinality at most (q − 2)(#L − 1). So the empirical sum differs from the modified empirical sum Y X Y h(x, y)2) h(x, y)2 )χ2,L (xy(−x−y) ψL/k (xy(x+y) (χ2,L (−1)/gL )3 Q x,y∈L h∈Pf h∈Pf 10 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP by a difference which is (χ2,L (−1)/gL )3 (a sum of at most (q−2)(#L−1) terms, each of absolute value 1). p So the difference in absolute value is at most q/ (#L), which tends to zero as L grows (remember q is fixed). The modified empirical sum we now rewrite as X ψL/k (t)χ2,L (−t)NL (t), (χ2,L (−1)/gL )3 t∈L× with NL (t) the number of L-points on the curve Ct given by Y h(x, y)2 = t. Ct : xy(x + y) h∈Pf Because xy(x+y) h∈Pf h(x, y)2 is homogeneous of degree 2q −1 prime to p and is not a d’th power for any d ≥ 2, the curves Ct are smooth and geometrically irreducible for all t 6= 0, cf. [Ka-PES, proof of 6.5]. Moreover, by the homogeneity, these curves are each geometrically isomorphic to C1 , indeed the family become constant after the tame Kummer pullback [2q − 1]⋆ . Thus for the structural map π : C → Gm /Fp , R2 π! (Qℓ ) = Qℓ (−1), R1 π! Qℓ is lisse of some rank r, tame at both 0 and ∞, and mixed of weight ≤ 1, and all other Ri π! (Qℓ ) = 0. So our modified empirical moment is X ψL/k (t)χ2,L (−t)(#L − Trace(F robt,L |R1 π! Qℓ ) = (χ2,L (−1)/gL )3 Q t∈L× = (χ2,L (−1)/gL )3 X ψL/k (t)χ2,L (−t)(#L) t∈L× −(χ2,L (−1)/gL )3 X t∈L× Trace(F robt,L |Lχ(t) ⊗ Lχ2 (t) ⊗ R1 π! Qℓ ). gL2 Remembering that = χ2,L (−1), we see that √ the first sum is χ2,L (−1). We now show that the second sum is O(1/ #L), or equivalently that the sum X Trace(F robt,L |Lψ ⊗ Lχ2 ⊗ R1 π! Qℓ ) t∈L× is O(#L). By the Lefschetz trace formula [Gro-FL], the second sum is Trace(F robL |Hc2 (Gm /Fp , Lψ ⊗ Lχ2 ⊗ R1 π! Qℓ ) −Trace(F robL |Hc1(Gm /Fp , Lψ ⊗ Lχ2 ⊗ R1 π! Qℓ ). The Hc2 group vanishes, because the coefficient sheaf is totally wild at ∞ (this because it is Lψ tensored with a lisse sheaf which is tame at ∞). The second sum is O(#L), by Deligne’s fundamental estimate RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 11 [De-Weil II, 3.3.1] (because the coefficient sheaf of mixed of weight ≤ 1, so its Hc1 is mixed of weight ≤ 2). Thus the empirical √ moment is χ2,L (−1) plus an error term which, as L grows, is O(1/ #L). So the lim sup is 1, as asserted.  8. Exact determination of Garith Theorem 8.1. Suppose known that G(k, 2q−1, ψ) has Ggeom = Alt(2q). Then its Garith is as asserted in Theorem 3.1, namely it is Alt(2q) if −1 is a square in k, and is Sym(2q) if −1 is not a square in k. Proof. For q > 3, the outer automorphism group of Alt(2q) has order 2, induced by the conjugation action of Sym(2q). Therefore the normalizer of Alt(2q) in SO(2q − 1) (viewed there by its deleted permutation representation) is the group Sym(2q) (viewed in SO(2q − 1) by (deleted permutation representation)⊗sgn). If q = 3, the automoprhism group is slightly bigger but the stabilizer of the character of the deleted permutation module is just Sym(2q). [Indeed, either of the exotic automorphisms of Alt(6) maps the cycle (123) to an element which in Sym(6) is conjugate to (123)(456). The element (123) has trace 2, whereas (123)(456) has trace −1 (both viewed in SO(5) by the deleted permutation representation)]. Since we have a priori inclusions Ggeom = Alt(2q) ⊳ Garith ⊂ SO(2q − 1), the only choices for Garith are Alt(2q) or Sym(2q). Denoting by V the representation of Garith given by G(k, 2q − 1, ψ), the action of Garith on line L := (V ⊗3 )Ggeom is a character of Garith /Ggeom . We claim that this character is the sign character sgn of Garith ⊂ Sym(2q). To see this, we argue as follows. For any n ≥ 3, denoting by Vn the deleted permutation representation of Sym(n + 1), one knows that (Vn⊗3 )Sym(n+1) = (Vn⊗3 )Alt(n+1) is one dimensional, [Indeed, if S λ denotes the complex irreducible representation of Sym(n + 1) labeled by the partition λ ⊢ (n + 1), then n+1 Vn = S (n,1) and sgn = S (1 ) . An application of the LittlewoodRichardson rule to Sym(n+1) S λ ⊗ IndSym(n (S (n) ) = S λ ⊕ (S λ ⊗ Vn ) yields 2) Vn ⊗ Vn = S (n+1) ⊕ S (n,1) ⊕ S (n−1,2) ⊕ S (n−1,1 12 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP see [FH, Exercise 4.19]. Further similar applications of the LittlewoodRichardson rule then show that Vn ⊗ Vn ⊗ Vn contains the trivial representation S (n+1) once but does not contain sgn.] Hence that the action of Sym(n + 1) on ((Vn ⊗ sgn)⊗3 )Alt(n+1) is sgn3 = sgn. Taking n = 2q − 1, we get the claim. Now apply Deligne’s equidistribution theorem, in the form [Ka-Sar, 9.7.10]. It tells us that if Garith /Ggeom has order 2 instead of 1, then the Frobenii F robt,L as L runs over larger and larger extensions of k of even (respectively odd) degree become equidistribued in the conjugacy classes of Garith lying in Ggeom (respectively lying in the other coset Garith \ Ggeom ). Then as L/k runs over finite extensions of odd degree, √ the empirical third moment will be −1 + O(1/ #L). On the other hand,√if Garith = Ggeom , then every empirical moment will be 1 + O(1/ #L). 9. Identifying the group In this section, we use the information obtained earlier to identify the group. We choose a field embedding Qℓ ⊂ C, so that we may view G := Ggeom as an algebraic group over C. So let p be an odd prime with q a power of p. We start by assuming that G is an irreducible, Zariski closed subgroup of SO(2q − 1, C) = SO(V ) such that G contains Q, an elementary abelian subgroup of order q 2 . Moreover, we assume that we may write Q = Q1 × Q2 so that V = V0 ⊕ V1 ⊕ V2 where V0 is a trivial Q-module, V0 ⊕ Vi is the regular representation for Qi and Qi acts trivially on the other summand. Moreover, we assume that G is a quasi-p group (in the sense that the subgroup generated by its p-elements is Zariski dense), cf. Lemma 2.1. Lemma 9.1. V is tensor indecomposable for Q1 . More precisely, V 6= X1 ⊗ X2 where the Xi are Q1 -modules each of dimension ≥ 2. Proof. We argue by contradiction. Suppose V = X1 ⊗ X2 with each Xi of (necessarily odd) dimensional ≥ 2 . Let χXi beP the character of P Q1 on Xi . So χX1 = a0 1 + aχ χ and χX2 = b0 1 + bχ χ where the χ are the nontrivial characters of Q1 . We first reduce to the case when both a0 , b0 are nonzero. The multiplicity of the trivial character of Q1 in V is q, so we have X q = a0 b0 + aχ bχ . χ RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 13 So either a0 b0 is nonzero, and we are done, or for some nontrivial χ we have aχ bχ nonzero. In this latter case, replace X1 by X1 ⊗ χ and X2 by X2 ⊗ χ. Since each nontrivial character χ of Q1 occur exactly once in V , for each such χ we have X 1 = a0 bχ + aχ b0 + aρ bχρ . ρ6=χ In particular we have the inequalities a0 bχ ≤ 1, aχ b0 ≤ 1. Because a0 , b0 are both nonzero, we infer that if aχ 6= 0, then aχ = b0 = 1 (respectively that if bχ 6= 0, then a0 = bχ = 1). It cannot be the case that all aχ vanish, otherwise X1 is the trivial module of dimension > 1. This is impossible so long as X2 is nontrivial, as each nontrivial character of Q1 occurs in V exactly once. But if all aχ and all bχ vanish, then V is the trivial Q1 module, which it is not. Therefore a0 = 1 and, similarly, b0 = 1, and all aχ , bχ are either 0 or 1. Now use again that the multiplicity of the trivial character of Q1 in V is q, so we have X aχ bχ . q = a0 b0 + χ This is possible only if all aχ and all bχ are 1. But then each Xi has dimension q, which is impossible, as the product of their dimensions is 2q − 1.  Lemma 9.2. The following statements hold for G. (1) G preserves no nontrivial orthogonal decomposition of V . (2) V is not tensor induced for G. Proof. We first prove (1). We argue by contradiction. Suppose that V = W1 ⊥ . . . ⊥ Wr with r > 1. Because G acts irreducibly, G transitively permutes the Wi , and all the Wi have the same odd dimension d (because 2q − 1 = rd). Since r divides 2q − 1, gcd(r, p) = 1, so the p-group Q fixes at least one of the Wi , say W1 . Because r > 1, there are other orbits of Q on the set of blocks. Any of these has cardinality some power of p, so the corresponding direct sum of Wi ’s has odd dimension. As 2q − 1 is odd, there must be evenly many other orbits, so at least three orbits in total. In each Q-stable odd-dimensional orthogonal space, Q lies in a maximal torus of the corresponding SO group, so has a fixed line. Hence dim V Q ≥ 3, contradiction. We next show that V is not tensor induced. We argue by contradiction. If V is tensor induced, write V = W ⊗ . . . ⊗ W (with f ≥ 2 14 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP tensor factors, dim W < dim V ). Then Q1 must act transitively on the set of tensor factors (otherwise the representation for Q1 is tensor decomposable and the previous lemma gives a contradiction). So by Jordan’s theorem, there exists an element y ∈ Q1 that acts fixed point freely on the set of the f tensor factors. All such elements are conjugate in GL(W ) ≀ Sym(f ) and we have χV (y) = (dim W )f /p . [Indeed, after replacing y by a GL(W )≀Sym(f )-conjugate, the situation is this. Each orbit of y on the set of tensor factors has length p, and y acts on each corresponding p-fold self product of W , indexed by Fp , by mapping ⊗i wi to ⊗i wi+1 . In terms of a basis B := {ej }j=1,...,dim W of W, the only diagonal entries of the matrix of y on this W ⊗p are given by the dim W vectors e ⊗ e... ⊗ e with e ∈ B.] On the other hand, we have χV (y) = q − 1 for any nonzero element y of Q1 . Thus, if d = dim W , we have df /p = q − 1. Thus, dim V = df = (q − 1)p > 2q − 1, a contradiction.  Corollary 9.3. Let L ≤ SO(V ) be any subgroup containing G and let 1 6= N ⊳ L. Then N acts irreducibly on V . Proof. We argue by contradiction. Note that the conclusions of Lemmas 9.1 and 9.2 also hold for L. (i) Because N is normal in L, V is completely reducible for N. Let V1 , . . . , Vr be the distinct N-isomorphism classes of N-irreducible submodules of V . Because V is L-self dual, it is a fortiori N-self dual. Therefore the set of Vi is stable by passage to the N-dual, Vi 7→ Vi⋆ . The group L acts transitively on the set of the Vi . Either every Vi is Nself-dual, or none is (the L-conjugates of an N-self dual representation are N-self dual). When we write V as the direct sum of its the N-isotypic (“homogeneous” in the terminology of [C-R, 49.5]) components, V = W1 ⊕ . . . ⊕ Wr , then for some integer e ≥ 1 we have N-isomorphisms Wi ∼ = eVi := the direct sum of e copies of Vi . If r > 1 and all the Wi are self dual, then this is an orthogonal decompositon (because for i 6= j, the inner product pairing of (any) Vi with (any) Vj is an N-homomorphism from Vi to Vj⋆ ∼ = Vj , so vanishes). This contradicts Lemma 9.2. RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 15 Suppose r > 1 and no Vi is self-dual. Then the Vi occur in pairs of duals. Therefore both r and dim V are even, again a contradiction. (ii) We have shown that r = 1 and e > 1, i.e. V ∼ = eV1 . Now we apply Clifford’s theorem, cf. [C-R, Theorem 51.7]. Thus L preserves the N-isomorphism class of V1 , and so we get an irreducible projective representation L 7→ PGL(V1 ) = PSL(V1 ), and V as a projective representation of L is V1 ⊗ X with L acting (projectively) irreducibly on X through L/N, and X of dimension e. Furthermore, the two factor sets associated to these two projective representations are inverses to each other (because the tensor product V1 ⊗X = V is a linear representation of Q1 ). Since e dim V1 = dim V = 2q − 1, both e and n = dim V1 are coprime to p. We now claim that, restricted to Q1 , each of the tensor factors V1 and X lifts to a genuine linear representation. Indeed, using the fact that PGL(n, C) = PSL(n, C) and the short exact sequence 1 → µn → SL(n, C) → PSL(n, C) → 1, the obstruction for (V1 )|Q1 , which is given by the first factor set restricted to Q1 , lies in the cohomology group H 2 (Q1 , µn ). As p ∤ n while Q1 is a p-group, this cohomology group vanishes; and so the first factor set restricted to Q1 is trivial, whence so is the second. Thus the Q1 -module V is tensor decomposable, contradicting Lemma 9.1.  We next show that G is finite. It is convenient to use one more fact about G. There is a subgroup A (namely the group Ggeom for the hypergeometric sheaf H2q−1 ) of SO(V ) such that G is normal in A, A/G is cyclic of order dividing 2q − 1 and A contains an element x of order 2q − 1 with distinct eigenvalues on V . We also use the fact that G has a nontrivial fixed space on V ⊗V ⊗V (Theorem 7.1). Theorem 9.4. G is finite. Proof. Suppose not. Let N be any nontrivial normal (closed) subgroup of G. By Corollary 9.3, N is irreducible on V . (i) Let G0 be the identity component of G. We now show that G0 is a simple algebraic group. Taking N = G0 , we have that G0 acts irreducibly and hence is semisimple (as it lies in SO(V )). Moreover, the center of G0 is trivial (because it consists of scalars in SO(V )). Therefore if G0 is not simple, it is the product of adjoint groups Lj , 1 ≤ j ≤ t (namely the adjoint forms of the factors of its universal cover), and V is the (outer) tensor product V = ⊗tj=1 Vj of nontrivial irreducible Lj modules Vj . By [GT, Corollary 2.7], G permutes these tensor factors 16 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP Vj . This action is transitive, otherwise we contradict Lemma 9.1. But this implies that V is tensor induced for G, contradicting Lemma 9.2. Thus G0 is a simple algebraic group. (ii) Because the subgroup of G generated by its p-elements is Zariski dense, the finite group G/G0 is generated by its p-elements. As p is odd, it follows that either G = G0 is a simple algebraic group or p = 3 and G0 = D4 (C). [In all other cases, the outer automorphism group, i.e., the automorphism group of the Dynkin diagram of G0 , has order at most 2.] Since A/G has odd order, it follows that A ≤ G as well unless G0 = D4 (C) and 3 divides 2q − 1. Suppose first that A is connected and so a simple algebraic group. Then it contains a semisimple element x acting with distinct eigenvalues. This implies that a maximal torus has all weight spaces of dimension at most 1. Moreover, the module is in the root lattice (since it is odd dimensional and orthogonal). By a result of Howe [Ho] (see also [Pa, Table]), it follows if G 6= SO(V ), then either G = G2 (C) with dim V = 7 or G = PGL2 (C). If dim V = 7, then q = 4, a contradiction. If G = PGL2 (C), then any finite abelian subgroup of odd order is cyclic and so Q does not embed in G. So G = SO(V ). However, SO(V ) has no nonzero fixed points on V ⊗ V ⊗ V and this contradicts Theorem 7.1. Thus, it follows that A is disconnected. So the connected component is D4 (C) and this acts irreducibly on V . If D4 (C) contains the element of order 2q−1, then a maximal torus has all weight space of dimension 1 and again using [Ho], we obtain a contradiction. If not, then 3 divides 2q − 1, whence p ≥ 5 and Q ≤ D4 (C). Any elementary abelian psubgroup of D4 (C) is contained in a torus and so again we see that the connected component has all weight spaces of dimension at most 1 and we obtain the final contradiction using [Ho].  Let F ∗ (X) denote the generalized Fitting subgroup of a finite group X (so X is almost simple precisely when F ∗ (X) is a non-abelian simple group). Corollary 9.5. A and G are almost simple and F ∗ (A) = F ∗ (G) acts irreducibly on V . Proof. Let N be a minimal normal subgroup of G. By Corollary 9.3, N acts irreducibly, and so by Schur’s lemma CA (N) = Z(N) = 1 as A < SO(V ) with dim V odd. So N is a direct product of non-abelian simple groups. Arguing as in p. (i) of the proof of Theorem 9.4, we see that N is non-abelian simple (otherwise the module V would be tensor RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 17 induced). As CG (N) = 1, we see that N ⊳ G ≤ Aut(N), and so G is almost simple and F ∗ (G) = N. Now, as G ⊳ A, A normalizes N. Again since CA (N) = 1 we have that N ⊳ A ≤ Aut(N), and so A is almost simple and F ∗ (A) = N.  We next observe that: Lemma 9.6. F ∗ (G) is not a sporadic simple group. Proof. Notice that both G and A are generated by elements of odd order (p-elements for G, these and elements of order 2q − 1 for A). On the other hand, we have S ≤ G ≤ A ≤ Aut(S) for S = F ∗ (G). One knows [Atlas] that if S is sporadic, then |Out(S)| ≤ 2. Therefore, if S is a sporadic simple group, then G = A = S. The result now folllows easily from information in [Atlas]. Namely, we observe that if q is an odd prime power with q 2 dividing |G|, then G has no irreducible representation of dimension 2q − 1.  We next consider the case F ∗ (G) = Alt(n). First note Alt(5) contains no noncyclic elementary abelian groups of odd order and so is ruled out. Since 2q − 1 is odd, we see that if G = Alt(n), then A = G = Alt(n) (as the outer automorphism group of Alt(n) is a 2-group). Theorem 9.7. Let Γ = Alt(n) with n ≥ 6. Suppose that x ∈ Γ has odd order and V is an irreducible C[Γ]-module such that x acts as a semisimple regular element on V . Then one the following holds: (1) V is the deleted permutation module of dimension n−1 (i.e. the Alt(n) nontrivial irreducible constituent of CAlt(n−1) ), and x is either an n-cycle (for n odd) or a product of two disjoint cycles of coprime lengths (for n even); or (2) n = 8, x has order 15 and dim V = 14. Proof. First note that if V is the deleted permutation module of dimension n − 1, an element with 3 or more disjoint cycles has at least a two dimensional fixed space on V . Similarly, if x has two disjoint cycles of lengths which are not coprime, then x has a two dimensional eigenspace on V . Next we observe that if x is semisimple regular on V , then the order of x is at least dim V . This proves the result for 6 ≤ n ≤ 14 by inspection of the odd order elements and dimensions of the irreducible modules, aside from the case n = 8 and dim V = 14 (note that Alt(8) contains an element of order 15). Recall that Alt(8) ∼ = GL4 (2) and it acts 2-transitively on the nonzero vectors. The only irreducible module 18 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP of dimension 14 is the irreducible summand of the permutation module of dimension 15. In this case x has a single orbit in the permutation representation and so x is semisimple regular on V . Now assume that n ≥ 15. Suppose first that x has at most three nontrivial cycles. Then the order of x is less than (n/3)3 = n3 /27 and so dim V < n3 /27. Let W be a complex irreducible Sym(n)-module whose restriction to Alt(n) contains V |Alt(n) . Since 2 ≤ dim W < 2n3 /27, it follows by [Ra, Result 3] that W ∼ = S λ or S λ ⊗ sgn, where S λ is the Specht module labeled by the partition λ of n, with λ = (n − 1, 1), (n − 2, 2), or (n − 2, 1, 1). Restricting back to Alt(n), we see that V |Alt(n) = S λ |Alt(n) . Note that dim S (n−2,1,1) = (n − 1)(n − 2)/2, dim S (n−2,2) = n(n − 3)/2. It is straightforward to see that the dimension of the fixed space of x on either of these modules is at least two dimensional, a contradiction. Hence λ = (n − 1, 1) and V |Alt(n) is the deleted permutation module of dimension n − 1. We now induct on n. The base case n ≤ 14 has already done. We may assume that x has at least four nontrivial cycles (each of odd length, as x has odd order). View x ∈ J := Alt(a) × Alt(b). where the projection into Alt(b) is a b-cycle and so the projection into Alt(a) is a product of at least three disjoint cycles. Thus, a ≥ 9. Let W be an irreducible J-submodule of V with Alt(a) acting nontrivially. So W = W1 ⊗ W2 with W1 an irreducible Alt(a)-module. Then x must be multiplicity free on each Wi and by induction x can have at most two cycles in Alt(a), a contradiction.  Note that the previous result does fail for n = 5. Alt(5) has a 5-dimensional representation in which an element of order 5 has all eigenvalues occurring once. Thus if G = Alt(n), we see that n = 2q and V is the deleted permutation module. Corollary 9.8. If G = Ggeom is an alternating group Alt(n) for some n, then n = 2q. Finally, we consider the case where G is an almost simple finite group of Lie type, defined over Fs , where s = sf0 is a power of a prime s0 . Let us denote S := F ∗ (G) = F ∗ (A). Recall that S is simple, irreducible on V , and Z(S) = 1 by Corollary 9.5. We will freely use information on character tables of simple groups available in [Atlas, GAP], as well as degrees of complex irreducible RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 19 characters of various quasisimple groups of Lie type available in [Lu]. Finally, we will also use bounds on the smallest degree d(S) of nontrivial complex irreducible representations of S as listed in [T, Table 1]. Theorem 9.9. Suppose s0 6= p. Then S ∼ = Alt(m) with m ∈ {5, 6, 8}. Proof. (i) Assume the contrary. We will exploit the existence of the subgroup Q ≤ G. Recall that the p-rank mp (G) is the largest rank of elementary abelian p-subgroups of G. Furthermore, (9.9.1) Aut(S) ∼ = Inndiag(S) ⋊ ΦS ΓS , where Inndiag(S) is the subgroup of inner-diagonal automorphisms of S, ΦS is a subgroup of field automorphisms of S and ΓS is a subgroup of graph automorphisms of S, as defined in [GLS, Theorem 2.5.12]. As F ∗ (G) = S, we can embed G in Aut(S). Now, given an elementary abelian p-subgroup P < G of rank mp (G), we can define a normal series 1 ≤ P1 ≤ P2 ≤ P, where P1 = P ∩ Inndiag(S) and P2 = P ∩ (Inndiag(S) ⋊ ΦS ). As ΦS is cyclic and P is elementary abelian, P2 /P1 has order 1 or p. Set e = 1 e if S ∼ = P Ω+ 8 (s) and p = 3, and e = 0 otherwise. Then |P/P2 | ≤ p . Next we bound |P1 | when S is not a Suzuki-Ree group. Let Φj (t) denote the j th cyclotomic polynomial in the variable t, and let m denote the multiplicative order of s modulo p, so that p|Φm (s). Note that we can find a simple algebraic group G of adjoint type defined over Fs and a Frobenius endomorphism F : G → G such that Inndiag(S) ∼ = GF . Letting r denote the rank of G, then one can find r positive integers k1 , . . . , kr and ǫ1 , . . . , ǫr = ±1 such that r Y Y N nj N (ski − ǫi ) |Inndiag(S)| = s Φj (s) = s j≥1 i=1 for suitable integers N, nj . Then, according to [GLS, Theorem 4.10.3(b)], |P1 | ≤ pnm . Let ϕ(·) denote the Euler function, so that deg(Φm ) = ϕ(m). Inspecting the integers k1 , . . . , kr , one sees that nm ≤ r/ϕ(m). It follows that |P1 | ≤ Φm (s)nm ≤ ((s + 1)ϕ(m) )r/ϕ(m) ≤ (s + 1)r . In fact, one can verify that this bound on |P1 | also holds for Suzuki-Ree groups. Putting all the above estimates together, we obtain that (9.9.2) q 2 = |Q| ≤ |P | ≤ (s + 1)r+1+e . We will show that this upper bound on q contradicts the lower bound (9.9.3) 2q − 1 = dim V ≥ d(S) 20 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP in most of the cases. Let f ∗ denote the odd part of the integer f . (ii) First we handle the case when S is of type D4 or 3D4 . Here, q ≤ (s + 1)3 by (9.9.2). On the other hand, d(S) ≥ s(s4 − s2 + 1), contradicting (9.9.3) if s ≥ 3. If s = 2, then ΦS ΓS = C3 , and so instead of (9.9.2) we now have that q 2 ≤ 35 , whence q ≤ 13, 2q−1 ≤ 25 < d(S), again a contradiction. From now on we may assume e = 0. Next we consider the case S = PSL2 (s). Then Out(S) = Cgcd(2,s−1) × Cf , and mp (S) ≤ 1. It follows that Q is not contained in S but in S ⋊ Cf and 3 ≤ p|f ∗ , and furthermore q 2 = |Q| ≤ (s + 1)f ∗ . As d(S) ≥ (s − 1)/2, (9.9.3) now implies that s + 1 = sf0 + 1 ≤ 16f ∗ , a contradiction if s0 ≥ 5, or s0 = 3 and f ≥ 5, or s0 = 2 and f ≥ 7. If s0 = 3 and f ≤ 4, then f ∗ = 3 = f = p, forcing p = s0 , a contraction. Suppose s0 = 2 and f ≤ 6. If p = 5, then f ∗ = 5 and mp (G) = 1, ruling out the existence of Q. If p = 3, then f = 3, 6, whence q 2 ≤ 9 and 2q − 1 ≤ 5 < d(S). Suppose that S = 2B2 (s) or 2G2 (s) with s ≥ 8. Since mp (S)p ≤ 1, we see that q 2 ≤ (s + 1)f , contradicting (9.9.3) as d(S) ≥ (s − 1) s/2. Now we consider the remaining cases with r = 2. Then q ≤ (s+1)3/2 by (9.9.2). This contradicts (9.9.3) if S = G2 (s) (and s ≥ 3), as 6= PSU3 (s) d(S) ≥ s3 − 1. Similarly, S ∼ 6= PSL3 (s) with s ≥ 5 and S ∼ with s ≥ 8. If S = PSp4 (s), then the case 2 ∤ s ≥ 19 is ruled out since d(S) ≥ (s2 − 1)/2, and similarly the case 2|s ≥ 8 is ruled out since d(S) = s(s − 1)2 /2. In the remaining cases, ΦS ΓS is a 2-group, and so Q ≤ S, q 2 ≤ (s + 1)2 , q ≤ s + 1. Now PSL3 (s) and PSU3 (s) with s ≥ 4 are ruled out by (9.9.3), and the same for PSp4 (s) with s ≥ 4. Note that when s = 3, q ≥ 4 and so gcd(q, 2s) 6= 1, a contradiction. If S = SL3 (2), then q = 3 and S has no irreducible character of degree 2q − 1. Finally, Sp4 (2)′ ∼ = Alt(6). Next we handle the groups with r = 3. Here q ≤ (s + 1)2 by (9.9.2). Then (9.9.3) implies that s ≤ 5. In this case, Out(S) is a 2-group, and so Q ≤ S and q ≤ (s + 1)3/2 by (9.9.2). Using (9.9.3), we see that s ≤ 3. The remaining groups S cannot occur, since S does not have a real-valued complex irreducible character of degree 2q − 1. (iii) From now we may assume that r ≥ 4 (and S is not of type D4 or 3D4 ). First we consider the case s = 2. If S = SLn (2) with n ≥ 5, then since Out(S) = C2 , the arguments in (i) show that q 2 ≤ 3n−1 . This contradicts (9.9.3), since d(S) = 2n − 2. Suppose S = SUn (2) with n ≥ 7. Note by [TZ, Theorem 4.1] that the first three nontrivial RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 21 irreducible characters of S are Weil characters and either non-realvalued or of even degree, and the next characters have degree at least (2n − 1)(2n−1 − 4)/9. Hence (9.9.3) can be improved to 2q − 1 ≥ (2n − 1)(2n−1 − 4)/9, which is impossible since q 2 ≤ 3n by (9.9.2). If S = PSUn (2) with n = 5, 6, then q 2 ≤ 36 , and S has no nontrivial real-valued irreducible character of odd degree ≤ 2q − 1 ≤ 53. If S = 2F4 (2)′ or F4 (2), then q 2 ≤ 35 , q ≤ 13, and S has no nontrivial real-valued irreducible character of odd degree ≤ 2q − 1 ≤ 25. Suppose S = Sp2n (2) or Ω± 2n (2). Then Out(S) is a 2-group (recall S is not of type D4 ), and so q 2 ≤ 3n . On the other hand, d(S) ≥ (2n − 1)(2n−1 − 2)/3, contradicting (9.9.3). Finally, if S is of type E8 , E7 , E6 , or 2E6 , then q 2 ≤ 38 whereas d(S) > 210 , again contradicting (9.9.3). (iv) Suppose that S = PSp2n (s) with n ≥ 4 and 2 ∤ s ≥ 3. Then by (9.9.2) and (9.9.3) we have (sn − 1)/2 ≤ 2q − 1 ≤ 2(s + 1)(n+1)/2 − 1, implying n ≤ 5 and s = 3. In this case, inspecting the order of PSp10 (3) we see that q 2 ≤ 121, and so 2q − 1 ≤ 21 < d(S), a contradiction. Next suppose that S = PSUn (3) with n ≥ 5. Then q ≤ 2n and d(S) ≥ (3n − 3)/4, and so (9.9.3) implies that n = 5. In this case, inspecting the order of SU5 (3) we see that q 2 ≤ 61, and so 2q − 1 ≤ 13 < d(S), again a contradiction. Now we may assume that r ≥ 4, s ≥ 3, S ∼ 6= PSp2n (s) if 2 ∤ s, and moreover s ≥ 4 if S ∼ = PSUn (s). Then one can check that d(S) ≥ sr · (51/64) (with equality attained exactly when S ∼ = PSU5 (4)). Hence (9.9.2) and (9.9.3) imply that (51/64)2 · s2r ≤ d(S)2 ≤ (2q − 1)2 < 4(s + 1)r+1 ≤ 4 · (4s/3)r+1, and so (3s/4)r−1 < 4 · (64/51)2 · (4/3)2 , which is impossible for r ≥ 4.  Theorem 9.10. Suppose s0 = p. Then S ∼ = Alt(6). Proof. (i) Assume the contrary. We now exploit the existence of the element x ∈ A of order 2q − 1 which has simple spectrum on V . As before, we can embed A in Aut(S) and again use the decomposition (9.9.1). Let hyi = hxi ∩ Inndiag(S). We also view S = G F for some Frobenius endomorphism F : G → G of a simple algebraic group G of adjoint type, defined over Fp . Note that y is an F -stable semisimple 22 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP element in G, hence it is contained in an F -stable maximal torus T of G by [DM, Corollary 3.16]. It follows that |y| ≤ |T F | ≤ (s + 1)r , if r is the rank of G. Set e = 3 if S is of type D4 or 3D4 , and e = 1 otherwise. Then the decomposition (9.9.1) shows that |x|/|y| ≤ ef ∗ , where f ∗ denotes the odd part of f as before (and s = pf ). We have thus shown that (9.10.1) 2q − 1 = |x| ≤ (s + 1)r ef ∗ . We will frequently use the following remark: (9.10.2) Either f = 1 and s ≥ 3f ∗ , or s ≥ 9f ∗ . We will show that in most of the cases (9.10.1) contradicts (9.9.3). First we handle the case S is of type D4 or 3D4 , whence d(S) ≥ s(s4 −s2 + 1). Hence (9.10.1) and (9.10.2) imply that s(s4 − s2 + 1) ≤ 2q − 1 ≤ s(s + 1)4 /3 if f > 1, a contradiction. If f = 1, then since 2q −1 = dim V is coprime to 2s, we see by [Lu] that 2q − 1 > s7 /2 > 3(s + 1)4 , contradicting (9.10.1). (ii) From now on we may assume that e = 1. Next we rule out the case where V |S is a Weil module of S ∈ {PSLn (s), PSUn (s)} with n ≥ 3, or S = PSp2n (s) with n ≥ 2. Indeed, in this case, if S = PSLn (s) then dim V = (sn − s)/(s − 1), (sn − 1)/(s − 1) is congruent to 0 or 1 modulo p and so cannot be equal to 2q − 1. Similarly, if S = PSUn (s), then V |S can be a Weil module of dimension 2q − 1 only when 2|n and dim V = (sn − 1)/(s + 1). In this case, q = (2q − 1)p = ((sn + s)/(s + 1))p = s (where Np denotes the p-part of the integer N), and so 2s − 1 = (sn + s)/(s + 1), a contradiction. Likewise, if S = PSp2n (s), then V |S can be a Weil module of dimension 2q − 1 only when p = 3 and dim V = (sn + 1)/2. In this case, sn = (2 dim V − 1)p = (4q − 3)p , and so q = 3 and n = 2. One can show that PSp4 (3) does possess a complex irreducible module of dimension 2q − 1 = 5, with an element x of order 5 with simple spectrum on V and a subgroup Q ∼ = C32 with RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 23 desired prescribed action on V ; however, any such module is not selfdual. Henceforth, for the aforementioned possibilities for S we may assume that dim V ≥ d2 (S), the next degree after the degree of Weil characters. Note that d2 (S) for these simple groups S is determined in Theorems 3.1, 4.1, and 5.2 of [TZ]. (iii) Suppose S = PSL2 (s); in particular, s 6= 9. Assume f ≥ 4. As Out(S) = C2,s−1 × Cf , we see that q 2 ≤ sfp < s2 /20, whereas 2q − 1 ≥ d(S) ≥ (s − 1)/2, a contradiction. If f ≤ 3 but fp > 1, then f = p = 3, s = 33 , q 2 ≤ sf = 34 , forcing q = 9. But then S = PSL2 (27) has no irreducible character of degree 2q − 1 = 17. Thus fp = 1, q 2 ≤ s, and so (9.9.3) implies that s ≤ 17. As s 6= 9, we see that mp (G) = mp (S) = 1, contradicting the existence of Q. Next we consider the case S = PSL3 (s) or PSU3 (s). If f > 1, then (9.9.3)–(9.10.2) imply (s − 1)(s2 − s + 1)/3 ≤ d2 (S) ≤ 2q − 1 ≤ (s + 1)2 s/9, which is impossible. Thus f = 1, whence (s − 1)(s2 − s + 1)/3 ≤ d2 (S) ≤ 2q − 1 ≤ (s + 1)2 , yielding s ≤ 5. But if s = 3 or 5, then any nontrivial χ ∈ Irr(S) of odd degree coprime to s is a Weil character, which has been ruled out in (ii). Suppose now that S = PSL4 (s) or PSU4 (s). For s ≥ 5 we have (s − 1)(s3 − 1)/2 ≤ d2 (S) ≤ 2q − 1 ≤ (s + 1)3 s/3, which is possible only when s ≤ 11. Thus 3 ≤ s ≤ 11, whence f ∗ = 1, and so (s − 1)(s3 − 1)/2 ≤ d2 (S) ≤ 2q − 1 ≤ (s + 1)3 , leading to s = 3. If s = 3, then any odd-order element in G has order ≤ 13, whereas d(S) = 21, contradicting (9.9.3). To finish off type A, assume now that S = PSLn (s) or PSUn (s) with n ≥ 5. Then (9.9.3)–(9.10.2) imply whence (sn + 1)(sn−1 − s2 ) ≤ d2 (S) ≤ 2q − 1 ≤ (s + 1)n−1 s/3, 2 (s + 1)(s − 1) s2n−3 < (s + 1)n s/3 < s51n/40 (because (s + 1)/s ≤ 4/3 < 311/40 ), a contradiction as n ≥ 5. (iv) Suppose S = P Ω± 2n (s) with n ≥ 4. For n ≥ 5 we get that (sn − 1)(sn−1 − s) ≤ d(S) ≤ 2q − 1 ≤ (s + 1)n f ≤ (s + 1)n s/3, 2 s −1 24 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP whence s2n−3.1 < (s + 1)n s/3 < s51n/40 , a contradiction. If n = 4, then S = P Ω− 8 (s). In this case, since 2q − 1 is coprime to 2s, [Lu] implies that 2q − 1 ≥ (s4 + 1)(s2 − s + 1)/2 > (s + 1)4 s/3, again a contradiction. Suppose S = PSp2n (s) with n ≥ 2 or Ω2n+1 (s) with n ≥ 3. Using the bound 2q − 1 ≥ d2 (S) for S = PSp2n (s) and 2q − 1 ≥ d(S) otherwise, we get for n ≥ 3 that whence (sn − 1)(sn − s) ≤ 2q − 1 ≤ (s + 1)n f ≤ (s + 1)n s/3, s2 − 1 s2n−2.1 < (s + 1)n s/3 < s51n/40 , a contradiction. If n = 2, then S = PSp4 (s), and we have s(s − 1)2 ≤ 2q − 1 ≤ (s + 1)s /3, forcing q ≤ 9. If 5 ≤ q ≤ 9, then since the degree 2q − 1 = dim V is coprime to 2s, we again get 2q − 1 > 300 ≥ (s + 1)2 s/3. Finally, PSp4 (3) has no nontrivial non-Weil character of degree coprime to 6. (v) If S is of type E6 , 2E6 , E7 , or E8 , then (s5 + s)(s6 − s3 + 1) ≤ d(S) ≤ 2q − 1 ≤ (s + 1)8 f ≤ (s + 1)8 s/3, a contradiction. Similarly, if S = F4 (s), then s8 − s4 + 1 = d(S) ≤ 2q − 1 ≤ (s + 1)4 s/3, which is impossible. Likewise, if S = G2 (s) with s ≥ 5, then s3 − 1 ≤ d(S) ≤ 2q − 1 ≤ (s + 1)2 s/3, again a contradiction. Next, if S = G2 (3), then 2q − 1 ≤ 16 cannot be a degree of an irreducible character of S. Finally, if S = 2G2 (s), then s2 − s + 1 = d(S) ≤ 2q − 1 ≤ (s + 1)f ≤ (s + 1)s/3, again a contradiction since s ≥ 27. Our proof is now concluded by applying Theorem 9.7.   RIGID LOCAL SYSTEMS AND ALTERNATING GROUPS 25 References [As] Aschbacher, M., Maximal subgroups of classical groups, On the maximal subgroups of the finite classical groups, Invent. Math. 76 (1984), 469–514. [Atlas] Conway, J. H., Curtis, R. T., Norton, S. P., Parker, R. A. and Wilson, R. A., Atlas of Finite Groups, Clarendon Press, Oxford 1985. [C-R] Curtis, C.W. and Reiner, I., Representation Theory of Finite Groups and Associative Algebras, Interscience Publishers, New York 1962, xiv+689 pp. [De-Weil II] Deligne, P., La conjecture de Weil II, Pub. Math. I.H.E.S. 52 (1981), 313–428. [DM] Digne, F. and Michel, J., Representations of Finite Groups of Lie Type, London Mathematical Society Student Texts 21, Cambridge University Press, 1991. [FH] W. Fulton and J. Harris, Representation Theory, Springer-Verlag, New York, 1991. [GAP] The GAP group, GAP - groups, algorithms, and programming, Version 4.4, 2004, http://www.gap-system.org. [GLS] Gorenstein, D., Lyons, R., and Solomon, R.M., The Classification of the Finite Simple Groups, Number 3. Part I. Chapter A, volume 40 of Mathematical Surveys and Monographs, American Mathematical Society, Providence, RI, 1998. [Gross] Gross, B. H., Rigid local systems on Gm with finite monodromy, Adv. Math. 224 (2010), no. 6, 2531–2543. [Gro-FL] Grothendieck, A., Formule de Lefschetz et rationalité des fonctions L, Seminaire Bourbaki 1964-65, Exposé 279, reprinted in: Dix Exposés sur la cohomologie des schémas, North-Holland, 1968. [GT] Guranick, R. M. and Tiep, P. H., Symmetric powers and a conjecture of Kollar and Larsen, Invent. Math. 174 (2008), 505–554. [Ho] Howe, R., Another look at the local θ-correspondence for an unramified dual pair. Festschrift in honor of I. I. Piatetski-Shapiro on the occasion of his sixtieth birthday, Part I (Ramat Aviv, 1989), 93–124, Israel Math. Conf. Proc., 2, Weizmann, Jerusalem, 1990. [Ka-ESDE] Katz, N., Exponential Sums and Differential Equations, Annals of Mathematics Studies, 124. Princeton Univ. Press, Princeton, NJ, 1990. xii+430 pp. [Ka-GKM] Katz, N., Gauss Sums, Kloosterman Sums, and Monodromy Groups, Annals of Mathematics Studies, 116. Princeton Univ. Press, Princeton, NJ, 1988. ix+246 pp. [Ka-MMP] Katz, N., Moments, Monodromy, and Perversity, Annals of Mathematics Studies, 159. Princeton University Press, Princeton, NJ, 2005. viii+475 pp. [Ka-NG2] Katz, N., Notes on G2 , determinants, and equidistribution, Finite Felds and their Applications 10 (2004), 221–269. 26 ROBERT M. GURALNICK, NICHOLAS M. KATZ, AND PHAM HUU TIEP [Ka-PES] Katz, N., Perversity and exponential sums, in: Algebraic Number Theory - in honor of K. Iwasawa, Advanced Studies in Pure Mathematics 17, 1989, 209–259. [Ka-RLS] Katz, N., Rigid Local Systems, Annals of Mathematics Studies, 139. Princeton University Press, Princeton, NJ, 1996. viii+223 pp. [Ka-RLSFM] Katz, N., Rigid local systems on A1 with finite monodromy, preprint available at www.math.princeton.edu/~nmk/gpconj87.pdf. [Ka-Sar] Katz, N., and Sarnak, P., Random matrices, Frobenius eigenvalues, and monodromy, American Mathematical Society Colloquium Publications, 45. American Mathematical Society, Providence, RI, 1999. xii+419 pp. [LS] Liebeck, M. W. and Seitz, G. M. On the subgroup structure of classical groups, Invent. Math. 134 (1998), 427–453. [Lu] Lübeck, F., Character degrees and their multiplicities for some groups of Lie type of rank < 9, http://www.math.rwth-aachen.de/~Frank.Luebeck/chev/DegMult/index.html. [Pa] Panyushev, D. I., Weight multiplicity free representations, g-endomorphism algebras, and Dynkin polynomials, J. London Math. Soc. 69 (2004), 273–290. [Ra] Rasala, R., On the minimal degrees of characters of Sn , J. Algebra 45 (1977), 132–181. [Ray] Raynaud, M. Revêtements de la droite affine en caractéristique p > 0 et conjecture d’Abhyankar, Invent. Math. 116 (1994), no. 1-3, 425–462. [T] Tiep, P. H., Low dimensional representations of finite quasisimple groups, Proceedings of the London Math. Soc. Symposium “Groups, Geometries, and Combinatorics”, Durham, July 2001, A. A. Ivanov et al eds., World Scientific, 2003, N. J. 277–294. [TZ] Tiep, P. H. and Zalesskii, A. E., Minimal characters of the finite classical groups, Comm. Algebra 24 (1996), 2093–2167. Department of Mathematics, University of Southern California, Los Angeles, CA 90089-2532, USA E-mail address: [email protected] Department of Mathematics, Princeton University, Princeton, NJ 08544-1000, USA E-mail address: [email protected] Department of Mathematics, Rutgers University, Piscataway, NJ 08854-8019, USA E-mail address: [email protected]
4math.GR
arXiv:1412.1393v1 [cs.PL] 3 Dec 2014 CLAZY: Lazy Calling for Common Lisp Marco Antoniotti Lab Linguaggi Programmazione – Programming Language Lab < LLP ΠΛΛ > Dipartimento di Informatica, Sistemistica e Comunicazione, Università Milano Bicocca U14 - Viale Sarca 336, I-20126 Milan, Italy Abstract This document contains a description of a Common Lisp extension that allows a programmer to write functional programs that use normal order evaluation, as in non-strict languages like Haskell. The extension is relatively straightforward, and it appears to be the first one such that is integrated in the overall Common Lisp framework1 . 1 Introduction Common Lisp is a functional language (and also an imperative, object-oriented one, which, moreover, can be used in a declarative fashion). As a functional language it falls in the category of strict languages like ML [7] and OCaml [5], unlike Haskell [6], which is in the category of normal-order or lazy languages. That is to say that the following code will enter an infinite loop, should it be executed at the Common Lisp prompt. cl-prompt> (defun si (condicio ergo alternatio) (if condicio ergo alternatio)) SI cl-prompt> (si t 42 (loop)) In a lazy language the function si (if in Latin) would return 42 instead of waiting for the form (loop) to produce a value. In a bout of Haskell envy, I decided to look into some extensions to Common Lisp that would introduce ways to program in a lazy way. The result may sound crazy, and, in fact, a little bit it is. The notion of lazy evaluation dates back to the Algol days and the notion of by-name parameter passing. In the Lisp camp, the best known way to introduce a form of lazy evaluation is to implement streams as described in Structure and Interpretation of Computer Programs (SICP) [1]; incidentally this form of lazy evaluation is also used by Okasaki [8] in his exposition of functional data structures in ML. In SICP, streams are implemented using two primitives, force and delay, which can then be used to build a lazy container (the “stream”) using a macro cons-stream, and two accessors head and tail. A sufficient implementation in Common Lisp is the following: 1A version of this note was presented at the 1st European Lisp Symposium 2008, Bordeaux, France 1 Antoniotti, M. < LLP ΠΛΛ > CLAZY: Lazy Calling. . . (defmacro delay (expr) ‘(lambda () ,expr)) (defun force (thunk) (funcall thunk)) (defmacro cons-stream (head tail) ‘(cons ,head (delay ,tail))) (defun head (lazy-stream) (car lazy-stream)) (defun tail (lazy-stream) (force (cdr lazy-stream))) At this point there are several Common Lisp packages floating around the net, that implement this flavor of lazy evaluation. E.g., Heresy [4], funds [2] and FSet [3] are exemplars of this approach. CLAZY goes off a (different) tangent and provides a more fundamental way to build such lazy constructions. 1.1 Limits of the delay/force Duo Given delay and force, one could always implement the operator si as a macro using delay, as in (defmacro si (condicio ergo alternatio) ‘(if (force ,condition) (force (delay ,ergo)) (force (delay ,alternatio)))) but this is a bit unsatisfactory as far as Haskell envy is concerned. si cannot be funcalled in any meaningful way and cannot be passed around as we would expect a regular function to be. A different solution is needed. 2 Defining and Calling Lazy Functions It is possible to come up with a more satisfactory solution that will allow us to bypass delay and force, at the price of tweaking the “calling convention”. Then we can write si as: (deflazy (condicio ergo alternatio) (if condicio ergo alternatio)) where deflazy defines both lazy and strict versions of the operator. The lazy function si can now be called as CL prompt> (lazy:call #’si t 42 (loop)) 42 2 Antoniotti, M. < LLP ΠΛΛ > CLAZY: Lazy Calling. . . CL prompt> (lazy:call (lazy #’(lambda (condicio ergo alternatio) (if condicio ergo alternatio))) t (+ 20 20 2) (loop)) 42 Figure 1: An example of the use of the special operator lazy. I.e., lazy:call is the lazy version of funcall. The complexity of writing lazy code is thus moved to the call points. This may or may not be desirable, but it can be argued that this is a slightly better way than having to manually force expressions. In any case, the CLAZY approach still uses the delay/force duo under the hood, and they are available for more manual intervention. From the example above, it should be apparent that lazy:call is a macro that does something special with the call, recognizing functions that are defined via deflazy. As a matter of facts, the expansion of lazy:call looks like this: (lazy:call <op> <arg1> <arg2> ... <argN>) =⇒ (funcall <lazyfied op> <thunked arg1> <thunked arg2> ... <thunked argN>) The “lazy” version of <op> is defined by deflazy and each <thunked argi > is a closed over version of the argument as if delay was invoked on it. Of course, a simple version of such idea can be easily implemented with a few macros, however, a well integrated version within the overall Common Lisp environment requires a few more bits and pieces. As example, CLAZY wants to make the analogy between lazy:call and funcall as tight as possible. This means that we need a way to pass (almost) regular lambda’s to lazy:call. This can be done the special operator lazy, which acts as function; moreover, it does wrap around the function operator as expected. See Figure (1) for an example. Extra work is needed to handle &optional and &key parameters, but the overall design lies in this tweaking of the calling point and in allowing lazy functional objects to be passed around as regular functions (of course to be called via lazy:call). 3 Antoniotti, M. 2.1 < LLP ΠΛΛ > CLAZY: Lazy Calling. . . Example: Lazy Functional Conses Another example which turns out to be more easily realizable with CLAZY is the standard “conses are functions” one. (deflazy conc (head tail) (lambda (selector) (ecase selector (car head) (cdr tail)))) (deflazy head (cons) (funcall cons ’car)) (deflazy tail (cons) (funcall cons ’cdr)) Now, we can build truly lazy lists2 CL prompt> (defparameter ll (lazy:call ’conc 1 (lazy:call ’conc (loop) (lazy:call ’conc 3 (loop))))) LL CL prompt> (head (tail (tail ll))) 3 Or the usual streams from SICP as the integers here below. (defun integers-from (n) (lazy:call ’conc n (integers-from (1+ n)))) (defparameter integers (integers-from 0)) Yet, it must be noted that having normal order evaluation at one’s disposal naturally leads to the implementation of much more complex and sophisticated functional software, as in the case of the integrators in Section 3.5 of [1]. 2 Note where the (loop) calls appear. 4 Antoniotti, M. < LLP ΠΛΛ > CLAZY: Lazy Calling. . . (lazy:call (lazy (lambda (x &key (y (loop) y-supplied-p)) (if y-supplied-p y (+ x 21)))) 21) (lazy:call (lazy (lambda (x &key ((:y yy) (loop))) (if x (+ x 21) yy))) 21) (lazy:call (lazy (lambda (x &key ((:y yy) (loop))) (if x (+ x 21) yy))) nil :y 42)) Figure 2: &key arguments are dealt with as expected. The answer is always, as expected, 42. 2.2 Extra Considerations CLAZY is supposed to be used in a very controlled way. While it is true that it adds normal order evaluation to Common Lisp, the user must remember that s/he is not using Haskell or a similar language. At its core, Common Lisp is a strict language, which allows side-effects; not a good mix to produce lazy code in a careless way. See also the note on normal order evaluation in Section 3.5 on streams of [1]. 3 Reference Implementation The CLAZY reference implementation can be found at common-lisp.net. The implementation lies within a package nicknamed LAZY and is based on the macros lazy:call, lazy:deflazy, and lazy:lazy. The lazy:call macro is used at calling time (as the name implies). The deflazy macro is used to define functions. The lazy “special operator” returns a functional object that should be called in a lazy way, although the system is set up in such a way to “pass through” constant values (as tested by constanp). The reference implementation is based on the pre-processing of lambda list arguments by deflazy: each argument is substituted by an internal name, which is expected to be bound to a thunk generated by lazy:call as per delay. In the body of a lazy function (or of a lazy lambda) each lambda list argument is actually re-defined as a a symbol-macrolet, which expands in the appropriate force call. deflazy installs the lazy version of the function being defined in the property list of the function name. Ordinary Lambda List Processing. As noted before, CLAZY pre-processes &optional and &key arguments in such a way to preserve the expected Common Lisp semantics. E.g., the calls in Figure (2) yield 42 as expected. On the contrary, the implementation does not treat &rest arguments in a special way (i.e., they are not thunked ), this is because there is no way to access the list forming machinery in Common Lisp when &rest arguments are present; in a lazy piece of code, the list in the &rest argument will contain the actual thunks generated as if by delay. 5 Antoniotti, M. 4 < LLP ΠΛΛ > CLAZY: Lazy Calling. . . Conclusions CLAZY is an a exercise in Common Lisp style, which is also useful. The CLAZY library shows how, at the price of introducing a special call operator (lazy:call), it is possible to introduce normal order or lazy evaluation in Common Lisp. The extension has the following desirable characteristics: (i) it does not require the construction of a full blown interpreter implementing lazy evaluation, and (ii) thanks to the deflazy macro it allows a programmer to write code in the most natural way. It is much more difficult to achieve the same effect in any other language than Common Lisp, even when the language has macros. It is the under-the-hood interaction of macros and symbol-macrolet that makes CLAZY possible. Of course, once this basic machinery is in place, extra Common Lisp incantations can be made and reader macros put in place as desired. CLAZY is not perfect of course. The main open issue to complete the integration within the frame provided by Common Lisp is to work out a way to deal with CLOS methods. One way to achieve this would be to automatically define a method specializing on thunks for a given generic function. While this may work, it does open up typing issues3 that need to be worked out in details before proceeding with a full blown proposal. References [1] H. Abelson, J. Sussman, and J. Sussman. Structure and Interpretation of Computer Programs. MIT Press, second edition, 1996. [2] A. Baine. Funds: Functional Data Structures in Common Lisp. Project page at http://common-lisp.net/project/funds, 2007. [3] S Burson. FSet: a functional set-theoretic collections library. Project page at http://common-lisp.net/project/fset, 2007. [4] M. Lamari. Heresy: Haskellesque lazy-list and functional tools with a Common Lisp slant. Project page at http://cl-heresy.sourceforge.net/Heresy.htm, 2007. [5] X. Leroy. The OCaml system release 4.02. Published online at http://caml.inria.fr/pub/docs/manual-ocaml/, September 2014. [6] S. Marlow (editor). Haskell 2010 Language Report. Published online at: https://www.haskell.org/onlinereport/haskell2010/, November 2009. [7] R. Milner, M. Tofte, R. Harper, and D. MacQueen. The Definition of Standard ML (Revised). MIT Press, 1997. [8] C. Okasaki. Purely Functional Data Structures. Cambridge University Press, 1998. [9] K. M. Pitman. The Common Lisp Hyperspec. Published online at http://www.lisp.org/HyperSpec/FrontMatter/index.html, 1994. 3 lazy:call would need to know the actual resulting type of the argument expressions to meaningfully set up a discrimination for the underlying method. 6
6cs.PL
Stepwise Transmit Antenna Selection in Downlink Massive Multiuser MIMO Ali Bereyhi, Saba Asaad, Ralf R. Müller arXiv:1802.05148v2 [cs.IT] 19 Feb 2018 Friedrich-Alexander Universität Erlangen-Nürnberg (FAU) [email protected], [email protected], [email protected] Abstract—Due to the large power consumption in RF-circuitry of massive MIMO systems, practically relevant performance measures such as energy efficiency or bandwidth efficiency are neither necessarily monotonous functions of the total transmit power nor the number of active antennas. Optimal antenna selection is however computationally infeasible in these systems. In this paper, we propose an iterative algorithm to optimize the transmit power and the subset of selected antennas subject to non-monotonous performance measures in massive multiuser MIMO settings. Numerical results are given for energy efficiency and demonstrate that for several settings the optimal number of selected antennas reported by the proposed algorithm is significantly smaller than the total number of transmit antennas. This fact indicates that antenna selection in several massive MIMO scenarios not only reduces the hardware complexity and RF-costs, but also enhances the energy efficiency of the system. I. I NTRODUCTION The ever increasing growth in the number of digital devices such as smart phones, tablets and personal computers as well as broadband wireless applications put a heavy strain on wireless community to design the next generation of cellular networks. Considering this backdrop, wireless technologies are shifting towards systems with higher transmission rates and lower power consumption; or more precisely systems with high power efficiency [1]. In this respect, massive MultipleInput Multiple-Output (MIMO) has been considered as one of leading candidates for future wireless communications [2], [3]. The so-called “power scaling law” in massive MIMO systems demonstrates that for a given transmission rate, the required transmit power is effectively scaled. More precisely, for a Base Station (BS) with a large transmit antenna array, the transmit power of each user is reduced substantially proportional to the number of antennas [4]. Despite the power scaling law, the large antenna arrays employed in massive MIMO systems increase the consumed power at the Radio Frequency (RF)-chains. In other words, although in massive MIMO systems the radiated power per each transmit antenna is extremely low, the growth in the number of antennas increases the power consumed in the RF circuits which is in general linearly scaled with the array size [5]. In addition to the large power consumption, massive MIMO systems with a dedicated RF-chain at each antenna suffer from multiple other issues such as high implementation cost and hardware complexity. This work was supported by the German Research Foundation, Deutsche Forschungsgemeinschaft (DFG), under Grant No. MU 3735/2-1. Considering this fact, it is concluded that despite the appealing theoretical benefits of massive MIMO, it still needs to be developed from the implementational viewpoints. Recent studies have addressed some of these issues by investigating approaches such as antenna selection [6], hybrid analog and digital precoding schemes [7] and spatial modulation [8], in the context of massive MIMO. In this study, we focus on antenna selection which we believe is a promising approach for cost and complexity alleviation in massive MIMO settings. In general, the optimal antenna selection approach is computationally infeasible in these systems, since it requires an exhaustive search. Consequently, studies in this direction either investigate the asymptotic performance of optimal approaches by means of advanced mathematical tools such as the replica method [9]–[12], or develop and analyze suboptimal algorithms with feasible complexity [13]. A body of recent work has demonstrated that by using effective antenna selection strategies, several asymptotic properties of massive MIMO systems, such as energy efficiency [14] and channel hardening [13], are essentially maintained with significantly fewer RF chains. Antenna selection has been moreover shown to be enhancing in several scenarios. For example, the study in [15] demonstrated that the secrecy performance of a wiretap channel with large antenna arrays can be significantly improved via antenna selection compared to the case with all antennas being active. Accounting for power consumption in RF-circuitry, energy efficiency, bandwidth efficiency, and other practically relevant performance measures are neither necessarily monotonous functions of the total transmit power nor the number of active antennas. This fact depicts that antenna selection, as well as transmit power control in general not only can reduce the hardware cost, but also may enhance the performance of the system. In this paper, we propose an iterative method to optimize the total transmit power and the subset of selected antennas for a desired performance measure. From mathematical points of view, optimal antenna selection is equivalent to the problem of finding an efficient subset of integers which maximizes an objective function subject to a set of constraints. Such problems also arise in other contexts such as pattern recognition and data mining [16], [17]. There are therefore a variety of iterative approaches which determine a suboptimal, but effective, subset with low computational complexity among which stepwise regression methods have obtained more credit [16]. Based on these greedy methods, several studies invoked the results in the literature to develop iterative antenna selection algorithms for conventional singleuser MIMO systems1 [18]–[21] considering the spectral efficiency as the performance measure. Regarding the promising results in the literature of conventional MIMO and considering the large nature of massive MIMO systems, the stepwise regression methods can propose effective selection algorithms in these systems with feasible computational complexity. Contributions In this paper, we consider the downlink massive multiuser MIMO scenario with linear precoding and develop a class of iterative antenna selection algorithms based on stepwise regression methods to optimize the total transmit power and the subset of selected antennas subject to a non-monotonous performance measure. Given a set of constraints on the number of possible active antennas and transmit power, these algorithms iteratively select a subset of antennas and tune the transmit power such that the desired performance measure is maximized. In addition to significant gains reported by the proposed algorithm, numerical results are given for energy efficiency and demonstrate that the antenna selection can also enhance the energy efficiency compared to the case of full antenna selection in some massive MIMO settings. Notation Throughout the paper the following notations are adopted. Scalars, vectors and matrices are represented with non-bold, bold lower case and bold upper case letters, respectively. HH , HT and H∗ indicate the Hermitian, transpose and conjugate of H, respectively, and IN is the N × N identity matrix. The Euclidean norm of x is denoted by kxk and log (·) indicates the binary logarithm. Moreover, E {·} represents the mathematical expectation. The subset of A containing the members of A which do not belong to B is moreover denoted by A\B. For the sake of compactness, we abbreviate the set of integers {1, . . . , N } with [N ]. II. P ROBLEM F ORMULATION Consider a downlink transmission in a multiuser MIMO system with K single-antenna users. The base station is equipped with a transmit antenna array of length N and employs the Transmit Antenna Selection (TAS) protocol S to select a subset of L antennas for transmission. Let yk ∈ C denote the symbol received at user k for k ∈ [K] and G ∈ CN ×K represent the matrix of channel coefficients between user terminals and the transmit antenna array. It is assumed that the system operates in standard Time-Division Duplexing (TDD) mode meaning that the channel is reciprocal in the uplink and doswnlink. In this case, by using the reciprocity of the channel, the received vector y := [y1 , . . . , yK ]T is written as y = HT Lx + z (1) where x ∈ CL×1 denotes the transmit vector and contains the symbols being transmitted over L active antennas, 1 By conventional MIMO systems we mean systems with few number of antennas at the receive and transmit sides. z ∈ CK×1 is circularly symmetric zero-mean and unitvariance complex Gaussian noise, and HL ∈ CL×K describes the channel between users and L transmit antennas selected by S, i.e., HL = S(G; L). The transmit vector x is moreover constructed at the base station by linear precoding over active antennas, i.e., √ (2) x = P AL s where s := [s1 , . . . , sK ]T with sk ∈ C being the data symbol for user k, and AL ∈ CL×K represents the precoding matrix for HL , i.e., AL = Pre(HL ). It is moreover assumed that E |sk |2 = 1 and the total transmit power is P , or equivalently E Tr{AL AH L } = 1. A. Achievable Rates and Power Consumption Model The achievable rate at user k is bounded from below by [22] Rk (L, P ) = log (1 + SINRk (L, P )) (3) with SINRk (L, P ) being defined for k ∈ [K] as SINRk (L, P ) := tk (HL , AL )P 1 + uk (HL , AL )P (4) 2 where tk (HL , AL ) := |hT k (L)ak (L)| with hk (L) and ak (L) denoting the kth column vector of HL and AL , respectively, and uk (HL , AL ) is the kth multiuser interference coefficient defined as uk (HL , AL ) := K X j=1,j6=k 2 |hT k (L)aj (L)| . The total power consumed in this system, including the receive side, is moreover modeled as [4] Rx Q(L, P ) = ξP + LQTx cr + KQcr + (K + 1) Qsync (5) where ξ represents the inverse efficiency factor of the power Rx amplifiers used at the base station, QTx cr and Qcr are respectively the circuit power consumed at each transmit and receive RF-chain, and Qsync denotes the power consumption at the local oscillators utilized at the base station and user terminals for frequency synthesis. B. Nonuniform Average Spectral Efficiency Let wk ∈ R+ be a weighting coefficient which describes the service quality required for k. The average spectral efficiency with respect to the vector w = [w1 , . . . , wK ]T is then given by R(L, P |w) := K 1 X wk Rk (L, P ). K (6) k=1 This nonuniform average spectral efficiency recovers the conventional definition of the average spectral efficiency by setting wk = 1 for k ∈ [K]. Moreover, nonuniform choices of weights address cases in which different users enjoy different priorities. C. Nonuniform Average Energy Efficiency The average energy efficiency for a given w is defined as E(L, P |w) := R(L, P |w) Q(L, P ) (7) which determines the average data rate per each unit of energy consumed in this system. III. I TERATIVE TAS AND P OWER C ONTROL A LGORITHM In this setting, we deal with two correlated challenges of TAS and transmit power control. More precisely, the measure of performance in general does not necessarily grow monotonically in terms of the number of active antennas L and the total transmit power P . For several measures, there are some scenarios in which the performance is optimized at some L < Lmax and P < Pmax where Lmax and Pmax are the maximum number of selected antennas and maximum possible transmit power constrained by hardware restrictions. An example of such a scenario is the case with the average energy efficiency as a measure of performance. In this case, the increase in the number of active antennas as well as the growth in the total transmit power can increase both the average spectral efficiency and the consumed power, and consequently, the energy efficiency could be maximized at some L and P such that L < Lmax and P < Pmax . In order to formulate this problem, we denote the measure of performance for a weighting vector w with M(SL , L, P |w) when L transmit antennas, whose indices are in SL ⊆ [N ], are selected, and the total transmit power is set to P . In this case, the problem of optimal TAS and transmit power control is to find L⋆ , the set S⋆L⋆ and the transmit power P ⋆ such that (S⋆L⋆ , L⋆ , P ⋆ ) = argmax SL ⊆[N ],L≤Lmax M(SL , L, P |w) The performance measure M(L, P |w) is linearly written in terms of Rk (L, P ), e.g., M(L, P |w) = R(L, P |w), M(L, P |w) = E(L, P |w) or some linear combination of spectral and energy efficiency. The algorithms start from ℓ = 1 and select antennas up to some L in which L ≤ Lmax . For initialization, we set the antenna with strongest channel to be the first selected antenna which means H1 ∈ C1×K is chosen to be the row of G with maximum norm. Consequently, the initial precoding matrix is given by A1 = Pre(H1 ). In this case, we set the initial value for the transmit power to be P1 such that • (8) 0≤P ≤Pmax for some Lmax and Pmax . Some examples for M(SL , L, P |w) are R(L, P |w) and E(L, P |w). For the sake of brevity, we further drop the argument SL and represent the performance measure with M(L, P |w) in the rest of this manuscript. The optimization problem in (8) is computationally infeasible due to the large number of searches needed for TAS. In fact, even for cases in which M(SL , L, P |w) is convex with respect to P , antenna selection needs an exhaustive search of size N L which grows significantly large in N . We therefore take an alternative approach based on the stepwise regression method and design an iterative algorithm which jointly selects transmit antennas and tunes the total transmit power P . A. Primary Assumptions and Notations In the following sections, we develop iterative algorithms for a large class of performance measures. For deriving the algorithms, we consider the following set of assumptions. • The number of selected transmit antennas is limited by Lmax , i.e., L ≤ Lmax antennas are selected. • The maximum possible transmit power is Pmax which means that P ≤ Pmax in each transmission interval. P1 = argmax M(1, P |w). (9) 0≤P ≤Pmax Here, M(1, P |w) represents the performance measure, e.g., R(1, P |w) or E(1, P |w), considering the channel matrix to be H1 and the precoding matrix to be A1 . With this initialization, we derive a stepwise update rule for each step. B. Stepwise Update Rule Assume that we have already selected ℓ < Lmax transmit antennas, and now intend to select a new antenna. We represent the index of the selected antenna in step ℓ + 1 with n⋆ where n⋆ ∈ [N ]\S(ℓ) with S(ℓ) containing the indices of the antennas selected in steps [ℓ]. Let us denote the n⋆ th row of G with the vector gT (n⋆ ) = [g1 (n⋆ ), . . . , gk (n⋆ )]. Without loss of generality, one can write hk (ℓ + 1)=[hT (ℓ), gk (n⋆ )]T (10a) pk T T ⋆ ⋆ T ⋆ ak (ℓ + 1)=[ µ(ℓ, n ) ak (ℓ) + dk (ℓ, n ), bk (ℓ, n )] (10b) where µ(ℓ, n⋆ ), dk (ℓ, n⋆ ) ∈ Cℓ×1 and bk (ℓ, n⋆ ) are derived in terms of Hℓ , Aℓ and g(n⋆ ) depending on the precoding rule Pre(·). We later derive these parameters for different linear precodings, namely Maximum Ratio Transmission (MRT), Zero Forcing (ZF) and Regularized Zero Forcing (RZF). By substituting the new channel and precoding coefficients in (4), we have SINRk (ℓ + 1, P ) = µ(ℓ, n⋆ )tk (Hℓ , Aℓ )P + ǫk (ℓ, n⋆ )P 1 + µ(ℓ, n⋆ )uk (Hℓ , Aℓ )P + ψk (ℓ, n⋆ )P (11) where ǫk (ℓ, n⋆ ) and ψk (ℓ, n⋆ ) are given by ǫk (ℓ, n⋆ ) := |δkk (ℓ, n⋆ )|2 np o ∗ ⋆ + 2Re µ(ℓ, n⋆ ) hT (12a) k (ℓ)ak (ℓ)δkk (ℓ, n ) ⋆ ψk (ℓ, n ) := K X j=1,j6=k + 2Re |δkj (ℓ, n⋆ )|2 o np ∗ ⋆ µ(ℓ, n⋆ ) hT (12b) k (ℓ)aj (ℓ)δkj (ℓ, n ) with δkj (ℓ, n⋆ ) being defined as ⋆ ⋆ ⋆ δkj (ℓ, n⋆ ) := hT k (ℓ)dj (ℓ, n ) + gk (n )bj (ℓ, n ). (13) Here, the argument n⋆ indicates the dependency on the coefficients of the new selected channel. By substituting (11) into (3), one can finally write Rk (ℓ + 1, P ) = Rk (ℓ, P ) + log θk (ℓ, n⋆ , P )φk (ℓ, P ) (14) Algorithm 1 Iterative TAS and Power Control Input: G, Pmax , Lmax , precoding rule Pre(·) and performance measure M(ℓ, P |w) Initiate Let ℓ = 1 and n⋆ = argmaxkG(n, :)k where φk (ℓ, P ) is given by φk (ℓ, P ) := 1/P + uk (Hℓ , Aℓ ) 1/P + uk (Hℓ , Aℓ ) + tk (Hℓ , Aℓ ) (15) and set H1 = G(n⋆ , :) and A1 = Pre(H1 ). Set P1 = argmax M(1, P |w) and θk (ℓ, n⋆ , P ), which depends on the selected antenna, reads θk (ℓ,n⋆ , P ) := µ(ℓ, n⋆ )tk (Hℓ , Aℓ ) + ǫk (ℓ, n⋆ ) 1+ . 1/P + µ(ℓ, n⋆ )uk (Hℓ , Aℓ ) + ψk (ℓ, n⋆ ) M(ℓ + 1, P |w) = M(ℓ, P |w) + Θ(ℓ, n⋆ , P ) (16) (17) ⋆ where Θ(ℓ, n , P ) is derived as a function of θk (ℓ, n , P ) and φk (ℓ, P ). We refer to (17) as the stepwise update rule. C. Iterative Approach for TAS and Power Control Based on the stepwise update rule, we now propose an iterative TAS and power control algorithm. Here, we state the algorithm for a general precoding and performance measure and give detailed derivations for different measures and precoding matrices in the next sections. The algorithm follows the stepwise regression method. In each step, we select the antenna which results in the maximum possible growth in the performance measure. Although this approach does not necessarily lead to the optimal solution, it enjoys low computational complexity while demonstrating a better performance compared to other low complexity approaches. Using the stepwise regression method, one starts with the initialization H1 , A1 and P1 for ℓ = 1 and chooses the transmit antenna n⋆ in step ℓ as n⋆ = argmax Θ(ℓ, n, Pℓ ). n∈[N ]\S(ℓ) (18) T The channel matrix is then updated as Hℓ+1 = [HT ℓ , gn⋆ ] 1 and the transmit power for the next step is set to be Pℓ+1 = argmax M(ℓ + 1, P |w). (19) 0≤P ≤Pmax In general, the algorithm can select antennas until it reaches Lmax . Nevertheless, the stepwise update rule may stop growing at some step ℓ < Lmax . We therefore stop the algorithm at step L⋆ ≤ Lmax when either L⋆ = Lmax or Θ(L⋆ , n⋆ , PL⋆ ) ≤ 0. (22) 0≤P ≤Pmax and S(1) = {n⋆ }. The stepwise variation of Rk (ℓ, P ) in (14) lets us to select a new antenna in step ℓ + 1 given the selected antennas in steps [ℓ] and the power P , such that Rk (ℓ, P ) has the maximum growth. Although such a selection does not necessarily give the optimal selection, it leads to an efficient algorithm with low complexity. Starting from (14), the performance measure is updated in each step as ⋆ (21) n∈[N ] (20) 1 It is worth to note that this optimization involves only a single argument P , and its dimension does not grow with the system size. while ℓ < Lmax n⋆ = argmax Θ(ℓ, n, Pℓ ) n∈[N ]\S(ℓ) (23) let Θ⋆ = Θ(ℓ, n⋆ , Pℓ ). if Θ⋆ ≤ 0 then break end if   ⋆ T T Set Hℓ+1 = HT and ℓ , G(n , :) D(ℓ, n⋆ ) = [d1 (ℓ, n⋆ ), . . . , dK (ℓ, n⋆ )] (24a) T (24b) ⋆ ⋆ ⋆ b(ℓ, n ) = [b1 (ℓ, n ), . . . , bK (ℓ, n )] , and update the precoding matrix as  p µ(ℓ, n⋆ )Aℓ + D(ℓ, n⋆ ) . Aℓ+1 = bT (ℓ, n⋆ ) (25) Define the scalar function M(ℓ + 1, P |w) = M(ℓ, P |w) + Θ(ℓ, n⋆ , P ) (26) and update the transmit power as Pℓ+1 = argmax M(ℓ + 1, P |w). (27) 0≤P ≤Pmax Update S(ℓ + 1) = S(ℓ) ∪ {n⋆ } and ℓ = ℓ + 1. end while Output: L⋆ = ℓ, PL⋆ = Pℓ and S(L⋆ ) = S(ℓ). The outputs of this algorithm are then L⋆ , PL⋆ and The algorithm is illustrated in Algorithm 1 in details. S(L⋆ ). The proposed algorithm considers a general setting. In the sequel, we derive the detailed formulation for several performance measures and linear precoders. Namely we determine the stepwise update rule for the average spectral and energy efficiency while considering MRT, ZF and RZF precoders. IV. D ERIVATIONS FOR D IFFERENT M EASURES As mentioned before, the average spectral efficiency and the average energy efficiency are some common choices for the performance measure. We therefore derive explicitly the stepwise update rule for each of these measures. A. Average Spectral Efficiency B. Regularized Zero Forcing For this performance measure M(ℓ, P |w) is given by K 1 X M(ℓ, P |w) = R(ℓ, P |w) = wk Rk (ℓ, P ). K For RZF precoding, we have (28) k=1 ⋆ Therefore, Θ(ℓ, n , P ) in this case reads K 1 X wk log θk (ℓ, n⋆ , P )φk (ℓ, P ). Θ(ℓ, n⋆ , P ) = K (29) B. Average Energy Efficiency R(ℓ, P |w) M(ℓ, P |w) = E(ℓ, P |w) = Q(ℓ, P ) (30) with Q(ℓ, P ) being defined in (5). Noting that Q(ℓ + 1, P ) = Q(ℓ, P ) + QTx cr (31) the stepwise growth term is found as in (32) on the top of the next page. (41) ∗ with Jℓ (λ) := HT ℓ Hℓ + λ IK . Noting that for any λ Jℓ+1 (λ)−1 = Jℓ (λ)−1 − r(ℓ, n⋆ ; λ)rH (ℓ, n⋆ ; λ), (42) ⋆ For different linear precoders, the terms µ(ℓ, n ), dk (ℓ, n ) and bk (ℓ, n⋆ ) are of different forms. In this section, we derive these terms for the MRT, ZF and RZF precoders. For the sake of compactness, we define the matrix D(ℓ, n⋆ ) ∈ Cℓ×K and the vector b(ℓ, n⋆ ) ∈ CK×1 as ⋆ ⋆ D(ℓ, n ) = [d1 (ℓ, n ), . . . , dK (ℓ, n )] (34a) (43) where we define Jℓ (λ)−1 g(n⋆ ) r(ℓ, n⋆ ; λ) := p 1 + gH (n⋆ )Jℓ (λ)−1 g(n⋆ ) (44) Note that gH (n⋆ )Jℓ (λ)−1 g(n⋆ ) ≥ 0 for any λ, since Jℓ (λ)−1 is a positive semi-definite matrix. Consequently, one can derive the rank-one update for βrzf (ℓ; λ) as D IFFERENT L INEAR P RECODERS ⋆ ⋆ where the factor βrzf (ℓ; λ) reads  −1/2 βrzf (ℓ; λ) = Tr{Jℓ (λ)−2 Jℓ (0)} (40) one utilizes the Sherman-Morrison formula [23] and writes In this case, we have FOR −1 Jℓ+1 (λ) = Jℓ (λ) + g(n⋆ )gH (n⋆ ), k=1 V. D ERIVATIONS ∗ Aℓ = βrzf (ℓ; λ) H∗ℓ HT ℓ Hℓ + λ IK 2 (ℓ βrzf 1 1 = 2 + ∆(ℓ, n⋆ ; λ), + 1; λ) βrzf (ℓ; λ) (45) where ∆(ℓ, n⋆ ; λ) is defined in (33) on the top of the next page with E(ℓ, n⋆ ; λ) ∈ CK×K being defined as E(ℓ, n⋆ ; λ) :=  kr(ℓ, n⋆ ; λ)k2 IK − Jℓ (λ)−1 Jℓ (0) − Jℓ (0)Jℓ (λ)−1 . (46) Consequently, one can conclude that  −1 2 µ(ℓ, n⋆ )= 1 + βrzf (ℓ; λ)∆(ℓ, n⋆ ; λ) (47a) The single-rank updates in (10b) can then be represented as p ∗ ⋆ H ⋆ ⋆ # "p ⋆ D(ℓ, n )=βrzf (ℓ; λ) µ(ℓ, n )Hℓ r(ℓ, n ; λ)r (ℓ, n ; λ) (47b) µ(ℓ, n⋆ )Aℓ + D(ℓ, n⋆ ) s . (35) Aℓ+1 = 2 βrzf (ℓ; λ)µ(ℓ, n⋆ ) T ⋆ ⋆ b (ℓ, n ) r∗ (ℓ, n⋆ ; λ) (47c) b(ℓ, n )= H 1 + g (n⋆ )Jℓ (λ)−1 g(n⋆ ) A. Maximum Ratio Transmission where we further drop λ in the left hand sides of (47a)-(47c) The MRT precoder reads for the sake of compactness. Aℓ = βmrt (ℓ) H∗ℓ (36) C. Zero Forcing   ∗ T −1/2 where βmrt (ℓ) = Tr{Hℓ Hℓ } . Consequently, βmrt (ℓ) is The ZF precoder deduces from RZF precoding by setting updated in each step by λ = 0. In this case, ⋆ ⋆ ⋆ T b(ℓ, n ) = [b1 (ℓ, n ), . . . , bK (ℓ, n )] . (34b) 1 1 ⋆ 2 2 (ℓ + 1) = β 2 (ℓ) + kg(n )k . βmrt mrt (37) From (37), one can show that   Aℓ p 2 (ℓ)kg(n⋆ )k2   1 + βmrt   Aℓ+1 =  .   βmrt (ℓ) gH (n⋆ ) p 2 ⋆ 2 1 + βmrt (ℓ)kg(n )k (38) As a result, it is concluded that D(ℓ, n⋆ ) = 0 and −1  2 µ(ℓ, n⋆ ) = 1 + βmrt (ℓ)kg(n⋆ )k2 p b(ℓ, n⋆ ) = βmrt (ℓ) µ(ℓ, n⋆ ) g∗ (n⋆ ). (39a) (39b) Aℓ = βzf (ℓ) H∗ℓ Jℓ (0)−1 (48) in which βzf (ℓ) = βrzf (ℓ; 0). By setting λ = 0 in the results derived for RZF, we have 1 1 = 2 − kr0 (ℓ, n⋆ )k2 , (49) 2 βzf (ℓ + 1) βrzf (ℓ) where we define r0 (ℓ, n⋆ ) := r(ℓ, n⋆ ; 0). Moreover,  −1 2 µ(ℓ, n⋆ ) = 1 − βzf (ℓ)kr0 (ℓ, n⋆ )k2 p ⋆ D(ℓ, n⋆ ) = βzf (ℓ) µ(ℓ, n⋆ ) H∗ℓ r0 (ℓ, n⋆ )rH 0 (ℓ, n ) s 2 βzf (ℓ)µ(ℓ, n⋆ ) r∗ (ℓ, n⋆ ). b(ℓ, n⋆ ) = H 1 + g (n⋆ )Jℓ (0)−1 g(n⋆ ) 0 (50a) (50b) (50c) " # K 1 1 X ⋆ Tx Θ(ℓ, n , P ) = wk log θk (ℓ, n , P )φk (ℓ, P ) − Qcr E(ℓ, P |w) . Q(ℓ + 1, P ) K ⋆ (32) k=1 ∆(ℓ, n⋆ ; λ) = kr(ℓ, n⋆ ; λ)k2 + rH (ℓ, n⋆ ; λ)E(ℓ, n⋆ ; λ)r(ℓ, n⋆ ; λ) 1 + gH (n⋆ )Jℓ (λ)−1 g(n⋆ ) 0.9 Proposed Algorithm EEavg in [bits/Joule] 0.8 Random TAS with L = L⋆ Random TAS with L = Lmax 0.7 0.6 0.5 0.4 0.3 20 40 60 80 100 120 Lmax Fig. 1: Energy efficiency versus the maximum number of selected antennas Lmax considering N = 128 transmit antennas and K = 4 users. Here, the power constraint is Pmax = 0 dB and the parameters Tx of RF-chains are ξ −1 = 0.4, QRx cr = Qcr = 48 mW and Qsync = 62 mW. As the figure shows, the proposed algorithm significantly outperforms the random TAS approaches with power control. VI. N UMERICAL R ESULTS Throughout the numerical investigations, we have considered independent and identically distributed (i.i.d.) Rayleigh fading channels. Hence, the entries of G are i.i.d. zero-mean and unit-variance complex Gaussian random variables. The system parameters, such as the energy efficiency and number of selected antennas, are then averaged over multiple realizations numerically. Due to the linear computational complexity of the proposed algorithm, Monte-Carlo simulations are feasible even for large dimensions. It is worth moreover to indicate that the optimal search for the dimensions considered here are practically infeasible due to its high computational complexity. For the MRT precoder, we have sketched the average energy efficiency defined as EEavg = E {E(L⋆ , P ⋆ |w)} (51) versus Lmax where L⋆ and P ⋆ are the outputs of Algorithm 1 for the MRT precoder and E(ℓ, P |w). The performance of the proposed algorithm is moreover compared to the performance of random TAS algorithms with power control. Fig. 1 shows the energy efficiency as a function of Lmax for K = 4 users and N = 128 available transmit antennas when K ≤ Lmax ≤ N . The transmit power is considered to be (33) limited by Pmax = 0 dB and the transmit and receive power amplifiers are assumed to have efficiency factor ξ −1 = 0.4. The consumed power at the RF chains and synchronization Rx oscillators are moreover set to be QTx cr = Qcr = 48 mW and Qsync = 62 mW. In this figure, the blue line shows the performance of the proposed algorithm in which the selection subset as well as the transmit power is being iteratively tuned via the stepwise approach. For the sake of comparison, we have also plotted the energy efficiency of two random TAS algorithms with power control. The first random algorithm, whose performance is depicted by the yellow line, selects Lmax out of N transmit antennas and chooses the transmit power such that the energy efficiency is maximized. In the other random approach, shown in the figure with the red line, the number of selected transmit antennas for each Lmax is set to L⋆ in which L⋆ denotes the number of selected antennas via the proposed algorithm and is a function of Lmax . The latter random algorithm then selects L⋆ transmit antennas at random and optimize the energy efficiency with respect to P subject to P ≤ Pmax . As Fig. 1 depicts, the proposed algorithm significantly outperforms the random TAS approaches with power control1 . The figure furthermore shows that even in the case of random selection, the increase in the number of selected antennas does not necessarily improve the performance. In fact for large values of Lmax , the random algorithm with L⋆ < Lmax selected antennas enhances the energy efficiency compared to the random TAS approach with Lmax active transmit antennas. In order to illustrate the latter observation, we have further sketched in Fig. 2 the average number of selected antennas given by the proposed algorithm, i.e., E {L⋆ }, versus Lmax for the setting considered in Fig. 1. As it demonstrates, the algorithm up to Lmax = 23 selects the almost Lmax transmit antennas. Nevertheless, for larger values of Lmax it stops to select more antennas around L⋆ ≈ 24. This means that further growth in the number of selected antennas degrades the energy efficiency of the system. Such an observation is intuitive, due to the fact that the growth in the number of active antennas can both increase the rate and consumed power. In order to observe the latter intuition further, we have plotted the energy efficiency of a modified version of the proposed algorithm, for the setting considered in previous figures, in Fig. 3. In this version of the algorithm, the proposed algorithm is enforced to select exactly Lmax transmit antennas via the 1 Note that when L max grows with N , random selection is a good bound on the performance of several practical TAS algorithms; see [9]. 0.9 120 Proposed Algorithm Upper bound E {L⋆ } = Lmax 0.8 EEavg in [bits/Joule] 100 E {L⋆ } 80 60 40 0.7 0.6 0.5 0.4 20 Proposed Algorithm Random TAS with L = Lmax Stepwise TAS with L = Lmax 0.3 20 40 60 80 100 120 Lmax 20 40 60 80 100 120 Lmax Fig. 2: Average number of active antennas selected via the proposed algorithm versus the maximum number of selected antennas considering N = 128 and K = 4. Here, it is assumed that Pmax = 0 dB, Tx ξ −1 = 0.4, QRx cr = Qcr = 48 mW and Qsync = 62 mW. The figure depicts that the algorithm stops selecting transmit antennas at L⋆ ≈ 24 which is significantly smaller than N . Fig. 3: Energy efficiency versus the maximum number of selected antennas considering the proposed algorithm as well as the modified version of the stepwise approach in which exactly Lmax antennas are selected. The parameters are set similar to those in Fig. 1. As it depicts, the energy efficiency in the modified algorithm is maximized at Lmax = 24 which agrees with the results reported in Fig. 2. stepwise regression method. In fact in this case, the algorithm does not break at L⋆ and uses forward selection to collect a subset of Lmax transmit antennas. As the figure shows, the modified algorithm meets the maximum around Lmax ≈ 24 which agrees with the observation in Fig. 2. At Lmax = N , moreover, it lies on the random TAS since they both select all transmit antennas and optimize the transmit power subject to the energy efficiency. Noting that the proposed algorithm needs L⋆ number of iterations, the result indicates that the complexity is further reduced for Lmax growing with N , since in the large limit L⋆ does not necessarily grow with Lmax . [2] E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, “Massive MIMO for next generation wireless systems,” IEEE Communications Magazine, vol. 52, no. 2, pp. 186–195, 2014. [3] J. Hoydis, S. Ten Brink, and M. Debbah, “Massive MIMO in the UL/DL of cellular networks: How many antennas do we need?” IEEE Journal on selected Areas in Communications, vol. 31, no. 2, pp. 160–171, 2013. [4] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, “Energy and spectral efficiency of very large multiuser MIMO systems,” IEEE Transactions on Communications, vol. 61, no. 4, pp. 1436–1449, 2013. [5] S. Cui, A. J. Goldsmith, and A. Bahai, “Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 22, no. 6, pp. 1089–1098, 2004. [6] A. F. Molisch, M. Z. Win, Y.-S. Choi, and J. H. Winters, “Capacity of MIMO systems with antenna selection,” IEEE Transactions on Wireless Communications, vol. 4, no. 4, pp. 1759–1772, 2005. [7] L. Liang, W. Xu, and X. Dong, “Low-complexity hybrid precoding in massive multiuser MIMO systems,” IEEE Wireless Communications Letters, vol. 3, no. 6, pp. 653–656, 2014. [8] M. Di Renzo, H. Haas, A. Ghrayeb, S. Sugiura, and L. Hanzo, “Spatial modulation for generalized MIMO: Challenges, opportunities, and implementation,” Proceedings of the IEEE, vol. 102, no. 1, pp. 56–103, 2014. [9] A. Bereyhi, M. A. Sedaghat, S. Asaad, and R. R. Müller, “Nonlinear precoders for massive MIMO systems with general constraints,” International ITG Workshop on Smart Antennas (WSA), pp. 1–8, 2017. [10] A. Bereyhi, M. A. Sedaghat, and R. R. Müller, “Asymptotics of nonlinear LSE precoders with applications to transmit antenna selection,” in IEEE International Symposium on Information Theory (ISIT), pp. 81–85, 2017. [11] M. A. Sedaghat, A. Bereyhi, and R. R. Müller, “A new class of nonlinear precoders for hardware efficient massive MIMO systems,” IEEE International Conference on Communications (ICC), pp. 1–7, 2017. [12] M. A. Sedaghat A. Bereyhi, and R. R. Müller, “Least Square Error Precoders for Massive MIMO With Signal Constraints: Fundamental Limits,” IEEE Transactions on Wireless Communications, vol. 17, no. 1, pp. 667–679, 2018. [13] S. Asaad, A. Bereyhi, R. R. Müller, and A. M. Rabiei, “Asymptotics of transmit antenna selection: Impact of multiple receive antennas,” IEEE International Conference on Communications (ICC), pp. 1–6, 2017. [14] Z. Wang and L. Vandendorpe, “Antenna selection for energy efficient MISO systems,” IEEE Communications Letters, 2017. [15] S. Asaad, A. Bereyhi, R. R. Müller, R. F. Schaefer, and A. M. Rabiei, “Optimal number of transmit antennas for secrecy enhancement in mas- VII. C ONCLUSION This paper has proposed a class of iterative algorithms for TAS and transmit power control in downlink massive multiuser MIMO systems with linear precoders. The algorithms follow the approach of stepwise regression methods and enjoy low computational complexity. The results have shown significant gains obtained via the proposed algorithm. It has been also demonstrated that antenna selection, in addition to RF-cost reduction, could enhance the performance in several massive MIMO settings. The derivations given in this paper can be more enlightened by further numerical investigations which will be added in the forthcoming version of the manuscript. Using tools from large-system analysis, the asymptotic outputs of the algorithm can be derived in terms of explicit fixed-point equations. Such investigations are possible extensions of this work and are currently ongoing. R EFERENCES [1] S. Verdú, “Spectral efficiency in the wideband regime,” IEEE Transactions on Information Theory, vol. 48, no. 6, pp. 1319–1343, 2002. [16] [17] [18] [19] [20] [21] [22] [23] sive MIMOME channels,” IEEE Global Communications Conference (GLOBECOM), pp. 1–6, 2017. R. O. Duda, P. E. Hart, and D. G. Stork, Pattern classification. John Wiley & Sons, 2012. J. Han, J. Pei, and M. Kamber, Data mining: concepts and techniques. Elsevier, 2011. A. Gorokhov, D. A. Gore, and A. J. Paulraj, “Receive antenna selection for MIMO spatial multiplexing: Theory and algorithms,” IEEE Transactions on Signal Processing, vol. 51, no. 11, pp. 2796–2807, 2003. M. Gharavi-Alkhansari and A. B. Gershman, “Fast antenna subset selection in MIMO systems,” IEEE Transactions on Signal Processing, vol. 52, no. 2, pp. 339–347, 2004. S. Sanayei and A. Nosratinia, “Capacity maximizing algorithms for joint transmit-receive antenna selection,” in IEEE Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, vol. 2., pp. 1773–1776, 2004. X. Zhou, B. Bai, and W. Chen, “An iterative algorithm for joint antenna selection and power adaptation in energy efficient MIMO,” in IEEE International Conference on Communications (ICC), pp. 3812–3816, 2014. G. Caire, N. Jindal, M. Kobayashi, and N. Ravindran, “Multiuser MIMO achievable rates with downlink training and channel state feedback,” IEEE Transactions on Information Theory, vol. 56, no. 6, pp. 2845– 2866, 2010. M. S. Bartlett, “An inverse matrix adjustment arising in discriminant analysis,” The Annals of Mathematical Statistics, vol. 22, no. 1, pp. 107–111, 1951.
7cs.IT
1 Gray Box Identification of State-Space Models Using Difference of Convex Programming arXiv:1611.04359v1 [cs.SY] 14 Nov 2016 Chengpu Yu, Lennart Ljung and Michel Verhaegen Abstract—Gray-box identification is prevalent in modeling physical and networked systems. However, due to the nonconvex nature of the gray-box identification problem, good initial parameter estimates are crucial for a successful application. In this paper, a new identification method is proposed by exploiting the low-rank and structured Hankel matrix of impulse response. This identification problem is recasted into a difference-of-convex programming problem, which is then solved by the sequential convex programming approach with the associated initialization obtained by nuclear-norm optimization. The presented method aims to achieve the maximum impulse-response fitting while not requiring additional (non-convex) conditions to secure nonsingularity of the similarity transformation relating the given state-space matrices to the gray-box parameterized ones. This overcomes a persistent shortcoming in a number of recent contributions on this topic, and the new method can be applied for the structured state-space realization even if the involved system parameters are unidentifiable. The method can be used both for directly estimating the gray-box parameters and for providing initial parameter estimates for further iterative search in a conventional gray-box identification setup. Index Terms—Structured state-space model, convex-concave procedure, nuclear-norm optimization. I. I NTRODUCTION Nowadays, the control and identification of structured statespace system model have attracted great attention in the control community. There are two main sources of structured statespace models: the modeling of practical physical systems [1]– [3] and the description of networked systems [4], [5]. When modeling physical systems, the non-zero entries of the system matrices always have physical meanings such as masses, velocity, acceleration, and so on. Identification of the physical parameters can provide us a better understanding of the inner physical mechanism of the investigated object. On the other hand, a network connected system often can be represented as a structured system with the structure straightforwardly determined by the interconnections among the involved subsystems. Identification of such kind of structured system models provides the foundation for the model-based network control. In the literature, there are two kinds of methods to identify structured state-space models. One is the traditional graybox set-up, to identify the parameterized state-space models C. Yu and M. Verhaegen are with the Delft Center for Systems and Control, Delft University, Delft 2628CD, Netherlands ([email protected], [email protected]) L. Ljung is with the Division of Automatic Control, Department of Electrical Engineering, Linkoping University, Sweden ([email protected]) This work is sponsored by the European Research Council, Advanced Grant Agreement No. 339681. directly from the input-output (IO) data using the predictionerror method [2], [3]. Since the involved identification problem is always a non-convex optimization problem, the conventional nonlinear optimization methods, such as regularized GaussNewton method [2, Section 10.2], and the gradient project method [3, Chapter 7], are sensitive to the initial parameter estimate. This traditional setup thus requires reasonable knowledge of the parameters and structures to be identified. Since the gray box situation starts from some physical insight, this knowledge may be sufficient in some cases, but too demanding in other. Resorting to testing random initial parameters may not be feasible for large problems. The other approach to structured state-space models is to first estimate an unstructured, black-box model using, e.g., subspace identification methods, followed by the recovery of the physical parameters embedded in the concerned structured model. Using the classical subspace identification methods, such as MOESP and N4SID [2], [3], the system matrices in the first step can be consistently estimated under some mild conditions. The parameter recovery in the second step turns out to be a small-scale bilinear optimization problem. To solve the bilinear optimization problem involved with the gray-box identification, an alternating minimization algorithm was developed in [6] and a null-space based method was proposed in [7]. In order to prevent the singular similarity transformation, a non-smooth optimization approach was presented in [8]. Furthermore, in order to avoid estimating the similarity transformation, an H∞ -norm-based identification algorithm was proposed in [9]. The above mentioned algorithms are sensitive to initial conditions. To cope with this problem, the bilinear optimization problem was reformulated into a sumof-squares of polynomials which is then solved by the semidefinite programming method [10]; however, this technique is limited to solving small-scale problems having only a few unknown variables. In this paper, a difference-of-convex programming (DCP) based method is developed for the identification of structured state-space models. This approach estimates the system parameters by the structured factorization of a block Hankel matrix of system impulse response, which is inspired by the Ho-Kalman decomposition method [3]. More explicitly, the proposed method boils down to solving a low-rank structured matrix factorization problem. In this paper, this non-convex optimization problem is transformed into a difference-ofconvex programming (DCP) problem which is then tackled by the sequential convex programming technique [11]. The advantages of the proposed method against many recently developed methods are as follows. Different from the 2 identification method in [8], the proposed algorithm framework avoids the non-singularity constraint on the similarity transformation and can be applied to the realization of nonidentifiable gray-box models. Unlike the model-matching H∞ method [9] which requires to solve an infinite-dimensional optimization problem, the proposed identification method is finite-dimensional so that it is more computational amenable. Moreover, compared with other gradient-based or alternating minimization methods [3], [6], the proposed identification method performs well in practice thanks to the high-quality initial conditions obtained by solving the convexified low-rank and structured matrix factorization problem. The rest of the paper is organized as follows. Section II formulates the identification problem of gray-box models. Section III reviews the gray-box identification using the classical prediction-error method. Section IV gives an alternative way for the gray box identification, which is to identify the black-box model first, following the identification of system parameters by solving a bilinear optimization problem. Section V provides a new method for solving the bilinear optimization problem. Section VI demonstrates the performance of the proposed identification method, followed by some conclusions in Section VII. II. P ROBLEM STATEMENT We consider a parameterized state-space model as follows ẋ(t) = A(θ)x(t) + B(θ)u(t) y(kT ) = C(θ)x(kT ) + w(kT ), (1) where u(t) ∈ Rm , x(t) ∈ Rn , y(t) ∈ Rp and w(k) ∈ Rp are system input, state, output, and measurement noise, respectively; θ ∈ Rl is the parameter vector; t and k represent continuous and discrete time indices, respectively; T is the sampling period. The parameter vector θ in (1) typically represents unknown values of physical coefficients. Here, we assume that the structured system matrices are affine with respect to θ, i.e. A(θ) = A0 + B(θ) = B0 + C(θ) = C0 + l X i=1 l X i=1 l X Ai θi H(q, θ) = C(θ) (qI − AT (θ)) −1 BT (θ), (3) where AT = e A(θ)T , BT = Z T eA(θ)τ B(θ)dτ. τ =0 Given the sampled IO data {u(kT ), y(kT )} for k = 0, 1, · · · that are generated from model (1) for a certain value θ∗ , the concerned gray-box identification problem is to estimate the parameter vector θ∗ from the measured IO data. To address the concerned identification problem, the following assumptions are made throughout the paper. A1 The system in (1) is minimal; A2 The magnitudes of the imaginary parts of the eigenvalues of A(θ) are less than the Nyquist frequency Tπ . A3 The input sequence u(kT ) is persistently exciting of any finite order [2, Chapter 13]; A4 The measurement noise w(t) is uncorrelated with the system input u(t). Assumption A2 ensures that the corresponding discrete-time model of (1) is minimal when Assumption A1 is satisfied [12]. Assumptions A3-A4 are standard assumptions for the consistent identification of the discrete-time system model H(q, θ). III. G RAY- BOX APPROACH The estimation of the parameter vector θ∗ using the sampled IO data {u(kT ), y(kT )} is typically a gray-box identification problem. The traditional identification method is the prediction-error method [2] in which the predicted or simulated outputs ŷ(kT |θ) are computed using the discretetime model H(q, θ) for any θ. The corresponding prediction error criterion is written as N −1 1 X ky(kT ) − ŷ(kT |θ)k2 min θ N k=0 s.t. x̂(kT + T ) = AT (θ)x̂(kT ) + BT (θ)u(kT ) ŷ(kT |θ) = C(θ)x̂(kT ) + w(kT ) for k = 0, 1, · · · , N − 1. (4) Bi θi Ci θi , i=1 where the coefficient matrices Ai , Bi and Ci are known. Besides the structures of the system matrices, the system order of (1) is known as a priori knowledge as well. Denote the corresponding true continuous-time transfer function by: G(s, θ) = C(θ) (sI − A(θ))−1 B(θ). period T . Denoting the discrete-time system, obtained by the sampling period T with the system input u(t) being piecewise constant between the sampling instants kT , as (2) Although state-evolution equation in (1) is continuous, we can only obtain sampled IO data in practice with sampling This general method has the best possible asymptotic accuracy, but the main drawback is that the optimization problem is (highly) non-convex and may have many local minima. The gradient-based optimization algorithms such as Gauss-Newton method [2, Section 10.2], and gradient projection method [3, Chapter 7] can be used to solve (4). However, the performance mainly relies on the selection of initial parameter estimate. The gray-box structure information may be sufficient to provide such initial estimates that are in the domain of attraction of the global minimum but otherwise one may have to resort to random initial parameters. It is shown in [10] that the chances to reach the global minimum of (4) from random starting points may be very slim for problems of realistic sizes. 3 IV. B LACK - BOX + A LGEBRAIC A PPROACH Besides the gray-box approach, there exist other routes to estimate the parameter vector θ∗ from the sampled IO data. Even though the gray-box approach may end up in local minima, it is still possible to find the true system from data by a black-box approach. Subspace approaches like N4SID and MOESP [2], [3] can, under mild conditions, obtain the true discrete-time system H(q, θ∗ ) as the length of the IO data tends to infinity. That discrete-time system can be easily transformed to continuous-time using the zero-order hold interpolation approach [13]. As a result, the continuous-time transfer function G(s, θ∗ ) will be known, but in an unknown state-space basis: G(s, θ∗ ) = C ∗ (sI − A∗ )−1 B ∗ . (5) The identification problem has now been transformed to an algebraic problem: Given the values of A∗ , B ∗ , C ∗ , determine the parameter vector θ satisfying C ∗ (sI − A∗ )−1 B ∗ = C(θ)(sI − A(θ))−1 B(θ). (6) The estimate of θ obtained in this way can then be used as initial estimate in the minimization of (4). This approach was discussed in [6], [8], [10]. V. S OLVING THE A LGEBRAIC A. Using Similarity Transformation Equation (6) means that there exists a similarity transformation Q such that QB ∗ = B(θ), C ∗ = C(θ)Q. (7) V (Q, θ) = kQA∗ − A(θ)Qk2F + kQB ∗ − B(θ)k2F + kC ∗ − C(θ)Qk2F (8) The optimization problem in (8) is a bilinear estimation problem and an alternating minimization method was proposed in [6]. In [10], the optimization problem in (8) was minimized by a convex sum-of-squares method in case A(θ), B(θ), C(θ) are affine in θ; however, this method is limited to solving small-scale problems having only rather few unknown variables. M(θ) can be equivalently written in a  Another way to deal with the possible mismatch between equations (6) and (7) is to minimize the model-matching criterion kG(s, θ) − G(s, θ∗ )k using either H2 norm or H∞ norm, as suggested in [10]. The H∞ -norm based modelmatching method has been investigated in [9]. Compared with the minimization of (8), the H∞ -norm based model-matching method reduces the number of unknown variables but at the price of the introduction of a semi-infinite and non-smooth program [9]. B. Using the Hankel Matrix of Impulse Response In this section, aiming at dealing with the possible drawback of minimizing equation (8), a new identification approach is developed by exploiting the structured and low-rank factorization of the block Hankel matrix of impulse response. After obtaining a full-parameterized state-space realization G(s, θ∗ ) = C ∗ (sI − A∗ )−1 B ∗ , we can obtain the associated impulse response sequence denoted by Mi (θ∗ ) = C(θ∗ )Ai (θ∗ )B(θ∗ ) = C ∗ (A∗ )i B ∗ From that we can form the criterion The equation group in (7) vector form:  (A∗ )T ⊗ I − I ⊗ A(θ)  (B ∗ )T ⊗ I I ⊗ C(θ) {z | Even if we can find a global optimal solution (Q⋆ , θ⋆ ) by one of the above mentioned methods, it might not be meaningful for the identification purpose stated in Section II. The reason for this is that the optimal solution Q⋆ might be singular and the obtained transfer function C ⋆ (sI − A⋆ )−1 B ⋆ might not be equal to C ∗ (sI − A∗ )−1 B ∗ . In fact, equations (6) and (7) are equivalent if and only if Q is nonsingular [15]. To deal with this problem, a condition-number constraint on Q was considered in [8], which turns out to be a non-smooth and highly non-convex optimization problem. PROBLEM To solve the algebraic problem in (6), two routes are provided here: one is the similarity transformation of the statespace realization and the other is the low-rank and structured factorization of the block Hankel matrix of impulse response. QA∗ = A(θ)Q, To solve the above bilinear equation, a gradient projection method was given in [3, Chapter 7.5.4], a null-space-based optimization method was developed in [7] and a differenceof-convex based method was proposed in [14].   0  vec(Q) =  vec(B(θ))  . vec(C ∗ ) } {z } | N (θ) (9) for i = 0, 1, · · · . Let Hv,h (θ∗ ) be constructed by Markov parameters  M0 (θ∗ ) M1 (θ∗ )  M1 (θ∗ ) M2 (θ∗ )  Hv,h (θ∗ ) =  .. ..  . . Mv−1 (θ∗ ) Mv (θ∗ ) a block Hankel matrix ··· ··· . .. Mh−1 (θ∗ ) Mh (θ∗ ) .. . ··· Mv+h−2 (θ∗ )    ,  (10) where the subscripts v, h, satisfying v, h ≥ n, denote the number of block rows and number of block columns, respectively. Given the block Hankel matrix Hv,h (θ∗ ), the concerned graybox identification problem is formulated as min kHv,h (θ∗ ) − Hv,h (θ)k2F θ  C(θ)B(θ)  .. s.t. Hv,h (θ) =  . C(θ)Av−1 (θ)B(θ) ··· . .. ··· C(θ)Ah−1 (θ)B(θ) .. . C(θ)Av+h−2 (θ)B(θ) (11)   . 4 In the above equation, the block Hankel matrix Hv,h (θ) has a low-rank factorization as   C(θ)  C(θ)A(θ)    Hv,h (θ) =   ..   . C(θ)Av−1 (θ) {z } | Ov (θ) ×  B(θ) A(θ)B(θ) | ··· {z Ch (θ)  Ah−1 (θ)B(θ) , } (12) where Ov (θ) and Ch (θ) denote the extended observability and controllability matrix, respectively. Denote Y = Hv,h (θ∗ ). By exploiting the shift properties embedded in extended observability and controllability matrices, the optimization problem (11) can be recasted into a low-rank structured matrix factorization problem: min θ,Ov ,Ch ,X kY − Xk2F s.t. X = Ov Ch Ov (1 : p, :) = C(θ) Ch (:, 1 : m) = B(θ) (13) Ov (1 : (v − 1)p, :) A(θ) = Ov (p + 1 : vp, :) A(θ)Ch (:, 1 : (h − 1)m) = Ch (:, m + 1 : hm) . Step 1: The first constraint, X = Ov Ch , in (13) can be equivalently written as a rank constraint. Lemma 1: [16] The bilinear equation X = Ov Ch is equivalent to the rank constraint   X Ov = n. (14) rank Ch In The equivalent rank constraints for the last two constraints of (13) are derived below. To simplify the notation, we denote Ōv = Ov (1 : (v − 1)p, :), Ov = Ov (p + 1 : vp, :) and C¯h = Ch (:, 1 : (h − 1)m), C h = Ch (:, m + 1 : hm). The last two constraints can be represented as q X i=1 A0 C¯h + q X i=1  Ōv θi Ai = Ov  Ai C¯h θi = C h . Ōv A0 + A0 C¯h +  q X i=1 q X Γi Ai = Ov Ai Υi = C h (15) An equivalent form of the combination of the fourth and fifth constraints is given in the following lemma. (16) i=1 1 θ1 ··· rank  vec(Ōv ) vec(Γ1 ) · · · vec(C¯h ) vec(Υ1 ) · · ·  θq vec(Γq )  = 1. vec(Υq ) Proof: To prove the lemma, it is sufficient to prove that the variables in (15) and those in (16) are one-to-one mapping. On the one hand, the variables in (16) can be uniquely determined from those in (15) by assigning Γi = Ōv θi and Υi = C¯h θi . On the other hand, the variables in (15) can be uniquely determined by the SVD decomposition of the matrix on the left-hand side of the following equation # # " " 1 vec(Ōv ) vec(C¯h ) θ1 vec(Γ1 ) vec(Υ1 ) ··· ··· ··· θq vec(Γq ) vec(Υq ) = 1 vec(Ōv ) vec(C¯h ) [ 1 θT ] . By Lemmas 1 and 2, the bilinear optimization problem in (13) can be equivalently formulated as a rank-constrained optimization problem as follows: min  X s.t. rank Ch θ,Ov ,Ch ,X,Γ,Υ In the above optimization problem, the first and the last two constraints in the above equation are bilinear. To solve this problem, the DCP-based identification framework [14] will be adopted, which contains the following three steps: (i) the bilinear optimization problem is transformed into a rank constrained optimization problem; (ii) the rank constrained problem is recasted into a DCP problem; (iii) the DCP problem is then solved using the sequential convex programming technique. Ōv A0 + Lemma 2: The constraint equation (15) is equivalent to kY − Xk2F  Ov =n In Ov (1 : p, :) = C(θ) Ch (:, 1 : m) = B(θ) q X Γi Ai = Ov Ōv A0 + (17) i=1 Ōv = Ov (1 : (v − 1)p, :), O v = Ov (p + 1 : vp, :) q X ¯ Ai Υi = C h A0 Ch + i=1 C¯h = Ch (:, 1 : (h − 1)m), C h = Ch (:, m + 1 : hm)   1 θ1 ··· θq rank  vec(Ōv ) vec(Γ1 ) · · · vec(Γq )  = 1. vec(C¯h ) vec(Υ1 ) · · · vec(Υq ) The above optimization contains two rank constraints. To deal with the above rank constrained optimization, we shall further formulate it as a difference of convex optimization problem. Step 2: For notational simplicity, we denote   1 θ1 ··· θq T =  vec(Ōv ) vec(Γ1 ) · · · vec(Γq )  . vec(C¯h ) vec(Υ1 ) · · · vec(Υq ) Let σi (T ) be the i-th largest singular value of T for i = 1, · · · , q + 1. Define fκ (T ) = κ X i=1 σi (T ) . 5 It is remarked that fκ (·) is a Ky Fan κ-norm, which is a convex function [17]. Inspired by the truncated nuclear norm method in [14], [18], the rank constraint rank (T ) = 1 can be replaced by fq+1 (T ) − f1 (T ) = 0. (18) The above equation means that all the singular values except the largest one of T are zero. Since fq+1 (T ) = kT k∗, the above equation can be represented as kT k∗ − f1 (T ) = 0. Using the above strategy, instead of directly solving the rank constrained optimization problem in (17), we try to solve the following regularized optimization problem: min θ,Ov ,Ch ,X,Γ,Υ Based on the linearizations in (22) and (24), the convex optimization problem to be solved at the (j + 1)-th iteration is as follows:    kY − Xk2F + λ1 kΓk∗ − tr U1j,T ΓV1j θ,Ov ,Ch ,X,Γ,Υ      j + λ2 kT k∗ − tr Lj,T + ρ kΓ − Γj k2F + kT − T j k2F 1 T R1   X Ov s.t. Γ = Ch In + λ2 (kT k∗ − f1 (T ))   X Ov s.t. Γ = Ch In i=1 where Lj1 and R1j are respectively the left and right singular vectors corresponding to the largest singular value. Then, the linearization of f1 (T ) at the point T = T j is   j j T − T R1 . (24) f1 (T ) ≈ f1 (T j ) + tr Lj,T 1 min kY − Xk2F + λ1 (kΓk∗ − fn (Γ)) Ov (1 : p, :) = C(θ) Ch (:, 1 : m) = B(θ) q X Ōv A0 + Γi A i = O v Let T j be the estimate of T at the j-th iteration and its SVD decomposition be given as    j,T   j  Σj1 R1 j j T = L1 L2 , (23) j Σ2 R2j,T (19) Ōv = Ov (1 : (v − 1)p, :), O v = Ov (p + 1 : vp, :) q X A0 C¯h + A i Υi = C h i=1 C¯h = Ch (:, 1 : (h − 1)m), C h = Ch (:, m + 1 : hm)   1 θ1 ··· θq T =  vec(Ōv ) vec(Γ1 ) · · · vec(Γq )  , vec(C̄h ) vec(Υ1 ) · · · vec(Υq ) where λ1 , λ2 are regularization parameters. It is remarked that all the constraints in (19) are linear functions with respect to the unknown variables and the objective function is a difference-of-convex function. Although the formulations (17) and (19) may not be strictly equivalent, they have the same global optimum. Step 3: We shall develop a sequential convex programming method to solve the DC optimization problem in (19). In order to develop a sequential convex programming method, it is essential to linearize the concave terms in the objective function of (19). Let Γj be the estimate of Γ at the j-th iteration and its SVD decomposition be given as    j,T   S1j  j V1 j j , (20) Γ = U1 U2 S2j V2j,T where U1j and V1j are respectively the left and right singular vectors corresponding to the largest n singular values. It can be established that [17]  (21) U1j V1j,T ∈ ∂fn Γj . Then, the linearization of fn (Γ) at the point Γ = Γj is    (22) fn (Γ) ≈ fn (Γj ) + tr U1j,T Γ − Γj V1j . Ov (1 : p, :) = C(θ) Ch (:, 1 : m) = B(θ) q X Ōv A0 + Γi A i = O v i=1 Ōv = Ov (1 : (v − 1)p, :), Ov = Ov (p + 1 : vp, :) q X A0 C¯h + A i Υi = C h i=1 C¯h = Ch (:, 1 : (h − 1)m), C h = Ch (:, m + 1 : hm)   1 θ1 ··· θq T =  vec(Ōv ) vec(Γ1 ) · · · vec(Γq )  , vec(C̄h ) vec(Υ1 ) · · · vec(Υq ) (25) where ρ is a very small positive regularization parameter and  the proximal term ρ kΓ − Γj k2F + kT − T j k2F is added to ensure the convergence of the sequential convex programming approach, as shown in Lemma 3. To ease the reference, the above sequential convex programming procedure is summarized in Algorithm 1. Algorithm 1 Sequential convex programming method for (19) 1) Set Γ0 = 0 and T 0 = 0. 2) Repeat 2-1): Compute respectively the left and right singular vectors of Γj and T j as shown in (20) and (23). 2-2): Obtain the estimates Γj+1 and T j+1 by solving (25). 3) until kθ j+1 −θ j k2 kθ j k2 ≤ ε with ε a small value. By applying the iterative optimization method in Algorithm 1, the convergence is guaranteed. Lemma 3: For the difference-of-convex optimization problem in (19), by implementing Algorithm 1,  the obtained estimate θj satisfies that limj→∞ θj+1 − θj = 0. Any accumulation point of {θj } is a stationary point of (19). The above lemma can be proven by the results of Theorems 1-2 in [19]. 6 Since the difference-of-convex optimization problem in (19) is still non-convex, the performance of the provided sequential convex programming procedure relies on the initial conditions. However, by setting T 0 = 0 and Γ0 = 0, we can find that the optimization problem in (19) is a nuclear-norm relaxation of the rank-constrained optimization problem in (17). Due to the fact that the nuclear norm is the convex envelope of the low-rank constraint on the unit spectral norm ball [20], the associated nuclear-norm optimization usually yields a good candidate for the starting point of the sequential convex programming procedure. 100 90 80 Success rate (%) 70 60 50 40 30 PEM Algorithm 1 DCP 20 10 0 1 2 3 In this section, two simulation examples will be carried out to demonstrate the performance of the proposed method - Algorithm 1. For comparison purposes, the prediction-error method (PEM) [2], [10] and the difference-of-convex programming (DCP) method [14] are simulated. The implementation details of these three methods are given below. 1) Algorithm 1 is simulated by empirically setting the regularization parameters in (25) to λ1 = 10−4 , λ2 = 10−5 and ρ = 10−10 . The tolerance of relative error is set to ǫ = 10−4 . 2) PEM is simulated by firstly configuring the structure object using the Matlab command idgrey, see [21] and then implementing the identification method using the Matlab command pem. The initial conditions are randomly generated following the standard Gaussian distribution. 3) DCP is simulated by setting the regularization parameter λ in equation (17) of [14] to λ = 10−4 . The tolerance of relative error is set to 10−4 . In the simulations, the maximum number of iterations for the these three methods is set to 100. A. Randomly generated structures The first simulation example is conducted following the way in [10]. The state-space model of (1) is randomly generated by the Matlab command rss, and the system parameters to be estimated are randomly picked from the generated models. Since the system model is randomly generated, it is difficult to find a unified sampling period for all systems. Therefore, when simulating DCP and Algorithm 1, the system matrices A∗ , B ∗ and C ∗ in (6) are assumed to be known. To ensure the identifiability of the system parameters, the number of unknown parameters cannot be larger than (p + m)n; however, system parameters less than (p + m)n may not always be identifiable [2], [3]. Therefore, we use the impulseresponse fitting to measure the identification performance. In the simulation, we choose the system order n = 5 and the input/output dimension m = p = 1. For each fixed number of free parameters, we carry out 100 Monte-Carlo trials by randomly generating the system model and randomly picking a fixed number of free parameters. The success rate is obtained by counting the number of successful trials using the criterion IRFr ≤ 10−3 . Denote by θr the estimate of θ at the r-th 4 5 6 7 8 9 10 Number of free parameters VI. N UMERICAL S IMULATIONS Fig. 1. Example 1: identification performance of PEM, DCP and Algorithm 1. Monte-Carlo trial. The impulse-response fitting (IRF) of the r-th Monte-Carlo trial is defined as Pv+h−2 kC(θr )Ai (θr )B(θr ) − C ∗ (A∗ )i B ∗ kF , IRFr = i=0 Pv+h−2 kC ∗ (A∗ )i B ∗ kF i=0 (26) where the dimension parameters v and h are defined in (10). The identification performance of PEM, DCP and Algorithm 1 is shown in Fig. 1 from which we can draw the following conclusions. 1) When the number of parameters is larger than 3, DCP and Algorithm 1 perform much better than PEM. This is because DCP and Algorithm 1 can find good initializations by nuclear-norm regularized optimization. In contrast, when the number of parameters are less than or equal to 3, PEM has a slightly better performance than DCP and Algorithm 1. This might be relevant to the selection of the regularization parameters of DCP and Algorithm 1. 2) When the number of parameters is larger than 6, the success rate of Algorithm 1 is higher than that of DCP up to 20%. This might be caused by the fact that DCP does not consider the non-singularity constraint of the similarity transformation, while Algorithm 1 implicitly guarantees the non-singularity of the similarity transformation. However, when the number of parameters is less than or equal to 6, DCP and Algorithm 1 have similar performance. This might be because, when the number of free parameters becomes smaller, singular similarity transformations are less likely to occur. B. Compartmental structures The second simulation example is to identify the compartmental structure having the following form [4]  −θ 1   θ1   A(θ) =     B=  0 0 θ2 −(θ2 + θ3 ) .. . ··· 0 1 T .. . .. . .. . ,  .. . −(θ2n−4 + θ2n−3 ) θ2n−3  0 0 ··· C = θ2n−2 −θ2n−2  0 1 .         (27) 7 100 90 80 PEM Algorithm 1 DCP Success rate (%) 70 60 50 40 30 20 10 0 3 3.5 4 4.5 5 5.5 6 6.5 7 Number of free parameters Fig. 2. Example 2: identification performance of PEM, DCP and Algorithm 1. For each fixed system order, 100 Monte-Carlo trials are carried out by randomly generating the system parameters. The success rate is obtained by counting the number of successful trials using the criterion IRFr ≤ 10−3 . Fig. 2 shows the identification performance of three investigated methods in terms of IRF. It can be found that the success rates of Algorithm 1 stay around 90% for different system orders, which demonstrates the better performance of Algorithm 1 with relation to DCP and PEM. This can be explained by that Algorithm 1 can obtain good initializations and guarantee the non-singularity of the similarity transformation. VII. C ONCLUSIONS In this paper, we have proposed a new gray-box identification method by exploiting the low-rank and structured factorization of the Hankel matrix of impulse response. This method uses the system impulse-response fitting as the objective function while avoiding the explicit non-singularity constraint on similarity transformation; thus, it can be applied to the state-space realizations of non-identifiable gray-box models. Compared with the classical prediction-error method initialized at random parameter values, the proposed method can yield better performance since it can find a good initialization by nuclear-norm based optimization. Although the proposed identification algorithm demonstrates good performance in terms of system impulse-response fitting, its computational complexity is higher than the classical prediction-error method. Thus, investigation will be made in our future work on improving the computational efficiency of the proposed identification method. R EFERENCES [1] R. C. Dorf and R. H. Bishop, Modern control systems. Pearson, 2011. [2] L. Ljung, System Identification: Theory for the User. Pearson Education, 1999. [3] M. Verhaegen and V. Verdult, Filtering and System Identification: A Least Squares Approach. Cambridge University Press, 2007. [4] R. Bellman and K. J. Åström, “On structural identifiability,” Mathematical biosciences, vol. 7, no. 3, pp. 329–339, 1970. [5] J. Van den Hof, “Structural identifiability of linear compartmental systems,” Automatic Control, IEEE Transactions on, vol. 43, no. 6, pp. 800–818, 1998. [6] L.-L. Xie and L. Ljung, “Estimate physical parameters by black box modeling,” in Proceedings of the 21st Chinese Control Conference, pp. 673–677, 2002. [7] O. Prot, G. Mercère, and J. Ramos, “A null-space-based technique for the estimation of linear-time invariant structured state-space representations,” in Proceedings of the IFAC Symposium on System Identification, 2012. [8] G. Mercere, O. Prot, and J. Ramos, “Identification of parameterized gray-box state-space systems: From a black-box linear time-invariant representation to a structured one,” Automatic Control, IEEE Transactions on, vol. 59, pp. 2873–2885, Nov 2014. [9] D. Vizer, G. Mercre, O. Prot, and E. Laroche, “h∞ -norm-based optimization for the identification of gray-box lti state-space model parameters,” Systems & Control Letters, vol. 92, pp. 34 – 41, 2016. [10] L. Ljung and P. Parrilo, “Initialization of physical parameter estimates,” 2003. [11] S. Boyd, “Sequential convex programming,” Lecture Notes, Stanford University, 2008. [12] T. Chen and B. Francis, Optimal Sampled-Data Control Systems. Communications and Control Engineering, Springer London, 1994. [13] G. F. Franklin, J. D. Powell, and M. L. Workman, Digital control of dynamic systems, vol. 3. Addison-wesley Menlo Park, 1998. [14] C. Yu, M. Verhaegen, S. Kovalsky, and R. Basri, “Identification of structured lti mimo state-space models,” arXiv preprint arXiv:1509.08692, 2015. [15] T. Kailath, Linear systems, vol. 1. Prentice-Hall Englewood Cliffs, NJ, 1980. [16] R. Doelman and M. Verhaegen, “Sequential convex relaxation for convex optimization with bilinear matrix equalities,” in 2016 European Control Conference, 2016. [17] L. Qi and R. S. Womersley, “On extreme singular values of matrix valued functions,” Journal of Convex Analysis, vol. 3, pp. 153–166, 1996. [18] Y. Hu, D. Zhang, J. Ye, X. Li, and X. He, “Fast and accurate matrix completion via truncated nuclear norm regularization,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 35, no. 9, pp. 2117–2130, 2013. [19] C. Lu, J. Tang, S. Yan, and Z. Lin, “Nonconvex nonsmooth low rank minimization via iteratively reweighted nuclear norm,” IEEE Transactions on Image Processing, vol. 25, no. 2, pp. 829–839, 2016. [20] B. Recht, M. Fazel, and P. A. Parrilo, “Guaranteed minimum-rank solutions of linear matrix equations via nuclear norm minimization,” SIAM review, vol. 52, no. 3, pp. 471–501, 2010. [21] L. Ljung, The System Identification Toolbox: The Manual. Natick, MA, USA: The MathWorks Inc. 1st edition 1986, Edition 8.3 2013, 2013.
3cs.SY
On the Weighted Quartet Consensus problem∗ Manuel Lafond1 and Celine Scornavacca2 1 Department of Mathematics and Statistics, University of Ottawa, 585 King Edward Ave., K1N 6N5 Ottawa, Canada [email protected] Institut des Sciences de l’Evolution – Université Montpellier, CNRS, IRD, EPHE, Place Eugène Bataillon, 34095 Montpellier, France [email protected] 2 arXiv:1610.00505v2 [cs.DS] 10 May 2017 Abstract In phylogenetics, the consensus problem consists in summarizing a set of phylogenetic trees that all classify the same set of species into a single tree. Several definitions of consensus exist in the literature; in this paper we focus on the Weighted Quartet Consensus problem, a problem with unknown complexity status so far. Here we prove that the Weighted Quartet Consensus problem is NP-hard and we give a 1/2-factor approximation for this problem. During the process, we propose a derandomization procedure of a previously known randomized 1/3factor approximation. We also investigate the fixed-parameter tractability of this problem. 1998 ACM Subject Classification F.2.2 G.2.1 G.2.2 Keywords and phrases Phylogenetic tree, consensus tree, quartets, complexity, fixed-parameter tractability, approximability. Digital Object Identifier 10.4230/LIPIcs.CPM.2017.23 1 Introduction Phylogenetics is the branch of biology that studies evolutionary relationships among different species. These relationships are represented via phylogenetic trees – acyclic connected graphs with leaves labeled by species – which are reconstructed from molecular and morphological data [12]. One fundamental problem in phylogenetics is to summarize the information contained in a set of unrooted trees T classifying the same set of species into a single tree T . The set T can consist of optimal trees for a single data set, of trees issued from a bootstrap analysis of a unique data set, or even of trees issued from the analysis of different data sets. Several consensus methods have been proposed in the past, the probably most known are the strict consensus [23, 18] and the majority-rule consensus [17, 3]. For a survey, see [7]. In this paper we focus on the Weighted Quartet Consensus (WQC) problem [19], also called the Median Tree with Respect to Quartet Distance problem [2] and Quartet Consensus problem in [16]. Roughly speaking, this problem consists in finding a consensus tree maximizing the weights of the 4-leaf trees – quartets – it displays, where the weight of a quartet is defined as its frequency in the set of input trees (for a more formal definition, see next section). More general versions of this problem, where the input trees are allowed to have missing species or where the weight of a quartet is not defined w.r.t. a set of trees, are known to be ∗ This work was partially supported by the Natural Sciences and Engineering Research Council of Canada (NSERC) and the Mitacs Globalink Campus France program. © Manuel Lafond and Celine Scornavacca; licensed under Creative Commons License CC-BY 28th Annual Symposium on Combinatorial Pattern Matching (CPM 2017). Editors: Juha Kärkkäinen, Jakub Radoszewski, and Wojciech Rytter; Article No. 23; pp. 23:1–23:18 Leibniz International Proceedings in Informatics Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany 23:2 On the Weighted Quartet Consensus problem NP-hard [24] (and in fact, even Max-SNP-Hard), but the complexity of the WQC problem has remained open so far. This problem has been conjectured to be NP-hard [2, 19], and heuristics have recently been implemented and widely used, for instance ASTRAL [20], which is a practical implementation of Bryant and Steel’s work from[8] (in fact, we show that the ASTRAL algorithm is a 2-approximation for the minimization version of WQC). So far, the best known approximation algorithm for the WQC problem consists in choosing a random tree as a solution [16]. This tree is expected to contain a third of the quartets from the input trees, and so it is a randomized factor 1/3 approximation. In [2], the minimization version of the problem is studied, where the objective is to find a median tree T minimizing the sum of quartet distances between T and the input trees (the quartet distance between two trees T1 and T2 is defined as the number of quartets in T1 that are not in T2 ). A 2-approximation algorithm is given, based on the fact that the quartet distance is a metric [9, 2]. A related problem that has received more attention is the Complete Maximum Quartet Compatibility problem (CMQC) (see [5, 4, 16, 14, 25, 26, 10, 21, 22]). In the CMQC problem, we are given, for each set S of four species, exactly one quartet on S, and the objective is to find a tree containing a maximum number of quartets from the input. This can be seen as a version of WQC in which each set of four species has one quartet of weight 1, and the others have weight 0. The CMQC and WQC are however fundamentally different. Although one could apply an algorithm for CMQC to WQC (by keeping only the most frequent quartet on each set of four taxa), maximizing the most-frequent quartets may enforce the presence of many low-frequency quartets. A better solution may prefer more of the middle-frequency quartets, and we give an example of this phenomenon. It was shown in [16] that the CMQC problem admits a polynomial time approximation scheme (PTAS), but it can only be extended to WQC intances on a constant number of trees. Also, CMQC was shown in [14, 10] to be fixed-parameter tractable w.r.t. the parameter “number of quartets to reject from the input”. The main result of this paper is to establish the NP-hardness of the WQC problem. In Section 2, we introduce preliminary notions, and in Section 3 we propose a reduction from the NP-hard Cyclic Ordering problem to WQC. It can be shown that this hardness result transfers to the rooted setting, in which case we want to optimize triplets (3-leaf rooted trees) rather than quartets. In Section 4, we discuss how being in a consensus setting, i.e. having weights based on a set of input trees on the same leaf set rather than arbitrary weights, does not necessarily make the problem easier, as one could expect: We list some structural properties that, surprisingly, are not satisfied by optimal solutions of a WQC instance. Nevertheless, in Section 5 we devise a factor 1/2 approximation algorithm for WQC running in time O(k 2 n2 + kn4 + n5 ), where k is the number of trees and n the number of species (the best known randomized algorithm in the non-consensus setting is a factor 1/3 one). As a matter of fact, our algorithm includes a derandomization of this procedure, which had never been done before. Finally in Section 6, we show that the known FPT algorithms for the CMQC problem can be extended to the consensus setting. This yields an FPT algorithm that is efficient on instances in which there is not too much ambiguity, i.e. when few competing quartets on the same 4 species appear with the same frequency. We then conclude with some remarks and open problems related to the quartet consensus problem. 2 Preliminaries An unrooted phylogenetic tree T consists of vertices connected by edges, in which every pair of nodes is connected by exactly one path and no vertex is of degree two. The leaves of a tree M. Lafond and C. Scornavacca 23:3 T , denoted by L(T ) are the set of vertices of degree one. Each leaf is associated to a label; the set of labels associated to the leaves of a tree T is denoted by L(T ). We suppose that there is a bijection between L(T ) and L(T ). Due to this bijectivity, we will refer to leaves and labels interchangeably. We denote |L(T )| as |T |. In the following, we will often omit the word “phylogenetic” and, unless otherwise stated, all trees are leaf-labeled. A binary unrooted tree has only vertices with degree three and vertices with degree one. A rooted (binary) phylogenetic tree is defined in the same way, except that it has exactly one node of degree two called the root, denoted by r(T ). Note that sometimes in the literature, rooted trees are seen as directed and such that all arcs are oriented away from the root. Unless stated otherwise, all trees in this paper are unrooted. Given an unrooted phylogenetic tree T and a subset Y ⊆ L(T ), we denote by T |Y the tree obtained from the minimal subgraph of T connecting Y when contracting degree-2 vertices. A quadset is a set of four labels. For a quadset {a, b, c, d}, there are three non-isomorphic1 unrooted binary trees, called quartets, which are denoted respectively by ab|cd, ac|bd, and ad|bc, depending on how the central edge splits the four labels. We say that an unrooted tree T displays the quartet ab|cd if T |{a, b, c, d} is ab|cd. We denote the set of quartets  that )| an unrooted tree T displays by Q(T ). Note that if T is binary, then |Q(T )| = |L(T . A set 4 of quartets Q on a set L is said to be complete if for each quadset {a, b, c, d} ⊆ L, there is in Q exactly one quartet among ab|cd, ac|bd, and bc|ad. We are now ready to state our optimization problem. The Weighted Quartet Consensus problem asks for a tree that has as many quartets as possible in common with a given set of trees on the same set of labels X : Weighted Quartet Consensus (WQC) problem Input: a set of unrooted trees T = {T1 , . . . , Tk } such that L(T1 ) = . . . = L(Tk ) = X . P Output: a binary unrooted tree M with L(M ) = X that maximizes T ∈T |Q(M ) ∩ Q(T )|. The problem is weighted as each quartet on X is weighted by frequency in T , see below. In this paper we will focus on the particular case where the input trees are all binary. In fact, proving the problem NP-hard for this restricted case implies NP-hardness of the general problem. Note however that relaxing the requirement of the output M to be binary leads to a different problem, as one needs to define how unresolved quartets in M are weighted. In the remainder of the article, we will sometimes consider multi-sets of quartets, that are sets in which the same quartet can appear multiple times. Denote by fQ (q) the number of times that a quartet q appears in a multi-set Q (we may write f (q) if Q is unambiguous). We say that a tree T contains k quartets of Q if there are distinct quartets q1 , . . . , qp ∈ Q(T ) Pp such that i=1 f (qi ) = k. The Weighted Quartet Consensus problem can be rephrased as follows: given trees T1 , . . . , Tk , finding a tree M that contains a maximum number of quartets from Q(T1 ) ] Q(T2 ) ] . . . ] Q(Tk ), where ] denotes multiset union. We will implicitly work with the decision version of WQC, i.e. for a given integer q, is there a consensus tree M containing at least q quartets from Q(T1 ) ] Q(T2 ) ] . . . ] Q(Tk )? Given a quadset {a, b, c, d}, we say that ab|cd is dominant (w.r.t. f ) if f (ab|cd) ≥ f (ac|bd) and f (ab|cd) ≥ f (ad|bc). We say that ab|cd is strictly dominant if both inequalities are strict. 1 Isomorphism preserving labels. CPM 2017 23:4 On the Weighted Quartet Consensus problem 3 NP-hardness of the Weighted Quartet Consensus problem In this section, we present a reduction from the Cyclic ordering problem. This problem has been used in phylogenetics before in [15] in the context of inferring rooted binary trees from rooted triplets that are not required to originate from a set of trees on the same leaf set. But beforehand, we need some additional notation. A caterpillar is an unrooted binary tree obtained by taking a path P = p1 p2 . . . pr , then adding a leaf `i adjacent to pi for each 1 ≤ i ≤ r, then adding another leaf `01 adjacent to p1 and a leaf `0r adjacent to pr . The two leaves `01 and `0r inserted last are called the ends of the caterpillar. An augmented caterpillar T is a binary tree obtained by taking a caterpillar, then replacing each leaf by a binary rooted tree (replacing a leaf ` by a tree T 0 means replacing ` by r(T 0 )). If T1 , T2 are the two trees replacing the ends of the caterpillar, then T is called a (T1 , T2 )-augmented caterpillar. Note that every binary tree is a (T1 , T2 )-augmented caterpillar for some T1 , T2 . Let T be a caterpillar with leaves (`1 , `2 , . . . , `k ) taken in the order in which we encounter them on the path between the two ends l1 and lk (more precisely, traverse the `1 − `k path, and each time an internal node is encountered, append its adjacent leaves to the sequence), and let T1 , . . . , Tk be rooted binary trees. We denote by (T1 |T2 | . . . |Tk ) the (T1 , Tk )-augmented caterpillar obtained by replacing `i by r(Ti ), 1 ≤ i ≤ k. This notation gives rise to a natural ordering of its subtrees, and we say that Ti < Tj if i < j (i.e. Ti appears before Tj in the given ordering of the caterpillar subtrees). Note that by reversing such an ordering, we obtain the same unrooted tree. However, in the proofs the given ordering will be important. Also, since T1 , T2 , and Tk−1 , Tk are interchangeable, we will simply say that these two pairs are incomparable. If each Ti consists of a single leaf `i for 2 ≤ i ≤ k − 1, then we may write (T1 |`2 | . . . |`k−1 |Tk ), and `i < `j in T to indicate that `i appears before `j in the ordering. We are now ready to describe the Cyclic Ordering problem. Let L = (s1 , . . . , sn ) be a linear ordering of a set S of at least 3 elements, and let (a, b, c) be an ordered triple, with a, b, c ∈ S. We say that L satisfies (a, b, c) if one of the following holds in L: a < b < c, b < c < a or c < a < b. If C is a set of ordered triples we say that L satisfies C if it satisfies every element of C. Intuitively speaking, L satisfies (a, b, c) when, by turning L into a directed cyclic order by attaching sn to s1 , one can go from a to b, then to c and then to a. This leads to the following problem definition: Cyclic Ordering problem Input: A set S of n elements and a set C of m ordered triples (a, b, c) of distinct members of S. Question: Does there exist a linear ordering L = (s1 , . . . , sn ) of S that satisfies C? The Cyclic Ordering problem is NP-hard [13]. In the rest of this section, we let S and C be the input set and triples, respectively, of a Cyclic Ordering problem instance. We denote n = |S| and m = |C|. We shall use the following simple yet useful characterization. I Lemma 1. A linear ordering L of S satisfies C if and only if for each (a, b, c) ∈ C, exactly two of the following relations hold in L: a < b, b < c, c < a. Proof. (⇒): let L be a linear ordering satisfying C, and let (a, b, c) ∈ C. Thus in L, one of a < b < c, b < c < a or c < a < b holds. It is straightforward to verify that in each case, exactly two of a < b, b < c, c < a hold. (⇐): suppose that L does not satisfy C. Then there is some (a, b, c) ∈ C such that one of a < c < b, b < a < c or c < b < a does not hold. Again, one can easily verify that each of these cases satisfies only one of a < b, b < c and c < a. J M. Lafond and C. Scornavacca 23:5 Now, from S and C we construct a set of unrooted binary trees T on the same set of labels (we will omit the straightforward verification that this construction can be carried out in polynomial time). First let W and Z be two rooted binary trees each on (nm)100 leaves (the topology is arbitrary, and the 100 exponent could be optimized). Our trees are defined on the leaf set X = S ∪ L(W ) ∪ L(Z) (note that S, L(W ), L(Z) are disjoint). Let C ∈ C with C = (a, b, c). We construct 6 trees from C, that is, 3 pairs of trees: The “a < b” trees: let (s1 , . . . , sn−2 ) be an arbitrary ordering of S \ {a, b}. Then we build ← − the trees TC (ab) = (W |a|b|s1 |s2 | . . . |sn−2 |Z) and T C (ab) = (W |sn−2 |sn−3 | . . . |s1 |a|b|Z). The “b < c” trees: let (ŝ1 , . . . , ŝn−2 ) be an arbitrary ordering of S \ {b, c}. Then we build ← − the trees TC (bc) = (W |b|c|ŝ1 |ŝ2 | . . . |ŝn−2 |Z) and T C (bc) = (W |ŝn−2 |ŝn−3 | . . . |ŝ1 |b|c|Z). The “c < a” trees: let (s̄1 , . . . , s̄n−2 ) be an arbitrary ordering of S \ {c, a}. Then we build ← − the trees TC (ca) = (W |c|a|s̄1 |s̄2 | . . . |s̄n−2 |Z) and T C (ca) = (W |s̄n−2 |s̄n−3 | . . . |s̄1 |c|a|Z). Denote by T (C) the set of 6 constructed trees for C ∈ C. In this section, the input for our S Weighted Quartet Consensus instance constructed from S and C is T = C∈C T (C). Note that |T | = 6m. Observe that each tree of T (C) is a (W, Z)-augmented caterpillar. Moreover, note that the majority of ordered pairs are “balanced” in the pairs of constructed trees: Let a, b ∈ S ← − and x, y ∈ S \ {a, b}, and let {TC (ab), T C (ab)} be an “a < b” tree-pair. Then we have x < y ← − in TC (ab) if and only if y < x in T C (ab). Similarly for any x ∈ S \ {a, b}, a < x, b < x in ← − TC (ab) but x < a, x < b in T C (ab). Only a < b holds in both trees. Let T ∈ T , and let B(T ) denote the set of quartets of T that have at least two members of L(W ), or at least two members of L(Z). Thus B(T ) consists in all the quartets of the form w1 w2 |xy and z1 z2 |xy of T , where w1 , w2 ∈ L(W ), z1 , z2 ∈ L(Z) and x, y ∈ X (note that no quartet of B(T ) has the form w1 x|yw2 for x, y ∈ / L(W ), nor the form z1 x|yz2 for x, y ∈ / L(Z)). Note that for any tree T 0 ∈ T , B(T ) = B(T 0 ). Let K := 6m|B(T )| be the total U number of such quartets in T , i.e. K is the size of T ∈T B(T ). We observe the following: U I Remark. Any (W, Z)-augmented caterpillar on X contains the K quartets T ∈T B(T ).   Now, denote Ô := 3m|W ||Z| n−2 + 2(n − 2) . Let T ∈ T and suppose that T is an “a < b” 2 tree, for some a, b ∈ S. For w ∈ L(W ) and z ∈ L(Z), x, y ∈ S, a quartet wx|yz displayed by T is called an out-quartet of T if {x, y} = 6 {a, b}, and an in-quartet of T if x = a and y = b (note that x = b and y = a is not possible, by construction). Let out(T ) and in(T ) denote the set of out-quartets and in-quartets, respectively, of T . Note that each tree Thas |W ||Z|   n−2 in-quartets and |W ||Z| + 2(n − 2) out-quartets (because there are n−2 + 2(n − 2) 2 2 ways to choose {x, y} = 6 {a, b}). Thus Ô is half the total number of out-quartets. I Lemma 2. Any weighted quartet consensus tree M for T contains at most Ô quartets from U (W |s1 | . . . |sn |Z), where T ∈T out(T ). Moreover, if M is a (W, Z)-augmented caterpillar U S = {s1 , . . . , sn }, then M contains exactly Ô quartets from T ∈T out(T ). ← − Proof. Let w ∈ L(W ) and z ∈ L(Z). Let {TC (ab), T C (ab)} be an “a < b” tree-pair of T , for some a, b ∈ S, and let x, y ∈ S such that {x, y} 6= {a, b}. Because x < y in TC (ab) if ← − and only if y < x in T C (ab), we get that the out-quartet wx|yz is in TC (ab) if and only if ← − wy|xz is in T C (ab). Since M can only contain one of the two quartets, it follows that M can ← − contain at most half of the quartets from out(TC (ab)) ] out( T C (ab)). at  Thus M contains  U most half the quartets from T ∈T out(T ), which is 3m|W ||Z| n−2 + 2(n − 2) = Ô. As 2 for the second assertion, if M = (W |s1 | . . . |sn |Z) then M contains one of wx|yz or wy|xz for each x, y ∈ S. Thus if M does not contain the out-quartet wx|yz from TC (ab), then it CPM 2017 23:6 On the Weighted Quartet Consensus problem ← − contains the out-quartet wy|xz from T C (ab). We deduce that M contains at least half the U ← − quartets from out(TC (ab)) ] out( T C (ab)), and thus half the quartets from T ∈T out(T ). J What follows is a key Lemma. The proof is not so straightforward and can be found in Appendix B.1. I Lemma 3. Any optimal consensus tree for T is a (W, Z)-augmented caterpillar. We finally arrive at our main result. I Theorem 4. The Weighted Quartet Consensus problem is NP-hard. Proof. We show that there exists a linear ordering of S satisfying C if and only if there exists a weighted quartet consensus tree M for T that contains at least K + Ô + 4m|W ||Z| U quartets from T ∈T Q(T ). For the rest of the proof, we let w ∈ L(W ) and z ∈ L(Z) be arbitrary leaves of W and Z, respectively. (⇒): let L = (s1 , s2 , . . . , sn ) be a linear ordering of S satisfying C. Then we claim that the weighted quartet consensus tree M = (W |s1 |s2 | . . . |sn |Z) contains the desired number of quartets. Since M is a (W, Z)-augmented caterpillar, M contains K quartets of T that have two or more elements from L(W ), or two or more elements from L(Z), see remark on page 5. U Moreover by Lemma 2, M contains Ô quartets from T ∈T out(T ). As for the in-quartets, let (a, b, c) ∈ C and let T ((a, b, c)) be the set of 6 trees corresponding to (a, b, c). By Lemma 1, L satisfies two of the relations a < b, b < c, c < a . This implies that M has exactly two of the following quartets: wa|bz, wb|cz, wc|az. Since, for every w ∈ L(W ) and z ∈ L(Z), each of these three quartets appears as an in-quartet in exactly two trees of T ((a, b, c)) (e.g. wa|bz is ← − an in-quartet of T(a,b,c) (ab) and T (a,b,c) (ab)), it follows that M contains 4|W ||Z| quartets of U in(T ). As this holds for every (a, b, c) ∈ C, M contains 4m|W ||Z| quartets of UT ∈T ((a,b,c)) T ∈T in(T ). Summing up, we get that M has at least K + Ô + 4m|W ||Z| quartets from T . (⇐): suppose that no linear ordering of S satisfies C. Let M be an optimal consensus tree for T . By Lemma 3, we may assume that M is a (W, Z)-augmented caterpillar. We bound the number of quartets of T that can be contained in M . First, by Lemma 3, M contains K quartets of T that have at least two elements of L(W ) or at least two elements of L(Z). As for the quartets with one or zero elements from L(W ) ∪ L(Z), in any tree T ∈ T there are at most (|W | + |Z|)n3 quartets of the form wa|bc or za|bc with a, b, c ∈ S, and at most n4 quartets of the form ab|cd with a, b, c, d ∈ S. Thus M contains at most 6m((|W | + |Z|)n3 + n4 ) < (|W | + |Z|)mn5 quartets of T that are of the form wa|bc, za|bc or ab|cd with a, b, c ∈ S (the inequality holds because n ≥ 3 and U |W | = |Z| = (nm)100 ). Also, by Lemma 2, M contains at most Ô quartets from T ∈T out(T ). It remains to count the in-quartets. Let (a, b, c) ∈ C. The following in-quartets appear, each twice, in T ((a, b, c)): wa|bz, wb|cz, wc|az. It is easy to check that these three quartets are incompatible, i.e. no tree can contain all three of them, and hence M can have at most two of them. We deduce that ← − there must be at least two trees T, T of T ((a, b, c)) such that M contains no quartet from U ← − in(T ) ] in( T ). Therefore M contains at most 4|W ||Z| quartets from T ∈T ((a,b,c)) in(T ), U and thus at most 4m|W ||Z| quartets from T ∈T in(T ) assuming that the 4|W ||Z| bound is attained for every (a, b, c) ∈ C. We will however show that there must be some (a, b, c) ∈ C U such that M contains only 2|W ||Z| of the quartets in T ∈T ((a,b,c)) in(T ). Now, since M is a (W, Z)-augmented caterpillar, we write M = (W |T1 |T2 | . . . |Tk |Z). For some a ∈ S, let T (a) be the tree of {T1 , . . . , Tk } that contains a as a leaf. Then a quartet wa|bz is in Q(M ) if and only if T (a) < T (b). Let L be a linear ordering of S such M. Lafond and C. Scornavacca 23:7 that T (a) < T (b) ⇒ a < b in L. Since no linear ordering of S can satisfy C, by Lemma 1 there must be some (a, b, c) ∈ C such that only one of a < b, b < c, c < a holds in L. This also means that at most one of T (a) < T (b), T (b) < T (c), T (c) < T (a) holds (because ¬(a < b) ⇒ ¬(T (a) < T (b))). Thus M has at most one of the wa|bz, wb|cz, wc|az quartets. U It follows that there are at least 2|W ||Z| quartets from T ∈T ((a,b,c)) in(T ) that M does not U contain. Therefore M contains at most 4m|W ||Z| − 2|W ||Z| quartets of T ∈T in(T ). In total, the number of quartets that M contains from the input is bounded by K + Ô + (|W | + |Z|)mn5 + (4m − 2)|W ||Z| < K + Ô + 4m|W ||Z|, by our choice of |W | and |Z|. J The implications of these results for the Weighted Triplet Consensus (WTC) problem are presented in Appendix A. The same techniques can be used to show that WTC is NP-hard. 4 The (non)-structure of WQC In the rest of this paper, we aim at designing algorithms building on the fact that the weight of each quartet is not arbitrary, and is rather based on a set of input trees on the same leaf set. When designing optimized algorithms for a problem, understanding the relationship between the input and the optimal solution(s) can be of great help. In phylogenetics, several problems are harder in the supertree setting, i.e. when the input trees do not all contain the same species, than in the consensus setting as in the WQC problem. An example is the problem of finding an unrooted phylogenetic tree containing as minors a set of unrooted phylogenetic trees – the compatibility problem – which is NP-hard in the supertree setting [24] and polynomially solvable in the consensus setting [1]. Despite the NP-hardness of WQC, there may exist some properties inherent to the consensus setting that are useful for devising efficient FPT algorithm, or for establishing lower bounds on the value of an optimal solution in order to develop approximation algorithms. In attempt to establish useful properties of the weights of quartets in the consensus setting, we initially conjectured that the following relationships between the input trees and the solution(s) hold. Despite being seemingly reasonable, we prove all these conjectures false. 1. let D be the set of strictly dominant quartets of the input multiset Q, i.e. the quartets ab|cd such that f (ab|cd) > f (ac|bd) and f (ab|cd) > f (ad|bc). Then there is a constant α > 0 such that there exists an optimal solution containing at least α|D| quartets of D; 2. if a quartet ab|cd has a higher weight than the sum of the other quartets on the same quadset, i.e. f (ab|cd) > f (ac|bd) + f (ad|bc), then some optimal solution contains ab|cd; 3. more generally, there exists β > 0 such that if a quartet ab|cd is in a fraction β of the input trees, then ab|cd must be in some optimal solution. In particular, if ab|cd is in every input tree, then there is some optimal solution that contains ab|cd; 4. if a quartet ab|cd is in no input tree, then no optimal solution contains ab|cd. 5. call ab|cd a strictly least-frequent quartet if f (ab|cd) < f (ac|bd) and f (ab|cd) < f (ad|bc). Suppose that there exists a tree T ∗ on leaf set X that contains no strictly least-frequent quartet, and choose such a T ∗ that contains a maximum number of quartets from the input. Then T ∗ is an optimal solution for WQC. Unfortunately, we answered negatively to all conjectures, see Appendix B.2. 5 Approximatibility of WQC In this section, we show that WQC admits a factor 1/2 approximation algorithm that runs in polynomial time. Hereafter, the input set of trees is T = {T1 , . . . , Tk } and we denote CPM 2017 23:8 On the Weighted Quartet Consensus problem Q = Q(T1 ) ] . . . ] Q(Tk ). We say that a minimization (resp. maximization) problem P can be approximated within a factor α > 1 (resp. β < 1) if there is an algorithm that, for every instance I of P , runs in polynomial time and outputs a solution of value AP P (I) such that AP P (I) ≤ αOP T (I) (resp. AP P (I) ≥ βOP T (I)), where OP T (I) is the optimal value of I. As mentioned before, the Complete Maximum Quartet Compatibility (CMQC) problem admits a PTAS, though it can only be applied to the WQC problem when the number of input trees is constant. There does not seem to exist an easy extension of the PTAS algorithm for the case of an unbounded number of trees, which makes WQC seem “harder” than CMQC. Nevertheless, we give a simple factor 1/2 approximation algorithm, which is better than the (randomized) factor 1/3 approximation, the best known so far, for the general Maximum Quartet Consistency problem in which the given quartet set is not necessarily complete. We borrow ideas from [9] to show that this can be achieved by taking the best solution from either a 1/3 approximation to WQC, or a factor 2 approximation to WMQI, the minimization version of WQC (see below). For two unrooted binary trees T1 , T2 on leaf set X , denote dQ (T1 , T2 ) = |Q(T1 ) \ Q(T2 )|. The WMQI problem is defined as follows: Weighted Minimum Quartet Inconsistency (WMQI) problem Input: a set of unrooted trees T = {T1 , . . . , Tk } such that L(T1 ) = . . . = L(Tk ) = X . P Output: a tree M with L(M ) = X that minimizes T ∈T dQ (M, T ). Note that the WMQI problem is equivalent to finding a minimum (in the multiset sense) number of quartets to discard from Q so that it is compatible. It is not hard to show that dQ is a metric. In particular, dQ satisfies the triangle inequality, i.e. for any 3 trees T1 , T2 , T3 on the same leaf set, dQ (T1 , T3 ) ≤ dQ (T1 , T2 ) + dQ (T2 , T3 ). This leads to a factor 2 approximation algorithm for WMQI obtained by simply returning the best tree from the input. Intuitively, the input tree that is the closest to the others cannot be too far from the best solution, which is a median tree in the metric space. See [2] for details. I Theorem 5 ([2]). The following is a factor 2 approximation algorithm for WMQI: output P the tree T ∈ T that minimizes Ti ∈T dQ (T, Ti ). In [2], the authors explain how to compute dQ (T1 , T2 ) in time O(n2 ). Therefore the factor 2 approximation can be implemented to run in time O(k 2 n2 ), by simply computing dQ between every pair of trees. Theorem 5 has a direct implication on the approximation guarantees of the ASTRAL algorithm in [20], an implementation of the work from Bryant and Steel [8]. This algorithm finds, in polynomial time, an optimal solution M for a restricted version of WMQI where every bipartition of M is also a bipartition in at least one of the input trees. The solution T returned by the algorithm of Theorem 5 above trivially satisfies this condition. Thus, M is at least as good as T , implying the following. I Corollary 6. The ASTRAL algorithm is a factor 2 approximation for WMQI. We do not know whether the factor 2 is tight for the ASTRAL algorithm - we conjecture that ASTRAL can actually achieve a better approximation ratio. As shown in the rest of this section, this would have interesting applications for the approximability of WQC. Indeed, both WQC and WMQI share the same set of optimal solutions, but the two problems are not necessarily identical in terms of approximability. We show however that WMQI can be used to approximate WQC. As stated earlier, there is a trivial factor 1/3 randomized approximation for WQC: output a random tree T . Each quartet of Q has a 1/3 M. Lafond and C. Scornavacca 23:9 chance of being contained by T , and so the expected number of quartets of Q contained by  T is |Q|/3 = k n4 /3 (here |Q| denotes the multiset cardinality). Call this the “random-treealgorithm”. For the sake of having a deterministic algorithm, we show the following: I Lemma 7. The “random-tree-algorithm” can be derandomized, i.e. there is a deterministic algorithm that, in time O(kn4 + n5 ), finds a tree containing at least |Q|/3 quartets from Q. Proof. We derandomize the factor 1/3 algorithm using the standard method of conditional expectation. For the simplicity of exposition, we will construct a rooted tree T in a top-down manner (T can be unrooted after the construction). Call a rooted tree T internally binary if the only nodes of T that have more than two children have only leaves as children. We start with a fully unresolved internally binary tree T on leaf set X (i.e. T consists of a root whose n children are in bijection with X ). We then iteratively split each unresolved node v of T into two subtrees so as to maximize the expected number of quartets that T contains. We stop when T is a binary tree. To describe the algorithm more precisely, suppose that T is an internally binary tree on leaf set X , and let v be a node of T with more than 2 children, say {v1 , . . . , vm } ⊆ X (if no such v exists, then T is binary and we can stop). We split v by first removing {v1 , . . . , vm } from T , adding two children x and y to v, and reinserting v1 , . . . , vm one after another, each as either a child of x or a child of y. We describe how this choice is made. Suppose that for i ≥ 1, v1 , . . . , vi−1 have been reinserted, resulting in the tree Ti−1 , and that we need to process vi . Denote by Ti,x (resp. Ti,y ) the tree obtained by inserting vi as a child of x 0 (resp. of y) in Ti−1 . We then define a random binary tree Ti,x from Ti,x as follows: for each 0 0 v ∈ {vi+1 , . . . , vm }, reinsert v as a child of x with probability 1/2, or as a child of y with probability 1/2. Then, replace each non-binary node w with children X 0 by a rooted binary 0 tree on leaf set X 0 chosen uniformly at random. We define the random binary tree Ti,y from Ti,y using the same process. For a random tree T 0 obtained by the above process and for q ∈ Q, let I(q, T 0 ) be an indicator variable for whether q ∈ Q(T 0 ). That is, I(q, T 0 ) = 1 if q ∈ Q(T 0 ), and I(q, T 0 ) = 0 P otherwise. Let I(T 0 ) = q∈Q I(q, T 0 )fQ (q) 2 . We seek  max 0 ,T 0 } T 0 ∈{Ti,x i,y E [I(T 0 )] = = max E max X 0 ,T 0 } T 0 ∈{Ti,x i,y 0 ,T 0 } T 0 ∈{Ti,x i,y  X I(q, T 0 )fQ (q) q∈Q Pr [q ∈ Q(T 0 )] fQ (q) q∈Q 0 If Ti,x attains this maximum, we insert vi below x, and otherwise we insert vi below y. After every child vi of v has been inserted, we process the next non-binary node. This concludes the algorithm description (we shall detail how to compute Pr[q ∈ Q(T 0 )] below). If T is an internally binary tree, by a slight abuse of notation define E [I(T )] = E [I(T 0 )], where T 0 is the random binary tree obtained by replacing each non-binary node of T on leaf set X 0 by a random binary tree on leaf set X 0 . I Claim 1. Let T be an internally binary tree, and suppose that E[I(T )] ≥ |Q|/3. Let v be a non-binary node of T , and let Tv be the tree obtained after splitting v using the above algorithm. Then E[I(Tv )] ≥ |Q|/3. 2 Observe that here, q ∈ Q means that there exists at least one occurrence of q in the multisetQ, and so each quartet present in Q is considered once in the summation, independently of fQ (q). CPM 2017 23:10 On the Weighted Quartet Consensus problem Let {v1 , . . . , vm } be the children of v. To prove the claim, we use induction on the number of processed children of v to show that after each insertion of a child vi , the obtained 0 0 tree Ti ∈ {Ti,x , Ti,y } satisfies E[I(Ti0 )] ≥ |Q|/3, where Ti0 ∈ {Ti,x , Ti,y } is the random tree corresponding to Ti obtained from the above process (i.e. reinserting vi+1 , . . . , vm randomly under x or y, and resolving non-binary nodes randomly). This proves the statement since 0 Tm = Tv (and thus E [I(Tv )] = E [I(Tm )] = E[I(Tm )] ≥ |Q|/3). As a base case, if i = 1 it 0 0 0 0 is easy to see that T1,x and T1,y are identical, and that E[I(T1,x )] = E[I(T1,y )] = E[I(T )] ≥ |Q|/3. For i > 1, let Ti−1 be the tree obtained after inserting vi−1 , and suppose without 0 loss of generality that Ti−1 = Ti−1,x . Because, in Ti−1,x , we insert vi below x or y each with 1 probability 2 , we have   1   1   0 0 0 E I(Ti−1,x ) = E I(Ti−1,x )|vi is a child of x + E I(Ti−1,x )|vi is a child of y 2 2     1 0 0 E I(Ti,x ) + E I(Ti,y ) = 2 0 By induction, we alsohave E[I(T i−1,x )] ≥ |Q|/3. Combined with the above equality, we   0 0 0 0 obtain 12 E I(Ti,x ) + E I(Ti,y ) ≥ |Q|/3. This implies that one of E[I(Ti,x )] or E[I(Ti,y )] must be at least |Q|/3. J Since the fully unresolved tree T from which we start satisfies E[I(T )] ≥ |Q|/3, Claim 1 shows that the algorithm does terminate with a tree containing at least |Q|/3 quartets from Q. It remains to be show how to compute, when reinserting a node vi , the expectations for 0 0 Ti,x and Ti,y . In fact, it suffices to be able to compute, for a given quartet q = ab|cd, the probability 0 0 0 0 Pr[q ∈ Q(T 0 )] for T 0 ∈ {Ti,x , Ti,y }. Moreover, if Pr[q ∈ Q(Ti,x )] = Pr[q ∈ Q(Ti,y )], then this probability does not contribute to determining which scenario maximizes expectation, and in this case we do not need to consider q. In particular, if none of a, b, c, d is equal to vi , then 0 0 Pr[q ∈ Q(Ti,x )] = Pr[q ∈ Q(Ti,y )]. Therefore, it is enough to consider only quartets in which vi is included. We will assume that vi = a. Moreover, we may assume that two or three of {b, c, d} are children of v in T (recall that v is the parent of vi in T ), because otherwise the probability that ab|cd is in T 0 is unaffected by whether a is a child of x or a child of y. There are still multiple cases depending on which of b, c and d are children of v, and which have been reinserted or have not, but this probability can be easily found algorithmically. Let U = {b, c, d} ∩ {vi+1 , . . . , vm }, i.e. the leaves in {b, c, d} that have not been reinserted yet in T 0 . We obtain new trees S10 , . . . , Sh0 by reinserting, in T 0 , the members of U below x or y in every possible way – there are only 2|U | ≤ 8 possibilities, so h ≤ 8. Then, for 1 ≤ j ≤ h denote by Sj0 |q the tree Sj0 restricted to {a, b, c, d} (i.e. obtained by removing every leaf not in {a, b, c, d}, then contracting degree 2 vertices). Note that Sj0 |q may be non-binary. We get Ph Pr[q ∈ Q(T 0 )] = j=1 h1 Pr[q ∈ Q(Sj0 |q )]. This is because every leaf in vi+1 , . . . , vm other than b, c, d is resinserted independently from the choice for b, c, d, and every non-binary node remaining after the reinsertions is resolved uniformly. The probability Pr[q ∈ Q(Sj0 |q )] is straightforward to compute, as only a constant number of cases can occur since Sj0 |q has only 4 leaves. We omit the details. Time complexity: we must first preprocess the input in order to compute fQ (q) for each quartet q. This takes time O(kn4 ). As for the computation of Pr[q ∈ Q(T 0 )], assume that the lowest common ancestor (lca) of two leaves can be found in constant time. This can be achieved naively by simply storing the lca for each pair of leaves in a table of size O(n2 ), and updating the table in time O(n) each time a decision on some vi is made (this does not hinder the total time complexity of the algorithm, though there are more clever M. Lafond and C. Scornavacca 23:11 ways to handle dynamic tree lca queries [11]). Then the restrictions S10 |q , . . . , Sh0 |q can be computed in constant time. It is then straightforward to see that, by the above process, Pr[q ∈ Q(T 0 )] can be computed in constant time. Each time a node vi needs to be reinserted, this probability must be computed for the O(n3 ) quartets containing vi . There are n−1 splits to be performed, and each split requires inserting O(n) nodes. Thus the “binarization” process takes total time O(n5 ), and altogether the derandomization takes time O(kn4 + n5 ). J The above leads to a (deterministic) 1/3- approximation. This can be used to show the following. The proof is similar to that of [9, Theorem 2] and is relegated to Appendix B.3. I Theorem 8. If WMQI can be approximated within a factor α, then WQC can be approximated within a factor β = α/(3α − 2). Combined with Theorem 5 and letting α = 2 in Theorem 8 we get the following. I Corollary 9. WQC can be approximated within a factor 1/2 in time O(k 2 n2 + kn4 + n5 ). 6 Fixed-parameter tractability of WQC In this section we describe how, based on previous results on the minimum quartet incompat0 0 0 ibility problem on complete sets, WQC can be solved in time O(4d +k2 +k3 n + n4 ). Here k20 and k30 are the number of quadsets that have 2 and 3 dominant quartets, respectively, and d0 is the number of strictly dominant quartets that we are allowed to reject. The algorithm makes direct use of the Gramm-Niedermeyer algorithm [14], henceforth called the GN algorithm. The GN algorithm solves the following problem: given a complete set of quartets Q, find, if it exists, a complete and compatible set of quartets Q0 such that at most d quartets of Q0 are not in the input set Q (i.e. |Q0 \ Q| ≤ d). This is accomplished by repeatedly applying the following theorem: I Theorem 10 ([14]). Let Q be a complete set of quartets. Then Q is compatible if and only if for each set of five taxa {a, b, c, d, e} ⊆ X , ab|cd ∈ Q implies ab|ce ∈ Q or ae|cd ∈ Q. The idea behind the GN algorithm is as follows: find a set of five taxa {a, b, c, d, e} that does not satisfy the condition of Theorem 10, then correct the situation by branching into the four possible choices: 1. remove ab|cd from Q and add ac|bd to Q; 2. remove ab|cd from Q and add ad|bc to Q; 3. remove {ac|be,ae|bc} ∩ Q from Q and add ab|ce to Q; 4. remove {ac|de,ad|ce} ∩ Q from Q and add ae|cd to Q. The quartets added to Q will not be questioned in the following branchings. With some optimization, this leads to a O(4d n + n4 ) FPT algorithm. In [14], the authors also note that this algorithm can be extended to sets of quartets Q that contain ambiguous quadsets, i.e. sets {a, b, c, d} for which 2 or 3 of the possible quartets on {a, b, c, d} are in Q. Suppose there are k2 and k3 , respectively, quadsets that have 2 and 3 quartets in Q. The modified algorithm then, in a first phase, branches into the 2k2 3k3 ways of choosing one quartet per such quadset, thereby obtaining a complete set of quartets for each possibility. The GN algorithm is thus applied to the so-obtained complete sets. This yields a O(2k2 · 3k3 · 4d n + n4 ) algorithm. It is not hard to see that this gives an FPT algorithm for WQC, where the parameter k2 (resp. k3 ) is the number of quadsets such that 2 (resp. 3) possible quartets appear in the input trees, and d is the number of quartets ab|cd that appear in every input tree, and that CPM 2017 23:12 On the Weighted Quartet Consensus problem we are allowed to discharge. Note however that, in the consensus setting, there is no reason to believe that k2 and k3 are low - in we fact we believe that k2 + k3 typically takes values in Θ(n4 ). One reason is that even the slightest amount of noise on a quadset makes it included in the count of either k2 or k3 (e.g. if k − 1 trees agree on ab|cd and only one contains ac|bd). The GN algorithm can, however, be used on a more interesting set of parameters. Define k20 (resp. k30 ) as the number of quadsets that have exactly 2 (resp. 3) dominant quartets, and let d0 be the number of strictly dominant quartets that we are allowed to discharge. It is reasonable to believe that, if each tree of the input is close to the true tree T ∗ , most “true” quartets will appear as strictly dominant in the input, and there should not be too many 0 0 0 ambiguous quadsets. There is a very simple algorithm achieving time O(4d +k2 +k3 n + n4 ). Construct a complete set of quartets Q as follows: for each quadset {a, b, c, d}, choose a dominant quartet on {a, b, c, d} and add it to Q (if multiple choices are possible, choose arbitrarily). Then, run the GN algorithm on Q with the following modification: each time a quartet q is removed from Q and replaced by another quartet q 0 , decrement either d0 , k20 or k30 , depending on whether q belongs to a quadset with 1, 2 or 3 dominant quartets. It follows that if there exists a complete and compatible set of quartets Q0 such that at most d0 strictly dominant quartets are rejected, then the modified algorithm will find it. It should be noted however that finding such a set Q0 does not guarantee that the corresponding tree is an optimal solution. Indeed, since quartets are weighted, two solutions Q0 and Q00 may both reject only d0 strictly dominant quartets, yet one has higher weight than the other. However, the correctness of the algorithm follows from the fact that the GN algorithm finds the set of every solution discarding at most d0 dominant quartets - and thus it suffices to pick the solution from this set that has optimal weight. We finally mention that the FPT algorithms published in [10] are improved versions of the GN algorithm, can also return every solution and thus can be modified in the same 0 0 0 manner. These yield FPT algorithms that can solve WQC in time O(3.0446d +k2 +k3 n + n4 ) 0 0 0 and O(2.0162d +k2 +k3 n3 + n5 ). 7 Conclusion In this paper, we have shown that the WQC problem is NP-hard, answering a question of [19] and [2]. In the latter, the authors also propose a variant of the problem in which the output tree T is not required to be binary. In this case, one needs to assign a cost p to the unresolved quartets. Our reduction can be extended to show that hardness holds for high enough p, but the complexity of the general case remains open. We have also shown that WQC can be approximated within a factor 1/2. One open question is whether the problem admits a PTAS as the related CMQC problem. The fixed-parameter tractability aspects of WQC also deserve further investigation. This would require identifying some structural properties that are present in the consensus setting and that can be used for designing practical exact algorithms. But as we have shown, this might not be an easy task, as many properties which seem reasonable for the consensus setting do not hold. References 1 2 Alfred V Aho, Yehoshua Sagiv, Thomas G Szymanski, and Jeffrey D Ullman. Inferring a tree from lowest common ancestors with an application to the optimization of relational expressions. SIAM Journal on Computing, 10(3):405–421, 1981. Mukul S Bansal, Jianrong Dong, and David Fernández-Baca. Comparing and aggregating partially resolved trees. Theoretical Computer Science, 412(48):6634–6652, 2011. M. Lafond and C. Scornavacca 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23:13 Jean-Pierre Barthélemy and Fred R McMorris. The median procedure for n-trees. Journal of Classification, 3(2):329–334, 1986. Vincent Berry, David Bryant, Tao Jiang, Paul Kearney, Ming Li, Todd Wareham, and Haoyong Zhang. A practical algorithm for recovering the best supported edges of an evolutionary tree (extended abstract). In Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, pages 287–296. Society for Industrial and Applied Mathematics, 2000. Vincent Berry, Tao Jiang, Paul Kearney, Ming Li, and Todd Wareham. Quartet cleaning: Improved algorithms and simulations. In Jaroslav Nešetřil, editor, Proceedings of the 7th Annual European Symposium on Algorithms, pages 313–324. Springer Berlin Heidelberg, 1999. David Bryant. Building trees, hunting for trees, and comparing trees. PhD thesis, University of Canterbury, 1997. David Bryant. A classification of consensus methods for phylogenetics. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 61:163–184, 2003. David Bryant and Mike Steel. Constructing optimal trees from quartets. Journal of Algorithms, 38(1):237–259, 2001. Jaroslaw Byrka, Sylvain Guillemot, and Jesper Jansson. New results on optimizing rooted triplets consistency. Discrete Applied Mathematics, 158(11):1136–1147, 2010. Maw-Shang Chang, Chuang-Chieh Lin, and Peter Rossmanith. New fixed-parameter algorithms for the minimum quartet inconsistency problem. Theory of Computing Systems, 47(2):342–367, 2010. Richard Cole and Ramesh Hariharan. Dynamic LCA queries on trees. In Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 235–244. Society for Industrial and Applied Mathematics, 1999. Joseph Felsenstein. Inferring phylogenies. Sinauer Associates Sunderland, 2004. Zvi Galil and Nimrod Megiddo. Cyclic ordering is NP-complete. Theoretical Computer Science, 5(2):179–182, 1977. Jens Gramm and Rolf Niedermeier. Minimum quartet inconsistency is fixed parameter tractable. In Amihood Amir, editor, Proceedings of the 12th Annual Symposium of Combinatorial Pattern Matching, pages 241–256. Springer Berlin Heidelberg, 2001. Jesper Jansson. On the complexity of inferring rooted evolutionary trees. Electronic Notes in Discrete Mathematics, 7:50–53, 2001. Tao Jiang, Paul Kearney, and Ming Li. A polynomial time approximation scheme for inferring evolutionary trees from quartet topologies and its application. SIAM Journal on Computing, 30(6):1942–1961, 2001. Timothy Margush and Fred R McMorris. Consensusn-trees. Bulletin of Mathematical Biology, 43(2):239–244, 1981. Fred R McMorris, David B Meronk, and Dean Neumann. A view of some consensus methods for trees. In Numerical Taxonomy, pages 122–126. Springer, 1983. Siavash Mirarab. Novel scalable approaches for multiple sequence alignment and phylogenomic reconstruction. PhD thesis, University of Texas at Austin, 2015. Siavash Mirarab, Rezwana Reaz, Md. Shamsuzzoha Bayzid, Théo Zimmermann, M Shel Swenson, and Tandy Warnow. ASTRAL: genome-scale coalescent-based species tree estimation. Bioinformatics, 30(17):i541–i548, 2014. António Morgado and Joao Marques-Silva. A pseudo-boolean solution to the maximum quartet consistency problem. arXiv preprint arXiv:0805.0202, 2008. António Morgado and Joao Marques-Silva. Combinatorial optimization solutions for the maximum quartet consistency problem. Fundamenta Informaticae, 102(3-4):363–389, 2010. CPM 2017 23:14 On the Weighted Quartet Consensus problem 23 24 25 26 A Robert R Sokal and F James Rohlf. Taxonomic congruence in the leptopodomorpha reexamined. Systematic Zoology, 30(3):309–325, 1981. Michael Steel. The complexity of reconstructing trees from qualitative characters and subtrees. Journal of Classification, 9(1):91–116, 1992. Gang Wu, Jia-Huai You, and Guohui Lin. A lookahead branch-and-bound algorithm for the maximum quartet consistency problem. In International Workshop on Algorithms in Bioinformatics, pages 65–76. Springer, 2005. Gang Wu, Jia-Huai You, and Guohui Lin. Quartet-based phylogeny reconstruction with answer set programming. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 4(1):139–152, 2007. Implications for the Weighted Triplet Consensus problem For each set of three labels {a, b, c}, there are three non-isomorphic3 rooted binary trees called triplets. They are denoted by ab|c, ac|b and bc|a, depending on the leaf having the root as father (c, b and a respectively). We say that a tree T induces or displays the triplet ab|c if T |{a, b, c} = ab|c. For a rooted tree R, denote by tr(R) the set of triplets of R. When the consensus is sought for rooted trees, the objective is to find a rooted tree M that induces a maximum number of triplets contained in the input trees. The Weighted Triplet Consensus (WTC) is defined as follows. Weighted Triplet Consensus (WTC) problem Input: a set of rooted trees R = {R1 , . . . , Rk } such that L(R1 ) = . . . = L(Rk ) = X . P Output: a binary rooted tree M with L(M ) = X that maximizes R∈R |tr(M ) ∩ tr(R)|. As in the unrooted problem, other versions of WTC where the input trees may have missing species or where the weight of a triplet is not defined w.r.t. a set of trees, are known to be NP-hard [6]. The WTC problem is conjectured to be NP-hard in [2] (we note that a more general version where the output can be non-binary is also conjectured NP-hard). S We give the main idea behind the proof of the hardness of WTC. Let T = C∈C T (C) be the set of unrooted trees constructed in the reduction above. For a tree T ∈ T , let e be the edge separating Z from the rest of the tree (i.e. by removing e from T , one connected component is exactly Z). Obtain a rooted tree R from T by rooting T at e, that is subdivide e, thereby creating a degree 2 vertex which is the root of R. The set of rooted trees R is obtained by applying this rooting to every T ∈ T (the Z subtree could be removed but we keep it here to make the correspondence easier to see). Similarly as above, it can be shown that since every input tree is a rooted (W, Z)caterpillar, then any solution must also have this form. This implies in turn that there exists a linear ordering of S satisfying C if and only if there is a solution M to WTC containing every triplet from the input on 2 or 3 members of L(W ),every triplet  containing at least one member of L(Z), plus at least 4m|W | + 3m|W | n−2 + 2(n − 2) triplets of the form 2 wa|b with a, b ∈ S. This is obtained by defining the notions of in-triplets and out-triplets analogously as in the previous section, but with respect to W only. That is, in a “a < b” tree, for a, b, c, d ∈ S, w ∈ L(W ) and {c, d} 6= {a, b}, wa|b would be an in-triplet, whereas wc|d or wd|c would be out-triplets. One can argue that for a cyclic triple (a, b, c) ∈ C and the set of trees T ((a, b, c)), an optimal consensus tree can contain 4|W | of the 6|W | possible in-triplets,  plus at most half of the 6m|W | n−2 + 2(n − 2) possible out-triplets. The arguments are 2 3 Isomorphism preserving labels and the root node. M. Lafond and C. Scornavacca 23:15 essentially the same as the ones given in the hardness proof of WQC, and so we omit the details. I Theorem 11. The Weighted Triplet Consensus problem is NP-hard. B B.1 Deferred proofs Proof of Lemma 3 Despite the Lemma 3 statement being quite intuitive, it requires a surprising amount of care. We start by a simple proposition that will be needed. I Proposition B.1. Let X, Y be two non-empty sets such that Y 6⊆ X. Then |X| · |Y \ X| ≥ |Y | − 1. Proof. Suppose first that X ∩ Y = ∅. Then clearly |X||Y \ X| = |X||Y | ≥ |Y | − 1. Suppose otherwise that X ∩Y 6= ∅, and denote X 0 = X ∩Y . Then |Y \X| = |Y |−|X 0 | and since Y 6⊆ X, we must have |Y | ≥ |X 0 | + 1. We also have |X||Y \ X| = |X|(|Y | − |X 0 |) ≥ |X 0 |(|Y | − |X 0 |); we claim the latter term to be at least |Y | − 1. Let us assume for contradiction that |X 0 |(|Y | − |X 0 |) < |Y | − 1. If |X 0 | = 1, this is clearly impossible, so assume |X 0 | > 1. 0 2 | −1 0 Then we get |X 0 ||Y | − |Y | < |X 0 |2 − 1 leading to |Y | < |X |X 0 |−1 = |X | + 1, contradicting 0 |Y | ≥ |X | + 1. J Before proceeding, we must introduce the notion of a rooted subtree of a binary unrooted tree T . Note that by removing an edge e = {u, v} of T , we obtain two disjoint rooted subtrees T1 and T2 , respectively rooted at u and v. Call T 0 a rooted subtree of T if T 0 is a rooted tree that can be obtained by removing an edge of T . For X ⊂ L(T ), a rooted subtree for X is a rooted subtree T 0 of T such that X ⊆ L(T 0 ). We denote by T [X] the rooted subtree for X that contains a minimum number of leaves (if there are multiple choices, choose T [X] arbitrarily among the possible choices). Note that T [X] may contain leaves other than X. We now prove that any optimal solution to T as constructed in our reduction must be a (W, Z)-augmented caterpillar. Suppose that M is an optimal solution for T , and that M is not a (W, Z)-augmented caterpillar. Denote MW = M [L(W )] and MZ = M [L(Z)]. If M is a (W 0 , Z 0 )-augmented caterpillar (W 0 |T1 | . . . |Tk |Z 0 ) for some trees W 0 , Z 0 with L(W 0 ) = L(W ) and L(Z 0 ) = L(Z), it is not hard to see that M 0 = (W |T1 | . . . |Tk |Z) is a better solution than M , a contradiction. Thus, M is not such a caterpillar, and this implies that either L(MW ) 6= L(W ) or L(MZ ) 6= L(Z) (or both). That is, the rooted subtrees containing L(W ) and/or L(Z) have “outsider” leaves. Suppose first that L(MW ) 6= L(W ) holds. Then there exists a node x with children xl and xr in MW such that all leaves Xl below xl are in L(W ) with L(W ) 6⊆ Xl (otherwise MW = M [L(W )] would be chosen incorrectly), and no leaf Xr below xr belongs to L(W ) (this can be seen by observing that the minimal node x of MW having leaves both in W and not in W has this property). We claim that L(Z) 6⊆ Xr . Suppose otherwise that L(Z) ⊆ Xr . Then |Xr | ≥ |Z| and so |MW | ≥ |W | + |Z|. However in M , by removing the xxr edge we obtain two rooted trees, one of which is a rooted subtree for L(W ). Moreover, this subtree has at most |W | + |S| < |W | + |Z| leaves, which contradicts the minimality of MW = M [L(W )]. We deduce that L(Z) is not a subset of Xr . Now, observe that M contains the quartet w1 y|w2 z for each w1 ∈ Xl , y ∈ Xr , w2 ∈ L(W )\ Xl , z ∈ L(Z) \ Xr . There are at least |Xl ||Xr |(|L(W ) \ Xl |)(|L(Z) \ Xr |) ≥ (|W | − 1)(|Z| − 1) such quartets (the inequality is obtained by applying Proposition B.1 to |Xl | · |L(W ) \ Xl | and |Xr | · |L(Z) \ Z|). Moreover, each input tree of T contains the quartet w1 w2 |yz instead, CPM 2017 23:16 On the Weighted Quartet Consensus problem and hence in total in T there are at least 6m(|W | − 1)(|Z| − 1) quartets of the form w1 w2 |yz that M does not contain. In the same manner, if the case L(MZ ) 6= L(Z) holds, then there are at least 6m(|W | − 1)(|Z| − 1) quartets of the form z1 z2 |yw that M does not contain, where here z1 , z2 ∈ L(Z), y ∈ / L(Z), w ∈ L(W ). U Now, let ρ(M ) be the number of quartets that M contains from T ∈T Q(T ) that have the form wx|yz, where w ∈ L(W ), z ∈ L(Z), x, y ∈ S. Formally, X ρ(M ) = f (wx|yz) wx|yz∈Q(M ) x,y∈S w∈L(W ) z∈L(Z) where f (wx|yz) denotes the number of trees of T that contain the wx|yz quartet. For a given u ∈ L(W ) ∪ L(Z), let ρ(M, u) denote the number of quartets counted in ρ(M ) that contain u. Formally, if w ∈ L(W ), we have ρ(M, w) = X f (wx|yz) wx|yz∈Q(M ) x,y∈S z∈L(Z) The definition of ρ(M, z) is the same for z ∈ L(Z), except that z gets fixed instead P P of w in the summation. Notice that ρ(M ) = w∈L(W ) ρ(M, w) = z∈L(Z) ρ(M, z). Let w∗ = arg maxw∈L(W ) {ρ(M, w)}. We obtain an alternative solution M 0 from M in the following manner: remove all leaves of L(W ) \ {w∗ } from M , delete the degree 2 nodes, and replace w∗ by the W tree. Note that if w∗ x|yz is a quartet of M , then wx|yz is a quartet of M 0 for all w ∈ L(W ), and so ρ(M 0 , w) ≥ ρ(M, w) for all such w by the choice of w∗ . Consequently, ρ(M 0 ) ≥ ρ(M ). We repeat the same operation on M 0 for the Z tree and obtain our final tree M ∗ . That is, we find z ∗ = arg maxz∈L(Z) {ρ(M 0 , z)}, and replace z ∗ by the Z tree. As above, we obtain ρ(M ∗ ) ≥ ρ(M 0 ). Since M ∗ has W and Z as rooted subtrees, it follows that M ∗ is a (W, Z)-augmented caterpillar. We argue that M ∗ contains more quartets from the input trees than M . First observe that the quartets on which M and M ∗ differ must contain a member of L(W ) ∪ L(Z), since U only these leaves switched position. The tree M ∗ contains every quartet of T ∈T Q(T ) that have at least two members of L(W ), or two members of L(Z). This includes the aforementioned (at least) 6m(|W | − 1)(|Z| − 1) quartets of the form w1 w2 |yz or z1 z2 |yw that M does not contain. As for the quartets that contain one member of L(W ) and one U member of L(Z), M ∗ contains at least as many such quartets as M since in T ∈T Q(T ), these quartets are all of the form wx|yz, and we have ρ(M ∗ ) ≥ ρ(M ). Finally, each tree of T has at most (|W | + |Z|)n3 quartets that have exactly one member of L(W ) ∪ L(Z). Thus at most 6m(|W | + |Z|)n3 quartets of this type are contained by M and not contained by M ∗ , but since this is smaller than 6m(|W | − 1)(|Z| − 1) for our choice of |W | and |Z|, M ∗ contains more quartets from the input than M . B.2 Proofs of Section 4 Conjecture 1 is disproved by Theorem 12, and Conjecture 3 by Theorem 13, which implies that Conjectures 2 and 4 are also false; finally Conjecture 5 is disproved by Theorem 14. I Theorem 12. There exists an instance of WQC such that every optimal solution contains none of the strictly dominant quartets. M. Lafond and C. Scornavacca c b a e ⇥2 c a d e ⇥9 b d d e a d e ⇥3 a b c e b a c b b c e c ⇥1 a d ⇥4 d e d e ⇥8 c ⇥2 b e ⇥5 d b e b a c a d ⇥2 a e 23:17 c a d d b ⇥4 c b a ⇥4 c Figure 1 An instance of WQC such that the optimal solution (the third tree on the first row) contains no strictly dominant quartet. The numbers correspond to the number of times that each tree appears in the input. b d c h c f g g e d a f a e b g h h d g a h c c d c f e b f a b e f b a e g h d Figure 2 The first four trees form an instance of WQC in which every tree contains ab|cd. The rightmost tree is the unique optimal solution to the WQC instance (every possible solution was verified computationally). Figure 1 shows an instance of WQC demonstrating Theorem 12. In this instance, for every quadset S, there is a strictly dominant quartet appearing 17 times, whereas the second-most and third-most quartets appear in 16 and 11 trees, respectively. For example, f (ac|bd) = 17, f (ad|bc) = 16 and f (ab|cd) = 11. One can check that the best tree is the third one on the top row (the ae|bc with d grafted on the middle branch). Call this tree T ∗ . For every quadset S, T ∗ contains the second-most frequent quartet on S. The reason why T ∗ is optimal is that, in the particular instance of Figure 1, any other tree T that contains a strictly dominant quartet for some quadset S must also contain a least frequent quartet on some other quadset S 0 . Hence, as there are 5 quadsets, T contains at most 4 · 17 + 11 = 79 quartets from the input, whereas T ∗ contains 5 · 16 = 80. Note that this example consists of trees on only 5 leaves. We do not know if such instances exist for any n > 5 leaves. I Theorem 13. There exists an instance of WQC such that there is a quartet q that appears in every input tree, but q is not a quartet of any optimal solution. Figure 2 shows an instance of WQC proving Theorem 13. Each input tree contains the ab|cd quartet, whereas the optimal solution, which is unique, does not. The rightmost tree contains 180 quartets from the input multiset Q, whereas any other tree has at most 176. CPM 2017 23:18 On the Weighted Quartet Consensus problem Finally, we note that the main interest behind Conjecture 5 is the following: if it holds, in cases where the set F of strictly least-frequent quartets is complete we could tell in polynomial time – using results of [8] – whether there is a tree T ∗ that contains no quartet from F . Conjecture 5 could then lead to interesting approximations or FPT algorithms. However, least-frequent quartets cannot be excluded automatically. I Theorem 14. There exists an instance of WQC such that every optimal solution contains a strictly least-frequent quartet, even if there exists a tree T ∗ with no such quartet. The instance corresponding to Theorem 14 is obtained from the instance shown in Figure 1, by removing all occurrences of the third tree on the top row (i.e. this tree now appears 0 times instead of 3 times). The second-most frequent quartets now appear 13 times each, and so the tree T ∗ that contains all these quartets has a total weight of 5 · 13 = 65. However, there are trees with a total weight of 75, which are optimal (for instance, the tree of cardinality 9 in the figure). Each such tree contains a strictly dominant quartet, and as mentioned before, also a strictly least-frequent quartet. B.3 Proof of Theorem 8  Let N := k n4 , i.e. the total number of quartets in Q, let p be the maximum number of quartets that can be preserved from Q for compatibility, and let d be the minimum number of quartets to discard from Q in order to attain compatibility (here p and d refer to multiset cardinalities). Note that d = N − p. We show that taking the best tree between the one obtained from the factor α algorithm for WMQI and the one obtained from the “randomtree-algorithm” achieves a factor β for WQC. Suppose first that p ≤ N/(3β). By Lemma 7, the “random-tree-algorithm” yields a tree containing at least |Q|/3 = N/3 quartets from Q, and since N/3 = βN/(3β) ≥ βp, it yields a solution to WQC within a factor β from optimal. Thus we may assume that p > N/(3β) = N (3α − 2)/(3α). Since we have an α approximation for WMQI, we may obtain a solution discarding at most αd = α(N − p) quartets. This solution preserves at least N − (α(N − p)) = αp + (1 − α)N quartets from Q. We claim that this attains a factor β approximation. Suppose instead that αp + (1 − α)N < βp. Then p < (α − 1)N/(α − β) which, with a little work, yields p < N (3α − 2)/(3α), contradicting our assumption on p. Thus, the WMQI approximation preserves at least βp quartets.
8cs.DS
1 Riding on the Primary: A New Spectrum Sharing Paradigm for Wireless-Powered IoT Devices arXiv:1801.06679v1 [cs.IT] 20 Jan 2018 Xin Kang, Member, IEEE, Ying-Chang Liang, Fellow, IEEE, Jing Yang, Member, IEEE Abstract In this paper, a new spectrum sharing model referred to as riding on the primary (ROP) is proposed for wireless-powered IoT devices with ambient backscatter communication capabilities. The key idea of ROP is that the secondary transmitter harvests energy from the primary signal, then modulates its information bits to the primary signal, and reflects the modulated signal to the secondary receiver without violating the primary system’s interference requirement. Compared with the conventional spectrum sharing model, the secondary system in the proposed ROP not only utilizes the spectrum of the primary system but also takes advantage of the primary signal to harvest energy and to carry its information. In this paper, we investigate the performance of such a spectrum sharing system under fading channels. To be specific, we maximize the ergodic capacity of the secondary system by jointly optimizing the transmit power of the primary signal and the reflection coefficient of the secondary ambient backscatter. Different (ideal/practical) energy consumption models, different (peak/average) transmit power constraints, different types (fixed/dynamically adjustable) reflection coefficient, different primary system’s interference requirements (rate/outage) are considered. Optimal power allocation and reflection coefficient are obtained for each scenario. Index Terms X. Kang is with National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, China 611731 (E-mail: [email protected]). Y. -C. Liang is with University of Electronic Science and Technology of China, Chengdu, China 611731. He is also with School of Electrical and Information Engineering, The University of Sydney, NSW 2006, Australia. (E-Mail: [email protected]). J. Yang is with Singapore PowerGrid, Singapore Power Group, 2 Kallang Sector, Singapore 349277. (E-mail: [email protected]). Part of this paper has been presented in [1] at IEEE ICC 2017. 2 Cognitive radio, spectrum sharing, backscatter communication, IoT, wireless-powered network, energy harvesting, ergodic capacity, power allocation, optimization. I. I NTRODUCTION Internet of Things (IoT) is a key application scenario of the fifth generation (5G) mobile communication systems. It covers a wide range of use cases, such as smart home, smart wearables, smart farming, smart manufacturing, smart utilities, and smart city, which enable new business opportunities and new operational considerations for 5G. With the diverse use cases anticipated in IoT, the types of IoT devices are expected to diversified, and the characteristics and demands of different IoT devices are expected to vary a lot. Some of the devices, such as sensors and Radio-Frequency Identification (RFID) tags, are expected to be simple, small, low power, low throughput field devices. For this kind of IoT devices, a key requirement from the industry [2] is that the power consumption should be very low and the battery life should be as long as ten years for extreme use cases. In these situations, energy harvesting, with potential to provide a perpetual power supply, becomes an attractive approach to prolong these devices’ battery lifetime. Classic sources for energy harvesting include solar and wind. Recently, ambient radio signal [3]-[6] is receiving much research attention as a new viable source for energy harvesting, supported by the advantage that the wireless signals can carry both energy and information. The backscatter communications technology used in RFID systems is a real-world application of energy harvesting from RF signals. In a typical backscatter system [7], [8], the reader transmits a RF sinusoidal signal to a passive tag. The passive tag harvests RF energy from the signal to power its circuit, modulates its information bits onto the received sinusoidal signal by intentionally changing its amplitude and/or phase which is realized by changing its antenna impedance, and reflects the modulated signal back to the reader. In [9], ambient backscatter, which is able to harvest energy from and transmits information over the ambient RF signals (e.g. TV signals), was proposed. In [10], Wi-Fi backscatter that uses the existing Wi-Fi infrastructure to provide internet connectivity for RF-powered devices was proposed. In [11] and [12], maximumlikelihood detection was studied for an ambient backscatter system in which the tag adopts differential modulation. In [13], the modulator and the decoder design for backscattering over the ambient orthogonal frequency division multiplexing (OFDM) signals was studied. It was shown in recent work [14] and [15] that power harvested from ambient RF signals is sufficient to support the daily communication of a battery-less sensor through dedicated decoder and signal 3 design. In [16], it was further shown a network architecture with combined wireless power transfer and backscattering communication technology is able to a large and dense IoT network. However, these aforementioned works mainly focus on the hardware and decoder design but lacks fundamental system analysis from theoretical aspects. Besides, the mutual influence (such as the interference) between the backscatter system and the primary system are not considered. In this paper, we introduce the ambient backscatter communication technology to the cognitive radio (CR) system, and propose a new spectrum sharing model based on that. The proposed spectrum sharing model applies to CR systems with conventional primary communication systems and ambient-backscatter-based secondary systems. The key idea is that the secondary transmitter harvests energy from the primary signal, then modulates its information bits to the primary signal, and reflects the modulated signal to the secondary receiver without violating the primary system’s interference requirement [17]. The main contribution of this paper is summarized as follows: • We propose a new spectrum sharing model as Riding on the Primary (ROP). The differences between the proposed ROP and the existing technologies are as follows: (i) Compared with conventional backscatter communication systems, the reader (secondary receiver) in our system does not need to generate and transmit a RF sinusoidal signal, which can reduce its power consumption and prolongs its battery life. (ii) Compared with ambient backscatter communication systems, the interference from the wireless-powered tag (secondary transmitter) to the primary system is taken into consideration when designing the system. (iii) Compared with conventional spectrum sharing systems, the secondary system not only utilizes the spectrum of the primary system but also takes advantage of the primary system’s signal transmission to carry its information. • We investigate the performance of the proposed ROP system under fading channels. To be specific, we maximize the ergodic capacity of the secondary system by jointly optimizing the transmit power of the primary signal and the reflection coefficient of the secondary ambient backscatter. Different (ideal/practical) energy consumption models, different (peak/average) transmit power constraints, different types (fixed/dynamically adjustable) reflection coefficient, different primary system’s interference requirements (rate/outage) are considered. Optimal power allocation and optimal reflection coefficient are obtained for each case. It is worth pointing out that certain degree of cooperation is needed between the primary and secondary system in order to do the joint optimization. For example, the primary system needs the knowledge of the secondary system (e.g., channel information) to optimize the 4 PT PR ST SR Fig. 1. System Model transmit power, whereas the secondary system needs the knowledge of the primary system to optimize the reflection coefficient. • We show by numerical examples that dynamically adjustable reflection coefficient will result in a better system performance than a fixed reflection coefficient. The system performance under the average transmit power constraint is in general better than that under the peak transmit power constraint. Applying the primary transmission outage probability constraint to protect the primary system usually leads to a higher secondary ergodic capacity than adopting the primary transmission rate constraint. All these findings can serve as the guidance for designing high-performance practical ROP system. The rest of this paper is organized as follows. Section II introduces the system model of the proposed ROP spectrum sharing system. Section III presents the basic problem formulation. Section IV investigates the capacity maximization problem under the practical energy consumption model. Section V studies the capacity maximization problem for fixed reflection coefficient and average transmit power constraint. Section VI considers the capacity maximization problem under the primary transmission outage constraint. Then, numerical results are given in Section VII to verify the proposed studies. Finally, Section VIII concludes the paper. II. S YSTEM M ODEL A. Channel Model In this paper, we consider a spectrum sharing communication system consists of a primary communication pair and a secondary transmission pair. The primary communication pair is a 5 conventional communication system consisting of a RF source (e.g. Base Stations, TV towers, WiFi APs) and a receiver (e.g., cell phones, TV receivers). The secondary communication pair is an ambient backscatter communication system which consists of a wireless-powered passive tag and a battery-powered reader. For ease of explanation, we denote the RF source and the receiver of the primary system as the primary transmitter (PT) and the primary receiver (PR), respectively. The wireless-powered tag and the reader of the backscatter system are denoted as secondary transmitter (ST) and secondary receiver (SR), respectively. In this paper, we consider the block fading channel model [17], where the channel coefficients remain the same for each block but may change from one block to another. As shown in Fig. 1, the channel power gains for the fading block n, from the PT to the PR, from the ST to the SR are denoted by h1 (n) and g1 (n), respectively. The channel power gains for cross channels for fading block n, i.e., from the PT to the ST, from the PT to the SR, and from the ST to the PR, are denoted by f (n), h2 (n) and g2 (n), respectively. B. Transmission Model Transmitted signal at the PT. Let s(n; k) denote the transmitted signal of the PT at kth symbol of the nth block where |s(n; k)|2 = 1, and p(n) denote the transmit power for fading block n. Then, the transmitted signal of the PT for the kth symbol of block n is given by xP T (n; k) = p p(n)s(n; k), ∀k. (1) Transmitted signal at the ST. In fading block n, the signal received at the ST from the PT p is f (n)xP T (n; k). Note that the noise at the ST (Tag) is neglected as [9], [10], [11], [12], [14], [18] since the on-tag integrated circuit only includes passive components. The power of the received signal at the ST from the PT is f (n)p(n). Part energy of the received signal is absorbed by the ST to power its circuit operation. The remaining part of the received signal is modified and backscattered to the reader. For convenience, we refer to this splitting factor as the reflection coefficient, and denote it by α(n) where 0 ≤ α(n) ≤ 1. Then, the energy of the transmitted signal of the ST can be denoted as α(n)f (n)p(n). Let c(n; k) where |c(n; k)|2 = 1 denote the ST’s own signal, then the transmitted signal of the ST for the kth symbol of block n is given by xST (n; k) = p p p α(n) f (n) p(n)s(n; k)c(n; k), ∀k. (2) 6 Note that we assume there is no signal processing delay of the backscatter circuit, i.e., there is no time delay between the transmitted signal and the received signal of the ST. This assumption is widely used in backscatter communication research literatures [9]-[13]. Received signal at the PR. Let yP R (n; k) denote the received signal at the PR for the kth symbol of block n, then we have yP R (n; k) = + p p h1 (n)xP T (n; k) g2 (n)xST (n; k) + NP R (n; k), ∀k, (3) where NP R (n; k) denotes the Gaussian receiving noise at the PR with zero mean and variance σP2 R . Then, the instantaneous received signal-to-interference-plus-noise ratio (SINR) at the PR for block n denoted by γP R (n) is given by γP R (n) = h1 (n)p(n) . g2 (n)α(n)f (n)p(n) + σP2 R (4) Received signal at the SR. Let ySR (n; k) denote the received signal at the SR for the kth symbol of block n, then we have p g1 (n)xST (n; k) p + h2 (n)xP T (n; k) + NSR (n; k), ∀k, ySR(n; k) = (5) where NSR (n; k) denotes the Gaussian receiving noise at the SR with zero mean and variance 2 σSR . In this paper, we assume that SR decodes the received signal by performing successive interference cancellation (SIC). SIC is a well-known physical layer technique [19], [20]. Briefly, SIC is the ability of a receiver to receive two or more signals concurrently. The SIC receiver decodes the stronger signal first, subtracts it from the combined signal, and extracts the weaker one from the residue. For the system setup considered in this paper, the secondary system is an ambient backscatter system. The strength of the signal received from the ST is in general much lower than that received from the PT (e.g., TV/WiFi signals). Thus, the SIC procedure at the SR is decoding the primary signal first and then subtracting it from the received signal before decoding its own signal. Thus, the instantaneous received SNR at the SR for the block n denoted by γSR (n) is given by γSR (n) = g1 (n)α(n)f (n)p(n) . 2 σSR (6) Note that we assume that the SR performs SIC decoding while the PR does not. This is due the fact that SIC needs to decode the stronger signal first. As mentioned above, the strength of 7 the signal received from the ST is in general much lower than that received from the PT. Thus, SIC is not applicable at the PR. III. E RGODIC C APACITY M AXIMIZATION Under the system model given in Section II, the ergodic capacity of the secondary system can be written as CSR    g1 (n)α(n)f (n)p(n) , = E log2 1 + 2 σSR (7) where E [·] denotes the statistic expectation, and it is taken over the joint fading states of the fading block n. In this paper, our objective is to maximize the ergodic capacity CSR of the secondary system while guaranteing the performance of the primary system. In the following, we introduce the constraints that need to be considered when optimizing this network. PT’s transmit power constraint. Let Ppk denote the maximum transmit power of the PT, then the peak transmit power constraint can be written as 0 ≤ p(n) ≤ Ppk , ∀n. (8) The reflection coefficient constraint. Since the tag is a passive device, thus the energy harvested and reflected from the tag must be equal to the energy received from the primary signal. Thus, the reflection coefficient must satisfy the following constraint 0 ≤ α(n) ≤ 1, ∀n. (9) PR’s rate constraint. To guarantee the quality of service (QoS) of the primary system, we assume that there is a minimum rate requirement, which can be written as   h1 (n)p(n) ≥ γ, ∀n. log2 1 + g2 (n)α(n)f (n)p(n) + σP2 R (10) where γ is the minimum rate of the primary system. Tag’s (ST’s) circuit operation power requirement. As aforementioned, the ST harvests energy from the primary signal to power its circuit operation. Let ǫST be the minimum power that the ST needs to support its circuit operation, then the following constraint must be satisfied in order for the ST to work, i.e., ηST (1 − α(n))f (n)p(n) ≥ ǫST , ∀n. where ηST is the energy harvesting efficiency coefficient. (11) 8 In this paper, the objective is to optimize the performance of such a spectrum sharing system by jointly optimizing the transmit power p(n) of the PT and the reflection coefficient α(n) of the ST. The problems can be formulated as P1: Max {p(n), α(n)} CSR , s.t. (8), (9), (10), (11). (12) (13) For notation convenience, the fading block number n is dropped from now on. P1 is not a convex optimization problem. A problem is a convex optimization problem if its objective function is either convex or concave, and its feasible set is a convex set. For P1, its objective function is neither convex nor concave. This can be verified by looking at its Hessian matrix (A function is convex if its Hessian matrix is positive semi-definite). According to the composition rule given in [21], for P1, we can determine the convexity of the objective function by investigating the convexity of α ∗ p. The Hessian matrix of α ∗ p is [0 1; 1 0], which is not positive semi-definite. Thus, P1 is not a convex optimization problem, and the conventional convex optimization techniques can not be applied to solve P1. To solve P1, we first introduce the following Lemma. Lemma 1. The largest α that makes P1 feasible, denoted by αL , is given by      ǫST h1 σP2 R 1 , 1− , − αL = max 0,min g2 f 2γ −1 Ppk ηST f Ppk (14) Proof. The constraint (10) can be rewritten as α≤ h1 σP2 R − . (2γ − 1)g2 f g2 f p (15) It is observed that the right hand side of (15) is an increasing function of p. Besides, due to the fact that 0 ≤ p ≤ Ppk , the largest α denoted by αL1 satisfies (15) is αL1 = h1 σP2 R . − (2γ − 1)g2 f g2 f Ppk (16) Similarly, the constraint (11) can be rewritten as α≤1− ǫST . ηST pf (17) The right hand side of (17) is an increasing function of p. Besides, due to the fact that 0 ≤ p ≤ Ppk , the largest α denoted by αL2 satisfies (17) is αL2 = 1 − ǫST . ηST f Ppk (18) 9 Thus, the largest α that satisfies both (15) and (17) is given by min{αL1 , αL2 }. Combining with the fact that 0 ≤ α ≤ 1, Lemma 1 follows. Theorem 1. The optimal solution of P1 is given by p∗ = Ppk , (19) α ∗ = αL , (20) where αL is given by (14). Proof. First, it is observed from P1 that all the constraints are instantaneous constraints. Thus, maximizing the ergodic capacity is equivalent to maximizing the instantaneous transmission   g1 αf p . For any given α in the feasible region, the instantaneous rate is a rate, i.e., log2 1 + σ2 SR monotonically increasing function with respect to p, and it attains the maximum value when p = Ppk . It is observed that for any given feasible p, the instantaneous rate is a monotonically increasing function with respect to α. Thus, α should be chosen as the largest α that makes P1 feasible, i.e., αL given by (14), and it is shown in the proof of Lemma 1 that αL is obtained when p = Ppk . Thus, it is clear that P1 is maximized when p∗ = Ppk and α∗ = αL . IV. P RACTICAL E NERGY C ONSUMPTION M ODEL In this section, we consider a more practical energy consumption model of the ST’s backscatter circuit, which is ηST (1 − α(n))f (n)p(n) ≥ ǫb + ǫs (rST (n)) , (21) where ǫb denotes the static energy consumption when the circuit is on, and ǫs (rST (n)) denotes the dynamic energy consumption which is a function of its transmission rate. In practice, the dynamic energy consumption is in general proportional to the transmission rate. This is due to the following fact. The backscatter transmitter maps its bit sequence to RF waveforms by adjusting the load impedance of the antenna. The backscatter can control the rate at which it will generate the modulation symbols by controlling the switching frequencies on the SPDT (single pole double throw) switches [14]. In general, to achieve a higher data rate, the backscatter needs a higher frequency operation on the switches, which will cost more energy. Thus, we model   (n)p(n) , where u is a the dynamic energy consumption by ǫs (rST (n)) = u log2 1 + g1 (n)α(n)f σ2 SR constant conversion parameter that relates the transmission rate with the energy consumption. In 10 this section, under this energy consumption model, we re-investigate the optimization problem for this spectrum sharing system. P2: Max {p(n), α(n)} CSR , s.t. (8), (9), (10), (21). (22) (23) The constraint (21) is a hyper-function with respect to α and p, which makes the problem difficult to solve. Thus, to solve P2, we first present the following two propositions. Proposition 1. Let α̂ denote the largest α that satisfies the constraint (21) for a given p, then α̂ can be obtained by solving the following equation:   g1 α̂f p ηST (1 − α̂)f p = ǫb + u log2 1 + 2 . σSR (24) Proof. It is observed that the left hand side of (21) (i.e., ηST (1 − α)f p) is a monotonically   g1 αf p ) decreasing function with respect to α, while the right hand side of (21) (ǫb + u log2 1 + σ2 SR is a monotonically increasing function with respect to α. Thus, it is easy to observe that the largest α is the intersection point of two curves, which is the solution of (24). Proposition 1 is thus proved. Proposition 2. Let αB1 and αB2 be the solution of (24) when p = p1 and p = p2 , respectively. Then, we have αB1 p1 < αB2 p2 , if p1 < p2 . (25) Proof. Since αB1 and αB2 be the solution of (24) when p = p1 and p = p2 , respectively. We have   g1 αB1 f p1 ηST (1 − αB1 )f p1 = ǫb + u log2 1 + . 2 σSR (26)   g1 αB2 f p2 . ηST (1 − αB2 )f p2 = ǫb + u log2 1 + 2 σSR (27) Then, using (27) to minus (26), we have   2 g1 f αB2 p2 + σSR . ηST f (p2 −p1+ αB1 p1 −αB2 p2 ) = u log2 2 g1 f αB1 p1 + σSR (28) Then, in the following, we prove Proposition 2 by contradiction. Assume αB1 p1 ≥ αB2 p2 when p1 < p2 . Then, under this presumption, it is clear that the left hand side of (28) is strictly 11 positive, while the right hand side of (28) is zero or negative. This contradicts with the fact that the left hand side of (28) should be equal to the right hand side of (28). Thus, our presumption does not hold. Thus, it follows that αB1 p1 < αB2 p2 , if p1 < p2 . Proposition 2 is thus proved. However, unlike P1, we cannot further prove αB1 < αB2 , if p1 < p2 . Thus, the approach used to solve P1 can not be applied here. Thus, to solve P2, we first consider the following problem, which is P2a: Max CSR , (29) {p, α} s.t. (8), (9), (21). (30) Let αB and αpk be the solution of (24) when p = PB and p = Ppk , respectively. Then, from Proposition 2, it follows αB PB < αpk Ppk , ∀PB < Ppk . Since the objective function is an increasing function with respect to αp, it is clear that the objective function attains its maximum value at αpk Ppk . Thus, the optimal solution of P2a can be obtained as p∗ = Ppk , (31) α∗ = αpk , (32) Now, we return to P2. It is clear that the constraint (10) can be rewritten as α ≤ σ2 h1 − g2PfRp . (2γ −1)g2 f It is observed that its right hand side is an increasing function of p. Besides, due to the fact that 0 ≤ p ≤ Ppk , the largest α satisfying α ≤ αM = h1 (2γ −1)g2 f − 2 σP R g2 f p denoted by αM is h1 σP2 R − . (2γ − 1)g2 f g2 f Ppk (33) Based on these results, we are now able to solve P2, and the solution is summarized in the following theorem. Theorem 2. The optimal solution of P2 is given by p∗ = Ppk , (34) α∗ = min {αM , αpk } (35) where αM is given by (33), and αpk is the solution of (24) when p = Ppk . Proof. To prove Theorem 2, we consider the following two cases. 12 Case 1: αpk ≤ αM . In this case, the optimal solution of P2 is the same as that of P3a, which is α∗ = αpk and p∗ = Ppk . Case 2: αpk > αM . In this case, the optimal α∗ must satisfy the condition 0 ≤ α∗ ≤ αM . Now, we look at the following equation, ηST (1 − αpk )f Ppk   g1 αpk f Ppk . = ǫb + u log2 1 + 2 σSR (36) The above equation comes from the fact that αpk is the solution of (24) when p = Ppk . Since αpk > αM , thus if we replace αpk with αM , the left hand side of (36) will increase, while the right hand side of (36) will decrease. Thus, it follows   g1 αM f Ppk , ηST (1 −αM )f Ppk ≥ ǫb + u log2 1 + 2 σSR (37) which indicates αM and Ppk is a feasible solution of P2. Since αM is the largest feasible α∗ and Ppk is the largest feasible p∗ , thus the optimal solution is α∗ = αM and p∗ = Ppk . Summarizing the above results, Theorem 2 follows. V. F IXED R EFLECTION C OEFFICIENT AND AVERAGE T RANSMIT P OWER C ONSTRAINT Fixed Reflection Coefficient. In practice, for the purpose of circuit design simplicity, the reflection coefficient of the tag is designed to be fixed, i.e., the reflection cannot be dynamically changed in each fading block. To capture this fact, we introduce the following constraint α(n) = α, ∀n. (38) Average transmit power constraint. In practice, there is always a long-term power budget of the PT, and an average power constraint usually applies, which can be written as E [p(n)] ≤ Pav , (39) where the statistic expectation is taken over the joint fading states of the fading block. In the following subsections, we reinvestigate P1 and P2 under the above two practical constraints. A. Ideal Energy Consumption Model P3: Max {p(n), α(n)} CSR , s.t. (9), (10), (11), (38), (39). (40) (41) 13 The objective function of P3 is the same as P1, and thus it is easy to verify that P3 is not a convex optimization problem. Therefore, it cannot be solved directly using convex optimization techniques. Thus, for solving P3, we first consider P3 under a given α = ᾱ. For given ᾱ, P3 can be rewritten as P3a: Max {p(n)≥0}    g1 (n)ᾱf (n)p(n) , E log2 1 + 2 σSR s.t. E[p(n)] ≤ Pav ,   h1 (n)p(n) log2 1 + ≥ γ, g2 (n)ᾱf (n)p(n) + σP2 R ǫST − ηST (1 − ᾱ)f (n)p(n) ≤ 0. (42) (43) (44) (45) Note the fading block number n is dropped from now on for notation convenience. P3a is a convex optimization problem since its objective function is concave and all the constraints are affine. To solve this problem, we first at the feasibility of the problem. Note that the constraint (44) is infeasible if h1 − (2γ − 1)g2 ᾱf < 0, i.e., no matter how p is chosen, (44) cannot be satisfied for such fading block. Thus, to save power, the optimal power allocation for such fading block is p∗ = 0. When feasible, it can be shown that constraints (44) and (45) can be rewritten as p ≥ 2 (2γ −1) σP R h1 −(2γ −1)g2 ᾱf and p ≥ ǫST , ηST (1−ᾱ)f respectively. Thus, (44) and (45) can be replaced by the following constraint p ≥ Pm , (46) where  σP2 R (2γ −1) ǫST Pm , max . , h1 −(2γ −1)g2 ᾱf ηST (1 − ᾱ)f Theorem 3. The optimal solution of P3a is given by    0, if λ ≥ σ2g1 ᾱf ,   SR ln 2  1 ᾱf if σ2g1 ᾱf > λ > ln2 σ2 g+g , p∗ = P m , ( SR 1 ᾱf Pm ) SR ln 2    σ2 1 1 ᾱf   λ ln . − g1SR , if λ ≤ ln2 σ2 g+g 2 ᾱf ( SR 1 ᾱf Pm ) where λ can be obtained by solving E [p∗ ] = Pav , and Pm is given by (47).  (47) (48) Proof. By introducing the dual variable associated with the average transmit power constraint, the partial Lagrangian of P3a problem is expressed as    g1 ᾱf p − λ (E[p] − Pav ) , L (p, λ) = E log2 1 + 2 σSR (49) 14 where λ is nonnegative Lagrange dual variable associated with constraints (43). Let A denote the set of {p ≥ Pm }. The dual function is then expressed as q(λ) = maxp∈A L (p, λ) . The Lagrange dual problem is then defined as minλ≥0 q(λ). The duality gap is zero for the convex optimization problem addressed here, and thus solving its dual problem is equivalent to solving the original problem. The duality gap is zero if and only if strong duality holds. If the primal problem is convex and satisfies the Slaters condition [21], then strong duality holds. The Slater’s condition reduces to feasibility when the constraints are all linear equalities and inequalities [21]. P3a is a convex problem and all its constraints are linear inequalities. It also can be verified that P3a is feasible under our constraints. Thus, the duality gap is zero for P3a. Therefore, according to the Karush-Kuhn-Tucker (KKT) conditions, the optimal solutions needs to satisfy the following equations: λ∗ (E[p∗ ] − Pav ) = 0, (50) λ∗ ≥ 0, E[p∗ ] − Pav ≤ 0, (51) For a fixed λ, by dual decomposition, the dual function can be decomposed into a series of similar sub-dual-functions each for one fading state. For a particular fading state, the problem can be shown equivalent to P3b: Max log2 {p≥0}  g1 ᾱf p 1+ 2 σSR  − λp, s.t. p ≥ Pm , (52) (53) It is easy to observe that the optimal solution of this subproblem is p∗ = +∞ if λ = 0. Thus, in the following, we consider the optimal solution of this subproblem under the condition that λ 6= 0. The Lagrangian of this subproblem is   g1 ᾱf p Lsub (p, µ) = log2 1 + 2 − λp − µ (Pm − p) + νp, σSR (54) where µ and ν are nonnegative Lagrange dual variables associated with the constraints p ≥ Pm and p ≥ 0, respectively. Since the problem is convex, KKT conditions are sufficient to obtain 15 its optimal solution. Thus, in the following, we investigate its KKT conditions: g1 ᾱf ∂L (p∗ , µ∗ ) = −λ + µ∗ + ν ∗ = 0, 2 ∂p∗ ln2 (σSR + g1 ᾱf p∗ ) (55) µ∗ (p∗ − Pm ) = 0, (56) ν ∗ p∗ = 0, (57) p∗ − Pm ≥ 0, (58) p∗ ≥ 0, µ∗ ≥ 0, ν ∗ ≥ 0. (59) Now, we derive the optimal solution by solving these KKT conditions. To solve these KKT conditions, we consider the following two cases: • Case 1: µ∗ > 0, ν ∗ = 0. For this case, it follows from (56) that p∗ = P m . Then, based on (55), µ∗ can be obtained by solving (60) holds only when λ − • g1 ᾱf 2 +g ᾱf P ln2(σSR m) 1 (60) g1 ᾱf 2 +g ᾱf P ln2(σSR m) 1 − λ + µ∗ = 0. Thus, > 0. Case 2: µ∗ > 0, ν ∗ > 0. In this case, it follows from (56) that p∗ = Pm . However, it follows from (57) that p∗ = 0. Thus, by contradictory, this case cannot happen. • Case 3: µ∗ = 0, ν ∗ = 0. For this case, it follows from (55) that p∗ = σ2 1 − SR . λ ln 2 g1 ᾱf (61) Then, taking (58) into consideration, (62) holds only when • g1 ᾱf 2 +g ᾱf P ln2(σSR m) 1 ∗ 1 λ ln 2 − 2 σSR g1 ᾱf ≥ Pm , i.e., λ − ≤ 0. Case 4: µ = 0, ν ∗ > 0. It follows from (57) that p∗ = 0. Then, based on (55), ν ∗ can be obtained by solving only when λ − g1 ᾱf 2 ln 2 σSR (62) g1 ᾱf 2 ln 2 σSR − λ + ν ∗ = 0. Thus, (62) holds > 0. Thus, combining the results obtained in Case 1 to 4, the optimal solution for the subproblem can be summarized as (48). Now, we have to find the optimal λ∗ . As aforementioned, λ∗ has to satisfy (87) and (89). It is observed that if λ∗ = 0, the optimal solution for the subproblem is p∗ = +∞. This definitely violates the constraint E[p∗ ] ≤ Pav . Thus, it follows that λ∗ 6= 0. Then, according to the constraint λ∗ (E[p∗ ] − Pav ) = 0, it follows that the optimal λ∗ must satisfy E[p∗ ] = Pav . Theorem 2 is thus proved. 16 With the optimal solution of P3a given in Theorem 3, the optimal solution of P3 can be obtained by performing a one-dimension search for α over the space [0, 1]. B. Practical Energy Consumption Model P4: Max {p(n), α(n)} CSR , (63) s.t. (9), (10), (21), (38), (39). (64) The objective function of P4 is the same as P1, and thus it is easy to verify that P4 is not a convex optimization problem. Therefore, it cannot be solved directly using convex optimization techniques. Thus, before solving P4, we first present the following proposition. Proposition 3. For a given ᾱ, the constraint (21) can be rewritten as p ≥ Pc , (65)  where Pc is the positive solution of ηST (1 − ᾱ)f Pc = ǫb + u log2 1 + g1 ᾱf Pc 2 σSR  . Proof. For the convenience of exposition, we introduce the following two functions F1 (p) ,   p . It is easy to observe that both F1 (p) and ηST (1 − ᾱ)f p and F2 (p) , ǫb + u log2 1 + gσ1 ᾱf 2 SR F2 (p) are monotonically increasing functions with respect to p, and the increasing rate of F1 (p) is larger than that of F2 (p). It is also observed that F1 (0) ≤ F2 (0). Thus, F1 (p) and F2 (p) must have a positive crossing point Pc . For any p larger than Pc , we have ηST (1 − ᾱ)f p ≥   g1 ᾱf p ǫb + u log2 1 + σ2 . Proposition 3 is thus proved. SR It can be shown that constraints (10) can be rewritten as p ≥ 2 (2γ −1) σP R . h1 −(2γ −1)g2 ᾱf Thus, (10) and (21) can be replaced by the following constraint p ≥ PL , (66) where PL , max   σP2 R (2γ −1) , Pc . h1 −(2γ −1)g2 ᾱf (67) Using the same approach as P3, for a given ᾱ, the optimal power allocation of P4 can be summarized as follows. 17 Theorem 4. For a given ᾱ, the optimal power allocation of P4 is given by    , 0, if λ ≥ σ2g1 ᾱf   SR ln 2  ᾱf if σ2g1 ᾱf > λ > ln2 σ2 g1+g , p∗ = P L , ln 2 ( 1 ᾱf PL ) SR SR   2  σSR ᾱf 1   λ ln − , if λ ≤ ln2 σ2 g1+g . 2 g1 ᾱf ( SR 1 ᾱf PL ) (68) where λ can be obtained by solving E [p∗ ] = Pav , and PL is given by (67). With the optimal solution of P4 under given ᾱ obtained in Theorem 4, the optimal solution of P4 can be obtained by performing a one-dimension search for α over the the space [0, 1]. VI. P RIMARY T RANSMISSION O UTAGE C ONSTRAINT In previous sections, we use the PR’s rate constraint to guarantee the quality of service (QoS) of the primary system, i.e., there is a minimum rate requirement that the primary transmission has to fulfil. However, this constraint is too strict. In practice, certain ratio of transmission outage is usually acceptable. Thus, in this section, we introduce the primary transmission outage constraint [22], which is mathematically defined as     h1 (n)p(n) ≤ γ ≤ ǫ, Prob log2 1 + g2 (n)α(n)f (n)p(n) + σP2 R (69) where Prob {·} denotes the probability of the event, and ǫ denotes the maximum outage probability that is acceptable by the primary system. A. Peak Transmit Power Constraint We first consider the peak transmit power constraint case. Using the primary transmission outage constraint to replace the PR’s rate constraint, and considering the fixed reflection coefficient, the problem can be formulated as P5: Max {p(n), α(n)} CSR , s.t. (8), (9), (11), (38), (69). (70) (71) The objective function of P5 is the same as P1, and thus it is easy to verify that P5x is not a convex optimization problem. Therefore, it cannot be solved directly using convex optimization techniques. We first consider P5 under a given ᾱ, i.e., α = ᾱ where ᾱ is a constant. For expression convenience, we denote the problem of P5 under a given ᾱ as P5a. 18 Theorem 5. The optimal power allocation of P5a, i.e., P5 under a given ᾱ, is given by p∗ (n) = Ppk , ∀n. (72) Proof. For a given ᾱ, the constraint (11) can be rewritten as p(n) ≥ fading block n, it is easy to observe that P5a is infeasible when ǫST . For a given ηST (1−ᾱ)f (n) ǫST > Ppk . This ηST (1−ᾱ)f (n) means that there does not exist a feasible p(n) that can satisfy the ST’s circuit operation power requirement, which indicates the secondary system does not work in this fading block. Thus, the contribution of this fading block to the secondary transmission’s ergodic capacity is zero. The interference from the secondary system to the primary system is also zero. Thus, channel inversion power allocation or the maximum transmit power should be adopted for the primary system to minimize the possibility of outage for this fading block. Therefore, for simplicity, the optimal power allocation for such a fading block can be obtained as p∗ (n) = Ppk . In the following, we consider the case that introduce the following indicator function    1, if log 1 + 2 χ=  0, otherwsie. ǫST ηST (1−ᾱ)f (n) (73) ≤ Ppk . To solve the problem, we h1 (n)p(n) 2 g2 (n)α(n)f (n)p(n)+σP R  ≤ γ, (74) For notation convenience, the fading block number n is dropped from now on. Then, it can be shown that the constraint given in (69) is equivalent to E [χ] − ǫ ≤ 0. (75) By introducing the dual variable associated with (75), the partial Lagrangian of P5 under given ᾱ can be expressed as   g1 ᾱf p − λ (E[χ] − ǫ) , L (p, λ) = E log2 1 + 2 σSR  (76) where λ is nonnegative Lagrange dual variable associated with the constraint E [χ] − ǫ ≤ 0. o n ST ≤ p ≤ P Let A denote the set of ηST ǫ(1− pk . The dual function is then expressed as ᾱ)f q(λ) = maxp∈A L (p, λ) . According to the Karush-Kuhn-Tucker (KKT) conditions, the optimal solution needs to satisfy the following equations: λ∗ (E[χ∗ ] − ǫ) = 0, (77) λ∗ ≥ 0, E[χ∗ ] − ǫ ≤ 0, (78) 19 ³ log2 1 + g1 ᾱfp 2 σSR ´ ³ log2 1 + g1 ᾱfp 2 σSR ´ − λχ(p) p= 2 (2γ −1)σP R h1 −(2γ −1)g2 αf p 0  Fig. 2. An illustration of function log2 1 + g1 ᾱf p 2 σSR  − λχ(p). For a fixed λ, by dual decomposition, the dual function can be decomposed into a series of similar sub-dual-functions each for one fading state. For a particular fading state, the problem can be shown equivalent to P5b:   g1 ᾱf p − λχ(p), Max log2 1 + 2 {p≥0} σSR ǫST , s.t. p ≥ ηST (1 − ᾱ)f p ≤ Ppk .  Since log2 1 + λ = 0. g1 ᾱf p 2 σSR  (79) (80) (81) is an increasing function, the optimal solution of P5b is p∗ = Ppk if In the following, we consider the optimal solution of this subproblem under the condition that λ 6= 0. Fisrt, it can be observed that χ(p) can be rewritten as Case 1: h1 − (2γ − 1)g2 αf ≤ 0. χ(p) = 1, ∀p. (82) 20 Case 2: h1 − (2γ − 1)g2 αf > 0.   1, χ(p) =  0, if p ≤ if p > 2 (2γ −1)σP R , h1 −(2γ −1)g2 αf γ 2 (2 −1)σP R . h1 −(2γ −1)g2 αf (83)  Let us first consider Case 1. In this case, the objective function of P5b becomes log2 1 + g1 ᾱf p 2 σSR  − λ, which is an increasing function with respect to p. Thus, the optimal solution of P5b is p∗ = Ppk . Now we consider Case 2. It is observed from (83) that χ(p) is a step function with respect to p for this case. The critical point is p = 2 (2γ −1)σP R . h1 −(2γ −1)g2 αf Thus, the objective function of P5b has a   p − form as illustrated in Fig. 2. It can be observed from Fig. 2 that the function log2 1 + gσ1 ᾱf 2 SR ∗ λχ(p) is in general an increasing function of p. Thus, the optimal solution of P5b is p = Ppk . Combining all these results, the optimal solution for P5a can be obtained as (72). Theorem 5 is thus proved. With the optimal solution of P5a (i.e, P5 under given ᾱ) obtained in Theorem 5, the optimal solution of P5 can be obtained by performing a one-dimension search for α over the space [0, 1]. B. Average Transmit Power Constraint Now, we investigate the problem under the average transmit power constraint, which is P6: Max {p(n), α(n)} CSR , s.t. (9), (11), (38), (39), (69). (84) (85) We first consider P6 under a given ᾱ, i.e., α = ᾱ where ᾱ is a constant. For expression convenience, we denote the problem of P6 under a given ᾱ as P6a. Same as solving P5, it can be shown that (69) can be rewritten as (75). By introducing the dual variables associated with (75) and (39), the partial Lagrangian of P6a under given ᾱ can be expressed as    g1 ᾱf p − λ (E[χ] − ǫ) L (p, λ) = E log2 1 + 2 σSR − µ (E[p] − Pav ) , (86) where λ and µ are nonnegative Lagrange dual variables associated with the constraints E [χ]−ǫ ≤ 0 and E [χ] − Pav ≤ 0, respectively. 21 Let A denote the set of n ǫST ηST (1−ᾱ)f o ≤ p . The dual function is then expressed as q(λ) = maxp∈A L (p, λ) . According to the Karush-Kuhn-Tucker (KKT) conditions, the optimal solution needs to satisfy the following equations: λ∗ (E[χ∗ ] − ǫ) = 0, (87) µ∗ (E[p∗ ] − Pav ) = 0, (88) λ∗ ≥ 0, E[χ∗ ] − ǫ ≤ 0, (89) µ∗ ≥ 0, E[p∗ ] − Pav ≤ 0. (90) For a fixed λ, by dual decomposition, the dual function can be decomposed into a series of similar sub-dual-functions each for one fading state. For a particular fading state, the problem can be shown equivalent to P6b:   g1 ᾱf p − λχ(p) − µp, Max log2 1 + 2 {p≥0} σSR ǫST s.t. p ≥ . ηST (1 − ᾱ)f (91) (92) P6a can be solved by iteratively solving P6b for all fading states with fixed λ and µ, and updating these dual variables via sub-gradient based method, e.g., the ellipsoid method [21], for which the details are omitted here for brevity. In the following, we derive the solution to P6b. To solve the problem, we first introduce the following function F (p) , log2  g1 ᾱf p 1+ 2 σSR  − µp. (93) It is easy to show that F (p) is a concave function with respect to p, and attains its maximum value when p is equal to p̃ = 1 σ2 − SR . µ ln 2 g1 ᾱf (94) Note that the objective function in P6b now becomes F (p) − λχ(p). Now we look at χ(p). It has been shown in the previous subsection that χ(p) can be rewritten as (82) and (83). Thus, when h1 −(2γ −1)g2 αf ≤ 0, we have χ(p) = 1, ∀p. Then, the objective function of P6b becomes F (p) − λ, which attains its maximum value at the same p as F (p). Thus, the optimal solution of P6b for this case is p∗ = p̃. 22 F(p) F(p) − λχ(p) 0 p′ p̃ p (a) p ′ ≤ p̃ F(p) F(p) − λχ(p) F(p) − λχ(p) p′ p̃ 0 p (b) p ′ > p̃ Fig. 3. An illustration of different forms of function F(p) − λχ(p). When h1 − (2γ − 1)g2 αf > 0, as shown in (83), χ(p) is a step function with respect to p, and its critical point is p = 2 (2γ −1)σP R . h1 −(2γ −1)g2 αf In the following, we consider P6b for this case. For the convenience of discussion, we denote the critical point of χ(p) as p′ , i.e., p′ = (2γ − 1)σP2 R . h1 − (2γ − 1)g2 αf (95) For the convenience of discussion, we rewrite the constraint (92) as p ≥ p′′ , where p′′ = ǫST . ηST (1 − ᾱ)f (96) 23 Let p∗ denote the optimal solution of P6b. The following discussions are then made on p∗ : Case 1: p′ ≤ p̃. An illustration of this case is given in Fig. 3(a). It can be seen from Fig. 3(a) that F (p) attains it maximum value at p = p̃, and at the value of p = p̃, χ(p̃) is equal to zero. Thus, F (p) − λχ(p) attains its maximum value at p = p̃. Now, in order to obtain the optimal solution for P6a, we have to consider the following two subcases based on the relationship among p′ , p′′ , and p̃. • Subcase 1: p′′ ≤ p̃. In this case, p̃ is within the feasible region. Thus, the optimal solution for P6b is p∗ = p̃. • Subcase 2: p̃ < p′′ . In this case, p̃ is not within the feasible region. It is observed from Fig. 3(a) that F (p) − λχ(p) is a decreasing function with respect to p for any p ≥ p̃. Thus, the optimal solution for P6b is p∗ = p′′ for this case. Case 2: p′ > p̃. An illustration of this case is given in Fig. 3(b). This case is a little bit complex than Case 1. As shown in Fig. 3(b), F (p) − λχ(p) may attain its maximum value at p = p̃ or p = p′ depending on the value of λ. Thus, the following three subcases are considered for finding the optimal p∗ for P6b. • Subcase 1: p′′ < p̃ < p′ . For this case, both p̃ and p′ are within the feasible region. Thus, • the optimal solution can be obtained as   p̃, if F (p̃) − λ > F (p′ ), p∗ =  p′ , if F (p̃) − λ ≤ F (p′ ). (97) Subcase 2: p̃ ≤ p′′ ≤ p′ . For this case, only p′ is within the feasible region. However, it is possible that the value of F (p′′ ) − λ may be larger than that of F (p′ ). Thus, the optimal solution can be obtained as •   p′′ , p∗ =  p′ , if F (p′′ ) − λ > F (p′), if F (p′′ ) − λ ≤ F (p′ ). (98) Subcase 3: p̃ < p′ < p′′ . For this case, both p̃ and p′ are not within the feasible region. It is observed from Fig. 3(b) that F (p) − λχ(p) is a decreasing function with respect to p for any p ≥ p′ . Thus, the optimal solution for P6b is p∗ = p′′ for this case. Combining all the results obtained above, the optimal solution for P6a can be summarized in the following theorem. 24 Theorem 6. The optimal power allocation of P6a, i.e., P6 under a given ᾱ, is given by      p̃, if R1 holds, p∗ (n) = p′ ,     p′′ , if R2 holds, (99) if R3 holds, where p̃, p′ , p′′ are given by (94), (95), (96), respectively. R1 , R2 , R3 are defined as R1 , {{h1 − (2γ − 1)g2 αf ≤ 0} or {h1 − (2γ − 1)g2 αf > 0 and p̃ > max {p′ , p′′ }} or {p′ > p̃ > p′′ and h1 − (2γ − 1)g2 αf > 0 and F (p̃) − λ > F (p′ )}}. R2 , {{h1 − (2γ − 1)g2αf > 0 and p′ > p̃ > p′′ and F (p̃) − λ < F (p′ )} or {p′ > p′′ > p̃ and h1 − (2γ − 1)g2 αf > 0 and F (p′′ ) − λ < F (p′ )}}. R3 , {{h1 − (2γ − 1)g2 αf > 0 and p′′ > max {p′ , p̃}} or {h1 − (2γ − 1)g2 αf > 0 and p′ > p′′ > p̃ and F (p′′ ) − λ > F (p′)}}. With the optimal solution of P6a (i.e, P6 under given ᾱ) obtained in Theorem 6, the optimal solution of P6 can be obtained by performing a one-dimension search for α over the space [0, 1]. VII. N UMERICAL R ESULTS In this section, several numerical examples are presented to evaluate the performance of the derived results. We assume i.i.d. Rayleigh fading for all channels involved, and thus the channel power gains of these channels are exponentially distributed. The stochastic mean of the channel power gain is assumed to be one. It is worth pointing out that the assumption of particular distributions of the channel power gains does not affect the structure of the problem studied and the solution obtained. The power of the noises at the receiver of PR and SR are assumed to be one. The energy harvest efficiency ηST for ST is assumed to be one. The constant conversion parameter u is assumed to be one. The results given in these examples are obtained by averaging over 10000 channel realizations. A. Ideal Vs. Practical Energy Consumption Model In this subsection, we investigate the impact of the energy consumption model on the system performance for two different scenarios given below. 1) Peak transmit power constraint with dynamic reflection coefficient: The curves presented in Fig 4 are obtained based on the solutions to P1 and P2. It is observed from Fig. 4 that the ergodic capacity of the secondary system increases with the increasing of Ppk for all curves. It is Ergodic Capacity of Secondary System (bit/complex dim.) 25 4.5 Ideal Energy Model, γ=1 Ideal Energy Model, γ=2 Practical Energy Model, γ=1 Practical Energy Model, γ=2 4 3.5 3 2.5 2 1.5 1 0.5 0 0 5 10 15 Peak Transmit Power Constraint, Ppk (dB) 20 Ergodic Capacity of Secondary System (bit/complex dim.) Fig. 4. Peak Transmit Power Constraint with Dynamic Reflection Coefficient 3.5 Ideal Energy Consumption Model, γ=1 Practical Energy Consumption Model, γ=1 3 2.5 2 1.5 1 0.5 0 0 5 10 15 Average Transmit Power Constraint(dB) Fig. 5. Average Transmit Power Constraint with Fixed Reflection Coefficient 20 26 also observed that the ergodic capacity of the ideal energy consumption model is larger than that of the practical energy model for the same Ppk . This is due to the fact that for the practical energy consumption model, the dynamic power consumption is considered, more power is needed to support the tag’s circuit operation, and thus the power left for transmitting the signal is less, which results in a lower transmission rate. We also observe that the capacity for γ = 1 is larger than that for γ = 2 for both idea and practical energy consumption models. This is as expected since a lower primary system’s rate requirement indicates a high interference tolerance, and thus the secondary system can transmit with a higher power which results in a higher transmission rate. 2) Average transmit power constraint with fixed reflection coefficient: In Fig.5, we show that ergodic capacity for both ideal and practical energy consumption model under the average transmit power constraint and the fixed reflection coefficient. The curves presented in Fig 5 are obtained based on the solutions to P3 and P4. The trend of the curves are same as that of Fig.4. Thus, for concise, the explanations are not repeated here. However, comparing Fig.5 with Fig.4, we observe that the ergodic capacity in Fig.5 is lower than that of Fig.4 when Ppk = Pav for the same energy consumption model and the same γ. This is due to the fact the reflection coefficient in Fig.4 can be dynamically adjusted to its optimal value for each fading block while the reflection coefficient in Fig.5 remains the same for each fading block. B. Study of the Primary Transmission Outage Constraint In this subsection, we investigate the impact of the primary transmission outage constraint on the system performance for two different setups given below. 1) Peak transmit power constraint: The curves presented in Fig 6 are obtained based on the solution to P5. Firstly, it is trivial to observe from Fig. 6 that the ergodic capacity under larger Ppk is larger for the same given primary transmission outage probability. Secondly, the ergodic capacities for all three curves become flat when the primary transmission outage probability is sufficiently large. This is as expected since the peak transmit power constraint becomes the bottleneck that limits the system performance when the primary transmission outage probability is large. It is also observed that all three curves are not starting from the zero primary transmission outage probability. This is because the zero primary transmission outage probability is in fact equivalent to the PR’s rate constraint given in (10). For a fixed α and a given peak power constraint Ppk , there does not exist a power allocation that satisfies Ergodic Capacity of Secondary System (bit/complex dim.) 27 5 Ppk=10dB 4.5 Ppk=15dB P =20dB 4 pk 3.5 3 2.5 2 1.5 1 0.5 0 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 Primary transmission outage probability 0.4 0.45 Fig. 6. Peak Power Constraint with Primary Transmission Outage Constraint  log2 1 + h1 (n)p(n) 2 g2 (n)αf (n)p(n)+σP R  ≥ γ for a given positive γ for all the fading slots due to the continuous distribution of the channel power gains. 2) Average transmit power constraint: In Fig. 7, four curves with different primary transmission outage probability are given. The curves presented in Fig 7 are obtained based on the solution to P6. It is easy to observe that the ergodic capacities increase with the increasing of the transmit power constraint. The capacity difference for four curves is small when the transmit power constraint is small. This is intuitive since the average transmit power constraint is the bottleneck that limits the system performance when it is very small. It is also observed that the ergodic capacity under larger primary outage probability is larger for the same given transmit power constraint. Besides, the curves with 100% and 0% primary outage probability serve as the upper bound and the lower bound, respectively. This is as expected since the case under 100% primary outage probability is equivalent to the case without the primary outage probability constraint. The case under 0% primary outage probability is equivalent to the case under the primary rate constraint which is studied in P3. Ergodic Capacity of Secondary System (bit/complex dim.) 28 6 Primary Transmission Outage, 100% Primary Transmission Outage, 30% Primary Transmission Outage, 10% Primary Transmission Outage, 0% 5 4 3 2 1 0 0 5 10 15 Average Transmit Power Constraint(dB) 20 Fig. 7. Average Power Constraint with Primary Transmission Outage Constraint VIII. C ONCLUSIONS In this paper, we proposed the Riding on the Primary (ROP) spectrum sharing model for wireless-powered IoT devices with ambient backscatter communication capabilities. We investigated the performance of such a spectrum sharing system under fading channels. The ergodic capacity of the secondary system was investigated by jointly optimizing the transmit power of the primary signal and the reflection coefficient of the secondary system. Different (ideal/practical) energy consumption models, different (peak/average) transmit power constraints, different types (fixed/dynamically adjustable) reflection coefficient, different primary system’s interference requirements (rate/outage) are considered were considered. Closed-form solutions were obtained for most cases. Performance for different scenarios were studied and compared through numerical simulations. R EFERENCES [1] X. Kang, Y. -C. Liang, and J. Yang, ”Riding on the primary: A new spectrum sharing paradigm for wireless-powered IoT devices,” in Proc. IEEE ICC, Paris, France, May. 2017. [2] 3GPP TR 22.861: ”Feasibility Study on New Services and Markets Technology Enablers for Massive Internet of Things; Stage 1”, Version 14.0.0, Jun. 2016. 29 [3] N. Shinohara, Power without wires, IEEE Microw. Mag., vol. 12, no. 7, pp. S64C-S73, Dec. 2011. [4] K. Huang and E. Larsson, ”Simultaneous information and power transfer for broadband wireless systems”, IEEE Trans. Signal Process., vol. 61, no. 23, pp. 5972–5986, Dec. 2013. [5] X. Kang, Y. K. Chia, C. K. Ho and S. Sun, ”Cost minimization for fading channels with energy harvesting and conventional energy,” IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4586–4598, Aug. 2014. [6] X. Kang, C. K. Ho and S. Sun, ”Full-duplex wireless-powered communication network with energy causality,” IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5539–5551, Oct. 2015. [7] C. Boyer and S. Roy, ”Backscatter communication and RFID: coding, energy, and MIMO analysis”, IEEE Trans. Commun., vol. 62, no. 3, pp. 770–785, Mar. 2014. [8] C. Boyer and S. Roy, ”Space time coding for backscatter RFID”, IEEE Trans. Wireless Commun., vol. 12, no. 5, pp. 2272–2280, May. 2013. [9] V. Liu, A. Parks, V. Talla, S. Gollakota, D. Wetherall, J. R. Smith, ”Ambient backscatter: wireless communication out of thin air,” in Proc. ACM SIGCOMM, Hong Kong, China, Jun. 2013, pp. 39–50. [10] B. Kellogg, A. Parks, S. Gollakota, J. R. Smith and D. Wetherall, ”Wi-fi backscatter: Internet connectivity for RF-powered devices”, in Proc. ACM SIGCOMM, Chicago, USA, Jun. 2014, pp. 1–12. [11] G. Wang, F. Gao, R. Fan, and C. Tellambura ”Ambient backscatter communication systems detection and performance analysis,” IEEE Trans. Commun., vol. 64, no. 11, pp. 4836–4846, Nov. 2016. [12] J. Qian, F. Gao, G. Wang, S. Jin, and H. Zhu ”Noncoherent detections for ambient backscatter system,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1412–1422, May. 2017. [13] G. Yang, and Y. -C. Liang, ”Backscatter communications over ambient OFDM signals: transceiver design and performance analysis,” in Proc. of IEEE Globecom, Washington DC, USA, Dec. 2016. [14] D. Bharadia, K. Joshi, M. Kotaru, and S. Katti, ”BackFi: High throughput WiFi backscatter,” in Proc. of ACM SIGCOMM, London, UK, Aug. 2015, pp. 283–296. [15] P. Zhang, M. Rostami, P. Hu, and D. Ganesan, ”Enabling practical backscatter communication for on-body sensors,” in Proc. of ACM SIGCOMM, Florianopolis, Brazil, Aug. 2016, pp. 370–383. [16] K. Han and K. Huang, ”Wirelessly powered backscatter communication network: Modeling, coverage and capacity,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2548–2561, Apr. 2017. [17] X. Kang, Y. -C. Liang, A. Nallanathan, H. K. Garg, and R. Zhang, ”Optimal power allocation for fading channels in cognitive radio networks: Ergodic capacity and outage capacity,” IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 940– 950, Feb. 2009. [18] F. Fuschini, C. Piersanti, F. Paolazzi and G. Falciasecca, ”Analytical approach to the backscattering from UHF RFID transponder”, IEEE Antenna Wireless Propag. Lett., vol. 7, pp. 33–35, Feb. 2008. [19] T. M. Cover and J. A. Thomas, ”Elements of Information Theory”, John Wiley & Sons, Inc., 1991. [20] S. Verdu, ”Multiuser Detection”, Cambridge University Press, 1998. [21] S. Boyd and L. Vandenberghe, Convex optimization, Cambridge University Press, 2004. [22] X. Kang, R. Zhang, Y. -C. Liang, and H. K. Garg, ”Optimal power allocation strategies for fading cognitive radio channels with primary user outage constraint,” IEEE J. Sel. Areas Commun., vol. 29, no. 2, pp. 374–383, Feb. 2011.
7cs.IT
arXiv:1612.06958v3 [math.GR] 14 Sep 2017 CONTRACTION GROUPS AND PASSAGE TO SUBGROUPS AND QUOTIENTS FOR ENDOMORPHISMS OF TOTALLY DISCONNECTED LOCALLY COMPACT GROUPS BY Timothy P. Bywaters The University of Sydney, School of Mathematics and Statistics NSW 2006, Australia e-mail: [email protected] AND Helge Glöckner Universität Paderborn, Institut für Mathematik Warburger Str. 100, 33098 Paderborn, Germany e-mail: [email protected] AND Stephan Tornier ETH Zürich, Department of Mathematics Rämistrasse 101, 8092 Zürich, Switzerland The University of Newcastle, School of Mathematical and Physical Sciences University Drive, Callaghan, NSW 2308, Australia e-mail: [email protected] ABSTRACT The concepts of the scale and tidy subgroups for an automorphism of a totally disconnected locally compact group were defined in seminal work by George A. Willis in the 1990s, and recently generalized to the case of endomorphisms (G. A. Willis, Math. Ann. 361 (2015), 403–442). We show that central facts concerning the scale, tidy subgroups, quotients, and contraction groups of automorphisms extend to the case of endomorphisms. In particular, we obtain results concerning the domain of attraction around an invariant closed subgroup. 1 2 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER Statement of Results Let G be a Hausdorff topological group with neutral element e and α : G → G be an endomorphism (which we always assume continuous). The contraction group of α is n o con(α) := x ∈ G : lim αn (x) = e . n→∞ Given a closed subgroup H ⊆ G with α(H) ⊆ H, we say that a sequence (xn )n∈N0 in G converges to e modulo H (and we write xn → e modulo H) if, for each identity neighbourhood V ⊆ G, there exists N ∈ N0 such that xn ∈ V H for all n ≥ N (cf. [1], [13]). The domain of attraction of H with respect to α is defined as the set con(α, H) of all x ∈ G such that αn (x) → e modulo H. The following result extends the partial results [1, Theorem 3.8], [13, Theorem 1], [4, Theorem 2.4] and [6]. Theorem A. Let α : G → G be an endomorphism of a totally disconnected, locally compact group G and H ⊆ G be a closed subgroup. If α(H) = H or α(H) ⊆ H and H is compact, then con(α, H) = con(α)H. Given x ∈ G, a sequence (xn )n∈N0 in G is called an α-regressive trajectory for x if x0 = x and α(xn ) = xn−1 for all n ∈ N. Let con− (α) be the set of all x ∈ G for which there exists an α-regressive trajectory (xn )n∈N0 with lim xn = e. n→∞ Then con− (α) is a subgroup of G, called the anti-contraction group of α. If H is a closed subgroup of G with α(H) ⊆ H, then the anti-contraction set of α modulo H is defined as the set con− (α, H) of all x ∈ G for which there exists an α-regressive trajectory (xn )n∈N0 with xn → e modulo H. Theorem B. Let α : G → G be an endomorphism of a totally disconnected, locally compact group G and let H ⊆ G be a closed subgroup with α(H) ⊆ H. Then con− (α, H) = con− (α)H. For each α-regressive trajectory (xn )n such that xn → e modulo H, there is an α-regressive trajectory (yn )n such that yn ∈ xn H for all n and limn→∞ yn = e. Let G be a totally disconnected, locally compact group and α : G → G be an ENDOMORPHISMS OF T.D.L.C. GROUPS 3 endomorphism. For a compact open subgroup U ⊆ G, the index [α(U ) : α(U ) ∩ U ] ∈ N is called the displacement index of U . If U has minimal displacement index among all compact open subgroups, then U is called minimizing, and one defines the scale of α as this minimum displacement index, denoted s(α). Equivalently, U has certain structural properties, summarized as being tidy Let par− (α) be the anti-parabolic subgroup of α consisting of all x ∈ G for which there exists an α-regressive trajectory (xn )n∈N0 such that {xn : n ∈ N0 } is relatively compact. The article [23] analyzes how the scale of an automorphism α behaves with respect to taking subgroups and quotients. We generalize these results to the case of endomorphisms. Given a group G, a normal subgroup H of G and an endomorphism α of G with α(H) ⊆ H, we let α denote the associated endomorphism of G/H. Theorem C. Let α : G → G be an endomorphism of a totally disconnected, locally compact group G and H ⊆ G a closed subgroup with α(H) ⊆ H. (a) There is a compact open subgroup U of G which is tidy for α and such that U ∩ H is tidy for α|H . Furthermore sH (α|H ) ≤ sG (α). (b) If, in addition, H is normal in G, then sH (α|H )sG/H (α) divides sG (α). (c) If, in addition to all the above, H ⊆ par− (α) is a closed normal subgroup of G and α(H) = H, then sH (α|H )sG/H (α) = sG (α). Using Theorem A, we show the following result which generalizes [1, Theorem 3.32] and the corresponding statement in [9]. Theorem D. Let α : G → G be an endomorphism of a totally disconnected, locally compact group G. Then α has small tidy subgroups if and only if con(α) is closed in G. 4 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER Using Theorem B, we prove a generalization of [1, Proposition 3.21 (3)]: Theorem E. Let α : G → G be an endomorphism of a totally disconnected, locally compact group G. Then  (1) s(α) = s α|con− (α) . Further consequences of Theorems A and B are obtained. Let par(α) ⊆ G be the parabolic subgroup associated to an endomorphism α, i.e., the set of all x ∈ G for which {αn (x) : n ∈ N0 } is relatively compact in G. Let lev(α) := par(α) ∩ par− (α) be the Levi subgroup. If G is locally compact and totally disconnected, then par(α) and lev(α) are closed subgroups of G such that α(par(α)) ⊆ par(α) and α(lev(α)) = lev(α) (see [26, Proposition 19]). Given a compact open subgroup T V ⊆ G, we define V− := n∈N0 α−n (V ) and write V+ for the set of all x ∈ V for which there exists an α-regressive trajectory (xn )n∈N0 within V . We study par(α), lev(α) and their connections to tidy subgroups. If α has small tidy subgroups, then the strongest conclusions can be obtained, as compiled in the next theorem. For α an automorphism, cf. already [6] for part (a) and [1, Theorem 3.32] for (b). The semidirect products mean semidirect products of topological groups. Theorem F. Let α be an endomorphism of a totally disconnected, locally compact group G. Then α has small tidy subgroups if and only if α|lev(α) has small tidy subgroups. In this case, the following holds: (a) Ω := con(α) lev(α) con− (α) is an open identity neighbourhood in G such that α(Ω) ⊆ Ω, and the product map (2) π : con(α) × lev(α) × con− (α) → Ω, (x, y, z) 7→ xyz is a homeomorphism. (b) par(α) = con(α) ⋊ lev(α) and par− (α) = con− (α) ⋊ lev(α). (c) α|par− (α) , α|lev(α) and α|con− (α) are automorphisms. (d) Every subgroup V of G which is tidy for α is a subset of Ω; it satisfies V− = (con(α) ∩ V ) ⋊ (lev(α) ∩ V ) and V+ = (con− (α) ∩ V ) ⋊ (lev(α) ∩ V ). ENDOMORPHISMS OF T.D.L.C. GROUPS 5 (e) A compact open subgroup V ⊆ G is tidy for α if and only if (3) V = (con(α) ∩ V )(lev(α) ∩ V )(con− (α) ∩ V ), (4) α(con(α) ∩ V ) ⊆ con(α) ∩ V, (5) α(lev(α) ∩ V ) = lev(α) ∩ V, and (6) − α(con (α) ∩ V ) ⊇ con− (α) ∩ V. (f) The compact open subgroups W ⊆ lev(α) with α(W ) = W form a basis of identity neigbourhoods in lev(α). If G is a Lie group over a totally disconnected local field (as in [3] and [18]) and α : G → G is an analytic endomorphism with small tidy subgroups, then con(α), lev(α) and con− (α) are Lie subgroups of G (in the strong sense of submanifolds) and the product map in (2) is an analytic diffeomorphism, see [9]. By (e) in Theorem F, the automorphism α|lev(α) is distal, see [14]. Information concerning contractive automorphisms of locally compact groups can be found in [19] and [10]; contractive analytic automorphisms of Lie groups over a totally disconnected local field K are discussed in [21] (for K = Qp ) and [8]. Independenly, studies of endomorphisms of totally disconnected groups have also been performed in [15] and [5]. Whereas the former deals with profinite groups, the latter has a view towards topological entropy. According to [5, Corollary 4.11] (combined with Proposition 9.5), the topological entropy htop (α) of an endomorphism α of a totally disconnected, locally compact group G is given by htop (α) = ln s(α), if con(α) is closed. Our Theorem C (c) therefore implies the following Addition Theorem for topological entropy, which is complementary to a similar, known result ([5, Theorem 1.2]): If con(α) is closed in G and H is a closed normal subgroup of G such that H ⊆ par− (G) and α(H) = H, then htop (α) = htop (α|H ) + htop (α). Acknowledgements. The research was carried out during the ‘Winter of Disconnectedness’ hosted by the University of Melbourne (Matrix Center, Creswick) and the University of Newcastle (NSW). We owe thanks to both institutions for their hospitality and are grateful to George Willis for stimulating questions, discussions, and support. The first and last authors would like to extend their gratitude to Colin Reid for helpful discussions, as well as their supervisors, Jacqui Ramagge and Marc Burger respectively, for their ongoing support and 6 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER making attendance to the aforementioned workshop possible. This research was conducted while the first author was supported by the Australian Government Research Training Program Scholarship and, partly, while the last author was supported by the SNSF Doc.Mobility fellowship 172120. Finally, we owe thanks to an anonymous referee whose comments helped us to improve the original manuscript. Conventions. Write N := {1, 2, . . .} and N0 := N ∪ {0}. All topological groups and uniform spaces are assumed Hausdorff. The automorphisms considered are continuous, with continuous inverse. A map q : X → Y between topological spaces is called a quotient map if it is surjective and Y carries the quotient topology (the final topology with respect to q). If X is a set and α : X → X a map, we say that a subset M ⊆ X is α-invariant if α(M ) ⊆ M . If α(M ) = M , we say that M is α-stable. This terminology is in line with [1] but differs from [13]. A sequence (xn )n∈N0 (or two-sided sequence (xn )n∈Z ) in a topological space X is called bounded if {xn : n ∈ N0 } (resp., {xn : n ∈ Z}) is relatively compact in X. If G is a totally disconnected, locally compact group, then COS(G) denotes the set of all compact open subgroups of G. We write |X| for the cardinality of a set X. If k is an ordinal number, we write [0, k[ for the set of ordinals j < k. For each cardinal number c, the set of ordinal numbers with cardinality c has a minimal element k. Thus [0, k[ has cardinality c, while [0, j[ has cardinality less than c for each j ∈ [0, k[. We identify c with k. Structure of the Article. In a preparatory first section, we recall necessary concepts from [26]. Auxiliary results concerning convergence modulo H and generalizations of the concept for self-maps of uniform spaces are compiled in Section 2. Section 3 is devoted to the proof of Theorem A for metrizable G, by an adaptation of arguments from [1]. In Section 4, we prove Theorem B for metrizable G. Also this proof was inspired by [1], but major changes were necessary to enable (unique) α-orbits to be replaced with (not necessarily unique) α-regressive trajectories. In both cases, the generalization to non-metrizable G uses a method that was stimulated by Jaworski’s arguments in [13], but deviates in detail as we use a different cardinal as the parameter in a transfinite induction. In this way, we can do without some of the preparatory lemmas in [13], which do not have analogues for anti-contraction groups. See Section 6 for the case of Theorem A. The relevant cardinal invariant is introduced in Section 5. As to Theorem B, we have to line up regressive trajectories by a transfinite ENDOMORPHISMS OF T.D.L.C. GROUPS 7 induction over the steps of a projective system, rather than mere elements of anti-contraction groups (Section 7). This also enables us to get around the problem that although con(α, K) ∩ con(α, L) = con(α, K ∩ L) for compact K and L, a corresponding formula cannot be expected for anti-contraction groups of an endomorphism. Section 8 analyzes how the scale of an endomorphism behaves with respect to subgroups and quotients and proves most of Theorem C. In Sections 9–13, we give applications of Theorems A and B concerning endomorphisms, their scale and the various subgroups going along with them. Notably, we complete the proof of Theorem C and obtain proofs for Theorems D, E, and F. 1. Basic concepts In this section, we collect basic definitions and properties of the objects appearing in this article. For details, we refer the reader to [26]. Let G be a totally disconnected, locally compact group and α : G → G be an endomorphism. Recall that by a theorem of van Dantzig (see [20] or [11, (7.7)]), G admits an identity neighbourhood basis consisting of compact open subgroups. For a compact open subgroup U ⊆ G, the index [α(U ) : α(U ) ∩ U ] ∈ N is called the displacement index of U . If U has minimal displacement index among all compact open subgroups, then U is called minimizing, and one defines the scale of α as this minimum displacement index, denoted s(α) or sG (α). Equivalently, U has certain structural properties, summarized as being tidy. Write \ U− := α−n (U ) = {x ∈ U : (∀n ∈ N0 ) αn (x) ∈ U }, n∈N0 where α−n (U ) means the preimage (αn )−1 (U ). Let U+ be the set of all x ∈ U for which there exists an α-regressive trajectory (xn )n∈N0 such that xn ∈ U for all n. Then \ U+ = Un,α with n∈N0 (7) U0,α := U and Un+1,α := U ∩ α(Un,α ) for n ∈ N0 ; moreover, U+ and U− are compact subgroups of G such that α(U− ) ⊆ U− and α(U+ ) ⊇ U+ 8 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER (see [26], or also Lemma 1.2). The sets [ [ U−− := α−n (U− ) and U++ := αn (U+ ) n∈N0 n∈N0 are unions of ascending sequences of subgoups, whence they are subgroups of G. If U = U+ U− , then U is called tidy above for α. If U++ is closed in G and [αn+1 (U+ ) : αn (U+ )] ∈ N is independent of n ∈ N0 , then U is called tidy below. If U is both tidy above and tidy below for α, then U is called tidy for α (see [26]). We shall use the fact that U is tidy if and only if U is tidy above and U−− is closed in G (see [26, Proposition 9]). By [26, Lemma 5 and Theorem 2], a compact open subgroup U of G is minimizing for α if and only if it is tidy for α, in which case s(α) = [α(U ) : α(U ) ∩ U ] = [α(U+ ) : U+ ]. If U is a compact open subgroup of G, then the compact open subgroup ℓ \ α−j (U ) j=0 is tidy above for large ℓ ∈ N0 (see [26]). For U ⊆ G a compact open subgroup, U+ ∩ U− is a compact subgroup of G such that α(U+ ∩ U− ) = U+ ∩ U− (see [26] or Lemma 1.2). Let par− (α) be the anti-parabolic subgroup of α consisting of all x ∈ G for which there is an α-regressive trajectory (xn )n∈N0 with {xn : n ∈ N0 } being relatively compact. Then par− (α) is a closed subgroup of G and α(par− (α)) = par− (α) (see [26, comment after Proposition 19]). The intersection nub(α) of all tidy subgroups is called the nub of α. The nub is compact, and α-stable in the sense that α(nub(α)) = nub(α) (see [26, Proposition 20]). The nub coincides with the trivial group {e} if and only if α has small tidy subgroups in the sense that the subgroups which are tidy for α form a basis of identity neighbourhoods. The bounded iterated kernel bik(α) is defined as the closure bik(α) := {x ∈ par− (α) : αn (x) = e for some n ∈ N0 } (as opposed to [26, Definition 12] which is neither intended nor used); it is an α-stable compact normal subgroup of par− (α). The endomorphism α of ENDOMORPHISMS OF T.D.L.C. GROUPS 9 par− (α)/ bik(α) induced by α is an automorphism and bik(α) ⊆ nub(α) [26, Proposition 20]. Then nub(α)/bik(α) = nub(α) (see Proposition 12.2 (b)) and nub(α) is the largest α-stable closed subgroup of par− (α)/ bik(α) on which α acts ergodically (see [25, Proposition 4.4]). For α an endomorphism of a totally disconnected locally compact group, the following sets were already defined above. Definition 1.1: If X is a Hausdorff topological space, K ⊆ X a compact subset and α : X → X a continuous map, we define \ \ Kn,α , α−n (K) and K+ := K− := n∈N0 n∈N0 where K0,α := K and Kn,α := K ∩ α(Kn−1,α ) for n ∈ N. The following properties are useful in general. Compare [26] for proofs. Lemma 1.2: For X, α, K, Kn,α , K+ , K− as in Definition 1.1, we have: (a) K− is a compact subset of K. It is the set of all x ∈ K such that αn (x) ∈ K for all n ∈ N0 . Moreover, α(K− ) ⊆ K− . (b) Kn,α is a compact subset of K, for each n ∈ N0 . It is the set of all x ∈ K for which there exist x0 , x1 , . . . , xn ∈ K such that x0 = x and α(xj ) = xj−1 for all j ∈ {1, 2, . . . , n}. (c) K+ is a compact subset of K. It is the set of all x ∈ K for which there exists an α-regressive trajectory (xn )n∈N0 with x0 = x and xn ∈ K for all n ∈ N0 . Moreover, K+ ⊆ α(K+ ). (d) K+ ∩ K− is a compact subset of K. It is the set of all x ∈ K for which there exists a family (xn )n∈Z of elements xn ∈ K such that x0 = x and α(xn ) = xn+1 for all n ∈ Z. Moreover, α(K+ ∩ K− ) = K+ ∩ K− . If X is a topological group, α an endomorphism and K a compact subgroup of X, then also K+ , K− and each Kn,α are compact subgroups of X. 2. Dynamics on uniform spaces In this section, we collect generalities about dynamical systems on uniform spaces. As a reference for the theory of uniform spaces, we recommend [12]. A simple topological fact will be used (whose proof is left to the reader). 10 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER Lemma 2.1: Let X be a topological space and N a filter basis in X. If each T K ∈ N is compact and U ⊆ X is an open subset with N ⊆ U , then there exists some K ∈ N such that K ⊆ U . 2.2: Let X be a set, α : X → X be a map and x ∈ X. As usual, the sequence (αn (x))n∈N0 is called the α-orbit of x. A sequence (xn )n∈N0 is called an αregressive trajectory for x if x0 = x and α(xn ) = xn−1 for all n ∈ N. Note the slightly different usage in [26]. A two-sided sequence (xn )n∈Z is called an α-trajectory (for x0 ) if α(xn ) = xn+1 for all n ∈ Z. The following observation allows α-regressive trajectories to be created from a given sequence. Lemma 2.3: Let X be a Hausdorff topological space, α : X → X be a continuous map and (zn )n∈N0 be a sequence in X. Let x0 ∈ X and, for n, m ∈ N0 , ( αm−n (zm ) if n ∈ {0, . . . , m}; (m) (8) zn := x0 if n > m. (m) Thus z (m) := (zn )n∈N0 ∈ X N0 for each m ∈ N0 . If y = (yn )n∈N0 is an accumulation point of (z (m) )m∈N0 in X N0 with respect to the product topology, then (yn )n∈N0 is an α-regressive trajectory. Proof. Let (z (ma ) )a∈A be a convergent subnet of (z (m) )m∈N0 with limit y = (yn )n∈N0 . For every n ∈ N, there is a0 ∈ A with ma ≥ n for all a ≥ a0 and thus (m ) α(zn(ma ) ) = zn−1a . Since α is continuous, passing to the limit we obtain that α(yn ) = yn−1 . Hence (yn )n∈N0 is an α-regressive trajectory. (m) For fixed n ∈ N0 , we have zn = αm−n (zm ) for all m ≥ n. Therefore, accumulation points of (z (m) )m∈N0 are independent of the choice of x0 . (m) Definition 2.4: We call (z (m) )m∈N0 = ((zn )n∈N0 )m∈N0 (as in (8)) a double sequence associated to (zn )n∈N0 with respect to α. If X is a topological group, we shall always choose x0 := e. 2.5: Let (X, E) be a uniform space, with filter E of entourages. For V ∈ E, x ∈ S X and M ⊆ X, we write V [x] := {y ∈ X : (x, y) ∈ V } and V [M ] := z∈M V [z]. ENDOMORPHISMS OF T.D.L.C. GROUPS 11 2.6: Let (X, E) be a uniform space and S ⊆ X. Given a subset S ⊆ X, we say that a sequence (xn )n∈N0 in X converges to S with respect to E (and write xn →E S) if, for each V ∈ E, there exists N ∈ N0 such that xn ∈ V [S] for all n ≥ N . Further, let α : X → X be a continuous map. The domain of attraction of S with respect to α is defined as  con(α, S) := x ∈ X : αn (x) →E S . Given a subset S ⊆ X, we write con− (α, S) for the set of all x ∈ X for which there exists an α-regressive trajectory (xn )n∈N0 such that xn →E S. 2.7: Recall that the right uniform structure R on a topological group G is the filter generated by the filter basis of the sets Ve := {(x, y) ∈ G × G : y ∈ V x}, for V ranging through the set of identity neighbourhoods in G (see [11, (4.11)]). Then Ve [x] = V x and Ve [M ] = V M for subsets M ⊆ G. Thus, if H ⊆ G is a closed subgroup and (xn )n∈N0 is a sequence in G, then xn → e modulo H if and only if xn →R H. If α is an endomorphism of G with α(H) ⊆ H, we deduce that the sets con(α, H) and con− (α, H) coincide with those obtained for the uniform space (G, R). 2.8: Recall that a subset R of a uniform space (X, E) is called precompact if, for each V ∈ E, there exist n ∈ N0 and x1 , . . . , xn in X (or, equivalently, in R) with R ⊆ V [x1 ] ∪ · · · ∪ V [xn ]. Every compact subset K ⊆ X is precompact. If (X, E) is complete (e.g., in the case of (G, R) with G a locally compact group, see [2, §3.3, Corollary 1]), then a subset R ⊆ G is precompact if and only if it is relatively compact (cf. [12, p. 22]). The following variant of [1, Lemma 3.9] (devoted to locally compact groups) is very useful for our purposes; [13] already applied the latter lemma also for Hausdorff topological groups (without proof). Lemma 2.9: Let (xn )n∈N0 be a sequence in a uniform space (X, E). (a) If xn →E K for some precompact subset K ⊆ X, then {xn : n ∈ N0 } =: R is precompact in X. If xn →E K and K is compact, then R is relatively compact and thus (xn )n∈N0 is bounded. 12 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER (b) If xn →E S for a closed subset S ⊆ X, then each accumulation point of (xn )n∈N0 is contained in S. (c) If (xn )n∈N0 is bounded and S ⊆ X is closed, then xn →E S if and only if each accumulation point of (xn )n∈N0 lies in S. Proof. (a) If V ∈ E, choose W ∈ E with W ◦ W ⊆ V . Since K is precompact, there is a finite subset Φ ⊆ K such that K ⊆ W [Φ]. Hence W [K] ⊆ W [W [Φ]] = (W ◦ W )[Φ] ⊆ V [Φ]. There exists N ∈ N0 such that xn ∈ W [K] for all n ≥ N . Hence R := {xn : n ∈ N0 } is contained in the finite union V [Φ] ∪ N[ −1 V [xn ], n=0 and thus R is precompact. If, moreover, K is compact, let us show that the closure R is complete in the uniform structure induced by (X, E). Then R, being a uniform space which is both precompact and complete, will be compact (see, e.g., [12, p. 22]). Let y ∈ R such that y 6∈ R; we show that y ∈ K. Let (yj )j∈J be a net in R which converges to y. Given U ∈ E, pick V ∈ E with V ◦ V ⊆ U . There is N ∈ N with (9) xn ∈ V [K] for all n ≥ N . Since none of x0 , . . . , xN −1 is an accumulation point of (yj )j∈J , we find jV ∈ J such that yj 6∈ {x0 , . . . , xN −1 } for all j ≥ jV and thus (10) yj ∈ V [K] for all j ≥ jV . Since yj → y, we deduce that y ∈ V [K] ⊆ V [V [K]] ⊆ U [K]. As K = K, we see that y ∈ K. T U∈E U [K] = If R was not complete, we could find a Cauchy net (yj )j∈J in R which does not converge in R, and which therefore does not have a convergent subnet (nor an accumulation point). Make E × J a directed set by declaring (V1 , j1 ) ≤ (V2 , j2 ) if V1 ⊇ V2 and j1 ≤ j2 . As before, for U ∈ E and V ∈ E with V ◦ V ⊆ U , we can pick N ∈ N with (9) and find jV ∈ J such that (10) holds. Hence, with the induced order, A := {(V, j) ∈ E × J : yj ∈ V [K]} ENDOMORPHISMS OF T.D.L.C. GROUPS 13 is a directed set, and (yj )(V,j)∈A is a subnet of (yj )j∈J . For a = (V, j) ∈ A, we find ka ∈ K such that yj ∈ V [ka ]. (11) Since K is compact, the net (ka )a∈A has a subnet (ka(i) )i∈I which converges to some k ∈ K. Write a(i) = (V (i), j(i)). Given an entourage U ∈ E, pick V ∈ E such that V ◦ V ⊆ U . There exists i0 ∈ I such that ka(i) ∈ V [k] and V (i) ⊆ V for all i ≥ i0 in I. Hence, using (11), yj(i) ∈ V (i)[ka(i) ] ⊆ V [ka(i) ] ⊆ V [V [k]] ⊆ U [k] for all i ≥ i0 . The subnet (yj(i) )i∈I of (yj )j∈J therefore converges to k, contrary to our assumption. Thus (yj )j∈J cannot exist and R must be complete. (b) Assume that a subnet (xn(j) )j∈J of the given sequence converges to x ∈ S. For all U ∈ E and V ∈ E with V ◦ V ⊆ U , we find j0 ∈ J such that xn(j) ∈ V [x] for all j ≥ j0 and thus x ∈ V [x] ⊆ (V ◦ V )[x] ⊆ U [x] ⊆ U [S]. Hence x ∈ T U∈E U [S] = S = S. (c) If not xn →E S, then there exists V ∈ E such that J := {n ∈ N0 : xn 6∈ V [S]} is an infinite set. After shrinking V , we may assume that V [S] is open. Now P := {xn : n ∈ J} has compact closure L in X. Since P is a subset of the closed set X \ V [S], also L ⊆ X \ V [S]. Now L being compact, the subnet (xn )n∈J of (xn )n∈N0 has a subnet which converges to some c ∈ L. Then c is an accumulation point of (xn )n∈N0 such that c 6∈ V [S] and hence c 6∈ S. Together with (b), this establishes (c). Lemma 2.10: Let (X, E) be a uniform space and (Aj )j∈J be a family of closed subsets of X, with J 6= ∅. Let (xn )n∈N0 be a sequence in X such that xn →E Aj for each j ∈ J. If Aj0 is compact for some j0 ∈ J, then \ (12) xn →E Aj . j∈J Proof. As Aj0 is compact and xn →E Aj0 , the sequence (xn )n∈N0 is bounded, by Lemma 2.9 (a). If c ∈ X is an accumulation point of (xn )n∈N0 , then c ∈ Aj 14 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER for each j ∈ J, by Lemma 2.9 (b), and thus c ∈ by Lemma 2.9 (c). T j∈J Aj =: A. Hence xn →E A, Lemma 2.11: Let (X, E) be a uniform space, α : X → X be a continuous map and (Aj )j∈J be a family of closed subsets of X, with J 6= ∅. If Aj0 is compact for some j0 ∈ J, then   \ \ (13) con(α, Aj ) = con α, Aj  . j∈J j∈J T Proof. If x ∈ j∈J con(α, Aj ), then αn (x) →E Aj for each j ∈ J, whence T αn (x) →E j∈J Aj =: A (by Lemma 2.10) and thus x ∈ con(α, A). Thus T j∈J con(α, Aj ) ⊆ con(α, A). The converse inclusion trivially holds. Lemma 2.12: Let (X, E) be a uniform space, α : X → X be a continuous map and K ⊆ X be a compact subset. Then con(α, K) = con(α, K+ ∩ K− ) and con− (α, K) = con− (α, K+ ∩ K− ). Moreover, every α-regressive trajectory which converges to K in (X, E) also converges to K+ ∩ K− . Proof. To prove the first assertion, we show con(α, K) ⊆ con(α, K+ ∩ K− ) (as the other inclusion is trivial). If x ∈ con(α, K), then αn (x) → e modulo K, whence R := {αn (x) : n ∈ N0 } is relatively compact in X (see Lemma 2.9 (a)). Thus, by Lemma 2.9 (c), we shall have x ∈ con(α, K+ ∩ K− ) if we can show that each accumulation point c of (αn (x))n∈N0 is an element of K+ ∩ K− . By Lemma 2.9 (b), we know that each accumulation point of (αn (x))n∈N0 is an element of K. Let (αna (x))a∈A be a subnet which converges to c. Given m ∈ N0 , the subnet (αna +m (x))a∈A = (αm (αna (x)))a∈A of (αn (x))n∈N0 converges to αm (c), by continuity of αm . Thus αm (c) is an accuT mulation point of (αn (x))n∈N0 and thus αm (c) ∈ K. Hence c ∈ m∈N0 α−m (K) = K− . To see that also c ∈ K+ (which shows our first claims), let us show that c ∈ Km,α for each m ∈ N0 . There is am ∈ A such that na ≥ m for all a ≥ am . Then (αna −m (x))a≥am is a subnet of (αn (x))n∈N0 and hence has a subnet converging to some b ∈ K. Applying αj to the entries of the latter subnet (for given j ∈ {0, . . . , m}), we obtain a convergent net with limit αj (b) =: xm−j , which ENDOMORPHISMS OF T.D.L.C. GROUPS 15 has to be an element of K as the convergent net is a subnet of (αn (x))n∈N0 . For j = m, the convergent net just constructed is a subnet of (αna (x))a≥am ; its limit x0 = αm (b) therefore has to coincide with c. Thus x0 , x1 , . . . , xm ∈ K, x0 = c and α(xj ) = α(αm−j (b)) = αm−(j−1) (b) = xj−1 for all j ∈ {1, . . . , m}, whence c ∈ Km,α (by Lemma 1.2 (b)). To complete the proof, it suffices to prove the final statement as it entails that con− (α, K) ⊆ con− (α, K+ ∩ K− ) (and the other inclusion trivially holds). Thus, let (xn )n∈N0 be an α-regressive trajectory in G such that xn → e modulo K. By Lemma 2.9 (a), the closure L := {xn : n ∈ N0 } ⊆ X is compact. Hence, by Lemma 2.9 (c), (xn )n∈N0 will converge to e modulo K+ ∩ K− if we can show that each accumulation point c of (xn )n∈N0 is an element of K+ ∩ K− . By Lemma 2.9 (b), we have c ∈ K. Now α(c) is an accumulation point of (α(xn ))n∈N0 , by continuity of α, and hence also an accumulation point of (α(xn+1 ))n∈N0 = (xn )n∈N0 . Thus, the set C of accumulation points of (xn )n∈N0 is α-invariant, i.e., α(C) ⊆ C. Hence C ⊆ K− . For c as before and m ∈ N, let (xnβ )β∈B be a subnet of (xn )n∈N0 which converges to c. Then tβ := (xnβ , xnβ +1 , . . . , xnβ +m )β∈B is a net in the compact topological space Lm+1 and hence has a convergent subnet, with limit (c0 , c1 , . . . , cm ) ∈ Lm+1 , say. Then c0 = c and α(cj ) = cj−1 for all j ∈ {1, . . . , m} (as the entries of each tβ have this property and α is continuous). Thus c ∈ Km,α for each m ∈ N0 and thus \ c∈ Km,α = K+ . m∈N0 Hence c ∈ K+ ∩ K− , as required. We close the section with some straightforward observations, for later use. Lemma 2.13: Let f : X → Y be a uniformly continuous map between uniform spaces (X, E) and (Y, F ) Let S ⊆ X be a subset. (a) If (xn )n∈N0 is a sequence in X such that xn →E S, then f (xn ) →F f (S). (b) If α : X → X and β : Y → Y are continuous maps such that β◦f = f ◦α, then f (con(α, S)) ⊆ con(β, f (S)). Proof. (a) If U ∈ F , then V := (f × f )−1 (U ) ∈ E, whence there exists N ∈ N0 such that xn ∈ V [S] for all n ≥ N . Thus, for such n, there is sn ∈ S such 16 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER that xn ∈ V [sn ] and thus (sn , xn ) ∈ V . Hence (f (sn ), f (xn )) ∈ U and thus f (xn ) ∈ U [f (sn )] ⊆ U [f (S)]. So f (xn ) →F f (S). (b) For x ∈ con(α, S), we have β n (f (x)) = f (αn (x)) →F f (S), by (a). The next lemma is obvious. Lemma 2.14: Let (X, E) be a uniform space, S ⊆ Y ⊆ X be subsets and (xn )n∈N0 be a sequence in Y such that xn →E S. Let F be the uniform structure induced by E on Y . Then also xn →F S. Lemma 2.15: Let G be a topological group, S ⊆ G be a subgroup and K ⊆ G. (a) If K ⊆ S and S is α-invariant for an endomorphism α of G, then con(α, K) ∩ S = con(α|S , K). (b) If S is open and (xn )n∈N0 is a sequence in S such that xn →R K in G, then xn →R K ∩ S in G (and in S). Proof. (a) Using the inclusion map f : S → G and β := α|S , Lemma 2.13 yields con(α|S , K) ⊆ con(α, K) ∩ S. If, conversely, x ∈ con(α, K) ∩ S, then αn (x) →R K in G and hence in S (by Lemma 2.14), whence x ∈ con(α|S , K). (b) If V ⊆ G is an identity neighbourhood such that V ⊆ S, then xn ∈ V K if and only if xn ∈ V (K ∩ S). Hence xn →R K in G if and only if xn →R (K ∩ S) in G. By Lemma 2.14, then also xn →R (K ∩ S) in S. 3. Proof of Theorem A for metrizable G In this section we prove Theorem A in the metrizable case. We include two lemmas the first one of which concerns how tidiness above passes to subgroups. Lemma 3.1: Let α be an endomorphism of a totally disconnected, locally compact group G. Let H ⊆ G be an α-invariant closed subgroup and W ⊆ G be a compact open subgroup. Then there exists ℓ0 ∈ N0 such that   ℓ \ j=0  α−j (W ) ∩ H is tidy above for α|H , for all ℓ ≥ ℓ0 . ENDOMORPHISMS OF T.D.L.C. GROUPS 17 Proof. Since α(H) ⊆ H, we have H∩ ℓ \ α−j (W ) = {w ∈ H : (∀j = 0, . . . , ℓ) αj (w) ∈ W } j=0 = {w ∈ H : (∀j = 0, . . . , ℓ) αj (w) ∈ H ∩ W } (14) = ℓ \ (α|H )−j (H ∩ W ). j=0 The group in (14) is tidy above for α|H by [26, Proposition 3] for large ℓ. To prove Theorem A, we shall use the following lemma (which parallels the case of automorphisms formulated in [1, Lemma 3.10]): Lemma 3.2: Let α be an endomorphism of a totally disconnected, locally compact group G and H ⊆ G be a closed subgroup. Assume that (i) α(H) = H; or (ii) H is compact. Let x ∈ con(α, H) and O ⊆ G be a compact open subgroup. Then there exists h ∈ H and N ∈ N0 such that αn (xh) ∈ O for all n ≥ N and αn (xh) → e modulo (O ∩ H)+ ∩ (O ∩ H)− (which is a compact subgroup of O ∩ H). Proof. If H is compact, then con(α, H) = con(α, H+ ∩ H− ), where H+ ∩ H− is compact and α(H+ ∩ H− ) = H+ ∩ H− (see Lemma 1.2 (d) and Lemma 2.12). After replacing H with H+ ∩ H− , we may therefore assume that α(H) = H. Thus, it suffices to discuss the case (i). Assume α(H) = H now. After shrinking O if necessary, we may assume that O ∩ H = (O ∩ H)− (O ∩ H)+ , by Lemma 3.1. Let V ⊆ O be a compact open subgroup such that α(V ) ⊆ O. Since αn (x) → e modulo H, there exists N ∈ N0 such that αn (x) ∈ V H for all n ≥ N . As αN (H) = H, we find h0 ∈ H with αN (xh0 ) ∈ V . We now complete h0 to a sequence (hi )i∈N0 of elements in h0 (O ∩ H) such that αN +j (xhi ) ∈ V (O ∩ H) for 0 ≤ j ≤ i. Suppose that h0 , . . . , hk have already been constructed to satisfy this condition. Using that α(O ∩ H) ⊆ (O ∩ H)α((O ∩ H)+ ), we obtain αN +k+1 (xhk ) ∈ α(V (O ∩ H)) ⊆ Oα(O ∩ H) ⊆ Oα((O ∩ H)+ ). 18 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER Choose ℓk+1 ∈ α((O ∩ H)+ ) such that αN +k+1 (xhk )ℓk+1 ∈ O. There exists an α-regressive trajectory (gn )n∈N0 for ℓk+1 such that gn ∈ O ∩ H for all n ≥ 1. We define hk+1 := hk gN +k+1 . Then hk+1 ∈ h0 (O∩H) and αN +k+1 (xhk+1 ) ∈ O. Moreover, αN +k+1 (xhk+1 ) = αN +k+1 (x)αN +k+1 (hk+1 ) ∈ V H and thus αN +k+1 (xhk+1 ) ∈ O ∩ V H = V (O ∩ H). For all j ∈ {0, . . . , k}, we have αN +j (xhk+1 ) = αN +j (xhk )αN +j (gN +k+1 ) = αN +j (xhk )gk−j+1 ∈ V (O ∩ H) as well, whence hk+1 is as desired. This completes the recursive construction. Let h be an accumulation point of the sequence (hi )i∈N0 in h0 (O ∩ H) ⊆ H. Then αn (xh) is in the compact set V (O ∩ H) for all n ≥ N , and so αn (xh) ∈ O. Thus xh ∈ con(α, O). As also xh ∈ con(α, H), Lemma 2.11 shows that xh ∈ con(α, O ∩ H). Hence αn (xh) → e modulo (O ∩ H)+ ∩ (O ∩ H)− , by Lemma 2.12. 3.3: For the proofs of Theorem A and Theorem B we recall that a topological group is metrizable if and only if it is Hausdorff and first-countable, see for instance [11, (8.3)]. Proof. (Theorem A, for metrizable G). The inclusion con(α)H ⊆ con(α, H) is trivial. To establish the converse inclusion, we adapt the proof of [1, Theorem 3.8]: Since G is assumed metrizable, using 3.3 we find a sequence O1 ⊇ O2 ⊇ · · · of compact open subgroups of G which form a basis of identity neighbourhoods. Set H0 := H and Hj := (Oj ∩ Hj−1 )+ ∩ (Oj ∩ Hj−1 )− ⊆ Oj ∩ Hj−1 for j ∈ N. Let x0 ∈ con(α, H). We claim that, for j ∈ N, there exist elements xj ∈ xj−1 Hj−1 and integers Nj ∈ N0 such that αn (xj ) → e modulo Hj and αn (xj ) ∈ Oj for all n ≥ Nj . Lemma 3.2 (with x0 in place of x and O1 in place of O) provides h0 ∈ H0 = H and N1 ∈ N0 such that x1 := x0 h0 satisfies αn (x1 ) ∈ O1 for all n ≥ N1 and αn (x1 ) → e modulo (O1 ∩ H)+ ∩ (O1 ∩ H)− = H1 . This shows the case j = 1. ENDOMORPHISMS OF T.D.L.C. GROUPS 19 If x1 , . . . , xj have been constructed, we can apply Lemma 3.2 with xj in place of x, Oj+1 in place of O and Hj in place of H. We obtain an hj ∈ Hj and Nj+1 ∈ N0 such that xj+1 := xj hj satisfies αn (xj+1 ) ∈ Oj+1 for all n ≥ Nj+1 and αn (xj+1 ) → e modulo (Oj+1 ∩Hj )+ ∩(Oj+1 ∩Hj )− = Hj+1 . This completes the recursive construction. Note that xi ∈ xj Hj · · · Hi−1 ⊆ xj Oj · · · Oi−1 = xj Oj for all i ≥ j ≥ 1. Hence (xj )j∈N0 is a Cauchy sequence in G (for the left uniform structure) and hence convergent, as G is locally compact and therefore complete by [2, Paragraph 3.3, Corollary 1]. Let y := lim xn n→∞ and h := x−1 0 y. Since xj ∈ x0 H0 · · · Hj−1 ⊆ x0 H for all j ∈ N, passing to the limit we deduce that y ∈ x0 H and thus h ∈ H. To see that y ∈ con(α), let W ⊆ G be an identity neighbourhood. After shrinking W , we may assume that W = Oj for some j ∈ N. As xi ∈ xj Hj · · · Hi−1 ⊆ xj Hj for all i ≥ j, we deduce that y ∈ xj Hj and thus αn (y) ∈ αn (xj )αn (Hj ) = αn (xj )Hj ⊆ Oj Oj = Oj = W for all n ≥ Nj . Hence y ∈ con(α), which completes the proof. 4. Proof of Theorem B for metrizable G In this section we prove Theorem B for metrizable G, using the following analogue of Lemma 3.2. Lemma 4.1: Let G be a totally disconnected, locally compact group. Let α : G → G be an endomorphism and H ⊆ G be an α-invariant closed subgroup. Let O ⊆ G be a compact open subgroup, x ∈ con− (α, H) and (xn )n∈N0 be an α-regressive trajectory for x such that xn → e modulo H. Then there exist N ∈ N0 and an α-regressive trajectory (yn )n∈N0 such that yn ∈ O for all n ≥ N , yn ∈ xn H for all n ∈ N0 , and yn → e modulo (H ∩ O)+ ∩ (H ∩ O)− . 20 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER T Proof. By Lemma 3.1, after replacing O with ℓj=0 α−j (O) for some ℓ ∈ N0 , we may assume that O ∩ H is tidy above for α|H , i.e., (15) H ∩ O = (H ∩ O)+ (H ∩ O)− . We choose a compact open subgroup V ⊆ O such that α(V ) ⊆ O. Since xn → e modulo H, there exists N ∈ N0 such that xn ∈ V H for all n ≥ N . We show by induction that there exist elements zj ∈ xN +j H for j ∈ N0 with αi (zj ) ∈ V (H ∩ O) for all i ∈ {0, 1, . . . , j}. Since xN ∈ V H, we have xN ∈ z0 H for some z0 ∈ V . Then z0 is as required. If j ∈ N0 and zj has already been found, then zj ∈ xN +j H implies that zj = xN +j a for some a ∈ H. Since xN +j+1 ∈ V H, we can write xN +j+1 = vb with v ∈ V and b ∈ H. Thus zj = xN +j a = α(xN +j+1 )a = α(v)α(b)a, with α(b) ∈ α(H) ⊆ H. Since zj ∈ V (H ∩ O) ⊆ O and α(v) ∈ α(V ) ⊆ O, we conclude that α(b)a ∈ H ∩ O and thus α(b)a = h+ h− for suitable h+ ∈ (H ∩O)+ and h− ∈ (H ∩O)− . Since α((H ∩O)+ ) ⊇ (H ∩O)+ , we find h ∈ (H ∩ O)+ such that h+ = α(h). Thus zj+1 := vh ∈ V (H ∩ O)+ ⊆ V (H ∩ O) and α(zj+1 ) = α(v)h+ = zj (h− )−1 , entailing that for i ∈ {1, . . . , j + 1} αi (zj+1 ) = ∈ αi−1 (α(zj+1 )) = αi−1 (zj )αi−1 (h− )−1 V (H ∩ O)(H ∩ O)− = V (H ∩ O). This completes the induction. (j) For j ∈ N0 , define the sequence g (j) = (gi )i∈N0 in V (H ∩ O) via ( αj−i (zj ) if i ∈ {0, . . . , j}; (j) gi := e if i > j. ENDOMORPHISMS OF T.D.L.C. GROUPS 21 Then (g (j) )j∈N0 is a sequence in the compact space (V (H ∩ O))N0 and hence has a convergent subnet (g (ja ) )a∈A , whose limit f = (fi )i∈N0 is an α-regressive trajectory by Lemma 2.3 (a). Then also ( fn−N if n ≥ N yn := αN −n (f0 ) if n ∈ {0, 1, . . . , N } is an α-regressive trajectory. Let i ∈ N0 ; since (j) gi = αj−i (zj ) ∈ xN +i H for all j ≥ i and xN +i H is closed, we deduce that yN +i = fi ∈ xN +i H. In particular, f0 = xN h0 for some h0 ∈ H and thus also yn = αN −n (fN ) = αN −n (xN )αN −n (h0 ) = xn αN −n (h0 ) ∈ xn H for n ∈ {0, 1, . . . , N }. Since yn ∈ V (H ∩ O) ⊆ O for n ≥ N , we have yn → e modulo O. As yn ∈ xn H and xn → e modulo H, also yn → e modulo H. Hence yn → e modulo H ∩ O, by Lemma 2.10, and thus yn → e modulo (H ∩ O)+ ∩ (H ∩ O)− , by Lemma 2.12. Proof. (Theorem B). The inclusion con− (α)H ⊆ con− (α, H) is trivial. Let (0) y0 ∈ con− (α, H). Thus y0 has an α-regressive trajectory (yn )n∈N0 with yn(0) → e modulo H. Let (O(j) )j∈N be a sequence of compact open subgroups O(1) ⊇ O(2) ⊇ · · · of G which forms a basis of identity neighbourhoods. Set H0 := H and Hj := (O(j) ∩ Hj−1 )+ ∩ (O(j) ∩ Hj−1 )− ⊆ O(j) ∩ Hj−1 for j ∈ N. We claim that there exist integers Nj ∈ N0 for j ∈ N and α-regressive trajecto(j) ries y (j) = (yn )n∈N0 such that yn(j) → e modulo Hj , (j) (j) (j−1) yn ∈ W (j) for all n ≥ Nj , and yn ∈ yn Hj−1 for all n ∈ N0 . Lemma 4.1 (with y0 in place of x and O(1) in place of O) provides N1 ∈ N0 and (1) (0) (1) an α-regressive trajectory (yn )n∈N0 with yn ∈ yn H for all n ∈ N0 , yn(1) ∈ O(1) for all n ≥ N1 , 22 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER and y (1) → e modulo (O(1) ∩H)+ ∩(O(1) ∩H)− = H1 . This shows the case j = 1. (1) (j) If N1 , . . . , Nj and α-regressive trajectories (yn )n∈N0 , . . . (yn )n∈N0 have been (j) (j) constructed, we can apply Lemma 4.1 with y0 in place of x, (yn )n∈N0 in place of (xn )n∈N0 , O(j+1) in place of O and Hj in place of H. We obtain an (j+1) )n∈N0 such integer Nj+1 ∈ N0 and an α-regressive trajectory y (j+1) = (yn (j+1) (j+1) (j) that yn ∈ O(j+1) for all n ≥ Nj+1 , and moreover yn ∈ yn Hj for all (j+1) n ∈ N0 and yn → e modulo (O(j+1) ∩ Hj )+ ∩ (O(j+1) ∩ Hj )− = Hj+1 . This completes the recursive construction. (j+1) (j) (j) (j) We have yn ∈ yn Hj ⊆ yn O(j) ⊆ yn O(1) for all n ∈ N0 and j ∈ N. Hence Q (1) (j) (1) (1) yn ∈ yn O for all j ∈ N and n ∈ N0 , showing that y (j) ∈ n∈N0 yn O(1) for all j ∈ N. The product being compact and metrizable, we find a convergent Q (1) subsequence of (y (j) )j∈N , with limit z = (zn )n∈N0 ∈ n∈N0 yn O(1) , say. As each y (j) is an α-regressive trajectory and α is continuous, we see that also (j) (0) (zn )n∈N0 is an α-regressive trajectory. Since y0 ∈ y0 H = y0 H for each j ∈ N and y0 H is closed, we have z0 ∈ y0 H. (i) (j) If j ∈ N and n ∈ N0 , then yn ∈ yn O(j) for all i ≥ j, entailing that also (j) zn ∈ yn O(j) . Hence zn ∈ O(j) for all n ≥ Nj , whence zn → e and thus z0 ∈ con− (α). 5. Metrizable quotient groups This section prepares the discussion of endomorphisms of non-metrizable groups. As in the case of automorphisms treated in [13], we consider metric quotients of such as a tool. Lemma 5.1: Let G be a locally compact group and N a compact normal subgroup. Then the following conditions are equivalent: (a) G/N is metrizable. (b) There exists a sequence (Vn )n∈N of open identity neighbourhoods Vn ⊆ T G such that n∈N Vn = N . Proof. Let q : G → G/N , x 7→ xN be the canonical quotient map, which is continuous and open. (a)⇒(b): If G/N is metrizable, then G/N has a countable basis {Wn : n ∈ N} of open identity neighbourhoods, and the sets Vn := q −1 (Wn ) (n ∈ N) are as desired. ENDOMORPHISMS OF T.D.L.C. GROUPS 23 (b)⇒(a): Let (Vn )n∈N be a sequence of open identity neighbourhoods in G with intersection N . As N is compact, the open neighbourhood Vn of N contains a uniform neighbourhood of the form Kn N , for some identity neighbourhood Kn ⊆ G. Since G is locally compact, Kn can be chosen compact. We may also assume that K1 ⊇ K2 ⊇ · · · . Thus U := {q(Kn ) : n ∈ N} T is a filter basis of compact identity neighbourhoods in G/N . Now n∈N q(Kn ) = {e} (as the sets q −1 (q(Kn )) = Kn N have intersection N ), entailing that U converges to {e}. Thus U is a countable basis of identity neighbourhoods in G/N and thus G/N is metrizable by 3.3. Lemma 5.2: Let G be a locally compact group and N be a countable set of closed normal subgroups N ⊆ G such that G/N is metrizable. Set M := T N ∈N N . Then also G/M is metrizable. Proof. For N ∈ N , let qN : G → G/N be the canonical quotient map. Also, let qM : G → G/M be the canonical quotient map. Then Y φ := (qN )N ∈N : G → G/N, x 7→ (xN )N ∈N N ∈N is a continuous homomorphism to a metrizable topological group. As the kernel is ker(φ) = M , the induced continuous homomorphism Y φ : G/M → G/N N ∈N (determined by φ ◦ qM = φ) is injective. If K ⊆ G is a compact identity neighbourhood in G, then qM (K) is a compact identity neighbourhood in G/M . Since φ(qM (K)) is metrizable and φ restricts to a homeomorphism from the compact set qM (K) onto φ(qM (K)), we see that qM (K) is metrizable. Since qM (K) is an identity neighbourhood in G/M , this topological group has a countable basis of identity neighbourhoods and hence is metrizable. The following fact will be used in the proofs of the non-metrizable case of Theorem A and Theorem B. Remark 5.3: If G is a locally compact group, M ⊆ G a σ-compact subset and α : G → G an endomorphism, then there exists an α-invariant, σ-compact open 24 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER subgroup S ⊆ G such that M ⊆ S. To see this, let V ⊆ G be a compact identity neighbourhood. Then the subgroup S of G generated by the σ-compact set [ αn (M ∪ V ) n∈N0 is σ-compact and open. Moreover, M ⊆ S and α(S) ⊆ S. Lemma 5.4: Let G be a σ-compact, locally compact group, and α : G → G be an endomorphism. Let K be the set of all compact, normal subgroups K ⊆ G T such that α(K) ⊆ K and G/K is metrizable. Then K = {e}. Proof. Let U ⊆ G be a neighbourhood of e. By [11, (8.7)], G has a compact, normal subgroup N such that N ⊆ U and G/N is metrizable. Hence \ N= Vn n∈N for suitable open identity neighbourhoods Vn ⊆ G, by Lemma 5.1. Then \ \ \ α−m (N ) = K := α−m (Vn ) m∈N0 m∈N0 n∈N is an α-invariant, compact normal subgroup of G contained in U . As K is an intersection of a countable set of open identity neighbourhoods, G/K is metrizable (by Lemma 5.1). The following fact, whose proof is left to the reader, is useful for our purposes. Lemma 5.5: Let (I, ≤) be a directed set and S := ((Gj )j∈I , (qi,j )i≤j ) be a projective system of topological groups Gj and continuous homomorphisms qi,j : Gj → Gi . Let G be a topological group and (qj )j∈I be a family of continuous homomorphisms qj : G → Gj such that qi,j ◦ qj = qi for i ≤ j in I. If T j∈I ker(qj ) = {e} and qj is a quotient homomorphism with compact kernel for each j ∈ I, then (G, (qj )j∈I ) is the projective limit of S. Remark 5.6: (a) In the situation of Lemma 5.5, let (xj )j∈I be a family of elements xj ∈ Gj such that xi = qi,j (xj ) if i ≤ j. Then (xj )j∈I ∈ P , where P is the standard realization of the projective limit. Thus there exists a unique element x ∈ G such that qj (x) = xj for all j ∈ I. (b) In the situation of Lemma 5.5, assume that H ⊆ G is a closed subgroup. Then (H, (qj |H )j∈I ) is the projective limit of ((qj (H))j∈I , (qij |qj (H) )i≤j ). In fact, since qj is a quotient homomorphism with compact kernel, it is a closed ENDOMORPHISMS OF T.D.L.C. GROUPS 25 mapping (see [11, (5.18)]), whence qj |H : H → qj (H) is a surjective, continuous, closed mapping and hence a quotient map. We can therefore apply Lemma 5.5 with H in place of G. Definition 5.7: If α is an endomorphism of a σ-compact, totally disconnected, locally compact group G, then there exists a non-empty set K of α-invariant, compact normal subgroups K ⊆ G such that G/K is metrizable for each K ∈ K T and K = {e} (see Lemma 5.4). Let κ(G, α) := |K| be the minimum cardinality of such K. It is not difficult to see that κ(G, α) equals the character of G in the situation of Definition 5.7 unless G is first-countable in which case κ(G, α) = 1 as we may choose K := {e}. Notably, κ(G, α) is independent of α. We suppress the details as the additional information shall not be used. 6. Proof of Theorem A for non-metrizable G To pass from metrizable to general groups in Theorem A, we could adapt the arguments from [13]. However, as the treatment of Theorem B requires a different approach, we prefer to apply this new approach also to Theorem A. Definition 6.1: We say that an endomorphism α of a topological group G has the decomposition property if con(α, K) = con(α)K for each α-invariant compact subgroup K ⊆ G. Lemma 6.2: Let α be an endomorphism of a topological group G and x ∈ con(α, H) for an α-invariant compact subgroup H ⊆ G. Let q : G → Q be a quotient homomorphism to a topological group Q with α-invariant kernel N . Let α : Q → Q be the map determined by α ◦ q = q ◦ α. Let y ∈ con(α) ⊆ Q with y ∈ q(x)q(H). Then there exists y ∈ con(α, H ∩ N ) such that (16) q(y) = y and y ∈ xH. If α has the decomposition property, then there exists y ∈ con(α) with (16). Proof. Let h ∈ H such that y = q(x)q(h). As q(xh) = y ∈ con(α), we have xh ∈ con(α, N ). Since x ∈ con(α, H) = con(α, H)H, we deduce xh ∈ con(α, H). Hence xh ∈ con(α, H ∩ N ), by Lemma 2.10 (and we can take y := xh). If α has the decomposition property, we can write xh = yn with y ∈ con(α) and n ∈ H ∩ N . Then y ∈ xH and q(y) = q(xh) = y. 26 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER 6.3: Let I be an interval of ordinal numbers of the form [0, k[ or [0, k]. Let α be an endomorphism of a topological group G and (Nj )j∈I be a family of α-invariant, compact normal subgroups Nj ⊆ G such that Nj ⊆ Ni for i ≤ j in I. For j ∈ I, let qj : G → G/Nj be the canonical quotient map and αj be the endomorphism of G/Nj determined by αj ◦ qj = qj ◦ α. For i ≤ j, let qi,j : G/Nj → G/Ni be the map determined by qi,j ◦ qj = qi . Then ((G/Nj )j∈I , (qi,j )i≤j ) (with i, j ∈ I) is a projective system of topological groups. The next lemma is a variant of [13, Lemma 7]. Lemma 6.4: Let 0 6= k be a limit ordinal, α an endomorphism of a topological group G and (Nj )j∈[0,k[ be a family of α-invariant, compact normal subgroups T Nj ⊆ G such that Nj ⊆ Ni for i ≤ j in [0, k[. Let Nk := j∈[0,k[ Nj and use notation as in 6.3 with I := [0, k]. Let H ⊆ G be an α-invariant closed subgroup and x ∈ con(α, H). Assume that, for each j ∈ [0, k[, an element yj ∈ con(αj ) ⊆ G/Nj is given such that (17) qi,j (yj ) = yi (18) yj ∈ qj (x)qj (H) for all i ≤ j in [0, k[, and for all j ∈ [0, k[. Then there is a unique element yk ∈ G/Nk such that (19) qi,k (yk ) = yi for all i ∈ [0, k[. Moreover, yk ∈ con(αk ) ⊆ G/Nk and (20) yk ∈ qk (x)qk (H). Proof. By Lemma 5.5, G/Nk is the projective limit of the projective system ((G/Nj )j∈[0,k[ , (qi,j )i≤j ), with the limit maps qi,k . Thus, the identities (17) determine a unique element yk ∈ G/Nk such that (19) holds. By Remark 5.6 (b), qk (H) is the projective limit of its quotients qi (H) for i ∈ [0, k[, with the limit maps qi,k |qk (H) : qk (H) → qi (H). Since qi,k (qk (x)−1 yk ) = qi (x)−1 yi ∈ qi (H) for all i ∈ [0, k[, we deduce that qk (x)−1 yk ∈ qk (H). To see that yk ∈ con(αk ), let U ⊆ G/Nk be −1 an identity neighbourhood. Then qi,k (V ) ⊆ U for some i ∈ [0, k[ and identity ENDOMORPHISMS OF T.D.L.C. GROUPS 27 neighbourhood V ⊆ G/Ni . Since limn→∞ (αi )n (qi (yi )) = e, there is n0 ∈ N such that qi,k ((αk )n (yk )) = (αi )n (yi ) ∈ V −1 for all n ≥ n0 and thus (αk )n (yk ) ∈ qi,k (V ) ⊆ U . The following lemma is a variant of [13, Lemma 8]. Lemma 6.5: Let k > 0 be an ordinal number, α be an endomorphism of a topological group G and (Nj )j∈[0,k[ be a family of α-invariant, compact normal subgroups Nj ⊆ G such that Nj ⊆ Ni for all i ≤ j in [0, k[ and \ Ni Nj = i<j for each limit ordinal 0 6= j ∈ [0, k[. Let H ⊆ G be an α-invariant compact subgroup and x ∈ con(α, H) ⊆ G. Use notation as in 6.3 with I := [0, k[. Assume that αj has the decomposition property for each j ∈ [0, k[. Then there exist elements yj ∈ con(αj ) ⊆ G/Nj for j ∈ [0, k[, such that conditions (17) and (18) from Lemma 6.4 are satisfied. Proof. For all j ∈ [0, k[, we have qj (x) ∈ con(αj , qj (H)), by Lemma 2.13 (b). Let M be the set of all families (yj )j∈[0,ℓ[ with ℓ ∈ ]0, k] such that (17) and (18) are satisfied, with ℓ in place of k. Since α0 has the decomposition property and q0 (x) ∈ con(α0 , q0 (H)), there exists y0 ∈ con(α0 ) such that y0 ∈ q0 (x)q0 (H). Then (yj )j∈{0} ∈ M and thus M 6= ∅. For f = (yj )j∈[0,ℓ[ and g = (yj′ )j∈[0,ℓ′ [ in M , write f ≤ g if ℓ ≤ ℓ′ and f = g|[0,ℓ[ . To see that (M, ≤) is inductively ordered, let Γ be a totally ordered subset of M . If Γ = ∅, then every element of M (which is non-empty) is an upper bound for Γ. If Γ 6= ∅, write [0, ℓf [ for the domain of f ∈ Γ. Let ℓ = sup{ℓf : f ∈ Γ} ∈ ]0, k]. Then the union of the graphs of the f ∈ Γ is the graph of a function g ∈ M which is an upper bound for Γ. Thus (M, ≤) is inductively ordered and thus M has a maximal element f = (yj )j∈[0,ℓ[ , by Zorn’s Lemma. If ℓ = k, then the assertion of the lemma holds for α. If ℓ < k, we obtain a contradiction because f could then be extended to an element of M defined on [0, ℓ] = [0, ℓ + 1[, as we now verify. It suffices to find an element yℓ ∈ con(αℓ ) ⊆ G/Nℓ such that (19) and (20) are satisfied, with ℓ in place of k. If ℓ is a limit ordinal, then Lemma 6.4 yields yℓ ∈ con(αℓ ) as desired. 28 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER If ℓ has a precursor j, we apply Lemma 6.2 with G/Nℓ , the quotient map qj,ℓ : G/Nℓ → G/Nj , αℓ , qℓ (Nj ), qℓ (H), qℓ (x), and yj in place of G, q, α, N , H, x, and y, respectively. Since αℓ has the decomposition property, we obtain yℓ ∈ con(αℓ ) ⊆ G/Nℓ such that qj,ℓ (yℓ ) = yj and yℓ ∈ qℓ (x)qℓ (H). Proof. (Theorem A, completed). We show by transfinite induction on cardinals k ≥ 1 that each endomorphism α of a σ-compact, totally disconnected, locally compact group G with κ(G, α) ≤ k has the decomposition property (where κ(G, α) is as in Definition 5.7). If k ≤ ℵ0 , then κ(G, α) ≤ ℵ0 implies that G is metrizable (see Lemma 5.2); thus α has the decomposition property (as verified in Section 3). Let k > ℵ0 now and assume that all endomorphisms β of σ-compact, totally disconnected, locally compact groups H with κ(H, β) < k have the decomposition property. The assertion will hold for k if we can show that every endomorphism α of a σ-compact, totally disconnected, locally compact group G with κ(G, α) = k has the decomposition property. In this situation, we choose a set K with |K| = k as in Definition 5.7 and a bijection [0, k[ → K, We define Nj := \ Ki j 7→ Kj . for all j ∈ ]0, k[ and N0 := N1 . i<j This yields a decreasing family (Nj )j∈[0,k[ of α-invariant, compact normal subT groups of G with Nj = i<j Ni for each limit ordinal 0 6= j ∈ [0, k[. For j ∈ [0, k[, let qj : G → G/Nj be the canonical quotient map and αj be the endomorphism of G/Nj induced by α. Then Kj := {qj (Ki ) : i < j} is a set of cardinality at most j which has the properties of K required in Definition 5.7, with G/Nj in place of G and αj in place of α. Hence κ(G/Nj , αj ) ≤ |Kj | ≤ j < k, and thus αj has the decomposition property. Note that k, being an infinite cardinal, is a limit ordinal. Given x ∈ con(α, H) ⊆ G, we apply Lemma 6.5 to find yj ∈ con(αj ) ⊆ G/Nj for j ∈ [0, k[ such that (17) and (18) are satisfied. Now T Lemma 6.4 provides y ∈ G ∼ = G/ j<k Nj such that αn (y) → e and x−1 y ∈ H. Hence α has the decomposition property, as required. Now let α be an endomorphism of a totally disconnected, locally compact ENDOMORPHISMS OF T.D.L.C. GROUPS 29 group G which need not be σ-compact. Let H ⊆ G be an α-stable closed subgroup or an α-invariant compact subgroup. Given x ∈ con(α, H), Lemma 3.2 provides an h ∈ H such that xh ∈ con(α, K) with K := (O ∩ H)+ ∩ (O ∩ H)− . As observed in Remark 5.3, G has an α-invariant σ-compact open subgroup S such that K ∪ {xh} ⊆ S. Now, by Lemma 2.15 (a), xh ∈ con(α, K) ∩ S = con(α|S , K). Since α|S has the decomposition property (as S is σ-compact), we find y ∈ con(α|S ) ⊆ con(α) and k ∈ K such that xh = yk. Thus x = ykh−1 ∈ con(α)KH = con(α)H. 7. Theorem B for non-metrizable G To deal with anti-contraction groups (rather than contraction groups), we need to consider regressive trajectories rather than individual group elements. This consideration leads to the following analogue of Definition 6.1. Definition 7.1: Let α be an endomorphism of a topological group G. We say that α-regressive trajectories decompose if, for each α-invariant closed subgroup H ⊆ G and α-regressive trajectory (xn )n∈N0 such that xn → e modulo H, there exists an α-regressive trajectory (yn )n∈N0 with yn ∈ xn H for all n ∈ N0 and limn→∞ yn = e. Then con− (α, H) = con− (α)H in particular (since x0 = y0 h for some h ∈ H, we have con− (α, H) ⊆ con− (α)H; the converse inclusion is trivial). Lemma 7.2: Let α be an endomorphism of a topological group G and (xn )n∈N0 be an α-regressive trajectory in G such that xn → e modulo H for some α-invariant closed subgroup H ⊆ G. Let N ⊆ G be an α-invariant, compact normal subgroup and q : G → G/N be the canonical quotient map. Let α : G/N → G/N be the induced map determined by α ◦ q = q ◦ α and (y n )n∈N0 be an α-regressive trajectory in G/N such that y n ∈ q(xn )q(H) for each n ∈ N0 . Then there exists an α-regressive trajectory (yn )n∈N0 in G such that q(yn ) = y n and yn ∈ xn H for all n ∈ N0 . If y n → e as n → ∞ and xn → e modulo H, then yn → e modulo H ∩ N . 30 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER Proof. For each n ∈ N0 , there is hn ∈ H such that y n = q(xn )q(hn ). We (m) let (z (m) )m∈N0 = ((zn )n∈N0 )m∈N0 be the double sequence associated with (xn hn )n∈N0 (as in Definition 2.4). Given n ∈ N0 , we have q(zn(m) ) = q(αm−n (xm hm )) = αm−n (q(xm hm )) = αm−n (y m ) = y n = q(xn hn ) (m) for all m ≥ n. Moreover, zn = αm−n (xm hm ) = xn αm−n (hm ) ∈ xn H. Thus (m) zn is contained in the compact set xn (H ∩ hn N ) for all m ≥ n (and always in xn (H ∩hn N )∪{e}), whence (z (m) )m∈N0 has an accumulation point y = (yn )n∈N0 Q in n∈N0 xn (H ∩ hn N ). Then q(yn ) = q(xn hn ) = y n and yn ∈ xn H. By Lemma 2.3, (yn )n∈N0 is an α-regressive trajectory. If q(yn ) = y n → e, then yn → e modulo N . If, moreover, xn → e modulo H, then yn ∈ xn H implies that also yn → e modulo H. Hence yn → e modulo H ∩ N (by Lemma 2.10), as N is compact. Lemma 7.3: Let 0 6= k be a limit ordinal, α be an endomorphism of a topological group G and (Nj )j∈[0,k[ be a family of α-invariant, compact normal T subgroups Nj ⊆ G such that Nj ⊆ Ni for i ≤ j in [0, k[. Let Nk := j∈[0,k[ Nj and use notation as in 6.3 with I := [0, k]. Let H ⊆ G be an α-invariant, closed subgroup and (xn )n∈N0 be an α-regressive trajectory in G such that xn → e modulo H. Assume that, for each j ∈ [0, k[, an αj -regressive trajectory (j) (yn )n∈N0 in G/Nj with lim yn(j) = e is given such that, for each n ∈ N0 , n→∞ (21) qi,j (yn(j) ) = yn(i) (22) yn(j) ∈ qj (xn )qj (H) for all i ≤ j in [0, k[, for all j ∈ [0, k[. (k) Then there are unique elements yn ∈ G/Nk such that qi,k (yn(k) ) = yn(i) (23) for all i ∈ [0, k[. (k) Moreover, (yn )n∈N0 is an αk -regressive trajectory in G/Nk which converges to e and yn(k) ∈ qk (xn )qk (H) (24) for all n ∈ N0 . Proof. By Lemma 5.5, G/Nk is the projective limit of the projective system ((G/Nj )j∈[0,k[ , (qi,j )i≤j ), with the limit maps qi,k . Thus, for n ∈ N0 , (k) (21) determines a unique yn ∈ G/Nk with (23) (see Remark 5.6 (a)). As (k) (k) (i) qi,k (αk (yn+1 )) = αi (qi,k (yn+1 )) = αi (yn+1 ) = yn(i) = qi,k (yn(k) ) for all i ∈ [0, k[, ENDOMORPHISMS OF T.D.L.C. GROUPS (k) (k) 31 (k) we have αk (yn+1 ) = yn . Thus (yn )n∈N0 is an αk -regressive trajectory. Now qk (H) is the projective limit of its quotients qi (H) for i ∈ [0, k[, with the limit maps qi,k |H : H → qi,k (H) (see Remark 5.6 (b)). Since qi,k (qk (xn )−1 yn(k) ) = qi (xn )−1 yn(i) ∈ qi (H) for all i ∈ [0, k[, (k) (k) we deduce that qk (x)−1 yn ∈ qk (H). To see that yn → e, let U ⊆ G/Nk be −1 an identity neighbourhood. Then qi,k (V ) ⊆ U for some i ∈ [0, k[ and identity (i) neighbourhood V ⊆ G/Ni . Since qi (yn ) → e, there is n0 ∈ N such that qi,k (yn(k) ) = yn(i) ∈ V (k) −1 for all n ≥ n0 and thus yn ∈ qi,k (V ) ⊆ U . Lemma 7.4: Let k be an ordinal number, α be an endomorphism of a topological group G and (Nj )j∈[0,k[ be a family of α-invariant, compact normal subgroups Nj ⊆ G such that Nj ⊆ Ni for all i ≤ j in [0, k[ and \ Ni Nj = i<j for each limit ordinal 0 6= j ∈ [0, k[. Let H ⊆ G be an α-invariant closed subgroup. Let (xn )n∈N0 be an α-regressive trajectory in G such that xn → e modulo H. Using notation as in 6.3, assume that αj -regressive trajectories in G/Nj decompose for each j ∈ [0, k[. Then there exist αj -regressive trajectories (j) (yn )n∈N0 in G/Nj which converge to e, for all j ∈ [0, k[, such that conditions (21) and (22) from Lemma 7.3 are satisfied. Proof. For each j ∈ [0, k[, the sequence (qj (xn ))n∈N0 is an αj -regressive trajectory in G/Nj . Moreover, qj (xn ) → e modulo qj (H), by Lemma 2.13 (a). Let (j) M be the set of all families f = (yn )(j,n)∈[0,ℓ[ ×N0 with ℓ ∈ ]0, k] such that (21) and (22) are satisfied, with ℓ in place of k. Since α0 -regressive trajectories in G/N0 decompose and q0 (xn ) → e modulo q0 (H), there exists an α0 -regressive (0) trajectory (yn )n∈N0 such that (0) (0) yn ∈ q0 (xn )q0 (H) for all n ∈ N0 and yn → e. (j) (j) Then (yn )(j,n)∈{0}×N0 ∈ M and thus M 6= ∅. For f = (yn )(j,n)∈[0,ℓ[ ×N0 and (j) (zn )(j,n)∈[0,ℓ′ [ ×N0 in M , write f ≤ g if ℓ ≤ ℓ′ and f = g|[0,ℓ[ ×N0 . To see that g= (M, ≤) is inductively ordered, let Γ be a totally ordered subset of M . If Γ = ∅, then every element of M (which is non-empty) is an upper bound for Γ. If Γ 6= ∅, write [0, ℓf [ ×N0 for the domain of f ∈ Γ. Let ℓ = sup{ℓf : f ∈ Γ} ∈ ]0, k]. Then 32 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER the union of the graphs of the f ∈ Γ is the graph of a function g ∈ M which is an upper bound for Γ. Hence (M, ≤) is inductively ordered and thus M (j) has a maximal element f = (yn )(j,n)∈[0,ℓ[ ×N0 , by Zorn’s Lemma. If ℓ = k, then the assertion of the lemma holds for α and (xn )n∈N0 . If ℓ < k, we reach a (j) contradiction, as follows: Since [0, ℓ+1[ = [0, ℓ], we can extend (yn )(j,n)∈[0,ℓ[ ×N0 to a properly larger element in (M, ≤) if we can find an αℓ -regressive trajectory (ℓ) (ℓ) (yn )n∈N0 in G/Nℓ with yn → e such that (23) and (24) are satisfied, with ℓ in place of k. (ℓ) If ℓ is a limit ordinal, then Lemma 7.3 yields (yn )n∈N0 in G/Nℓ as desired (contradiction). If ℓ has a precursor j, we apply Lemma 7.2 with G/Nℓ , the quotient map (j) qj,ℓ : G/Nℓ → G/Nj , αℓ , qℓ (Nj ), qℓ (H), (qℓ (xn ))n∈N0 , and (yn )n∈N0 in place of G, q, α, N , H, (xn )n∈N0 , and (y n )n∈N0 , respectively. We obtain an αℓ regressive trajectory (yn )n∈N0 in G/Nℓ such that yn → e modulo qℓ (H) ∩ qℓ (Nj ) (j) and qj,ℓ (yn ) = yn as well as yn ∈ qℓ (xn )qℓ (H) for all n ∈ N0 . Since αℓ (ℓ) regressive trajectories decompose, we find an αℓ -regressive trajectory (yn )n∈N0 (ℓ) in G/Nℓ such that yn → e and yn(ℓ) ∈ yn (qℓ (H) ∩ qℓ (Nj )) ⊆ qℓ (xn )qℓ (H), (k) (j) whence qj,ℓ (yn ) = qj,ℓ (yn ) = yn . Again, a contradiction is obtained. Proof. (Theorem B, completed). We show by transfinite induction on cardinals k ≥ 1 that α-regressive trajectories decompose for each endomorphism α of a σ-compact, totally disconnected, locally compact group G such that κ(G, α) ≤ k (where κ(G, α) is as in Definition 5.7). If k ≤ ℵ0 , then κ(G, α) ≤ ℵ0 implies that G is metrizable (see Lemma 5.2); thus α-regressive trajectories decompose (as verified in Section 4). Let k > ℵ0 now and assume that β-regressive trajectories decompose for all endomorphisms β of σ-compact, totally disconnected, locally compact groups H with κ(H, β) < k. The assertion will hold for k if we can show that α-regressive trajectories decompose for each endomorphism α of a σ-compact, totally disconnected, locally compact group G such that κ(G, α) = k. In this situation, ENDOMORPHISMS OF T.D.L.C. GROUPS 33 we choose a set K with |K| = k as in Definition 5.7 and a bijection [0, k[ → K, j 7→ Kj . We define Nj := \ Ki for all j ∈ ]0, k[ and N0 := N1 . i<j This yields a decreasing family (Nj )j∈[0,k[ of α-invariant, compact normal subT groups of G with Nj = i<j Ni for each limit ordinal 0 6= j ∈ [0, k[. For j ∈ [0, k[, let qj : G → G/Nj be the canonical quotient map and αj be the endomorphism of G/Nj induced by α. Then Kj := {qj (Ki ) : i < j} is a set of cardinality ≤ j which has the properties of K required in Definition 5.7, with G/Nj in place of G and αj in place of α. Hence κ(G/Nj , αj ) ≤ |Kj | ≤ j < k, and thus αj -regressive trajectories decompose. Note that k, being an infinite cardinal, is a limit ordinal. Given an α-regressive trajectory (xn )n∈N0 in G, we (j) apply Lemma 7.4 to find αj -regressive trajectories (yn )n∈N0 for j ∈ [0, k[ such (j) that limn→∞ yn = e and both (21) and (22) are satisfied. Now Lemma 7.3 proT vides an α-regressive trajectory (yn )n∈N0 in G ∼ = G/ j<k Nj such that yn → e and x−1 n yn ∈ H for all n ∈ N0 . Hence α-regressive trajectories decompose, as required. Now let α be an endomorphism of a totally disconnected, locally compact group G which need not be σ-compact, H ⊆ G be an α-invariant closed subgroup and (xn )n∈N0 be an α-regressive trajectory such that xn → e modulo H. There exists a σ-compact, α-invariant open subgroup S ⊆ G which contains the countable (hence σ-compact) set {xn : n ∈ N0 } (see Remark 5.3). Then S ∩ H is an α|S -invariant closed subgroup of S and (xn )n∈N0 an α|S -regressive trajectory in S such that xn → e modulo S ∩ H (see Lemma 2.15 (b)). Since α|S -regressive trajectories decompose (by σ-compactness of S), there exists an α|S -regressive trajectory (yn )n∈N0 in S such that yn → e in S (hence in G) and yn ∈ xn (S ∩ H) ⊆ xn H for all n ∈ N0 . Thus α-regressive trajectories decompose. Notably, con(α, H) = con(α)H. 34 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER 8. Subgroups and quotients In this section, we generalize several results of [23] about how tidy subgroups and the scale behave with respect to taking subgroups and quotients from automorphisms to endomorphisms, paralleling the topological entropy study in [5]. 8.1: For many results in this section we rely on the tidying procedure from [26] which we shall outline for the benefit of the reader: Given a totally disconnected locally compact group G, an endomorphism α and U ∈ COS(G), the following steps produce a tidy subgroup for α. Tn (1) There exists n ∈ N such that U−n := k=0 α−k (U ) is tidy above for α. By replacing U with U−n we assume U is tidy above. (2) Define LU := {x ∈ G : ∃y ∈ U+ ∃m, n ∈ N with αm (y) = x and αn (x) ∈ U− } and LU := LU . e := {x ∈ U : xLU ⊆ LU U }. (3) Set U e LU is a compact open subgroup of G which is tidy for α. (4) Then U e LU = U . If the original subgroup U was already tidy, then U Subgroups. We first explore the effect of taking subgroups on tidiness and the scale. The following lemma shows that tidy subgroups behave well when passing to subgroups. It is applied in Proposition 8.3 which deals with the scale. Lemma 8.2: Let G be a totally disconnected, locally compact group, α an endomorphism of G and H ⊆ G a closed subgroup with α(H) ⊆ H. Further, let U ∈ COS(G) be tidy for α. Set V := U ∩ H. Then there is N ∈ N such that V−N is tidy for α|H . Proof. Note that V is a compact open subgroup of H. By [26, Proposition 3] there is N ∈ N such that V−N is tidy above for α. Since U is minimizing, the same proposition implies that U−N is tidy for α. By Lemma 3.1, replacing U by U−N , we may assume that V is tidy above for α|H . To see that this V is tidy, we show that LV ⊆ V where LV is given in 8.1. Since V ⊆ H is closed this implies that LV = LV ⊆ V and hence V is tidy below and therefore tidy for α|H by [26, Proposition 8]. First, note that \ V− = V−n = U− ∩ H n≥0 ENDOMORPHISMS OF T.D.L.C. GROUPS 35 (see (14)). Also, since V+ is the collection of all elements in V that admit an α-regressive trajectory in V = U ∩ H, it follows that V+ ⊆ U+ ∩ H. Now, suppose that x ∈ LV . Then x ∈ H and there are y ∈ V+ and m, n ∈ N such that αm (y) = x and αn (y) ∈ V− . By the above, y ∈ U+ and αn (y) ∈ U− . Therefore, x ∈ LU ∩ H. Since U is tidy for α we have LU ⊆ U and thus conclude x ∈ U ∩ H = V . This shows LV ⊆ V as required. Proposition 8.3: Let G be a totally disconnected, locally compact group, α an endomorphism of G and H ⊆ G a closed subgroup with α(H) ⊆ H. Then sH (α|H ) ≤ sG (α). Furthermore, if H is normal in G and U ∈ COS(G) is tidy for α such that U ∩H is tidy for α|H , then α((U ∩ H)+ )U+ is a subgroup of G and sH (α|H ) = [α((U ∩ H)+ )U+ : U+ ]. Proof. By Lemma 8.2 there is a tidy subgroup U ∈ COS(G) for α such that V := U ∩ H is tidy for α|H . In particular, sH (α|H ) = [α(V+ ) : V+ ] and sG (α) = [α(U+ ) : U+ ]. Define ϕ : α(V+ )/V+ → α(U+ )/U+ by setting ϕ(uV+ ) := uU+ for all uV+ ∈ α(V+ )/V+ . Clearly ϕ is well defined as V+ ⊆ U+ . For the first claim it suffices to show that ϕ is injective. Indeed, assume that ϕ(uV+ ) = ϕ(vV+ ) for some uV+ , vV+ ∈ α(V+ )/V+ . Then it follows that x := v −1 u ∈ α(V+ )∩U+ where α(V+ ) = α((U ∩H)+ ) ⊆ H. By [26, Lemma 1] we conclude x ∈ U ∩H ∩α(V+ ) = V ∩ α(V+ ) = V+ . For the second claim suppose that H is normal in G. It suffices to show that α((U ∩ H)+ )U+ = U+ α((U ∩ H)+ ): Indeed, this implies that α((U ∩ H)+ )U+ is a group and the assertion then follows from the previous paragraph. Now, (U ∩ H)0 := U ∩ H is a normal subgroup of U0 := U and (U ∩ H)n+1 := α((U ∩ H)n ) ∩ U ∩ H is normal in Un+1 := α(Un ) ∩ U for each n ∈ N0 by the following inductive argument: By the inductive hypothesis, (U ∩ H)n is normal in Un , whence α((U ∩ H)n ) is normal in α(Un ). Since U ∩ H is normal in U , it follows that α((U ∩ H)n ) ∩ U ∩ H is normal in α(Un ) ∩ U which completes the induction. As a consequence, \ \ Un . (U ∩ H)n is normal in U+ := (U ∩ H)+ := n∈N0 n∈N0 Let u ∈ U+ . Then u = α(w) for some w ∈ U+ . Applying α to (U ∩ H)+ w = w(U ∩ H)+ , we deduce that α((U ∩ H)+ )u = uα((U ∩ H)+ ). 36 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER Quotients. We now turn our attention to quotients. Again, we first consider tidy subgroups and then apply our findings to gain insight into the scale. Our first lemma is a tool that provides control over α-regressive trajectories. In the e are as in the tidying procedure, 8.1. following, LU and U Lemma 8.4: Let G be a totally disconnected, locally compact group and α an endomorphism of G. Further, let U ∈ COS(G) be tidy above for α. Then e LU = U e. U ∩U e ⊆ U ∩U e LU as U e ⊆ U and U e ⊆ U e LU . Now Proof. The definitions imply U e suppose x ∈ U ∩ U LU . We need to show xLU ⊆ LU U . Indeed, we have e LU LU = U e LU ⊆ LU U . xLU ⊆ U There are examples of automorphisms [23] and associated tidy below subgroups which do not behave well when passing to quotients. Lemma 8.6 shows that although we can not expect a tidy below subgroup to be tidy below when passing to a quotient, the original subgroup can be chosen such that the quotient is as close as possible to being tidy below using the tidying procedure. The proof of Lemma 8.6 relies on the following result which is immediate from the proof of [26, Lemma 16]. We state it for convenience. Lemma 8.5: Let G be a totally disconnected locally compact group and α an e where U is tidy above for α. Then for any endomorphism of G. Suppose u ∈ U e± . pair u± ∈ U± with u = u+ u− we have u± ∈ U Lemma 8.6: Let G be a totally disconnected, locally compact group, α an endomorphism of G and H ⊆ G a closed normal subgroup with α(H) ⊆ H. Denote by α the endomorphism induced by α on G/H and by q : G → G/H the quotient map. Then there is a compact open subgroup U of G such that (a) U tidy for α, (b) U ∩ H is tidy for α|H , and (c) q(U ) is tidy above for α and Lq(U) q(U ) = q(U )Lq(U) . Proof. Applying Lemma 8.2, choose V ∈ COS(G) which is tidy for α and such that V ∩ H is tidy for α|H . Then q(V ) is tidy above for α: On the one hand   \ \ \ α−n (q(V )) = q(V )− . q(V− ) = q  α−n (V ) ⊆ q(α−n (V )) = n≥0 n≥0 n≥0 ENDOMORPHISMS OF T.D.L.C. GROUPS 37 Also, V+ = {x ∈ V | there is an α-regressive trajectory for x in V } and therefore q(V+ ) ⊆ q(V )+ as α-regressive trajectories descend to the quotient. Combining the above we conclude q(V ) = q(V+ V− ) = q(V+ )q(V− ) ⊆ q(V )+ q(V )− . That is, q(V ) is tidy above for α. Now define U := V ∩ q −1 (q(V )e), where q(V )e is as in Step 3 of the tidying procedure, 8.1. Then q(U ) = q(V )e and hence q(U ) is tidy above for α by [26, Lemma 16]. In addition, by applying [26, Proposition 6 (3)] we see that Lq(U) = Lq(V )e = Lq(V ) . It follows from [26, Lemma 13] and q(U ) = q(V )e that q(U )Lq(U) = Lq(U) q(U ). Furthermore, V ∩ H ⊆ ker q ⊆ q −1 (q(V )e). Hence U ∩ H = V ∩ H ∩ q −1 (q(V )e) = V ∩ H is tidy for α|H . It remains to show that U is tidy for α. We begin by proving that U is tidy above for α. Let u ∈ U . Then since V is tidy above, u = v+ v− for some v± ∈ V± and we aim to show that v± ∈ U± . Note that q(u) = q(v+ )q(v− ) with q(v± ) ∈ q(V± ) ⊆ q(V )± . Since q(u) ∈ q(V )e, we deduce q(v± ) ∈ (q(V )e)± by applying Lemma 8.5. Since αn (v− ) ∈ V− and αn (q(v− )) ∈ (q(V )e)− for all n ≥ 0 we have q(αn (v− )) ∈ (q(V )e)− . Therefore, the orbit of v− ∈ V ∩ q −1 (q(V )e) = U stays in U and we conclude v− ∈ U− . As to v+ , choose an α-regressive trajectory (vi )i∈N0 for v+ contained in V+ . We will show this sequence is contained within U . It is clear that v0 = v+ ∈ U . Suppose for the purpose of induction that vn ∈ U . Applying [26, Lemma 15] we see that q(vn ) ∈ q(U ) ∩ q(V+ ) ⊆ q(V )e ∩ q(V )+ = (q(V )e)+ . There exists w ∈ (q(V )e)+ such that α(w) = q(vn ) = α(q(vn+1 )). Now w, q(vn ) and q(vn+1 ) are all elements of par− (α). By [26, Proposition 20], there exists b ∈ bik(α) such that q(vn+1 ) = wb. Since q(V )eLq(V ) is tidy, b ∈ q(V )eLq(V ) . Hence q(vn+1 ) ∈ q(V )eLq(V ) . By Lemma 8.4, q(vn+1 ) ∈ q(V )e which implies vn+1 ∈ U . Inductively vi ∈ U for all i ∈ N0 and so v+ ∈ U+ . To see that U is tidy below, note that V is tidy below and U ⊆ V . Hence LU ⊆ V+ ∩ V− . Clearly, q(V+ ∩ V− ) ⊆ Lq(V ) and so q(V+ ∩ V− ) ⊆ q(V )e. Hence V+ ∩ V− ⊆ U . As a consequence, LU ⊆ U which implies that U is tidy below, see [26, Proposition 8]. 38 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER In the following lemma, we factor the subgroup used to calculate the scale. Later on, we turn this into a factorization of the scale itself. Lemma 8.7: Let G be a totally disconnected, locally compact group, α an endomorphism of G and H ⊆ G a closed normal subgroup with α(H) ⊆ H. Denote by α the endomorphism induced by α on G/H. Then there is a closed subgroup J of G with α((H ∩ U )+ )U+ ⊆ J ⊆ α(U+ ) and sG/H (α) = [α(U+ ) : J]. Proof. Let U satisfy the conclusions of Lemma 8.6. Let q : G → G/H denote the quotient map. Then q(U )Lq(U) is tidy for α and sG/H (α) = [α(q(U )+ )Lq(U) : q(U )+ Lq(U) ] using [26, Proposition 4 and Proposition 6 (2)]. Now consider the map α(q(U )+ )/(α(q(U )+ ) ∩ q(U )+ Lq(U) ) → α(q(U )+ Lq(U) )/q(U )+ Lq(U) given by g(α(q(U )+ ) ∩ q(U )+ Lq(U) ) 7→ g(q(U )+ Lq(U) ). This map is well-defined as α(q(U )+ ) ∩ q(U )+ Lq(U) ) ⊆ q(U )+ Lq(U) . It is injective because any two elements in the domain which have the same image have coset representatives which differ by an element in α(q(U )+ ) ∩ q(U )+ Lq(U) . To see surjectivity, simply note that α(Lq(U) ) ⊆ Lq(U) ⊆ q(U+ )Lq(U) by [26, Lemma 6]. This shows sG/H (α) = (25) = [α(q(U )+ )Lq(U) : q(U )+ Lq(U) ] [α(q(U )+ ) : α(q(U )+ ) ∩ q(U )+ Lq(U) ]. We know that α(q(U )+ ) ∩ q(U )+ Lq(U) is closed in G/H because α and q are continuous, U is compact and Lq(U) is closed. Set  J := q −1 α(q(U )+ ) ∩ q(U )+ Lq(U) ∩ α(U+ ). By the above, J ⊆ α(U+ ) is a closed subgroup. To see α((H ∩ U )+ )U+ ⊆ J, note that (26) q(α((H ∩ U )+ )U+ ) = q(U+ ) ⊆ q(U )+ ⊆ α(q(U )+ ) ∩ q(U )+ Lq(U) =: S because α((H ∩ U )+ )U+ = U+ α((H ∩ U )+ ) and α((H ∩ U )+ ) is contained in H. The formula x.(yS) := q(x)yS for x ∈ α(U+ ) and y ∈ q(U+ ) ENDOMORPHISMS OF T.D.L.C. GROUPS 39 defines a left action of α(U+ ) on X := α(q(U+ ))/S which is transitive as q(α(U+ )) = α(q(U+ )). Since S ∈ X has stabilizer q −1 (S) ∩ α(U+ ) = J under the action, the Orbit Formula (as in [17, 1.6.1 (i)]) shows that [α(U+ ) : J] = |X| = [α(q(U+ )) : S]. Combining this with (26) and (25) we obtain sG/H (α) = [α(U+ ) : J]. Theorem 8.8: Let G be a totally disconnected, locally compact group, α an endomorphism of G and H ⊆ G a closed normal subgroup with α(H) ⊆ H. Denote by α the endomorphism induced by α on G/H. Then sH (α|H )sG/H (α) divides sG (α). Proof. Let U satisfy the conclusions of Lemma 8.6. By Lemma 8.7 there is a closed subgroup J of G such that U+ ⊆ α((U ∩ H)+ )U+ ⊆ J ⊆ α(U+ ). Recall that by Proposition 8.3, the set α((U ∩ H)+ )U+ is indeed a subgroup of G. Applying Lemma 8.7 and Proposition 8.3 yields sG (α) = [α(U+ ) : U+ ] = [α(U+ ) : J][J : α((U ∩ H)+ )U+ ][α((U ∩ H)+ )U+ : U+ ] = sG/H (α)[J : α((U ∩ H)+ )U+ ]sH (α|H ). which completes the proof. We end this section by considering the special case of nested subgroups inside par− (α) for which we achieve equality in Theorem 8.8. Lemma 8.9: Let G be a a totally disconnected locally compact group, α be an endomorphism of G and H ⊆ par− (α) a closed α-stable subgroup. Then par− (α|H ) = H. Proof. Suppose x ∈ H. We can find an α-regressive trajectory (x = x0 , x1 , . . .) which is contained in some compact set K. Since α(H) = H we can choose another α-regressive trajectory (x = y0 , y1 , . . .) such that yn ∈ H for all n ∈ N. Now yn , xn ∈ par− (α) for all n ∈ N and hence x−1 n yn ∈ bik(α). This shows yn ∈ xn bik(α) ⊆ K bik(α). Since both K and bik(α) are compact, K bik(α) is compact and hence K bik(α) ∩ H is a compact subset of H. This shows that (y0 , y1 , . . .) is bounded and hence x ∈ par− (α|H ). 40 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER The following result is known for automorphisms, see [8, Proposition 3.21 (2)]. In the case of automorphisms, the proof utilizes the modular function which is not defined for endomorphisms. Instead we consider the factoring of the scale given by Theorem 8.8. Proposition 8.10: Suppose α is an endomorphism of a totally disconnected locally compact group G and H ⊆ par− (α) is a closed α-stable subgroup. Also suppose that N ⊆ H is a closed normal α-stable subgroup. Denote by α the endomorphism induced by α|H on H/N . Then sH (α|H ) = sH/N (α)sN (α|N ). Proof. For simplicity, we write α for α|H as the enveloping group will play no further role. By Lemma 8.9, par− (α) = H and so if U ∈ COS(H) is tidy for α, then U = U+ by [26, Proposition 11]. By Lemma 8.2, we may assume that U ∩ N is tidy for α|N . Let q : H → H/N denote the quotient map. Choose U ∈ COS(H) satisfying conditions of Lemma 8.6 with respect to the normal subgroup N . From the proof of Theorem 8.8 we have sH (α) = sH/N (α)[J : α((U ∩ N )+ )U+ ]sN (α|N ), where J is given in the proof of Lemma 8.6 by J = q −1 (α(q(U )+ ) ∩ q(U )+ Lq(U) ) ∩ α(U+ ). It suffices to show J ⊆ α((U ∩ N )+ )U+ . Since q(U+ ) ⊆ q(U )+ , as seen in the proof of Lemma 8.6, and U+ = U we have q(U+ ) ⊆ q(U )+ ⊆ q(U ) = q(U+ ),  which gives equality throughout. Thus J = q −1 α(q(U )) ∩ q(U )Lq(U) ∩ α(U ). Since q(U ) is an open identity neighbourhood, we obtain q(U )Lq(U) = q(U )Lq(U) = q(U )Lq(U) . Suppose that x ∈ q −1 (q(U )Lq(U) ). We can write x = ul where u ∈ U and l ∈ q −1 (Lq(U) ). Consider q(l) = lN ∈ Lq(U) . There exists n ∈ N with αn (lN ) = αn (l)N ∈ q(U ). This implies αn (l)m ∈ U for some m ∈ N . Then αn (l)m has an α-regressive trajectory contained in U = U+ . Using that fact that N is assumed to be αstable, choose m′ ∈ N such that αn (m′ ) = m. Since [26, Proposition 20] implies that any two elements in the preimage of an element of par− (α) = H are equal modulo bik(α), we have lm′ ∈ U bik(α) by comparing αn (lm′ ) = αn (l)m with ENDOMORPHISMS OF T.D.L.C. GROUPS 41 the α-regressive trajectory for αn (l)m contained in U . But U is tidy and so bik(α) ⊆ U . Hence l ∈ U N and thus x ∈ U N . This shows that J ⊂ U N ∩α(U ). Suppose now that x ∈ U N ∩ α(U ). Then we can write x = un where u ∈ U and n ∈ N . Choose α-regressive trajectories (u = u0 , u1 , . . .), (un = v0 , v1 , . . .), and (n = n0 , n1 , . . .) such that ui , vi+1 ∈ U for all i ≥ 0 and ni ∈ N for all i ∈ N. Note that (un = u0 n0 , u1 n1 , . . .) is also an α-regressive trajectory. For all i ≥ 1 we have ui ni ∈ vi bik(α). Noting that bik(α) ⊆ U , we have ni ∈ U for all i ≥ 1. Then n1 ∈ (U ∩ N )+ and so n = n0 = α(n1 ) ∈ α((U ∩ N )+ ). As x = un, this shows x ∈ U α((U ∩ N )+ ) = α((U ∩ N )+ )U (with equality by Proposition 8.3). 9. Small tidy subgroups and Theorem D We now turn to Theorem D which characterizes admitting small tidy subgroups for an endomorphism in terms of its contraction group. The following link between (anti)-contraction groups and the subgroups of a compact open subgroup associated to tidiness is known for automorphisms (cf. [1, Proposition 3.16]). Lemma 9.1: Let α be an endomorphism of a totally disconnected, locally compact group G, and V ⊆ G be a compact open subgroup. Then V−− = con(α, V+ ∩ V− ) and V++ = con− (α, V+ ∩ V− ). Proof. If x ∈ con(α, V+ ∩ V− ), then there exists n ∈ N0 such that αm (x) ∈ V (V+ ∩ V− ) = V for all m ≥ n. Thus αk (αn (x)) ∈ V for all k ∈ N0 , whence αn (x) ∈ V− and hence x ∈ α−n (V− ) ⊆ V−− . Thus con(α, V+ ∩ V− ) ⊆ V−− If x ∈ V−− , there exists m ∈ N0 such that αm (x) ∈ V− and hence αn (x) = αn−m (αm (x)) ∈ V for all n ≥ m. Thus αn (x) → e modulo V . By Lemma 2.12, also αn (x) → e modulo V+ ∩ V− . If x ∈ con− (α, V+ ∩ V− ), let (xn )n∈N0 be an α-regressive trajectory for x such that xn → e modulo V+ ∩V− . There exists n ∈ N0 such that xm ∈ V (V+ ∩V− ) = V for all m ≥ n. Then (xn+m )m∈N0 is an α-regressive trajectory for xn in V , whence xn ∈ V+ and x0 = αn (xn ) ∈ αn (V+ ) ⊆ V++ . If x ∈ V++ , then x = αm (y) for some m ∈ N0 and y ∈ V+ . Let (yn )n∈N0 be an 42 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER α-regressive trajectory for y in V . Then x = αm (y), αm−1 (y), . . . , α(y), y = y0 , y1 , y2 , . . . is an α-regressive trajectory for x which eventually lies in V and hence converges to e modulo V . As it also converges to e modulo V+ ∩ V− (by Lemma 2.12), we see that x ∈ con− (α, V+ ∩ V− ). Lemma 9.2: Let α be an endomorphism of a totally disconnected, locally compact group G and V ⊆ G by a tidy subgroup for α. Then con(α) ⊆ con(α, V+ ∩ V− ) and con− (α) ⊆ con− (α, V+ ∩ V− ). Proof. Since V is tidy, both V−− = con(α, V+ ∩V− ) and V++ = con− (α, V+ ∩V− ) are closed in G (with equalities by Lemma 9.1). So con(α) ⊆ con(α, V+ ∩ V− ) and con− (α) ⊆ con− (α, V+ ∩ V− ). If α is an endomorphism of a totally disconnected locally compact group, we write TID(α) for the set of all tidy subgroups of α. The following auxiliary result will be improved in Proposition 12.2 (d). Lemma 9.3: Let α be an endomorphism of a totally disconnected, locally compact group G. Then con(α) ⊆ con(α) nub(α). Proof. For each V ∈ TID(α), we have con(α) ⊆ con(α, V+ ∩ V− ) ⊆ con(α, V ). and therefore   \ \ V con(α, V ) = con α, con(α) ⊆ V ∈TID(α) = V ∈TID(α) con(α, nub(α)) = con(α) nub(α), using Lemma 2.11 for the first equality and Theorem A for the last. The following result is known for automorphisms (cf. [1, Lemma 3.31 (3)]). Proposition 9.4: Let α be an endomorphism of a totally disconnected, locally compact group G and V ⊆ G be a compact open subgroup which is tidy above for α. Then V is tidy if and only if V contains the nub of α. Proof. If V is tidy, then V ⊇ nub(α) by definition of the nub. For the converse, assume that V is tidy above and V ⊇ nub(α). Since W1 ∩ W2 is tidy for all tidy subgroups W1 and W2 (see [26, Proposition 12]), TID(α) is a filter basis. By ENDOMORPHISMS OF T.D.L.C. GROUPS 43 Lemma 2.1, there exists W ∈ TID(α) such that W ⊆ V . Using both Lemma 9.1 and Theorem A twice, we see that V−− = con(α, V+ ∩ V− ) = con(α)(V+ ∩ V− ) = con(α)(W+ ∩ W− )(V+ ∩ V− ) = con(α, W+ ∩ W− )(V+ ∩ V− ) = W−− (V+ ∩ V− ). As W−− is closed and V+ ∩ V− is compact, V−− is closed. Hence V is tidy. The following proposition subsumes Theorem D. For the special case of automorphisms, see already [1, Theorem 3.32] (for metrizable G). Proposition 9.5: Let α be an endomorphism of a totally disconnected, locally compact group G. Then the following conditions are equivalent: (a) (b) (c) (d) α has small tidy subgroups. nub(α) = {e}. Every compact open subgroup V ⊆ G which is tidy above for α is tidy. con(α) is closed in G. Proof. The implication “(a)⇒(b)” is trivial, while “(b)⇒(c)” is immediate from Proposition 9.4. If (c) holds and U ⊆ G is an identity neighbourhood, pick a T compact open subgroup V ⊆ U . After replacing V with ℓj=0 α−j (V ) for some ℓ ∈ N0 , we may assume that V is tidy above for α and hence tidy, as we assume (c). Hence (c) implies (a). (b)⇒(d) holds by Lemma 9.3. (d)⇒(c): By Lemma 9.1 and Theorem A, we have V−− = con(α, V+ ∩ V− ) = con(α)(V+ ∩ V− ), which is closed in G as V+ ∩ V− is compact and we assume that con(α) is closed. Hence V is tidy. Tidy automorphisms were introduced in [6]. Definition 9.6: An endomorphism α of a totally disconnected, locally compact group is called tidy if it satisfies one (hence any) of the conditions (a)–(d) in Proposition 9.5. Corollary 9.7: Let α be an endomorphism of a totally disconnected, locally compact group G and H ⊆ G an α-invariant closed subgroup. If α is tidy, then also α|H is tidy. If H is also normal and compact, then the endomorphism α induced by α on G/H is tidy. 44 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER Proof. If α is tidy, then con(α) is closed in G by Proposition 9.5, whence con(α)∩H = con(α|H ) is closed in H. Thus α|H is tidy by the same proposition. Assume also H is normal in G and compact. Applying Theorem A, we have q −1 (con(α)) = con(α, H) = con(α)H which is closed since con(α) is closed by Proposition 9.5 and H is compact. Hence con(α) is closed and thus α is tidy, by Proposition 9.5. 10. Dynamics on par− (α) and lev(α) We now prove results involving the restriction of an endomorphism α : G → G to the anti-parabolic subgroup par− (α) or the Levi subgroup lev(α) = par(α) ∩ par− (α), to be used in the proof of Theorem E. Lemma 10.1: Let α be an endomorphism of a totally disconnected, locally compact group G and K be a compact subgroup of G such that α(K) = K. Set β := α|par− (α) . Then K ⊆ par− (α) and con− (α, K) = con− (β, K) ⊆ par− (α). In particular, con− (α) = con− (β) ⊆ par− (α). Proof. Since α(K) = K, we find an α-regressive trajectory in K for each x ∈ K, showing that K ⊆ par− (α). If x ∈ con− (α, K), then there exists an α-regressive trajectory (xn )n∈N0 for x such that xn → e modulo K. As K is compact, {xn : n ∈ N0 } is relatively compact (see Lemma 2.9 (a)), entailing that xn ∈ par− (α) for each n ∈ N0 and thus x ∈ con− (β, K) (cf. Lemma 2.14). Thus con− (α, K) ⊆ con− (β, K). The converse inclusion is trivial (cf. Lemma 2.13 (a)). Among other things, the next lemma is useful for the proof of Theorem E. Independently, part (c) of the lemma was also obtained in [5, Lemma 4.5 (3)]. Lemma 10.2: Let α be an endomorphism of a totally disconnected, locally compact group G. Then the following holds: (a) A compact open subgroup U ⊆ G is tidy below for α if and only if U ∩ par− (α) is tidy below for α|par− (α) . (b) If α|par− (α) is injective, then α|par− (α) is an automorphism of par− (α). If U ⊆ G is a tidy subgroup for α, then ENDOMORPHISMS OF T.D.L.C. GROUPS 45 (c) U+ is a compact open subgroup of par− (α) which is tidy for α|par− (α) , and s(α) = s(α|par− (α) ). (d) U+ is a compact open subgroup of U++ which is tidy for α|U++ , and s(α) = s(α|U++ ). Proof. (a) The subgroup V := U ∩ par− (α) is compact and open in P − := par− (α). Let β := α|P − and V+ be the group of all x ∈ V for which there exists a β-regressive trajectory in V . If x ∈ U+ , then there exists an α-regressive trajectory (xn )n∈N0 for x in U . Since {xn : n ∈ N0 } ⊆ U is relatively compact, we have xn ∈ U ∩ P − = V for all n ∈ N0 , whence x ∈ V+ . Thus U+ ⊆ V+ and (27) U+ = V+ . If x ∈ U++ , then there exists an α-regressive trajectory (xn )n∈N0 for x and N ∈ N0 such that xn ∈ U+ = V+ for all n ≥ N . Again, we deduce that xn ∈ P − for all n ∈ N0 . This entails x ∈ V++ . Thus U++ ⊆ V++ and hence (28) U++ = V++ . Since P − ⊆ G is closed, U++ is closed in G if and only if V++ is closed in P − . As U+ = V+ ⊆ P − , we have αn (U+ ) = β n (V+ ) for each n ∈ N0 and thus (29) [αn+1 (U+ ) : αn (U+ )] = [β n+1 (V+ ) : β n (V+ )] for all n ∈ N0 . As a consequence, the sequence ([αn+1 (U+ ) : αn (U+ )])n∈N0 is constant if and only if ([β n+1 (V+ ) : β n (V+ )])n∈N0 is a constant sequence. Thus U is tidy below for α if and only if V is tidy below for β. (c) Since U+ = P − ∩ U (see [26, Proposition 11(1)]), U+ is open in P − . As U+ ⊆ α(U+ ), the subgroup V := U+ = P − ∩ U is tidy above for β := α|P − (since V ⊆ β(V ) implies V+ = V ). By (a), V is also tidy below. Therefore V is tidy for β and now (29) yields s(α) = [α(U+ ) : U+ ] = [β(V+ ) : V+ ] = s(β). (d) Since U+ = U++ ∩ U by [26, Proposition 11(1)] and U++ is closed, U+ is a compact open subgroup of U++ . It is tidy above for α|U++ since α(U+ ) ⊇ U+ and tidy below since U++ and the indices [αn+1 (U+ ) : αn (U+ )] for n ∈ N0 are unchanged if α is replaced with α|U++ . Notably, s(α) = [α(U+ ) : U+ ] remains unchanged. (b) The self-map β := α|P − of P − is surjective as α(P − ) = P − , and injective 46 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER by hypothesis. By the proof of (c), P − has a compact open subgroup V such that V ⊆ β(V ), whence also β(V ) is a compact open subgroup of P − . Since V is compact, β|V is a quotient homomorphism onto its image and hence open onto β(V ), which is open in P − . Thus, the endomorphism β is an open map. Remark 10.3: Note that α|par− (α) is injective if and only if bik(α) = {e}. Hence α|par− (α) is injective if α is tidy (then bik(α) ⊆ nub(α) = {e}). The following result is known for automorphisms (cf. [1, Theorem 3.32]). Proposition 10.4: Let α be an endomorphism of a totally disconnected, locally compact group G. If con(α) is closed in G, then also con− (α) closed. Proof. As con(α) is closed, β := α|par− (α) is an automorphism (see Remark 10.3 and Proposition 9.5). Since W+ is tidy for β for each compact open subgroup W ⊆ G which is tidy for α (see Lemma 10.2 (c)), β has small tidy subgroups. As each of these is also tidy for β −1 , Proposition 9.5 shows that con(β −1 ) is closed in par− (α) and hence in G. Since con− (α) = con− (β) = con(β −1 ) by Lemma 10.1, the assertion follows. Remark 10.5: If con− (α) is closed, then con(α) need not be closed. For example, let F 6= {e} be a finite group and G := F N with the product topology. Consider the left shift α : G → G, (xn )n∈N 7→ (xn+1 )n∈N with kernel F × {e}{2,3,...} . Then con(α) is the dense proper subgroup of all finitely supported sequences (hence not closed). Let σ : G → G, x = (xn )n∈N 7→ (e, x1 , x2 , . . .) be the right shift. If x ∈ G, then (σ n (x))n∈N0 is an α-regressive trajectory for x such that σ n (x) → e, whence x ∈ con− (α). Thus con− (α) = G is closed. We mention that the proof of Lemma 3.31 in [1] (and hence [1, Theorem 3.32]) uses a tidying procedure for compact open subgroups which was developed in [24] and is different from the one of Section 8.1. It involves a certain compact subgroup K ⊆ G which, following [24, §2, Step 2a, p. 4], is defined as \ KO , (30) K := O∈COS(G) ENDOMORPHISMS OF T.D.L.C. GROUPS 47 where KO := lev(α) ∩ O−− (in [24], the abbreviation KO := lev(α) ∩ O−− is used). If G is metrizable, then K admits a simpler description, as the closure K = con(α) ∩ lev(α) (31) (i.e., K = con(α) ∩ par− (α)); this was asserted without proof in [24], and left open for non-metrizable G. It was later shown by W. Jaworski (unpublished, personal communication, 2008). We now give a shorter argument. Proposition 10.6: Let α be an endomorphism of a totally disconnected, locally compact group G. Then \ (32) KO . con(α) ∩ lev(α) = O∈COS(G) Proof. For O ∈ COS(G), we have O+ ∩ O− ⊆ lev(α) and thus (33) O−− ∩ lev(α) = con(α, O+ ∩ O− ) ∩ lev(α) = con(α|lev(α) , O+ ∩ O− ), using Lemma 9.1 for the first equality and then Lemma 2.15 (a). Hence \ con(α|lev(α) , O+ ∩ O− ) K ⊇ O∈COS(G) =  con α|lev(α) , \ O∈COS(O) using Lemma 2.11 and the fact that T  (O+ ∩ O− ) = con(α|lev(α) ) O∈COS(G) (O+ ∩ O− ) ⊆ T O∈COS(G) O = {e}. So K ⊇ con(α|lev(α) ) = con(α) ∩ lev(α), with equality by Lemma 2.15 (a). To verify the converse inclusion, note that KO = con(α|lev(α) , O+ ∩ O− ) = con(α|lev(α) )(O+ ∩ O− ) = con(α|lev(α) )(O+ ∩O− ) by (33), Theorem A and compactness of O+ ∩ O− . If \ \ KO = x∈K= con(α|lev(α) )(O+ ∩ O− ), O∈COS(G) O∈COS(G) for each O ∈ COS(G) we can write x = xO yO with xO ∈ con(α|lev(α) ) and yO ∈ O+ ∩ O− . Direct COS(G) by declaring O1 ≤ O2 if O2 ⊆ O1 . Then the net (yO )O∈COS(G) converges to e, whence −1 xO = xyO → x. 48 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER Thus x ∈ con(α|lev(α) ), showing that K ⊆ con(α|lev(α) ) = con(α) ∩ lev(α). We shall see later that K = nub(α) (Lemma 12.2 (e)). 11. Proof of Theorem E We shall use a lemma concerning induced endomorphisms on quotients. For a precursor of (a) and (b) for (inner) automorphisms, compare [7, Lemma 3.6] and its variant in [16, Lemma 4.9 (iv)]. Lemma 11.1: Let α be an endomorphism of a totally disconnected, locally compact group G and N ⊆ G be an α-stable compact normal subgroup. Let q : G → G/N be the canonical quotient map and α be the endomorphism of G/N induced by α. Then the following holds: (a) Let U ⊆ G be a compact open subgroup such that N ⊆ U . Then U is tidy for α if and only if q(U ) is tidy for α. (b) s(α) = s(α). (c) If N ⊆ nub(α), then q(nub(α)) = nub(α) and nub(α) = q −1 (nub(α)). Proof. (a) For x ∈ U and n ∈ N0 , we have αn (q(x)) = q(αn (x)) ∈ q(U ) if and only if αn (x) ∈ U N = U . Hence q(x) ∈ q(U )− if and only if x ∈ U− , entailing U− = q −1 (q(U )− ) and hence also q(U− ) = q(U )− . If x ∈ U+ , then there exists an α-regressive trajectory (xn )n∈N0 for x in U . Then (q(xn ))n∈N0 is an α-regressive trajectory for q(x) in q(U ) and hence q(x) ∈ q(U )+ . Thus (34) q(U+ ) ⊆ q(U )+ . If q(x) ∈ q(U )+ and (yn )n∈N0 is an α-regressive trajectory for q(x) in q(U ), pick zn ∈ q −1 ({yn }) for n ∈ N0 . Then q(αi (zn )) = αi (q(zn )) = αi (yn ) = yn−i ∈ q(U ) for i ∈ {0, 1, . . . , n}, showing that αi (zn ) ∈ q −1 (q(U )) = U . Since q(αn (zn )) = y0 = q(x), we have xαn (zn )−1 ∈ ker(q) = N . Since α(N ) = N , we can choose a ∈ N such that αn (a) = xαn (zn )−1 . Then azn ∈ U , αi (azn ) = αi (a)αi (zn ) ∈ N U = U for i ∈ {0, . . . , n} and αn (azn ) = αn (a)αn (zn ) = x. Hence x ∈ Un,α ENDOMORPHISMS OF T.D.L.C. GROUPS and thus x∈ \ 49 Un,α = U+ . n∈N0 Thus q −1 (q(U )+ ) ⊆ U+ . Together with (34), this implies U+ = q −1 (q(U )+ ) and q(U+ ) = q(U )+ . Since U = U N and U+ U− = U+ U− N, the final equality in the chain q(U )+ q(U )− = q(U+ )q(U− ) = q(U+ U− ) = q(U ) holds if and only if U+ U− = U . Thus U is tidy above for α if and only if q(U ) is tidy above for α. We have q(αn (U+ )) = αn (q(U+ )) = αn (q(U )+ ) for each n ∈ N0 . Since αn (U+ ) ⊇ U+ = q −1 (q(U )+ ) ⊇ N , we deduce that αn (U+ ) = q −1 (αn (q(U )+ )). Hence U++ = [ αn (U+ ) = n∈N0 n∈N0 = q −1 [ [ n∈N0 n q −1 (αn (q(U )+ )) ! α (q(U )+ ) = q −1 (q(U )++ ), showing that U++ is closed if and only if q(U )++ is closed. Finally, [αn+1 (U+ ) : αn (U+ )] (35) = [q −1 (αn+1 (q(U )+ )) : q −1 (αn (q(U )+ ))] = [αn+1 (q(U+ )) : αn (q(U+ ))], whence the sequence ([αn+1 (U+ ) : αn (U+ )])n∈N0 is constant if and only if so is ([αn+1 (q(U )+ ) : αn (q(U )+ )])n∈N0 . Thus U is tidy if and only if q(U ) is tidy. (b) Let V ⊆ G/N be a compact open subgroup which is tidy for α. Then U := q −1 (V ) is a compact open subgroup of G such that N ⊆ U and q(U ) = V is tidy, whence U is tidy, by (a). Using (35), we get s(α) = [α(U+ ) : U+ ] = [α(q(U )+ ), q(U )+ ] = [α(V+ ) : V+ ] = s(α). (c) As N ⊆ nub(α) ⊆ U for each U ∈ TID(α), we deduce from (a) that TID(α) = {q −1 (V ) : V ∈ TID(α)}. 50 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER Hence nub(α) = \ V ∈TID(α)  q −1 (V ) = q −1  \ V ∈TID(α) and thus q(nub(α)) = nub(α).  V  = q −1 (nub(α)) Proof. (Theorem E). Let β := α|par− (α) and α be the automorphism induced by β on par− (α)/ bik(α). Let q : par− (α) → par− (α)/ bik(α) be the canonical quotient map, whose kernel bik(α) is compact. Then (36) s(α) = s(β) = s(α) = s(α|con− (α) ), using Lemma 10.2 (c), Lemma 11.1 (b) or Proposition 8.10, as well as [1, Proposition 3.21]. The first and second equality were obtained independently in [5, Lemma 4.5 (3), (4)]. We have con− (β, bik(α)) = con− (β) bik(α) by Theorem B and thus q(con− (α)) = q(con− (β)) = con− (α). Since bik(α) is compact, we deduce that con− (α) bik(α) is closed. It then coincides with the set con− (α) bik(α), which is mapped onto con− (α) by q. Hence p := q|con− (α) : con− (α) → con− (α) is a continuous surjective homomorphism and hence a quotient morphism, as both groups are σ-compact (whence the open mapping theorem, [11, (5.29)] applies): In fact, as the left hand side is a closed subgroup of con− (α) bik(α) and this group has con− (α) as a quotient with compact kernel, it will be σcompact if con− (α) is σ-compact, which holds by Lemma 11.2 to come. Since p has compact kernel, by applying Lemma 11.1 (b) or Proposition 8.10 we deduce that s(α|con− (α) ) = s(α|con− (α) ). Together with (36), we get s(α) = s(α|con− (α) ). We applied the following lemma to the automorphism α −1 : Lemma 11.2: For each automorphism α : G → G of a locally compact group, the closure con(α) of the contraction group is σ-compact. Proof. Let K be a compact identity neighbourhood in con(α). Then con(α) = con(α)K. ENDOMORPHISMS OF T.D.L.C. GROUPS 51 For each x ∈ con(α), there is n ∈ N with αn (x) ∈ K whence x ∈ α−n (K). Thus [ con(α) = α−n (K)K n∈N is σ-compact. As an application of Theorem B, Proposition 8.10 and Theorem E, we include the following addition to the study begun in Section 8. Note that since α-stable compact groups are contained within par− (α), this result is a generalization of Lemma 11.1 (b). It also generalizes Proposition 8.10 which can be seen by choosing G = par− (α). As a consequence, the result is also a generalization of [1, Proposition 3.21 (2)] which is precisely Proposition 8.10 restricted to automorphisms. Theorem 11.3: Let G be a totally disconnected locally compact group and α an endomorphism of G. Further, let N ⊆ G be a closed normal subgroup which is α-stable and contained in par− (α). If α is the endomorphism induced by α on G/N , then sG (α) = sG/N (ᾱ)sN (α). Proof. Applying Lemma 10.2 and Proposition 8.10, it suffices to show sG/N (α) = spar− (α)/N (α), where the right hand side denotes the scale of the restriction of α to par− (α)/N . Let xN ∈ con− (α). Then x ∈ con− (α, N ). Thus x ∈ con− (α)N by Theorem B. Therefore, xN ∈ par− (α)/N as con− (α) ⊆ par− (α). Since par− (α) is closed we have con− (α) ⊆ par− (α)/N. By Theorem E we have s(α) = s(α|con− (α) ), so applying Proposition 8.3 we get sG/N (α) = scon− (α) (α) ≤ spar− (α)/N (α) ≤ sG/N (α) as required. 12. Further results concerning the nub In this section, we provide further results concerning the nub of an endomorphism, as well as consequences, for example an improved description of the closure of a contraction group. Lemma 12.1: If α is an endomorphism of a totally disconnected, locally compact group G, then lev(α) = lev(α|par− (α) ) and bik(α) = bik(α|lev(α) ). 52 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER Proof. Abbreviate γ := α|lev(α) . If x ∈ par− (α) and αn (x) = e for some n, then x ∈ lev(α). Hence {x ∈ par− (α) : (∃n ∈ N0 ) αn (x) = e} = {x ∈ lev(α) : (∃n ∈ N0 ) γ n (x) = e}. Since lev(α) is closed, the closures of the preceding set in G and lev(α) coincide. Thus bik(α) = bik(γ). If x ∈ lev(α), there exists a bounded α-trajectory (xn )n∈Z with x0 = x. Then xn ∈ lev(α) for each n, since (xn+m )m∈Z is a bounded α-trajectory for this element. Thus (xn )n∈Z is a bounded γ-trajectory for x in lev(α) (and hence also a bounded α|par− (α) -trajectory for x in par− (α)). Thus x ∈ lev(α|par− (α) ) and hence lev(α) ⊆ lev(α|par− (α) ). The converse inclusion is trivial. The following statements (a) and (b) are implicit in comments concerning the nub in [26, lines following Remark 4] (where no proof is given); independently, they were verified in [5, Lemma 4.5 (5)]. Proposition 12.2: Let α be an endomorphism of a totally disconnected, locally compact group G. Let q : par− (α) → par− (α)/ bik(α) =: Q be the canonical quotient map and α be the automorphism of Q induced by α|par− (α) . Then (a) (b) (c) (d) nub(α|par− (α) ) = nub(α), nub(α) = q(nub(α)), nub(α) = con(α) ∩ nub(α), T con(α) = U∈TID(α) U−− = con(α) nub(α), and T (e) nub(α) = con(α) ∩ lev(α) = U∈COS(G) lev(α) ∩ U−− T T = lev(α) ∩ U∈TID(α) U−− = V ∈COS(lev(α)) V−− . Proof. (a) Abbreviate P − := par− (α). We recall from [26, Corollary 5] that T T nub(α) = U∈TID(α) U = U∈TID(α) (U+ ∩ U− ), whence also (37) nub(α) = \ U+ . U∈TID(α) The right hand side of (37) contains nub(α|P − ), by Lemma 10.2 (c). Hence nub(α) ⊇ nub(α|P − ). For the reverse inclusion we show the contrapositive. Suppose x 6∈ nub(α|P − ). Then x 6∈ W for some compact open subgroup W ⊆ P − which is tidy for α|P − . Let O be a compact open subgroup of G with ENDOMORPHISMS OF T.D.L.C. GROUPS O ∩ P − ⊆ W . Then V := \ 53 yOy −1 y∈W is a compact open subgroup of G which is normalized by W , entailing that V W is a compact open subgroup of G. Note that x 6∈ V W (if we could write x = vw with v ∈ V and w ∈ W , then v = xw−1 ∈ V ∩ P − ⊆ O ∩ P − ⊆ W , whence x = vw ∈ W contrary to the choice of W ). For large ℓ ∈ N0 , U := ℓ \ α−j (V W ) j=0 is tidy above for α. By Lemma 3.1, after increasing ℓ if necessary, we may assume that, moreover, P − ∩ U is tidy above for α|P − . Since nub(α|P − ) ⊆ W and α(nub(α|P − )) = nub(α|P − ), we have nub(α|P − ) ⊆ U and hence nub(α|P − ) ⊆ U ∩ P − . As a consequence, U ∩ P − is tidy for α|P − , whence U is tidy below for α (by Lemma 10.2 (a)) and hence tidy. Thus x 6∈ nub(α) ⊆ U . This shows that nub(α) = nub(α|P − ). (b) As ker(q) = bik(α) ⊆ nub(α) = nub(α|P − ) (using (a)), we have q(nub(α)) = q(nub(α|P − )) = nub(α) by Lemma 11.1 (c). (c) By (b), the map p := q|nub(α) : nub(α) → nub(α) is onto and thus a quotient map by the open mapping theorem [11, (5.29)], as nub(α) is compact. Hence q(con(α) ∩ nub(α)) = q(con(α|nub(α )) = con(α|nub(α) ), by Theorem A, which is dense in nub(α) by [1, Lemma 3.31, (1) and (2)]. As a consequence, (38) con(α|nub(α) ) ker(p) = con(α|nub(α) ) bik(α) is dense in nub(α). The subset {x ∈ par− (α) : (∃n ∈ N0 ) αn (x) = e} ⊆ bik(α) ∩ con(α) ⊆ nub(α) ∩ con(α) = con(α|nub(α) ) is dense in bik(α). Combining this with the density of the set from (38) in nub(α), we find that con(α|nub(α) ) is dense in nub(α) (as asserted). (d) We know from Lemma 9.3 that con(α) = con(α)(con(α) ∩ nub(α)). By (c), 54 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER con(α) ∩ nub(α) is dense in nub(α), and thus con(α) ∩ nub(α) = nub(α). Hence con(α) = con(α) nub(α). It only remains to recall that \ U−− = \ con(α, U+ ∩ U− ) = = con(α, U ) U∈TID(α) U∈TID(α) U∈TID(α) \ con(α, nub(α)) = con(α) nub(α) by Lemma 9.1, Lemma 2.12, Lemma 2.11, and Theorem A. (e) As {U ∩lev(α) : U ∈ COS(G)} is a basis of identity neighbourhoods in lev(α) T and lev(α) ∩ U−− = (lev(α) ∩ U )−− , we have U∈COS(G) lev(α) ∩ U−− = T V ∈COS(lev(α)) V−− . The second and third groups in (e) (from the left) coincide by Lemma 10.6, and we denote them by K (as in (30)). Now K = con(α) ∩ lev(α) ⊇ con(α) ∩ nub(α) = nub(α), by Proposition 12.2 (c). On the other hand, K= \ U∈COS(G) lev(α) ∩ U−− ⊆ \ lev(α) ∩ U−− ⊆ nub(α) U∈TID(α) as each of the sets lev(α) ∩ U−− is closed, and contained in U+ ∩ U− , as we now verify: If x ∈ lev(α) ∩ U−− , then x ∈ lev(α) and αn (x) ∈ U− for some n ∈ N0 . Let (xn )n∈N0 be a bounded α-regressive trajectory for x. Then αn (x), αn−1 (x), . . . , α(x), x, x1 , x2 , . . . is a bounded α-regressive trajectory for αn (x) ∈ U , whence αn (x) ∈ U+ by [26, Proposition 11 (a)] and thus αn (x) ∈ U+ ∩ U− . Since α(U+ ∩ U− ) = U+ ∩ U− , there exists and α-regressive trajectory (yj )j∈N0 for αn (x) inside U+ ∩ U− . Then yn−1 x ∈ (U+ ∩ U− ) lev(α) ⊆ lev(α) ⊆ par− (α) and αn (yn−1 x) = e, showing that yn−1 x ∈ bik(α) ⊆ nub(α). Hence x = yn (yn−1 x) ∈ (U+ ∩ U− ) nub(α) = U+ ∩ U− . Thus lev(α) ∩ U−− ⊆ U+ ∩ U− and thus K ⊆ T U∈TID(α) U+ ∩ U− = nub(α). T U∈TID(α) (lev(α) ∩ U−− ) ⊆ Proposition 12.2 (e) provides several characterizations of the nub, and identifies it as the group considered in Proposition 10.6 (which had been used in the literature in the case of automorphisms, as recalled above). A complementary characterization of the nub was obtained in [5, Corollary 4.6]. ENDOMORPHISMS OF T.D.L.C. GROUPS 55 13. Theorem F: Dynamics on the ‘big cell’ Before we prove Theorem F, let us collect some tools. For automorphisms, part (a), (d), (e) and (f) of the following lemma are known (cf. Proposition 3.4, Corollary 3.17, and Lemma 3.18 in [1]). Lemma 13.1: Let α be an endomorphism of a totally disconnected, locally compact group G. Then the following holds: (a) con(α) is a normal subgroup of par(α) and con− (α) is normal in par− (α). (b) V− = con(α|V− )(V+ ∩ V− ) for each compact open subgroup V ⊆ G, and con(α|V− ) is normal in V− . If V is tidy for α, then V+ ∩ V− = lev(α) ∩ V and con(α|V − ) = con(α) ∩ V . (c) V+ = (con− (α)∩V+ )(V+ ∩V− ) for each compact open subgroup V ⊆ G, and con− (α) ∩ V+ is normal in V+ . If V is tidy, then con− (α) ∩ V+ = con− (α) ∩ V . (d) par(α) = con(α) lev(α). Moreover, the surjective homomorphism q : lev(α) → par(α)/con(α), g 7→ g con(α) is continuous and open. (e) par− (α) = con− (α) lev(α). Moreover, the surjective homomorphism p : lev(α) → par− (α)/con− (α), g 7→ g con− (α) is continuous and open. (f) A compact open subgroup V ⊆ lev(α) is tidy for α|lev(α) if and only if α(V ) = V . Proof. (a) If (xn )n∈N0 and (gn )n∈N0 are sequences in G such that xn → e and the set {gn : n ∈ N0 } is relatively compact, then also gn xn gn−1 → e by virtue of [11, (4.9)]. The assertions follow from this observation. (b) If x ∈ V− ⊆ V−− , then αn (x) → e modulo V+ ∩ V− in G (see Lemma 9.1) and hence also in V− (see Lemma 2.14). Thus, using Theorem A, V− = con(α|V− , V+ ∩ V− ) = con(α|V− )(V+ ∩ V− ). By (a), con(α|V− ) is normal in par(α|V− ) = V− . If V is tidy and x ∈ con(α)∩V , then {αn (x) : n ∈ N0 } is relatively compact and thus x ∈ V− (by [26, Proposition 11 (2)]). Hence x ∈ con(α|V− ) and so con(α) ∩ V ⊆ con(α|V− ). The converse inclusion is trivial. Finally, V+ ∩ V− = lev(α) ∩ V by [26, Proposition 11]. (c) As con− (α) is normal in par− (α), the intersection con− (α) ∩ V+ is normal in the subgroup V+ of par− (α). If x ∈ V+ ⊆ V++ , then x ∈ con− (α, V+ ∩ V− ) 56 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER by Lemma 9.1 and thus x ∈ (con− (α) ∩ V+ )(V+ ∩ V− ), by Theorem B. Trivially, (con− (α) ∩ V+ )(V+ ∩ V− ) ⊆ V+ . If V is tidy, then con− (α) ∩ V ⊆ V+ (by [26, Proposition 11 (1)]), whence con− (α) ∩ V+ = con− (α) ∩ V . (d) If x ∈ par(α), then the closure K := {αn (x) : n ∈ N0 } is compact. Since αn (x) ∈ K for all n, we have αn (x) →R K and thus αn (x) →R K+ ∩ K− , by Lemma 2.12. Since K+ ∩ K− is compact and α(K+ ∩ K− ) = K+ ∩ K− , K+ ∩ K− ⊆ lev(α). Thus x ∈ con(α, K+ ∩ K− ) ⊆ con(α, lev(α)) = con(α) lev(α), using Theorem A. Thus par(α) ⊇ con(α) lev(α). The converse inclusion is trivial. If V ⊆ G is a compact open subgroup which is tidy for α, then V− = V ∩ par(α) is open in par(α) and V+ ∩ V− = V ∩ lev(α) is open in lev(α) (cf. [26, Proposition 11]). Since V− = (con(α) ∩ V )(V+ ∩ V− ) by (a), we see that q(V+ ∩ V− ) = V− con(α)/con(α) is open in par(α)/con(α). Since V+ ∩ V− is compact, the continuous surjection q|V+ ∩V− : V+ ∩V− → q(V+ ∩V− ) is a quotient map and thus an open map (being also a homomorphism). The assertion follows. (e) Every x ∈ par− (α) admits a bounded α-regressive trajectory (xn )n∈N0 . In particular, K := {xn : n ∈ N0 } is compact. Since xn ∈ K for all n, we have xn (x) →R K and thus xn →R K+ ∩ K− , by Lemma 2.12. Since K+ ∩ K− is compact and α(K+ ∩ K− ) = K+ ∩ K− , K+ ∩ K− ⊆ lev(α). Thus x ∈ con− (α, K+ ∩ K− ) ⊆ con− (α, lev(α)) = con− (α) lev(α), using Theorem B. Thus par− (α) ⊇ con− (α) lev(α). The converse inclusion is trivial. If V ⊆ G is a tidy subgroup for α, then V+ = V ∩ par− (α) is open in par− (α) and V+ ∩ V− = V ∩ lev(α) is open in lev(α) (cf. [26, Proposition 11]). Since V+ = (con− (α) ∩ V+ )(V+ ∩ V− ) by (b), we see that p(V+ ∩ V− ) = V+ con− (α)/con− (α) is open in par− (α)/con− (α). Since V+ ∩V− is compact, the continuous surjection p|V+ ∩V− : V+ ∩V− → p(V+ ∩V− ) is a quotient map and thus an open map (being also a homomorphism). The assertion follows. ENDOMORPHISMS OF T.D.L.C. GROUPS 57 (f) If α(V ) = V , then V+ = V− = V (whence V = V+ V− ) and V−− is open (and thus closed); so V is tidy. If, conversely, V is tidy, then every x ∈ V lies on a bounded α-trajectory (xn )n∈Z (as x ∈ lev(α)), whence x ∈ V+ ∩ V− by [26, Proposition 11]. Thus V = V+ ∩ V− and thus α(V ) = V . Proof. (Theorem F). If α has small tidy subgroups, then also αL := α|lev(α) , by Corollary 9.7. If, conversely, αL has small tidy subgroups, then {e} = nub(αL ) = con(αL ) ∩ lev(αL ) = con(αL ), (39) using Proposition 9.5 for the first equality, Proposition 12.2 (e) for the second, and the fact that lev(αL ) = lev(α) for the last equality. Thus nub(α) = con(α) ∩ lev(α) = con(αL ) = {e}, (40) whence α has small tidy subgroups (by Proposition 9.5). Assuming now that α has small tidy subgroups, we have: (c) Since ker(α)∩par− (α) ⊆ bik(α) ⊆ nub(α) = {e}, the induced endomorphism α|par− (α) of par− (α) is injective and hence an automorphism of the topological group par− (α) (by Lemma 10.2 (b)). We know that the endomorphisms α|con− (α) and α|lev(α) are surjective. Being restrictions of the automorphism α|par− (α) , also α|con− (α) and α|lev(α) are automorphisms. (b) By (40), we have con(α) ∩ lev(α) = {e}. Together with Lemma 13.1 (a) and (d), this entails that par(α) = con(α) ⋊ lev(α) as an abstract group. By Proposition 13.1 (d), the map q : lev(α) → par(α)/ con(α), g 7→ g con(α) is an isomorphism of topological groups. As a consequence, the homomorphism par(α) → lev(α), xy 7→ y (with x ∈ con(α), y ∈ lev(α)) is continuous and thus par(α) = con(α) ⋊ lev(α) as a topological group. As α has small tidy subgroups, so does the automorphism β := α|par− (α) (see Corollary 9.7). Hence par− (α) = par− (β) = par(β −1 ) = con(β −1 ) ⋊ lev(β −1 ) = con− (β) ⋊ lev(β) = con− (α) ⋊ lev(α). (d) Let V ⊆ G be a compact open subgroup which is tidy for α. Then V = V −1 = (V− )−1 (V+ )−1 = V− (V+ )−1 = (con(α) ∩ V )(lev(α) ∩ V )(con− (α) ∩ V ) ⊆ Ω, 58 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER using Lemma 13.1 (b) and (c). As each of con(α) and con− (α) intersects lev(α) in {e} (by (b)), we deduce from Lemma 13.1 (b) and (c) that (41) V− = (con(α) ∩ V ) ⋊ (lev(α) ∩ V ) and V+ = (con− (α) ∩ V ) ⋊ (lev(α) ∩ V ) as abstract groups. Using (b), we see that (41) also holds in the sense of topological groups. (a) By (d), Ω is an identity neighbourhood. For x ∈ G, the translations λx , ρx : G → G, λx (y) := xy, ρx (y) := yx for y ∈ G are homeomorphisms. If z ∈ Ω, write z = xy with x ∈ con(α) and y ∈ lev(α) con− (α) = par− (α) (cf. Lemma 13.1 (e)). Since Ω = con(α) par− (α), we have (ρy ◦ λx )(Ω) ⊆ Ω. Since (ρy ◦ λx )(Ω) is a neighbourhood of (ρy ◦ λx )(e) = xy = z, so is Ω. Hence Ω is open. If also z = ab with a ∈ con(α) and y ∈ par− (α), then a−1 x = by −1 ∈ con(α) ∩ par− (α) = con(α|lev(α) ) = {e} (where we used (39)). Hence x = a and y = b, showing that π is injective and hence a bijection. It remains to show that π is an open map. If V ⊆ G is a tidy subgroup for α and L := (con(α) ∩ V ) × (lev(α) ∩ V ) × (con− (α) ∩ V ), then π restricts to a continuous bijection (42) πV : L → V− V+ = V, as a consequence of (d). Since L is compact, πV is a homeomorphism. Hence π|L is an open map. Given a ∈ con(α), b ∈ lev(α) and c ∈ con− (α), we have π(x, y, z) = aπ|L (a−1 x, yb−1 , bzc−1 b−1 )bc for (x, y, z) ∈ con(α) × lev(α) × con− (α) in some open neighbourhood W of (a, b, c). Since translations and the automorphism con− (α) → con− (α), v 7→ bvb−1 are open maps, π|W is an open map and thus π a homeomorphism. (e) If V is tidy, then V is the product of the α-invariant set con(α) ∩ V = con(α|V− ), the α-stable set lev(α) ∩ V = V+ ∩ V− and the set con− (α) ∩ V = ENDOMORPHISMS OF T.D.L.C. GROUPS 59 con− (α) ∩ V+ whose image under α is contained in con− (α). In view of (a), we now deduce from (V+ ∩ V− )(con− (α) ∩ V+ ) = V+ ⊆ α(V+ ) = (V+ ∩ V− )α(con− (α) ∩ V+ ) that con− (α) ∩ V+ ⊆ α(con− (α) ∩ V+ ). Conversely, assume that (3)–(6) are satisfied by a compact open subgroup V ⊆ G. If v ∈ V− , write π −1 (v) =: (a, b, c). As con(α), lev(α) and con− (α) are α-invariant, we deduce from αn (v) = αn (a)αn (b)αn (c) ∈ V that αn (c) ∈ con− (α) ∩ V for all n ∈ N0 , whence c ∈ par(α) ∩ con− (α) = con(α) lev(α) ∩ con− (α) = {e} and thus c = e. We now easily deduce that V− = (con(α) ∩ V )(lev(α) ∩ V ). If v ∈ V+ and (a, b, c) := π −1 (v), let (vn )n∈N0 be an α-regressive trajectory for v in V . Write (an , bn , cn ) := π −1 (vn ). Then (an )n∈N0 is an α-regressive trajectory for a in V , whence a ∈ con(α) ∩ par− (α) = con(α) ∩ lev(α) ⊆ nub(α) = {e} and thus a = e. We now easily deduce that V+ = (lev(α) ∩ V )(con− (α) ∩ V ). Using that lev(α) ∩ V is α-stable and con− (α) ⊆ V++ (cf. Lemma 9.1), we find V++ = (lev(α) ∩ V ) con− (α). As con− (α) is closed in G and lev(α) ∩ V is compact, V++ is closed in G. Since β := α|par− (α) is an automorphism, the indices [αn+1 (V+ ) : αn (V+ )] = [β n+1 (V+ ) : β n (V+ )] are independent of n ∈ N0 . Hence V is tidy. (f) As lev(α) has small tidy subgroups, (f) follows from Lemma 13.1 (f). References [1] Baumgartner, U. and G. A. Willis, Contraction groups and scales of automorphisms of totally disconnected locally compact groups, Isr. J. Math. 142 (2004), 221–248. [2] Bourbaki, N., “General Topology I”, Chapters 1–4, Springer, Berlin, 1988. [3] Bourbaki, N., “Lie Groups and Lie Algebras”, Chapters 1–3, Springer, Berlin, 1989. [4] Dani, S. G. and R. Shah, Contraction subgroups and semistable measures on p-adic Lie groups, Math. Proc. Camb. Philos. Soc. 110 (1991), 299–306. [5] Giordano Bruno, A. and S. Virili, Topological entropy in totally disconnected locally compact groups, Ergodic Theory Dyn. Syst. 37(7) (2017), 2163-2186. 60 T.P. BYWATERS, H. GLÖCKNER AND S. TORNIER [6] Glöckner, H., Contraction groups for tidy automorphisms of totally disconnected groups, Glasg. Math. J. 47 (2005), 329-333. [7] Glöckner, H., Locally compact groups built up from p-adic Lie groups, for p in a given set of primes, J. Group Theorey 9 (2006), 427–454. [8] Glöckner, H., Contractible Lie groups over local fields, Math. Z. 260 (2008), 889–904. [9] Glöckner, H., Endomorphisms of Lie groups over local fields, preprint, arXiv:1701.01804v2. [10] Glöckner, H. and G. A. Willis, Classification of the simple factors appearing in composition series of totally disconnected contraction groups, J. Reine Angew. Math. 634 (2010), 141–169. [11] Hewitt, E. and K. A. Ross, “Abstract Harmonic Analysis,” Vol. 1, Springer, Berlin, 2 1979. [12] Isbell, J. R., “Uniform Spaces,” AMS, Providence, 1964. [13] Jaworski, W., On contraction groups of automorphisms of totally disconnected locally compact groups, Isr. J. Math. 172 (2009), 1–8. [14] Raja, C. R. E. and R. Shah, Some properties of distal actions on locally compact groups, preprint, arXiv.1201.4287v2. [15] Reid, C. D., Endomorphisms of profinite groups, Groups Geom. Dyn. 8 (2014), 553–564. [16] Reid, C. D., Dynamics of flat actions on totally disconnected, locally compact groups, New York J. Math. 22 (2016), 115–190. [17] Robinson, D. J. S., “A Course in the Theory of Groups,” Springer, New York, 2 1996. [18] Serre, J.-P., “Lie Algebras and Lie Groups,” Springer, Berlin, 1992. [19] Siebert, E., Contractive automorphisms on locally compact groups, Math. Z. 191 (1986), 73–90. [20] van Dantzig, D., Studien over topologische Algebra, University of Groningen (1931). [21] Wang, J. S. P., The Mautner phenomenon for p-adic Lie groups, Math. Z. 185 (1984), 403–412. [22] Willis, G. A., The structure of totally disconnected, locally compact groups, Math. Ann. 300 (1994), 341–363. [23] Willis, G. A., Further properties of the scale function on a totally disconnected group, J. Algebra 237 (2001), 142–164. [24] Willis, G. A., Tidy subgroups for commuting automorphisms of totally disconnected locally compact groups: An analogue of simultaneous triangularisation of matrices, New York J. Math. 10 (2004), 1–35. [25] Willis, G. A., The nub of an automorphism of a totally disconnected, locally compact group, Ergodic Theory Dyn. Syst. 34 (2014), 1365–1394. [26] Willis, G. A, The scale and tidy subgroups for endomorphisms of totally disconnected locally compact groups, Math. Ann. 361 (2015), 403–442.
4math.GR
arXiv:1601.07317v2 [math.GR] 15 Oct 2016 DENSE NORMAL SUBGROUPS AND CHIEF FACTORS IN LOCALLY COMPACT GROUPS COLIN D. REID AND PHILLIP R. WESOLEK Abstract. In The essentially chief series of a compactly generated locally compact group, an analogue of chief series for finite groups is discovered for compactly generated locally compact groups. In the present article, we show that chief factors necessarily exist in all locally compact groups with sufficiently rich topological structure. We also show that chief factors have one of seven types, and for all but one of these types, there is a decomposition into discrete groups, compact groups, and topologically simple groups. Our results for chief factors require exploring the theory developed in Chief factors in Polish groups in the setting of locally compact groups. In this context, we obtain tighter restrictions on the factorization of normal compressions and the structure of quasi-products. Consequently, both (non-)amenability and elementary decomposition rank are preserved by normal compressions. Contents 1. Introduction 2. Preliminaries 3. Elementary groups and the decomposition rank 4. Factorization of normal compressions in l.c.s.c. groups 5. Properties invariant under normal compressions 6. Generalized direct products 7. Chief factors and blocks 8. Extensions of chief blocks 9. Examples References 1 6 8 17 23 27 34 39 48 52 1. Introduction It is clear that a finite group G admits a normal series in which each of the factors is a chief factor, that is, a normal factor K/L of G such that there is no normal subgroup of G lying between K and L. It is then straightforward to show that chief factors of finite groups are products of simple groups. One thereby arrives at composition series, which give a complete decomposition of a finite group into simple groups. The first author is an ARC DECRA fellow. Research supported in part by ARC Discovery Project DP120100996. The second author is supported by ERC grant #278469. 1 2 COLIN D. REID AND PHILLIP R. WESOLEK The previous work [15] establishes the existence of the essentially chief series for compactly generated locally compact groups, which is an analogue for compactly generated locally compact groups of the chief series for finite groups. For the essentially chief series, we must allow for compact and discrete factors in addition to chief factors. A primary focus of the work at hand is an attempt to complete the analogy with finite groups by decomposing chief factors into topologically simple groups, discrete groups, and compact groups. Theorem 1.18 is our high mark in this direction, but it does not quite complete the analogy; Question 8.25 remains an outstanding mystery. The proofs require exploring the theory developed in [14] in the setting of locally compact Polish (equivalently, locally compact second countable) groups. As expected, the results we obtain for locally compact Polish groups are much stronger than those for general Polish groups. We shall use the abbreviations l.c.s.c. for “locally compact second countable” and t.d.l.c.s.c. for “totally disconnected locally compact second countable.” 1.1. Normal compressions. We begin by studying normal compressions. A topological group H is a normal compression of a topological group G if there is a continuous, injective homomorphism ψ : G → H with dense normal image. As shown in [14], when G and H are Polish groups, there is a Polish group H̃ such that ψ can be decomposed as β ◦ α with α : G → H̃ a closed embedding with normal image and β : H̃ → H a quotient map. In the locally compact setting, this factorization can be refined to obtain better control over the group H̃. Theorem 1.1 (See Theorem 4.4). Suppose that G and H are t.d.l.c.s.c. groups with ψ : G → H a normal compression map. Then there is a t.d.l.c.s.c. group H̃, a closed embedding α : G → H̃ with normal image, and a quotient map β : H̃ → H such that (1) ψ = β ◦ α; (2) H̃/α(G) is compact; (3) ker(β) is discrete, lies in the FC-center of H̃, and centralizes α(G); (4) H̃ = α(G) ker(β). In the case of compactly presented t.d.l.c.s.c. groups, more can be said; see Corollary 4.5. For a normal compression of l.c.s.c. groups, the compression map factorizes as a sequence of closed normal embeddings and quotient maps such that all kernels and cokernels appearing in the sequence are ‘small’; see Theorem 4.10. Using these factorizations, we study the extent to which properties pass between G and H when H is a normal compression of G. Theorem 1.2. Suppose that G and H are l.c.s.c. groups with H a normal compression of G. (1) G is amenable if and only if H is amenable. (See Proposition 5.6.) (2) If G and H are totally disconnected, then G is elementary with decomposition rank α if and only if H is elementary with decomposition rank α. (See Proposition 5.4.) The class of elementary groups is the smallest class of t.d.l.c.s.c. groups containing the profinite groups and discrete groups and closed under the elementary DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 3 operations. This class admits a canonical rank function called the decomposition rank, taking values in the set ω1 of at most countable ordinals. It is convenient to define non-elementary t.d.l.c.s.c. groups to have decomposition rank ω1 . A Polish group G is quasi-discrete if the quasi-center QZ(G) := {g ∈ G | CG (g) is open} is dense. The property of being discrete is not preserved under normal compressions, but quasi-discreteness is preserved up to metabelian factors. Theorem 1.3 (See Theorem 5.9). Suppose that G and H are l.c.s.c. groups with H a normal compression of G. (1) If H is quasi-discrete, then G/QZ(G) is metabelian. (2) If G is quasi-discrete, then H/QZ(H) is metabelian. 1.2. Generalized direct products. We next consider generalized direct products in the locally compact setting. Definition 1.4. For G a topological group and J a collection of closed normal subgroups, we set GJ := hN | N ∈ Ji. A collection S of closed normal subgroups is a quasi-direct factorization of G if GS = G, and S has the following topological independence property: \ \ ∀X ⊆ P(S) : X=∅⇒ GA = {1}. A∈X In such a case, (G, S) is said to be a quasi-product (or we say G is a quasi-product, when the factorization is implicit). Basic examples of quasi-products are local direct products. Definition 1.5. Suppose that (Gi )i∈I is a set of topological groups and that there is a distinguished open subgroup Oi ≤ L Gi for each i ∈ I. The local direct product of (Gi )i∈I over (Oi )i∈I is denoted by i∈I (Gi , Oi ) and defined to be ( ) G f :I→ Gi | f (i) ∈ Gi , and f (i) ∈ Oi for all but finitely many i ∈ I i∈I Q with component-wise multiplication and the group topology such that L i∈I Oi with the product topology continuously embeds as an open subgroup of i∈I (Gi , Oi ). We identify certain quasi-products that are closely related to local direct products. Definition 1.6. Let G be a locally compact group with S a quasi-direct factorization direct model L of G. A local L L for (G, S) is a continuous homomorphism φ : S (G) → GLwhere S (G) := N ∈S (N, N ∩ O) for some open subgroup O of G is such that S (G) is locally compact and φ N = idN for all N ∈ S. Local direct models for quasi-products, provided they exist, enjoy a universal property and are in particular unique; see Theorem 6.16 and Corollary 6.17. Theorem 1.7 (See Corollary 6.20). If (G, S) is a t.d.l.c. quasi-product, then (G, S) admits a local direct model. A natural source of quasi-products are groups of strict semisimple type: A Polish group G is of strict semisimple type if it is a quasi-product of non-abelian topologically simple groups. 4 COLIN D. REID AND PHILLIP R. WESOLEK Theorem 1.8 (See Theorem 6.24). For G an l.c.s.c. group of strict semisimple type, n Y Y G'D× Ci × Sj i∈I j=0 with D a t.d.l.c.s.c. group of strict semisimple type, each Ci a topologically simple compact connected Lie group, and each Sj a non-compact topologically simple connected Lie group. Corollary 1.9 (See Corollary 6.25). Suppose that G is an l.c.s.c. group of strict semisimple type and let S be the set of non-abelian topologically simple closed normal subgroups of G. Then (G, S) is a quasi-product that admits a local direct model. 1.3. Chief factors and blocks. We finally bring our results together to study chief factors in locally compact groups. The following results draw on the general theory of chief factors as developed in [14] as well as the existence of essentially chief series for compactly generated locally compact groups as shown in [15]. In fact, we will show (Proposition 8.17) that even without the assumption of compact generation, chief factors of arbitrary l.c.s.c. groups G account for a large part of their complexity as topological groups. A normal factor K/L of closed normal subgroups of a topological group G is a chief factor if there is no closed M E G such that L < M < K. Definition 1.10. Given a topological group G, we say that the closed normal factors K1 /L1 and K2 /L2 are associated if the following equations hold: K1 L2 = K2 L1 ; K1 ∩ L1 L2 = L1 ; K2 ∩ L1 L2 = L2 . The association relation is an equivalence relation when restricted to non-abelian chief factors via [14, Proposition 6.8]. A chief block is an association class of nonabelian chief factors. The set of chief blocks of a group G is denoted by BG . The association relation is not in general comparable with isomorphism. To study group-theoretic properties via chief blocks, we identify properties which hold on the level of blocks. Blocks with compact or discrete representatives have exceptional properties, so it is natural to isolate a class of blocks which excludes these. Definition 1.11. Suppose that a ∈ BG . We say that the block a ∈ BG is robust if none of the representatives of a are compact or quasi-discrete. The collection of robust chief blocks is denoted by BrG . Definition 1.12. A property P of groups is a (robust) block property if for every l.c.s.c. group G and a a (robust) chief block of G, there exists K/L ∈ a with P if and only if every K/L ∈ a has P . For a (robust) block property P , we say that a (robust) chief block a of G has property P if some, equivalently all, K/L ∈ a has property P . Theorem 1.13 (See Propositions 7.8 and 7.9). The following are block properties: Being elementary with rank α, being amenable, being quasi-discrete, and being isomorphic to a given connected group H. Compact generation is a robust block property. Representatives of non-robust blocks therefore have a restricted structure. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 5 Corollary 1.14. Suppose that G is an l.c.s.c. group and suppose a is a chief block of G that is not robust. Then either every representative of a is isomorphic to a fixed connected compact group, or every representative of a is totally disconnected and quasi-discrete. To generalize the existence of chief factors from compactly generated groups to general l.c.s.c. groups, and also to analyze the internal structure of these chief factors, we employ the concepts of minimally covered and extendable chief blocks as introduced in [14]. For a Polish group G, a closed normal subgroup N E G covers a block a ∈ BG if there is K/L ∈ a such that K ≤ N . A block a is minimally covered if there is a least normal subgroup that covers the block. Definition 1.15. Let G be a Polish group and H be a closed subgroup of G. Given a ∈ BH and b ∈ BG , we say that b is an extension of a in G if for every closed normal subgroup K of G, the group K covers b if and only if K ∩ H covers a. Theorem 1.16 (See Theorem 8.15). If O is a compactly generated open subgroup of an l.c.s.c. group G, then all robust blocks of O extend to G. Blocks of an l.c.s.c. group arising from extending a robust block of a compactly generated open subgroup are called regionally robust blocks. The set of regionally robust blocks of an l.c.s.c. group G is denoted by Brr G . These blocks are minimally covered and robust; see Lemma 8.6 and Propositions 8.8 and 8.10. The set of regionally robust blocks is setwise invariant under all continuous automorphisms. A l.c.s.c. group also has at most countably many regionally robust blocks (Lemma 8.12). Moreover, an l.c.s.c. group G has at least one regionally robust block provided that its structure as a topological group is sufficiently complex: Proposition 1.17 (See Proposition 8.17). For G an l.c.s.c. group, either (1) Brr G 6= ∅, or (2) G◦ is compact-by-solvable-by-compact, and G/G◦ is elementary with rank at most ω + 1. If G is compactly generated, then G/G◦ is elementary with finite rank. Significant restrictions on the structure of topologically characteristically simple l.c.s.c. groups then follow; chief factors in l.c.s.c. groups are particular examples of such groups. Theorem 1.18 (See Theorem 8.21). Suppose that G is a topologically characteristically simple l.c.s.c. group. Then G is exactly one of the following: (1) an abelian group; (2) a non-abelian quasi-discrete t.d.l.c.s.c. group; (3) an elementary t.d.l.c.s.c. group of decomposition rank 2 with trivial quasicenter; (4) an elementary t.d.l.c.s.c. group of decomposition rank ω + 1; (5) a direct product of copies of a simple Lie group; (6) a quasi-product of copies of a topologically simple t.d.l.c.s.c. group of decomposition rank greater than ω + 1; (7) a t.d.l.c.s.c. group of stacking type and decomposition rank greater than ω + 1. In particular, chief factors of l.c.s.c. groups have one of the above forms. 6 COLIN D. REID AND PHILLIP R. WESOLEK All of the cases (1)-(7) can occur as chief factors of an l.c.s.c. group. Example 9.2 shows case (7) occurs naturally, even for a chief factor of a compactly generated l.c.s.c. group. 2. Preliminaries 2.1. Notations and definitions. For P a poset, we say that D ⊆ P is a directed family if for all M, N ∈ D, there is L ∈ D with M ≤ L and N ≤ L. We say F ⊆ P is a filtering family if for all M, N ∈ F there is L ∈ F such that L ≤ M ∩ N . Given a group G and a set I, we denote the direct sum by G<I and the direct product by GI . For a subset K ⊆ G, CG (K) is the collection of elements of G that centralize every element of K. For the normalizer, we write NG (K). For A, B ⊆ G, we put [A, B] := haba−1 b−1 | a ∈ A and b ∈ Bi For a, b ∈ G, [a, b] := aba−1 b−1 and ab := bab−1 . For a, b, c ∈ G, we set [a, b, c] := [[a, b], c]. All topological groups are Hausdorff topological groups and are written multiplicatively. A topological group is Polish if the topology is separable and admits a complete, compatible metric. A locally compact group is Polish if and only if it is second countable. Topological group isomorphism is denoted by '. For a topological group G, the connected component of the identity is denoted by G◦ . The topological closure of a set K in G is denoted by K. We shall say that G is topologically perfect if [G, G] is dense in G. We use “t.d.”, “l.c.”, and “s.c.” for “totally disconnected”, “locally compact”, and “second countable”, respectively. The symbols Z, Q, Zp , Qp , and R denote the additive groups of the relevant rings with the discrete topology for Q and Z and the usual locally compact topology for the others. We write T for the circle group R/Z and write Cp for the cyclic group of order p. 2.2. Generalities on locally compact groups. A locally compact group is almost connected if the identity component is cocompact. For G a locally compact group, the set of almost connected subgroups is denoted by U(G). Note that G◦ = U ◦ for all open subgroups U of G, so U(G) consists precisely of those open subgroups U of G such that U/G◦ is compact. If G is a t.d.l.c. group, then U(G) is a base of identity neighborhoods, by van Dantzig’s theorem. A locally compact group is locally elliptic if every compact subset (equivalently, every finite subset) generates a relatively compact subgroup. The locally elliptic radical of a locally compact group G, denoted by RadLE (G), is the union of all closed normal locally elliptic subgroups of G. Theorem 2.1 (Platonov, [13]). For G a locally compact group, RadLE (G) is the unique largest locally elliptic closed normal subgroup of G. Additionally, RadLE (G/ RadLE (G)) = {1}. The quasi-center of a locally compact group G is QZ(G) := {g ∈ G | CG (g) is open}. The quasi-center is a characteristic subgroup, but it is usually not closed. A locally compact group is quasi-discrete if it has a dense quasi-center. For a compactly generated t.d.l.c. group G, there exists a locally finite graph Γ such that G acts vertex-transitively on Γ with compact open stabilizers; such DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 7 a graph is called a Cayley–Abels graph for G. The existence of this graph is ensured by the next proposition. Proposition 2.2 (See [1, Beispiel 5.2] or [11, Section 11]). Let G be a compactly generated t.d.l.c. group, let U ∈ U(G), let A be a compact symmetric subset of G such that G = hU, Ai and let D be a dense symmetric subset of G. (1) There exists a finite symmetric subset B of G such that B ⊆ D and BU = U B = U BU = U AU. (2) For any subset B satisfying part (1), it is the case that G = hBiU and the coset space G/U carries the structure of a locally finite connected graph, invariant under the natural G-action, where gU is adjacent to hU if and only if gU 6= hU and U g −1 hU ⊆ U BU . Thus, G/U is the vertex set of a Cayley–Abels graph for G. A (real) Lie group is a topological group that is a finite-dimensional analytic manifold over R such that the group operations are analytic maps. Closed subgroups of Lie groups are again Lie groups. A Lie group G can have any number of connected components in general, but G◦ is always an open subgroup of G. A Lie group L has a largest connected solvable normal subgroup; it is called the solvable radical of L and denoted by Sol(L). A connected Lie group with trivial solvable radical is called semisimple. A semisimple Lie group has discrete center, and modulo its center, it is a finite direct product of abstractly simple groups. The manifold structure of a Lie group gives a well-defined dimension dimR (G), which is additive with respect to extensions. We stress that dimension zero Lie groups are discrete. The dimension places a restriction on directed families of normal subgroups. Lemma 2.3. Let G be a connected Lie group and let D be a directed family of closed normal subgroups of G. Then there exists N ∈ D such that M N/N is discrete in G/N for all M ∈ D. Proof. Let d be the maximum of the set {dimR (N ) | N ∈ D} and take N ∈ D realizing this maximum. For all M ∈ D, there is K ∈ D extending N and M , since D is directed. The group K/N is a dimension zero Lie subgroup of G/N , hence K/N is discrete. We thus conclude that M N/N is also discrete, verifying the lemma.  Lie groups play a fundamental role in the structure theory of connected groups. Theorem 2.4 (Gleason–Yamabe; see [12, Theorem 4.6]). If G is an almost connected locally compact group, then RadLE (G) is compact, and G/ RadLE (G) is a Lie group. Moreover, there exist arbitrarily small compact normal subgroups K of G such that G/K is a Lie group. 2.3. Normal compressions of Polish groups. We conclude our preliminary discussion by recalling the basic theory of normal compressions developed in [14]. Definition 2.5. For G and H Polish groups, a normal compression map from G to H is an injective, continuous homomorphism ψ : G → H with dense, normal image. When such a map exists, we say that H is a normal compression of G. 8 COLIN D. REID AND PHILLIP R. WESOLEK Given a normal compression map ψ : G → H, there is a canonical action H y G via h.g := ψ −1 (hψ(g)h−1 ). This action is called the ψ-equivariant action, as it is the action with respect to which ψ is an H-equivariant map for H acting on itself by conjugation. Proposition 2.6 ([14, Proposition 3.5]). Suppose that G and H are Polish groups with ψ : G → H a normal compression map. Then the semidirect product G oψ H via the ψ-equivariant action is a Polish group under the product topology. Normal compression maps factor through this semidirect product. Theorem 2.7 ([14, Theorem 3.6]). Suppose that G and H are Polish groups with ψ : G → H a normal compression map and let O ≤ H be an open subgroup. Then the following hold: (1) π : G oψ O → H via (g, o) 7→ ψ(g)o is a continuous, surjective homomorphism with ker(π) = {(g −1 , ψ(g)) | g ∈ ψ −1 (O)}, and if O = H, then ker(π) ' G as topological groups. (2) ψ = π ◦ ι where ι : G → G oψ O is the usual inclusion. (3) G oψ O = ι(G) ker(π), and the subgroups ι(G) and ker(π) are closed normal subgroups of G oψ O with trivial intersection. This factorization allows some properties to pass back and forth under normal compressions, possibly up to an abelian factor. Proposition 2.8 ([14, Proposition 3.8]). Suppose that G and H are Polish groups with ψ : G → H a normal compression map and let K be a closed normal subgroup of G. Then the following hold: (1) The image ψ(K) is a normal subgroup of H. (2) If ψ(K) is also dense in H, then [G, G] ≤ K, and every closed normal subgroup of K is normal in G. We shall also make use of two technical results concerning connected components. Lemma 2.9 ([14, Lemma 3.11]). Let G and H be Polish groups with ψ : G → H a normal compression map. Let R := ψ −1 (H ◦ ) and let N := ψ(R). Then the following inclusions hold: [H ◦ , ψ(G)] ≤ ψ(R); [H ◦ , H] ≤ N ; [H ◦ , ψ(G)] ≤ ψ(G◦ ); [H ◦ , N ] ≤ ψ(G◦ ). Theorem 2.10 ([14, Theorem 3.12]). Suppose that G and H are Polish groups with ψ : G → H a normal compression map. Then the following hold: (1) The group H ◦ /ψ(G◦ ) is nilpotent of class at most two. (2) If H is connected, then both G/G◦ and H/ψ(G◦ ) are abelian. (3) If G is totally disconnected, then H ◦ is central in H. Corollary 2.11 ([14, Corollary 3.13]). Suppose that G and H are centerless topologically perfect Polish groups and that H is a normal compression of G. Then G is connected if and only if H is connected, and G is totally disconnected if and only if H is totally disconnected. 3. Elementary groups and the decomposition rank Elementary groups will appear several times in the present work. We here recall the relevant definitions and note several new properties. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 9 3.1. Introduction. Definition 3.1. The class E of elementary groups is the smallest class of t.d.l.c.s.c. groups such that (i) E contains all second countable profinite groups and countable discrete groups. (ii) E is closed under taking closed subgroups. (iii) E is closed under taking Hausdorff quotients. (iv) E is closed under forming group extensions. S (v) If G is a t.d.l.c.s.c. group and G = i∈N Oi where (Oi )i∈N is an ⊆-increasing sequence of open subgroups of G with Oi ∈ E for each i, then G ∈ E . We say that E is closed under countable increasing unions. The operations (ii) − (v) are often called the elementary operations. It turns 0 out operations (ii) and (iii) follow from the others, and (iv) can be weakened to (iv) : E is closed under extensions of profinite groups and discrete groups. These results are given by [20, Theorem 1.3]. The class of elementary groups enjoys additional closure properties: Theorem 3.2 (See [20, Theorem 1.3]). The class E enjoys the following properties: (1) If G ∈ E , H is a t.d.l.c.s.c. group, and ψ : H → G is a continuous, injective homomorphism, then H ∈ E . (2) If G is a t.d.l.c.s.c. group that is residually in E , then G ∈ E . In particular, E is closed under inverse limits that result in a t.d.l.c.s.c. group. A primary tool to study elementary groups is a canonical rank function. Definition 3.3. Let T be the class of t.d.l.c.s.c. groups. The decomposition rank ξ is a partial ordinal-valued function from T to [1, ω1 ) satisfying the following properties: (a) ξ(G) = 1 if and only if G ' {1};S (b) If G ∈ T is non-trivial and G = i∈N Oi with (Oi )i∈N some increasing sequence of compactly generated open subgroups of G, then ξ(G) is defined if and only if ξ(Ri ) is defined for Ri := Res(Oi ) for all i ∈ N. If ξ(G) is defined, then ξ(G) = sup ξ(Ri ) + 1. i∈N By [20, Theorem 4.7] and [20, Lemma 4.12], such a function ξ exists, is unique, has domain of definition exactly E , and is equivalent to the decomposition rank as defined in [20]. Note that if G is a non-trivial t.d.l.c.s.c. group that is compactly generated and has no non-trivial discrete quotients, then G is not in E . The class E is thus strictly smaller than the class of all t.d.l.c.s.c. groups. For convenience, we extend the definition of ξ to all t.d.l.c.s.c. groups by saying that a non-elementary group satisfies ξ(G) = ω1 . By definition, the rank of an elementary t.d.l.c.s.c. group is always a countable successor ordinal. We observe a slightly stronger restriction on the rank of a compactly generated group. Lemma 3.4. Let G be a compactly generated elementary t.d.l.c.s.c. group. Then ξ(G) = ξ(Res(G)) + 1 = β + 2 for some at most countable ordinal β. Proof. From the rank formula, ξ(G) = ξ(Res(G)) + 1; take Oi = G for all i ∈ N. On the other hand, ξ(Res(G)) is a successor ordinal, say β + 1, so ξ(G) = β + 2.  10 COLIN D. REID AND PHILLIP R. WESOLEK 3.2. Stability of the decomposition rank. The decomposition rank enjoys several useful stability properties. Proposition 3.5. For G a non-trivial elementary group, then the following hold: (1) If H is a t.d.l.c.s.c. group, and ψ : H → G is a continuous, injective homomorphism, then ξ(H) ≤ ξ(G). ([20, Corollary 4.10]) (2) If L E G is closed, then ξ(G/L) ≤ ξ(G). ([20, Theorem 4.19]) We give here a slightly sharper version of [16, Lemma 7.4]. Given a successor ordinal α, we write (α − 1) to mean the ordinal β such that α = β + 1. Lemma 3.6. Suppose that G is a t.d.l.c.s.c. group and G lies in a short exact sequence of t.d.l.c.s.c. groups {1} → N → G → Q → {1}. Then ξ(G) ≤ (ξ(N ) − 1) + ξ(Q). Proof. We argue by induction on ξ(Q) for all such G. In the base case, ξ(Q) = 1 and Q = {1}, so ξ(G) = ξ(N ) = (ξ(N ) − 1) + ξ(Q). Suppose that the lemma holds up to β and that ξ(Q) = β + 1. Let π : G → Q be the usual projection and fix (Oi )i∈N an increasing exhaustion of G by compactly generated open subgroups. Put Wi := π(Oi ) and note that the Wi form an increasing exhaustion of Q by compactly generated open subgroups. In view of the decomposition rank formula, it suffices to consider ξ(Res(Oi )) for an arbitrary i. Fix i ∈ N, form R := Res(Oi ), and put M := RN . It follows that M/N ≤ Res(Wi ), hence ξ(M/N ) ≤ β. The induction hypothesis implies ξ(M ) ≤ (ξ(N ) − 1) + β, and since R ,→ M , we conclude that ξ(R) ≤ (ξ(N ) − 1) + β. Appealing to Proposition 3.5, ξ(G) ≤ (ξ(N ) − 1) + β + 1, verifying the lemma.  Lemma 3.7. Qn Suppose that H1 , . . . , Hn are t.d.l.c.s.c. groups. If each Hi is elementary, then i=1 Hi is elementary with ! n Y ξ Hi = max ξ(Hi ). i=1 1≤i≤n Qn Proof. Set G := i=1 Hi . In view of Proposition 3.5, max1≤i≤n ξ(Hi ) ≤ ξ(G). We argue by induction on ξ(G) for the converse inequality. If ξ(G) = 1, then G is the trivial group, and the inductive claim is immediate. Suppose that ξ(G) = β + 1. For each 1 ≤ i ≤ n, let (Oj,i )j∈N be an increasing Qnexhaustion of Hi by compactly generated open subgroups. The groups Lj := i=1 Oj,i then form an increasing exhaustion of G by compactly generated open subgroups. Hence, ξ(G) = supj∈N ξ(Res(Li )) + 1. Qn On the other hand, Res(Lj ) = i=1 Res(Oj,i ), so the inductive hypothesis ensures that ξ(Res(Lj )) = max ξ(Res(Oj,i )). 1≤i≤n By passing to a subsequence if necessary, we may assume there is 1 ≤ k ≤ n such that ξ(Res(Lj )) = ξ(Res(Oj,k )) for all j ∈ N. Therefore, ξ(G) = sup ξ(Res(Oj,k )) + 1 = ξ(Hk ). j∈N Since it must be the case that ξ(Hk ) = max1≤i≤n ξ(Hi ), the induction is complete.  DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 11 Lemma 3.8. Suppose that G is a t.d.l.c.s.c. group and N is a non-trivial closed cocompact normal subgroup of G. If N ∈ E , then G ∈ E with ξ(G) = ξ(N ). Proof. Plainly G ∈ E . To compute the decomposition rank, fix (Oi )i∈N a countable ⊆-exhaustion of G by compactly generated open subgroups of G and put Ni := N ∩ Oi . The group Ni is open in N , and since Ni is cocompact in Oi , it is also compactly generated. We therefore infer that ξ(N ) = sup ξ(Res(Ni )) + 1. i∈N On the other hand, [20, Lemma 4.16] shows that Oi / Res(Ni ) is residually discrete, and it follows that Res(Oi ) = Res(Ni ). We conclude that ξ(G) = sup ξ(Res(Oi )) + 1 = sup ξ(Res(Ni )) + 1 = ξ(N ), i∈N i∈N verifying the lemma.  At this point it will be convenient to introduce notation for a kind of limit that often occurs with elementary decomposition rank. Definition 3.9. Given a set I of ordinals, define sup+ (I) = sup(I) if sup(I) is either ω1 or a successor ordinal and define sup+ (I) = sup(I) + 1 if sup(I) is a countable limit ordinal. If I is a singleton {α}, we write sup+ (α). The ordinal sup+ (I) is the least ordinal that is an upper bound for I and that is a potential decomposition rank for a t.d.l.c.s.c. group. It is easily verified, using the definition of the decomposition rank, that if G is an ascending union of open subgroups Oi , then ξ(G) = supi∈N + ξ(Oi ). In fact, the same formula applies more generally if G contains a dense ascending union of closed subgroups, as long as these subgroups each have open normalizer. Proposition 3.10. Let G be a t.d.l.c.s.c. group and let (Ci )i∈I be a directed family S of closed subgroups of G each with open normalizer such that G = i∈I Ci . If each Ci is elementary, then G is elementary with ξ(G) = sup+ ξ(Ci ). i∈I Proof. By Proposition 3.5, we have ξ(Ci ) ≤ ξ(G) for each i. Thus sup+ i∈I ξ(Ci ) ≤ ξ(G). For the reverse inequality, fix U ∈ U(G) and let (Oj )j∈N be an increasing exhaustion of GSby compactly generated open subgroups each containing U . For each j, the union i∈I Oj ∩ Ci is dense in Oj , so in view of Proposition 2.2, we may find i and A ⊆ Oj ∩ Ci such that U AU = AU and U AU contains a generating set for Oj . Therefore, Oj = hAiU = (Oj ∩ Ci )U . The subgroup Ci has an open normalizer, so we may take an open V E U such that V ≤ NG (Ci ). The group hAV iV is then a finite index subgroup of Oj . Letting L be the normal core of hAV iV in Oj , we see that L is a finite index normal subgroup of Oj and of hAV iV . Lemma 3.8 thus ensures that ξ(hAV iV ) = ξ(L) = ξ(Oj ). Furthermore, hAV i is a closed cocompact normal subgroup of hAV iV , so a second application of Lemma 3.8 implies that ξ(hAV i) = ξ(Oj ). Proposition 3.5 now ensures that ξ(Oj ) ≤ ξ(Ci ). 12 COLIN D. REID AND PHILLIP R. WESOLEK Letting α := supi∈I ξ(Ci ), there are two possibilities: either α = α0 +1 is achieved by some ξ(Ci ), or α is a limit ordinal. If α is a limit ordinal, then ξ(G) = sup ξ(Res(Oj )) + 1 ≤ sup ξ(Ci ) + 1 = sup+ ξ(Ci ). i∈I j∈N i∈I On the other hand, suppose that α is achieved by some ξ(Ci ); without loss of generality, ξ(Ci ) = α for all i. For every compactly generated open subgroup Oj , we have that ξ(Oj ) ≤ α, so ξ(Res(Oj )) ≤ α0 . Hence, ξ(G) ≤ α0 + 1 = α. In either case, we have obtained the required upper bound on ξ(G). In particular, it follows that G is elementary.  There is also a dual result for residually elementary groups. Lemma 3.11. Let G be a t.d.l.c.s.c. group and α an ordinal. Then {N E G | N is closed and ξ(G/N ) ≤ α} is a filtering family. Proof. It suffices to show Σ := {N E G | N is closed and ξ(G/N ) ≤ α} is closed under pairwise intersections. Taking M, N ∈ Σ, the diagonal map G → G/N ×G/M induces an injective, continuous map G/(N ∩ M ) → G/N × G/M . Lemma 3.7 and Proposition 3.5 now ensure that ξ(G/(N ∩ M )) ≤ ξ(G/N × G/M ) ≤ α. Hence, N ∩ M ∈ Σ.  Proposition 3.12. Let G be a t.d.l.c.s.c. group and let K be a family of closed normal subgroups of G with trivial intersection. Then ξ(G) = sup + ξ(G/K). K∈K If G is compactly generated and elementary, then there is K ∈ K such that ξ(G) = ξ(G/K). Proof. Every K ∈ K has rank less than or equal sup+ K∈K ξ(G/K). Applying Lemma 3.11, we may expand K to a filtering family K̃ such that sup+ ξ(G/K) = K∈K̃ sup+ K∈K ξ(G/K). Replacing K with K̃, we may assume, without loss of generality, that K is a filtering family. If G/K is non-elementary for some K ∈ K, then G is also non-elementary, and there is nothing to prove. We thus assume that G/K is elementary for all K ∈ K, so by Theorem 3.2(2), G is elementary. Proposition 3.5 then ensures that ξ(G/K) ≤ ξ(G) for all K ∈ K, and it follows that sup+ K∈K ξ(G/K) ≤ ξ(G). + Say that α + 1 = supK∈K G/K. We argue that ξ(G) ≤ α + 1 by induction on α. The base case, α = 0, is immediate, since in this case G = {1}. Suppose that α is a successor ordinal; say α = β + 1. For any compactly generated open subgroup O ≤ G and K ∈ K, ξ(O/(O ∩ K)) ≤ β + 2, so ξ(Res(O/(O ∩ K))) ≤ β + 1. The quotient of O/(O ∩ K) by Res(O)(O ∩ K)/O ∩ K is a quotient of O/ Res(O), so it is residually discrete. Hence, Res(O)(O ∩ K)/(O ∩ K) ≤ Res(O/(O ∩ K)). There is thus an injective, continuous map from Res(O)/(Res(O)∩K) into Res(O/(O ∩K)). Appealing to Proposition 3.5, we conclude that ξ(Res(O)/(Res(O) ∩ K)) ≤ β + 1. Since β < α and β does not depend on K, the inductive hypothesis ensures that ξ(Res(O)) ≤ β + 1 = α. It now follows that ξ(G) ≤ β + 2 = α + 1, since O is an arbitrary compactly generated open subgroup. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 13 Let us now consider the case when α is a limit ordinal, and since α > 0, the ordinal α is transfinite. Take O ≤ G a compactly generated open subgroup. If ξ(O) is finite, then the inductive hypothesis implies that ξ(O) = sup+ K∈K (ξ(O/O ∩ K)). Since {ξ(O/O ∩ K)}K∈K is a bounded collection of finite ordinals, there is some K ∈ K such that ξ(O) = ξ(O/O ∩ K). Let us now suppose that ξ(O) is transfinite. Since K is a filtering family, we may apply [15, Theorem 3.3] to find K ∈ K such that there is a compact L ≤ K ∩ O that is normal in O and is open in K ∩ O. Applying Proposition 3.5 and Lemma 3.6, we deduce that ξ(O/K ∩ O) ≤ ξ(O) ≤ ξ(L) + ξ(K ∩ O/L) + ξ(O/K ∩ O) ≤ 4 + ξ(O/K ∩ O). Since ξ(O) is transfinite, the only way to achieve such inequalities is if ξ(O/K ∩O) = ξ(O). We conclude that ξ(O) ≤ α + 1 for any compactly generated open subgroup O and hence that ξ(Res(O)) ≤ α. It now follows that ξ(G) ≤ α + 1, completing the induction. The second claim follows from the previous paragraph.  3.3. Regionally SIN groups. Elementary groups of decomposition rank 2 have a natural characterization. A topological group is a small invariant neighborhood group, abbreviated SIN, if there is a basis at 1 of conjugation invariant neighborhoods. A t.d.l.c. group is a SIN group if and only if there is a basis at 1 of compact open normal subgroups. We say that a t.d.l.c. group is regionally SIN if every open compactly generated subgroup is a SIN group. Lemma 3.13. For a non-trivial t.d.l.c.s.c. group G, the following are equivalent: (1) G is regionally SIN; (2) G is elementary with ξ(G) = 2. Proof. From the definition of decomposition rank, we see that G is elementary with ξ(G) = 2 if and only if every compactly generated open subgroup of G is residually discrete. By [6, Corollary 4.1], a compactly generated t.d.l.c. group is residually discrete if and only if it is a SIN group, and the conclusion follows.  Lemma 3.14. Let G be a quasi-discrete l.c.s.c. group. Then G◦ is central in G and G/G◦ is elementary with ξ(G/G◦ ) ≤ 2. Proof. Every open subgroup contains G◦ , so G◦ centralizes QZ(G). Since QZ(G) is dense, G◦ is in fact central. We see that G/G◦ is quasi-discrete, so we may assume G◦ = {1}. The group G is then a t.d.l.c.s.c. group, and via [6, Proposition 4.3], G is regionally SIN. Lemma 3.13 now ensures that ξ(G) ≤ 2.  3.4. The bounded rank residuals. Proposition 3.12 suggests a natural source of closed characteristic subgroups. Definition 3.15. For a t.d.l.c.s.c. group G and an ordinal α ≥ 1, define the rank-α residual to be \ Resα (G) := {K E G | K is closed and ξ(G/K) ≤ α} The rank-ω residual will be called the finite rank residual of G. These residuals have many nice properties. First, the rank of the quotient G/ Resα (G) is restricted. 14 COLIN D. REID AND PHILLIP R. WESOLEK Proposition 3.16. For G a t.d.l.c.s.c. group and α an at most countable ordinal, the following hold: (1) ξ(G/ Resα (G)) ≤ sup+ (α); (2) If G is compactly generated and α is a limit ordinal, then ξ(G/ Resα (G)) < α. (3) If G is compactly generated, then Res2 (G) = Res(G). Proof. Claim (1) is immediate from Proposition 3.12 and Lemma 3.11. Claim (3) is an easy exercise. For claim (2), Proposition 3.12 ensures there is a closed normal subgroup K of G such that ξ(G/R) = ξ(G/K) ≤ α. Since the rank of G/R is a successor ordinal, we conclude that ξ(G/R) < α.  The rank-α residual of G can be expressed in terms of the rank-α residuals of compactly generated open subgroups. Proposition 3.17. Let α ≥ 2 be an at most countable ordinal, G an t.d.l.c.s.c. group, and (Oi )i∈N be an increasing exhaustion of G by compactly generated open subgroups. If α is a successor ordinal, then [ Resα (Oi ). Resα (G) = i∈N If α is a limit ordinal, then ! Resα (G) = \ [ β<α i∈N Resβ (Oi ) . Proof. Take β an ordinal and (Oi )i∈N an ⊆-increasing exhaustion of G by compactly S generated openSsubgroups. The union i∈N Resβ (Oi ) is an increasing union of subgroups, so i∈N Resβ (Oi ) is a subgroup of G. Given a compactly generated open subgroup L of G, sufficiently large i are such that L ≤ Oi , hence Resβ (L) ≤ S Resβ (Oi ). We deduce that i∈N Resβ (Oi ) is in fact the union of S Resβ (L) as L ranges over all compactly generated open subgroups of G. Hence, i∈N Resβ (Oi ) is indeed a characteristic subgroup of G. We are now ready to proveSthe claims. Suppose first that α = β + 1 is a successor ordinal and set R := i∈N Resα (Oi ). Suppose that K E G is closed with ξ(G/K) ≤ α. By Proposition 3.5, Oi /(Oi ∩ K) is a compactly generated open subgroup of G/K of rank at most α for every i. We deduce that Resα (Oi ) ≤ K, so R ≤ K. Therefore, R ≤ Resα (G). For the converse inclusion, fix a compactly generated open subgroup L/R of G/R. For i sufficiently large, L ⊆ Oi R, and there is a quotient map from Oi / Resα (Oi ) to Oi R/R. Applying Proposition 3.5, we deduce that ξ(L/R) ≤ ξ(Oi R/R) ≤ ξ(Oi / Resα (Oi )) ≤ α. Thus, ξ(Res(L/R)) ≤ β, and since L is arbitrary, it follows that ξ(G/R) ≤ β + 1 = α. We conclude that R ≥ Resα (G). Let us now consider the case when α is a limit ordinal. Set Rβ := Resβ (G). Since G has no quotients of rank exactly α, we see that \ Rα = Rβ . β<α DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 15 We can now use induction on α and the first part of the proposition applied to Rβ to write ! \ [ Resβ (Oi ) , Rα = β<α i∈N as required.  Corollary 3.18. Let G be a t.d.l.c.s.c. group and (Oi )i∈N be an increasing exhaustion of G by compactly generated open subgroups. Then [ Res2 (G) = Res(Oi ). i∈N Remark 3.19. If α is a limit ordinal, it is not necessarily the case that Resα (G) = S i∈N Resα (Oi ). For instance, if G is a topologically characteristically simple t.d.l.c.s.c. group with ξ(G) = ω + 1 (for an example, see §9.3 below), then Resω (G) = G by Theorem 3.23 below, but the finite rank radical of every compactly generated open subgroup of G is trivial. In the case of the rank-2 residual, we also have an easy calculation for the rank of Res2 (G) in terms of the rank of G. This will put a restriction on the possibilities for the ranks of topologically characteristically simple t.d.l.c.s.c. groups. Proposition 3.20. For G a non-compact elementary t.d.l.c.s.c. group, exactly one of the following occurs: (1) ξ(G) = ξ(Res2 (G)) = α + 1 where α is a countable transfinite limit ordinal; (2) Res2 (G) is a non-cocompact subgroup of G, and ξ(G) = ξ(Res2 (G)) + 1. Proof. Let (Oi )i∈N be an increasing exhaustion of G by compactly generated open S subgroups and set R := Res2 (G). By Corollary 3.18, i∈N Res(Oi ) = R . We have ξ(G) = sup ξ(Res(Oi )) + 1, i∈N and by Proposition 3.10, we also have ξ(R) = sup+ ξ(Res(Oi )). i∈N Set β := supi∈N ξ(Res(Oi )). If β is a successor ordinal, then ξ(R) = β, and ξ(G) = β + 1, so ξ(G) = ξ(R) + 1. In particular, R is a proper subgroup of G with ξ(G/R) = 2. In view of Lemma 3.8, the only way R can be cocompact is if it is trivial; however, this would imply that G is compact, contradicting the hypotheses. We conclude that (2) holds and (1) does not hold. If β is a limit ordinal, then β is transfinite. We conclude that ξ(R) = ξ(G) = β + 1. Condition (1) thus holds and (2) does not hold, completing the proof of the dichotomy.  Corollary 3.21. If G is a non-trivial topologically characteristically simple t.d.l.c.s.c. group, then exactly one of the following holds: (1) ξ(G) = 2; (2) ξ(G) = α + 1 for α some countable transfinite limit ordinal; (3) G is non-elementary. 16 COLIN D. REID AND PHILLIP R. WESOLEK Proof. The three cases are clearly mutually exclusive. Suppose that (3) does not hold, so G is an elementary group. Since G is topologically characteristically simple, Res2 (G) = {1}, or Res2 (G) = G. By Proposition 3.20, Res2 (G) = {1} if and only if G is elementary of rank 2; the case ξ(G) = 1 being eliminated by the hypothesis that G 6= {1}. We thus deduce that (1) holds if Res2 (G) = {1}. If Res2 (G) = G, then G is non-compact, since ξ(G) > 2. The dichotomy of Proposition 3.20 thus ensures that ξ(G) = α +1 for α some transfinite limit ordinal, hence (2) holds.  3.5. The rank-2 series. We conclude this section by isolating a canonical series of closed characteristic subgroups in a t.d.l.c.s.c. group. Definition 3.22. For a t.d.l.c.s.c. group G, the (lower) rank-2 series, denoted by (Gi )i∈N , is defined as follows: G0 := G and Gi+1 := Res2 (Gi ). We call a t.d.l.c.s.c. group rank-2 resolvable if the rank-2 series stabilizes at {1} in finitely many steps. We can think of the rank-2 series as an analogue of the derived series, with rank2 groups playing the role of abelian groups. The next results show this analogy can be pushed further. Theorem 3.23. For G a t.d.l.c.s.c. group and (Gi )i∈N the rank-2 series for G, the following hold: (1) For each i ∈TN, Gi = Resi+1 (G). (2) Resω (G) = i∈N Gi . (3) If G is compactly generated, then Resω (G) = Gj for some j ∈ N; in particular, the series (Gi )i∈N stabilizes in finitely many steps. Proof. For claim (1), we argue by induction on i ≥ 1. The base case, i = 1, holds by definition. Suppose that the claim holds up to i and consider Gi+1 . Let K E G be such that ξ(G/K) ≤ i+1 and put R := π −1 (Res2 (G/K)) where π : G → G/K is the usual projection. We see that G1 ≤ R and that ξ(R/K) ≤ i by Proposition 3.20. The inductive hypothesis now implies that the i-th term of the rank-2 series for R is contained in K. Since G1 ≤ R, we conclude that the i-th term of the rank-2 series of G1 is contained in K. That is to say, Gi+1 ≤ K, hence Gi+1 ≤ Resi+1 (G). For the converse inclusion, the induction hypothesis implies that ξ(G1 /Gi+1 ) ≤ i + 1, since Gi+1 is the i-th term of the rank-2 series for G1 . It is easy to see that Res2 (G/Gi+1 ) = G1 /Gi+1 , hence applying Proposition 3.20, we deduce that ξ(G/Gi+1 ) ≤ i + 2. Therefore, Gi+1 = Resi+1 (G), completing the induction. For claim (2), the quotient G/Gj is the largest quotient of G of rank at most j + 1 by claim (1). In particular, if G/K is a quotient of G of finite rank, then T K ≥ Gj for some j. Hence, j∈N Gj ≤ Resω (G). The other inclusion is obvious, T so we conclude that Resω (G) = j∈N Gj . For the final claim, Proposition 3.16 ensures that G/ Resω (G) has finite rank, hence Resω (G) = Gj for some j.  The next corollary is now immediate from Theorem 3.23 and Proposition 3.16. Corollary 3.24. Let G be a t.d.l.c.s.c. group. Then G is an elementary group with finite rank if and only if G is rank-2 resolvable. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 17 If G does have finite rank, we see that the bound in Lemma 3.6 is achieved by the extensions coming from the rank-2 series. Thus at least in the case of groups of finite rank, the bound in Lemma 3.6 is the best possible. Corollary 3.25. Let G be an elementary t.d.l.c.s.c. group such that ξ(G) < ω, let (Gi )i∈N be the rank-2 series for G and let i ∈ N. Then ξ(G) = (ξ(Gi ) − 1) + ξ(G/Gi ). Proof. By Theorem 3.23 we have Gi = Resi+1 (G). It follows by Proposition 3.16 that ξ(G/Gi ) = j + 1 where 0 ≤ j ≤ i. Then we see that Gi = Resi+1 (G) = Resj+1 (G) = Gj and that we have a strictly descending chain of subgroups G0 > G1 > · · · > Gj . In particular, 2 ≤ ξ(Gk ) < ω for all 0 ≤ k < j, so for these k, then (ξ(Gk ) − 1) is not a limit ordinal. Repeated application of Proposition 3.20 yields ξ(G) = ξ(Gj ) + j; in turn, ξ(Gj ) + j = (ξ(Gj ) − 1) + ξ(G/Gj ).  4. Factorization of normal compressions in l.c.s.c. groups Suppose that G and H are l.c.s.c. groups with ψ : G → H a normal compression map. Since G and H are Polish groups, Proposition 2.6 and Theorem 2.7 supply a factorization of ψ as α/ G oψ H G ψ β #  H where α is a closed embedding with normal image, β is a quotient map, and ker(β) is isomorphic to G as a topological group. Our aim in the present section is to use the structure of locally compact groups to factorize ψ into a sequence of closed embeddings with normal image and quotient maps, such that all kernels and cokernels appearing in the sequence are small. This will allow group-theoretic properties to be transported between G and H. 4.1. The totally disconnected case. We first prove a factorization result for normal compression maps ψ : G → H of l.c.s.c. groups where ψ restricts to an isomorphism on the identity components. This is, in particular, the case when G and H are totally disconnected. An FC-group is a group in which every conjugacy class is finite; equivalently, an FC-group is such that every element has a finite index centralizer. The set of finite conjugacy classes of a group G forms a subgroup called the FC-center of G. We shall require some basic properties of FC-groups and elements with finite conjugacy classes. Lemma 4.1. Let G be a group. (1) If x ∈ G is an element of finite order such that |G : CG (x)| is finite, then x is contained in a finite normal subgroup of G. (Dietzmann’s Lemma [18, 14.5.7].) (2) If G is an FC-group, then [G, G] and G/Z(G) are torsion. Hence, every element of [G, G] or G/Z(G) is contained in a finite normal subgroup. ([18, Section 14.5]) Proving our factorization theorem requires two technical lemmas. 18 COLIN D. REID AND PHILLIP R. WESOLEK Lemma 4.2. Let G and H be l.c.s.c. groups with ψ : G → H a normal compression. For U ≤ H and K ≤ G closed subgroups, form H o := G oψ U where U acts via the ψ-equivariant action and set ∆K := {(k −1 , ψ(k)) ∈ H o | k ∈ K}. Then, (1) The set ∆K is a closed subgroup of H o with ∆K ≤ CH o (G × {1}). (2) If ψ restricts to a homeomorphism from K to ψ(K) and ψ(K) is a closed normal subgroup of U , then ∆K is normal in H o , and q ◦ ι is a closed map where q : H o → H o /∆K is the quotient map and ι : G → H o is the usual embedding. Proof. For (1), easy calculations verify that ∆K is a subgroup and that ∆K commutes with G×{1}. That ∆K is closed follows since K is closed and ψ is continuous. For (2), since ψ(K) is normal in U , the subgroup ∆K is normalized by {1} × U , and part (1) implies ∆K is centralized by G×{1}. The subgroup ∆K is thus normal in H o . To show that q ◦ ι is a closed map, it suffices to show ι(R)∆K is closed in H o for every closed subset R of G. Fix such an R. The set G × ψ(K) ⊆ H o is closed, and there is a continuous map γ : G × ψ(K) → G defined by (g, ψ(k)) 7→ gk. Moreover, ι(R)∆K is the preimage γ −1 (R). We deduce that ι(R)∆K is a closed subset of H o , proving that q ◦ ι is a closed map.  Lemma 4.3. Let G and H be l.c.s.c. groups with ψ : G → H a normal compression map. If U ∈ U(G), then NH (ψ(U )) is open in H. Furthermore, for every L ∈ U(H), there exists W ≤o U such that ψ(W ) is normalized by L. Proof. Consider U(G) as a collection of subgroups of G × {1} in the semidirect product H o = Goψ H, which is a Polish group by Proposition 2.6. Since U ∈ U(G) is a closed subgroup of H o , the normalizer NH o (U ) is closed. On the other hand, the ψ-equivariant action is continuous, so H o y U(G) as permutations. Recalling that U(G) is countable, we deduce that NH o (U ) is a closed subgroup of H o with countable index. The Baire Category Theorem now implies that NH o (U ) is open in H o , and it follows that NH (ψ(U )) is open in H. For the second claim, consider L an almost connected subgroup of H and fix U ∈ U(G). For each l ∈ L, the subgroup ψ −1 (lψ(U )l−1 ) is exactly the image of U by l under the ψ-equivariant action of H on G, hence ψ −1 (lψ(U )l−1 ) is again an element of U(G). On the other hand, every open subgroup of L has finite index. We deduce that |L : NL (ψ(U ))| is finite, and thus, ! \ −1 −1 W := ψ lψ(U )l l∈L is an element of U(G). Furthermore, ψ(W ) is normalized by L, verifying the claim.  A covering map between Polish groups G and H is a surjective, continuous homomorphism ψ : G → H such that there exist identity neighborhoods U in G and V in H for which ψ U : U → V is a homeomorphism. Covering maps between l.c.s.c. groups can be characterized as follows: ψ : G → H is a covering map if and only if it is a surjective continuous group homomorphism such that the kernel is discrete. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 19 We now obtain a decomposition of a normal compression ψ of t.d.l.c.s.c. groups as ψ = β ◦ α, where α is a closed embedding and β is a covering map. Theorem 4.4. Suppose that G and H are l.c.s.c. groups with ψ : G → H a normal compression map and that ψ restricts to a homeomorphism from G◦ to H ◦ . Then there is an l.c.s.c. group H̃, a closed embedding α : G → H̃ with normal image, and a covering map β : H̃ → H such that (1) (2) (3) (4) ψ = β ◦ α; H̃/α(G) is compact; ker(β) lies in the FC-center of H̃ and centralizes α(G); and H̃ = α(G) ker(β). If G and H are t.d.l.c.s.c. groups, then H̃ is also a t.d.l.c.s.c. group. Proof. Fix O ∈ U(H) and form H o := G o O where O acts on G via the ψequivariant action. By Proposition 2.6, H o with the product topology is an l.c.s.c. group. Fix W ∈ U(G) such that ψ(W ) E O, as given by Lemma 4.3, and observe that V := W o O is an almost connected open subgroup of H o . We now define the group H̃ and the maps α and β. For W as fixed in the previous paragraph, Lemma 4.2 ensures ∆W := {(w−1 , ψ(w)) ∈ H o | w ∈ W } is a closed normal subgroup of H o . We put H̃ := H o /∆W . For the map α, let ι : G → H o be the obvious inclusion and let q : H o → H̃ be the usual projection. We set α := q ◦ ι. To define β, consider the quotient map π : H o → H as in Theorem 2.7. The kernel of π is exactly ∆G , and since ∆G contains ∆W , the map π induces the desired map β : H̃ → H. Let us now check the claimed properties. The maps α and β are clearly continuous. It is also clear that α is injective with normal image. That α is a closed map is given by Lemma 4.2. To see β is a covering map, we remark that (g −1 , ψ(g)) ∈ ∆W V implies g ∈ W , so ∆G ∩ (∆W V ) = ∆W . Therefore, ker(β) ∩ q(V ) = {1}, so ker(β) is discrete, verifying that β is a covering map. Claims (1) and (4) are immediate from Theorem 2.7. For claim (2), the subgroup ι(G)∆W contains the connected component of H o , since ψ(G◦ ) = H ◦ . Recalling that O is almost connected, it follows that the quotient H o /ι(G)∆W ' H̃/α(G) is compact. For claim (3), ker(β) equals ∆G /∆W . The group ∆G is centralized by ι(G), hence ker(β) is centralized by α(G), verifying the second claim of (3). In view of (2), every element of ker(β) has a cocompact centralizer in H̃. On the other hand, ker(β) is a discrete normal subgroup of H̃, so every element indeed has an open centralizer. We thus deduce every x ∈ ker(β) has a finite index centralizer and so has a finite conjugacy class. That is to say, ker(β) is in the FC-center of H̃.  A locally compact group G is compactly presented if there is a presentation for G as an abstract group G = hS | Ri such that S has compact image in G and R consists of relators with bounded length. For such groups, we obtain a stronger factorization. 20 COLIN D. REID AND PHILLIP R. WESOLEK Corollary 4.5. Suppose that G and H are l.c.s.c. groups with ψ : G → H a normal compression map and that ψ restricts to a homeomorphism from G◦ to H ◦ . If G is compactly generated and H is compactly presented, then H̃, α, and β given by Theorem 4.4 can be chosen such that H̃/α(G) is compact abelian and ker(β) is central, finitely generated, and torsion free. Proof. Take O ∈ U(H), find W ∈ U(G) such that ψ(W ) E O, and form H̃ = G o O/∆W as given by Theorem 4.4. The group H̃ is compactly generated since it contains G as a cocompact subgroup. In view of [7, Proposition 8.A.10], ker(β) is the normal closure of a compact set. Applying Theorem 4.4, ker(β) is discrete and contained in the F C-center of H̃, hence ker(β) is indeed finitely generated by some finite subset X. Each x ∈ X is centralized by a finite index open subgroup of H̃, so C := CH̃ (ker(β)) is a finite index subgroup of H̃. Letting q : G o O → H̃ be the usual projection, we may find O0 ≤ O open with finite index such that q({1} × O0 ) ≤ C. Since q ◦ ι(G) = ι(G)∆W /∆W centralizes ker(β), we may assume further that ψ(W ) ≤ O0 . We now apply Theorem 4.4 to O0 and W to form H̃ 0 , α0 , and β 0 . The group H̃ 0 is an open subgroup of H̃ contained in C, and thus, ker(β 0 ) is central in H̃ 0 . We thus deduce that ker(β 0 ) is a central finitely generated subgroup. Observing that ker(β 0 ) = ∆G /∆W , the projection on the second coordinate gives an injective homomorphism ker(β 0 ) → O0 /ψ(W ). The group O0 /ψ(W ) is a profinite group since ψ(G◦ ) = H ◦ . We may thus find O00 ≤ O0 a finite index open subgroup such that ψ(W ) ≤ O00 and O00 /ψ(W ) avoids the torsion elements of the image of ker(β 0 ) in O0 /ψ(W ). Applying Theorem 4.4 to O00 and W , we form H̃ 00 , α00 , and β 00 . The group H̃ 00 is an open subgroup of H̃ 0 contained in C, and thus, ker(β 00 ) is central in H̃ 00 . Furthermore, the map ∆G /∆W → O00 /ψ(W ) must have torsion free image. We thus deduce that ker(β 00 ) is central, finitely generated, and torsion free. Without loss of generality, we now assume O = O00 . Appealing to Theorem 4.4 again, there is a normal compression map θ : ker(β) → H̃/α(G). Since ker(β) is abelian, we conclude that H̃/α(G) is abelian, verifying the corollary.  4.2. The general case. We now relax the requirement that ψ restricts to an isomorphism from G◦ to H ◦ . To deal with the connected components, we require several preliminary results. For an l.c.s.c. group G, the group of continuous automorphisms, denoted by Aut(G), carries a Polish topology, namely the modified compact-open topology; this topology is alternatively called the Braconnier topology or the Arens g-topology. When we consider Aut(G) as a topological group, we always mean with respect to this to this topology. Lemma 4.6. Suppose that G and H are l.c.s.c. groups with ψ : G → H a continuous embedding with dense image and that A ≤ Aut(G) is closed. If every α ∈ A has (α) ∈ Aut(H) such that ψ ◦ α = (α) ◦ ψ, then the map  : A → Aut(H) is continuous. Proof. That ψ has a dense image ensures the map  is a group homomorphism. To show that  is continuous, it thus suffices to verify that it is Borel measurable, since A and Aut(H) are Polish groups; see, for example, [9, (9.10)]. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 21 A sub-basis at 1 for Aut(H) is given by the sets AH (K, U ) := {β ∈ Aut(H) | ∀x ∈ K β(x)x−1 ∈ U and β −1 (x)x−1 ∈ U } where K ⊆ H is compact and U ⊆ H is an open neighborhood of 1. We may further restrict to compact sets K which are the closure of an open set. To show  is Borel measurable, it is therefore enough to show the preimage of AH (K, U ) is Borel-measurable in A for U open and K = O with O open and relatively compact. Fix such a K and U . Fix a countable basis B for the topology on H. Since U is open and H is a regular space, we may cover U by B ∈ B such that B ⊆ U . Let C ⊆ B be a cover of U by such B; we may additionally assume C is closed under finite unions. The set S ψ −1 (K) is a non-trivial closed set in G, so we may write ψ −1 (K) = i∈N Ji where the Ji are compact sets. For B ∈ C and i ∈ N, we now consider  Σ(i, B) := AG Ji , ψ −1 (B) ∩ A. We claim −1 (AH (K, U )) = [ \ Σ(i, B). B∈C i∈N Since the Σ(i,SB) are T open sets in A, this will prove  is Borel measurable. Take β ∈ B∈C i∈N Σ(i, B) and say that B ∈ C is such that β ∈ Σ(i, B) for all i. Take x ∈ ψ(ψ −1 (K)) and suppose that x = ψ(y) for y ∈ ψ −1 (K). Since (β)±1 ◦ ψ = ψ ◦ β ±1 , we have (β)±1 (x)x−1 = ψ(β ±1 (y)y −1 ) ∈ B. The set K is the closure of an open set, so ψ(ψ −1 (K)) is dense in K. We thus deduce that (β)±1 (x)x−1 ∈ B ⊆ U for all x ∈ K. That is to say, (β) ∈ AH (K, U ). On the other hand, take β ∈ −1 (AH (K, U )). Since K is compact, C is closed under finite unions and the maps K → U by x 7→ (β)±1 (x)x−1 are continuous, there is some B ∈ C for which B contains the image of both maps. For each i and y ∈ Ji , we thus have T(β)±1 (ψ(y))ψ(y)−1 ∈ B. Hence, β ±1 (y)y −1 ∈ ψ −1 (B). It now follows that β ∈ i∈N Σ(i, B), and the claim is demonstrated.  A locally compact group G is a (CA) group if the natural map ρ : G → Aut(G) has a closed image, where Aut(G) is endowed with the modified compact-open topology. Theorem 4.7 (Zerling, [21, Main Theorem]). Suppose that G is a connected locally compact group that is not a (CA) group. Then there is a (CA) locally compact connected group N , a torus T that acts continuously on N , and a vector group V that maps densely into T , such that: (1) P := N o T is a (CA) locally compact group. (2) G ' N o V . (3) Every automorphism of G as a topological group extends to an automorphism of P as a topological group. Given a normal compression map ψ : G → H of connected l.c.s.c. groups, we have control over the derived group of H. Corollary 4.8. If G and H are connected l.c.s.c. groups with ψ : G → H a normal compression map, then [H, H] ≤ ψ(G)Z(H). 22 COLIN D. REID AND PHILLIP R. WESOLEK Proof. Let P and N be as given in Theorem 4.7 for G and let  : Aut(G) → Aut(P ) be the group homomorphism, necessarily unique, taking each automorphism of G to its extension to an automorphism of P . Lemma 4.6 ensures  is continuous. Define ρ : H → Aut(G) to be the map induced by the ψ-equivariant action of H on G. The group ψ(G) is dense in H, so by continuity, ρψ(G) is dense in ρ(H). Since P is a (CA) group, we see that Inn(P ) is a closed subgroup of Aut(P ) that contains ρψ(G). Hence, ρ(H) ≤ Inn(P ). We thus obtain a continuous homomorphism θ : H → P/Z(P ). In particular, θ([H, H]) ≤ [P, P ]Z(P )/Z(P ), and since [P, P ] ≤ N ≤ G, every element of [H, H] induces an inner automorphism of G. We conclude that [H, H] ≤ ψ(G)CH (ψ(G)). Since CH (ψ(G)) = Z(H), we indeed have [H, H] ≤ ψ(G)Z(H), as desired.  The following special case is immediate. Corollary 4.9. Suppose that G and H are connected l.c.s.c. groups with ψ : G → H a normal compression map. If G is topologically perfect and H is centerless, then ψ is an isomorphism of topological groups. We now prove the desired factorization result for arbitrary normal compression maps between l.c.s.c. groups. Theorem 4.10. Suppose that G and H are l.c.s.c. groups with ψ : G → H a normal compression map. Then there are continuous homomorphisms and l.c.s.c. groups α β1 α β2 α β3 1 2 3 G = G0 −→ K1 −→ G1 −→ K2 −→ G2 −→ K3 −→ H such that the following properties hold: (1) ψ = β3 ◦ α3 ◦ β2 ◦ α2 ◦ β1 ◦ α1 ; (2) The αi are closed embeddings with normal image, the βi are quotient maps, and β3 is a covering map; (3) The groups K1 /α1 (G) and ker(β1 ) are abelian; (4) The groups K2 /α2 (G1 ) and ker(β2 ) are solvable of derived length at most 3; (5) K3 /α3 (G2 ) is compact, and K3 = α3 (G2 ) ker(β3 ); and (6) ker(β3 ) lies in the FC-center of K3 and centralizes α3 (G2 ). Proof. We build the maps αi and βi and the groups Ki and Gi in stages. Define R1 := ψ(G◦ ) ≤ H ◦ and K1 := G oψ Z(R1 ) where Z(R1 ) acts via the ψ-equivariant action. Set ∆1 := {(g −1 , ψ(g)) ∈ K1 | g ∈ G} and G1 := K1 /∆1 . Let α1 be the natural closed embedding of G into K1 and let β1 be the natural quotient map from K1 to G1 . The groups K1 and G1 are l.c.s.c. groups by Proposition 2.6 and Lemma 4.2, and the cokernel of α1 and the kernel of β1 are abelian. Let ψ1 : G1 → H be such that ψ1 ◦ β1 ◦ α1 = ψ; that is, ψ1 is the map (g, r)∆1 7→ ψ(g)r. The map ψ1 is a normal compression map. Additionally, the map ψ1 ◦ β1 α1 (G◦ ) : α1 (G◦ ) → R1 is a normal compression map from the connected l.c.s.c. group α1 (G◦ ) to the connected l.c.s.c. group R1 . By Corollary 4.8, we have that [R1 , R1 ] ≤ ψ(G◦ )Z(R1 ). DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 23 Both ψ(G◦ ) and Z(R1 ) are subgroups of ψ1 (G1 ), hence [R1 , R1 ] ≤ ψ1 (G1 ). The group T1 := ψ1−1 ([R1 , R1 ]) is thus isomorphic as a topological group to [R1 , R1 ] via ψ1 . Define A2 := G1 oψ1 H ◦ , set ∆2 := {(t−1 , ψ1 (t)) ∈ A2 | t ∈ T1 }, and put K2 := A2 /∆2 . By Lemma 4.2, K2 is an l.c.s.c. group, and the natural map α2 : G1 → K2 is a closed embedding. Letting ρ be the composition H ◦ → A2 → K2 , the image α2 (G1 ) contains ρ([R1 , R1 ]). Lemma 2.9 ensures [[H, H ◦ ], H ◦ ] ≤ R1 , and thus, K2 /α2 (G1 ) is solvable of derived length at most 3. Define ∆3 := {(g −1 , ψ1 (g)) ∈ A2 | g ∈ G1 } and G2 := A2 /∆3 . Define the map β2 to be the natural quotient map from K2 to G2 . The kernel of β2 is ker(β2 ) = ∆3 /∆2 . The projection onto the second coordinate of ∆3 induces an injective homomorphism ∆3 /∆2 → H ◦ /[R1 , R1 ]. Since [[H, H ◦ ], H ◦ ] ≤ R1 , we conclude that H ◦ /[R1 , R1 ] is solvable of derived length at most 3. Hence, ker β2 is solvable of derived length at most 3. As with G1 , we obtain a normal compression map ψ2 : G2 → H such that ψ2 ◦ β2 ◦ α2 ◦ β1 ◦ α1 = ψ. The group A2 already contains a copy of H ◦ , so we have ψ2 (G2 ) ≥ H ◦ . The map ψ2 thus restricts to an isomorphism from (G2 )◦ to H ◦ . We finally obtain the maps α3 and β3 by applying Theorem 4.4 to ψ2 : G2 → H, completing the construction.  5. Properties invariant under normal compressions We now explore to what extent various properties are preserved under normal compressions. Several of the properties studied here and the derived preservation theorems will be used later to analyze the structure of chief factors. 5.1. Compact generation. Given a t.d.l.c.s.c. group G and a normal compression H of G with H compactly generated, it does not followL that G is compactly generQ ated. For example, i∈N Fi is a normal compression of i∈N Fi for any sequence of finite groups (Fi )i∈N , and R is a normal compression of Q. Our next theorem shows that if H is compactly generated, then profinite quotients and connected central factors of H are the only potential obstacles to the compact generation of G. Theorem 5.1. Suppose that G and H are l.c.s.c. groups with ψ : G → H a normal compression map and set R := ψ −1 (H ◦ ). (1) If G is compactly generated, then H is compactly generated. (2) If H is compactly generated and R/[R, G] is compactly generated, then there exists an increasing exhaustion (Ni )i∈N of G by compactly generated open normal subgroups such that ψ(Ni ) is cocompact and normal in H for each i ∈ N. Proof. Claim (1) is immediate. For (2), we see that R ≥ G◦ , and Lemma 2.9 implies [R, G] ≤ G◦ . The quotient R/[R, G] is compactly generated, so R/G◦ is also compactly generated. It now follows that G is compactly generated if and only if G/R is compactly generated. We thus reduce to G/R, and since ψ induces a normal compression map ψ̃ : G/R → H/H ◦ , we may suppose that both G and H are totally disconnected. Using Lemma 4.3, we fix W ∈ U(G) and U ∈ U(H) such that ψ(W ) is a normal subgroup of U . Let {gi }i∈N be a countable dense subset of G with 1 = g0 and set Si := {ψ(g0 ), . . . , ψ(gi )}. By Proposition 2.2, there is a finite symmetric set 24 COLIN D. REID AND PHILLIP R. WESOLEK Ai ⊆ H containing Si such that U Ai U = Ai U and Ai U generates H. Since ψ(G) is dense, we can choose Ai to be a subset of ψ(G); we can also choose (Ai )i∈N to be an increasing sequence. The group U acts continuously on G via the ψ-equivariant action. Under this action, the orbit U.ψ −1 (Ai ) is a compact subset of G, so we obtain a compactly generated open subgroup Ni := hU.ψ −1 (Ai ), W i that contains {g0 , . . . , gi }. The sequence (Ni )i∈N is thus an increasing exhaustion of G by compactly generated open subgroups. Fix i, set N := Ni , and set A := Ai . The group ψ(N ) is generated by AU ∪ψ(W ). That ψ(W ) E U ensures that U normalizes ψ(N ), and plainly, A ⊆ ψ(N ). Since H = hA, U i, we deduce that ψ(N ) E H and hence N E G. The group U maps surjectively onto H/ψ(N ), so ψ(N ) is also cocompact in H. The proof is now complete.  Corollary 5.2. Suppose that G and H are t.d.l.c.s.c. groups with H a normal compression of G. Then G is compactly generated if and only if H is compactly generated and every discrete quotient of G is finitely generated. Proof. If G has an infinitely generated discrete quotient, then certainly G is not compactly generated, and if H is not compactly generated, then G is not compactly generated by Theorem 5.1. Conversely, if H is compactly generated and every discrete quotient of G is finitely generated, then in particular G/Ni is finitely generated for all i where (Ni )i∈N is the exhaustion given by Theorem 5.1. It now follows that G = Nj for j large enough, and thus, G is compactly generated.  Corollary 5.3. Suppose that G and H are non-abelian non-compact topologically characteristically simple l.c.s.c. groups with H a normal compression of G. Then G is compactly generated if and only if H is compactly generated. Proof. Since both G and H are topologically characteristically simple groups, Corollary 2.11 ensures either both are totally disconnected or both are connected. Connected groups are compactly generated, so the corollary is immediate in the latter case. We thus assume that G and H are t.d.l.c.s.c. groups. The forward implication is given by Theorem 5.1. Conversely, suppose that H is compactly generated and let ψ : G → H be a normal compression map. Appealing to Theorem 5.1, there is N E G open and compactly generated such that ψ(N ) is cocompact in H. The quotient H/ψ(N ) is therefore a profinite group. If this quotient is non-trivial, then Res(H) is a proper characteristic closed subgroup of H, hence Res(H) = {1}. We thus deduce that H is residually discrete. Applying [6, Corollary 4.1], H admits a compact open normal subgroup L. The locally elliptic radical of H is then a non-trivial characteristic closed subgroup, hence H is a compactly generated locally elliptic group. We conclude that H is compact, which contradicts the hypotheses. The group ψ(N ) thus equals H, and Proposition 2.8 implies [G, G] ≤ N . Since G is non-abelian and topologically characteristically simple, we conclude that N = G. In particular, G is compactly generated.  5.2. Decomposition rank. The property of being elementary and the associated decomposition rank are outright invariant under normal compressions between t.d.l.c.s.c. groups. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 25 Proposition 5.4. Suppose that G and H are t.d.l.c.s.c. groups with H a normal compression of G. Then G is elementary with decomposition rank α if and only if H is elementary with decomposition rank α. Proof. Let ψ : G → H be a normal compression map. Let H̃, α : G → H, and β : H̃ → H be as given by Theorem 4.4. Suppose first that G is an elementary group. Since G embeds as a cocompact normal subgroup of H̃, Lemma 3.8 implies that ξ(H̃) = ξ(G). The group H is a quotient of H̃, so in view of Proposition 3.5, we deduce that H is elementary with ξ(H) ≤ ξ(G). On the other hand, ψ : G → H is a continuous injective homomorphism, and Proposition 3.5 thus shows that ξ(G) ≤ ξ(H). We conclude that ξ(H) = ξ(G). Conversely, if H is elementary, then Proposition 3.5 ensures that G is elementary. The forward direction then implies that ξ(G) = ξ(H).  5.3. Amenability. A locally compact group G is amenable if every continuous affine action of G on a non-empty compact convex subset of a locally convex topological vector space has a fixed point; we direct the reader to [2, Appendix G] for an account of the basic theory of amenable groups. Amenability is a second property outright preserved under normal compressions. Let us recall several basic facts. Lemma 5.5 (See [2, Appendix G]). Let G be an l.c.s.c. group. (1) Every compact or virtually solvable l.c.s.c. group is amenable. (2) If K is a closed normal subgroup of G, then G is amenable if and only if both K and G/K are amenable. (3) If G is amenable, then every closed subgroup of G is amenable. (4) If H is an amenable l.c.s.c. group and ψ : H → G is a continuous homomorphism, then ψ(H) is amenable. S (5) If G = α∈I Aα with (Aα )α∈I a directed system of closed amenable subgroups of G, then G is amenable. Observe that the FC-groups are also amenable, with respect to the discrete topology; this is an easy exercise using Lemma 5.5. Proposition 5.6. Suppose that G and H are l.c.s.c. groups with H a normal compression of G. Then G is amenable if and only if H is amenable. Proof. If G is amenable, then H is amenable by Lemma 5.5. Conversely, suppose that H is amenable. Applying Theorem 4.10, we obtain a factorization of ψ : G → H as ψ = β3 ◦ α3 ◦ β2 ◦ α2 ◦ β1 ◦ α1 where α β1 α β2 α β3 1 2 3 G = G0 −→ K1 −→ G1 −→ K2 −→ G2 −→ K3 −→ H The kernel ker(β3 ) is an FC-group, so it is amenable. Since H is also amenable, Lemma 5.5 ensures that K3 is amenable. Each γ ∈ {α1 , α2 , α3 , β1 , β2 } is either a closed embedding or a quotient map with solvable kernel. In either case, if the range of γ is amenable, then so is the domain. Since K3 is amenable, we deduce that G is amenable.  5.4. Quasi-discreteness. Just as with compact generation, discreteness is not a normal compression invariant, even if we restrict to compressions between L Q nonabelian topologically characteristically simple groups; cf. A and 5 i∈Z i∈Z A5 . 26 COLIN D. REID AND PHILLIP R. WESOLEK There is a more general property that is close to discreteness and admits better preservation properties: A l.c.s.c. group G is said to be quasi-discrete if G has a dense quasi-center QZ(G) := {g ∈ G | CG (g) is open}. Remark 5.7. For an l.c.s.c. group G, the quasi-center QZ(G) is the union of all countable conjugacy classes in G, so QZ(G) is the union of all countable normal subgroups of G. This gives the following characterization: For G an l.c.s.c. group, G is quasi-discrete if and only if G contains a countable dense normal subgroup. The quasi-discrete l.c.s.c. groups are thus exactly the l.c.s.c. groups that arise as normal compressions of countable discrete groups. Our proof requires a classical commutator identity; recall that [x, y, z] := [[x, y], z], [a, b] = aba−1 b−1 , and ab = bab−1 . Fact 5.8 (Hall–Witt identity). For G a group and any a, b, c ∈ G, the following holds: [a−1 , c, b]a [b−1 , a, c]b [c−1 , b, a]c = 1. Theorem 5.9. Suppose that G and H are l.c.s.c. groups with H a normal compression of G. (1) If H is quasi-discrete, then G/QZ(G) is metabelian. (2) If G is quasi-discrete, then H/QZ(H) is metabelian. Proof. Let ψ : G → H be a normal compression map. For (1), set Q := QZ(H). For g ∈ G such that ψ(g) ∈ Q, the injectivity of ψ ensures that ψ −1 (CH (ψ(g))) = CG (g), so CG (g) is open. We deduce that ψ −1 (Q) ≤ QZ(G). Setting R := ψ(G) ∩ Q, the subgroups ψ(G) and Q commute modulo R, and since ψ(G) and Q are both dense normal subgroups of H, the group H/R is abelian. The group G/K with K := ψ −1 (R) is therefore abelian. The map ψ : K → R is a normal compression map, and K ∩ QZ(G) is a closed normal subgroup of K with dense image in R. Proposition 2.8 ensures that [K, K] ≤ K ∩QZ(G). It now follows that G/QZ(G) is metabelian, verifying (1). For (2), each g ∈ QZ(G) centralizes G◦ , so G◦ ≤ Z(G), which implies that Z := ψ(G◦ ) is central in H. We thus obtain a normal compression map G/G◦ → H/Z with G/G◦ quasi-discrete. Let K := π −1 (QZ(H/Z)) with π : H → H/Z the usual projection. For each m, n ∈ K, there is an open subgroup O ≤ H such that [O, m] ∪ [O, n] ⊆ Z. Therefore, [o−1 , m, n] = [n−1 , o, m] = 1, and the Hall-Witt identity with a := o, c := m, and b := n implies [m−1 , n, o] = 1 for all o ∈ O. We deduce that [m−1 , n] ∈ QZ(H) for all m, n ∈ K, and thus, [K, K] ≤ QZ(H). To show that H/QZ(H) is metabelian, it suffices to verify that H/K is abelian. We observe that H/K ' (H/Z)/(K/Z), so it is enough to show that (H/Z)/QZ(H/Z) is abelian. By passing to H/Z, we assume that Z = {1} and argue that H/QZ(H) is abelian. Given this reduction, G is a t.d.l.c. group. Fix n, m ∈ QZ(G) and W ∈ U(G) such that W centralizes n and m. Appealing to Lemma 4.3, we may find V ∈ U(H) such that ψ(W ) E V . We now consider R := hψ(n), ψ(m), ψ(W ), V i ≤ H. The subgroup L := ψ(W ) is a compact normal subgroup of R that centralizes ψ(m) and ψ(n). Furthermore, (ψ(G) ∩ R)L/L is countable and normal in R/L, so it is quasi-central in R/L. We may thus find an open subgroup V 0 of V such that [V 0 , ψ(n)] ∪ [V 0 , ψ(m)] ⊆ L. Fixing v ∈ V 0 , we DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 27 see that [v −1 , ψ(m), ψ(n)] = 1 and [ψ(n)−1 , v, ψ(m)] = 1. The Hall–Witt identity with a := v, b := ψ(n), and c := ψ(m) thus implies that [ψ(m)−1 , ψ(n), v] = 1. It follows that [ψ(m)−1 , ψ(n)] = ψ([m−1 , n]) has an open centralizer in H. We have now established that ψ([QZ(G), QZ(G)]) ≤ QZ(H). On the other hand, QZ(G) is dense in G, so by continuity, ψ(QZ(G)) is a dense subgroup of H. We deduce that [H, H] ≤ ψ([QZ(G), QZ(G)]). The group H/QZ(H) is thus abelian, completing the proof of (2).  Corollary 5.10. Suppose that G and H are topologically perfect l.c.s.c. groups with H a normal compression of G. Then H is quasi-discrete if and only if G is quasi-discrete. 6. Generalized direct products We now relate locally compact generalized central products to local direct products, showing in particular that any t.d.l.c. quasi-product is a normal compression of a local direct product. We then establish a structure theorem for locally compact groups of semisimple type. Our discussion concludes by considering generalized central products of elementary groups. 6.1. Preliminaries. For a topological group G and J a set of closed subgroups, we define GJ := hN | N ∈ Ji. Definition 6.1. Suppose that G is a topological group and S ⊆ N (G). The set S is a generalized central factorization of G, if GS = G and [N, M ] = {1} for any distinct N and M in S. In such a case, (G, S) is said to be a generalized central product; we will also say that G is a generalized central product, when the factorization is implicit. We say S is a quasi-direct factorization of G if GS = G and S has the following topological independence property: \ \ ∀X ⊆ P(S) : X=∅⇒ GA = {1}. A∈X In such a case, (G, S) (or G) is said to be a quasi-product. A subgroup H of G is a quasi-factor of G if it is an element of some quasi-direct factorization of G. A factorization S is non-trivial if |S| ≥ 2. We shall make use of a general property of generalized central products. Theorem 6.2 ([14, Theorem 1.7]). Let G be a topological group with S a non-trivial generalized central factorization of G. Then the diagonal map Y d:G→ G/GS\{N } N ∈S is a continuous homomorphism such that d(G) ∩ G/GS\{N } is dense in G/GS\{N } for every N ∈ S and ker(d) is central in G. Furthermore, S is a quasi-direct factorization of G if and only if d is injective. Theorem 6.2 has a useful, immediate corollary. Corollary 6.3. Let G be a topological group with S a non-trivial generalized central factorization of G. Then S is a quasi-direct factorization if and only if T G S\{N } = {1}. N ∈S 28 COLIN D. REID AND PHILLIP R. WESOLEK At various points, we will take quotients of generalized central products. There is a natural quasi-product one can extract from such a quotient: Proposition 6.4 ([14, Proposition 4.7]). Let G be a topological group with S a nontrivial generalized central factorization of G and let N be a closed normal subgroup of G. Set \ M := GS\{S} N . S∈S Then M/N is central in G/N , and S/M := {SM /M | S ∈ S and S 6≤ M } is a quasi-direct factorization of G/M . The canonical examples of quasi-products are the local direct products: Definition 6.5. Suppose that (Gi )i∈I is a set of topological groups and that there is a distinguished open subgroup Oi ≤ L Gi for each i ∈ I. The local direct product of (Gi )i∈I over (Oi )i∈I is denoted by i∈I (Gi , Oi ) and defined to be ( ) G f :I→ Gi | f (i) ∈ Gi and f (i) ∈ Oi for all but finitely many i ∈ I i∈I with the group topology such that the natural embedding of product topology is continuous and open. Q i∈I Oi with the In the setting of locally compact groups, a notion of convergence becomes useful to study generalized products. Definition 6.6. A set S of closed subgroups of a topological group G is compactly convergent if for every compact set C and every identity neighborhood U in G, there exists a cofinite subset S 0 ⊆ S such that GS 0 ∩ C ⊆ U . This notion of convergence arises in quasi-products. Lemma 6.7. If (G, S) is a quasi-product, then S is compactly convergent in G. Q Proof. Via Theorem 6.2, the diagonal map d : G → NQ∈S G/GS\{N } is injective and continuous. For any subset Q J ⊆ S, we have d(GJ ) ≤ N ∈J G/GS\{N } . For any identity neighborhood V in N ∈S G/GS\{N } , there thus exists a cofinite subset S 0 of S such that d(GS 0 ) ⊆ V . Fix C a compact set and U an identity neighborhood in G; without loss of generality, we may assume that U is open and that 1 ∈ C. Since d is injective and continuous, it Q restricts to a homeomorphism C → d(C). There is then an open subset V of N ∈S G/GS\{N } such that d(C) ∩ V = d(C ∩ U ), and since 1 = d(1) ∈ d(C ∩ U ), the set V is an identity neighborhood. We deduce there is a cofinite subset S 0 of S such that d(GS 0 ) ⊆ V , and hence d(GS 0 ∩ C) = d(GS 0 ) ∩ d(C) ⊆ V ∩ d(C) = d(C ∩ U ) ⊆ d(U ). Therefore, GS 0 ∩ C ⊆ U , so S is compactly convergent.  With topologically perfect centerless quasi-products G, there is a connection between the connectedness of G and the connectedness of its quasi-factors. Lemma 6.8. Let G be a topological group. If A is a centerless closed normal subgroup of G, then G/CG (A) is centerless. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 29 Proof. Let π : A → G/CG (A) be the restriction of the usual quotient map. For hCG (A) ∈ Z(G/CG (A)), we see that [a, h] ∈ A ∩ CG (A) for all a ∈ A. Since Z(A) = {1}, it must be the case that [a, h] = 1. We conclude that h ∈ CG (A), and thus, hCG (A) is the trivial coset.  Lemma 6.9. Let G be a centerless Polish group with S a quasi-direct factorization of G. If every N ∈ S is topologically perfect and totally disconnected, then so is G. Proof. It is immediate that G is topologically perfect and that every N ∈ M is centerless. For N ∈ M, the quotient G/CG (N ) is a normal compression of N . The quotient is then topologically perfect, and it is centerless by Lemma 6.8. Applying Corollary 2.11, we conclude that G/CG (N ) is totally disconnected, and thus, G◦ ≤ CG (N ). It now follows that G◦ ≤ Z(G) = {1}, so G is totally disconnected.  Our primary interest in generalized direct products is their connection with groups of semisimple type. Definition 6.10. Let G be a topological group. A component of G is a closed subgroup M of G such that the following conditions hold: (a) M is normal in hhM ii. (b) M/Z(M ) is non-abelian. (c) Whenever K is a closed normal subgroup of hhM ii such that K < M , then K is central in hhM ii. The layer E(G) of G is the closed subgroup generated by the components of G. Definition 6.11. A topological group G is of semisimple type if G = E(G). We say G is of strict semisimple type if in addition Z(G) = {1}. Each component of a semisimple type group is topologically perfect via [14, Observation 5.3], so groups of semisimple type are topologically perfect. Furthermore, they are very close to products of topologically simple groups. Theorem 6.12 (See [14, Theorem 1.11]). Let G be a non-trivial topological group and let M be the collection of components of G. (1) The group G is of semisimple type if and only if (G, M) is a generalized central product and each M ∈ M is non-abelian and central-by-topologically simple. (2) The group G is of strict semisimple type if and only if (G, M) is a quasi-product and each M ∈ M is non-abelian and topologically simple. 6.2. Local direct models. Definition 6.13. Let G be a locally compact group with S a generalized central factorization of G. AL local direct L model for (G, S) is a locally compact local direct product of the form S (G) := N ∈S (N, N ∩O)Lwhere O is an open subgroup of G together with a continuous homomorphism φ : S (G) → G such that φ N = idN for all L N ∈ S. When there is no ambiguity in doing so, we will refer to either the group S (G) or the homomorphism φ as the local direct model. Let us make a few basic observations about local direct models. Lemma 6.14. Let G L be a locally compact group with S a generalized central factorization of G. If φ : S (G) → G is a local direct model for G, then img(φ) is a dense normal subgroup of G. 30 COLIN D. REID AND PHILLIP R. WESOLEK L Proof. Since S (G) is locally compact, there is a cofinite S 0 ⊆ S such that N ∩ O is compact for all N ∈ S 0 . It now follows that D E img(ψ) = S ∪ hN ∩ O | N ∈ S 0 i . Therefore, img(ψ) is dense in G. Furthermore, since O normalizes N ∩ O for all N ∈ S, we see that O ≤ NG (img(ψ)). The normalizer NG (img(ψ)) is then a dense open subgroup and thus equals G.  Proposition 6.15. L Let G be a locally compact group with S a quasi-direct factorization of G. If φ : S (G) → G is a L local direct model for G, then φ is injective. Hence, G is a normal compression of S (G). Proof. Suppose for contradiction that f ∈ ker(φ) is non-trivial. Since φ S is injective for all S ∈ S, there isLsome N ∈ S such that f (N ) 6= 1 and f S\{N } 6= 1. Consider the functions g, h ∈ S∈S (N, N ∩ O) defined as follows: ( ( f (M ) if M 6= N f (M ) if M = N ; and h(M ) := g(M ) := 1 else. 1 else By construction, f = gh, and since 1 = φ(f ) = φ(g)φ(h), we deduce that φ(h) ∈ N ∩ GS\{N } . This contradicts the independence property enjoyed by S.  We now establish the universal property for the local direct model. Theorem 6.16. Let G be a locally compact group with S a compactly convergent generalized L central factorization and suppose that (G, S) admits a local direct model. If H = ψ :H →G N ∈S (N, WN ) is a locally compact local direct product withL a continuous map suchLthat ψ N = idN for all N ∈ S, then H ≤ S (G), and the inclusion ι : H → S (G) is a continuous map making the following diagram commute: L φ 9/ G S O (G) ι ψ H Proof. If S is finite, the universal property L is immediate. Let us L suppose that S is infinite and let O ≤ G be open such that N ∈S (N, NQ∩ O) = S (G). Since H is locally compact, Q there is a cofinite T ⊆ S such that N ∈T WN is compact, and hence WH := ψ( N ∈T WN ) is compact. That S is compactly convergent ensures there is a cofinite S 0 ⊆ T such that GS 0 ∩ WH ≤ O. For f ∈ H, itLnow follows that f (N ) ∈ GS 0 ∩ WHL⊆ O for cofinitely many N ∈ S, hence fL∈ S (G). We thus deduce that H ≤ S (G). One easily checks that ι : H → S (G) is continuous, verifying the theorem.  It follows local direct models are unique, provided they exist. Corollary 6.17. Let G be a locally compact group with S a compactly convergent generalized central factorization. If there is a local direct model for (G, S), then it is unique up to isomorphism. It remains to identify which factorizations of locally compact groups admit a local direct model. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 31 Lemma 6.18. Let G be a compact group with S a generalized central factorization of G and let I be the directed set Q of finite subsets of S. For a sequence (hN )N ∈S ∈ Q N and J ∈ I, set h := J N ∈S N ∈J hN where the product Q is taken in G. If S is compactly convergent, then for any sequence (hN )N ∈S ∈ N ∈S N the associated net ĥ := (hJ )J∈I in G converges. Proof. As G is compact, there exists a limit point k ∈ G of a subnet of ĥ. Given an identity neighborhood U in G, there exists J ∈ I such that GS\J ⊆ U , since S is compactly convergent and G is compact. It is then the case that hJ U = hJ 0 U for all J 0 ∈ I such that J ⊆ J 0 , and considering J 0 from our convergent subnet, we deduce that hJ U = kU . Hence, ĥ converges.  Say that a locally compact group is almost t.d.l.c. if the connected component is compact. Theorem 6.19. Let G be an almost t.d.l.c. group. If S is a compactly convergent generalized central factorization of G, then (G, S) admits a local direct model. Proof. Fix U ∈ U(G) and consider K := hN ∩ U | N ∈ Si. The subgroup K is compact and admits a generalized central factorization {N ∩ U | N ∈ S}. This factorization is also compactly convergent since S is compactly convergent. L Form the local direct product (N, N ∩ U ) and let I be the directed set N ∈S consisting of the finite subsets of S ordered by inclusion. An element h := (hN )N ∈S L Q of N ∈S (N, N ∩ U ) gives a net ĥ := (hJ )J∈I in G where hJ := N ∈J hN . Since h has only finitely many coordinates that do not lie in U , there is a finite J ⊆ S 0 −1 such that h−1 hJ 0 for J 0 extending J J hJ 0 ∈ K ≤ U for all J ⊇ J. The net (hJ ) converges by Lemma 6.18, hence the net ĥ converges. L We may now define ψ : N ∈S (N, N ∩ U ) → G via ψ(h) := lim ĥ. It is easily verified that ψ is a continuous homomorphism, that ψ restricts to the identity map on each factor N , and that ψ has a dense image in G.  In view of Lemma 6.7, we deduce the following corollary: Corollary 6.20. Let G be an almost t.d.l.c. group. If S is a quasi-direct factorization of G, then (G, S) admits a local direct model. There are two classes of groups for which any quasi-product is actually a direct product, so in particular, the quasi-product is its own local direct model. The first follows immediately from Theorem 6.19. Corollary 6.21. If G is a compact group with S a quasi-direct factorization, then Q G ' N ∈S N . Proposition 6.22. Let G be a connected l.c.s.c. group that is topologically perfect Q and centerless. If S is a quasi-direct factorization of G, then G ' S∈S S, and all but finitely many members of S are compact. Proof. Fix N ∈ S and set [G, N ] = [N, N ] =: K. The usual projection π : N → G/GS\{N } =: H is a normal compression map. Since H is topologically perfect, π(K) must be dense in H, and thus, π([K, K]) is also dense in H. In view of Proposition 2.8, we deduce that K ≤ [K, K] and therefore that K is topologically perfect. 32 COLIN D. REID AND PHILLIP R. WESOLEK We now have a normal compression map π : K → H with K and H topologically perfect and H connected. Theorem 2.10 ensures the topologically perfect group K is connected, and applying Corollary 4.8, we infer that π(K)Z(H) = H. On the other hand, π(N ) ≤ H = π(K)Z(H), so π(N ) = π(K)(Z(H) ∩ π(N )). It is clear from the definition of a quasi-product that Z(N ) ≤ Z(G), so N is centerless. The group π(N ) is then also centerless, and thus, Z(H) ∩ π(N ) = {1}. We deduce that π(N ) = π(K) and therefore that N is topologically perfect. Applying again Theorem 2.10, N is additionally connected. Every N ∈ S is therefore topologically perfect, connected, and centerless. In view of Theorem 2.4, there is a compact normal subgroup R of G such that G/R is a Lie group. The quotient map π : G → G/R is a closed map, so each member of {N R/R | N ∈ S} is closed and normal in G/R. By Lemma 2.3, there is a finite subset J of S such that N GJ R/GJ R is discrete for all N ∈ S. The group G/GJ R is connected, so each N GJ R/GJ R is indeed abelian. The group G/GJ R is thus abelian, and since G is topologically perfect, we deduce that GJ R = G. Each M ∈ S \ J is topologically perfect, so L := GS\J is topologically perfect. We now see that L = [L, L] = [G, L] = [GJ R, L] = [R, L] ≤ R. The group L is then compact. In particular, every Q element of S \ J is compact. Applying Corollary 6.21, we conclude that GS\J ' S∈S\J S, and it follows further Q that G ' GJ × S∈S\J S. We now turn our attention to GJ . Fix N ∈ J and form GJ /CGJ (N ). This quotient is centerless by Lemma 6.8. The restriction of the natural projection π : N → GJ /CGJ (N ) is a normal compression map. Since N and GJ are connected, topologically perfect groups, Corollary 4.9 ensures π is indeed an isomorphism. Q We conclude GJ = N CGJ (N ), and it follows that GJ ' N ∈J N , finishing the proof.  Since we are primarily interested in non-abelian chief factors, which are topologically characteristically simple, the above results will suffice for our purposes. However, one naturally wonders if a local direct model exists for any locally compact quasi-product. The following example shows that not all locally compact quasi-products admit a local direct model, and it also illustrates the need to exclude abelian quasi-products from Proposition 6.22. Example 6.23. Set G = R×TN and let us consider G as the collection of functions f : {−1} ∪ N → R t T such that f (−1) ∈ R and f (i) ∈ T for i ∈ N. The group G is a connected locally compact group under the product topology. For each i ∈ N let fi ∈ G be defined as follows:   n = −1 1√ fi (n) := 2 n=i   0 else. We now define subgroups of G: ( Gi := R i = −1 hfi i else. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 33 It is easy to verify that each Gi is closed and the collection {Gi }i∈{−1}∪N is a quasi-direct factorization of G. Since G is connected, it Q has no proper open subgroups, so the only possible local direct model for (G, S) is i∈N Gi . However, the direct product fails to be a local direct model since it is not locally compact. 6.3. Locally compact groups of semisimple type. We here derive a structure result for locally compact groups of strict semisimple type. Theorem 6.24. For G an l.c.s.c. group of strict semisimple type, G'D× Y i∈I Ci × n Y Sj j=0 with D a t.d.l.c.s.c. group of strict semisimple type, each Ci a topologically simple compact connected Lie group, and each Sj a non-compact topologically simple connected Lie group. Proof. Let M list the components of G. Appealing to Theorem 6.12, each N ∈ M is topologically simple, and M is a quasi-direct factorization of G. Let C be the connected elements of M. The group C := hCi is a connected, topologically perfect locally compact group with quasi-factorization Q C, and it is centerless, since G is centerless. Applying Proposition 6.22, C ' many N ∈ C non-compact. N ∈C N with only finitely Q Qn It now follows from Theorem 2.4 that C ' i∈I Ci × j=0 Sj with each Sj a non-compact topologically simple connected Lie group and each Ci a topologically simple compact connected Lie group. Setting D := CG (C), the group G/D is centerless by Lemma 6.8, and G/D is a normal compression of C. Appealing to Corollary 4.9, the natural projection π : G → G/D restricts to an isomorphism from C to G/D, and thus, G ' C × D. Finally, since C and D are closed direct factors of G with D ≥ GM\C , the product CGM\C is closed in G. This product is also dense, so it is indeed the case that G = CGM\C . We thus deduce that D = GM\C . The group D is then a quasi-product of the set M\C of non-abelian topologically simple t.d.l.c.s.c. groups. Theorem 6.12 implies D is of strict semisimple type, and D is totally disconnected by Lemma 6.9.  Corollary 6.25. Let G be an l.c.s.c. group of strict semisimple type with S the set of non-trivial topologically simple closed normal subgroups of G. Then (G, S) is a quasi-product that admits a local direct model, and the local direct model is an l.c.s.c. group of strict semisimple type. Proof. Theorem 6.12 ensures that (G, S) is a quasi-product. Let C be the collection of connected non-compact elements of S and define D := hS \ Ci and L := hCi. By Theorem 6.24, we can write G = D × L. Additionally, D is almost t.d.l.c., and L is a finite direct product of topologically simple connected Lie groups. It is now enough to show that D and L both admit local direct models. Since L is a finite product, it is its own local direct model. On the other hand, D is a quasi-product of S \ C, so Corollary 6.20 ensures that D also admits a local direct model. For the second claim, the local direct model is itself a quasi-product of nonabelian topologically simple groups, so it is of strict semisimple type.  34 COLIN D. REID AND PHILLIP R. WESOLEK 6.4. Products of elementary groups. We conclude this section with a generalization of Lemma 3.7 to generalized central products. Theorem 6.26. Let G be a t.d.l.c.s.c. group with S a countable generalized central factorization of G. If each N ∈ S is elementary, then G is elementary with ξ(G) = sup + ξ(N ). N ∈S Proof. Let {Ni }i∈N enumerate S and put Gj := hNi | i ≤ ji. Each Gj is a generalized central product of finitely many elementary Q groups. For fixed j, there is a local direct model φ : P → Gj where P = i≤j Ni . In view of Lemma 3.7, ξ(P ) = maxi≤j ξ(Ni ), and applying Proposition 5.4 to the normal compression P/ ker(φ) → Gj , we deduce that ξ(Gj ) ≤ ξ(P/ ker(φ)) ≤ ξ(P ) = max ξ(Ni ) ≤ ξ(Gj ), i≤j where the middle inequality follows from Proposition 3.5. Equality thus holds throughout; in particular ξ(Gj ) = maxi≤j ξ(Ni ). Proposition 3.10 now completes the proof, showing that G is elementary with ξ(G) = sup+ ξ(Gj ) = sup+ ξ(Ni ). j∈N  i∈N 7. Chief factors and blocks Any Polish group G comes with a collection of chief blocks BG , as defined in [14]. Each a ∈ BG is an equivalence class of non-abelian chief factors under the relation of association. The chief blocks appear to be basic building blocks of compactly generated l.c.s.c. groups, as discovered in [15]. It is, however, not straightforward to interpret the group-theoretic significance of chief blocks. Associated chief factors are not necessarily isomorphic as abstract groups, and isomorphic chief factors are not necessarily associated. In this section, we show that the association relation does in fact preserve many group-theoretic properties, so group-theoretic data can be recovered from the chief blocks. 7.1. Preliminaries. Given a topological group G, we say the closed normal factors K1 /L1 and K2 /L2 are associated to one another if the following equations hold: K1 L2 = K2 L1 ; K1 ∩ L1 L2 = L1 ; K2 ∩ L1 L2 = L2 . A chief factor of a topological group G is a normal factor K/L with L < K closed such that there is no closed M E G with L < M < K. By [14, Corollary 6.9], restricting the association relation to non-abelian chief factors of a Polish group G produces an equivalence relation. Definition 7.1. A chief block of a Polish group G is an association class of non-abelian chief factors. The set of chief blocks of G is denoted by BG . A chief factor is called negligible if it is associated to a compact or discrete factor. A chief block is negligible if it contains a negligible chief factor; the collection of non-negligible chief blocks is denoted by B∗G . An important normal subgroup associated to a chief block is the centralizer: For a chief block a ∈ BG in a topological group G, the centralizer of a is CG (a) := {g ∈ G | [g, L] ⊆ K} DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 35 for some (equivalently, any) representative K/L of a; see [14, Proposition 6.8]. Inclusion of centralizers induces a partial order on BG denoted by ≤. Centralizers also give rise to canonical representatives. Proposition 7.2 ([14, Proposition 7.4]). Let G be a Polish group and a ∈ BG . Then, (1) G/CG (a) is monolithic, and the socle M/CG (a) of G/CG (a) is a representative of a; and (2) If R/S ∈ a, then M/CG (a) is a G-equivariant normal compression of R/S. The representative isolated in Proposition 7.2 is called the uppermost representative. For Polish groups, a normal series may always be refined to include a representative for a given chief block. Theorem 7.3 ([14, Theorem 1.14]). Let G be a Polish group, a ∈ BG , and {1} = G0 ≤ G1 ≤ · · · ≤ Gn = G be a series of closed normal subgroups in G. Then there is exactly one i ∈ {0, . . . , n− 1} such that there exist closed normal subgroups Gi ≤ B < A ≤ Gi+1 of G for which A/B ∈ a. In the setting of locally compact groups, we have available the essentially chief series, which restricts the number of chief blocks. Definition 7.4. An essentially chief series for a locally compact group G is a finite series {1} = G0 ≤ G1 ≤ · · · ≤ Gn = G of closed normal subgroups such that each normal factor Gi+1 /Gi is either compact, discrete, or a chief factor of G. Theorem 7.5 ([15, Theorem 4.4]). Let G be a compactly generated locally compact group and (Gi )m i=0 be a finite ascending sequence of closed normal subgroups of G. Then there exists an essentially chief series {1} = K0 ≤ K1 ≤ · · · ≤ Kl = G such that {G0 , . . . , Gm } is a subset of {K0 , . . . , Kl }. The previous two theorems together imply that the set of non-negligible blocks of a compactly generated l.c.s.c. group is finite. Corollary 7.6. Let G be an l.c.s.c. group and (Ai )m i=0 be an essentially chief series for G. Setting N := {Ai /Ai−1 | Ai /Ai−1 is a non-negligible chief factor of G, and 1 ≤ i ≤ m}, there is a bijection θ : B∗G → N such that θ(a) is the unique representative of a ∗ occurring as a factor of (Ai )m i=0 . In particular, BG is finite. 36 COLIN D. REID AND PHILLIP R. WESOLEK 7.2. Chief block properties. Definition 7.7. A property P of groups is a (non-negligible) block property if for every l.c.s.c. group G and (a ∈ B∗G ) a ∈ BG there exists K/L ∈ a with P if and only if every K/L ∈ a has P . For a (non-negligible) block property P , we say a block (a ∈ B∗G ) a ∈ BG has property P if some, equivalently all, K/L ∈ a has property P . Proposition 7.8. Compact generation is a non-negligible block property. Proof. Suppose that G is an l.c.s.c. group and a ∈ B∗G has a compactly generated representative K/L. Take A/B another representative and form the uppermost representative M/C ∈ a as given by Proposition 7.2. The factor M/C is a normal compression of K/L, so it is compactly generated. Furthermore, M/C is a normal compression of A/B and is non-compact since a is non-negligible. As both M/C and A/B are also non-abelian topologically characteristically simple groups, A/B is compactly generated by Corollary 5.3. All representatives of a are thus compactly generated.  Proposition 7.9. The following are block properties in l.c.s.c. groups: Being isomorphic to a given connected group, being elementary with rank α, being amenable, and being quasi-discrete. Proof. Let G be an l.c.s.c. group, a ∈ BG , and M/C be the uppermost representative of a, as given by Proposition 7.2. For the first property, suppose that K/L ∈ a is isomorphic to a connected group H. The group M/C is connected via Corollary 2.11, so Corollary 4.9 ensures that K/L is isomorphic to M/C. Consider another representative A/B of a. There is a normal compression map A/B → M/C, and again A/B ' M/C by Corollaries 2.11 and 4.9. All representatives of a are therefore isomorphic to the connected group H. Let us now suppose that a ∈ BG has a quasi-discrete representative K/L and take A/B ∈ a. The factor M/C is a normal compression of K/L, and these chief factors are topologically perfect. Corollary 5.10 thus ensures that M/C is quasidiscrete. On the other hand, M/C is also a normal compression of A/B. Applying again Corollary 5.10, we deduce that A/B is quasi-discrete, so all representatives are quasi-discrete. The proof that being elementary with rank α is a block property is similar, using Proposition 5.4 instead of Corollary 5.10. Likewise, amenability is a block property using Proposition 5.6.  Proposition 7.9 allows us to define the decomposition rank of a chief block. Definition 7.10. Let G be an l.c.s.c. group and a ∈ BG . For an elementary block a ∈ BG , we define the decomposition rank of a as ξ(a) := ξ(K/L) for some (equivalently, any) K/L ∈ a. If a is negligible and totally disconnected, then ξ(a) = 2, since both profinite and discrete groups have decomposition rank 2. The converse is false in general; as shown in Example 9.4, there exist decomposition rank two blocks which are non-negligible. Elementary blocks with transfinite rank also exist. For instance, Example 9.3 admits a block of rank ω + 1; in later work, we use the techniques outlined in Example 9.2 to give many more examples. We recall that by Corollary 3.21, only certain ranks are possible: DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 37 Corollary 7.11. Let G be an l.c.s.c. group and let a be a totally disconnected chief block of G. Then exactly one of the following holds: (1) ξ(a) = 2; (2) ξ(a) = α + 1 for α some countable transfinite limit ordinal; (3) a is non-elementary. Let us conclude by giving a method to compute the rank of elementary chief factors of semisimple type. Proposition 7.12. Let G be a topologically characteristically simple t.d.l.c.s.c. group of semisimple type and let L ≤ K be closed normal subgroups of G such that K/L is non-abelian. Then G is elementary if and only if K/L is elementary. If G is elementary, then ξ(G) = ξ(K/L). Proof. The forward implication of the first claim is immediate from Proposition 3.5. For the converse implication, consider the quotient G/L and let M list the components of G. The group G/L contains a dense subgroup generated by the images of components. Since K/L is non-abelian, there is some C ∈ M that intersects K/L non-trivially. Let π : G → G/L be the usual projection and find C ∈ M such that π(C) ∩ K/L is non-trivial. Since G is non-abelian, it has trivial center and therefore is of strict semisimple type. Every component N ∈ M is thus topologically simple via Theorem 6.12. The restriction π : C → G/L is injective, and π(C) is contained in K/L. The group CL/L ≤ K/L is then a normal compression of C. As K/L is elementary, C is elementary with ξ(C) = ξ(K/L) via Proposition 5.4. All components of G are isomorphic to C, since G is topologically characteristically simple. In view of Theorem 6.26, we now deduce that G is elementary with ξ(G) = sup + ξ(N ) = ξ(C) = ξ(K/L).  N ∈M 7.3. Negligible chief blocks. By Corollary 7.6, an essentially chief series for a compactly generated l.c.s.c. group G includes representatives for every nonnegligible chief block of G. Of course, an essentially chief series can also include negligible chief factors. The utility of essentially chief series as a decomposition into well-behaved “basic” groups, compact groups, and discrete groups thus depends on how much structure beyond the compact or discrete cases can be hidden in negligible chief factors. We here analyze negligible chief factors and blocks. This analysis will demonstrate that negligible chief factors are either compact or very close to discrete. Let us first identify three types of chief blocks of an l.c.s.c. group G. Proposition 7.9 ensures the following definition is sensible: Definition 7.13. Let G be an l.c.s.c. group and a ∈ BG . We say that the block a is connected compact if all representatives are isomorphic to a single connected compact group. We say that a is quasi-discrete if all representatives are quasidiscrete. The block a is robust if none of the representatives of a are compact or quasi-discrete. Denote by BrG the collection of robust blocks. We now argue that these three types partition the collection of chief blocks. To this end, recall the special structure of topologically characteristically simple profinite groups. 38 COLIN D. REID AND PHILLIP R. WESOLEK Lemma 7.14 (See for instance [17, Lemma 8.2.3]). A profinite group P is topologically characteristically simple if and only if P ' FI for some finite simple group F and set I. In particular, every topologically characteristically simple profinite group is quasi-discrete, since it contains the dense quasi-central subgroup F <I . Theorem 7.15. Suppose that G is an l.c.s.c. group. If a is a chief block of G, then a is exactly one of the following: connected compact, quasi-discrete, or robust. Proof. It is obvious the three cases are exclusive, so we need only to show a is one of the three types. By Proposition 7.9, if a is not quasi-discrete, then none of its representatives are quasi-discrete. Suppose that a is neither robust nor quasidiscrete; in other words, there is a representative A/B ∈ a that is compact, but not quasi-discrete. The factor A/B is either connected or totally disconnected. In the latter case, A/B is profinite, so it is quasi-discrete by Lemma 7.14. We deduce that A/B is connected and compact, and hence by Proposition 7.9, every representative of a is isomorphic to A/B as a topological group. Thus, a is connected compact.  A structure theorem for compactly generated groups without robust blocks is now in hand. Corollary 7.16. Suppose that G is a compactly generated l.c.s.c. group. If BrG = ∅, then every essentially chief series (Gi )ni=0 for G is such that each factor Gi /Gi−1 is either compact or quasi-discrete. Proof. Let {1} = G0 < · · · < Gn = G be an essentially chief series for G, so each factor Gi /Gi−1 is either compact, discrete, or chief. Discrete factors and abelian chief factors are obviously quasi-discrete. Theorem 7.15 implies that every nonabelian chief factor in the series is either compact-connected or quasi-discrete.  7.4. Application: Hopfian property. A group is called Hopfian if every continuous self-surjection is also an injection. Using the machinery of chief blocks, we show many compactly generated l.c.s.c. groups are Hopfian. Our analysis of the Hopfian property is via the notion of block morphisms developed in [14, Section 8]; we direct the reader to loc. cit. for further details on this construction. For G a Polish group, let XG denote the collection of non-abelian chief factors. The partial order on centralizers induces a preorder on XG , which we denote by (XG , ≤). We remark that the natural quotient of (XG , ≤) giving a partial ordering recovers the partially ordered set of chief blocks BG . Definition 7.17. For G and H Polish groups, a strong block morphism ψ : (XH , ≤) → (XG , ≤) is an homomorphism of preorders such that ψ(A/B) ' A/B as topological groups for each A/B ∈ XH . If the induced map ψe : BH → BG is injective, we say that ψ is a strong block monomorphism. By [14, Proposition 8.4], a continuous surjective homomorphism φ : G → H of Polish groups induces a strong block monomorphism ψ : (XH , ≤) → (XG , ≤) defined by A/B 7→ φ−1 (A)/φ−1 (B). In the setting of locally compact groups, this morphism also respects robust blocks. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 39 Lemma 7.18. Suppose that G and H are l.c.s.c. groups and φ : G → H is a continuous surjective homomorphism. Then the strong block monomorphism ψ : (XH , ≤) → (XG , ≤) induced by φ is such that ψ̃(BrH ) = BrG ∩ ψ̃(BH ), where ψ̃ is the map induced from ψ. Proof. Take a ∈ BH and suppose that ψ̃(a) ∈ / BrG . Taking A/B ∈ a, that ψ is a strong block monomorphism implies that A/B ' ψ(A/B) and that ψ(A/B) ∈ ψ̃(a). The block ψ̃(a) is not robust, so Theorem 7.15 implies that ψ̃(a) is either connectedcompact or quasi-discrete. The factor ψ(A/B) is thus either a connected compact group or a quasi-discrete group, hence A/B is either a connected compact group or a quasi-discrete group. We conclude that a is either connected-compact or quasidiscrete. That is to say, a is not robust. This demonstrates that ψ̃(BrH ) ⊆ BrG ∩ ψ̃(BH ). Conversely, suppose that a 6∈ BrH . We may find A/B ∈ a which is either connected and compact or quasi-discrete. The image ψ(A/B) is then either connected and compact or quasi-discrete, since ψ is a strong block monomorphism. The block ψ̃(a) is thus not robust. This demonstrates that ψ̃(BH \ BrH ) ⊆ BG \ BrG , and  hence ψ̃(BrH ) = BrG ∩ ψ̃(BH ). We stress that it is important to consider robust blocks for the previous lemma. Negligible blocks can become non-negligible in a quotient, so in general we do not have ψ̃(B∗H ) ⊆ B∗G , where B∗G is the set of non-negligible blocks. Theorem 7.19. Suppose that G is a compactly generated l.c.s.c. group. If G has no non-trivial compact or quasi-discrete closed normal subgroups, then G is Hopfian. Proof. We assume that G is non-trivial. Suppose for contradiction that φ : G → G is a continuous surjective homomorphism with a non-trivial kernel. We apply Theorem 7.5 to find a chief series (Gi )ni=0 which refines the normal series {1} < ker(φ) < G. The first factor G1 /G0 = G1 must be neither compact nor quasidiscrete since G has no such non-trivial closed normal subgroups. Hence, G1 /G0 is a non-abelian chief factor, and the chief block [G1 /G0 ] is robust via Theorem 7.15. On the other hand, Lemma 7.18 supplies a canonical injective map ψ̃ : BrG → BrG arising from the surjection φ : G → G. The set BrG is finite by Corollary 7.6, so ψ̃ is indeed a bijection. We may thus find a chief factor A/B of G such that K/L = ψ(A/B) = φ−1 (A)/φ−1 (B) is an element of [G1 /G0 ]. In the series G0 < G1 < ker(φ) ≤ L < K ≤ G, the non-abelian chief factor G1 /G0 is associated to the factor K/L. This is absurd since associated chief factors have the same centralizer and L ≤ CG (K/L).  It is easy to build non-discrete compactly generated locally compact groups which are non-Hopfian simply by taking the direct product of an infinite profinite group with a finitely generated non-Hopfian group. 8. Extensions of chief blocks Corollary 7.16 shows a compactly generated l.c.s.c. group G without robust chief factors has limited complexity as a topological group. In this section, we show that except for groups with limited topological structure, every l.c.s.c. group admits 40 COLIN D. REID AND PHILLIP R. WESOLEK robust chief blocks that are minimally covered. These results are then applied to investigate the structure of chief factors of compactly generated l.c.s.c. groups. 8.1. Preliminaries. Definition 8.1. Let a be a chief block and let N/M be a closed normal factor of a topological group G. We say N/M covers a if CG (a) contains M but not N . If N/M does not cover a, we say that N/M avoids a. A block can be avoided in one of two ways: The factor N/M is below a if N ≤ CG (a); equivalently, G/N covers a. The factor N/M is above a if M 6≤ CG (a); equivalently, M/{1} covers a. For a closed normal subgroup N E G, we will say that N covers or avoids a chief block by seeing N as the closed normal factor N/{1}. It follows easily from Theorem 7.3 that if a closed normal factor N/M of a Polish group G covers a ∈ BG , then there is a representative K/L ∈ a such that M ≤ L < K ≤ N. A block a ∈ BG is minimally covered if there is a least closed normal subgroup covering the block. This least normal subgroup is denoted by Ga . The lowermost representative is Ga /CGa (a); this normal factor is a representative of a via [14, Proposition 7.13]. The collection of minimally covered chief blocks is denoted by Bmin G . Definition 8.2. Let G be a Polish group with H a closed subgroup. Given a ∈ BH and b ∈ BG , we say that b is an extension of a in G if for every closed normal subgroup K of G, the group K covers b if and only if K ∩ H covers a. In general, it is not clear whether extensions exist; however, when an extension exists, it is unique, [14, Lemma 9.2]. If the extension exists, we write aG for the extension of a to G. The following observations are made in [14, Section 9.1]; to gain familiarity with the definitions, the reader is encouraged to prove these observations. Observation 8.3. Let A ≤ B ≤ G be closed subgroups of a topological group G and a ∈ BA be extendable to B. Then a is extendable to G if and only if aB is extendable to G. If a is extendable to G, then aG = (aB )G . Observation 8.4. Let G be a topological group with H a closed subgroup. If K/L is a closed normal factor of G such that K ∩ H/L ∩ H covers a ∈ BH , then CH (K/L) ≤ CH (a). Observation 8.5. Let H be a closed subgroup of a Polish group G and a ∈ BH be extendable to G. Then a closed normal factor K/L of G covers aG if and only if K ∩ H/L ∩ H covers a. In the case of minimally covered blocks, extensions are easier to identify: Lemma 8.6 ([14, Lemma 9.7]). Let G be a topological group with H a closed subgroup of G and a ∈ Bmin H . Then a is extendable to G if and only if there exists b ∈ Bmin such that (Gb ∩ H)/C(Gb ∩H) (b) covers a. If a is extendable to G, then G aG = b. We can say more when the subgroup H is also normal. DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 41 Proposition 8.7 ([14, Proposition 9.8]). Let G be a topological group with H a closed normal subgroup of G and a ∈ Bmin H . Then a is extendable to G, and the extension aG has least representative M/N where \ M := hhHa iiG and N := gCG (a)g −1 ∩ M. g∈G The previous results are particularly useful in the setting of compactly generated groups, where minimally covered blocks are known to exist. Proposition 8.8 ([15, Proposition 4.10, Corollary 4.9]). If G is a compactly generated l.c.s.c. group, then all non-negligible chief blocks are minimally covered, and there are only finitely many non-negligible chief blocks. 8.2. Extending robust blocks. We now show that the robust blocks of any compactly generated open subgroup of a l.c.s.c. group G extend to G. Let us first note that robustness is preserved by extension, provided the extension exists. Lemma 8.9. Suppose that G is an l.c.s.c. group with K/L a quasi-discrete closed normal factor of G. If L ≤ B < A ≤ K are such that A/B is a chief factor of G, then A/B is quasi-discrete. Proof. The factor K/B is quasi-discrete, and A/B is a normal subgroup of K/B. If A/B intersects QZ(K/B) trivially, then A/B is central in K/B and a fortiori is quasi-discrete. If the group A/B has non-trivial intersection with QZ(K/B), then A/B has a non-trivial quasi-center. Since the quasi-center is characteristic and A/B is a chief factor of G, we conclude that A/B is quasi-discrete.  Proposition 8.10. Suppose that G is an l.c.s.c. group with O an open subgroup and let a be a robust chief block of O. (1) If K/L is a closed normal factor of G such that K ∩ O/L ∩ O covers a, then K/L is neither compact nor quasi-discrete. (2) If a extends to G, then aG is robust. Proof. For (1), the subgroup (K ∩ O)L/L is an open subgroup of K/L, and (K ∩ O)L/L ' (K ∩ O)/(L ∩ O). If K/L is compact, then (K ∩ O)/(L ∩ O) is compact, and since a representative of a occurs as a closed normal factor of (K ∩ O)/(L ∩ O), it follows that a is negligible, which is absurd. If instead K/L is quasi-discrete, then (K ∩ O)L/L is also quasi-discrete since it is an open subgroup of K/L, so (K ∩ O)/(L ∩ O) is quasi-discrete. In this case, Lemma 8.9 ensures that a has a quasi-discrete representative, which contradicts the hypothesis that a is robust. Claim (2) now follows immediately from (1) and Observation 8.5.  We now isolate a set of blocks that arise from robust blocks of compactly generated open subgroups. Definition 8.11. Let G be an l.c.s.c. group and let a ∈ BG . We say that a is a regionally robust block if there exists a compactly generated open subgroup O of G and a robust block b of O such that a is the extension of b in G. The collection of regionally robust blocks is denoted by Brr G. Proposition 8.8 and Lemma 8.6 ensure that every regionally robust block is minimally covered, and Proposition 8.10 ensures that every regionally robust block r is robust. If G is compactly generated, we now see that Brr G ⊆ BG , so indeed rr r BG = BG . 42 COLIN D. REID AND PHILLIP R. WESOLEK Lemma 8.12. An l.c.s.c. group has at most countably many regionally robust blocks. Proof. Let G be an l.c.s.c. group. A regionally robust block b of G is determined by a pair (O, a) where O is a compactly generated open subgroup of G and a ∈ BrO is such that aG = b. An easy counting argument shows there are only countably many compactly generated open subgroups, and via Proposition 8.8, a compactly generated open subgroup has finitely many robust blocks. We conclude there are at most countably many such pairs (O, a), and hence an l.c.s.c. group has at most countably many regionally robust blocks.  We now set about showing that regionally robust blocks of open subgroups always extend. We begin by considering compactly generated open subgroups of compactly generated l.c.s.c. groups; the key here is to exploit the essentially chief series. In the following proof, it will be important that certain subgroups and homomorphisms are invariant under some group action. The action is always the obvious action by conjugation. Lemma 8.13. Let G be a compactly generated l.c.s.c. group. If O is a compactly generated open subgroup of G, then all robust blocks of O extend to G. Proof. Fix a ∈ BrO and let (Hi )ni=0 be an essentially chief series for G. The restriction (Hi ∩ O)ni=0 is a normal series for O. Applying Theorem 7.3, there is some 0 ≤ i < n such that Hi+1 ∩ O/Hi ∩ O covers a. The factor Hi+1 /Hi is neither compact nor quasi-discrete by Proposition 8.10, and thus, Hi+1 /Hi is a non-abelian chief factor. Theorem 7.15 implies that b := [Hi+1 /Hi ] is indeed robust. In view of Proposition 8.8, we deduce that b ∈ Bmin G . We argue that b is the extension of a to G. Let us first consider the uppermost representative N/C of b. Since N ∩ O ≥ Hi+1 ∩ O, the subgroup N ∩ O covers a. On the other hand, Observation 8.4 implies CO (Hi+1 /Hi ) ≤ CO (a), and the construction of the uppermost representative ensures C = CG (Hi+1 /Hi ). We conclude that C ∩ O ≤ CO (a) and thus that C ∩ O is below a. Hence, N ∩ O/C ∩ O covers a. We now consider the lowermost representative I/J of b. Proposition 7.2 gives a G-equivariant normal compression ψ : I/J → N/C. We also have an O-equivariant isomorphism ι : N ∩ O/C ∩ O → (N ∩ O)C/C := W. Since N ∩ O/C ∩ O covers a, there are A and B closed O-invariant subgroups of N ∩ O/C ∩ O such that A/B is a representative of a. The subgroup W is open in N/C, so ψ(I/J) ∩ W is dense and normal in W and hence accounts for a dense normal subgroup of W/ι(B). Since A/B is topologically perfect, setting D := (ψ(I/J) ∩ ι(A))ι(B), we have D ≥ [ψ(I/J) ∩ W, ι(A)]ι(B) ≥ [W, ι(A)]ι(B) = ι(A). In other words, D is a dense subgroup of ι(A). The map ι is an O-equivariant isomorphism of topological groups, so ι−1 (D) is a dense O-invariant subgroup of A. Since A/B is not quasi-discrete, it follows that |ι−1 (D) : B| is uncountable. On the other hand, the group V := (I ∩ O)J/J is open in I/J, so it is of countable index. It follows that (ψ(V ) ∩ ι(A))ι(B) is of countable index in D, and thus, |(ψ(V ) ∩ ι(A))ι(B) : ι(B)| is also uncountable; in particular, ψ(V ) ∩ ι(A)  ι(B). The group I ∩ O therefore cannot centralize a. That is to say, DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 43 I ∩ O covers a. Plainly, J ∩ O is below a, since J ≤ C, so I ∩ O/J ∩ O covers a. Lemma 8.6 now ensures that b is the extension of a to G.  We now upgrade from compactly generated supergroups to arbitrary l.c.s.c. supergroups. The strategy is to apply Lemma 8.13 to an increasing exhaustion by compactly generated open subgroups. The existence of the extensions ai in the following statement is ensured by Lemma 8.13. Proposition 8.14. Let G be an l.c.s.c. group with (Oi )i∈N an increasing exhaustion of G by compactly generated open subgroups. Fix a0 ∈ BrO0 and set ai := aOi for each i ∈ N. Then there is a robust chief block b of G that extends each of the ai to G. Additionally, [ \ COn (ai ). CG (b) = n≥0 i≥n Proof. Set D := [ \ COn (ai ) n≥0 i≥n For fixed n and all i ≥ n, Observation 8.4 ensures that COn (ai+1 ) ≤ COn (ai ), hence \ D ∩ On = COn (ai ) ≤ COn (an ). i≥n The group D is thus closed and such that D ∩ O0 avoids a0 . For N ∈ N (G) such that N  D, there exists n such that N ∩ On  D ∩ On . Therefore, N ∩ On  COn (ai ) for some i ≥ n, so N ∩ Oi covers ai . From the definition of an extension, we infer that N ∩ O0 covers a0 . The subgroup D is thus the unique maximal closed normal subgroup of G such that D ∩ O0 avoids a0 . T Set M := {N ∈ N (G) | N ∩ O0 covers a0 , and D ≤ N }. Since the block a0 is minimally covered, it follows that M ∩ O0 covers a0 . On the other hand, D is maximal among closed normal subgroups of G that avoid a0 , hence M/D is a chief factor of G. Set b := [M/D] and let C = CG (b). Since M ∩ O0 /D ∩ O0 covers a0 , we have C ∩ O0 ≤ CO0 (a0 ) by Observation 8.4. The subgroup C therefore avoids a0 , so C ≤ D by the previous paragraph. As D clearly centralizes M/D, we deduce that C = D. Finally, N ∈ N (G) is such that N ∩ O0 covers a0 if and only if N  D. Since D = CG (b), it is also the case that N ∈ N (G) covers b if and only if N  D. The block b is thus the extension of a0 , and it is robust via Proposition 8.10. That b extends each ai follows from Observation 8.3.  We now prove our general extension theorem. Theorem 8.15. Suppose that G is an l.c.s.c. group and H is a closed subgroup of G. If there is a sequence H = H0 ≤ H1 ≤ · · · ≤ Hn = G of closed subgroups of G such that Hi either an open subgroup of Hi+1 or a normal subgroup of Hi+1 for each 0 ≤ i < n, then every regionally robust block of H extends to a regionally robust block of G. Proof. By Observation 8.3 and induction on n, it is enough to consider the cases where H is either open in G or normal in G. 44 COLIN D. REID AND PHILLIP R. WESOLEK Suppose first that H is open in G and let a be a regionally robust block of H. The block a is the extension of some robust chief block b0 of O0 , where O0 is a compactly generated open subgroup of H. Starting with O0 , we can find an increasing exhaustion (Oi )i∈N of G by compactly generated open subgroups. Proposition 8.14 then provides the extension b of b0 to G, and appealing to Observation 8.3, b is the extension of a to G. We conclude that a is extendable to G, and the extension is clearly also a regionally robust block of G. Suppose that H is normal in G and let a be a regionally robust block of H. Say that a is the extension of b ∈ BrO , where O is a compactly generated open subgroup of H. There are only countably many compactly generated open subgroups of H, so NG (O) is open in G. We can then take a compactly generated open subgroup W of NG (O) such that O E W . By Propositions 8.7 and 8.10, b extends to a robust chief block bW of W . The previous case now ensures that bW extends to a regionally robust block c := (bW )G of G, and in view of Observation 8.3, we deduce that c = (bW )G = bG = (bH )G = aG . The block a is thus extendable to G. Since bW is a robust block of a compactly generated open subgroup of G, we see that aG is also a regionally robust block.  8.3. Further observations on regionally robust blocks. The persistence of regionally robust blocks from open subgroups shows that regionally robust blocks are persistent in a more subtle manner: if a chief factor K/L has a regionally robust block, then [K/L] is a regionally robust block. Proposition 8.16. Let G be an l.c.s.c. group with K/L a closed normal factor of G. If Brr K/L 6= ∅, then K/L covers a regionally robust block of K ,and hence, it covers a regionally robust block of G. If in addition K/L is a chief factor of G, then [K/L] is a regionally robust block of G. Proof. Fix a regionally robust block a of K/L and say that a is the extension of a robust block b of O where O is an open compactly generated subgroup of K/L. We may fix W ≤ K compactly generated and open such that W L/L = O. Given a continuous surjection of l.c.s.c. groups, there is a canonical way to lift blocks from the range to the domain; see the discussion in Section 7.4. Lemma 7.18 also ensures that robust blocks lift to robust blocks. Considering the surjection W → W L/L = O, the lift b̃ of b to W is robust. Theorem 8.15 then implies that b̃ is extendable to K, and the extension is plainly regionally robust. In view of the definition of the lift, L ∩ W avoids e b, so the normal factor K/L covers e bK =: c. By Theorem 8.15, c is also extendable to a regionally robust block d of G; since K/L is a normal factor of G, it also covers d, via Proposition 8.7. The factor K/L covers the regionally robust block d of G, so we may insert closed normal subgroups L ≤ B < A ≤ K of G such that A/B ∈ d. If K/L is already a chief factor, we must have A = K and B = L. We deduce that K/L ∈ d, hence [K/L] is a regionally robust block of G.  We now prove an alternative for l.c.s.c. groups. Proposition 8.17. For G an l.c.s.c. group, either (1) Brr G 6= ∅, or DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 45 (2) G◦ is compact-by-solvable-by-compact, and G/G◦ is elementary with rank at most ω + 1. If G is compactly generated, then G/G◦ is elementary with finite rank. Proof. Suppose that Brr G = ∅; we argue that (2) holds. Let us first suppose that G is compactly generated. Set R := RadLE (G◦ ). The group R is a compact normal subgroup of G, and G◦ /R is a Lie group by Theorem 2.4. Letting π : G◦ → G◦ /R be the natural projection, put S := π −1 (Sol(G◦ /R)) where Sol(G◦ /R) is the solvable radical and take Z to be such that Z/S := Z(G◦ /S). This produces a series of closed normal subgroups of G: {1} ≤ R ≤ S ≤ Z ≤ G◦ ≤ G. Applying Theorem 7.5, we refine this series into an essentially chief series {1} = G0 < · · · < Gn = G. Any factor given by terms Gk < Gk+1 with Z ≤ Gk < Gk+1 ≤ G◦ is a product of non-abelian connected simple groups, since G◦ /Z is a centerless connected semisimple group. Since BrG = Brr G = ∅, these simple groups must be compact. The connected component G◦ is therefore compact-by-solvableby-compact. For the totally disconnected part, Corollary 7.16 ensures that any chief factors Gk+1 /Gk with G◦ ≤ Gk are quasi-discrete, hence elementary of rank 2. The compact totally disconnected factors and discrete factors are also elementary of rank 2. The rank is subadditive by Lemma 3.6, hence ξ(G/G◦ ) ≤ 2n < ω. This completes the proof in the compactly generated case. Suppose now that G is an arbitrary l.c.s.c. group. Taking O ≤ G open and r compactly generated, we see that Brr O = BO = ∅, since otherwise G admits a regionally robust block via Theorem 8.15. Appealing to the compactly generated case of the proposition, we deduce that O◦ = G◦ is compact-by-solvable-by-compact and that O/O◦ is elementary with finite rank. The quotient G/G◦ is thus an increasing union of finite rank elementary groups, hence ξ(G/G◦ ) ≤ ω + 1, via Proposition 3.10.  As a consequence, sufficiently large chief factors are necessarily regionally robust. Corollary 8.18. Let G be an l.c.s.c. group with K/L a chief factor of G. Suppose that one of the following holds: (1) K/L is connected, non-abelian and non-compact; (2) K/L is elementary with ξ(K/L) > ω + 1; (3) K/L is totally disconnected and non-elementary. Then [K/L] is a regionally robust block of G, and Brr K/L 6= ∅. Proof. By Proposition 8.16, it is sufficient to show that K/L has a regionally robust block. Such a regionally robust block exists in all cases by Proposition 8.17.  8.4. A-simple groups. For a topological group G and A ≤ Aut(G), we say that G is A-simple if the only A-invariant closed normal subgroups of G are {1} and G. A trichotomy exists for A-simple topological groups. Definition 8.19. Let G be a topologically characteristically simple topological group. (1) The group G is of weak type if Bmin G = ∅. 46 COLIN D. REID AND PHILLIP R. WESOLEK min (2) The group G is of stacking type if Bmin G 6= ∅ and for all a, b ∈ BG , there exists ψ ∈ Aut(G) such that ψ.a < b. Theorem 8.20 ([14, Theorem 9.16]). Suppose that G is an A-simple topological group for some A ≤ Aut(G). Then exactly one of the following holds: (1) The group G is of weak type. (2) The group G is of semisimple type and A acts transitively on BG . (3) The group G is of stacking type and for all a, b ∈ Bmin G , there exists ψ ∈ A such that ψ.a < b. Using our results for regionally robust blocks, we obtain a stronger version of Theorem 8.20 for locally compact groups, by describing the groups that are neither semisimple nor stacking type. Theorem 8.21. Suppose that G is a topologically characteristically simple l.c.s.c. group. Then G is exactly one of the following: (1) an abelian group; (2) a non-abelian quasi-discrete t.d.l.c.s.c. group; (3) a regionally SIN t.d.l.c.s.c. group with trivial quasi-center; (4) an elementary t.d.l.c.s.c. group of decomposition rank ω + 1; (5) a direct product of copies of a simple Lie group; (6) a quasi-product of copies of a topologically simple t.d.l.c.s.c. group of decomposition rank greater than ω + 1; (7) a t.d.l.c.s.c. group of stacking type and decomposition rank greater than ω + 1. Proof. We may assume that G is non-abelian. Since G is topologically characteristically simple, the group G is then topologically perfect and centerless. Plainly, G is either connected or totally disconnected. Let us suppose first that G is connected. By [8, Theorem 10.25], G has a unique largest pro-solvable connected normal subgroup, and since G is topologically perfect, G itself cannot be prosolvable. That G is characteristically simple now ensures that G is semisimple in the sense of [8, Theorem 10.29]. Applying [8, Theorem 10.29], we deduce that G is a direct product of copies of a simple Lie group. Therefore, case (5) holds. We now suppose that G is totally disconnected. We consider first the case that ξ(G) > ω + 1. From Proposition 8.17, it follows that G has a regionally robust block, so it is either of semisimple type or of stacking type via Theorem 8.20. If G is of semisimple type, then it is a quasi-product of copies of some topologically simple t.d.l.c.s.c. group H by Theorem 6.12. If H is elementary, Theorem 6.26 ensures that ξ(G) = ξ(H), so ξ(H) > ω + 1. If H is non-elementary, then plainly ξ(H) > ω + 1. We thus deduce that exactly one of (6) and (7) holds. Let us finally consider the case that ξ(G) ≤ ω + 1. By Corollary 3.21, ξ(G) is either equal to ω + 1 or 2. If ξ(G) = ω + 1, then (4) holds. If ξ(G) = 2, then Lemma 3.13 implies G is a regionally SIN group. If G additionally has a trivial quasi-center, then (3) holds; otherwise, since G is topologically characteristically simple, the quasi-center is dense and (2) holds. We thus deduce that for any topologically characteristically simple l.c.s.c. group one of (1)-(7) holds. That the conditions are exclusive we leave as an exercise.  All of the cases (1)-(7) can occur. In particular, Example 9.4 gives an example of (3), and Example 9.2 gives an example of (7). The techniques sketched in Section 9 can be used to produce elementary chief factors which satisfy (7); these examples DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 47 will appear in a future work. Examples satisfying (6) are easy to produce, but we do not know if (6) can occur for elementary groups. Corollary 8.22. Chief factors of l.c.s.c. groups have one of the forms given in Theorem 8.21. Moreover, if K1 /L1 and K2 /L2 are associated chief factors of an l.c.s.c. group G, then K1 /L1 and K2 /L2 have the same form. Proof. Since G1 := K1 /L1 and G2 := K2 /L2 are chief factors, they are topologically characteristically simple. They are thus each of one of the forms described in Theorem 8.21. Applying [14, Lemma 6.6], there is a third normal factor K/L of G such that K/L is a normal compression of both G1 and G2 . Hence, G1 is abelian if and only if G2 is abelian. Having dispensed with case (1), we may assume that both G1 and G2 are non-abelian. Cases (2), (3), (4), and (5) are now easy applications of Proposition 7.9. For the cases (6) and (7), Proposition 7.9 ensures that ξ(G1 ) = ξ(G2 ), and the trichotomy of Theorem 8.20 is invariant under association via [14, Proposition 9.19]. Therefore, G1 satisfies (6) if and only if G2 satisfies (6), and G1 satisfies (7) if and only if G2 satisfies (7).  The division into cases of Theorem 8.21 is not exactly a refinement of Theorem 8.20, since elementary t.d.l.c.s.c. groups of rank ≤ ω + 1 can be of semisimple or stacking type. Here is an alternative version that emphasizes the role of weak type; after dividing into the three cases given by Theorem 8.20, the proof is essentially the same as that of Theorem 8.21. Theorem 8.23. Suppose that G is an A-simple l.c.s.c. group for some A ≤ Aut(G). Then exactly one of the following holds: (1) The group G is abelian. (2) The group G is of weak type and is a non-abelian t.d.l.c.s.c. group that is quasidiscrete. (3) The group G is of weak type and is a regionally SIN t.d.l.c.s.c. group with trivial quasi-center. (4) The group G is of weak type and is an elementary t.d.l.c.s.c. group of decomposition rank ω + 1. (5) The group G is of semisimple type and A acts transitively on BG . (6) The group G is a t.d.l.c.s.c. group of stacking type and for all a, b ∈ Bmin G , there exists ψ ∈ A such that ψ.a < b. There are weak type chief factors of rank exactly ω + 1; see Example 9.3. Case (4) therefore cannot be omitted. Remark 8.24. Let us pause to consider the seven cases of Theorem 8.21 with respect to the goal of decomposing chief factors into compact, discrete, or topologically simple groups. This goal is clearly achieved in cases (5) and (6), and it is straightforward to show in case (1) that G is discrete-by-compact in the connected case and compact-by-discrete in the totally disconnected case. In cases (2) and (3), G is a directed union of SIN t.d.l.c.s.c. groups, so in particular a directed union of compact-by-discrete groups. In case (4), G is a directed union of compactly generated open subgroups, and each such subgroup admits a canonical finite series in which all factors are regionally SIN, via Theorem 3.23. Hence, G is constructed from compact and discrete groups. 48 COLIN D. REID AND PHILLIP R. WESOLEK This leaves case (7). Stacking type ensures a rich subnormal subgroup structure, but it is unclear exactly how rich this structure can be. The techniques of Section 9 show that there is a great deal of freedom in a stacking type group. The most natural decomposition property to hope for in general thus seems to be the following well-foundedness condition: Question 8.25. Suppose that G =: G0 is a topologically characteristically simple l.c.s.c. group. If G0 is abelian, elementary with rank at most ω + 1, or of semisimple type, we stop. Else, we find G1 := K/L a non-abelian chief factor of G0 which is robust. Continuing in this fashion produces G0 , G1 , . . . a sequence of l.c.s.c. groups. Is it the case that any such sequence halts in finitely many steps? What about in the case that the group G is also elementary? 9. Examples 9.1. Preliminaries. We here describe a technique which produces compactly generated t.d.l.c.s.c. groups with interesting chief factors. We only sketch the construction and recall the relevant facts; the full details will appear in a later article. The construction is inspired by ideas from [3, 10, 19], and the reader familiar with [10] can likely prove all claimed facts below. Let T be the countably regular tree and fix δ an end of T . We orient the edges of T such that all edges point toward the end δ. The resulting directed graph is denoted T~ ; we call δ the distinguished end of T~ . Given a countable set X, a coloring of T~ is a function c : E T~ → X such that for each v ∈ V T~ , cv := c inn(v) : inn(v) → X is a bijection. The set inn(v) is the collection of directed edges with terminal vertex v. The coloring allows us to define the local action of g ∈ Aut(T~ ) at v ∈ V T~ : σ(g, v) := cg(v) ◦ g ◦ c−1 v ∈ Sym(X). We call the coloring ended if there is a monochromatic directed ray which is a representative of the distinguished end δ; we shall always assume our colorings are ended. The tree T~ is also equipped with horoballs and horospheres centered at δ, defined as follows. There is a function η from V T~ to Z such that, for each of the oriented edges of e of T~ , we have η(t(e)) = η(o(e)) + 1. One can see that the function η is unique up to an additive constant: it is determined by choosing a base point v0 such that η(v0 ) = 0. The set {η −1 (i) | i ∈ Z} of fibers is therefore uniquely determined. The fibers are the horospheres centered at δ, and the sets Xi := {v ∈ V T~ | η(v) ≥ i} for i ∈ Z are the horoballs centered at δ; see Figure 1. X−1 v−1 X0 v0 X1 v1 Figure 1. The horoballs Xi DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 49 To define the groups, it will be convenient to make a definition: A t.d.l.c.s.c. permutation group is a pair (G, X) where G is a t.d.l.c.s.c. group and X is a countably infinite set on which G acts faithfully with compact open point stabilizers. Definition 9.1. Suppose that (G, X) is a t.d.l.c.s.c. permutation group with U ∈ U(G) and color the tree T~ by X. We define the group EX (G, U ) ≤ Aut(T~ ) as follows: EX (G, U ) is the set of g ∈ Aut(T~ ) such that σ(g, v) ∈ G for all v ∈ V T~ and that σ(g, v) ∈ U for all but finitely many v ∈ V T~ . It is easy to verify that EX (G, U ) is an abstract group. With more care, one can identify a natural t.d.l.c.s.c. topology on EX (G, U ). For a vertex v ∈ V T~ , it is an easy exercise to see that the point stabilizer EX (U, U )(v) is compact in the topology inherited from Aut(T~ ). The topology on Aut(T~ ) is that of pointwise convergence; this topology is Polish but not locally compact. Proposition 9.2. For (G, X) a t.d.l.c.s.c. permutation group and U ∈ U(G), there is a t.d.l.c.s.c. group topology on EX (G, U ) such that the inclusion EX (U, U )(v) ,→ EX (G, U ) is continuous and open for any v ∈ V T~ . The t.d.l.c.s.c. permutation group (G, X) controls the t.d.l.c.s.c. group EX (G, U ) in several important ways. Proposition 9.3. Suppose that (G, X) is a t.d.l.c.s.c. permutation group. Then, (1) If (G, X) is transitive and G is compactly generated, then EX (G, U ) is compactly generated for any U ∈ U(G). (2) If G is elementary, then EX (G, U ) is elementary for any U ∈ U(G). The group EX (G, U ) admits a canonical open normal subgroup. Let PX (G, U ) denote the set of g ∈ EX (G, U ) such that g fixes a vertex; equivalently, PX (G, U ) is the set of g ∈ EX (G, U ) such that η(gv) = η(v) for some (equivalently, any) v ∈ V T~ . It is easy to verify that PX (G, U ) is an open, normal subgroup of EX (G, U ) and that EX (G, U )/PX (G, U ) ' Z. The subgroup PX (G, U ) also gives a chief factor. Recall that a topological group is monolithic if the intersection of all non-trivial closed normal subgroups is non-trivial. Proposition 9.4. Suppose that (G, X) is a transitive t.d.l.c.s.c. permutation group. Then, EX (G, U ) is monolithic, and the monolith is M := [PX (G, U ), PX (G, U )]. If G is also topologically perfect, then PX (G, U ) is the monolith. The pointwise stabilizer Hi := StabL (Xi ) of a horoball Xi , called a horoball stabilizer, is a closed normal subgroup of L, and Hi ≤ Hj for i ≤ j. We thus obtain canonical normal factors Hi+1 /Hi of PX (G, U ). We call these factors the horoball factors of PX (G, U ). Proposition 9.5. For (G, X) a t.d.l.c.s.c. permutation group, each L horoball factor K/L admits a PX (G, U )-equivariant isomorphism ψ : K/L → ∂X (G, U ) where X is the horoball corresponding to K. 50 COLIN D. REID AND PHILLIP R. WESOLEK 9.2. Stacking type chief factors. We now exhibit an example of a non-elementary stacking type chief factor in a compactly generated t.d.l.c.s.c. group. Again technical results are stated without proof. Fix G a non-discrete compactly generated simple t.d.l.c.s.c. group and U ∈ U(G); for concreteness, one can take P SL2 (Qp ) = G and P SL2 (Zp ) = U . Set X := G/U and let G y X by left multiplication. The resulting permutation group (G, X) is a transitive t.d.l.c.s.c. permutation group, so via Proposition 9.3, the group EX (G, U ) is a compactly generated t.d.l.c.s.c. group. In view of Proposition 9.4, PX (G, U ) is the unique chief factor of EX (G, U ). In this setting, PX (G, U ) is of stacking type via the following: Proposition 9.6. Suppose that (G, X) is a transitive permutation t.d.l.c.s.c. group and U ∈ U(G) is non-trivial. If G is topologically simple and compactly generated, then PX (G, U ) is a stacking type chief factor of EX (G, U ), and every chief factor of PX (G, U ) is a horoball factor. We can also describe the chief factors of PX (G, U ) explicitly. Via Propositions 9.5 L and 9.6, every chief factor of PX (G, U ) is isomorphic to N (G, U ). The group PX (G, U ) is thus a non-elementary stacking type chief factor, giving an example of Theorem 8.21(7). 9.3. Chief factors of weak type. We apply our construction a second time to exhibit rank ω+1 weak type chief factors of a compactly generated t.d.l.c.s.c. group. Our construction requires an observation on the rank of the groups EX (G, U ). Proposition 9.7. Suppose that (G, X) is a compactly generated transitive t.d.l.c.s.c. permutation group. If G is elementary with finite rank, then EX (G, U ) is elementary with ξ(EX (G, U )) = ω + 2 for any non-trivial U ∈ U(G). Let D be the infinite dihedral group and C be the order two subgroup which reverses orientation. Setting X := D/C, we obtain a t.d.l.c.s.c. permutation group (D, X). We show that G := EX (D, C) has a chief factor of weak type with rank ω + 1. By Proposition 9.7, G has rank ω +2. Applying Proposition 9.4, G is monolithic, and the monolith M is such that G/M is metabelian. Since solvable groups are finite rank, Lemma 3.6 and Corollary 3.21 ensure that ξ(M ) = ω + 1. We now argue that M is of weak type. Proposition 9.8. Bmin M = ∅. Proof. Let A/B be a chief factor of M and suppose for contradiction that [A/B] ∈ Bmin M . Fixing a base vertex v =: v0 , we form the horoballs Xi and set Hi to be the horoball stabilizer in PX (G, U ). S The union i∈Z Hi is a normal subgroup of EX (G, S U ), and it is dense in PX (G, U ). Since M is non-abelian and chief, it follows that i∈Z Hi ∩ M S is dense and normal in M . If A ∩ Hi ≤ B for all i, then A/B commutes with i∈Z Hi ∩ M in M/B. It follows that A/B is abelian, which contradicts our hypothesis. We thus deduce that A ∩ Hi  B for some i, so A ∩ Hi covers the chief block [A/B]. The intersection of all Hi is trivial, hence since [A/B] is minimally covered, we may take DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 51 A ∩ Hi covering [A/B] such that A/ ∩ Hi−1 does not cover [A/B]. The normal factor A ∩ Hi /A ∩ Hi−1 thus covers the chief block [A/B]. The normal factor A ∩ Hi /A ∩L Hi−1 admits an injection into Hi /Hi−1 . Proposition 9.5 implies that Hi /Hi−1 ' N (D, C), and therefore, Hi /Hi−1 is metabelian. The factor A∩Hi /A∩Hi−1 is then also metabelian. We may now find K/L ∈ [A/B] such that A ∩ Hi−1 ≤ L < K ≤ A ∩ Hi , and since K/L is chief, it follows that K/L is abelian. This is absurd as we assume K/L is a non-abelian chief factor.  The group M is thus a rank ω + 1 chief factor of weak type, giving an example of Theorem 8.23(4). 9.4. Rank two chief factors. Let U + (A6 ) be the Burger–Mozes universal simple group for the alternating group on 6 elements with the usual permutation representation; see [4, 5] for a discussion of these groups. The group U + (A6 ) acts on the 6-regular rooted tree T6 . Fixing δ an end of T6 , we consider the end stabilizer G := U + (A6 )(δ) . Fix a base vertex v ∈ T6 and let v = v0 , . . . , vn , . . . be a geodesic ray representing the end δ. Fix t ∈ G a translation down the geodesic ray and let E E G be the collection of elliptic isometries — i.e. the isometries which fix a vertex. It is an exercise to see that E is a locally elliptic closed normal subgroup and G/E ' Z. Take the edge e = (v0 , v1 ), where v0 and v1 are the first two elements of our distinguished ray, and define Tv1 to be the half-tree determined by e which contains v1 . It now follows that [ tn StabG (Tv1 )t−n . E= n≥1 The stabilizer StabG (Tv1 ) is the profinite group given by taking the inverse limit of the iterated wreath products of (A5 , [5]). We thus deduce that StabG (Tv1 ) is a topologically perfect profinite group, and it has trivial quasi-center. It follows further that E has trivial quasi-center. Lemma 9.9. The subgroup E is a non-negligible chief factor of G with rank two. Proof. Suppose that N E G is non-trivial, closed, and contained in E. Fixing n ∈ N non-trivial, there is some nearest vertex w ∈ T6 to the ray v0 , v1 . . . that is moved by n. By conjugating n with t±1 and elements of E, we may assume that w = v0 and n fixes v1 . Let e be the edge from v0 to v1 and let Tv1 be the half-tree determined by e that contains v1 . We now apply a familiar trick: for any g, h ∈ StabG (Tv1 ), the commutator [[n−1 , g −1 ], h] equals [g, h] ∈ StabG (Tv1 ). The subgroup N thus contains all commutators of StabG (Tv1 ). The stabilizer StabG (Tv1 ) is topologically perfect, so N contains StabG (Tv1 ). Since N is normal, N indeed contains tn StabG (Tv1 )t−n for all n. We thus deduce that N = E, so E is a chief factor of G. The group E is locally elliptic, hence ξ(E) = 2. Applying Theorem 7.15, the chief block [E] is either connected compact, quasi-discrete, or robust. Since G is totally disconnected, [E] is not connected compact. The representative E is not quasi-discrete, so [E] is also not quasi-discrete. We thus deduce that [E] is a robust chief block. A fortiori, E is a non-negligible chief factor of G.  The group E is thus a rank 2 chief factor with trivial quasi-center, giving an example of Theorem 8.21(3). 52 COLIN D. REID AND PHILLIP R. WESOLEK References 1. Herbert Abels, Kompakt definierbare topologische Gruppen, Math. Ann. 197 (1972), 221–233. MR 0315039 2. Bachir Bekka, Pierre de la Harpe, and Alain Valette, Kazhdan’s property (T), New Mathematical Monographs, vol. 11, Cambridge University Press, Cambridge, 2008. MR 2415834 3. Matthew G. Brin, Elementary amenable subgroups of R. Thompson’s group F , Internat. J. Algebra Comput. 15 (2005), no. 4, 619–642. MR 2160570 (2007d:20052) 4. Marc Burger and Shahar Mozes, Groups acting on trees: from local to global structure, Inst. Hautes Études Sci. Publ. Math. (2000), no. 92, 113–150 (2001). MR 1839488 5. Pierre-Emmanuel Caprace and Tom De Medts, Simple locally compact groups acting on trees and their germs of automorphisms, Transform. Groups 16 (2011), no. 2, 375–411. MR 2806497 (2012m:22033) 6. Pierre-Emmanuel Caprace and Nicolas Monod, Decomposing locally compact groups into simple pieces, Math. Proc. Cambridge Philos. Soc. 150 (2011), no. 1, 97–128. MR 2739075 (2012d:22005) 7. Yves Cornulier and Pierre de la Harpe, Metric geometry of locally compact groups, arXiv:1403.3796 [math.GR]. 8. Karl H. Hofmann and Sidney A. Morris, The Lie theory of connected pro-Lie groups, EMS Tracts in Mathematics, vol. 2, European Mathematical Society (EMS), Zürich, 2007, A structure theory for pro-Lie algebras, pro-Lie groups, and connected locally compact groups. MR 2337107 9. Alexander S. Kechris, Classical descriptive set theory, Graduate Texts in Mathematics, vol. 156, Springer-Verlag, New York, 1995. MR 1321597 (96e:03057) 10. Adrien Le Boudec, Groups acting on trees with almost prescribed local action, Comment. Math. Helv. 91 (2016), no. 2, 253–293. MR 3493371 11. Nicolas Monod, Continuous bounded cohomology of locally compact groups, Lecture Notes in Mathematics, vol. 1758, Springer-Verlag, Berlin, 2001. MR 1840942 12. Deane Montgomery and Leo Zippin, Topological transformation groups, Interscience Publishers, New York-London, 1955. MR 0073104 (17,383b) 13. V. P. Platonov, Locally projectively nilpotent subgroups and nilelements in topological groups, Izv. Akad. Nauk SSSR Ser. Mat. 30 (1966), 1257–1274. MR 0202909 (34 #2768) 14. Colin D. Reid and Phillip R. Wesolek, Chief factors in Polish groups, arXiv:1509.00719 [math.GR]. 15. , The essentially chief series of a compactly generated locally compact group, arXiv:1509.06593 [math.GR]. 16. , Homomorphisms into totally disconnected, locally compact groups with dense image, arXiv:1509.00156 [math.GR]. 17. Luis Ribes and Pavel Zalesskii, Profinite groups, Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in Mathematics], vol. 40, SpringerVerlag, Berlin, 2000. MR 1775104 18. Derek J. S. Robinson, A course in the theory of groups, second ed., Graduate Texts in Mathematics, vol. 80, Springer-Verlag, New York, 1996. MR 1357169 (96f:20001) 19. Simon M. Smith, A product for permutation groups and topological groups, arXiv:1407.5697 [math.GR]. 20. Phillip Wesolek, Elementary totally disconnected locally compact groups, Proc. Lond. Math. Soc. (3) 110 (2015), no. 6, 1387–1434. MR 3356810 21. David Zerling, Some theorems on (CA) analytic groups, Trans. Amer. Math. Soc. 205 (1975), 181–192. University of Newcastle, School of Mathematical and Physical Sciences, University Drive, Callaghan NSW 2308, Australia E-mail address: [email protected] Department of Mathematical Sciences, Binghamton University, PO Box 6000, Binghamton, New York 13902 E-mail address: [email protected] DENSE NORMAL SUBGROUPS AND CHIEF FACTORS 53 Previous address: Université catholique de Louvain, Institut de Recherche en Mathématiques et Physique (IRMP), Chemin du Cyclotron 2, box L7.01.02, 1348 Louvain-la-Neuve, Belgium
4math.GR
1 Online Geographical Load Balancing for Mobile Edge Computing with Energy arXiv:1704.00107v3 [cs.IT] 23 Dec 2017 Harvesting Jie Xu, Hang Wu, Lixing Chen, Cong Shen Abstract Mobile Edge Computing (MEC) (a.k.a. fog computing) has recently emerged to enable low-latency and location-aware data processing at the edge of mobile networks. Since providing grid power supply in support of MEC can be costly and even infeasible in some scenarios, on-site renewable energy is mandated as a major or even sole power supply. Nonetheless, the high intermittency and unpredictability of energy harvesting creates many new challenges of performing effective MEC. In this paper, we develop an algorithm called GLOBE that performs joint geographical load balancing (GLB) and admission control for optimizing the system performance of a network of MEC-enabled and energy harvestingpowered base stations. By leveraging and extending the Lyapunov optimization with perturbation technique, GLOBE operates online without requiring future system information and addresses significant challenges caused by battery state dynamics and energy causality constraints. Moreover, GLOBE works in a distributed manner, which makes our algorithm scalable to large networks. We prove that GLOBE achieves a close-to-optimal system performance compared to the offline algorithm that knows full future information, and present a critical tradeoff between battery capacity and system performance. Simulation results validate our analysis and demonstrate the superior performance of GLOBE compared to benchmark algorithms. I. I NTRODUCTION Mobile computing and the Internet of Things are driving the development of many new applications, turning data and information into actions that create new capabilities, richer experiJ. Xu and L. Chen are with the Department of Electrical and Computer Engineering, University of Miami, USA. Email: [email protected], [email protected]. H. Wu and C. Shen are with the Department of Electric Engineering and Information Science, University of Science and Technology of China. Email: [email protected], [email protected] 2 ences and unprecedented economic opportunities. Although cloud computing enables convenient access to a centralized pool of configurable and powerful computing resources, it often cannot meet the stringent requirements of latency-sensitive or geographically constrained applications, such as mobile gaming, augmented reality, tactile Internet and connected cars, due to the often unpredictable network latency and expensive bandwidth [1], [2]. As a remedy to these limitations, Mobile Edge Computing (MEC) [3] (a.k.a. fog computing [4]) has recently emerged as a new computing paradigm to enable in-situ data processing at the Internet edge, in close proximity to mobile devices, sensors, actuators and connected things. In MEC, network edge devices, such as base stations (BSs) [2], are endowed with cloud-like functionalities to serve users’ requests as a substitute of clouds, while significantly reducing the transmission latency as they are just one wireless hop away from end users and data sources. In increasingly many scenarios, BSs are primarily powered by renewable green energy (e.g. solar and/or wind), rather than the conventional electric grid, due to various reasons such as location, reliability, carbon footprint and cost. The high intermittency and unpredictability of energy harvesting (EH) [5] significantly exacerbate the challenge of the latency requirements of applications as the computing capacity of an individual MEC-enabled BS is significantly limited at any moment of time. Geographical load balancing (GLB) [6], [7] is a promising technique for optimizing MEC performance by exploiting the spatial diversity of the available renewable energy to re-shape the computation workload distribution among the distributed BSs. However, energy harvesting leads to extraordinary challenges that existing GLB approaches cannot address: not only the available energy in the batteries imposes a stringent energy constraint at any time moment, but also the intrinsic evolution of these constraints couple the GLB decisions across time, and yet the decisions have to be made without foreseeing the future. Compared to existing GLB approaches for data center networks that solve time-decoupled problems, GLB for EHpowered MEC networks demands a fundamentally new design that can optimally manage limited energy, computing and radio access resources in both spatial and temporal domains. In this paper, we study the joint problem of geographical load balancing, admission control and energy purchase among a network of EH-powered BSs (See Figure 1 for an illustration) aimed at improving the mobile edge computing performance. The main contributions of this paper are as follows. (1) We develop a novel framework, called GLOBE (Geographical LOad Balancing with Energy harvesting), for minimizing the long-term system cost (due to violating the computation delay 3 Power grid (market energy price) Purchase ? Load balancing (communication traffic) Energy harvesting Load balancing (computation tasks) (intermittent and unpredictable) Computation offloading Communication traffic Fig. 1. Illustration of load balancing in the MEC-enabled BS network with energy harvesting. constraint and dropping data traffic). In addition to the spatial coupling originated from load balancing among geographically distributed BSs, the considered problem also exhibits strong temporal coupling due to the energy harvesting causality constraint. Such spatial-temporal coupling makes the investigated problem significantly different and more challenging than conventional GLB problems studied in the literature. (2) We develop an online and distributed algorithm leveraging the Lyapunov stochastic optimization framework to solve the spatial-temporal GLB optimization problem. Instead of the conventional Lyapunov virtual queue technique, our algorithm is based on the Lyapunov perturbed queue technique to handle the energy causality constraint. The algorithm enables BSs to make GLB decisions without foreseeing the future system dynamics yet provides provable performance guarantee. In particular, we prove that GLOBE achieves within a bounded deviation from the optimal system performance that can be achieved by an oracle algorithm that knows the complete future information, provided that the battery capacity of the BSs is sufficiently large. The performance-battery capacity tradeoff is theoretically characterized. (3) The perturbed battery queue technique decouples the GLB problem across time. In each time slot, we also develop a distributed algorithm to solve the per-time slot GLB problem. Lagrangian dual decomposition with quadratic regularization is used to relax the computation capacity constraint of individual BSs and decouple the spatially-coupled problem into subproblems that can be solved by individual BSs. (4) We run extensive simulations to evaluate the performance of GLOBE and verify our analytical results for various system configurations and traffic arrival patterns. The results confirm that our method significantly improves the system performance compared to benchmark algorithms that do not perform GLB or only optimize the system myopically. 4 The rest of this paper is organized as follows. Section II discusses related works. Section III presents the system model and formulates the problem. Section IV develops the GLOBE framework and distributed and online solutions. Section V proves the performance guarantee of GLOBE. Section VI shows the simulation results. Finally, Section VII concludes the paper. II. R ELATED WORK Mobile Edge Computing [2] (a.k.a fog computing computing [4]) has emerged as a new paradigm to provide service with ultra-low latency and precise location awareness by bringing the computation resource closer to the end users. However, compared to the conventional mobile cloud computing, the edge servers are still limited in the computational and storage resource [8] and hence may fail to offer the expected quality of service (QoS) when facing excessive workload. To address this challenge, hierarchical edge computing architectures [9], [10] are investigated to allow overloaded edge servers to further offloading computation tasks to the cloud server or the higher-tier servers. While this structure effectively solves the potential overloading problem at the edge servers, the computation tasks further offloaded to the cloud server will suffer from the large congestion delay due to backhaul transmission and hence degrades the QoS. Many recent works [11], [12], [13] investigate cooperation among edge entities to improve uses’ experience by fully utilizing the resource within the edge system and reducing the dependency on the cloud server. Although the cooperation among BSs in the conventional wireless communication has been well investigated subject to various constraints, e.g., radio resources [14], energy consumption budgets [15] and backhaul bandwidth capacity [16]), the cooperation among MEC-enabled BSs is a very different topic since the radio resource and computational resource need to be considered jointly. Efforts have been made to coordinate the edge entities to serve the mobile users collaboratively. In [12], [17], computation load distribution among the network of BSs is investigated by considering both radio and computational resource constraints, where clustering algorithms are proposed to maximize users’ satisfaction ratio while keeping the communication power consumption low. In [11], [18], [19], the coalitional game theory is applied to enable distributed formation of femto-clouds. However, these works study time-decoupled problems and do not consider energy-harvesting and hence, are very different from our paper. In [20], cooperation among two BSs powered by renewable energy is investigated. However, it considers only two BSs and does not study MEC. Our prior work [10] is one of the first works that consider energy harvesting in the context of MEC. However, it studies the hierarchical 5 offloading problem for a single MEC-enable BS with energy harvesting capability but neglects the cooperation among multiple BSs. In this paper, we complete the story by exploring the cooperation among MEC-enabled BSs through geographical load balancing of communication traffic and computation workload. Geographical Load Balancing (GLB) has been extensively studied in data center network (DCN) research [6], [21], [22], [23], [7]. Most of these works study load balancing problems that are independent across time and hence a myopic optimization problem is often formulated and solved to derive the GLB policy. Only a few works consider temporally coupled GLB problems. For example, authors in [6] consider the temporal dependency with respect to the switching costs (turning on/off) of data center servers, which significantly differs from our considered problem where the temporal dependency is caused by the energy harvesting and energy consumption of BSs. Hence, different techniques are required to solve our problem. A similar temporally coupled GLB problem was studied under the framework of Lyapunov optimization in [7], where the authors consider a long-term water consumption constraint while optimizing the load balancing. However, firstly, the constraint in [7] is a long-term average constraint whereas our paper considers a much more complicated and stringent battery causality constraint, and secondly, the constraint in [7] is imposed on the entire network whereas in our paper each individual BS is constrained by its own (time-varying) battery state. To address these new challenges, we leverage the Lyapunov optimization with perturbation technique [24] to develop our algorithm with a provable performance guarantee. Recent works [6], [23] studied the GLB with renewables, which show that GLB creates an important opportunity by allowing for “follow the renewables” routing. However, renewables in these works are considered as an instantaneous supplement to grid power, which needs to be matched by the energy demand instantaneously. By contrast, our considered problem uses renewables as the major power source and can be stored in the battery co-located with the BSs. Therefore, the battery state dynamics and the energy causality constraint need to be carefully considered while performing GLB. More importantly, the GLB algorithms (e.g. Averaging Fixed Horizon Control [6]) in these works requires future information (albeit few), whereas our algorithm is able to work without foreseeing the future. 6 III. S YSTEM M ODEL A. Network Model We consider a network of N base stations (BS), indexed by N = {1, 2, ..., N}, providing communication and edge computing services to users. Each BS is mainly powered by renewable energy harvested from wind and/or solar radiation, and is equipped with a battery for energy storage. Renewable energy is considered as free. However, BSs can also purchase energy from the electric grid whenever needed, at a cost depending on the current energy market price and their energy demand. We consider a dense deployment scenario where BSs have overlapping coverage areas so that geographical load balancing is possible. Time is discretized, with each time slot matching the timescale at which load balancing decisions can be updated. In each time slot t, each BS i has a set of associated users Uit according to a certain user-cell association rule (e.g., maximizing the received signal strength). The BS can collect information (e.g. demand, channel conditions etc.) of its associated users and dispatch their loads to itself or nearby BSs thanks to the dense deployment of BSs. Having the associated BSs to make load balancing decisions instead of the user themselves can significantly reduce the algorithm complexity and information exchange overhead, thereby improving the scalability of the system. Let U t = ∪i∈N Uit be the set of all users in time t. For each user u, let Nu ⊆ N be the set of BSs that are in its transmission range. Although our framework and algorithm can handle a time-varying user set across time slots, for the ease of exposition, we will assume that the user set is static over the considered time horizon. In an alternative network model, we can also imagine that each user represents a service area which remains static although users inside it can change. Therefore, in the remainder of this paper, we drop the time index t in the user set U t and Uit , ∀i ∈ N . B. Communication Traffic and Cost Model Users have uplink and downlink communication traffic that has to be served by the BSs. We assume that uplink and downlink transmissions operate on orthogonal channels and focus on the downlink traffic since energy consumption associated with downlink transmissions predominates the total BS energy consumption [25]. Henceforth, communication traffic refers to downlink communication traffic. In each time slot t, each user u has communication traffic at arrival rate µti ≤ µmax , which we assume to be upper bounded by µmax . The data size of communication 7 traffic arrival is modeled as an exponential random variable with mean ωu for user u. Using Shannon’s theorem, the expected energy consumption for each transmission by BS i to its associated user u can be computed as  pti,u = E   P ωu  ,  tx,i H t i,u Ptx,i W log2 1 + σ2 (1) t where W is the downlink bandwidth, Hi,u is a random variable representing the downlink channel gain between BS i and user u in time slot t, Ptx,i is BS i’s transmitting power, σ 2 is the noise power, and the expectation is taken over the data size and the channel state. For each user u, its communication traffic can be transmitted by any of the BSs in Nu that covers u, e.g., via Coordinated Multi Point (CoMP) with Coordinated Scheduling (CS) [26]. t t represents the amount of Denote αut = {αu,j }j∈Nu as user u’s transmission strategy where αu,j traffic that is transmitted by BS j. Since a BS has multiple associated users, the transmission load balancing strategy of BS i is the collection of individual users’ transmission strategy, represented by αti = {αtu }u∈Ui . Further, the transmission load balancing strategy of the whole network is collected in the notation αt = {αti }i∈N . Clearly, a feasible transmission load balancing strategy must satisfy X t αu,j ≤ µtu , ∀u. (2) j∈Nu Note that the strict inequality in the above constraint means that some communication traffic of a user may not be fulfilled by any BS. This could happen when energy supply of the BSs becomes a concern and hence the BSs have to drop some communication traffic to save energy. An alternative interpretation of constraint (2) is that user requested files, especially video files, are transmitted at a lower resolution and hence only the incremental high-resolution layers of the video will be dropped. Depending on the amount of transmitted traffic and the current channel conditions, the transmission energy consumption of BS i in time slot t is X t Etx,i (αt ) = pti,u αu,i . u∈U (3) 8 Dropping communication traffic incurs costs to the network operator due to, e.g., user dissatisfaction or reduced Quality of Experience (QoE). The cost is user-specific depending on user priority. The total communication traffic dropping cost of BS i is thus X X t αu,j ), Ctx,i (αt ) = ctx,u (µtu − u∈Ui (4) j∈Nu where ctx,u is the unit dropping cost for user u which converts the dropped communication traffic into a monetary value. C. Computation Tasks and Cost Model In each time slot t, each user also generates computationally intensive tasks that have to be offloaded to the BS/edge server for processing. When the computation is finished, the computation results will be returned to the user. The computation task arrival of user u is denoted by λtu ≤ λmax , where λmax is the maximum arrival rate. For each computation task, the required number of CPU cycles is assumed to be an exponential random variable with mean ρ. The computation capability of BS i is measured by its CPU speed (i.e. CPU cycles per second), denoted by fi . Given the the constant CPU speed of BS i, and the exponential distribution of workload of each computation task, the processing time of a computation task follows an exponential distribution with mean ρ/fi . Therefore, if BS i processes computation tasks with arrival rate λ, the average computation delay (including the waiting time and the processing time) for a task, can be computed using a M/M/1 queuing model dti = 1 . fi /ρ − λ (5) The workload is delay-sensitive which has to satisfy a maximum delay constraint dmax . If the total computation workload on a BS is too large, then the delay constraint will be easily violated. Therefore, computation load balancing is also performed to exploit the under-used, otherwise wasted, computational resources on BSs with light workload to improve the overall system performance. In dense networks, computation load balancing is realized by offloading computation tasks t }j∈Nu be to nearby BSs other than the directly associated BS. For each user u, let β tu = {βu,j its offloading strategy. A computation load balancing strategy of BS i is the collection of its users’ offloading strategy β ti = {β tu }u∈Ui and a computation load balancing strategy of the whole 9 network is β t = {β ti }i∈N . In a feasible computation load balancing strategy, the total offloaded workload of user u must not exceed its computation demand, namely X t βu,j ≤ λtu , ∀u. (6) j∈Nu Moreover, the received workload of BS i must not exceed its computation capacity to satisfy the delay constraint, namely X t βu,i ≤ fi /ρ − 1/dmax , ∀i. (7) u∈U Due to the above constraints, users can also choose to drop some computation workload (or process locally on user devices, or offload to the remote cloud) if the edge BS network collectively cannot support it. The computation energy consumption of BS i is proportional to its received workload (from P t its own users or users of nearby BSs), namely u∈U βu,i , and the square of its CPU speed (fi )2 [2]. Therefore, the computation energy consumption of BS i in time slot t is X t , βu,i Ecom,i (β t ) = κ(fi )2 (8) u∈U where the coefficient κ is for unit task energy consumption. Dropping computation workload incurs a cost, which is linear to the dropped computation workload. The computation dropping cost for BS i (considering its own associated users) is therefore X X t βu,j ), Ccom,i (β t ) = ccom,u (λtu − u∈Ui (9) j∈Nu where ccom,i is the unit workload dropping cost for user u which converts the dropped compu- tation tasks into a monetary value. D. Energy Harvesting and Purchase BSs in the considered system are mainly powered by renewable energy harvested from the environment, such as wind energy and/or solar energy. To capture the intermittent and unpredictable nature of the energy harvesting process, we model it as successive energy packet arrivals, i.e. in each time slot t, energy packets with amount Eit ≤ E max arrive at BS i, where Eit is drawn from some unknown distribution upper bounded by E max . In each time slot t, part of the arrived energy, denoted by eti , satisfying 0 ≤ eti ≤ Eit , ∀i (10) 10 will be harvested and stored in the battery of BS i. We start with assuming that the battery capacity is sufficiently large. Later we will show that by picking the value of eti , the battery energy levels can be deterministically upper-bounded under the proposed algorithm, thus we only need finite-capacity batteries in the actual implementation. More importantly, including eti ’s as decision variables in the optimization facilitates the derivation and performance analysis of the proposed algorithm. Similar techniques were adopted in existing works [27], [28]. We collect the energy harvesting decisions of all BSs in the notation et = {et1 , ..., etN }. When renewable energy falls short, BSs can also purchase energy from the electric grid depending on its energy demand and the current market energy price, which varies over time. Let ctgrid be the unit energy price in time slot t. BS i’s energy purchase decision is denoted by git ∈ [0, g max ] where g max is the maximum grid energy a BS can purchase. The energy purchase cost is thus Cgrid,i (git ) = ctgrid git . (11) E. Problem Formulation The objective of the network operator is to minimize the total system cost in (12) due to dropping communication traffic/computation workload and purchasing grid energy by jointly optimizing load balancing, energy harvesting and purchase in each time slot. Ci (αt , βt , git ) , Ctx,i (αt ) + Ccom,i (β t ) + Cgrid,i (git ) (12) The optimization is subject to an energy availability constraint, namely the consumed energy in each time slot must not exceed what is available. The total energy consumption of BS i in time slot t includes communication and computation energy consumption, i.e. t t Eit (αt , βt ) = Etx,i (αt ) + Ecom,i (β t ) (13) Let Bit denote the available battery energy at the beginning of time slot t for BS i. The energy causality constraint must be satisfied in every time slot Eit (αt , β t ) ≤ Bit , ∀i ∈ N (14) At the end of each time slot, the battery state evolves as follows Bit+1 = min{Bit − Eit (αt , β t ) + eti + git , B max } (15) 11 where B max is the battery capacity. The problem can thus be formulated as follows: P1 min αt ,βt ,et ,g t ,∀t subject to T  1 XX  E Ci (αt , β t , git ) lim T →∞ T t=1 i∈N (16a) Constraints (2), (6), (7), (10), (14), ∀t where (2), (6) are the constraints for feasible transmission load balancing strategy and feasible computation load balancing strategy, respectively. (7) is the computation capacity constraint for each BS. (10) indicates that the harvested energy cannot exceed the green energy arrivals. (14) is the battery causality constraint, indicating that the energy consumption in the current time slot should not exceed the battery level. Because of the battery state dynamics and energy causality constraints, the load balancing decisions are highly coupled across time slots. Let C1∗ be the infimum time average system cost achievable by any policy that meets the required constraints in every time slot, possibly by an oracle algorithm that has complete future information of the communication traffic arrival process, the computation task arrival process, the energy harvesting process, the market energy price, and the channel conditions. We note that C1∗ represents a performance upper bound for practical algorithms as they do not possess complete and accurate future information. In the next sections, we will develop an algorithm that achieves C1∗ within a bounded deviation without requiring future information. IV. O NLINE L OAD BALANCING FOR EH-P OWERED MEC A. An Online Algorithm based on Perturbed Lyapunov Optimization Lyapunov optimization is a powerful framework that enables online stochastic optimization without requiring future system dynamics yet provides provable performance guarantee. However, conventional Lyapunov optimization [29] is not directly applicable for solving P1 due to the presence of energy causality constraints (14). In order to circumvent this obstacle, we take an alternative approach based on the perturbed Lyapunov technique similar to [30]. First, we 12 formulate a slightly modified version of P1 as follows: P2 min αt ,β t ,et ,gt ,∀t subject to T  1 XX  E C αt , β t , git lim T →∞ T t=1 i∈N T  1 XX  t t t E Ei (α , β ) − git − eti = 0 T →∞ T t=1 i∈N lim (17a) (17b) Constraints (2), (6), (7), (10), ∀t where the energy causality constraint (14) in P1 is replaced with a long-term energy demand and supply clearance constraint (17b). It can be easily shown that P2 is a relaxed version of P1, as any feasible solution to P1 would also satisfy the constraints in P2. To see this, consider any policy that satisfies (10) and (14), then summing equation (15) over t ∈ {1, . . . , T }, dividing by T and taking limits as T → ∞ yields (17b). Let C2∗ denote the optimal value of P2 and then, we must have C2∗ ≤ C1∗ . Following the framework in [29], it can be shown that the optimal solution to the relaxed problem P2 can be obtained by the method of stationary randomized policy, stated in the following lemma. Lemma 1. There exists a stationary and possibly randomized policy Π that achieves i X h Π,t Π,t Π,t E Ci (α , β , gi ) = C2∗ (18) i∈N while satisfies the constraints (6), (7), (2), (10) in P2 and h i E Eit (αΠ,t , β Π,t ) − giΠ,t − eΠ,t =0 i (19) Proof. The proof follows the framework in [29] and is omitted here for brevity. However, the optimal policy Π requires the knowledge of the system dynamics over the entire time horizon, and hence is very difficult to derive in practice if not impossible. Next, we develop an online algorithm, called GLOBE, to solve P1 and compare its performance with C2∗ achieved by Π. We first define the perturbed battery queue for each BS. Definition 1. The perturbed battery queue B̃it of BS i is defined as B̃it = Bit − θ, ∀i ∈ N where θ is the perturbation parameter. (20) 13 The value of θ will be specified later when we analyze the algorithm performance. In a nutshell, the proposed GLOBE algorithm aims to minimize the weighted sum of the system cost and the perturbed energy queue in each time slot, which shall stabilize Bit around the perturbed energy level θ and meanwhile minimize the system cost, where the weight is adaptively updated over time. In each time slot t, the load balancing strategies, the amount of harvested and purchased energy are determined by solving the following optimization problem:  X t t t t t t t t t V · Ci (α , β , gi ) − B̃i · (Ei (α , β ) − gi − ei ) P3 min β t ,αt ,et ,gt i∈N subject to Constraints (2), (6), (7), (10) (21a) (21b) which is parameterized by only the current system state (i.e., communication traffic arrival, computation task arrival, energy price, channel conditions in time slot t, etc). Therefore, our algorithm can work online without requiring future information of the system dynamics. Fig. 2 illustrates GLOBE for an arbitrary time slot t. At the beginning of each time slot, GLOBE observes the system states and battery level. Then, with the observed information, it derives the optimal energy harvesting, grid power purchase, and load balancing decisions. At the end of the time slot, the battery states of the BSs are updated based on the acquired energy (via harvesting and purchase) and the consumed energy (due to transmission and computation), thereby linking per-time slot problems across time. Realization GLOBE Current System States Communication traffic: ࣆ௧ Computation task: ࣅ௧ Energy packets: ए௧ ௧ Market energy price: ܿ௚௥௜ௗ Transmission energy: ࢖௧ Transmission load balancing: ߙ ‫כ‬௧ System Cost: ‫ܥ‬௜௧ ǡ ‫݅׊‬ Computation load balancing: ߚ ‫כ‬௧ Energy consumption: ‫ܧ‬௜௧ ǡ ‫݅׊‬ Grid power purchase: ݃‫כ‬௧ Energy harvesting: ݁ ‫כ‬௧ Battery Dynamics ‫ܤ‬ଵ ൌ ‹ሼ‫ܤ‬ଵ െ ‫ܧ‬ଵ௧ ൅ ݁ଵ‫כ‬௧ ൅ ݃ଵ‫כ‬௧ ǡ ‫ܤ‬ଵ௠௔௫ ሽ ‫ڭ‬ ‫כ‬௧ ‫ܤ‬ே ൌ ‹ሼ‫ܤ‬ே െ ‫ܧ‬ே௧ ൅ ݁ே‫כ‬௧ ൅ ݃ே ǡ ‫ܤ‬ே௠௔௫ ሽ Fig. 2. Illustration of GLOBE for time slot t. The GLOBE algorithm is formally presented in Algorithm 1. How this algorithm is derived will be explained and its performance will be theoretically analyzed in Section V. Now, to complete GLOBE, it remains to solve the per-time slot problem P3. 14 Algorithm 1 The GLOBE algorithm 1: Input: {θi , i ∈ N }, V 2: Output: Load balancing αt and β t , purchased energy g t , harvested energy et , for every t 3: for every time slot t do 4: Observe µt , λt , E t , ctgrid , pt 5: Solve (P3) to get αt , β t , et and g t 6: Update the battery state according to (15) for i ∈ N 7: end for The objective function in P3 can be decomposed into three parts:  X V · Ci (αt , β t , git ) − B̃it · (Eit (αt , β t ) − git − eti ) i∈N  X = V · ctgrid git + B̃it (git + eti ) i∈N + + X V · X i∈N u∈Ui X X i∈N V · ctx,u (µtu − X t αu,j ) − B̃it ccom,u (λtu − u∈Ui t pti,u αu,i u j∈Nu X X t βu,j ) − B̃it κ(fi )2 X u∈U j∈Nu (22) ! ! t βu,i . Given the current perturbed battery queues of all BSs, the first term on the right-hand side depends only on the transmission load balancing strategy αt , the second term depends only on the computation offloading load balancing strategy β t , and the third term depends only on the energy harvesting et and purchase strategies g t . Therefore, we can optimize each term separately. B. Optimal Energy Harvesting and Purchase We start with solving the per-slot optimal energy harvesting and purchase problem, which is the first term of (22):  X t t t t t V · c g + B̃ (g + e ) min grid i i i i t t e ,g subject to 0 ≤ eti ≤ Eit , ∀i. (23a) i∈N This is a simple linear programming (LP) and can be solved by each BS in a fully distributed way without requiring any message exchange among the BSs. The optimal solution can be derived as follows t t et∗ i = Ei · 1{B̃i ≤ 0}, ∀i; git∗ = g max · 1{V · ctgrid + B̃it ≤ 0}, ∀i (24) 15 where 1{·} is the indicator function. The optimal solution suggests that 1) BS i should harvest all possible energy if the battery queue Bit is less than a threshold θi and zero energy otherwise; 2) BS i should purchase the maximum amount of grid power if the battery queue is less than a threshold θi − V · ctgrid and zero grid energy otherwise. Since θi − V · ctgrid < θi , renewable energy has a high priority than the grid power, i.e., renewable energy will be acquired before purchasing any grid energy. This is intuitive because renewable energy is free. Moreover, because the grid energy price ctgrid varies over time, the energy purchase strategy also varies depending on ctgrid . The BS is more likely to purchase grid energy when the price is low. The energy harvesting and purchase strategies are very simple and both have a “none-or-all” structure. However, we will show later that these simple strategies indeed ensure that we only need a finite battery capacity for each BS while providing provable performance guarantee. C. Optimal Transmission Load Balancing The optimal transmission load balancing can be obtained by solving the following LP problem: ! X X X X t t (25a) pti,u αu,i αu,j + B̃it V ctx,u max t α u u∈Ui j∈Nu i∈N X t αu,j ≤ µtu , ∀i, ∀u ∈ Ui (25b) subject to j∈Nu The objective function can be further rearranged as follows ! X XX X X X X t t t (V ctx,u + B̃jt ptj,u )αu,j . αu,j + B̃it pti,u αu,i = V ctx,u i∈N u∈Ui j∈Nu u i∈N u∈Ui j∈Nu This enables each BS i to decide its transmission load balancing strategy for its own associated users in a distributed way, after exchanging information of the perturbed battery queue lengths with neighbor BSs. Specifically, BS i solves the following problem for each of its user u ∈ Ui : X X t t t t αu,j ≤ µtu . (26a) (V c + B̃ p )α subject to max tx,u j j,u u,j αtu j∈N j∈N u u The optimal solution has a simple structure. If there exist some BS j such that the coefficient V ctx,u + B̃jt ptj,u ≥ 0, then all user u’s communication traffic will solely be transmitted by the BS that has the largest positive coefficient. If no BS has positive coefficients, then user u’s downlink traffic will not be transmitted, thereby causing communication traffic to be dropped. We note 16 that whether traffic dropping occurs or not depends on the cost ctx,u . When ctx,u is sufficiently large (i.e. dropping communication traffic is very costly), then there will always be BSs with positive coefficients and hence no traffic will be dropped. D. Optimal Computation Load Balancing The optimal computation load balancing strategy can be obtained by solving the following LP problem X max βt X subject to X V ccom,u u∈Ui i∈N X t βu,j + B̃it X t κ(fi )2 βu,i u j∈Nu ! t βu,j ≤ λtu , ∀i, ∀u ∈ Ui (27a) (27b) j∈Nu X t βu,i ≤ fi /ρ − 1/dmax , ∀i (27c) u∈U Similar to the transmission load balancing problem, the objective function can also be rearranged as follows: X i∈N X u∈Ui V ccom,u X t βu,j + B̃it κ(fi )2 X u j∈Nu t αu,i ! = XX X t (V ccom,u + B̃jt κ(fj )2 )βu,j . i∈N u∈Ui j∈Nu While the computation load balancing problem looks similar to the transmission load balancing problem in the previous subsection, it indeed is a much more complicated problem because of the computation capacity constraint (27c) that makes the load balancing decisions among BSs highly coupled. To enable a distributed solution, we use Lagrangian dual decomposition to relax the computation capacity constraint and decouple the primal problem into several subproblems. Unfortunately, the above considered LP problem is sensitive to perturbations and does not work well with the dual decomposition technique. To overcome this difficulty, we add a quadratic regularization term to the objective function to smooth the original LP problem1. The regularized problem is: max βt subject to XX X  (V ccom,u + t B̃jt κ(fj )2 )βu,j i∈N u∈Ui j∈Nu X t βu,j ≤ λtu , ∀i, ∀u ∈ Ui ; j∈Nu 1 We note that a similar approach was proposed and adopted in [31]. X u∈U 1 t 2 ) − (βu,j 2ǫ  t βu,i ≤ fi /ρ − 1/dmax , ∀i (28a) (28b) 17 According to [32], there exists ǫmin > 0 such that the optimal solution to problem (28a) is also an optimal solution to problem (27a) for any ǫ ≥ ǫmin . For our problem, we have found that ǫ = 107 works well. Therefore, we will instead solve the smoothed quadratic programming (QP) problem. We associate a Lagrangian multiplier γi with the computation capacity constraint of each BS i. The Lagrangian of the primal problem (28a) is thus XX X 1 t 2 X X t t ) − γi ( βu,i − fi /ρ + 1/dmax ) (V ccom,u + B̃jt κ(fj )2 )βu,j − (βu,j L(γ, β t ) = 2ǫ i∈N u∈U i∈N u∈U j∈N u i = XX X t (V ccom,u + B̃jt κ(fj )2 − γj )βu,j − i∈N u∈Ui j∈Nu Because the third term P i∈N 1 t 2 X (β ) + γi (fi /ρ − 1/dmax ). 2ǫ u,j i∈N γi (fi /ρ−1/dmax ) is independent of the computation load balancing strategy β t , the relaxed problem is XX X 1 t 2 t (V ccom,u + B̃jt κ(fj )2 − γj )βu,j − (βu,j ) max t 2ǫ β i∈N u∈Ui j∈Nu X t βu,j ≤ λtu , ∀i, ∀u ∈ Ui subject to (29a) (29b) j∈Nu After this relaxation, the problem can be divided into two levels. At the lower level, each BS seeks to optimize β t for given γ. The subproblem for BS i is X X 1 t 2 t (V ccom,u + B̃jt κ(fj )2 − γj )βu,j − (βu,j ) max t 2ǫ βi u∈Ui j∈Nu X t βu,j ≤ λtu , ∀u ∈ Ui subject to (30a) (30b) j∈Nu The above problem is a QP. Its optimal value is denoted as Li (γ). Since the problem is strictly concave, the optimal solution is unique. At the higher level, each BS i seeks to solve the dual problem: X min (Li (γ) + γi (fi /ρ − 1/dmax ). γ ≥0 (31) i∈N Since the lower level problem has a unique optimal solution, the higher level dual problem is differentiable. Therefore, we use the gradient descent method to solve this problem in an iterative manner. In each iteration k, the BSs exchange the current values of γ (k) and each BS i solves t,(k) the lower level problem (30a) using the current iteration γ (k) to obtain the optimal β i t,(k) the BSs exchange the derived β i . Then and use it to update the Lagrangian γ (k+1) for the next iteration as follows: (k+1) γi (k) = [γi − δ (k) (fi /ρ − 1/dmax − X u t,(k) βu,i (γ (k) ))]+ , (32) 18 ":DFG DE ":DFI1G :H ": F DE G D ":DFG H1 ":DFI1G :H H1 D E ": F ":DFG HJ DE ":DFG DE ":DFG G ":DFI1G :H E ":DFG HJ G ": F DE G ":DFG :H ":DFM1G G L1 E D E D ":DFG ":DFM1G HK ":DFM1G L1 ":DFG HJ F ":DFG :H ":DFM1G LJ F ": F DE ":DFG :H LJ G ":DFM1G LJ F ":DFM1G LK F ":DFM1G LK ":DFG HK each BS updates H( at the lower level broadcast H( to neighbor BSs each BS updates L( at the higher level broadcastNL(N to neighbor BSs for the next iteration Fig. 3. Illustration of the iterative algorithm for one iteration. where δ (k) > 0 is the step size of the subgradient descent method. The dual variable will converge to the optimal γ ∗ as k → ∞. Fig. 3 illustrates the procedure of the iterative algorithm for one iteration. Since the Slater’s condition (i.e., the primal problem is convex and there exists a feasible solution) is satisfied for the primal problem, the strong duality holds. As a result, the optimal solution β t for the primal problem can also be derived through β t,(k) (γ (k) ) with k → ∞. We therefore have solved the primal problem. Algorithm 2 summarizes the iterative algorithm which solves the computation load balancing problem in a distributed manner. Algorithm 2 The Distributed Algorithm That Iteratively Solves Per-Slot Computation Load Balancing 1: Input: B̃it for each BS i at the current time t 2: Output: Slot t’s computation load balancing β t 3: Each BS i broadcast B̃it to its neighbor BSs. 4: for iteration k do (k) to its neighbor BSs, ∀i ∈ N 5: BS i broadcasts its γi 6: BS i solves (30a) for β i 7: BS i broadcasts its solution β i 8: 9: t,(k) , ∀i ∈ N t,(k) BS i updates (k+1) γi to its neighbor BSs, ∀i ∈ N according to (32), ∀i ∈ N end for V. P ERFORMANCE A NALYSIS In this section, we analyze the performance of GLOBE. To facilitate our exposition, we min introduce the following auxiliary notations: cmax , maxu ctx,u , cmax , tx com , maxu ccom,u , p min max mini,u,t pti,u and f min , mini fi . Let cmax , max{cmax , ccom /(κ(f min )2 )}}. Moreover, we tx /p 19 max max assume that Ei (αt ) is upper bounded by Etx and Ei (β t ) is upper bounded by Ecom . This assumption holds when the communication traffic/computation task arrivals are bounded. Let max max E max = Etx + Ecom . Lemma 2. For any B max > E max + E max + g max , by choosing 0≤V ≤ B max − E max − E max − g max cmax (33) and θ = V cmax +E max , the battery level Bit is bounded in [0, B max ], ∀i, and the energy causality constraint is satisfied in every time slot. Proof. Define θ̃it , θ − V · maxu max{ctx,u /pti,u , ccom,u /(κ(fi )2 )}. Using the definition of cmax , we must have θ̃it ≥ E max . Consider the following three cases based on the value of Bit . Case 1: Bit ∈ [θ, Bmax ]. Our analysis for the optimal energy harvesting and purchase problem before shows that if Bit > θ, then BS i will not harvest or purchase any energy, namely et∗ i = 0 and git∗ = 0. According to the battery dynamics, Bit+1 ≤ Bit and hence Bit+1 will also be less than Bmax . On the other hand, because θ > Emax , the energy causality constraint Eit∗ < Bit is satisfied and the next slot battery will be greater than 0 since Bit+1 = Bit − Eit∗ > θ − E max > 0. max t∗ max Case 2: Bit ∈ [θ̃it , θ]. In this case, we have et∗ , git∗ ≤ g max , Etx,i ≤ Etx and i ≤ E t∗ max Ecom,i ≤ Ecom . Therefore, Bit+1 ≤ θ + E max + g max = V cmax + E max + E max + g max ≤ B max (34) where the second equality is obtained by plugging in the definition of θ, and the last inequality follows the chosen value range of V . On the other hand, because θ̃it ≥ E max , the energy causality constraint is satisfied and we have Bit+1 ≥ 0. t∗ t∗ Case 3: Bit ∈ [0, θ̃it ]. We first investigate Etx,i and Ecom,i . The objective function in the transmission load balancing problem (25a) can be rearranged as ! X XX X X X t t αu,j + B̃it pti,u αu,i = (V ctx,u + B̃it pti,u )atu,i . V ctx,u i∈N u∈Ui j∈Nu u (35) i∈N u∈U If V ctx,u + B̃it pti,u < 0, ∀u, then the optimal transmission load balancing strategy does not require BS i to transmit any traffic for any user, namely atu,i = 0, ∀u. This condition is equivalent to Bit < θ − V ctx,u /pti,u using the definition of B̃it . Further, using the definition of θ̃it , we have Bit < θ̃it < θ − V ctx,u /pti,u . Therefore, BS i does not incur any transmission energy consumption, t∗ namely Etx,i = 0. 20 Similarly, the objective function in the computation load balancing problem (27a) can be rearranged as X i∈N X u∈Ui V ccom,u X t βu,j + B̃it κ(fi )2 j∈Nu X u t αu,i ! = XX t (V ccom,u + B̃it κ(fi )2 )βu,i . (36) i∈N u∈U If V ccom,u + B̃it κ(fi )2 < 0, ∀u, then the optimal computation load balancing strategy does not t require BS i to perform any computation for any user, namely βu,i = 0, ∀u. This condition is equivalent to Bit < θ−V ccom,u /k(fi )2 . Using the definition of θ̃it , we have this condition satisfied. t∗ Therefore, BS i does not incur any computation energy consumption, namely Ecom,i = 0. max Because we have et∗ and git∗ ≤ g max , clearly the energy causality constraint is i ≤ E satisfied, Bit+1 ≥ 0 and Bit+1 ≤ B max . Lemma 2 is of significant importance because it shows that GLOBE not only yields a feasible solution to the relaxed problem P2 but also a feasible solution to the original problem P1 since the energy causality constraint in each time slot is actually satisfied by running GLOBE, provided that the battery capacity is sufficiently large and the algorithm parameters are properly chosen. This result helps us to prove the performance guarantee of the proposed GLOBE algorithm. Next we proceed to show the asymptotic optimality of the GLOBE algorithm, for which we first define the Lyapunov function as follows: 2 1X t 2 1X t (B̃i ) = Bi − θ . Ψt , 2 i∈N 2 i∈N (37) The Lyapunov drift represents the expected change in the Lyapunov function from one time slot to another, which is defined as ∆t = E[Ψt+1 − Ψt |B t ], where the expectation is taken with t respect to the random process associated the system, given the battery state B t = [B1t , ..., BN ]. Assuming for now that the battery capacity is infinite, the battery state dynamics yields Bit+1 − θ = Bit − θ − Eit (αt , β t ) + eti + git , ∀i. (38) Squaring both sides of the above equation, we obtain, (Bit+1 − θ)2 = (Bit − θ)2 + (Eit (αt , β t ) − eti − git )2 − 2(Bit − θ)(Eit (αt , β t ) − eti − git ). (39) max max 2 Notice that the term (Eit (αt , β t ) − eti − git )2 ≤ (Eit (αt , β t ))2 + (eti + git )2 ≤ (Etx + Ecom ) + (E max + g max )2 , 2D/N is upper-bounded by a constant 2D/N. Using this bound and rearranging the above equation, we have (Bit+1 − θ)2 − (Bit − θ)2 ≤ 2D/N − 2(Bit − θ)(Eit (αt , β t ) − eti − git). (40) 21 Using the above inequality and the definition of ∆t , we have X ∆t ≤ D − E[ (Bit − θ)(Eit (αt , β t ) − eti − git )|B t ]. (41) i∈N P Adding the system cost multiplied by V , namely V · E[ i∈N Ci (αt , β t , git)|B t ], to both sides P and denoting ∆tV = ∆t + V E[ i∈N Ci (αt , β t , g t )|B t ], we have  X t t t t t t t t t t V Ci (α , β , gi ) − B̃i (Ei (α , β ) − ei − gi ) |B t ]. (42) ∆V ≤ D + E[ i∈N According to the theory of Lyapunov optimization (drift-plus-penalty method), the control actions are chosen for each time slot t to minimize the bound on the modified Lyapunov drift function ∆tV . Therefore, in each time slot t, we solve the per-time slot optimization problem P3 to obtain load balancing strategies and energy harvesting and purchase strategies as in GLOBE. Theorem 1 provides the theoretical performance guarantee of GLOBE. Theorem 1. For any V , if the battery capacity satisfies B max ≥ V cmax + E max + E max + g max , then the proposed algorithm yields a feasible solution and the achievable time average system cost satisfies where D is a constant. T  1 XX  E Ci (αt , β t , git) ≤ C1∗ + D/V lim T →∞ T t=1 i∈N (43) Proof. Consider the bound on the Lyapunov drift function (42). It is clear that the control actions αt , β t , et , g t by our algorithm minimizes the bound on the Lyapunov function over all possible control actions. Comparing it with the control actions chosen according to the optimal oracle policy that achieves C2∗ , we have X ∆t + V E[ Ci (αt , β t , git)|B t ] i∈N ≤D + E[ X i∈N ≤D + E[ X i∈N =V E[ X i∈N  V Ci (αt , β t , git) − B̃it (Eit (αt , β t ) − eti − git ) |B t ]  Π,t V Ci (αΠ,t , β Π,t , git) − B̃it (Eit (αΠ,t , β Π,t ) − eΠ,t − g ) |B t ] i i Ci (αΠ,t , βΠ,t , giΠ,t )] + D − E[B̃it (Eit (αΠ,t , β Π,t ) − eΠ,t − giΠt )|B t ]. i 22 Plugging in (18) and (19), taking the expectation on both sides and summing from t = 0, ..., T −1, normalizing by T and taking the limit T → ∞, we have T  1 XX  E Ci (αt , βt ) ≤ V C2∗ + D, V lim T →∞ T t=1 i∈N (44) where D < ∞ is a constant. The proof is completed with C2∗ ≤ C1∗ . Theorem 1 proves that GLOBE can achieve the minimum cost achievable by the genieaided offline algorithm within a bounded deviation, without foreseeing the future information. Moreover, it formalizes a critical tradeoff between the battery capacity and the achievable system performance: the achievable system performance improves with the increase of the battery capacity. In particular, the system performance can be made arbitrarily close to optimum if the battery capacity is large enough. This result provides profound guidelines for EH-powered MEC network design and deployment, especially on the battery design. VI. S IMULATION R ESULTS In this section, we evaluate the performance of GLOBE through simulations. We consider N = 5 BSs, who are able to perform computation offloading to only some other BSs. To be specific, we let Mi ∈ N and |Mi | = 3, ∀i. The downlink data traffic arrival at BS i is modeled as a Poisson process with µti ∈ [0, 10] unit/sec. The expected size of each data traffic E[ω] is set as 100 Mbits. The transmitting power of BS i is Ptx,i = 1 W, the noise power spectral density is σ 2 = 0.01 W/Hz, and the bandwidth is W = 20 MHz. The downlink traffic dropping costs are ctx,i = 10, ∀i. The computation task arrival at BS i is modeled as a Poisson process with λti ∈ [0, 10] with the mean task size of 1 M unit. The CPU speed is fi = 2.4 GHz and the expected number of CPU cycles required for each computation task is ρ = 8 × 105 . The computation constraint is dmax = 1 ms. The energy consumption parameter is chosen as κ = 2.5 × 10−22 . The cost of dropping one unit of computation task is ccom,i = 0.01. The harvested energy is modeled as a uniform distribution and satisfies E ∈ [0, 10]. The unit energy price of the alternative grid power ctgrid is modeled as a uniform distribution with mean 1 if not specified. The proposed GLOBE is compared with following three benchmark solutions: • Non-GLB Stochastic Optimization (SO-NG): SO-NG considers the stochasticity in communication traffic, computation task arrivals and energy harvesting (i.e., battery dynamics and energy causality) and aims to minimize the long-term system cost. However, in this 23 case, GLB is not enabled in the network. This problem can be solved online by leveraging the Lyapunov Optimization with Perturbation similar to that in GLOBE. • Myopic Optimization with GLB (MO-G): MO-G optimizes GLB and admission control to minimize the system cost in the current time slot. The decisions are made without concerns of the future energy harvesting and forthcoming communication/computation workload. • Non-GLB Myopic Optimization (MO-NG): MO-NG is the most naive scheme which does not consider the geographical load balancing or the long-term system performance. Each BS simply tries to serve all computation workload and communication traffic given the available energy in the battery and drops whatever cannot be fulfilled. A. Runtime Performance Comparison Fig. 4 compares the runtime performance of GLOBE and three benchmarks. We focus on two metrics: the time-average cost of BSs in Fig. 4(a) and the time-average battery level in Fig. 4(b). It can be observed from Fig. 4(a) that generally GLOBE achieves the lowest longterm system cost compared to the other three benchmarks. Specifically, GLOBE reduces the system cost by nearly 50% compared to MO-NG and nearly 30% compared to the second best scheme, i.e., SO-NG. Moreover, we see that addressing both issues (i.e., loading balancing of communication/computation and stochastic optimization for long-term system performance) provides considerable improvements to the system performance. Comparing the time-average costs of GLOBE and SO-NG (or MO-G and MO-NG), it can be concluded that enabling load balancing of communication traffic and computation workload among BSs helps to reduce the system cost. Comparing the time-average costs of GLOBE and MO-G, we see that a significant system cost reduction can be achieved in the long-run by carefully scheduling the energy consumption, harvesting and purchasing in each time slot. Another important feature of GLOBE is that it ensures the performance with bounded battery levels, thereby enabling practical implement. As can be seen in Fig. 4(b), the time-average battery levels of GLOBE and SO-NG stabilize at a relatively low value by following the online decisions designed by Lyapunov optimization with perturbation. This means that the performance of GLOBE is achievable with a small battery capacity. By contrast, the two myopic benchmarks require a very large battery capacity to implement these schemes. 20 GLOBE SO-NG MO-G MO-NG 18 16 14 12 10 8 6 0 200 400 600 800 1000 Time-average battery level Time-average cost of BSs 24 500 GLOBE SO-NG MO-G MO-NG 400 300 200 100 0 0 200 Time slot t 400 600 800 1000 Time slot t (a) System cost of BSs Fig. 4. Runtime performance comparison of various solutions. (b) Battery level of BSs B. Impact of Control Parameter V Fig. 5 depicts the time-average system cost and time-average battery level achieved by GLOBE with various values of V . It shows that the system cost decreases with the increase in V . This is because a larger V empathizes the cost minimization more in problem P3. However, a lower system cost is achieved at the price of a higher requirement on battery capacity. As shown in Fig. 5(a), the time-average battery level stabilizes at a higher value with a larger V , which means that a larger battery capacity is required to implement the algorithm. Fig. 6 formally presents the trade-off between the system cost and the battery capacity. It clearly shows a [O(1/V ), O(V )] trade-off between the stabilized time-average cost and battery capacity, which is consistent with our analysis in Theorem 1. Moreover, we see that the stabilized Time-average cost 20 V=0.1 V=1 V=5 15 10 5 0 0 200 400 600 800 1000 Time-average battery level battery level of BSs closely follows the designed perturbation parameter θ. 200 V=0.1 V=1 V=5 150 100 50 0 Time slot t (a) Impact on system cost 0 200 400 600 800 1000 Time slot t (b) Impact on battery level Fig. 5. Impact of control parameter V to the performance of GLOBE. C. Impact of Grid Power We also evaluate the impact of grid power on the algorithm performance. Fig. 7 reports the performance of GLOBE with or without grid power. Moreover, we vary the expected market energy price to evaluate the role of energy price in GLOBE. We see from Fig. 7(a) that the 25 500 Time-average cost Perturbation parameter Battert level 10 450 400 8 350 300 6 250 4 200 150 2 0 Battery states of BSs Time-average cost of BSs 12 100 0 5 10 15 50 20 Control parameter V Fig. 6. Trade-off between system cost and battery capacity. system cost is reduced with the supplement of grid power. This is due to the fact that the cost of purchasing grid power is usually lower than that of dropping communication/computation workloads, and hence the grid power can be used as a supplementary energy source when the energy harvesting is not sufficient. In the worst case, if the market energy purchasing costs more than the workload dropping, then GLOBE will simply choose not to purchase. Fig. 7(a) further indicates that the system cost is reduced along with the decrease in the market energy price since less fee is charged for the required grid power. Fig. 7(b) depicts the time-average battery levels of these four cases. It is observed that the time-average battery levels of cases with grid power stabilize around the same value, i.e., the perturbation parameter. This is due to the fact that the design of perturbation parameter is independent of the marker energy price (as shown in Lemma 2). For the case with no grid power, the stabilized battery level is slightly lower. This is because the BSs cannot maintain the desired battery level for future use without the grid power, since the energy harvesting may be Time average cost 30 With grid power (c grid=0.1) With grid power (c grid=1) With grid power (c grid=2) 20 No grid power 10 0 0 200 400 600 800 1000 Time slot t (a) Impact on system cost Fig. 7. Impact of grid power to the performance of GLOBE. Time average battery level insufficient at times. 150 With grid power (c grid=0.1) With grid power (c grid=1) With grid power (c grid=2) 100 No grid power 50 0 0 200 400 600 800 Time slot t (b) Impact on battery level 1000 26 D. Impact of Computation Workload Intensity Fig. 8 depicts the time-average system costs with different levels of computation workload intensity. In general, the system cost grows with the increase in computation workload since larger computation workload incurs higher delay cost and energy consumption. We also see that if the computation workload intensity becomes too low or too high, the system cost achieved by GLOBE is almost the same as that achieved by SO-NG. This is reasonable because if the computation workload is extremely low at every BS, then the BSs can process the workload locally with their own resources, while incurring low delay cost and energy consumption. Hence, there is no need for load balancing. On the other hand, if the computation workload intensity is too high, every BS has already been overloaded, therefore, there is little benefit from loading balancing among BSs. A large system cost reduction is achieved when computation workload intensity is at the similar level of the system computation capacity. In this case, there are both many overloaded BSs and underloaded BSs in the system, and hence the geographical load balancing can better help to reduce the system cost. Time-average cost of BSs 35 30 GLOBE SO-NG 25 20 15 10 5 0 500 1000 1500 2000 2500 3000 Expected computation workload intensity Fig. 8. Impact of computation workload intensity to the performance of GLOBE and SO-NG. E. Before versus After GLB Fig. 9 shows the distribution of computation workload and communication traffic before and after applying GLB in one particular time slot. It is worth noticing that the GLOBE does not simply balance the workload evenly among BSs. Instead, GLOBE distributes the workload based on the battery states of BSs. As can be seen in Fig. 9, BSs with higher battery level (e.g. BS 1 and BS 5) tend to serve more workload and traffic, which helps BSs with low battery level to avoid battery depletion by conservatively serving less workload, thereby reducing the probability of purchasing energy from the power grid and decreasing the system cost. 80 70 60 50 BS 1 BS 2 BS 3 BS 4 BS index BS 5 12 80 Before GLB After GLB Battery states 10 70 8 60 6 4 50 2 40 0 (a) GLB for computation workload BS 1 BS 2 BS 3 BS 4 BS index Battery states of BSs Before GLB After GLB Battery states Communication traffic 10000 9000 8000 7000 6000 5000 4000 3000 2000 1000 0 Battery states of BSs Computation workload 27 40 BS 5 (b) GLB for communication traffic Fig. 9. Workload distribution before and after GLB. F. Convergence of Distributed Algorithm Fig. 10 depicts the achieved objective values by substituting the solutions derived by the distributed algorithm into the objective functions of primal LP in (27a) and regularized QP in (28a). There are several observations worth pointing out. First, It can be seen from Fig. 10(a) that the proposed distributed algorithm ensures the convergence to the optimal solution of the regularized QP and the optimal objective value of regularized QP is 329.60 in this particular case. Second, Fig. 10(b) shows that the optimal solution to the regularized QP is exactly the optimal solution to the primal LP since this solution also achieves the optimal objective value 500 400 300 200 Optimal value of regularized QP 100 0 100 200 300 Objective function value Objective function value (i.e., 331.06) of the primal LP problem. 400 iteration k (a) Convergence of QP during iteration 500 400 300 200 Optimal value of primal LP 100 0 100 200 300 400 iteration k (b) Convergence of LP during iteration Fig. 10. Convergence and optimality of the distributed algorithm. Note that the distributed algorithm may not always obtain the optimal solution to the original LP problem. However, even when it converges to a suboptimal solution, the gap between the converged suboptimal value and the optimal value is very small. Among all 1,000 time slots in our simulation, we only observed 3 time slots that have an error percentage larger than 0.5% and the maximum error percentage is 3%, which can be reasonably neglected. 28 Fig. 11 compares the performances of distributed and the centralized algorithms. We see that the performance achieved by the distributed algorithm is almost identical to that achieved by the centralized algorithm. This further validates that the proposed GLOBE algorithm can be effectively implemented in a distributed manner at each BS without sacrificing the performance. 500 Time average cost (distributed solution) Time average cost (centralized solution) Battery state (distributed solution) Battery state (centralized solution) 10 400 8 300 6 200 4 Battery states of BSs Time-average cost of BSs 12 100 2 0 5 10 15 20 Control parameter V Fig. 11. Performance comparison between distributed and centralized algorithms. VII. C ONCLUSION In this paper, we have proposed an online algorithm to perform geographical load balancing in EH-powered MEC networks. We demonstrated that a fundamentally new design that simultaneously manages the limited energy, computing and radio access resources in both spatial and temporal domains is key to fully reaping the benefits of EH-power MEC. The proposed GLOBE algorithm operates online without the need to acquiring future system information. Moreover, GLOBE can be implemented in a distributed manner, where BSs solve local optimization problems with very limited information exchange. Our algorithm is simple and easy to implement in practical deployment scenarios, yet provides provable performance guarantee. Comprehensive numerical simulations have been carried out to validate the theoretical analysis and illustrate the performance improvement over other benchmark solutions. R EFERENCES [1] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,” IEEE Internet Things J., vol. 3, no. 5, pp. 637–646, 2016. [2] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge computing: The communication perspective,” IEEE Commun. Surveys Tuts., 2017. [3] M. Patel et al., “Mobile-edge computing introductory technical white paper,” White Paper, Mobile-edge Computing (MEC) industry initiative, 2014. 29 [4] M. Chiang and T. Zhang, “Fog and IoT: An overview of research opportunities,” IEEE Internet Things J., vol. 3, no. 6, pp. 854–864, 2016. [5] S. Ulukus, A. Yener, E. Erkip, O. Simeone, M. Zorzi, P. Grover, and K. Huang, “Energy harvesting wireless communications: A review of recent advances,” IEEE J. Select. Areas Commun., vol. 33, no. 3, pp. 360–381, 2015. [6] M. Lin, Z. Liu, A. Wierman, and L. L. Andrew, “Online algorithms for geographical load balancing,” in 2012 International Green Computing Conference (IGCC). IEEE, 2012, pp. 1–10. [7] M. Islam, S. Ren, G. Quan, M. Shakir, and A. Vasilakos, “Water-constrained geographic load balancing in data centers,” IEEE Trans. Cloud Comput., vol. 5, no. 2, pp. 208–220, 2015. [8] P. Mach and Z. Becvar, “Mobile edge computing: A survey on architecture and computation offloading,” IEEE Commun. Surveys Tuts., 2017. [9] L. Tong, Y. Li, and W. Gao, “A hierarchical edge cloud architecture for mobile computing,” in IEEE INFOCOM 2016. IEEE, 2016, pp. 1–9. [10] J. Xu, L. Chen, and S. Ren, “Online learning for offloading and autoscaling in energy harvesting mobile edge computing,” IEEE Trans. Cogn. Commun. Netw., vol. 3, no. 3, pp. 361–373, Sept 2017. [11] L. Chen and J. Xu, “Socially trusted collaborative edge computing in ultra dense networks,” in The 2nd ACM/IEEE Symposium on Edge Computing. ACM/IEEE, 2017, pp. 1–11. [12] J. Oueis, E. C. Strinati, and S. Barbarossa, “The fog balancing: Load distribution for small cell cloud computing,” in IEEE 81st Vehicular Technology Conference (VTC Spring), May 2015, pp. 1–6. [13] Y. Xiao and M. Krunz, “QoE and power efficiency tradeoff for fog computing networks with fog node cooperation,” in IEEE INFOCOM 2017. IEEE, 2017, pp. 1–9. [14] A. Abdelnasser, E. Hossain, and D. I. Kim, “Clustering and resource allocation for dense Femtocells in a two-tier cellular OFDMA network,” IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1628–1641, March 2014. [15] J. Rubio, A. Pascual-Iserte, J. del Olmo, and J. Vidal, “User association for load balancing in heterogeneous networks powered with energy harvesting sources,” in 2014 IEEE Globecom Workshops (GC Wkshps), Dec 2014, pp. 1248–1253. [16] H. H. M. Tam, H. D. Tuan, D. T. Ngo, T. Q. Duong, and H. V. Poor, “Joint load balancing and interference management for small-cell heterogeneous networks with limited backhaul capacity,” IEEE Trans. Wireless Commun., vol. 16, no. 2, pp. 872–884, Feb 2017. [17] J. Oueis, E. C. Strinati, S. Sardellitti, and S. Barbarossa, “Small cell clustering for efficient distributed fog computing: A multi-user case,” in IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), Sept 2015, pp. 1–5. [18] S. Tanzil, O. Gharehshiran, and V. Krishnamurthy, “A distributed coalition game approach to Femto-Cloud formation,” IEEE Trans. Cloud Comput., 2016. [19] S. Guruacharya, D. Niyato, M. Bennis, and D. I. Kim, “Dynamic coalition formation for network MIMO in small cell networks,” IEEE Trans. Wireless Commun., vol. 12, no. 10, pp. 5360–5372, October 2013. [20] J. Gong, S. Zhou, and Z. Zhou, “Networked mimo with fractional joint transmission in energy harvesting systems,” IEEE Transactions on Communications, vol. 64, no. 8, pp. 3323–3336, 2016. [21] H. Xu, C. Feng, and B. Li, “Temperature aware workload managementin geo-distributed data centers,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1743–1753, 2015. [22] J. Luo, L. Rao, and X. Liu, “Spatio-temporal load balancing for energy cost optimization in distributed internet data centers,” IEEE Trans. Cloud Comput., vol. 3, no. 3, pp. 387–397, July 2015. [23] Z. Liu, M. Lin, A. Wierman, S. Low, and L. L. Andrew, “Greening geographical load balancing,” IEEE/ACM Trans. Networking, vol. 23, no. 2, pp. 657–671, 2015. 30 [24] M. J. Neely and L. Huang, “Dynamic product assembly and inventory control for maximum profit,” in The 49th IEEE Conference on Decision and Control (CDC). IEEE, 2010, pp. 2805–2812. [25] G. Auer et al., “How much energy is needed to run a wireless network?” IEEE Wireless Commun., vol. 18, no. 5, pp. 40–49, October 2011. [26] D. Lee, H. Seo, B. Clerckx, E. Hardouin, D. Mazzarese, S. Nagata, and K. Sayana, “Coordinated multipoint transmission and reception in LTE-advanced: deployment scenarios and operational challenges,” IEEE Commun. Mag., vol. 50, no. 2, pp. 148–155, February 2012. [27] S. Lakshminarayana, T. Q. Quek, and H. V. Poor, “Cooperation and storage tradeoffs in power grids with renewable energy resources,” IEEE J. Select. Areas Commun., vol. 32, no. 7, pp. 1386–1397, 2014. [28] Y. Mao, J. Zhang, and K. B. Letaief, “A Lyapunov optimization approach for green cellular networks with hybrid energy supplies,” IEEE J. Select. Areas Commun., vol. 33, no. 12, pp. 2463–2477, 2015. [29] M. J. Neely, “Stochastic network optimization with application to communication and queueing systems,” Synthesis Lectures on Communication Networks, vol. 3, no. 1, pp. 1–211, 2010. [30] R. Urgaonkar, B. Urgaonkar, M. J. Neely, and A. Sivasubramaniam, “Optimal power cost management using stored energy in data centers,” in Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems. ACM, 2011, pp. 221–232. [31] K. Yuan, Q. Ling, W. Yin, and A. Ribeiro, “A linearized Bregman algorithm for decentralized basis pursuit,” in Proceedings of the 21st European Signal Processing Conference (EUSIPCO). IEEE, 2013, pp. 1–5. [32] M. P. Friedlander and P. Tseng, “Exact regularization of convex programs,” SIAM Journal on Optimization, vol. 18, no. 4, pp. 1326–1350, 2007.
7cs.IT
Effective Classification of MicroRNA Precursors Using Combinatorial Feature Mining and AdaBoost Algorithms Ling Zhong and Jason T. L. Wang Bioinformatics Program and Department of Computer Science, New Jersey Institute of Technology, Newark, New Jersey 07102, USA Abstract MicroRNAs (miRNAs) are non-coding RNAs with approximately 22 nucleotides (nt) that are derived from precursor molecules. These precursor molecules or pre-miRNAs often fold into stem-loop hairpin structures. However, a large number of sequences with premiRNA-like hairpins can be found in genomes. It is a challenge to distinguish the real pre-miRNAs from other hairpin sequences with similar stem-loops (referred to as pseudo pre-miRNAs). Several computational methods have been developed to tackle this challenge. In this paper we propose a new method, called MirID, for identifying and classifying microRNA precursors. We collect 74 features from the sequences and secondary structures of pre-miRNAs; some of these features are taken from our previous studies on non-coding RNA prediction while others were suggested in the literature. We develop a combinatorial feature mining algorithm to identify suitable feature sets. These feature sets are then used to train support vector machines to obtain classification models, based on which classifier ensemble is constructed. Finally we use an AdaBoost algorithm to further enhance the accuracy of the classifier ensemble. Experimental results on a variety of species demonstrate the good performance of the proposed method, and its superiority over existing tools. 1 Introduction MicroRNAs (miRNAs) are non-coding RNAs (ncRNAs) of approximately 22 nucleotides that are known to regulate post-transcriptional expression of protein-coding genes (Bartel, 2004; Bindra et al., 2010). Lee et al. (1993) first reported that in C. elegans, lin-4 regulates the translation of lin-14 mRNA via an antisense RNA-RNA interaction. Since then, many roles of miRNAs have been discovered, including for example the control of left/right neuronal asymmetry in C. elegans (Johnston and Hobert, 2003), cell proliferation in Drosophila (Brennecke et al., 2003), and the regulation of flowering time in plants (Aukerman and Sakai, 2003). Their role in cancer development has also been reported (Mack, 2007). However, these roles are only a small portion of total miRNA functions (Bushati and Cohen, 2007). As a consequence, exploring miRNAs and their functions continues to be a highly active area of research. MiRNAs are derived from pre-miRNAs that often fold into stem-loop hairpin structures. These characteristic stem-loop structures are highly conserved in different species (Lai et al., 2003). One challenging research problem is to distinguish premiRNAs from other sequences with similar stem-loop structures (referred to as pseudo pre-miRNAs). Many computational methods have been developed to tackle this challenge. A common approach is to transform the classification of real and pseudo premiRNAs to a feature selection problem. Lim et al. (2003) reported some characteristic features in phylogenetically conserved stem loop pre-miRNAs. Lai et al. (2003) considered hairpin structures predicted by mfold (Zuker, 2003) as well as the nucleotide divergence of pre-miRNAs. Xue et al. (2005) decomposed stem-loop hairpin structures into local structure-sequence 2 features, and used these features in combination with a support vector machine to classify pre-miRNAs. Bentwich et al. (2005) proposed a scoring function for pre-miRNAs with thermodynamic stability and certain structural features, which capture the global properties of the hairpin structures in the pre-miRNAs. Ng and Mishra (2007) employed a Gaussian radial basis function kernel as a similarity measure for 29 global and intrinsic hairpin folding attributes, and characterized pre-miRNAs based on their dinucleotide subsequences, hairpin folding, non-linear statistical thermodynamics and topology. Huang et al. (2007) evaluated features valuable for pre-miRNA classification, such as the local secondary structure differences of the stem regions of real pre-miRNA and pseudo pre-miRNA hairpins, and established correlations between different types of mutations and the secondary structures of real pre-miRNAs. More recently, Zhao et al. (2010) considered structure-sequence features and minimum free energy of RNA secondary structure, along with the double helix structure with free nucleotides and base-pairing features. In general, the quality of selected features directly affects the classification accuracy achieved by a method. In this paper, we present a novel combinatorial feature mining method for premiRNA classification. Our method, named MirID, identifies and classifies an input RNA sequence as a pre-miRNA or not. MirID considers different combinations of features extracted from pre-miRNAs. For each combination (or each set of features), we create a support vector machine (SVM) model (Cortes and Vapnik, 1995; Fan et al., 2005) based on that feature set. SVM models whose accuracies are above a user-determined threshold are then used to build a classifier ensemble. This classifier ensemble will be refined through several iterations until its accuracy cannot be enhanced further. We next 3 construct new feature sets based on the best feature sets obtained so far by performing pairwise merge and split operations on the best feature sets. Then we repeat the above procedure iteratively by building a SVM model based on each new feature set, constructing a classifier ensemble from the SVM models whose accuracies are above the newly computed threshold, and refining the ensemble until it can not be improved further. Finally we output the best classifier ensemble obtained through this iterative procedure. To further enhance the accuracy of the classifier ensemble, we apply a boosting algorithm to the ensemble to obtain a strong classifier, which is used for pre-miRNA classification. Materials and Methods Datasets We collected real pre-miRNAs and pseudo pre-miRNAs from twenty one species, some of which were studied previously while others have not been explored. These RNA sequences were evenly divided into training data and test data. Table 1 presents a summary of the data. The first column of Table 1 shows a species or organism name. The second column of Table 1 shows the number of training sequences followed by the number of test sequences with respect to the organism’s real pre-miRNAs. The third column of Table 1 shows the number of training sequences followed by the number of test sequences with respect to the organism’s pseudo pre-miRNAs. As an example, referring to Arabidopsis thaliana in Table 1, its training set contains 66 real pre-miRNAs and 923 pseudo pre-miRNAs; its test set contains 67 real pre-miRNAs and 924 pseudo pre-miRNAs. 4 The real pre-miRNAs were downloaded from miRBase available at http://www.mirbase.org/ (Kozomara and Griffiths-Jones, 2011). We used RNAfold (Hofacker, 2003) to predict the secondary structures of all the RNA sequences. The lengths of the real pre-miRNAs in the final dataset ranged from 60 to 120 nt. The pseudo pre-miRNAs used in this study were collected from GenBank (http://www.ncbi.nlm.nih.gov/genbank/). As in (Xue et al., 2005), we searched for the protein-coding regions of the genome sequences of the twenty one species in Table 1, and divided the regions into short sequences. The lengths of these short sequences were randomly generated, ranging from 60 to 120 nt. The pseudo pre-miRNAs were chosen from these short sequences. The criteria used in choosing the pseudo pre-miRNAs are: (i) they have a stem-loop hairpin structure, (ii) they contain at least 18 base pairs, including Watson-Crick and wobble base pairs, on the stem region of the stem-loop structure, and (iii) their secondary structure has a maximum of -15 kcal/mol free energy without multiple hairpin loops (Kozomara and Griffiths-Jones, 2011). These criteria ensure that the secondary structures of the pseudo pre-miRNAs are similar to those of the real premiRNAs. Feature pool In designing our pre-miRNA classification method, we examined multiple features extracted from a pre-miRNA sequence and its secondary structure. Some of these features were taken from our previous studies on ncRNA prediction (Griesmer et al., 2011; Wang and Wu, 2006) while others were suggested in the literature (Sewer et al., 2005; Xue et al., 2005; Zheng et al., 2006). These features included the sequence length, 5 the number of base pairs, GC content, the number of nucleotides contained in the hairpin loop (i.e., the loop size), the free energy of the sequence’s secondary structure obtained from RNAfold (Hofacker, 2003), the number of bulge loops, and the size of the largest bulge loop in the secondary structure. In addition, we considered the features described in (Zheng et al., 2006). These features included the difference of the lengths of the two tails in the secondary structure where a tail represented the strand of unpaired bases in the 5’ or 3’ end of the structure, the number of tails, and the length of the larger tail. Besides, several combined features were considered. They included the ratio between the number of base pairs and the sequence length, the length difference of two tails plus the larger tail length, the size of the hairpin loop plus the larger tail length, the size of the hairpin loop plus the largest bulge size, the ratio between the larger tail length and the sequence length, the ratio between the size of the hairpin loop and the sequence length, the ratio between the largest bulge size and the sequence length, the ratio between the largest bulge size and the number of base pairs, the normalized free energy (Spirollari et al., 2009), which is the minimum free energy of the sequence’s secondary structure divided by the sequence length, and the ratio between the normalized free energy and the GC content. The next set of features included the triplets of structure-sequence elements described in (Xue et al., 2005). Here we used the dot-bracket notation (Hofacker, 2003) to represent an RNA secondary structure. Figure 1 shows the sequence and structure of a hypothetical pre-miRNA and its dot-bracket notation. A triplet is composed of three contiguous structure elements (bases or base pairs) (Liu et al., 2005) that correspond to three contiguous nucleotides along with the middle nucleotide. For example, consider the 6 first three dots (bases) and their corresponding nucleotides AAA in Figure 1. The middle nucleotide is A. Thus, the structure-sequence elements “A...” constitute a triplet. As another example, consider the first three brackets (base pairs) and their corresponding nucleotides UUG in Figure 1. The middle nucleotide is U. Thus, the structure-sequence elements “U(((” constitute a triplet. There are 32 triplets, and hence 32 such features in total. Finally we considered the symmetric and asymmetric loops defined in (Sewer et al., 2005). We refer to the portion of the sequence from the 5’ end to the hairpin loop as the left arm, and the portion of the sequence from the hairpin loop to the 3’ end as the right arm. In a symmetric (internal) loop, the number of nucleotides in the left arm equals the number of nucleotides in the right arm. In an asymmetric (internal) loop, the number of nucleotides in the left arm is different from the number of nucleotides in the right arm. Features related to these loops included the size of each loop, the average size of the loops, and the average distance between the loops. Other features included the proportion of A/C/G/U in the stem, and the proportion of A-U/C-G/G-U base pairs in the stem. Totally, there are 74 features in the feature pool. Combinatorial feature mining MirID adopts a novel feature mining algorithm for pre-miRNA classification. Initially the algorithm randomly generates N feature sets from the feature pool. (The default value of N used in this study is 100.) Each feature set contains between 1 and 150 features, randomly chosen with replacement from the feature pool. Some features may repeatedly occur in a feature set; thus a bagging approach is used here (Breiman, 1996). 7 Duplicate features have more weights than the other features in the feature set. The numbers 1 and 150 are chosen, to ensure that there are enough feature sets containing duplicate features. We then build a SVM model based on each feature set using training sequences, and apply the classification model to test sequences to calculate the accuracy of the model. The SVM used in this study is the LIBSVM package downloaded from http://www.csie.ntu.edu.tw/~cjlin/libsvm/ (Fan et al., 2005). We use the polynomial kernel provided in the LIBSVM package. The polynomial kernel achieves the best performance among all kernel functions included in the package. Then, we remove the SVM models whose accuracies are less than a userdetermined threshold t. (The default value of t used in this study is 0.8.) The feature sets used to build those removed SVM models are also eliminated from further consideration. We construct a classifier ensemble from the remaining SVM models. The ensemble works by taking the majority vote from the individual SVM models used to build the classifier ensemble. This ensemble will be refined through several iterations until its accuracy cannot be enhanced further. In each iteration, the user-determined threshold t is incremented by a step value, so that more accurate SVM models are used to construct a (hopefully) better classifier ensemble in the next iteration. (The default value of step used in this study is 0.005.) It is likely that different combinations of remaining features may yield an even better classifier. Our algorithm then performs pairwise merge and split operations on the set Sb of feature sets used to build the best classifier ensemble obtained so far. In doing so, MirID takes four steps: (1) picks each pair of feature sets s1 and s2 in Sb; (2) merges s1 and s2 into a single feature set s3 with, say p, features; (3) randomly generates a number q, 8 q < p; (4) randomly assigns q features in s3 into a set s’1 and assigns the remaining p - q features into another set s’2. Thus, these four steps take two feature sets s1 and s2 in Sb as input and produce two new feature sets s’1 and s’2 as output. Figure 2 illustrates how the merge and split operations work on two feature sets. These pairwise merge and split operations are applied to the feature sets used to build the best classifier ensemble obtained so far, to generate new feature sets. The new feature sets are then used to build new SVM models. Accurate new SVM models, whose accuracies are greater than or equal to the newly computed threshold t, are then used to build a new classifier ensemble. This procedure is repeated several times to obtain a best classifier ensemble. Figure 3 summarizes our feature mining algorithm, whose output is the best classifier ensemble along with the component SVM models (feature sets) used to build the ensemble. Notice that in the feature mining algorithm in Figure 3, it is possible that, after removing SVM models/feature sets with accuracy < t, there is no remaining feature set, and hence Sr becomes empty. Under this circumstance, the classifier ensemble constructed based on Sr is empty, and the accuracy of the classifier ensemble is 0. Boosting The performance of a classification algorithm can be further enhanced through boosting. We apply AdaBoost (Bindewald and Shapiro, 2006; Freund and Schapire, 1997; Schapire, 1999) to the classifier ensemble produced by our feature mining algorithm. Specifically, we treat the classifier ensemble as a weak classifier and continue refining it into a strong classifier through an iterative procedure. Let X be a set of sequences x1, x2, . . . , xm where xi, 1 ≤ i ≤ m, is associated with a label yi such that 9  yi     1 if xi is a real pre - miRNA  1 if xi is a pseudo pre - miRNA The AdaBoost algorithm works with K iterations. (The default value of K used in this study is 20.) In iteration k, 1 ≤ k ≤ K, the algorithm updates a weight function Wk as explained below, which will be used in selecting training sequences in iteration k + 1. Initially, every sequence has an equal weight, i.e. W0(xi) = 1/m, 1 ≤ i ≤ m. In iteration k, the algorithm samples 1/3 sequences with replacement from X based on the weight function Wk-1 to form a training set Xk. The set Xk is then used to train a weak classifier Hk, which classifies each sequence xi as either a real pre-miRNA or a pseudo pre-miRNA. That is,  H k  xi      1 H k classifies xi as a real pre - miRNA  1 H k classifies xi as a pseudo pre - miRNA Let Ek = {xi|Hk(xi) ≠ yi}. The error rate εk of Hk is: k  W  x  xiEk k 1 (1) i Let 1 1  k  k  ln 2  k    (2) The algorithm updates Wk for each sequence xi, 1 ≤ i ≤ m, as follows:  Wk 1 ( xi ) k e  Zk Wk  xi    W (x )  k 1 i  ek  Zk  if H k ( xi )  yi if H k ( xi )  yi Wk 1 ( xi )exp  k y i H k  xi  Zk (3) 10 where Zk is a normalization factor chosen such that Wk is normally distributed. Thus, the sequences causing classification errors in iteration k will have a greater probability of being selected as training sequences for constructing the weak classifier Hk+1 in iteration k+1. Using this technique, each weak classifier should have greater accuracy than its predecessor. The final, strong classifier H combines the vote of each individual weak classifier Hk, 1 ≤ k ≤ K, where the weight of each weak classifier’s vote is a function of its accuracy. Specifically, for an unlabeled test sequence x, H(x) is calculated as follows:  K  H  x   sign   k H k x   k 1  (4) The function sign indicates that if the sum inside the parentheses is greater than or equal to zero, then H classifies x as positive (i.e. a real pre-miRNA); otherwise H classifies x as negative (i.e. a pseudo pre-miRNA). Results Performance analysis of the MirID method We carried out a series of experiments to evaluate the proposed MirID method. All the experiments were performed on a 2 GHz Pentium 4 PC having a memory of 2G bytes. The operating system was Cygwin on Windows XP and the algorithms were implemented in Perl. To understand the effect of boosting, we also considered using the combinatorial feature mining algorithm alone to classify pre-miRNAs, and referred to it as the CFM method. The performance measure used here is accuracy, defined as follows. A method is said to classify a test sequence correctly if the sequence is a real pre-miRNA (pseudo pre-miRNA, respectively) and the method indicates that the sequence is indeed a real pre-miRNA (pseudo pre-miRNA, respectively). A method is said to classify a test 11 sequence incorrectly if the sequence is a real pre-miRNA (pseudo pre-miRNA, respectively) but the method mistakenly indicates that the sequence is a pseudo premiRNA (real pre-miRNA, respectively). For each species, the accuracy of a method is defined as the number of correctly classified test sequences of that species divided by the total number of test sequences of that species. We first evaluated how the number of initial feature sets, N, affects the performance of CFM and MirID. As N increases, more feature sets are generated initially. This allows the feature mining algorithm to construct a classifier ensemble using more diverse feature sets, and hence the accuracy of the classifier ensemble increases. On the other hand, as N increases, the inner loop in Figure 3 is run more times; as a consequence, the running time increases. MirID requires more time than CFM, due to the extra time spent in boosting. MirID in general is more accurate than CFM, indicating the benefit of including the boosting algorithm. We next evaluated how the threshold, t, used in the feature mining algorithm affects the performance of CFM and MirID. When t is very large (e.g. t > 0.95), the accuracies of the methods drop sharply. This happens because the accuracies of most SVM models are less than 0.95, and hence these SVM models are eliminated from further consideration early in the feature mining algorithm, cf. Figure 3. When t approaches 1, it is likely that the set Sb returned by the feature mining algorithm is an empty set, and therefore the classifier ensemble constructed based on Sb is also empty, yielding an accuracy of 0. As t increases, fewer feature sets qualify and the set Sr is smaller. As a result, the inner loop in Figure 3 is executed fewer times, and hence the running time decreases. 12 Then we evaluated how the value, step, used to increment the threshold t in each iteration of the inner loop in Figure 3 affects the performance of CFM and MirID. With the default values of N and t used in this study, the feature mining algorithm is able to produce a classifier ensemble with high accuracy. The value of step has little impact on the accuracies of the proposed methods. However, as step increases, fewer iterations of the inner loop in Figure 3 are executed, and as a consequence, the running time decreases. We also conducted experiments to test different numbers of iterations, K, in the boosting algorithm. It was found that when K is sufficiently large (e.g. K ≥ 20), the behavior of the boosting algorithm becomes stable, with the accuracy approaching 1. On the other hand, when K is large, more running time will be needed. Finally we compared CFM and MirID with two closely related methods, PMirP (Zhao et al., 2010) and TripletSVM (Xue et al., 2005). Like our methods, both PMirP and TripletSVM were implemented using support vector machines. PMirP adopted a hybrid coding scheme, combining features such as free bases, base pairs, minimum free energy of secondary structure, among others. TripletSVM used triplets of structure-sequence elements, which also were included in our feature pool. Table 2 shows the accuracies of the four methods on twelve species taken from Table 1. These twelve species were used to pre-train PMirP and TripletSVM, and available from the tools. For each species, the highest accuracy yielded by a tool is in bold. It can be seen from Table 2 that MirID is better than or as good as the existing tools on all the species except Gallus gallus and Oryza sativa. For Gallus gallus and Oryza sativa, PMirP achieves higher accuracies. 13 Software Tool We have implemented MirID using Perl into a software tool, available from the authors upon request. The software tool accepts a test sequence as input and classifies the test sequence as a pre-miRNA or not. We pre-train our software tool using the training sequences given in Table 1. In addition to the twelve species available from the PMirP and TripletSVM web servers (Xue et al., 2005; Zhao et al., 2010), we pre-train our software tool using nine additional species (shown in Table 1 but not in Table 2). Our tool achieves high accuracies on these nine species, as shown in Table 3. (The PMirP and TripletSVM web servers were not pre-trained on these nine species, and hence we only show the results for CFM and MirID here.) MirID is more accurate than CFM, due to the boosting algorithm. Table 4 shows, for each species in Table 1, the number of feature sets produced by our feature mining algorithm. Table 5 shows the CPU time (in seconds) spent in pretraining the MirID tool. The training time depends on the number of feature sets, the number of features in each feature set, the number of iterations used by the feature mining algorithm, and the number of iterations used in the boosting algorithm. Notice that this training is done once, and no more training is needed on the test data. It takes less than a second to classify an unlabeled test sequence. Conclusions In this paper we present a new method (MirID) for pre-miRNA classification. Empirical results showed that MirID outperforms two closely related methods, PMirP and TripletSVM, on the majority of species tested in the experiments. Since all the three 14 methods were implemented using support vector machines with similar features, we conclude that the superiority of our method is due to its feature mining and boosting algorithms. In the future, we plan to extend these algorithms for classifying and predicting other RNA structures; see, e.g. (Laing et al., 2012). 15 References Aukerman, N.J., and Sakai, H. (2003). Regulation of flowering time and floral organ identity by a microRNA and its APETALA2-like target genes. Plant Cell 15, 2730-2741. Bartel, D.P. (2004). MicroRNAs: genomics, biogenesis, mechanism, and function. Cell 116, 281-297. Bentwich, I., Avniel, A., Karov, Y., et al. (2005). Identification of hundreds of conserved and nonconserved human microRNAs. Nat Genet 37, 766-770. Bindewald, E., and Shapiro, B.A. (2006). RNA secondary structure prediction from sequence alignments using a network of k-nearest neighbor classifiers. RNA 12, 342-352. Bindra, R.S., Wang, J.T.L., and Bagga, P.S. (2010). Bioinformatics methods for studying microRNA and ARE-mediated regulation of post-transcriptional gene expression. International Journal of Knowledge Discovery in Bioinformatics 1, 97-112. Breiman, L. (1996). Bagging predictors. Machine Learning 24, 123-140. Brennecke, J., Hipfner, D.R., Stark, A., Russell, R.B., and Cohen, S.M. (2003). bantam encodes a developmentally regulated microRNA that controls cell proliferation and regulates the proapoptotic gene hid in Drosophila. Cell 113, 25-36. Bushati, N., and Cohen, S.M. (2007). MicroRNA functions. Annu Rev Cell Dev Biol 23, 175-205. Cortes, C., and Vapnik, V. (1995). Support-vector networks. Machine Learning 20, 273297. Fan, R., Chen, P., and Lin, C. (2005). Working set selection using the second order information for training SVM. Journal of Machine Learning Research 6, 1889-1918. Freund, Y., and Schapire, R.E. (1997) A decision-theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences 55, 119-139. Griesmer, S.J., Cervantes-Cervantes, M., Song, Y., and Wang, J.T.L. (2011). In silico prediction of noncoding RNAs using supervised learning and feature ranking methods. International Journal of Bioinformatics Research and Applications 7, 355-375. Hofacker, I.L. (2003). Vienna RNA secondary structure server. Nucleic Acids Res 31, 3429-3431. 16 Huang, T.H., Fan, B., Rothschild, M.F., Hu, Z.L., Li, K., and Zhao, S.H. (2007). MiRFinder: an improved approach and software implementation for genome-wide fast microRNA precursor scans. BMC Bioinformatics 8, 341. Johnston, R.J., and Hobert, O. (2003). A microRNA controlling left/right neuronal asymmetry in Caenorhabditis elegans. Nature 426, 845-849. Kozomara, A., and Griffiths-Jones, S. (2011). miRBase: integrating microRNA annotation and deep sequencing data. Nucleic Acids Res 39, D152-D157. Lai, E.C., Tomancak, P., Williams, R.W., and Rubin, G.M. (2003). Computational identification of Drosophila microRNA genes. Genome Biol 4, R42. Laing, C., Wen, D., Wang, J.T.L., and Schlick, T. (2012). Predicting coaxial helical stacking in RNA junctions. Nucleic Acids Res 40, 487-498. Lee, R.C., Feinbaum, R.L., and Ambros, V. (1993). The C. elegans heterochronic gene lin-4 encodes small RNAs with antisense complementarity to lin-14. Cell 75, 843-854. Lim, L.P., Glasner, M.E., Yekta, S., Burge, C.B., and Bartel, D.P. (2003). Vertebrate microRNA genes. Science 299, 1540. Liu, J., Wang, J.T.L., Hu, J., and Tian, B. (2005). A method for aligning RNA secondary structures and its application to RNA motif detection. BMC Bioinformatics 6, 89. Mack, G.S. (2007). MicroRNA gets down to business. Nat Biotechnol 25, 631-638. Ng, K.L., and Mishra, S.K. (2007). De novo SVM classification of precursor microRNAs from genomic pseudo hairpins using global and intrinsic folding measures. Bioinformatics 23, 1321-1330. Schapire, R.E. (1999). A brief introduction to boosting. In Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, 1401-1406. Sewer, A., Paul, N., Landgraf, P., et al. (2005). Identification of clustered microRNAs using an ab initio prediction method. BMC Bioinformatics 6, 267. Spirollari, J., Wang, J.T.L., Zhang, K., Bellofatto, V., Park, Y., and Shapiro, B.A. (2009). Predicting consensus structures for RNA alignments via pseudo-energy minimization. Bioinformatics and Biology Insights 3, 51-69. Wang, J.T.L., and Wu, X. (2006). Kernel design for RNA classification using support vector machines. International Journal of Data Mining and Bioinformatics 1, 57-76. 17 Xue, C., Li, F., He, T., Liu, G.P., Li, Y., and Zhang, X. (2005). Classification of real and pseudo microRNA precursors using local structure-sequence features and support vector machine. BMC Bioinformatics 6, 310. Zhao, D., Wang, Y., Luo, D., et al. (2010). PMirP: a pre-microRNA prediction method based on structure-sequence hybrid features. Artificial Intelligence in Medicine 49, 127132. Zheng, Y., Hsu, W., Lee, M.L., and Wong, L.S. (2006). Exploring essential attributes for detecting microRNA precursors from background sequences. Lecture Notes in Computer Science, Springer 4316, 131-145. Zuker, M. (2003). Mfold web server for nucleic acid folding and hybridization prediction. Nucleic Acids Res 31, 3406-3415. 18 TABLE 1. Summary of Datasets Species Arabidopsis thaliana Caenorhabditis briggsae Caenorhabditis elegans Canis familiaris Ciona intestinalis Danio rerio Drosophila melanogaster Drosophila pseudoobscura Epstein barr virus Gallus gallus Homo sapiens Macaca mulatta Medicago truncatula Mus musculus Oryza sativa Physcomitrella patens Populus trichocarpa Pristionchus pacificus Rattus norvegicus Schmidtea mediterranea Taeniopygia guttata Real pre-miRNA 66, 67 66, 67 84, 85 161, 161 160, 160 170, 170 81, 82 98, 99 12, 13 241, 241 504, 504 222, 223 111, 111 315, 315 172, 172 73, 74 94, 95 60, 61 193, 193 72, 73 94, 95 Pseudo pre-miRNA 923, 924 437, 438 595, 596 904, 905 733, 734 1071, 1072 694, 694 495, 495 119, 119 1186, 1186 1999, 2000 1086, 1086 116, 116 2019, 2019 522, 523 703, 704 809, 810 58, 58 1238, 1238 201, 202 483, 483 19 TABLE 2. Comparison of Four Pre-miRNA Classification Methods Species Arabidopsis thaliana Caenorhabditis briggsae Caenorhabditis elegans Danio rerio Drosophila melanogaster Drosophila pseudoobscura Epstein barr virus Gallus gallus Homo sapiens Mus musculus Oryza sativa Rattus norvegicus TripletSVM 0.92 0.96 0.86 0.67 0.92 0.90 1.00 0.85 0.93 0.94 0.95 0.80 PMirP 0.96 0.97 0.86 0.83 0.96 0.92 0.80 1.00 0.95 0.94 1.00 0.92 CFM 0.99 0.98 0.97 0.98 0.97 0.98 0.98 0.96 0.93 0.95 0.97 0.97 MirID 1.00 1.00 0.98 0.99 0.99 1.00 1.00 0.96 0.95 0.97 0.99 0.98 20 TABLE 3. Accuracies of CFM and MirID on Nine Additional Species Species Canis familiaris Ciona intestinalis Macaca mulatta Medicago truncatula Physcomitrella patens Populus trichocarpa Pristionchus pacificus Schmidtea mediterranea Taeniopygia guttata CFM 0.97 0.94 0.96 0.95 1.00 0.97 0.96 0.95 0.95 MirID 1.00 1.00 0.96 1.00 1.00 0.99 1.00 0.99 0.99 21 TABLE 4. Number of Feature Sets for Each Species in MirID Species Arabidopsis thaliana Caenorhabditis briggsae Caenorhabditis elegans Canis familiaris Ciona intestinalis Danio rerio Drosophila melanogaster Drosophila pseudoobscura Epstein barr virus Gallus gallus Homo sapiens Macaca mulatta Medicago truncatula Mus musculus Oryza sativa Physcomitrella patens Populus trichocarpa Pristionchus pacificus Rattus norvegicus Schmidtea mediterranea Taeniopygia guttata Number of feature sets 1 6 1 1 7 11 3 4 5 3 1 1 1 3 3 1 1 1 10 32 5 22 TABLE 5. Training Time for Each Species in MirID Species Arabidopsis thaliana Caenorhabditis briggsae Caenorhabditis elegans Canis familiaris Ciona intestinalis Danio rerio Drosophila melanogaster Drosophila pseudoobscura Epstein barr virus Gallus gallus Homo sapiens Macaca mulatta Medicago truncatula Mus musculus Oryza sativa Physcomitrella patens Populus trichocarpa Pristionchus pacificus Rattus norvegicus Schmidtea mediterranea Taeniopygia guttata Training time 80 348 103 153 269 1272 199 196 113 274 1530 243 104 786 214 90 138 63 349 478 156 23 FIG. 1. Sequence and structure of a hypothetical pre-miRNA and its dot-bracket notation. 24 FIG. 2. Illustration of the merge and split operations on two feature sets. 25 FIG. 3. Algorithm for combinatorial feature mining. 26
5cs.CE
Learnable Explicit Density for Continuous Latent Space and Variational Inference Chin-Wei Huang 1 Ahmed Touati 1 Laurent Dinh 1 Michal Drozdzal 1 2 Mohammad Havaei 1 2 Laurent Charlin 1 3 Aaron Courville 1 4 arXiv:1710.02248v1 [cs.LG] 6 Oct 2017 Abstract In this paper, we study two aspects of the variational autoencoder (VAE): the prior distribution over the latent variables and its corresponding posterior. First, we decompose the learning of VAEs into layerwise density estimation, and argue that having a flexible prior is beneficial to both sample generation and inference. Second, we analyze the family of inverse autoregressive flows (inverse AF) and show that with further improvement, inverse AF could be used as universal approximation to any complicated posterior. Our analysis results in a unified approach to parameterizing a VAE, without the need to restrict ourselves to use factorial Gaussians in the latent real space. 1. Introduction Deep Gaussian Latent Models (Rezende et al., 2014), also known as Variational Autoencoders (VAEs) (Kingma & Welling, 2014), fall within the paradigm of Maximum Likelihood Estimate (MLE) and are often applied in computer vision problems. However, training with MLE usually leads to overestimation of the entropy of the data distribution (Minka, 2005). This is an undesirable property, as natural images are usually assumed to lie within a lower dimensional manifold, and the additional entropy (and other simplifying modeling assumptions for the purpose of explicit density estimation) often leads to a marginal likelihood with probability mass spread out in the data space where there is no support in the training data, which causes the blurriness of samples. These observations motivate the design of more flexible, complex families of model densities. Since a continuous latent variable z is introduced to the model, VAEs can R be interpreted as an infinite mixture model p(x) = z p(x|z)p(z)dz where the parameters of 1 MILA, Université de Montréal, Canada 2 Imagia Inc., Canada HEC Montréal, Canada 4 CIFAR Fellow, Canada. Correspondence to: Chin-Wei Huang <[email protected]>. 3 the class conditional distribution p(x|z) are functions of the latent variable z (which is thought of as class here), and there are infinitely many classes. Such models should theoretically have enough flexibility to capture highly complex distributions such as image manifolds, but in practice it is found to be overshadowed by tractable density models such as autoregressive models (Van Den Oord et al., 2016), or Generative Adversarial Networks (GANs) (Goodfellow et al., 2014) in terms of sample generation quality. It is believed that the relative poor performance in sample quality lies in the fact that the introduction of a latent representation requires approximate inference, as the model distribution is biased by simplifying posterior densities (Buntine & Jakulin, 2004); i.e. training is achieved by maximizing the variational lower bound on the marginal log likelihood:   pθ (x|z)pπ (z) (1) L(θ, φ, π; x) = Eqφ (z|x) log qφ (z|x) where subscripts θ, φ, π denote the parameters of the associated distributions. We discuss two aspects of training with the bound. First, maximizing (1) with respect to φ amounts to minimizing KL(qφ (z|x)||p(z|x)); the variational distribution, q(z|x), can thus be viewed as an approximate to the true posterior, p(z|x). Simplifying q(z|x) (e.g. by using a factorial Gaussian as a common practice) is problematic, as the marginal log likelihood of interest log p(x) can only be optimized to the extent we are able to approximate the true posterior using the variational distribution. This motivates a direct improvement of variational inference (Rezende & Mohamed, 2015; Ranganath et al., 2015; Kingma et al., 2016). Second, during training of the VAE, only a part of the latent space is explored. When marginalizing R out the input vector x, we recover the marginal q(z) = x q(z|x)pD (x), where D indicates the true data distribution. When the marginal approximate posterior fails to fill up the prior as the priorcontractive term requires, one would risk sampling from untrained regions in the latent space. A direct and nonparametric treatment of sampling from such regions of the prior would be to take q(z) as the prior, but the integral is intractable and the data distribution is only partially speci- Learnable Explicit Density for Continuous Latent Space and Variational Inference q(z|x) p(z|x) p(z) Figure 1. Effect of prior on posterior. Matching the prior p(z) with the marginal approximate posterior Ex [q(z|x)] makes the true posterior p(z|x) easier to model, since it pushes the true posterior to be closer to the approximate posterior. fied by a limited training data. Even if we take the empirical distribution of pD (x), we would have a mixture model of up to n components, where n is the number of training data points, which would be impractical given the scale of modern machine learning tasks. A workaround of this problem is to take a random subset of D, or introduce a learnable set pseudo-data of size K, and set the prior to Pof K 1 be p(z) = j=1 K q(zj |xj ), which is shown to be promising in the recent work done by Tomczak & Welling (2017). Another approach is to directly regularize the autoencoder by matching the aggregated posterior with the prior, as in Makhzani et al. (2015). In this paper, we make two main contributions. First, we analyze the effect of making the prior learnable. We show that training with the variational lower bound under some limit conditions matches the marginal approximate posterior with the prior, which is desirable from the generative model point of view. We then decompose the lower bound, and show that updating the prior alone brings the prior closer to the marginal approximate posterior, suggesting that having the prior trainable is beneficial to both sample generation and inference. Our second contribution is to prove that by using the family of inverse AF (Kingma et al., 2016), one can universally approximate any posterior. This theoretically justifies the use of inverse AF to improve variational inference. We unified the two aspects and propose to use invertible functionals Dinh et al. (2016) and Kingma et al. (2016) to parameterize explicit densities for both the prior and approximate posterior. 2. Marginal Matching Prior We claim that maximizing the variational lower bound explicitly matches the marginal q(z) with the prior p(z). By decomposing the lower bound, we then suggest using a learnable prior to improve sampling, i.e. to have a prior that matches the marginal q(z) instead. Let us define encoding and decoding distributions as q(z|x) and p(x|z) respectively, a prior as p(z) and a data distribution as pD (x). Our goal is to train an R auto-encoder as a generative model by keeping q(z) = x pD (x)q(z|x)dx close to the prior. This can be achieved at the limits of the following two conditions (Hoffman & Johnson, 2016): 1. q(z|x) → p(z|x) ∀x ∼ pD (x) 2. p(x) → pD (x) In words, given a perfect approximate posterior q(z|x) of p(z|x) and a perfect marginal likelihood p(x) of pD (x), we have the marginal q(z) converge to the prior, i.e. Z q(z) = pD (x)qφ (z|x)dx x Z 1. → pD (x)pθ,π (z|x)dx (2) Zx 2. → pθ,π (x)pθ,π (z|x)dx = pπ (z) x That is, to have q(z) → p(z), we need to ensure the two conditions are satisfied. We can cast it as an optimization problem by minimizing the KL-divergences: min EpD (x) [KL(q(z|x)||p(z|x))] + KL(pD (x)||p(x)) = max Ex∼pD (x) [L(θ, φ, π; x)] (3) The equality is a direct result of rearrangement of terms. What (3) implies is that maximizing the variational lower bound brings us to the limit conditions under which marginal approximate posterior q(z) should match the prior given enough flexibility in the assumed form of densities. Now if we maximize (3) with respect to π while holding θ and φ fixed like doing coordinate ascent, the samples drawn from the doubly stochastic process x ∼ pD (x), z ∼ q(z|x) can be thought of as a projected data distribution that we want to model using the prior distribution: max E[L] = min KL(Ex∼pD (x) [q(z|x)]||pπ (z)) π π (4) As a result, having a learnable prior allows us to sample from the marginal approximate posterior if the above divergence metric goes to zero. Another advantage of a learnable prior can be visualized by the cartoon plot in Figure 1. When we fix the approximate posterior and update the prior such that it becomes closer to the marginal approximate posterior, it concentrates the probability mass in such a way that the true posterior becomes closer to the approximate posterior, as p(z|x) ∝ p(z). In other words, the region of high posterior density not covered by the approximate posterior will be reduced, which effectively means our proposal as variational distribution could be improved by having a better prior which simplifies the true posterior. Learnable Explicit Density for Continuous Latent Space and Variational Inference 3. Inverse Autoregressive Flows as Universal Posterior Approximator In Kingma et al. (2016), a powerful family of invertible functions called the Inverse Autoregressive Flows (inverse AF or IAF) were introduced, to improve variational inference. It is thus of practical and fundamental importance to understand the benefits of using inverse AF and how to improve them. In this section, we show that normalizing flows from a base distribution (such as uniform distribution) under autoregressive assumptions are universal approximators of any density (as suggested in Goodfellow (2017)), given enough capacity when a neural network is used to parameterize non-linear dependencies. Lemma 1. Existence of solution to a nonlinear independent component analysis problem. Given a random vector X = (Xi )i=1...m ∈ Rm , there always exists a mapping g from Rm to Rm such that the components of the random vector Y = f (X) are statistically independent. Proof. See Hyvarjnen & Pajunen (1998) for the full proof. Here we point out that the transformation g used in the proof falls within the family of autoregressive functions: f = (fi )i=1...m where yi = fi (xi , y1 , . . . , yi−1 ) = P (x ≤ xi | y1 , ..., yi−1 ), for i = 1 . . . m. fi is the conditional CDF and Y ∼ U nif ([0, 1]m ). Then any distribution of a random variable x can be warped into an independent distribution via the CDFs, specifically by a kind of Gram-Schmidt process-like construction. Proposition 1. Inverse autoregressive transformation as universal approximator of any density. Let X be a random vector in an open set U ⊂ Rm . We assume that X has a positive and continuous probability density distribution. There exists a sequence of mappings (Gn )n≥0 from (0, 1)m to Rm parametrized by autoregressive neural networks such that the sequence Xn = Gn (Y ) where Y ∼ U nif ((0, 1)m ) converges in distribution to X. Proof. We consider the mapping f defined in the proof of Lemma 1. As f is autoregressive, the Jacobian of f is an upper triangular matrix whose diagonal entries are equal to the conditional densities which are positive by assumption. The determinant of the Jacobian, which is equal to the product of diagonal entries, is positive. By the inverse function theorem, f is locally invertible. As f is also injective (as follows from the bijectivity of CDF), f is globally invertible and let g denotes its inverse. g is an autoregressive function and by the universal approximation theorem (Cybenkot, 1989), we know that there exists a sequence of mappings (Gn )n≥0 from (0, 1)m to Rm parametrized by autoregressive neural networks that converge uniformly to g. Let Xn = Gn (Y ) where Y ∼ U nif ((0, 1)m ). Let h be a real-valued bounded continuous function on Rm . The latter uniform convergence implies that since Gn converge pointwise to g, then by continuity of h, h ◦ Gn converges pointwise to h ◦ g. As h is bounded, the dominated convergence theorem gives that E[h(Xn )] = E[h(Gn (Y ))] converges to E[h(g(Y ))] = E[h(X)]. As the latter statement is valid for all bounded continuous function h, Xn converge to X in distribution. Note that G is usually parameterized as an invertible function, at the expense of flexibility, to have a tractable Jacobian. Special designs of such a function, other than affine transformation (Kingma et al., 2016), could be made to improve the flow; otherwise one would need to compose multiple layers of transformations to have a richer distribution family. Our proof shows that, with careful designs of approximate posteriors, VAEs could have asymptotic consistency. 4. Proposed Method As suggested in sections 2 and 3, we propose to use oneto-one correspondence to define a learnable explicit density (LED) model for both inference and sample generation. First, inspired by (4), we found that updating the prior alone is reminiscent of MLE. One can think of data points projected onto the latent space via Monte Carlo sampling as a data distribution qD (z) = EpD (x) [q(z|x)] in space z. A unimodal prior tends to overestimate the entropy of qD (z). A powerful family of real non-volume preserving (Real NVP) transformations (Dinh et al., 2016) can be applied to real variables. It is thus natural to incorporate Real NVP into VAEs to jointly train an explicit density model as prior. We define the prior (and also the approximate posterior) ∂h (z0 )|−1 with change of variable formula: p(z) = p(z0 )| ∂z 0 where h : z0 → z. To compute the density of the projected data distribution, we inversely (h−1 ) transform the samples z ∼ qD (z) into the base variable z0 with tractable density (Dinh et al., 2014). We define the posterior likewise, as in Rezende & Mohamed (2015), with g : z 0 → z. Objective (1) can thus be modified as L = Eq(z0 |x) [log p(x|g(z 0 ))]+   ∂h−1 −1 0 0 Eq(z0 |x) log p(h ◦ g(z )) + log (g(z )) − ∂z   ∂g 0 Eq(z0 |x) log q(z 0 |x) − log (z ) ∂z 0 (5) For permutation invariant latent variables, h is implemented with random masks. For latent variables that preserve the spatial correlation when a convolutional network is used, we choose to use a checkerboard style mask (Dinh Learnable Explicit Density for Continuous Latent Space and Variational Inference pD (x) 4 x1 2 −4 4 p(x) 2 2 0 0 −2 −2 −4 −2 0 z1 2 0 −2 x1 2 4 −4 −3 −3 4 p(z) −2 −1 0 z0,1 1 2 3 p(z0) 3 2 1 0 −1 −2 −4 ResConv 0 −1 4 z2 x2 0 z0,2 0 −2 4 −4 1 −2 −4 Table 2. Effect of increasing both prior and posterior complexity. 2 z0,2 0 −2 E[q(z0|x)] 3 2 z2 x2 2 −4 E[q(z|x)] 4 −2 −4 −2 0 z1 2 4 −3 −3 −2 −1 0 z0,1 1 2 Table 1. Effect of increasing prior complexity. Lpost : number of MADE layers used for posterior. Two hidden layers of 512 nodes were used for each layer of transformation. Lprior : number of NVP layers used for prior. One hidden layer of 100 nodes was used for each layer of transformation. For multi-layer perceptron, two hidden layers with 200 nodes were used and the dimension of the latent variable is 50. Rectifier is used as non-linear activation. For Residual ConvNet, we have 3 layers of residual strided convolution (He et al., 2015) with [16,32,32] feature maps, using filter of size 3×3. Before the stochastic layer a hidden layer of 450 nodes is used. The dimension of the latent variable is 32. We use exponential linear units (Clevert et al., 2015) as non-linearity. MLP ResConv Lpost NLL Lprior NLL Lprior NLL 0 4 8 12 90.78 88.89 88.71 88.70 0 4 8 12 90.78 88.07 87.47 86.59 0 4 8 12 83.11 81.87 81.70 81.44 Lpost NLL 4 NVP 8 NVP 8 NVP 16 NVP 4 NVP 8 NVP 8 MADE 16 MADE 81.81 81.55 80.81 80.60 3 Figure 2. Fitting a Gaussian mixture distribution. E[·] indicates marginalization over the data x ∼ pD (x). Clockwise from top left: projection of data distribution pD (x) onto the prior space E(q(z|x)), and the base distribution space E(q(z0 |x)); density maps of the base distribution p(z0 ), the transformed prior p(z) and and marginal model distribution p(x). MLP Lprior et al., 2016; Agrawal & Dukkipati, 2016). Interestingly, sampling of such models is similar to block Gibbs sampling for energy based models (e.g. Ising models) that define the correlation between adjacent pixels. Second, for the posterior distribution, we construct g by inverse AF, which is parallelizable when combined with MADE (Germain et al., 2015) or PixelCNN (Van Den Oord et al., 2016). In fact, inverse AF can be thought of as a generalization of Real NVP, as the Jacobian of the masked operation used in Real NVP is upper triangular. 5. Experiments Mixture of Bivariate Gaussians. We experiment on a Gaussian mixture toy example, and visualize the effect of having a learnable prior in Figure 2. During training, we observe that models with flexible prior are easier to train than models with flexible posterior. Our first conjecture is that to refine the posterior density, we only draw one sample of z for each data point x, whereas refining the prior density can be viewed as modeling the projected data distribution and thus depends on as many samples as there are in the training set. Second, it might be due to the kind of transformation and the distance metrics that are used. To learn the posterior, we implicitly minimize KL(q(z|x)||p(z|x)), which is zero forcing since samples in region that has low target density are heavily penalized. If q begins with a sharper shape, it pays a high penalty by expansion to move to another mode. It is thus easy for the distribution to be stuck in local minima if the true posterior is multimodal, while learning the prior does not have this mode seeking problem since the forward KL in (4) is zero avoiding. MNIST. We also tested our proposed method on binarized MNIST (Larochelle & Murray, 2011), and report the estimated negative log likelihood as an evaluation metric. We compare the effects of adding more invertible transformation layers on either the prior or posterior (see Table 1), or both (Table 2). From Table 1, we see that models having a flexible prior easily outperform models with a flexible posterior. Likelihood of a model with flexible prior can be further improved by using expressive posterior (Table 2) such as real NVP (81.70 → 81.55), or with MADE to introduce more autoregressive dependencies (81.55 → 80.81). 6. Discussion and Future Work In this paper, we first reinterpret training with the variational lower bound as layer-wise density estimation. Treating the Monte Carlo samples from the approximate posterior distributions as projected data distribution suggests using a flexible prior to avoid overestimate of entropy. We leave experiments on larger datasets and sample generation as future work. Second, we showed that parameterizing inverse AF using neural networks allows us to universally approximate any posterior, which theoretically justifies the use of inverse AF. Our proof also implies using affine coupling law to autoregressively warp the distribution is limited. It is thus possible to consider designs of more flexible invertible functions to improve approximate posterior. Learnable Explicit Density for Continuous Latent Space and Variational Inference Acknowledgements We thank NVIDIA for donating a DGX-1 computer used in this work. References Agrawal, Siddharth and Dukkipati, Ambedkar. Deep Variational Inference Without Pixel-Wise Reconstruction. ArXiv e-prints, November 2016. Buntine, Wray and Jakulin, Aleks. Applying discrete pca in data analysis. In Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, UAI ’04, pp. 59–66, Arlington, Virginia, United States, 2004. AUAI Press. ISBN 0-9749039-0-6. Clevert, Djork-Arné, Unterthiner, Thomas, and Hochreiter, Sepp. Fast and accurate deep network learning by exponential linear units (elus). CoRR, abs/1511.07289, 2015. Cybenkot, G. Mathematics of control, signals, and systems approximation by superpositions of a sigmoidal function. Math. Control Signals Systems, 2:303–314, 1989. Dinh, Laurent, Krueger, David, and Bengio, Yoshua. NICE: Non-linear Independent Components Estimation. International Conference on Learning Representation, 1 (2):1–12, 2014. Dinh, Laurent, Sohl-Dickstein, Jascha, and Bengio, Samy. Density estimation using real NVP. International Conference on Learning Representation, abs/1605.08803, 2016. Germain, Mathieu, Gregor, Karol, Murray, Iain, and Larochelle, Hugo. Made: Masked autoencoder for distribution estimation. In Proceedings of the 32nd International Conference on International Conference on Machine Learning, 37, ICML’15, pp. 881–889, 2015. Goodfellow, Ian, Pouget-Abadie, Jean, Mirza, Mehdi, Xu, Bing, Warde-Farley, David, Ozair, Sherjil, Courville, Aaron, and Bengio, Yoshua. Generative adversarial nets. In Advances in Neural Information Processing Systems 27, pp. 2672–2680. Curran Associates, Inc., 2014. Goodfellow, Ian J. NIPS 2016 tutorial: Generative adversarial networks. CoRR, abs/1701.00160, 2017. He, Kaiming, Zhang, Xiangyu, Ren, Shaoqing, and Sun, Jian. Deep residual learning for image recognition. CoRR, abs/1512.03385, 2015. Hoffman, Matthew D. and Johnson, Matthew J. Elbo surgery: yet another way to carve up the variational evidence lower bound. 2016. Hyvarjnen, Aapo and Pajunen, Petteri. Nonlinear Independent Component Analysis: Existence and Uniqueness Results. Neural Networks, 1998. Kingma, Diederik P and Welling, Max. Auto-Encoding Variational Bayes. International Conference on Learning Representation, (Ml):1–14, 2014. Kingma, Diederik P, Salimans, Tim, and Welling, Max. Improving Variational Inference with Inverse Autoregressive Flow. Advances in Neural Information Processing Systems 27, (2011):1–8, 2016. Larochelle, Hugo and Murray, Iain. The neural autoregressive distribution estimator. In The Proceedings of the 14th International Conference on Artificial Intelligence and Statistics, volume 15 of JMLR: W&CP, pp. 29–37, 2011. Makhzani, Alireza, Shlens, Jonathon, Jaitly, Navdeep, and Goodfellow, Ian J. Adversarial autoencoders. CoRR, abs/1511.05644, 2015. Minka, Tom. Divergence measures and message passing. Technical report, January 2005. Ranganath, Rajesh, Tran, Dustin, and Blei, David M. Hierarchical variational models. arXiv preprint arXiv:1511.02386, 2015. Rezende, Danilo Jimenez and Mohamed, Shakir. Variational Inference with Normalizing Flows. Proceedings of the 32nd International Conference on Machine Learning, 37:1530–1538, 2015. Rezende, Danilo Jimenez, Mohamed, Shakir, and Wierstra, Daan. Stochastic backpropagation and approximate inference in deep generative models. In Proceedings of the 31st International Conference on International Conference on Machine Learning - Volume 32, ICML’14. JMLR.org, 2014. Tomczak, Jakub M. and Welling, Max. VAE with a vampprior. CoRR, abs/1705.07120, 2017. Van Den Oord, Aäron, Kalchbrenner, Nal, and Kavukcuoglu, Koray. Pixel Recurrent Neural Networks. 2016.
2cs.AI
On Low-Risk Heavy Hitter and Sparse Recovery Schemes Vasileios Nakos∗ Harvard University [email protected] Yi Li Division of Mathematical Sciences Nanyang Technological University [email protected] arXiv:1709.02919v1 [cs.DS] 9 Sep 2017 David P. Woodruff Carnegie Mellon University [email protected] Abstract We study the heavy hitters and related sparse recovery problems in the low-failure probability regime. This regime is not well-understood, and has only been studied for non-adaptive schemes. The main previous work is on sparse recovery by Gilbert et al. (ICALP’13). We recognize an error in their analysis, improve their results, and contribute new non-adaptive and adaptive sparse recovery algorithms, as well as provide upper and lower bounds for the heavy hitters problem with low failure probability. Our results are summarized as follows: 1. (Heavy Hitters) We study three natural variants for finding heavy hitters in the strict turnstile model, where the variant depends on the quality of the desired output. For the weakest variant, we give a randomized algorithm improving the failure probability analysis of the ubiquitous Count-Min data structure. We also give a new lower bound for deterministic schemes, resolving a question about this variant posed in Question 4 in the IITK Workshop on Algorithms for Data Streams (2006). Finally, under the strongest and well-studied `∞ /`2 variant, we provide the first randomized lower bound which is simultaneously optimal in the approximation factor , the universe size n, and the failure probability δ, for the full range of such parameters. Our lower bound shows that the classical Count-Sketch data structure is optimal in all parameters. 2. (Sparse Recovery Algorithms) For non-adaptive sparse-recovery, we give sublinear-time algorithms with low-failure probability, which improve upon Gilbert et al. (SICOMP’12) and Gilbert et al. (ICALP’13). In the adaptive case, we improve the failure probability 0.99 from a constant by Indyk et al. (FOCS ’11) to e−k , where k is the sparsity parameter. 3. (Optimal Average-Case Sparse Recovery Bounds) We give matching upper and lower bounds in all parameters on the measurement complexity of the `2 /`2 sparse recovery problem in the spiked-covariance model, completely settling its complexity in this model. 1 Introduction Finding heavy hitters in data streams is one of the most practically and theoretically important problems in the streaming literature. In this problem, we are asked to report all frequent items in a very long stream of elements coming from some universe. The main restriction is that the memory consumption should be very small, much smaller than the universe size and the length of ∗ Supported by ONR grant N00014-15-1-2388 1 the stream. To rephrase the problem, consider a frequency vector x ∈ Rn , where n is the size of the universe. Each element i in the data stream updates the frequency vector as xi ← xi + 1. At the end of the data stream, we wish to find the coordinates of x for which |xi | ≥ kxk1 . Oftentimes the problem is considered under a general streaming model called the turnstile model, where arbitrary deletions and additions are allowed, that is, the frequency vector x ∈ Rn receives updates of the form (i, ∆), and each such update causes the change of xi to xi + ∆. The `p heavy hitters problem, for p ≥ 1, then asks to find all coordinates i for which |xi |p ≥ kxkpp . The algorithm that treats the `1 case is the Count-min sketch [CM05], and the algorithm that treats the `2 case is the Count-Sketch [CCFC04]. Both algorithms are randomized and succeed with probability 1 − 1/ poly(n). In [CM05] the authors also suggest the “dyadic” trick for the strict turnstile model, in which it is promised that at all times during the stream the vector x satisfies xi ≥ 0 for all coordinates i. Their “dyadic” trick allows for finding heavy hitters approximatelly in O( 1 log2 n) time, but with the downside of having a worse update time and a worse space consumption by an O(log n) factor. The state of the art for heavy hitters is [LNNT16], where the authors give an algorithm that satisfies the `∞ /lp guarantee, has space O( 1 log n), update time O(log n), and query time O( 1 log1+γ n) for any constant γ > 0. Another set of closely related problems occurs in the compressed sensing (CS) literature, which has seen broad applications to biomedical imaging, sensor networks, hand-held digital cameras, and monitoring systems, among other places. In this problem we also seek to find the large coordinates of x ∈ Rn but with a different goal. Instead of finding all coordinates xi for which |xi | ≥ kxk1 , the CS problem seeks an approximation x̂ to x such that the difference vector x − x̂ has small norm. In particular, we consider the `2 /`2 error metric, that is, we require that kx − x̂k22 ≤ (1 + )kx−k k22 , where x−k is the vector x with the k largest entries (in magnitude) removed. If all `2 heavy hitters are found, it is clear that the norm of x − x̂ can be made small, but the CS problem allows a small number of heavy hitters to be missed if their contribution to the approximation error x − x̂ is small. Gilbert et al. proposed the first sublinear-time algorithm for the `2 /`2 problem that achieves O((k/) log(n/k)) measurements with constant failure probability [GLPS12]. Earlier sublineartime algorithms all contain several additional log n factors in their number of measurements. The optimality of O((k/) log(n/k)) measurements was proved by Price and Woodruff [PW11]. Later Gilbert et al. improved the failure probability to n−k/ poly(log k) [GNP+ 13], while their number of measurements has a poor dependence on , which is at least 1/11 . Despite the above works, our understanding of the complexity of heavy hitter and compressed sensing schemes on the error probability is very limited. The overarching goal of our work is to give a unified and systematic study of the dependence of the success probability of such schemes, in terms of both upper and lower bounds. We start with formal definitions of the problems and then state in detail our improvements over previous work. 1.1 Problem Formulation Notation. For x ∈ Rn , we define Hk (x) to be the set of its largest k coordinates in magnitude, breaking ties arbitrarily. For a set S let xS be the vector that occurs after zeroing out every coordinate i ∈ / S. We also define x−k = x[n]\Hk (x) and Hk, (x) = {i ∈ Hk (x) : |xi |2 ≥ k kx−k k22 }. For a sequence of real numbers x1 , . . . , xm , we denote by quanti (xi , α) the α-percentile of x1 , . . . , xm . A sketch f : Rm → Rn is a function that maps an n-dimensional vector to m dimensions. In this paper, all sketches will be linear, meaning f (x) = Ax for some A ∈ Rm×n . The sketch length m will be referred to as the space of our algorithms. Definition 1 (Heavy hitters). For x ∈ Rn and p ≥ 1, a coordinate xi is called an -heavy hitter 2 in `p norm if |xi |p ≥ kxkpp . We consider the following three variants of the heavy hitters problem with different guarantees: 1. Return a list containing all -heavy hitters but no /2-heavy hitters. 2. Return a list L of size O(1/) containing all -heavy hitters along with estimates x̂i such that |xi − x̂i |p ≤ kx−d1/e kpp for all i ∈ L. 3. Return a list of size O(1/) containing all -heavy hitters. When the algorithm is randomized, it has a parameter δ of failure probability; that is, the algorithm succeeds with probability at least 1 − δ. The variant with Guarantee 2 above is also referred to as the `∞ /`p problem. In this paper we focus on p = 1 and p = 2, with corresponding Count-Min [CM05] and Count-Sketch [CCFC04] data structures that have been studied extensively. Definition 2 (`2 /`2 sparse recovery). An `2 /`2 -recovery system A consists of a distribution D on Rm×n and a recovery algorithm R. We will write A = (D, R). We say that A satisfies the `2 /`2 guarantee with parameters (n, k, , m, δ) if for a signal x ∈ Rn , the recovery algorithm outputs x̂ = R(Φ, Φx) satisfying  PΦ∼D kx̂ − xk22 ≤ (1 + )kx−k k22 ≥ 1 − δ. In the above definition, each coordinate of Φx is called a measurement and the vector Φx is referred to as a measurement vector or just as the measurements. The probability parameter δ is referred to as the failure probability. 1.2 Our Results Heavy hitters. Our first result is an improved analysis of the Count-Min sketch [CM05] for Guarantee 3 under the change of the hash functions from 2-wise to O( 1 )-wise independence. Previous analyses for Guarantees 1 and 2 use O( 1 log nδ ) space; in contrast our analysis shows that this version of the Count-Min sketch satisfies Guarantee 3 with only O( 1 log(n) + log( 1δ )) space. Notably, the 1 factor does not multiply the log( 1δ ) factor. This result has two important consequences. First, it gives a uniform scheme for Guarantee 3; second, it implies an improved analysis of the classic dyadic trick [CM05] for Guarantee 3 using O( 1 log(n)+log n log( logδn )) space. For constant δ, previous analyses of the dyadic trick needed space O( 1 log n log( log n )) but our analysis shows that O( 1 log(n) + log(n) log log(n)) space suffices. These results are summarized in Table 1. Regarding the lower bound, we give the first bound for Guarantee 2 with p = 2, which is simultaneously optimal in terms of , n and the failure probability δ. We prove that the space has to be Ω(−1 log(n/δ)), matching the upper bound of Count-Sketch [CCFC04]. We note that the lower bound of Ω(−1 log n) was previously known [BIPW10, JST11, Pri11], and we note that the lower bounds given in [BIPW10, Pri11] actually give an Ω(−1 log n) lower bound and are valid for the full range of parameters of  and n. We note that previous analyses cannot be adapted to obtain non-trivial lower bounds for δ < 1/n, since the lower bound instances used in their arguments have deterministic upper bounds using O(−1 log n) space. p We also show a new p randomized lower bound of Ω((1/)(log n + log(1/δ))) space for p = 1, provided that 1/ > log(1/δ). Although not necessarily optimal, this lower bound is the first to show that p a term involving log(1/δ) must multiply the 1/ factor for p = 1. The assumption that 1/ > log(1/δ) is necessary, as there exist deterministic O(1/2 ) space algorithms for p = 1 [GM06, NNW12]. For deterministic algorithms satisfying Guarantee 3 with p = 1, we also show a lower bound of Ω(1/2 ) measurements, which resolves Question 4 in the IITK Workshop on Algorithms for Data Streams [McG07]. 3 Algorithm Count-Min [CM05] This paper Dyadic Trick [CM05] This paper Space 1 1 1  log n +  log( δ ) 1 1  log(n) + log( δ ) log n 1  log n log( δ· ) log(n) 1 )  log(n) + log(n) log( δ Guarantee 1, 2 3 1, 2 3 Query time Õ(n) Õ(n) Õ( 1 ) O(˜1 )  Table 1: Summary of previous heavy hitter algorithms. The notation O(·) for space complexity is suppressed, Õ(·) hides logarithmic factors in n, 1/ and 1/δ. Paper [CCFC04] [GLPS12] [GNP+ 13] [LNNT16] Measurements −1 k log n −1  k log(n/k) −11 k log(n/k) −1 k log n Decoding Time n log n −1 k poly(log(n/k)) k 2 · poly(−1 log n) −1 k · poly(log n) This paper −1 k log(n/k) −1 k log(n/k) n ) −1 k log( k −1 k log3 n −1 k 2 (log k) log1+γ (n/k) −1 k 2 poly(log n) Failure Probability 1/ poly(n) Ω(1) 13 (n/k)−k/ log k 1/poly(n) max{e − k log3+γ k , ( nk )− log k } 3 e−k/ log k (n/k)−k/ log k Table 2: Summary of previous sparse recovery results and the results obtained in this paper. The notation O(·) is suppressed. The paper [GNP+ 13] and the third result of our paper require k = nΩ(1) . Sparse Recovery. We summarize previous algorithms in Table 2. Column sparsity denotes how many 1s there are per column of the measurement matrix, which determines the update time of the sketch in the turnstile model. We give algorithms for the `2 /`2 problem with failure probability much less than 1/poly(n) whenever k = Ω(log n). We present two novel algorithms, one running in O(k poly(log n)) time and the other running in O(k 2 poly(log n)) time with a tradeoff in failure probability. Namely, the first algorithm has a larger failure probability than the second one. The algorithms follow a similar overall framework to each other but are instantiated with different parameters. We also show how to modify the algorithm of [GNP+ 13] to obtain an optimal dependence on , achieving a smaller failure probability along the way. All of these results are included in Table 2. Our algorithms, while constituting a significant improvement over previous work, are still not entirely optimal. We show, however, that at least in the spiked covariance model, which is a standard average-case model of input signals, we can obtain optimal upper and lower bounds in terms of the measurement complexity. Combined with the identification scheme from [GNP+ 13] we also obtain a scheme with decoding time nearly linear in k, assuming that k = nΩ(1) . Besides the above non-adaptive schemes, we also make contributions in terms of the failure probability for adaptive schemes. For adaptive sparse recovery, Indyk et al. gave an algorithm under the `2 /`2 guarantee [IPW11] using O((k/) log(n/k)) measurements and achieving constant 1−γ failure probability. We give a scheme that achieves failure probability e−k for any constant γ, using the same number of measurements. Moreover, we present an algorithm for the regime when k/ ≤ poly(log n). Our scheme achieves the stronger `∞ /`2 guarantee and fails with probability 1/ poly(log n). Thus, our algorithms improve upon [IPW11] in both regimes: in the high-sparsity regime we get an almost exponential improvement in k, and in the low-sparsity regime we get 1/ poly(log n). 4 2 Our Techniques Heavy hitters. All the schemes we give are for the strict turnstile model. Our first algorithm is based on a small but important twist to the Count-Min sketch: we change the amount of independence in the hash functions from 2 to O( 1 ). Since the estimate of any coordinate is an over-estimate of it, we are able to show that the set of O( 1 ) coordinates with the largest estimates is a superset of the set of the 1 -heavy hitters. Although changing the amount of independence might increase both the update and the query time by a multiplicative factor of 1 , we show in our case we can sufffer only a log2 ( 1 ) factor in the update time, if we are aiming for amortized time, and a log2 ( 1 ) factor in query time in the worst case. The above observation gives also an improvement for the well-known dyadic trick. Similary, the deterministc algorithms we give are based on the important observation that any estimate only over-estimates the value of a coordinate. Our deterministic lower bounds are based on choosing “bad input vectors” for the sketching matrix S based on several properties of S itself. Since the algorithm is deterministic, it must succeed even for these vectors. Our randomized lower bounds come from designing a pair of distributions which must be distinguished by a heavy hitters algorithm with the appropriate guarantee. They are based on distinguishing a random Gaussian input from a random Gaussian input with a large coordinate planted in a uniformly random position. By Lipschitz concentration of the 1-norm and 2-norm in Gaussian space, we show for certain input parameters the norms in the two cases are concentrated, so we have a heavy hitter in one case but not the other. Typically, the planted large coordinate corresponds to a column in S of small norm, which makes it indistinguishable from the noise on remaining coordinates. The proof is carried out by a careful analysis of the variation distance of the distribution of the image of the input under the sketch in the two cases. Non-Adaptive Sparse Recovery. 1. Differences from [GLPS12] Our result has a similar framework to that of [GLPS12], though chooses more carefully the main primitives it uses and balances the parameters in a more effective way. Both schemes consist of O(log k) so-called weak systems: a scheme that takes as input a vector x and returns a vector x̂ which contains a 2/3 fraction of the heavy hitters of x (the elements with magnitude larger than √1k kx−k k2 ) along with accurate estimates of (most of) them. Then it proceeds by considering the vector x − x̂, which contains at most 1/3 of the heavy hitters of x. We then feed the vector x − x̂ to the next weak-level system to obtain a new vector which contains at most (2/3)(1/3)k = 2k/9 of the heavy hitters. We proceed in a similar fashion, and after the i-th stage we will be left with at most k/3i heavy hitters. Each weak-level system consists of an identification and an estimation part. The identification part finds a 2/3 fraction of the heavy hitters while the identification part estimates their values. For the identification part, the algorithm in [GLPS12] hashes n coordinates to Θ(k) buckets using a 2-wise independent hash function and then uses an error-correcting code in each bucket to find the heaviest element. Since, with constant probability, a heavy hitter will be isolated and its value will be larger than the ‘noise’ level in the bucket it is hashed to, it is possible to find a 2/3 fraction of the heavy hitters with constant probability and O(k · poly(log n)) decoding time. We change this by hashing again to O(k) buckets but using full independence. Moreover, in each bucket we use a b-tree, which is a folklore data structure in the data stream literature, the special case of which (b = 2) first appeared in [CM05]. This modification is the key to obtain smaller column sparsity and faster decoding time, while it also makes the algorithm simpler. This allows us to 5 achieve better decoding time and much lower failure probability. The estimation part is a different analysis of the folklore Count-Sketch data structure: we show that the estimation scheme can be implemented with a better dependence on  than the expander-based scheme in [GNP+ 13]. However, to beat constant failure probability, we need another idea on how we use the weak systems. The intuition for our improvement is the following. We use O(log log k) weak systems with sparsity parameters k, k3 , . . . , logk k , and after that point we either run the algorithm of [LNNT16] 3 to find the remaining heavy hitters and therefore obtain the result presented in Table 1, or design the i-th weak system with O( logk k ) rows with sparsity parameter 3ki . The main idea is to choose parameters such that the failure probability is dominated by the level logk k , while the total number of measurements does not increase by more than a constant factor. 2. Recovery Time As discussed above, our improvement on failure probability over [GLPS12] is achieved using more measurements in the i-th iteration for i > log log k. The earlier paper by Gilbert et. al. [GNP+ 13] also used a similar trick with different choices of parameters. This, however, raises an issue of recovery time. For instance, in [GNP+ 13], the measurement matrix contains s = 2i /ic (where c is a constant) repetitions of an expander-based identification matrix (see Lemma 4.10 and Theorem 4.9 of [GNP+ 13]). The expander-based identification matrix has at least one non-zero entry in each column and thus the measurement matrix for the i-th iteration has at least s non-zero entries in each column, which implies that when i = log k − 1, each column has at least Ω(k/ poly(log k)) nonzero entries. Updating measurements y ← y − Φx̂ will then take Ω(k 2 / poly(log k)) time, where x̂ is the recovered signal and has Ω(k) nonzero coordinates. Therefore the overall running time of the recovery algorithm will be Ω̃(k 2 ) instead of the claimed Õ(k 1+α ) in their paper. Our algorithm suffers from the same problem, and we have to choose different parameters in order to achieve recovery time that is linear in k, at the cost of a larger failure probability (compare to the results of this paper in Table 2). Adaptive Compressed Sensing. In [IPW11] the authors suggest a scheme for 1-sparse recovery, using O(log log n) measurements and having constant failure probability. This scheme serves as the 1 main routine for their `2 /`2 algorithm. We show how to modify it so that we obtain poly(log n) 1 failure probability for 1-sparse recovery. More generally, when k < log n we obtain poly(log n) failure probability with the stronger `∞ /`2 guarantee by using this scheme along with CountSketch. We then show how the main iterative loop of their `2 /`2 scheme can be modified by changing the 1−γ way the parameters vary, so that we are able to get e−k failure probability instead of constant failure probability. 3 Preliminaries Count-Sketch. Our estimation will be based on the Count-Sketch data structure. The Count-Sketch of a vector x is defined as follows. For r = 1, . . . , R, we hash all n coordinates of x into B buckets with function hr : [n] → [B]. In each bucket we aggregate the elements with random signs, that is, the value of bucket b ∈ [B] in iteration r is X Vb,r = σi,r xi i:hr (i)=b where the σi,r are independent random signs (±1). For i ∈ I the estimate to xi returned by Count-Sketch is x̂i = median σi,r Vhr (i),r . 1≤r≤R 6 Weak System. We follow the approach in several previous works [PS12, GLPS17] by first constructing a weak system and then building an overall algorithm upon it. Definition 3. A probabilistic matrix M with n columns is called a (k, ζ)-weak identification matrix with the (`, δ, ) guarantee if there is an algorithm that given M x and a subset S ⊆ [n], with probability at least 1 − δ outputs a subset I ⊆ S such that |I| ≤ ` and at most ζk elements of Hk, (x) are not present in I. The time to compute I will be called the identification time. Definition 4. We call an m × n matrix M a (k, ζ, η) weak `2 /`2 system if the following holds for any vector x = y + z such that | supp(y)| ≤ k: given M x, one can compute x̂ such that there exist ŷ, ẑ which satisfy the following properties: (i) x − x̂ = ŷ + ẑ, (ii) | supp(x̂)| = O(k), (iii) | supp(ŷ)| ≤ ζk and (iv) kẑk22 ≤ (1 + η)kzk22 . 3.1 3.1.1 Toolkit Black-Box Routines In this subsection we mention three theorems crucial for our sparse recovery scheme. The first one is from the recent paper by Larsen et al. on finding heavy hitters in data streams [LNNT16]. Theorem 1. Let x ∈ Rn , δ > 0 and K ≥ 1. There exists an (oblivious) randomized construction of a matrix A such that given y = Ax we can find, with probability 1 − δ, a list L of size O(K) that contains all K1 -heavy hitters of x with probability 1 − δ. The number of rows of A is O(K log(n/δ)), the time to find the list L is O(K log3 n), and the column sparsity is O(log(n/δ)). We also need the folklore b-tree data structure, which is a generalization of the dyadic trick. The next analysis of a b-tree-based heavy hitter algorithm appears in [LNNT16]. Theorem 2. The b-tree produces a correct output L for (1/K)-heavy hitters with probability at least 1 − δ. Moreover, when δ > 1/ poly(n), there is a choice of b such that the b-tree uses space O(K log n), update time O(log n) and query time O((K 1+γ/2 /δ γ ) log1+γ n). The constants in the big-Oh notations depend on γ. It is important for our algorithm to have a subroutine that can estimate the values of a set S of at most k elements, without knowing in advance what this set S is. This task is called a set query. The following theorem is proven in [Pri11]. Theorem 3. Let c > 0. There is a randomized construction of a O(cK/) × n matrix A such that for any x ∈ Rn and any set S ⊂ [n] of size at most K, we can find a vector x̂ ∈ Rn such that kxS − x̂k22 ≤ kxS̄ k22 . The algorithm runs in time O(cK) and succeeds with probability at least 1 − K −c . We will also need the following theorem from [GNP+ 13]. Although the theorem in the paper is not stated this way, it is easy to see that by setting the quality of the approximation to be 1 and the sparsity to be k/ we immediately obtain the desired result. Theorem 4 ([GNP+ 13]). Suppose that k = nΩ(1) . There exists a randomized construction of a matrix M of (k/) log(n/k) rows, such that given M x one can find a set S of size O(k/) such −c that |Hk/,1 \ S| ≤ ζk with probability 1 − nk , where ζ, c > 0 are absolute constants. The time to find S is O(k 1+α poly(log n)), where a is any arbitrarily small positive constant. 7 4 Heavy Hitters Problem 4.1 Upper Bounds In this section we give schemes that enable the detection of heavy hitters in data streams deterministically or with low failure probability. Our first result is Theorem 1, which is slightly more general than finding heavy hitters but will be useful later when implementing the dyadic trick. This theorem refers to a variant of the problem which we call the Promise Heavy Hitters problem, where we are given a subset P of [n] of size m with the guarantee that every heavy hitter is contained in the subset P . Theorem 5. Let x ∈ Rn be a vector with non-negative coordinates. Assume a promise that the heavy hitters of x lie in a set P of size m. There exists a data structure such that with probability 1 − δ, upon query, it finds the `1 heavy hitters (i.e., p = 1) of x under Guarantee 3. The space usage is O( 1 log(m) + log( 1δ )), the amortized update time is O(log(m) log2 ( 1 ) +  log2 ( 1 ) log( 1δ )) and the worst-case query time is O(m log2 ( 1 )(log m +  log( 1δ ))). As we will see later, the above scheme implies the following corollary. Corollary 6. There exists a data structure DS which finds the `1 heavy hitters of any x ∈ Rn in the strict turnstile model under Guarantee 3. The space usage is O( 1 log(n)), the update time is amortized O(log2 ( 1 ) log(n)) and the query time is O(n log2 ( 1 ) log(n)). The following theorem follows by an improved analysis of the dyadic trick [CM05]. Theorem 7. There exists a data structure with space O( 1 log(n) + log(n) · log( log(n) )) that finds δ the `1 heavy hitters of x ∈ Rn in the strict turnstile model under Guarantee 3 with probability at least 1 − δ. The update time is O(log2 ( 1 ) log(n) +  log(n) log2 ( 1 ) log( log(n) )) and the query time δ log(n) 2 1 2 1 1 is O(  (log (  ) log(n) + log(n) log (  ) log( δ )))). Theorem 8. There exists a deterministic algorithm that finds the -heavy hitters of any vector x ∈ Rn using space O(k 1+α (log( 1 ) log n)2+2/α ). The update time is O(poly(log n)) and the query time is O(n · poly(log n)). 4.1.1 Overview of Techniques All the schemes we give are in the strict turnstile model. As discussed in the Introduction, our first algorithm is essentially a small twist of the Count-Min sketch: we change the amount of independence in the hash functions from 2-wise to O(1/)-wise. Since the estimator of each coordinate never underestimates its value, we show that the set of O(1/) coordinates with the largest estimates is a superset of the set of the (1/)-heavy hitters. Although changing the amount of independence might increase both the update and the query time by a multiplicative factor of 1/, we show in our case we can suffer only a log2 (1/) factor in the update time, if we are aiming for amortized time, and a log2 (1/) factor in query time in the worst case. This can be achieved using fast multipoint evaluation of polynomials. For the deterministic case, we show how expanders that expand only on sets of size Θ(1/) (or equivalently lossless condensers) lead to schemes in the strict turnstile model under Guarantee 3. Then, we instantiate the Guruswami-Umans-Vadhan expander [GUV09] properly to get our desired algorithm. The idea to use expanders in the context of heavy hitters has also been employed by Ganguly [Gan08], although his data structure solves the `∞ /`1 problem and has Ω(1/2 ) space consumption. The reason why the strict turnstile assumption is crucial is that we can avoid cancellations. 8 4.2 Low-failure probability algorithms in the strict turnstile model For the proof of Theorem 5, we choose the constants CR = 5, Cδ = 10(ln 4 − 1), CB = 20, C0 = 30. The algorithm is presented in Algorithm 1 and the proof is below. Algorithm 1 Count-Min: Scheme for Heavy Hitters in the Strict Turnstile Model R ← CR log(m) + d  log(1/δ) e Cδ B ← CB k/ Pick hash functions h1 , . . . , hR : [n] → [B], each being (C0 /)-wise independent Cr,j ← 0 for all r ∈ [R] and j ∈ [B]. function Update(i, ∆) Cr,hr (i) ← Cr,hr (i) + ∆ for all r ∈ [R] end function function Query for each i ∈ P do x̂i ← minr Cr,hr (i) end for return the (C0 + 1) 1 coordinates in P with the largest x̂ values. end function Proof of Theorem 5. We prove first that Algorithm 1 satisfies Guarantee 3 with update time 1 O( 1 log(m) + log 1δ ) and query time O( m  log(m) + log δ ). Later, we will show how to modify the scheme in order to get the desired result. Let S be the set of -heavy hitters of x. Let T be any set of at most C0 / coordinates that is a subset of P \ S. Fix a hash function ha . Let Ba [T ] denote the set of the indices of the buckets containing elements from T , i.e. Ba [T ] = {b ∈ [B] : ∃j ∈ T, ha (j) = b}. The probability that |Ba [T ]| < 10/ is at most    C0  10   C0  e  10 10/  B eCB  10   ≤ ≤ . 10/ B 10 CB 4  Considering all R hash functions, it follows that with probability ≥ 1 − (e/4)10R/ there exists an index a∗T ∈ [R] such that |Ba∗T [T ]| ≥ 10/. A union bound over all possible T yields that with probability at least 1 − δ, there exists such an index a∗T for each T of size C0 /. Now, let Out be the set of coordinate the algorithm outputs and let T 0 = Out \ S. Clearly, 0 |T | ≥ C0 /. Discard some coordinates of T 0 so that |T 0 | = C0 /. We shall prove that there exists an element j ∈ T 0 such that its estimate is strictly less than kx−1/ k1 and hence smaller than the estimate of any element in S. This will imply that every element in S is inside Out. From the previous paragraph, there exists a∗T 0 such that |BaT 0 [T 0 ] | > 10/. Since we have at most 1/ heavy hitters and at most 1/ indices b ∈ [B] such that the counter Ca,b ≥ kx−1/ k1 , which implies that we have at least 10/ indexes (buckets) of B such that the bucket has mass less than kx1/ k1 while at least one element of T 0 is hashed to that bucket. Therefore, the estimate for this element is less than kx− 1 k1 , which finishes the correctness of proof.  We note that Algorithm 1 clearly has an update time of O( 1 log(m) + log 1δ ) and a query time 1 O(  m log(m) + m log 1δ ). We now show how to improve both runtimes, thus getting the desired Theorem 5. 9 We split our stream into intervals, which we call epochs, of length C0 /: the l-th epoch starts from the ((l − 1)C0 / + 1)-st update and ends at the (lC0 /)-th update. Let DS be the data structure guaranteed by Theorem 7. During an epoch we maintain a list of elements L0 that were updated in this epoch. This list is initialized to the empty list when an epoch begins. When a new update (i, ∆) arrives, we store (i, ∆) to L0 . For the query operation, we first query DS to obtain a set L, and then find the set L0 of indices i such that (i, ∆) ∈ L0 , and return L ∪ L0 as our answer. Clearly L ∪ L0 has at most (2C0 + 1)/ elements. When an epoch ends, we feed all updates (i, ∆) ∈ L0 to our data structure. Since we can obtain a (C0 /)-wise independent hash function from a polynomial of degree C0 /, this means that we can do C0 / evaluations in time O( 1 log2 1 ) using multipoint evaluation of polynomials (see, e.g., Theorem 13 of [KNPW11]). Since we shall evaluate O(log(n) +  log 1δ ) hash functions the amortized update time follows. A similar argument gives the query time. Observe that in the previous algorithm the analysis depends only on the set S that contains the -heavy hitters. By setting P = [n] and taking a union bound over all possible subsets that the -heavy hitters may lie in, we obtain a uniform algorithm for the strict turnstile model under Guarantee 3, namely Corollary 6. We are now ready to prove Theorem 7, which as we said is an improved analysis of the dyadic trick [CM05], which follows from Theorem 1. We first describe the algorithm of the dyadic trick. We assume that n is a power of 2. Then for every 1 ≤ l ≤ log n, we partition [n] into 2l equal-sized and disjoint intervals of length n/2l . Each interval will be called a node. We imagine a complete binary tree on these nodes, where there is an edge from a node/interval u to a node v if v is an subinterval of u of exactly the half length. Since in the strict turnstile model the `1 norm of any interval/node is the sum of its elements, we can set up a Count-min sketch for every level l of the tree to find out the “heavy” intervals at that level. If a level contains a heavy hitter then it will always have `1 mass at least kxk1 , while there can be at most 1 intervals with mass more than kxk1 . Given this observation we traverse the tree in a breadth first search fashion and at every level keep a list L of all nodes that the Count-Min sketch on that level indicated as heavy. In the next level there will be at most 2|L| nodes we need to consider: just the children of nodes in L. At the last level, if all Count-min sketch queries succeed we will be left with at most 1 intervals of length 1, that is we will have found all heavy hitters. The obstacle for getting suboptimal space by a factor of log( log n ) stems from the fact that we have to set the parameters of Count-Min sketch at every level in a way such that we can afford to take a union bound over the at most 1 log n nodes we will touch while traversing the tree. However, with our improved analysis of Count-Min sketch, we show that we can essentially avoid this additional log( 1 ) factor. Also, our algorithm with the data structure guaranteed by Theorem 5 gives the stronger tail guarantee. We continue with the proof of the theorem. Proof of Theorem 7. Without loss of generality we can assume that n is a power of 2. We improve l the analysis for levels l ≥ 1/. Fix such a level l. Then we consider the vector y ∈ R2 , the ith entry of which equals i· n yi = 2l X xj j=(i−1)· nl +1 2 and run point query on this vector. Every coordinate of y corresponds to a node at level l and since kx−d 1 e k1 ≥ ky−d 1 e k1 finding the heavy hitters of y corresponds to finding a set of nodes that   contain the heavy hitters of x. At every level, we are solving a version of Promise Heavy Hitters with m = O( 1 ). We use the data structure guaranteed by Theorem 5 and set the failure probability 10 to be δ c log(n) , for some large constant c. Our space consumption per level equals O( 1 +log( log(n) )). δ δ . By a Hence, at each level we are going to find all heavy nodes with probability at least 1 − log(n) union bound over all levels the failure probability of our algorithm is at most δ. This means that, while traversing the tree, we have only O( 1 ) candidates at each level and hence we are solving a Promise Heavy Hitters Problem with m = O( 1 ). At every level we need O( 1 + log( log(n) )) δ log n 1 space and hence the total space of our algorithm is O(  log(n) + log(n) log( δ )). Since we are considering O( 1 log(n)) nodes in total and each function is O( 1 )-wise independent, similar arguments as in the proof of Theorem 5 give the desired bounds. 4.3 4.3.1 Deterministic Algorithms in the Strict Turnstile Model Heavy Hitters from Expanders In this section we show that expanders which can be stored in low space imply schemes for heavy hitters in the strict turnstile model. Then we show that the Guruswami-Umans-Vadhan expander is such an (explicit) expander. Definition 5. Let Γ : [N ] × [D] → [M ] be a bipartite graph with N left vertices, M right vertices and left degree D. Then, the graph G will be called a (k, ζ) vertex expander if for all sets S ⊆ [N ], |S| ≤ k it holds that Γ(S) ≥ (1 − ζ)|S|D. 2 Theorem 9. Let ζ, c be absolute constants such that 1−ζ < c. Suppose there exists an explicit c bipartite (  , (1 − ζ)D) expander Γ : [n] × [D] → [m]. Suppose also that Γ can be stored in space S, and for every i ∈ [n] it is possible to compute the neighbours of i in time t. Then there exists an algorithm that finds the -heavy hitters of a vector x ∈ Rn with space usage m + S, update time O(t) and query time O(n · t). Proof. We maintain counters C1 , . . . , Cm . Whenever an update (i, ∆) arrives, we add ∆ to all counters Cj for j that is a neighbour of i. The total update time is O(t). The query algorithm is exactly the same as Count-Min: compute x̂i = mind∈D CΓ(i,d) and output the largest (c + 1)/ coordinates. We now show the correctness of the algorithm. Fix a vector x ∈ Rn and let S be the set of its -heavy hitters. Let T be any other set of c/ elements. Observe that for all i ∈ S and all j ∈ [m] such that j, i are neighbours in Γ, it holds that Cj ≥ kx−d1/e k1 . We claim that there exist adjacent (i, j) for some i ∈ T such that Cj < kx−d1/e k1 , whence the theorem follows. Suppose that the claim is false. By the expansion property of G, the neighbourhood of T has size at least (1 − ζ)(c/)D. Since the claim is false, all of these counters have value at least kx−d1/e k1 . However, the total number of counters that are at least kx−d1/e k1 , is 2D/. It follows from our choices of ζ and c that 2D/ < (1 − ζ)(c/)D, which is a contradiction. Next we review the Guruswami-Umans-Vadhan (GUV) expander. The construction of the GUV expander is included in Figure 1, and it is known that the construction does give an expander. Theorem 10 ([V+ 12]). The expander Γ from construction 2 is a (hc , q − ahc) expander. The following corollary follows with appropriate instantiation of parameters. Corollary 11. For every constant α > 0 and all positive integers N, K ≤ N and  there exists an explicit (K, (1 − )D) expander with N left vertices, M right vertices and left-degree D = O(log N log K/)1+1/α and M = k 1+α D2 . 11 Expanders from Parvaresh-Vardy Codes: 1. Define a neighbor function Γ : Faq × Fq → Fq × Fcq by Γ(f, y) = [y, f0 (y), . . . , fc−1 (y)], (1) i where f (Y ) is a polynomial of degree a − 1 over Fq . We define fi (Y ) = f (Y )h mod E(Y ) where E is an irreducible polynomial of degree a over Fq . Figure 1: Guruswami-Umans-Vadhan Expander The next lemma is immediate, since the time to perform operations between polynomials of degree a in Fq is O(c · poly(log a, log q)). Lemma 12. The function Γ can be stored using a words of space and the time to compute Γ(f, y) given f, y is O(c · poly(log a, log q)). Our main result, Theorem 8, then follows from combining Corollary 11, Theorem 9 and Lemma 12. 4.3.2 Heavy hitters from Lossless Condensers Our starting point is an observation that in the proof above we only needed expansion on sets of size exactly c/ and thus some object weaker than an expander could suffice. The right object to consider is called lossless condenser, which is essentially an expander that guarantees expansion on sets of a specific size, but not on sets of smaller size. Here we follow the definitions in [V+ 12]. In order to define a lossless condenser we need the notion of min entropy of a distribution and the notion of the total variation distance between two distributions. Definition 6 (Min entropy). Let D be a distribution on a finite sample space Ω. The min entropy of D is defined as 1 H∞ (D) = min log . ω∈Ω Pω∼D [ω] Definition 7 (Total variation distance). The total variation distance between two distributions P and Q on Ω is defined to be DT V (P, Q) = 1X |P(ω) − Q(ω)|. 2 ω∈Ω We also need the definitions of a pseudorandom object called a condenser. In a nutshell, a condenser takes as input a random variable from a source which has some amount of min-entropy, and some uniform random bits. It then outputs an element following a distribution that has sufficiently large min-entropy. Let Un denote the uniform distribution on Fnp . Definition 8 (Loseless condenser). Let a, b, c be positive integers and let p be a prime number. A function C : Fap × Fbp → Fcp is called a lossless (κ, ζ) condenser if the following holds. For every distribution A on Fbp with H∞ (A) ≥ κ, for any random variable A ∼ A and any ‘seed’ variable B ∼ Ub , the distribution (B, C(A, B)) is ζ-close to some distribution (Ub , Z) on Fb+m with p min-entropy at least b + κ. 12 Equipped with these definitions, we are now ready to prove the following theorem relating lossless condensers and heavy hitters. Although we can repeat the proof of the previous section and argue that every lossless condenser is equivalent to an expander where only sets of a specific size expand, we prefer to rewrite the proof in the language of condensers. Theorem 13. Let p be a prime number and let a be such that n = pa . Let also κ be such that c/ = 2κ , where c is some absolute constant. Let Con : Fap × Fbp → Fcp be a (κ, ζ) lossless condenser that can be stored in space S. Let t be the time needed to evaluate Con. If 2−κ+1 / + ζ < 1 then there exists an algorithm that finds the -heavy hitters of any x ∈ Rn with space S + pc+b , update time t · pb and query time O(n · t · pb ). Proof. We consider the following algorithm. We instantiate counters Ci,j for all i ∈ Fbp and j ∈ Fcp . Upon updating (i, ∆) we perform updates Ci,Con(i,j) ← Ci,Con(i,j) + ∆ for all j ∈ Fbp . Clearly the update time is t · pb and the space usage is the total number of counters plus the space needed to store the condenser, in total O(pb · pc + S) words. The query algorithm is exactly the same as in Count-Min: compute x̂i = minj∈Fbp Ci,Con(i,j) and output the largest (c + 1)/ coordinates. We now analyze the algorithm. Fix a vector x ∈ Rn and let S be the set of its -heavy hitters. Let T be any other set of c 1 elements. Observe that for all i ∈ S and all j ∈ Fbp it holds that Ci,Con(i,j) ≥ kx−d1/e k1 . We claim that there exists i ∈ T, j ∈ Fbp such that Ci,j > kx−d1/e k1 . The theorem then follows. Suppose that the claim is false, that is, for all i ∈ T and all j ∈ Fbp it holds that Ci,j ≥ kx−d1/e k1 . Consider the uniform distribution A on T and observe that A has min-entropy at least κ. Let A be a random variable drawn from A. This implies that (UB , Con(A, UB )) is ζ-close to some distribution D with min-entropy at least κ + b. Since the  number of counters that can b have a value at least kx−d1/e k1 is (2/)p , we have that PX∼A CX,Con(X,UB ) > kx−d1/e k1 ≤ (2/)2b 2−κ−b only on elements in S ∪ T , we have  + ζ . On the other hand, since A is supported −κ that PX∼D CUB ,Con(A,UB ) ≥ kx−d1/e k1 = 1. If (2/)2 + ζ < 1 we reach a contraction. 4.3.3 Heavy hitters from Error-Correcting List-Disjunct Matrices In this subsection we give another reduction to error-correcting list-disjunct matrices, a combinatorial object that appears in the context of two-stage group testing. Explicit and strongly explicit constructions of list-disjunct matrices are known [NPR11], although they are very similar to our expander/condensers proof of the previous section and they do not yield better space complexity. We show that a sufficiently sparse error-correcting list-disjunct matrix that can be stored in low space, with the appropriate choice of parameters, can induce a scheme for heavy hitters in the strict turnstile model. Although group testing has been used in finding heavy hitters in data streams [CH08], to the best of our knowledge this is the first time such a reduction is noticed. Using such a matrix, one can perform two-stage combinatorial group testing when there also some false tests, either false positive or false negative. For simplicity, we give the definition only in the case of false positive tests, as we do not need more complicated ones. For an m × N binary matrix M and a set S ⊆ [n], let M [S] = {q ∈ [m] : ∃j ∈ S, Mq,j = 1}. Definition 9. Let k, ` be positive integers and e0 be a non-negative integer. A binary m×n matrix is called (d, `, e0 )-list-disjunct if for any disjoint sets S, T ⊆ [n] with |S| = k, |T | = `, the following holds: in any arbitrary subset X of M [T ] \ M [S] of size at most e0 , there exists a column j ∗ ∈ T such that M [{j}] \ (X ∪ M [S]) 6= ∅. 13 Theorem 14. Let s, n be integers with s ≤ n. Suppose there exists an m × n matrix M that is (1/, c/, s/) list-disjunct, where s is some integer and C0 some absolute constant. Suppose also that: • M can be stored in space S; • The column sparsity of M is s; • Each entry of M can be computed in time t. Then there exists a streaming algorithm which finds the -heavy hitters of any vector x using space S + m, having update time s · t and query time O(n · st). Proof. We use M as our sketch, i.e., we have access to y = M x. The inner product of each row of matrix M with x defines a counter. We describe the query algorithm. For each coordinate i, compute x̂i as the minimum value over all counters it participates in. That is, x̂i = minq:Mq,i =1 yq . The query algorithm outputs the list L containing the coordinates with the largest (c + 1)/ coordinates in x̂. Next we show the correctness of the query algorithm. Let S be the set of -heavy hitters and let R be the set of coordinates that the algorithm outputs. Define T = R \ S. For any i ∈ S, we know that x̂i ≥ kx−d1/e k1 . Let X = {q : yq > kx−d1/e k1 and @i ∈ S : Mq,i = 1}, that is, the set of rows which appear to be ‘heavy’ but contain no -heavy hitter. We claim that |X| ≤ s/. Indeed, if |X| > s/, the total `1 mass of these counters would be more than skx−d1/e k1 . But since every coordinate i participates in at most s counters, the total `1 mass of counters with no heavy hitters is at most skx−d1/e k1 . This gives us the desired contradiction. Assume now that there exists i ∈ S which is not included in L. This means that for every j ∈ T , x̂j ≥ kx−d1/e k1 , which means that M [j] ⊆ M [S] ∪ X. Define sets S 0 , T 0 by moving some coordinates from T to S if needed so that |T 0 | = c/, |S 0 | = 1/. Observe that it still holds that M [j] ⊆ M [S] ∪ X for all j ∈ T 0 . But this violates the definition of (1/, c/, s/) list-disjunct matrix. This proves correctness of our algorithm. Clearly, the space that the streaming algorithms uses is S + m, the space needed to store A plus the space needed to store y. Moreover, the update time is s · t. 4.4 Lower Bounds 4.5 Preliminaries We start with some standard facts about the Gaussian distribution. Fact 15. (One-Dimensional Variation Distance) Let P1 denote the N (0, Ir ) Gaussian distribution, and P2 the N (τ, Ir ) Gaussian distribution. Then   kτ k2 DT V (P1 , P2 ) = P |g| ≤ , 2 g∼N (0,1) where N (0, 1) denotes a standard one-dimensional normal random variable. Proof. Let U be an r × r orthogonal matrix which rotates τ to kτ k2 · e1 , where e1 is the first standard unit vector. Then by rotational invariance, DT V (P1 , P2 ) = DT V (N (0, 1), N (kτ k2 , 1)). Then by Section 3 of [Pol],   kτ k2 DT V (N (0, 1), N (kτ k2 , 1)) = P |g| ≤ . 2 g∼N (0,1) 14 Theorem 16 (Lipschitz concentration, [LT91, p21]). Suppose that f : Rn → R is L-Lipshitz with respect to the Euclidean norm, i.e. |f (x) − f (y)| ≤ Lkx − yk2 for all x, y ∈ Rn . Let x ∼ N (0, In ) and let f be L-Lipshitz with respect to the Euclidean norm. Then t2 P {|f (x) − E f (x)| ≥ t} ≤ 2e− 2L2 , t ≥ 0. Fact 17 (Concentration of `1 -Norm). Suppose x ∼ N (0, In ) and n ≥ 32 ln(6/δ). Then   n δ 3n P ≥1− . ≤ kxk1 ≤ 8 4 3 √ Proof. The function f (x) = kxk1 satisfies |f (x) − f (y)| ≤ kx − yk1 ≤ nkx − yk2 for all x, y in Rn and so by Theorem 16 we have t2 P x∼N (0,In ) {|kxk1 − E kxk1 | > t} ≤ 2e− 2n p p Note that since g ∼ N (0, 1), E |g| = 2/π, and so we have E kxk1 = 2/π. Hence, setting t = n/4, we have that n/8 ≤ kxk1 ≤ 3n/4 with probability at least 1 − 2e−n/32 , which is at least 1 − δ/3 provided that n ≥ 32 ln(6/δ). Fact 18 (Concentration of `2 -Norm). Suppose x ∼ N (0, In ) and n ≥ 18 ln(6/δ). Then √ √  n δ 3 n P ≥1− . ≤ kxk2 ≤ 2 2 3 Proof. The function f (x) = kxk2 satisfies |f (x) − f (y)| ≤ kx − yk2 for all x, y in Rn and so by Theorem 16 we have 2 /2 P{kxk2 − E kxk2 | > t} ≤ 2e−t √ n if x ∼ N (0, In ). It is well-known (see, e.g., [CRPW10]) that √n+1 ≤ E kxk2 ≤ n. Hence, setting √ √ √ t = n/3, we have that n/2 ≤ kxk2 ≤ 3 n/2 with probability at least 1 − 2e−n/18 , which is at least 1 − δ/3 provided that n ≥ 18 ln(6/δ). Fact 19 (Univariatep Tail Bound). Let g ∼ N (0, 1). There exists δ0 > 0 such that it holds for all δ < δ0 that P{|g| ≤ 4 log(1/δ)} ≥ 1 − δ/3. 2 Proof. It is well-known (see, e.g.@ [Gor41]) P{g ≥ x} ≤ /2 e−x √ , x 2π and so P{g ≥ 2 p log(1/δ 2 )} ≤ δ2 2π log(1/δ) ≤ 6δ , for δ less than a sufficiently small absolute constant δ0 > 0. Hence, by symmetry p of the normal distribution, |g| ≤ 4 log(1/δ) with probability at least 1 − δ/3. √ 2 In our proofs we are interested in lower bounding the number r of rows of a sketching matrix S. We can assume throughout w.l.o.g. S has orthonormal rows, since given Sx, one can compute RSx for any r × r change-of-basis matrix R. 15 4.6 Deterministic Lower Bounds for `1 -Heavy Hitters Theorem 20 (Strict turnstile deterministic lower bound for Guarantees 1,2). Assume that n = Ω(−2 ). Any sketching matrix S must have Ω(−2 ) rows if, in the strict turnstile model, it is always possible to recover from Sx a set which contains all the -heavy hitters of x and contains no items which are not (/2)-heavy hitters. Proof. Let r be the number of rows of the sketching S, which, Pnw.l.o.g., 2has orthonormal Pnmatrix T 2 T rows. Because the columns of S are orthonormal, i=1 kS Sei k2 = i=1 kSei k2 = r and n X n n X √ X T T kS Sei k1 ≤ n kS Sei k2 ≤ n kS T Sei k22 i=1 i=1 !1/2 √ ≤ n r, i=1 where the first inequality uses the relationship between the `1 -norm and the `2 -norm, and the second inequality is the Cauchy-Schwarz inequality. It follows by an averaging argument that there exists √ an i∗ ∈ [n] for which kS T Sei∗ k22 ≤ 2r/n and kS T Sei∗ k1 ≤ 2 r. Consider the possibly negative vector v = ei∗ −S T Sei∗ , which is in the kernel of S, since I −S T S projects onto the space orthogonal √ to the row space of S. Then vi∗ ≥ 1−2r/n ≥ 1/2, for r ≤ n/4. Also kvk1 ≤ 1+kS T Sei∗ k1 ≤ 2 r+1. Define w to be the vector with wj = |vj | for all j 6= i∗ , and wi∗ = 0. Note that w is non-negative. √ Then kw + vk1 ≤ 4 r + 2, while (w + v)i∗ ≥ 1/2, and note that w + v is also a non-negative vector. Since both w and w + v are non-negative vectors, either can be presented to S in the strict turnstile model. However, S(w + v) = Sw, and so any algorithm cannot distinguish input w + v from input w. However, wi∗ = 0 while (w + v)i∗ ≥ 1/2. For the algorithm to be correct, i∗ cannot be an √ (/2)-heavy hitter for either vector, which implies 4(1/2) ≤ 2 , that is, r = Ω(1/2 ). r+2 Theorem 21 (Turnstile deterministic lower bound for Guarantee 3). Assume that n = Ω(−2 ). Any sketching matrix S must have Ω(−2 ) rows if, in the turnstile model, some algorithm never fails in returning a superset of size O(1/) containing the -heavy hitters. Note that it need not return approximations to the values of the items in the set which it returns. Proof. Let r be the number of rows has orthonormal rows. P of the sketching matrixPS, which, w.l.o.g., √ As in the proof of Theorem 20, ni=1 kS T Sei k22 = r and ni=1 kS T Sei k1 ≤ n r. It follows that by an averaging argument there is a set T of 9n/10 indices i ∈ [n] for which both kS T Sei k22 ≤ 20r/n √ and kS T Sei k1 ≤ 20 r. Let vi = ei − S T Sei , which is in the kernel of S for each i. Furthermore, as in the proof of Theorem 20, for i ∈ T , the i-th coordinate (vi )i of vi , is at least 1/2 for r ≤ n/4, √ and also kvi k1 ≤ 2 r + 1. Now, since Svi = 0 for all vi , a turnstile streaming algorithm cannot distinguish any of the input vectors vi from the input 0. The output of the algorithm on input 0 can contain at most O(1/) indices. But |T | ≥ 9n/10 = ω(1/), so for at least one index i ∈ T , the algorithm will be √ wrong if i is an -heavy hitter for vi , so we require 2(1/2) ≤ , that is, r = Ω(1/2 ). r+1 4.7 4.7.1 Randomized Lower Bounds `1 -Heavy Hitters p We assume in this section that 1/ ≥ C log(1/δ) for a sufficiently large constant C > 0. To p obtain an Ω(−1 log(1/δ) lower bound on the number of rows of the sketching matrix, such an assumption is necessary, otherwise for small enough δ (as a function of n and ) the lower bound would contradict the −2 poly(log n) deterministic upper bounds of [GM06, NNW12]. 16 Theorem 22. (Randomized Turnstile `1 -Heavy Hitters Lower l m Bound for Guarantees 1, 2) Assume p p −1 log(1/δ) . Then for any sketching matrix S, it that 1/ ≥ C log(1/δ) and suppose n ≥ 64 p must have Ω(−1 log(1/δ)) rows if, in the turnstile model, it succeeds with probability at least 1 − δ in returning a set containing all the  `1 -heavy hitters and containing no items which are not (/2) `1 -heavy hitters. l m p Proof. Let the universe size be n = 64−1 log(1/δ) (note if the actual universe size is larger, we m l p can set all but the first 64−1 log(1/δ) coordinates of our input to 0). Note that the assumption in the previous paragraph implies that n ≥ 32 ln(6/δ), which we will need to apply Fact 17. Let r be the number of rows of thepsketch matrix S, where r ≤ n. Note that if r > n, then we immediately obtain the claimed Ω(−1 log(1/δ)) lower bound. Hard Distribution. Let I be a uniformly random element in [n]. Casep1: Let η be the distribution N (0, In ), and suppose xp∼ η. By Fact 17, kxk1 ≥ n/8 ≥ 8−1 log(1/δ) with probability 1 − δ/3. By Fact 19, |xI | ≤ 4 log(1/δ) with probability 1 − δ/3. Let E be the joint occurrence of these events, so that P[E] ≥ 1 − 2δ/3. By our choice of n, it follows that if E occurs, then |xI | ≤ 2 kxk1 , and therefore I cannot be output by an `1 -heavy hitters algorithm if the algorithm succeeds. Case 2: Let γ be the distribution (4n)eI + N (0, In ), where I is drawn uniformly at random from [n], and eI denotes the standard unit vector in the I-th direction. Suppose p x ∼ γ, and let y ∼ N (0, In ). By Fact 17, kyk1 ≤ 3n with probability 1 − δ/3. By Fact 19, |x | ≤ 4 log(1/δ) with I 4 probability 1 − δ/3. Let F be the p joint occurrence of these events, so that P[F] ≥ 1 − 2δ/3. p Note that 4 log(1/δ) ≤ n, and consequently if F occurs, then |xI | ≥ (4n)−4 log(1/δ) ≥ 3n, while kxk1 ≤ 4n + kyk1 ≤ n, provided  ≤ 1/16. Consequently, if F occurs, for an `1 -heavy hitters algorithm to be correct, it must output I. A Conditioning Argument. We let η 0 be the distribution of η conditioned on E, and let γ 0 be the distribution of β conditioned on F. For a distribution µ on inputs y, we let µ̄ be the distribution of Sy. Note that any `1 -heavy hitters algorithm which succeeds with probability at least 1 − δ can decide, with probability at least 1 − δ, if x ∼ η 0 or if x ∼ γ 0 . Consequently, DT V (η̄ 0 , γ¯0 ) ≥ 1 − δ. On the other hand, we have DT V (η̄, γ̄) ≥ DT V (η̄ 0 , γ¯0 ) − DT V (η̄ 0 , η̄) − DT V (γ¯0 , γ̄) 2δ 2δ ≥ DT V (η̄ 0 , γ¯0 ) − − 3 3 7δ ≥ 1− , 3 where the first inequality is the triangle inequality. The second inequality follows from the fact that for a distribution µ and event W, DT V (µ, µ | W) = P[6 W], together with our bounds on P[E] and P[F] above. Therefore, to obtain our lower bound, it suffices to show if the number r of rows of S is too small, then it cannot hold that DT V (η̄, γ̄) ≥ 1 − 7δ 3 . 17 Bounding the Variation Distance. Since S has orthonormal rows, by rotational invariance of the Gaussian distribution, the distribution of η̄ is equal to N (0, Ir ). Also by rotational invariance of the Gaussian distribution, the distribution of γ̄ is (4n)SI +N (0, Ir ), where SI is the I-th column of S. Since S has orthonormal rows, by a Markov bound, for 9/10 fraction of values of I, it holds that kSI k22 ≤ 10r n . Call this set of columns T . Let G be the event that I ∈ T . Then P[G] ≥ 9/10. Suppose DT V (η̄, γ̄) ≥ 1 − 7δ 3 . We can write γ̄ = P[G] · (γ̄ | G) + P[¬G](γ̄ | ¬G), and so if the number r of rows of S is large enough so that DT V (η̄, γ̄) ≥ 1 − 7δ 3 , then 1− 7δ 3 ≤ DT V (η̄, γ̄) = = = ≤ ≤ 1 kη̄ − γ̄k1 2 1 kη̄ − P[G · (γ̄ | G) − P[¬G](γ̄ | ¬G)k1 2 1 k P[G(η̄ − (γ̄ | G)) + P[¬G](η̄ − (γ̄ | ¬G))k1 2 1 1 P[Gkη̄ − γ̄ | Gk1 + (1 − P[G])kη̄ − γ̄ | ¬Gk1 2 2  1 9 1 kη̄ − γ̄ | Gk1 + ·1 , 2 10 10 and so DT V (η̄, γ̄ | G) ≥ 1 − 70δ 27 . The variation distance between N (0, Ir ) and (4n)Si +N (0, Ir ) for a fixed i ∈ T is, by rotational invariance and by rotating Si to be in the same direction as the first standard unit vector e1 , the same as the variation distance between N (0, Ir ) and 4nkSi k2 e1 + N (0, Ir ), which is equal p to the variation distance between N (0, 1) and N (4nkSi k2 , 1). Using that i ∈ T and so kSi k2 ≤p 10r/n, we apply Lemma 15 to obtain that the variation distance is at most Pg∼N (0,1) {|g| ≤ 2n 10r/n}. It follows that n o X 1 p DT V (η̄, γ̄ | G) ≤ DT V (η̄, γ̄ | (I = i)) ≤ P |g| ≤ 2n · 10r/n . |T | g∼N (0,1) i∈T Supposing the number r of rows of S is large enough so that DT V (η̄, γ̄ | G) ≥ 1 − p P{|g| ≤ 2n 10r/n} ≥ 1 − 70δ 27 , or equivalently ( ) r 10r 70δ P |g| > 2n ≤ . n 27 g∼N (0,1) 70δ 27 , this implies (2) p p p √ Suppose that r ≤ α−1 log(1/δ). Then 2n 10r/n = 2 10rn ≤ C 0 α log(1/δ) for some absolute constant C 0 . Take α = 1/(2C 02 ). Invoking the well-known bound (see, e.g. [Gor41])   2 e−x /2 1 √ P {g ≥ x} ≥ , x + 1/x g∼N (0,1) 2π p p we have that Pg∼N (0,1) {|g| > 2n 10r/n} ≥ C 00 δ/ log(1/δ), when δ is small enough, contradicting that this probability needs to be at mostp70δ/27 by (2). It must therefore hold that r > α−1 log(1/δ). This completes the proof. 18 4.7.2 `2 -Heavy Hitters Our next theorem implies a lower bound for the `∞ /`2 heavy hitters problem as defined in Section 1.1, since it implies such an x̂ satisfying Definition 1 cannot be an acceptable output. It is based on designing a pair of hard distributions which cannot be distinguished by a small sketch. We show this by using rotational properties of the Gaussian distribution to reduce our problem to a univariate Gaussian mean estimation problem, which we show is hard to solve with low failure probability. Theorem 23. Suppose that δ < δ0 and  < 1/0 for sufficiently small absolute constants δ0 , 0 ∈ (0, 1) and n ≥ 64−1 log(6/δ) . Then for any sketching matrix S, it must have Ω(−1 log(1/δ)) rows if it succeeds with probability at least 1 − δ in returning a set containing all the -heavy hitters and containing no items which are not (/2)-heavy hitters.   Proof. Let the universe size be n = 64−1 log(6/δ) , which is large enough inorder for us to apply Fact 18 (note if the actual universe size is larger, we can set all but the first 64−1 log(6/δ) coordinates of our input to 0). Let r be the number of rows of the sketch matrix S, where r ≤ n. If r > n, then we immediately obtain an Ω(−1 log(1/δ)) lower bound. We can assume that S has orthonormal rows, since a change of basis to the row space of S can always be performed in a post-processing step. Hard Distribution. Let I be a uniformly random index in [n]. p Case 1: Let η be the distribution N (0, Ip n/2 with n ), and suppose x ∼ η. By Fact 18, kxk2 ≥ probability 1 − δ/3. By Fact 19, |xI | ≤ 4 log(1/δ) with probability 1 − δ/3. Let E be the joint occurrence of these events, so that P(E) ≥ 1 − 2δ/3. By our choice of n, it follows that if E occurs, then x2I ≤ 16 log(1/δ) ≤ 2 kxk22 , and therefore I cannot be output by an `2 -heavy hitters algorithm. √ Case 2: Let y ∼ N (0, In ) and x√= neI +y, where eI denotes the standard basis vector in the I-th p √ direction. By Fact 18, kyk2 ≤ 3 2 n with probability 1−δ/3. By Fact 19, |yI | ≤ 4 log(1/δ) < n/2 with probability 1 − δ/3. Let F be the joint occurrence of these events, so that P(F) ≥ 1 − 2δ/3. √ p √ 5 n If event F occurs, then |xI | ≥ 3 n − 4 log(1/δ) ≥ 2 , and so x2I ≥ 25n 4 . We also have √ √ √ 3 n 2 kxk2 ≤ 3 n + 2 ≤ 2 n, provided  ≤ 1/36, and so kxk2 ≤ 4n. Consequently, x2I ≥ kxk22 . Consequently, if F occurs, for an `2 -heavy hitters algorithm to be correct, it must output I. Conditioning. Let η 0 be the distribution of η conditioned on E, and let γ 0 be the distribution of γ conditioned on F. For a distribution µ on inputs y, we let µ̄ be the distribution of Sy. Note that any `2 -heavy hitters algorithm which succeeds with probability at least 1 − δ can decide, with probability at least 1 − δ, whether x ∼ η 0 or x ∼ γ 0 . Hence, DT V (η̄ 0 , γ¯0 ) ≥ 1 − δ. Observe for any measurable set A ⊆ Rm it holds that η̄(A) − µ̄(A) 2 − (η̄ 0 (A) − µ̄0 (A)) ≤ δ, 2 3 1 − 3δ and so it then follows that  DT V (η̄, γ̄) ≥ DT V (η̄ 0 , γ¯0 ) 2δ − 3   2 7δ 1− δ ≥1− . 3 3 Therefore, to obtain our lower bound, it suffices to show if the number r of rows of S is too small, then it cannot hold that DT V (η̄, γ̄) ≥ 1 − 7δ/3. 19 Bounding the Total Variation Distance. Since S has orthonormal rows, by rotational invariance of the Gaussian distribution, the distribution of η̄ is identical to N (0, Ir ) and the distribution √ of γ̄ identical to (3 n)SI + N (0, Ir ), where SI is the I-th column of S. Since S has orthonormal rows, by a Markov bound, for 9/10 fraction of values of I, it holds that kSI k22 ≤ 10r n . Call this set of columns T . Let G be the event that I ∈ T , then P(G) ≥ 9/10. It follows that DT V (η̄, γ̄) ≤ P(G)DT V (η̄, γ̄|G) + P(¬G)DT V (η̄, γ̄|¬G) ≤ P(G)DT V (η̄, γ̄|G) + 1 − P(G) = 1 − P(G)(1 − DT V (η̄, γ̄|G)) 9 ≤ 1 − (1 − DT V (η̄, γ̄|G)). 10 Hence, in order to deduce a contradiction that DT V (η̄, γ̄) < 1 − 7δ/3, it suffices to show that DT V (η̄, γ̄|G) < 1 − 70δ/27. √ The total variation distance between N (0, Ir ) and (3 n)Si + N (0, Ir ) for a fixed i ∈ T is, by rotational invariance and by rotating Si to be in the same direction as the first standard basis √ vector e1 , the same as the total variation distance between N (0, Ir ) and (3 n)kSi k2 e1 + N (0, Ir ), √ which is equal to the total variation distance between N (0, 1) and N (3 nkSi k2 , 1). p Using that i ∈ T and so kSi k2 ≤ 10r/n, p we apply Lemma 15 to obtain that the variation √ distance is at most P[|N (0, 1)| ≤ (3/2) n · 10r/n]. It follows that DT V (η̄, γ̄ | G) ≤ n o X 1 p √ DT V (η̄, γ̄ | I = i) ≤ P |g| ≤ (3/2) n · 10r/n , |T | g∼N (0,1) i∈T and thus it suffices to show, when r is small, that   3√ 70δ P |g| ≥ 10r > . 2 27 g∼N (0,1) Observe that the left-hand is a decreasing function in r, and so it suffices to show the inequality above for r = α−1 log(1/δ) for some α > 0. Invoking the well-known bound that (see, e.g., [Gor41]) 1 1 t2 {g ≥ t} ≥ √ · e− 2 , g∼N (0,1) 2π 2t P we have that  P g∼N (0,1) 3√ |g| ≥ 10r 2  t≥ √ 2, 45 3 1 70 ≥ √ δ 4 αp > δ 27 4 5π α log(1/δ) when α is small enough. Therefore it must hold that r ≥ α−1 log(1/δ) and the proof is complete. 5 5.1 Non-adaptive Sparse Recovery Weak System We start with the following lemma. 20 Lemma 24. Let δ > 0. There exists a randomized construction of a (k, c1 )-weak identification matrix with the (cB k , δ, ) guarantee; the matrix has O(( k + 1 log 1δ ) log n k ) rows and the identification time is O( 1 (k + log 1δ ) log1+γ ( n )), for any constant γ > 0, where c , c 1 B > 0 are absolute constants. k Proof. We describe the matrix as a scheme which performs a set of linear measurements on the vector x. Without loss of generality we can assume that Hk, (x) has size k, otherwise we can expand it to size k without affecting the guarantee of the weak identification matrix. Let R = cR d k1 log( 1δ )e and B = cB k/. For each r ∈ [R], we hash every coordinate i ∈ [n] to B buckets using a B-wise indepedent hash function hr : [n] → [B]. Let Njr be binary variables defined as follows: Njr = 1 iff |{i : hr (i) = j}| ≥ 4n/B. It is clear that at most B/4 buckets will be big. Relabel the buckets so that the first 3B/4 buckets are small buckets. Define     3 (r) B : there exists exactly one j ∈ Hk, (x) such that hr (j) = b , Tgood = b ∈ 4             X  3 (r) 2 2 B : kx−k k2 . Tbad = b ∈ xi ≥   4 5k     i∈H / k, (x)   hr (i)=b (r) In other words, Tgood is the set of the buckets in iteration r which receive exactly one element of (r) Hk, (x), while Tbad is the set of buckets which receive energy more than (/5k)kx−k k22 from elements outside of Hk, (x). (r) (r) Since every two buckets in Tbad share no coordinates outside Hk, (x), it must hold that |Tbad | ≤ 5k/. The probability that there exist more than c3 k coordinates in Hk, (x) that land in a bucket in  (r) Tbad is at most c3kk ( c5B )c3 k ≤ e−Ω(k) . On the other hand, it is a standard result (see, e.g., [GSTV06, Lemma 23]) that at least (1−c4 )k elements in Hk, (x) are isolated with probability at least 1−e−Ω(k) , (r) and thus |Tgood | ≥ (1 − c4 )k. Overall with probability ≥ 1 − e−Ω(k) , at least (1 − c3 − c4 )k elements in Hk, (x) land in buckets (r) (r) (r) (r) in Tgood \ Tbad . Each bucket in Tgood \ Tbad is a 1-heavy hitter problem with signal length at most 4n/B and the energy of the heavy hitter is at least 5 times the noise energy. By Theorem 2 we can 1 perform this task in O(log(n/k)) measurements with probability at least 1 − log(n/k) and decoding time O(log1+γ (n/k)) for any constant γ > 0. We collect the coordinate found in each bucket, and return the coordinates with at least R/2 occurrences. Since there are at most BR buckets, the size of the returned coordinates is at most 2B = 2cB k/. Since the failure probability of the b-tree is at most a constant, the probability that more than c5 k buckets fail is at most e−Ω(k) . By considering all R iterations, this means that with probability 1 − exp(−Ω(Rk)) ≥ 1 − δ at most c5 (c3 + c4 )k = c1 k elements of Hk, (x) will not be recognized. Lemma 25. Let T ⊆ [n] be a set of indices such that |T | ≤ cT k/ for some absolute constant cT and ζ ≤ 12 be an absolute constant. The Count-Sketch scheme of B = cB (cT + 1)k/ buckets and R = cR (log 1 + k1 log 1δ ) repetitions yields an estimate x̂ such that n o  i ∈ T : |xi − x̂i |2 > kx−k k22 ≤ ζk, 16k with probability ≥ 1 − δ. 21 Proof. For the purpose of analysis only we may assume that Hk (x) ⊆ T , otherwise we can include Hk (x) in T and replace cT with cT + 1. We call elements in T candidates, and the elements not in T noise elements. Consider hashing all n elements into B buckets, using B-wise independent hash functions. We say a bucket b in repetition r is good if X  x2i ≤ kxT c k22 , 160k i6∈T hr (i)=b otherwise we say that bucket b in repetition r is bad. First we show that, with probability at least 1 − exp(−Ω(|T |R)) ≥ 1 − δ 1/ , at least (1 − θ1 )T candidates are isolated and land in good buckets in at least (1 − θ2 )R repetitions. The isolation claim is essentially the same to those in [GSTV06, PS12, GLPS17], nevertheless we give a proof below for completeness. In each repetition r, it follows from a standard result (see [GG11, Section 4.3]) that at least (1 − θ3 )|T | candidates are isolated with probability at least 1 − exp(−c1 θ4 |T |), by choosing cB large enough. The other claim of landing in good buckets follows from a standard argument. In each repetition there are at most θ5 B buckets that are bad, since at most θ5 B  buckets contain noise energy greater than kxT c k22 /(θ5 B) ≤ 160k kxT c k22 . A standard application of the Chernoff bound shows that with probability at least 1 − exp(−Ω(|T |)), at least (1 − θ6 )|T | candidates are hashed into good buckets. Call a pair (candidate, repetition) good if the candidate is isolated and lands in a good bucket in that repetition. Therefore in each repetition with probability at least 1 − exp(−Ω(|T |)) there are at least (1 − θ7 )|T | good pairs. Taking a Chernoff bound over R repetitions, with probability ≥ 1 − exp(−Ω(|T |R)), at least (1 − θ8 )R repetitions contain (1 − θ7 )|T | good pairs. Condition on this event, we know at least (1 − θ8 )(1 − θ7 )R|T | good (candidate, repetition) pairs. This implies that at least (1 − θ1 )T candidates are isolated and land in good buckets in at least (1 − θ2 )R repetitions, provided that 1 − θ1 θ2 ≤ (1 − θ8 )(1 − θ7 ). Condition on the event above. The actual noise in bucket b in repetition r is X Wb,r = σi,r xi , i6∈T hr (i)=b and by Markov’s inequality, n o  1 2 P Wb,r ≥ kxT c k22 ≤ . 16k 10 Let Xb,r = 1W 2  c 2 b,r ≤ 16k kxT k2 . We proved above that with high probability at least (1 − θ)T candidates are isolated and land in good buckets in at least (1 − θ2 )R repetitions; let T 0 be the set of those (1 − θ1 ) candidates and for each i ∈ T 0 let Ri be the set of repetitions in which i is isolated and land in good buckets. If 1 Xhr (i),r = 1 for at least 2(1−θ fraction of r ∈ Ri , then 2) 2 |xi − x̂i | ≤ median Wh2r (i),r r  ≤ quant r∈Ri Wh2r (i),r , 1 2(1 − θ2 )  ≤   kxT c k22 ≤ kx−k k22 16k 16k as desired. The claimed result would follow from a bound on the probability that there exist at most θ11 k 1 elements i ∈ T 0 such that Xhr (i),r = 1 for at most a 2(1−θ fraction of r ∈ Ri . Observe that Wb,r are 2) 22 independent since the earlier conditioning has fixed the hash functions. It follows from a Chernoff bound that   X |Ri |  θ6 δ 2/(θ6 k) Xhr (i),r ≥ ≤ , p := P  2(1 − θ2 )  8cT r∈Ri provided that cR is large enough. In expectation there are |T 0 |p ≤ θ6 kδ 2/(θ6 k) /8 elements in T 0 with bad estimates. Another Chernoff bound over i ∈ T 0 gives the overall failure probability at most δ. The total number of missed candidates is at most (θ1 + θ6 )|T |. These two parts together will give us a weak `2 /`2 system. We conclude with: Theorem 26. There exists a randomized construction of a matrix M with O(( k + 1 log 1δ ) log nk )  rows, which with probability 1−δ is a (k, ζ, ) weak `2 /`2 system. The column sparsity is O d k1 ln 1δ e log nk . Proof. The matrix M is the concatenation of the matrix of a (k, ζ/2)-weak identification system with the (O(k/), δ/2, )-guarantee and the estimation matrix in Lemma 25 (where δ is replaced with δ/2 and ζ with ζ/2). The weak identification system, by Lemma 24, returns a set T of candidate indices which misses at most ζ2 k elements of Hk, (x), with probability at least 1 − 2δ . Then by Lemma 25 the estimation process gives ‘bad’ estimates to at most ζ2 k elements in T with probability at least 1 − 2δ . Then we truncate x̂ to the largest k coordinates. The claim then follows from the same argument for [PS12, Lemma 4] or [GLPS17, Theorem 14], with the only change as follows: if some i ∈ Hk, (x) with a good estimate is replaced with some j 6∈ Hk, (x) with a good estimate, it then p follows from the good estimate guarantee that µ ≤ xi ≤ 5µ/4 and 3µ/4 ≤ xj ≤ µ, where µ = /kkx−k k2 . Thus |x̂j − xi | ≤ |x̂j − xj | + |xj − xi | ≤ µ/4 + µ/2 = 3µ/4 and there are at most k such replacements, which introduces squared `2 error into ẑ of at most k(3µ/4)2 ≤ (9/16)kx−k k22 . Finally, the overall success probability is at least 1 − δ. 5.2 Overall algorithms In this section we show how to combine different weak `2 /`2 systems with the existing algorithms presented in Section 3.1, to get our desired algorithm. Theorem 27.  There exists a recovery system A = (D,R) which satisfies the `2 /`2 guarantee with  − k  3 parameters n, k, , O k log nk , e log3+γ k + ( nk )− log k . Moreover, R runs in O k log3 n time, where γ > 0 is an arbitrary constant and the constant in the O-notations depends on γ. Proof. Let ` = bC log log kc for some absolute constant C such that 3` = log3+γ k. We shall pick ` weak systems W1 , . . . , W` using Theorem 26. For 1 ≤ i ≤ ` we pick Wi with parameters ( 3ki , 13 , 2i ) ck k and failure probability e− 3i . Then we invoke Theorem 1 for K = 1 log3+γ and δ = n− log k to obtain k a matrix A. Lastly, we obtain a matrix B using Theorem 3 by setting K = k and c = log( nk ). Our randomized matrix is then the vertical concatenaton of all Wi with A and B. Observe that the total number of rows is O( k log nk ) and the column sparsity is O(log n · log k). For i = 1, . . . , ` with x(1) = x we run the algorithm of the weak-system on Wi x(i) to find a vector r(i) . Then we set x(i+1) ← x(i) − r(i) and observe that Wi x(i+1) = Wi (x(i) − r(i) ) = Wi x(i) − Wi r(i) , which can be computed in O(k log n) time. After ` iterations we run the algorithm of ExpanderSketch guaranteed by Theorem 1 on vector x(`+1) with matrix A to get candidate set T . We then set 23 S←T∪ ` [ supp(r(i) ). i=1 We observe that previous analyses, such as [GLPS12], immediately imply that kxS k22 ≤ (1 + )kx−k k22 . We are now exactly in the situation of estimating the vector xS , which be done using the set query algorithm from [Pri11] on matrix B with set S to obtain x̂. Then x̂ satisfies kx − x̂k2 ≤ kx − xS k2 + kxS − x̂k2 ≤ (1 + O())kx−k k2 . This finishes the proof of our theorem. We move on with the next theorem, which can be compared with the result in [GNP+ 13]. Theorem 28. There exists an recovery system  A = (D, R) which satisfies the `2 /`2 guarantee   − k3  k n with parameters n, k, , O  log k , e log k . Moreover, R runs in O k 2 log1+γ ( nk ) time, for any constant γ. Proof. Let ` = dlog3 ke + 1 and we shall pick ` weak systems W1 , . . . , W` . Let C be a constant such that C log log k = log3 k. For 1 ≤ i ≤ C log log k we pick Wi with parameters ( 3ki , 13 , 2i ) and target ck failure probability e− 3i . For C log log k + 1 ≤ i ≤ ` we pick Wi with parameters ( 3ki , 13 , log k ) with 3 target failure probability e−k/ log k . i Number of Measurements. For i ≤ C log log k, each Wi takes k( 23 )i log 3kn measurements,   k 1 3i n which sum up to O k log nk . For i > C log log k, each Wi takes O k ( log + ) log = k 3i log2 k    i O  logk 2 k log 3kn measurements (by our choice of C), which sum up to O k log nk . The overall  number of measurements is therefore O k log nk . i Column Sparsity. The column sparsity of Wi is O(log nk ) for i ≤ C log log k and O( log33 k log nk ) for i > C log log k. Thus the overall column sparsity is O( logk3 k log nk ). Runtime. For i = 1, 2, . . . , ` with x(1) = x we run the algorithm of the weak-system on Wi x(i) to find a vector r(i) . Then we set x(i+1) ← x(i) − r(i) and observe that Wi x(i+1) = Wi (x(i) − r(i) ) = Wi x(i) − Wi r(i) . A standard analysis as in [GLPS12] gives the desired result. The next theorem is an improvement on the main result in [GNP+ 13]. Our algorithm achieves the optimal dependence on  and better failure probability, using Theorem 4 for identification and Lemma 25 for estimation. The improvement primarily comes from two changes: (i) an improved analysis of Count-Sketch, namely Lemma 25, and (ii) better choice of parameters of the weak system in each iteration, which are set identically to those in the proof of Theorem 28. Theorem 29. Suppose that k = nΩ(1)  . There exists a recovery  system A = (D, R) which satisfies k k n n − log k the `2 /`2 guaranteee with parameters n, k, ,  log k , ( k ) . Moreover, R runs in O( 1 k 2 poly(log n)) time. Proof (Sketch). The proof is the same as before but for identification instead of using a weak system we invoke Theorem 4 to find a set S such that |Hk/,1 (x) \ S| ≤ (1/2)k/. Accurate estimates of them can be found using Lemma 25. Repeating the same proof as before, but iterating log(k/) times we get the desired result. 24 6 Adaptive Sparse Recovery 6.1 1-sparse Adaptive Compressed Sensing Lemma 30 ([IPW11, Lemma 3.2]). Let x ∈ Rn and suppose that there exists a j with |xj | ≥ 2 C Bδ2 kx[n]\{j} k2 for some constant C and parameters B and δ. With two non-adaptive measurements, with probability 1 − δ we can find a set S ⊂ [n] such that (i) j ∈ S; (ii)kxS\{j} k2 ≤ 1 n B kx[n]\{j} k2 and (iii) |S| ≤ 1 + B 2 . The authors in [IPW11] apply the aforementioned lemma O(log log n) times with appropriate parameters and obtain an algorithm with O(log log n) measurements. However, their approach gives only constant success probability. We shall show how to boost the success probability, by first running a preconditioning algorithm and then applying their Lemma with similar parameters as they do (not exactly the same though). We first prove the following lemma, which will serve as a preconditioning. Lemma 31. Let x ∈ Rn and suppose that there exists a j with |xj | ≥ 5kx[n]\{j} k2 . Then there exists a scheme that uses Ob,c (log log n) measurements and with probability 1− log1c n finds a set S of size logn n such that (i) j ∈ S and (ii) kxS\{j} k2 ≤ log1b n kx[n]\{j} k2 , where b, c are absolute constants which can be made arbitrarily large. Proof. We assume that the coordinates of x are randomly permuted because we can apply a random permutation π to the vector x, then find a set S satisfying the conditions of the lemma, and at the end compute π −1 (i). Let enc : {0, 1}α log log n → {0, 1}C0 log log n be the encoding function of an error-correcting code E that corrects a 0.45-fraction of errors, where α is a constant. Such codes exist, see, e.g., [Spi96]. Denote by encb (i) the b-th bit of enc(i). Define trunc : [n] → {0, 1}α log log n to be a function such that trunc(i) equals the first α log log n bits in the binary representation of i. Let also σ : [n] → {+1, −1} be a 2-wise independent hash function. Then we perform the following 2·C0 log log n measurements: X X Vb,0 = σi xi , Vb,1 = σi xi , i:encb (trunc(i))=0 i:encb (trunc(i))=1 for all b = 1, . . . , C0 log log n. We form a binary string r of length C0 log log n as follows: for each b = 1, . . . , C0 log log n, rb = 1 if |Vb,1 | > |Vb,0 | and rb = 0 otherwise. At the end we find in the error-correcting code E the closest codeword to r, say r0 . Define S to be the set of all i such that trunc(i) = r0 . We now show correctness. Let J = enc(trunc(j)) and for q = 0, 1 let Ib (q) = {i : encb (trunc(i)) = q}. Observe that X 2 E[Vb,J ] = x2j + b x2i , i∈Ib (Jb )\{j} and X 2 E[Vb,J ]= b x2i . i∈Ib (Jb ) Observe that by Markov’s inequality,   X P x2i ≥ 5 xIb (Jb )\{j}  i∈Ib (Jb )\{j} 25   2 2 ≤ 1 5 and  P 2 Vb,J b ≥ 5 xIb (Jb ) It follows that with probability at least 3/5, √ |Vb,Jb | ≥ |xj | − 5 xIb (Jb )\{j} 2 ≥ 2  2 √ 1 ≤ . 5 5 xIb (Jb ) 2 ≥ Vb,Jb . This means that, by a Chernoff bound, the string r will agree with Jb at least in a 0.55-fraction 1 of positions with probability at least 1 − logγC , where γ is an absolute constant. Applying 0 n the decoding algorithm of E we can recover trunc(j). Observe now that our set S has lognα n coordinates. Since we assumed that the order of elements in x is random, we have that EkxS\{j} k22 = Ekxi6=j:trunc(i)=trunc(j) k22 = log1α n kx[n]\{j} k22 . It follows from Markov’s inequality that kxS\{j} k22 ≥ 1 1 1 a/2 kx[n]\{j} k2 with probability at most α/2 . Hence the overall failure probability is logγC0 n + log n 1 logα/2 n log n . This concludes the proof of the lemma. We are now ready to state and prove the main theorem of this section. Theorem 32. Let x ∈ Rn and suppose that there exists j such that |xj | ≥ Ckx−k k2 . Then, there exists an algorithm OneSparseRecovery that performs O(log log n) measurements in O(log log n) rounds, and finds j with probability 1 − log1c n , where c > 0 is some absolute constant. Proof. We first apply Lemma 31 on vector x and obtain a set S and then follow the approach in [IPW11] for xS . Consider now the following sequence of parameters: 1 . logc n Let r be the first index such that Br ≥ n. For each i = 1, . . . , r, we apply Lemma 30 to xSi−1 with parameters B = Bi and δ = δi and obtain a set Si , where S0 is taken to be the set S. It is easy B2 to see that r = O(log log n). We will inductively prove that at all steps |xj | ≥ δ2i kxSi k2 . The base case follows immediately from Lemma 31. By the induction step, at step i we find a set Si such δi2 B2 1 1 kxSi−1 k2 ≤ Bi−1 |xj | or, equivalently, |xj | ≥ δ2i kxSi k2 . After r iterations, that kxSi k2 ≤ Bi−1 B2 3 B0 = 2, 2 Bi = Bi−1 , δ= i−1 |Sr | ≤ 1 + n/Br2 < 2 and thus we have uniquely identified j. The overall failure probability is at most log1c n +rδ ≤ 1c0 log n for some c0 > 0. The overall number of measurements is O(log log n), since in every round we use 2 measurements, plus O(log log n) measurements for the application of Lemma 31 at the very beginning. 6.2 6.2.1 k-sparse recovery Results Theorem 33 (`2 /`2 in whole regime of parameters). Let x ∈ Rn and γ > 0 be a constant. There exists an algorithm that performs O((k/) log log(n/k)) adaptive linear measurements on x in O(log∗ k · log log(n/k)) rounds, and finds a vector x̂ ∈ Rn such that kx − x̂k22 ≤ (1 + )kx−k k22 . The algorithm fails with probability at most exp(−k 1−γ ). Theorem 34 (`∞ /`2 in low sparsity regime). Let x ∈ Rn and parameters k,  such that k/ ≤ c poly(log n). There exists an algorithm that performs O((k/) log log n) adaptive linear measurements on x in O(log log n) rounds, and finds a vector x̂ ∈ Rn such that kx − x̂k∞ ≤ k kx−k/ k2 . The algorithm fails with probability at most 1/ poly(log n). 26 We note that the low sparsity regime result not only improves failure probability but also gives a stronger guarantee (`∞ /`2 instead of `2 /`2 ) in even fewer rounds. 6.2.2 Whole Regime of Parameters We first remind the reader the following additive form of the Chernoff bound. Lemma 35 (Chernoff bound, additive form). Suppose that X1 , . . . , XN are i.i.d. random variables taking values in {0, 1}. Let p = E[Xi ] and q > p. Then ( n ) X P Xi ≥ N q ≤ exp(−D(qkp)N ), i=1 where D(qkp) = −q log 1−q q − (1 − q) log . p 1−p Let γ  1 be an absolute constant and T be a constant depending only on γ. Let a sequence γ0 , γ1 , . . . , γT be a decreasing arithmetic progression such that γ0 = 0.9 and γTγ = γ. Let also C be an absolute constant. The algorithm finds a constant fraction of heavy coordinates of x by hashing all coordinates to a number of buckets. Then it observes their values, subtracts them from x and iterates by changing (k, , B) parameters. The way these parameters change is crucial in obtaining the desired low failure probability. We split the algorithm in three different phases. Let φ ∈ {1, 2, 3} be the variable corresponding to the phase the algorithm is in. The overall algorithm is presented in (φ) (φ) Algorithm 2. In the r-th round of phase φ, we pick for each r ∈ [Rr ] an O(kr )-wise hash functions (φ) (φ) hr,j : [n] → [C 0 kr /(φ) ], where C 0 is a large absolute constant, and run the 1-sparse recovery algorithm in each bucket induced by the hash functions, as illustrated in HashAndRecover function below. function HashAndRecover(x, k, , R) for j = 1 to R do 0 Pick an S O(k)-wise independent hash function hj : [n] → [C k/] Sj ← l∈[C 0 k/] OneSparseRecovery(xh−1 (l) ) j end forS return j∈[R] Sj end function We need the following lemma. Lemma 36. In each phase and every round r, it holds with probability at least 1 − exp(−Ω(k 1−γ )) (φ) that Hk(φ) ,(φ) (xJ¯) ≤ kr+1 . r r Proof. Define the following events. (1) • Bj,r,l : |{i ∈ [n] : hr,j (i) = l}| > 1 (2) • Bj,r,l : kx{i∈[n]:hr,j (i)=l} k22 ≥ (1) C 00 r 2 kr kxC 0 tail(kr ) k2 (2) • Bi,r,j : ∃j ∈ [C 0 Bkrr ] : Bj,r,hr,j (i) or Bj,r,hr,j (i) 27 Algorithm 2 Adaptive sparse recovery algorithm J ←∅ for r = 0 to log log k − 1 do (0) kr ← 2kr (0) r ←  · ( 34 )r (0) Rr ← C (0) (0) (0) J ← J ∪ HashAndRecover(xJ¯, 1, kr , r , Rr ) end for for r = 0 to log∗ k γ do (2) k kr ← (2↑↑r)·log k (1) r ←  (2) Rr ← C log k (1) (2) (2) J ← J ∪ HashAndRecover(xJ¯, 2, kr , r , Rr ) end for for r = 0 to T do (3) kr ← k γr (3) r ←  (3) Rr ← Ck 1−γr (3) (3) (3) J ← J ∪ HashAndRecover(xJ¯, 3, kr , r , Rr ) end for return xJ We define indicator variables Xi,r,j for the event Bi,r,j . Observe that Xi,r,j are negatively dependent. We split the analysis in the three phases, depending on the round r. It is essentially an inductive argument on r. The base case in each phase is easy to verify and we shall show only the inductive step below. • Phase 1 (0 ≤ r ≤ log log k − 1): Fix a hash function hr,j . A standard argument shows that EXi,r,j ≤ C10 . The probability that event Bi,j,r holds equals   kr   Rr kr+1 P {∃S ⊆ Hkr ,r (x), |S| ≥ kr+1 : Xi,r,j = 0, ∀i ∈ S, j ∈ Rr } ≤ C0 kr+1   k ≤ exp −c1 r 2   k ≤ exp −c1 log k • Phase 2 (0 ≤ r ≤ log∗ k γ ): For a coordiante i, p = P{Xi,r,j = 0 ∀j ∈ [Rr ]} =   Rr C0 After applying a negative association argument, more than kr+1 heavy hitters are unrecovered with probability, by the additive form of Chernoff bound, at most (note that kr+1 /kr = 2 ↑↑ 28 r/2 ↑↑ (r + 1) ≥ 1/k γ > 3p) !  !     kr+1 1−p kr+1 kr+1 p · kr ≤ exp −kr+1 log · exp −D − kr log 1 − kr kr p 1 − kr+1 kr kr   1−p kr ≤ exp −kr+1 log + kr+1 + kr+1 log p kr+1   1 ≤ exp −c2 kr+1 log p   1 0 1−γ . ≤ exp −c2 k log  • Phase 3 (0 ≤ r ≤ T ): In this phase kr = k γr . When r < T , similarly to Phase 2, we have that more than kr+1 heavy hitters are unrecovered with probability at most     γ −γ 1 1 0 1− 0T exp −c3 kr+1 log ≤ exp −c3 k log . p  In the last step, i.e. r = T , for a coordinate i, P {Xi,r,j = 0 ∀j ∈ [Rr ]} ≤ exp(−c4 k 1−γ ). This allows us to take a union bound over all i ∈ HkT , (xr−1 ), so in this step we will recover all of them with probability 1 − exp(−c04 k 1−γ ). The proof of the lemma is complete. 6.2.3 Low-Sparsity Regime We will need the following lemma, which is standard in the sparse recovery and streaming algorithms literature. Lemma 37. Let x ∈ Rn and F = {F1 , . . . , FU } be a partition of [n]. For a set S ⊆ [n] define F (S) = S i∈Fj Fj . There exists an algorithm that performs O((k/) log |U |) non-adaptive measurements and with probability 1 − |U |−c finds a set T ⊆ [U ] of size O(k) such that F (Hk, (x)) ⊆ T . Proof Sketch. For each r = 1, . . . , log |U | we pick a 2-wise independent hash function hr : [U ] → [Ck], for some absolute constant C and a 2-wise independent hash function σr : [n] → {+1, −1}. Then, for every r ∈ [log |U |] and j ∈ [Ck] we perform measurement yj,r = X X σi,r xi . t∈[U ]:hr (t)=j i∈Ft For every j ∈ U we compute ẑj = median yhr (j),r 1≤r≤log k and find the largest C0 k indices with the biggest ẑ values in magnitude, forming a set T . We then output T . We are now ready to prove our main result in the low-sparsity regime, Theorem 34. 29 Proof of Theorem 34. Pick a hash function h : [n] → [logc0 n], where c0 is a large absolute constant. 1 −1 Observe that with probability 1 − poly(log n) every h (p) contains at most 1 element of Hk, (x). Let Fgood = {h−1 (p) : |h−1 (p) ∩ Hk, (x)| = 1}. Then we can invoke Lemma 37 and obtain a set S of size 1 O(k) which with probability 1 − poly(log n) is a superset of Fgood . The number of measurements we 1 need is O(  k · log log n). We then run the 1-sparse recovery algorithm guaranteed by Theorem 32 in each Fp ∈ Fgood , for a total of O( 1 k · log log n) measurements in O(log log n) rounds. Since 1 every 1-sparse recovery routine succeeds independently with probability 1 − poly(log n) we get that all of them succeed with the desired probability and hence we can obtain a set S containing all elements of Hk, (x). By observing them directly in another round, we can obtain their values and thus achieve the `∞ /`2 guarantee. 7 Spiked-Covariance Model In the spiked covariance model, the signal x is subject to the following distribution: we choose k coordinates uniformly at random, say, ik . First construct a vector y ∈ Rn , in which each yki pi1 , . . . , p is a uniform Bernoulli variable on {− /k, + /k} and these k coordinate values are independent of each other. Then let z ∼ N (0, n1 In ) and set x = y + z. We now present a non-adaptive algorithm (although the runtime is slow) that uses O((k/) log(n/k) + (1/) log(1/δ)) measurements and a matching lower bound. Theorem 38. Assume that (k/) log(1/δ) ≤ βn, where β ∈ (0, 1) is a constant. There exists an  k n 1 1 `2 /`2 algorithm for the spiked-covariance model that uses O  log k +  log δ measurements and succeeds with probability ≥ 1 − δ. Here the randomness is over both the signal and the algorithm. q  log(1/δ) Proof. First note that the maximum magnitude in z is O with probability ≥ 1 − δ, n p which is smaller than /k given the assumption on k. Condition on this event. Furthermore, n−k 2 with probability ≥ 1 − e−Ω(n) , it holds that (1 − η) n−k n ≤ kx−k k2 ≤ (1 + η) n . Further condition on this event. We essentially repeat Lemma 25 with T = [n]. That is, we estimate q each coordinate, discard p p the estimates outside the range [(1 − γ) k , (1 + γ) k ], where γ = α (1 + η)(1 − nk ), and retain only the top k coordinates. To accommodate the larger size of T , the number of repetitions needs  1 1 k n 1 1 to be R = cR (log n k + k log δ ), so the total number of measurements is O  log k +  log δ as claimed. Next we show correctness. With probability ≥ 1 − δ, the top k items we retain p contain at least (1−θ)k elements of Hk (x), and the estimation error of each of them is at most β /kkx−k k2 . Hence these elements survive the thresholding. In total these well-recovered heavy hitters contribute at most β 2 kx−k k22 to the approximation error. For the remaining heavy hitters,pthey could be (i) unrecovered, (ii) replaced by p spurious ones with magnitude bounded by (1 + γ) /k, or (iii) have estimation error at most γ /k. Hence they contribute to the residual energy (squared `2 norm) at most (1 + γ)2 θ in total. Therefore we conclude that  kx̂ − xk22 ≤ 1 + (β 2 + (1 + γ)2 θ) kx−k k22 . Remark 39. The algorithm above runs in time Õ(n). Alternatively, when k = nΩ(1) , we can invoke Theorem 4 to identify a constant fraction of the heavy hitters and then estimate them as  before. Overall it uses O k log nk + 1 log 1δ measurements and succeeds with probability at least 1 − δ. The error guarantee follows similarly as in the proof above. This alternative algorithm uses 30 the optimal number of measurements when  is a constant (and only slightly more measurements in the general case) but runs significantly faster in time O(k 1+α poly(log n)). We prove a matching lower bound to conclude this section. Theorem 40. Suppose that δ < δ0 for a sufficiently small absolute constant δ0 ∈ (0, 1) and   n ≥ 64−1 log(6/δ) . Then any `2 /`2 -algorithm that solves with probability ≥ 1 − δ the `2 /`2 problem in the spiked-covariance model must use Ω(−1 log(1/δ)) measurements. Proof. The lower bound proved in Theorem 23 corresponds to the case of k = 1 in the spiked covariance model. We can follow exactly the same notation and proof for the case of k = 1 for general k. Doing so, we arrive atPthe point that p we need to bound the total variation distance between N (0, Ir ), and N (0, Ir ) + i∈supp(y) (3 n/k)Si σi , where σi are random signs. Note that q p P ≤ S σ 10(k/n)kSk2F = 10kr/n with constant probability, and thus one must i∈supp(y) i i 2 √ distinguish N (0, Ir ) and N (0, Ir )+O( r)v for a unit vector v with probability 1−Θ(δ). Now we can rotate v to the first standard unit vector e1 as before, to conclude that the same Ω((1/) log(1/δ)) lower bound continues to hold for k > 1. References [BIPW10] Khanh Do Ba, Piotr Indyk, Eric Price, and David P. Woodruff. Lower bounds for sparse recovery. In Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, Austin, Texas, USA, January 17-19, 2010, pages 1190–1197, 2010. [CCFC04] Moses Charikar, Kevin Chen, and Martin Farach-Colton. Finding frequent items in data streams. Theoretical Computer Science, 312(1):3–15, 2004. [CH08] Graham Cormode and Marios Hadjieleftheriou. Finding frequent items in data streams. Proceedings of the VLDB Endowment, 1(2):1530–1541, 2008. [CM05] Graham Cormode and Shan Muthukrishnan. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms, 55(1):58–75, 2005. [CRPW10] V. Chandrasekaran, B. Recht, P. A. Parrilo, and A. S. Willsky. The Convex Geometry of Linear Inverse Problems. ArXiv e-prints, 2010. [Gan08] Sumit Ganguly. Data stream algorithms via expander graphs. In International Symposium on Algorithms and Computation, pages 52–63. Springer, 2008. [GG11] Subhankar Ghosh and Larry Goldstein. Concentration of measures via size-biased couplings. Probability Theory and Related Fields, 149(1):271–278, 2011. [GLPS12] Anna C Gilbert, Yi Li, Ely Porat, and Martin J Strauss. Approximate sparse recovery: optimizing time and measurements. SIAM Journal on Computing, 41(2):436–453, 2012. [GLPS17] Anna C. Gilbert, Yi Li, Ely Porat, and Martin J. Strauss. For-all sparse recovery in near-optimal time. ACM Trans. Algorithms, 13(3):32:1–32:26, 2017. [GM06] S. Ganguly and A. Majumder. CR-precis: A deterministic summary structure for update data streams. eprint arXiv:cs/0609032, 2006. 31 [GNP+ 13] Anna C Gilbert, Hung Q Ngo, Ely Porat, Atri Rudra, and Martin J Strauss. `2 /`2 foreach sparse recovery with low risk. In International Colloquium on Automata, Languages, and Programming, pages 461–472. Springer, 2013. [Gor41] Robert D. Gordon. Values of mills’ ratio of area to bounding ordinate and of the normal probability integral for large values of the argument. Ann. Math. Statist., 12(3):364– 366, 09 1941. [GSTV06] A. C. Gilbert, M. J. Strauss, J. A. Tropp, and R. Vershynin. Algorithmic linear dimension reduction in the `1 norm for sparse vectors, volume 3, pages 1411–1418. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, 2006. [GUV09] Venkatesan Guruswami, Christopher Umans, and Salil Vadhan. Unbalanced expanders and randomness extractors from parvaresh–vardy codes. Journal of the ACM (JACM), 56(4):20, 2009. [IPW11] Piotr Indyk, Eric Price, and David P Woodruff. On the power of adaptivity in sparse recovery. In Foundations of Computer Science (FOCS), 2011 IEEE 52nd Annual Symposium on, pages 285–294. IEEE, 2011. [JST11] Hossein Jowhari, Mert Sağlam, and Gábor Tardos. Tight bounds for lp samplers, finding duplicates in streams, and related problems. In Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 49–58. ACM, 2011. [KNPW11] Daniel M Kane, Jelani Nelson, Ely Porat, and David P Woodruff. Fast moment estimation in data streams in optimal space. In Proceedings of the forty-third annual ACM symposium on Theory of computing, pages 745–754. ACM, 2011. [LNNT16] Kasper Green Larsen, Jelani Nelson, Huy L Nguyen, and Mikkel Thorup. Heavy hitters via cluster-preserving clustering. In Foundations of Computer Science (FOCS), 2016 IEEE 57th Annual Symposium on, pages 61–70. IEEE, 2016. [LT91] Michel Ledoux and Michel Talagrand. Probability in Banach spaces. Springer-Verlag, Berlin, 1991. [McG07] Andrew McGregor. Open problems in data streams and related topics: Iitk workshop on algorithms for data streams, 2006, 2007. [NNW12] Jelani Nelson, Huy L. Nguyên, and David P. Woodruff. On deterministic sketching and streaming for sparse recovery and norm estimation. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 15th International Workshop, APPROX 2012, and 16th International Workshop, RANDOM 2012, Cambridge, MA, USA, August 15-17, 2012. Proceedings, pages 627–638, 2012. [NPR11] Hung Q Ngo, Ely Porat, and Atri Rudra. Efficiently decodable error-correcting list disjunct matrices and applications. In International Colloquium on Automata, Languages, and Programming, pages 557–568. Springer, 2011. [Pol] D. Pollard. “Chapter 3: Total Variation Distance Between Measures”. http://www. stat.yale.edu/~pollard/Courses/607.spring05/handouts/Totalvar.pdf. 32 [Pri11] Eric Price. Efficient sketches for the set query problem. In Proceedings of the twentysecond annual ACM-SIAM symposium on Discrete Algorithms, pages 41–56. Society for Industrial and Applied Mathematics, 2011. [PS12] Ely Porat and Martin J. Strauss. Sublinear time, measurement-optimal, sparse recovery for all. In Proceedings of the Twenty-third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’12, pages 1215–1227, 2012. [PW11] E. Price and D. P. Woodruff. (1 + )-approximate sparse recovery. In 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pages 295–304, Oct 2011. [Spi96] D. A. Spielman. Linear-time encodable and decodable error-correcting codes. IEEE Transactions on Information Theory, 42(6):1723–1731, 1996. [V+ 12] Salil P Vadhan et al. Pseudorandomness. Foundations and Trends R in Theoretical Computer Science, 7(1–3):1–336, 2012. 33
8cs.DS
Impact of different time series aggregation methods on optimal energy system design Leander Kotzura,∗, Peter Markewitza , Martin Robiniusa , Detlef Stoltena,b a Institute of Electrochemical Process Engineering (IEK-3), Forschungszentrum Jülich GmbH, Wilhelm-Johnen-Str., 52428 Jülich, Germany b Chair for Fuel Cells, RWTH Aachen University, c/o Institute of Electrochemical Process Engineering (IEK-3), Forschungszentrum Jülich GmbH, Wilhelm-Johnen-Str., 52428 Jülich, Germany arXiv:1708.00420v1 [math.OC] 1 Aug 2017 Abstract Modelling renewable energy systems is a computationally-demanding task due to the high fluctuation of supply and demand time series. To reduce the scale of these, this paper discusses different methods for their aggregation into typical periods. Each aggregation method is applied to a different type of energy system model, making the methods fairly incomparable. To overcome this, the different aggregation methods are first extended so that they can be applied to all types of multidimensional time series and then compared by applying them to different energy system configurations and analyzing their impact on the cost optimal design. It was found that regardless of the method, time series aggregation allows for significantly reduced computational resources. Nevertheless, averaged values lead to underestimation of the real system cost in comparison to the use of representative periods from the original time series. The aggregation method itself e.g., k-means clustering plays a minor role. More significant is the system considered: Energy systems utilizing centralized resources require fewer typical periods for a feasible system design in comparison to systems with a higher share of renewable feed-in. Furthermore, for energy systems based on seasonal storage, currently existing models integration of typical periods is not suitable. Keywords: Energy systems, Renewable energies, Mixed integer linear programming, Typical periods, Cluster analysis, Extreme periods, Time-series aggregation 1. Introduction Developing an energy system design that minimizes costs and environmental impact is a complex task due to the spatial and temporal gap between energy production and demand. In consequence, optimization algorithms are required for solving these design problems [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11]. However, the algorithms used hitherto are computationally demanding: The size of the input data directly influences that of the related optimization problem, and with it the requirement for processing resources. For this reason, it is often necessary to simplify the design problem in advance. Therefore, different options for complexity reduction exist and include: Spatial aggregation which reduces the number of nodes in an energy system network [12]; simplifying the technology models by reducing nonlinearities or discontinuities so as to avoid non-convexity of the program [13, 14]; and temporal aggregation, which creates typical periods representing the original input time series. The creation of recurring periods is popular because of the existing patterns in the hourly, daily and seasonal variation for the majority of design relevant time series. ∗ Corresponding Therefore, it is reasonable to reduce redundant data until the minimal representative data set required for the problem is reached. Figure 1 visualizes this redundancy by showing the result of a Fast Fourier Transformation (FFT) of different time series that are typically required for an energy system design. The frequencies with the highest amplitudes are highlighted and are, as anticipated, the daily and annual variations. For this reason, many different methods for the selection of typical periods have been presented. Aside from custom exact optimization methods [17, 18], and graphical methods [19], the majority use heuristic methods or greedy clustering algorithms for the aggregation of typical periods. Creating representative days by averaging time series, for example over a type of day defined by month or weekday, has been popular [20, 21, 22, 23]. [24] refers to it as time-chronological averaging. Recent attempts use the k-means clustering [25, 26, 27, 28], hierarchical clustering [29, 30], or k-medoids clustering - either based on a greedy algorithm [31, 32] or an exact solution of a MILP [33, 34] - for the selection of typical periods. Nevertheless, each method is applied to a different system and it is difficult to identify which is the most suitable. While Schuetz et al. [35] compare methods for building energy systems, they note that future research should focus on author. Email: [email protected] Preprint submitted to arXiv.org August 2, 2017 Nomenclature Variables f Index of the Transformer class δ Binary variable determining the existance of a technology n Index of the Collector class q Index of the Source/Sink class µ Representative values of a typical period s Index of the Storage class D Scaling of a device a Attribute represented by a time series E Energy flow between two components SOC State of charge d Considered device or technology y Binary variable determining if the candidate is a cluster center g Time step index inside a period i Candidate period index k Typical period index t Time step index of the full series z Binary variable determining candidate cluster assignment Parameters Abbreviations ∆t Duration of a single time step CRF Capital Recovery Factor η Efficiency LB Lower bound τ Lifetime UB Upper bound C Set of periods inside a cluster L Set of component connections N Size of an index set x Normalized candidate value CAPEX Specific capital expenditure Combined Heat and Power plant GHI Global Horizontal Irradiance OPEX Specific fix operational expenditure RMSE Root Mean Squared Error Subscripts and sets  CHP Energy type WACC Weighted Average Cost of Capital the appropriateness of clustering algorithms for different design applications. Moreover, the period length should be varied so as to assess the impact of storage effects. A further difficulty is that the system considered determines the minimal required dataset. For renewable energy systems, a higher resolution of the input times-series is required than with their fossil counterparts [36]. For conventional system design, it could be sufficient to reduce the dataset to a few time steps [27], while for a storage based system design different typical weeks are required [37, 30]. In summary, the following open research questions present themselves: • Which time-series aggregation method is best suited for which energy system design application? • What is the minimum number of aggregated time steps to model such a system? tering, k-medoids clustering and hierarchical clustering as aggregation method are presented in section 2, where the possibilities of adding extreme periods are also discussed. In section 3, the aggregation methods are used to select four typical days of different time series that could be relevant for an energy system design. The aggregated profiles are then graphically analyzed and through accuracy indicators. In the following, the different methods are applied in section 4 to three design optimization problems of a heat and electricity supply system: 1. A cogeneration unit with a heat storage as benchmark system 2. A residential system based, amongst other elements, on photovoltaics and a heatpump 3. An island system with a high share of renewables with the support of different storage technologies To validate the methods, the results for different numbers of typical periods are compared to the optimal solution of the original optimization problems with the full time series and analysed in terms of their accuracy and computational load. Sections 5, 6 and 7 summarize, draw the principal • What is an appropriate period length - typical days or typical weeks? To answer these, this paper is structured as follows: First different deterministic methods including k-mean clus2 Amplitude Wind [m/s] Amplitude Temp. [ C] Amplitude GHI [W/m2] 0 24 h 8758 h 102 100 10 2 Figure 2: Different steps in the procedure of time series aggregation. 8758 h 101 10 1 10 3 8758 h 100 10 2 10 4 24 h 2.1. Pre-processing the time-series First, the input data is normalized in terms to evalu0 ate all time series on the same scale. Each time series xa represents an attribute a ∈ {1, ..., Na } e.g., an electrical demand profile or the measured solar horizontal irradiance at a certain location. The time series itself consists of raw 0 data points xa,t where t ∈ {1, ..., Nt } constitutes a single time step. Different possibilities for normalization and standartization are presented by Rager and Maréchal [31]. In this work, the normalized time series xa are calculated as follow 584 h Amplitude E-Load House [kW] 0 100 10 2 10 4 24 h 8758 h xa = 0 xa − min xa max x0a − min x0a ∀ a ∈ {1, ..., Na }, (1) which results in time series on the same scale xa,t ∈ [0, 1]. 10 4 10 3 10 2 10 1 Figure 1: Fast Fourier Transformation of the Global Horizontal Irradiance (GHI) , the temperature and the wind speed of a test reference year (Location: Bad Marienberg, Germany) [15] and a representative electrical load profile of a residential building (Profile 1) [16] conclusions and give an outlook for further research questions. All methods introduced are published in the Python package tsam - Time Series Aggregation Module and can be easily applied and extended. Figure 3: Illustration of the nomenclature for a time series a = 1 with two candidate periods i = 1, 2 for a whole period. 2. Time series aggregation methods For the aggregation of typical periods, the scaled timeThe aim of time series aggregation is to merge a set series are arranged into the candidate periods considered of periods into groups such that the group members - the i ∈ {1, ..., Ni } , each consisting of the same number of time original periods - are as similar as possible. The group is steps g ∈ {1, ..., Ng } with Na attributes. The nomenclathen represented by a single period. The grouping of timeture is illustrated in Figure 3 where the normalized timeseries is based in the most of the methods on a distance series of attribute a = 1 is shown for two periods i = 1, 2, measure of the attributes between each group member. which were originally successive. For an accurate grouping, the raw input data must first This reordering results in a matrix L in which the numbe pre-processed into the right format (Section 2.1). On ber of columns is defined by the multiple of the number of the basis of this, an aggregation method is then applied period time steps Ng and number of attributes Na . The to create the groups (Section 2.2). In terms of achieving number of rows corresponds to the number of periods Ni : a feasible system design, different variants of integrating   extreme periods can be included afterwards (Section 2.3). x1,1,1 · · · x1,Ng ,1 x2,1,1 · · · xNa ,Ng ,1 Finally, the aggregated time series must be scaled back   .. .. .. .. .. ..  (2) . . such that their average values fit the average values of theL =  . . . . original time series (Section 2.4). x1,1,Ni · · · x1,Ng ,Ni x2,1,Ni · · · xNa ,Ng ,Ni The general procedure for time series aggregation apA single row, described by vector x i represents a canplied in this paper is shown in Figure 2. didate period, also referred to as an observation point. 3 For example: Pre-processing two hourly time series over a year (Nt = 8760), like the mentioned electrical demand profile and the measured solar horizontal irradiance (Na = 2), for the application of a typical day approach (Ng = 24) would yield 365 days (Ni = 365) and a 365-by48 matrix. In the case that the raw time series length Nt is no integer multiple of the period length Ng and the number of periods Ni , the full time-series xt,a must be cut off or extended, such that its length becomes an integer multiple of the number of steps inside a candidate period Ng and the number of periods Ni . 1. Calculate the integer divisor of the number of candidate periods to the number of representative periods Ni bN c, which represents the size of each. k Ni c candidate periods in their original order 2. Relate b N k to the cluster period Ck , except the last cluster CNk which receives the remaining candidate periods. 3. Calculate the average period profile of each group as: µa,g,k = 1 X xa,g,i |Ck | ∀ a, k, g (3) i∈Ck The advantage of this method is, that it is easy applicable and the resulting typical periods have a clear order. Nevertheless, the aggregation is only based on the original sequence of the periods and not on the similarity of the group members or candidate periods. 2.2. Time-series aggregation methods Based on the matrix introduced in equation 2, different aggregation methods can be applied to group the Ni independent candidate periods into clusters defined as Ck . On the basis of these groups, Nk typical or representative periods are derived. 2.2.2. k-means clustering The k-means clustering algorithm calculates also the average - the mean - profile of a group. The significant difference to the averaging method is that the k-means algorithm creates the clusters in order to minimize the squared error between the empirical mean of a cluster and all candidates in the cluster [38], and not by their original positional appearance in the year. Different error or distance functions are possible. In this paper, we consider the squared error, also known as the Euclidean distance, which is defined as follows: min   Ng Na Nk X Ni X X X 2  (xa,g,i − µa,g,k )  × zi,k k=1 i=1 (4) g=1 a=1 or in the vector form as min Nk X Ni X xi − µ k ||2 × zi,k ||x (5) k=1 i=1 where zi,k is a binary variable that is equal to 1 if the candidate i is assigned to cluster k. In order to make sure that each candidate is assigned to a cluster, the following constraint is added: Figure 4: Comparison of cluster methods: k-means with Nk = 2, k-medoids with Nk = 2, and hierarchical cluster up to Nk = 2. The representative data point itself of a typical period k in period step g of attribute a is defined as µa,k,g . The representative candidate is stated as vector µ k . In all reviewed methods, the number of representative periods Nk must be defined a priori and is validated following the aggregation procedure. The applied cluster methods are visually depicted in Figure 4. Nk X zi,k = 1 ∀ i (6) k=1 . This defines a mixed-integer nonlinear program (MINLP) which is non-convex and difficult to solve. In consequence, the k-means method is implemented as a greedy algorithm that converges to a local minimum. Nevertheless, it is fairly fast, which is why in practice it is run with many different starting points in order to determine the global minimum. The main steps of the algorithm itself are as follows: 2.2.1. Averaging periods Perhaps the most obvious option is to take the averaged values of different periods. Mavrotas et al. [20] do this for each month in a year for the heating, cooling and electricity load, resulting in 12 typical days. A more generic formulation that divides the original time series into Nk parts based on their order is introduced as follow: 1. Randomly or heuristically select an initial partition with Nk clusters and calculate the cluster centers. 4 2. Assign each candidate to its closest cluster center. 3. Compute new cluster centers based on all candidates belonging to the cluster. 4. If no convergence criterion is met, return to step 2. Nk clusters are left, which is also shown in Figure 4. The procedure pf hierarchical clustering is as follows: 1. Set each candidate as an own cluster. 2. Determine the centroid or mean vector of each cluster. 3. Calculate the Euclidian distances to the other cluster centers 4. Merge the two clusters with the lowest distance. If the number of cluster is still greater than Nk , return to step 2. A more detailed discussion of k-means clustering for the selection of typical periods can be found in Fazlollahi et al. [39]. 2.2.3. Exact k-medoids clustering The k-medoids clustering is an adaption of the k-means algorithm. Instead of calculating the mean as a cluster center, a representative candidate - the medoid - is chosen for µk . Figure 4 portrays this difference. Different algorithms for the determination of the clusters also exist. While Rager and Maréchal [31], Stadler et al. [32] use a greedy optimization algorithm called Partitioning Around Medoids (PAM) [40], the problem can also be stated as a Mixed-Integer Linear Program (MILP) [33, 35], for which good global solving algorithms exist. First, the distance between each candidate is calculated as d(i, j) = Ng Na X X (xa,g,i − xa,g,j ) 2 ∀ Based on the resulting clusters, representative periods for each of these must be derived. In this work, we therefore chose the medoid, respectively the candidate period in the cluster with the smallest distance to all other cluster candidates. In consequence, the method considered is essentially a greedy algorithm of the k-medoids algorithm presented in the previous subchapter. In comparison to the before presented k-means algorithm, the advantage of this algorithm is that it is independent from initial starting points. For this reason, the clusters are easily reproducible. A more detailed introduction of hierarchical clustering for time series aggregation can be found in Nahmmacher et al. [30]. i, j ∈ 1, ..., Ni (7) g=1 a=1 Then, following MILP can be stated min Ni Ni X X 2.3. Integration of extreme periods d(i, j) × zi,j The methods introduced for time series aggregation have the disadvantage of potentially cut off so called peak periods, because such periods are not representative for a whole group or cluster of periods. Rather, they are periods in which the considered time series have design relevant extrema, e.g. peak heat demand. These are important because an accurate energy system design should be able to meet these demands. Therefore, Stadler et al. [3], Domı́nguez-Muñoz et al. [33], Fazlollahi et al. [39], Bahl et al. [27] all manually add so called peak periods to the aggregated periods. For a comparison of a good integration of these periods, different variants of integration extreme periods are presented in Figure 5. The variants are as follows: (8) i=1 j=1 subject to Ni X zi,j = 1 ∀ j ∈ 1, ..., Ni (9) ∀ i, j ∈ 1, ..., Ni (10) j=1 zi,j ≤ yi Ni X yi = Nk (11) i=1 where both zi,j and yi are binary variables. This optimization problem can be solved to a global optimum, but has the disadvantage of requiring a high computational load. The computational effort is directly correlated to the number of candidate periods. On the other hand, the impact of the number of attributes and number of time steps in each period is negligibly small, because the distance between the candidates is calculated a priori. 1. None - no integration of extreme periods at all. 2. Append - add the extreme periods as additional representative periods to the other representative periods. 3. Additional cluster center - the extreme periods are set as an additional new cluster center. Each candidate period is assigned if it is closer to the new cluster center than to its original cluster center. 4. Replace representative period - the extreme period is becoming the new representative period of the cluster it was originally assigned to. 2.2.4. Hierarchical clustering The hierarchical clustering algorithm also minimizes the distance between each candidate period x i and the representative periods µ k , as shown in equation 5. The algorithm starts with each single candidate as its own cluster. Then, pairs of clusters are iteratively merged until The choice of method will determine the robustness of the system design. 5 shape of the profiles (section 3.1). In a further step, indicators are used to contrast the suitability of the different aggregation methods for the different types of profiles (section 3.2). 3.1. Qualitative comparison of the aggregation methods The number of typical periods is set to Nk = 4 and the four aggregation methods described in section 2.2 are applied. The original profiles are compared to their aggregated counterparts in Figure 6 for the GHI, Figure 7 for the temperature, Figure 8 for the wind, Figure 9 for the electrical load of a single household and Figure 10 for the load of a whole region. Original 0 800 20 averaging 0 Hour 2.4. Scaling of aggregated time-series In order for the average values of the aggregated time series to fit the average values of the original time series, the time series are scaled a posteriori, similar to the approach of Domı́nguez-Muñoz et al. [33], Nahmmacher et al. [30]. It is performed for each time series a separately as follows PNi PNg 0 g=1 xa,i,g ∀ a, k, g (12) µa,k,g = µa,k,g PN i=1 PNg k g=1 µa,k,g k=1 |Ck | × 600 20 k-means Hour 0 400 k-medoids Hour 300 200 20 hierarchical 0 Hour 500 20 0 In order to not exceed the extreme values of the original time series while scaling in accordance to Nahmmacher et al. [30], all values greater than 1 are set to 1 and the other values re-scaled again in order to reach the correct average value. As a last step, the profiles are scaled back to their original scale:   00 0 0 0 0 µa,k,g = µa,k,g max xa − min xa + min xa ∀ a, k, g 700 GHI [W/m2] Hour Figure 5: Principle illustration of different methods for integrating the extreme periods, as referred to as peak periods, into the existing aggregated periods. 20 100 0 0 50 100 150 200 Day 250 300 350 Figure 6: Original annual GHI time series compared to the typical time series with four typical days for different aggregation methods (x-axis: day of the year; y-axis: hour of the day) (13) 3. Exemplary time series aggregation First, all figures highlight the difference between the aggregation by the clustering algorithms and the aggregation by averaging profiles. The averaging method is bound to group a sequence of candidate periods, while the clustering algorithms are able produce aggregated periods which can represent a nonconsecutive order of candidate periods. This degree of freedom allows a more accurate representation of the original time series. The differences between the single groups of the averaging method are high, with the consequence that by taking the average of the the candidates, much of the fluctuation in the original periods is smoothed out. In validating and comparing the introduced methods, five time series are independently aggregated to four typical days. The time series are hourly values for an entire year. The Global Horizontal solar Irradiation (GHI), the temperature and the wind speed of the test reference year for Bad Marienberg, Germany [15] outline the weather phenomena relevant to energy system design. Furthermore, two electrical load profiles are aggregated, namely the load profile of a single household [16], and an electrical load representing an entire region [41, 42]. The profiles are reduced to four typical days and analyzed by comparing the original shape and aggregated 6 Hour k-means k-medoids hierarchical Hour 5 50 100 150 200 Day 250 300 6 20 k-medoids 350 4 20 20 2 hierarchical 0 Hour 0 8 k-means 0 0 20 20 Hour Hour Hour 5 10 20 0 10 20 0 Hour 15 Hour Hour 20 0 averaging 0 20 0 12 20 25 averaging Temp. [ C] Hour 20 0 Original 0 Wind [m/s] Original 0 0 0 50 100 150 200 Day 250 300 350 Figure 7: Original annual temperature time series compared to the typical time series with four typical days for different aggregation methods (x-axis: day of the year; y-axis: hour of the day) Figure 8: Original annual wind time series compared to the typical time series with four typical days for different aggregation methods (x-axis: Day in year; y-axis: Hour at day) A comparison of the different time series and their aggregation indicates that a high quality discrepancy exists between the different types of profile. Solar radiation has a strong daily pattern as seen in Figure 6 and is fairly well-represented by all clusteringbased aggregations. The aggregation of daily profiles benefits from the high daily pattern of the irradiance time series itself, and is able to collect the main daily and annual patterns. Furthermore, the temperature time series in Figure 7 indicates that the major patterns are represented by the aggregated profiles. Nevertheless, a comparison with the original profile indicates that the days with the minimal temperature are not well integrated, although they are highly relevant for energy system design. It highlights why it is important to somehow integrate the extreme periods into the aggregated time series. Wind speed profiles are difficult to aggregate, as seen in Figure 8 due to their negligibly small intra-day pattern. The variation between the days is fairly well represented, but the daily profiles themselves seem flattened, as they do not contain the variance of the original profile. Nevertheless, the medoid based methods seem to embody a higher degree of variation than the k-mean clustering. Figure 9 illustrates the high fluctuation and the lag of a strong pattern of the electrical load profile for a single household. In consequence, the aggregation methods are unable to represent it well and cut out many of the peak loads. Still, a quality difference is once again recognizable between the mean based aggregation and the medoid based aggregation, because the chosen centroid of the k-mean is smoothing out more of the fluctuations. Nevertheless, for this profile the results also indicate that for all chosen methods, it is necessary to add the related peak periods afterwards. In contrast, Figure 10 shows the electrical load of an entire region and its strong daily pattern. Further differences between winter and summer, as well as between weekdays and weekends, are apparent. Due to these strong patterns, all three cluster methods can aggregate the design-relevant daily profiles, while no qualitative difference is recognizable between the different aggregations. For all cases, it is noticeable that the assignment of candidate periods to typical periods - the grouping - does not variate much between the three different clustering algorithms. 3.2. Indicator based quality evaluation In the literature many different indicators have been introduced to evaluate which aggregation is the most suitable [18, 39]. The use of indicators has the advantage that they allow an evaluation of the accuracy of the time series aggregation before any optimization procedure has even started. Two indicators have been used in this work: 7 Original Hour k-means Hour Hour 2.0 k-medoids 1.0 hierarchical 0 50 100 150 200 Day 250 300 350 Figure 9: Original annual electrical load time series compared to the typical time series with four typical days for different aggregation methods (x-axis: day of the year; y-axis: hour of the day) • The RMSE between the duration curve - the sorted data set - of the original time series and the aggregated time series. The comparison of the duration curves between the aggregated and original profile is important because it allows the evaluation of all potential data points, which are represented independently. The first indicator (RMSE) for the normalized profiles for the different profiles and for the different aggregation methods is shown in Table 1 which displays the same data as was presented in the previous section. Table 1: Root-Mean-Squared-Error (RMSE) in percent between the original profile and aggregated profile of four typical days for different aggregation methods and different types of time-series GHI 10.45 6.45 6.83 7.15 Temp. 11.57 6.32 6.55 6.59 Wind 14.44 9.99 10.78 11.00 E-Load House 9.39 7.75 8.37 9.25 1.2 k-means 1.1 1.0 20 k-medoids 0.9 0.8 20 hierarchical 20 0.7 0.6 0 50 100 150 200 Day 250 300 350 Figure 10: Original regional electricity demand time series compared to the typical time series with four typical days for different aggregation methods (x-axis: day of the year; y-axis: hour of the day) • The Root-Mean-Squared-Error (RMSE) which is equivalent to the average intra-cluster distance introduced in equation 4. Essentially, it is the objective functional value of all aggregation methods. averaging k-means k-medoids hierarchical 1.3 20 0 0.5 Hour 0 averaging 0 1.5 20 1.4 0 Hour Hour Hour 0 2.5 20 0 Hour 3.5 3.0 0 Hour 20 averaging 20 20 4.0 E-Load Region [-] 20 0 Original 0 E-Load House [kW] Hour 0 E-Load Region 12.90 6.02 6.32 6.55 The comparison of the RMSE between the profile types supports the interpretation of the qualitative comparison 8 concerning the quality of the aggregation: The electricity load of a whole region has the smallest RMSE, at 6.02 % average for the k-mean clustering, followed by temperature and GHI. With a big gap, the electrical load of a household follows with an error of 7.75 %, while the wind profile has the highest value, with an error of 9.99 %. The comparison in terms of the aggregation methods shows the following: The averaging method performs the worst for all profiles, the k-mean clustering performs best at the RMSE in comparison to the k-medoids and hierarchical clustering. This is because a centroid generally features less distance to its candidates in comparison to a medoid. The hierarchical aggregation performs the worst in all cases. Nevertheless, a look at the RMSE of the duration curves in Table 2 shows a less uniformly distribution between the profile types and the aggregation methods. The hierarchical aggregation performs the best for the aggregation of GHI with 1.71 % mean error, and with the electrical load of a single house featuring a 3.06 % error. k-medoids get the best results for the wind speed with 4.09 % error and the electrical load of a region with 1.76 % error. The temperature is best represented in terms of the duration curve by the k-means aggregation, with an error of 2.65 %. The hierarchical and k-medoid aggregation perform better in case of the RMSE of the duration curves because the medoids represent more fluctations and also more peaks in comparison to the centroids, which partially average them 4.1. CHP-based supply system Optimizing the configuration and operation of a CHP system is a common application for typical period aggregation, especially if integer variables are included for choosing real components or modeling discrete states in the operation of the system. The CHP system is shown in Figure 11 and adds to the CHP itself a peak boiler and heat storage, which are all getting scaled and operated. The heat demand is simulated by a 5R1C model [34, 45], with the introduced weather data as an input for a multifamily house. The electrical load is aggregated by six single household profiles that Tjaden et al. [16] represent the housing units in the multi-family house. Table 2: Root-Mean-Squared-Error (RMSE) between the duration curve of the original profile and that of the aggregated profile of four typical days for different aggregation methods and different profile types averaging k-means k-medoids hierarchical GHI 5.10 1.93 1.75 1.71 Temp. 5.55 2.65 3.21 2.74 Wind 10.43 4.63 4.09 4.28 E-Load House 7.63 3.95 4.05 3.06 E-Load Region 6.11 1.94 1.76 2.57 out. These peaks are also represented in the original duration curve, which is why these aggregations have a higher overlap. Still, it would be difficult to favor a certain method based on the indicators introduced. Their information value is limited and it is hard to predict how they would affect optimal system design. To overcome this, we will apply the typical periods in the following sections to the design optimization of different energy systems . 4. Application of optimal energy system design For analyzing the advantages and drawbacks of time series aggregation for energy system optimization, the methods introduced are applied to three different energy supply systems: Figure 11: Component network of the considered CHP based energy supply system 1. A combined heat and power plant (CHP ) in combination with a gas boiler and heat storage for the supply of the residential electricity and heat demand, introduced in section 4.1. 2. A residential supply system that is largely based on a heatpump and photovoltaics, introduced in section 4.2. 3. An island system that supplies the electricity demand of an entire region, as introduced in section 4.3. This is based on photovoltaics and wind as power sources and also needs storage technologies because it has a limited access to fossil resources. 4.1.1. Comparing the aggregation methods For the validation, we optimized the system for the full original time series, and subsequently for different numbers of typical days, aggregated by the methods shown in section 2.2. The integration of peak periods was achieved by setting the days with the highest heat and highest electricity demand as additional cluster centers, which was discussed in section 2.3. 100 1 80 2 3 averaging k-means k-medoids hierarchical 4 5 0 20 40 60 Number of typical days [d] System cost [%] Error [%] The aggregation methods and number of typical periods are varied and compared for all three systems. Furthermore, in the case of the residential system, we compare in detail the impact of different methods on integrating extreme periods. The island system is introduced to compare the impact of the varied length of the typical periods - e.g. typical days or typical weeks - on the system’s design. The operation and design of the systems are optimized to achieve minimal costs of the energy supply. The general modeling approach of the systems is introduced in Appendix A. The models are fairly simple in order to achieve a rapid solving performance in producing results for many different aggregation variants. The modeling language is Pyomo 4.3 [43] and as solver Gurobi 7.0.1 [44] was chosen. The hardware was an Intel i7-4790 CPU with 32 GB RAM, where 7 of 8 threads were used for solving. 0 GasBoiler CHP HeatStorage GasGrid EGrid 60 40 20 0 Reference Figure 12: Relative error of the objective value, the annual energy cost, of the optimal CHP-system design based on aggregated periods for different types of aggregation methods in comparison to the annual cost of the cost optimal CHP-system design based on the full time series as reference. The results can be seen in Figure 12. It shows the relative error between the objective value, the annual cost, of the cost-optimal CHP system design based on aggregated periods, in comparison to the annual cost of the 9 Abs. error [%] cost-optimal CHP system design based on the full time series for different types of aggregation methods. The bar plot is the composition of the annual cost of the optimal system design based on the full time series. It is noticeable, that all aggregation methods underestimate the cost for a small number of typical periods, although the extreme periods are included. The reason for this is in the approach itself: The most representative periods are in general the days which have a smaller variance and smoother profiles than the original time series. The consequence is that the typical heat demand and the typical electricity demand fit better to each other, and the demand values do not exceed that often the capacity of the CHP plant. This results in an increased supply rates by the CHP system, with the consequence that for example the coverage with the CHP-plant is overestimated and the resulting system cost underestimated. Therefore, it is also reasonable that the medoid based methods (k-medoids and hierarchical ) perform better than the centroid based method k-mean. The choice of real days includes higher variations in comparison to an averaged profile as in the k-mean method. The averaging method performs, as expected, the worst because it is smoothing out to many fluctuations. No dominance of the hierarchical clustering or either the k-medoid clustering exists. For both methods it is possible to reach errors in the annual cost smaller than 2% with 8 typical days. 6 5 4 3 2 1 0 10 averaging k-means k-medoids hierarchical 34 5 8 12 18 24 34 45 33 45 8 12 18 24 5 8 12 8 12 18 24 18 24 1 100 72 72 72 101 Solving duration [s] Reference 102 Figure 13: Trade-off between the error in the objective function and solving duration for different numbers of typical days, and aggregation methods 4.1.2. Gain in computational solving duration The gain in the solving performance as a trade-off to the related accepted error is illustrated in Figure 13. As expected, the reduction in time steps results in a reduction of the solving time. The shape relates to the type of system model, while for our simple CHP-MILP we can consider a roughly logarithmic reduction of the error related to the solving performance. The precise shape depends on the scaling of the optimization problem and is not generalizable. Nevertheless, this pareto-front can be drawn for each system and it is up to the user to decide which degree of accuracy should be chosen. For the case of eight typical days, the solving time could get approximately reduced by a factor of 50 in solving based on the annual profile. Figure 14: Component network of the residential energy supply system considered It is noticeable that the shape of the error functions of the residential systems are similar to the shape of the CHP system’s error function. Furthermore, for the residential system, k-mean clustering and averaging perform poorly in terms of underestimating the system cost, while the medoid based aggregation methods converge quickly on costs which are similar to the cost of the reference system, but overestimate the cost for higher numbers of typical days. The high overestimates of the system cost of the hierarchical aggregation of three and four typical days show the sensitivity to the actual choice of representative days, e.g. a medoid day has a small overlay of the photovoltaic feed-in and electrical load profiles, self-supply rates are underestimated, with the effect that the energy cost are overestimated. These effects appear less with the k-mean aggregation because its profiles are averaged. Therefore, they converge more smoothly on smaller errors with an increased number of days. The scale of the errors is in average twice as high as the error of the CHP systems for the same number of typical days. Therefore two factors must be taken into account: 4.2. Residential supply system The second system analyzed is a supply system for a residential building based on a central grid supply and photovoltaics. The heat is supplied by a heat pump, an immersion heater with heat storage, as is seen in Figure 14. Heat and electricity loads are given for a single family house, while the photovoltaic feed-in profile is simulated in advance with the PV-Lib [46]. 4.2.1. Comparing the aggregation methods Like the CHP-system, different aggregation methods have been used for creating the typical periods, while varying also the number of typical days. The results are shown in Figure 15. 1. The electricity demand of a single household shows a higher fluctuation than that by an aggregated number of households, which is more difficult to capture 10 100 0 5 averaging k-means k-medoids hierarchical 10 0 20 40 System cost [%] Error [%] 5 80 40 20 0 60 Photovoltaic ElectricHeater HeatPump HeatStorage EGrid 60 Number of typical days [d] from appending the peak periods. Setting the peak periods manually as a potential cluster center, the underestimation drops to 1%. The resulting design difference between these two integration methods is so small due to the fact that the peak periods are mostly at the edge of a cluster. In consequence, no or not many other observational periods are related to them. The last method, of replacing a whole cluster by a peak period, results in an overestimation of 3% and forces a more conservative system design because extreme periods are represented above average. A consequence of this is that the system design relies more on electricity supplied by the grid and less on photovoltaics as seen in Figure 17. Reference Capacity [kW or kWh] Figure 15: Relative error of the objective value, the annual energy cost, of the optimal residential system design based on aggregated periods in comparison to the annual cost of the cost optimal residential system design based on the full time series for different types of aggregation methods. in typical periods. 2. An additional profile - the photovoltaic feed-in - impacts the optimal system design, which increases the number of patterns to collect with the aggregation methods. ElectricHeater HeatPump HeatStorage Photovoltaic Reference Nevertheless, only 12 typical days are enough for reaching an error, corresponding to less than 2% of the objective value. None append new cluster center replace cluster center Figure 17: Scaling of the system components for an optimal residential system design for the full time series and system design based on six typical days with different integrations of extreme days 4.2.2. Comparing the integration of peak periods In order to find the best method for the integration of peak periods, we applied all the methods introduced in section 2.3 to the residential system designed by six typical days aggregated by the k-medoid clustering. We manually defined for which time series, what type of peak period should be integrated: Also noteworthy is that for all the system designs derived from typical periods, the optimal photovoltaic capacity is overestimated, while the optimal storage capacities get underestimated. This is because of the already mentioned smoothing effect in the typical periods. The photovoltaic feed-in and electricity demand are predicted to be more steady, whereby a higher overlap exists. Furthermore, the heat demand is flattened, with less heat storage capacity required to balance it. • the day with peak heat load • the day with peak electricity load • the day with the smallest total photovoltaic feed-in 98 98 99 103 Annual Cost [%] 100 4.3. Island system In terms of validating time series aggregation to a highly renewably based system design, we introduce an island system that is largely reliant on wind turbines and photovoltaics. The regional electricity demand profile and wind feed-in are drawn from Robinius et al. [42]. The potential photovoltaic feed-in is also simulated with PV-Lib [46]. A power plant gets scaled as backup capacity while its total feed-in is restricted to 10% of the total electricity demand, so as to achieve a high share of renewable energy supply. Furthermore, hydrogen storage based on electrolysers [47], fuel cells and pressure vessels, along with a battery storage can balance the fluctuating feed-in of the renewable time series. The entire system is shown in Figure 18. Photovoltaic ElectricHeater HeatPump HeatStorage EGrid Reference None append new cluster center replace cluster center Figure 16: Composition of the system cost for an optimal residential system design for the full time series and the optimal system design based on six typical days with differing integrations of extreme days 4.3.1. Comparing the aggregation methods As with both prior systems, the different aggregation methods and the number of typical days are first varied. The resulting optimal system design and errors are depicted in Figure 19. The results can be seen in Figure 16. If no extreme periods are integrated, the system costs are underestimated by roughly 2%. No improvement is recognizable apart 11 4.3.2. Variation of the period length For this reason, we vary the duration of the typical periods. Along with the typical days (Nk = 24), typical groups of three days (Nk = 72) and typical weeks (Nk = 168) are also aggregated. We afix the aggregation methods to k-medoids and integrate the extreme periods as an additional cluster center. Figure 20 shows the resulting error in the objective function and solving duration for the three different period lengths and different numbers of typical periods. As was seen before, for typical days almost no convergence is recognizable. The aggregation by groups of three days performs slightly better: With higher numbers of typical periods, the error gets reduced, but this convergence also appears nonmonotonuously. More predictable results can be achieved with typical weeks, which converge continuously on smaller errors. Nevertheless, the error also remains over 2% for 24 typical weeks. Furthermore, their solving performance is also worse due to the higher number of time steps per period. The results in terms of the aggregation methods are the same as for both systems introduced previously. The major difference is the scale of the error: While the CHP system and the residential system both converged within less than 12 typical days to an error of less than 2% for the medoid-based aggregation methods, even for 72 typical days no robust convergence is identifiable for the island system. As in the afore-mentioned systems, the smoothing-effect of the aggregation also partially contributes to the error, but therefore an underestimation of the resulting system cost would be expected. However, k-medoid and hierarchical clustering overestimate the system’s costs especially for high numbers of typical days. Objective Error [%] 20 20 averaging k-means k-medoids hierarchical 40 0 20 40 60 Number of typical days [d] System cost [%] Error [%] 0 Photovoltaic Battery HydrogenStorage FuelCell Electrolyser Wind BackupPlant 60 40 20 0 10 0 7 34 10 20 0 10 100 80 12 814 24 21 18 8 1214 212184 12182124 8 14 7 4 7 3 34 101 Length: 24 [h] Length: 72 [h] Length: 168 [h] full system Figure 18: Component network of the island electricity supply system considered 102 Solving duration [s] 103 Figure 20: Trade-off between the error in the objective function and solving duration for different numbers of typical periods, and for different period lengths Reference For comparing aggregations with comparable solving performance, Figure 21 shows the cost composition for the aggregation of 21 typical days (each 24 time steps), seven typical periods based on three days (each 72 time steps) and three typical weeks (each 168 steps), which in sum have all the same number of time steps. They are compared to the original system design for validation. The design based on the aggregation of typical days highly overestimates the capacities of renewable energies and battery storage required. In contrast to the original system design, the hydrogen storage is not integrated at all, as is seen in Figure 22. The same applies for the aggregation to typical groups of three days, which underestimates the overall system cost by 7%. Only in the case of the aggregation of typical weeks does a small hydrogen storage infrastructure gets built. All in all, this system design bears the highest degree of similarity to the original system, but also underestimates the costs by 9 %. In summary, a poor performance of the typical period Figure 19: Relative error of the objective value, the annual energy cost, of the optimal island system design based on aggregated periods in comparison to the annual cost of the cost optimal island system design based on the full time series for different types of aggregation methods. Therefore, we expect the cause of the error to lie elsewhere: The cost optimal system design relies heavily on storage systems that contribute to almost 30% of the system costs, as is seen in Figure 19, including fuel cell, electrolyzer, hydrogen storage and battery. With the applied approach, each typical period is considered independently and no energy exchange between the typical periods is possible. For our case, this means that only storage operation within a single day is possible. 12 111 92 91 7 periods 72 hours 3 periods 168 hours Annual Cost [%] 100 Reference 21 periods 24 hours pattern. Furthermore, wind data is challenging: The representative periods smooth out much of the original intraperiod fluctuations. All aggregations were evaluated by so-called performance indicators, which have limited analytical value. The methods have been further applied to three different system design optimizations: A CHP-based system, a residential system based on a heat pump and photovoltaics, and an island system with a high share of renewable energy. The outcome shows that the impact of the time series aggregation is significantly reliant on the structure of the energy system itself. The best results could be achieved for the CHP and the residential system, which are highly dependent on central supply infrastructures either gas imports, which would also hold for other fuel imports, or a connection to the electricity grid. Therefore, a total of eight to twelve typical days was sufficient to reach cost prediction errors less than 2% while reducing the solving duration of the optimization problem by a factor of 50 in comparison to using the time series of a full year. For the case of the island system, the current modeling approach leads to high estimation errors. The optimization based on the aggregated periods caused a modeling error because the typical periods are independent and cannot exchange energy. Therefore, storage technologies were not properly taken into account. An extension from typical days to typical weeks brought about a small improvement but was, as expected, still unable to account for seasonal storage. Photovoltaic Battery HydrogenStorage FuelCell Electrolyser Wind BackupPlant Capacity [MW or MWh] Figure 21: Composition of the system cost for an optimal island system design for the full time series and the optimal system design based on 21 typical days, seven groups of three days, and three typical weeks Photovoltaic Battery HydrogenStorage FuelCell Electrolyser Wind BackupPlant Reference 21 periods 24 hours 7 periods 72 hours 3 periods 168 hours Figure 22: Scaling of the system components for an optimal island system design for the full time series and the optimal system design based on 21 typical days, seven groups of three days, and three typical weeks aggregation for the highly renewable based energy system design, including storages, can be identified. The cause of this is that the sequence of typical periods is not considered in the system model, with the consequence that long term storage cannot be properly taken into account. 6. Conclusion This paper investigated the effect of time series aggregation on optimal energy system design models. We showed that a time series aggregation based on clustering algorithms can significantly reduce model complexity and the required computational time. Comparing different aggregation methods, the results indicate that the choice of the aggregation algorithm itself has only a minor impact on the optimal system design. Nevertheless, the authors would recommend a hierarchical aggregation due to its small computational load and reproducibility. The choice of the representative periods from the aggregated clusters is of more relevance; cluster medoids, i.e., using real periods, produced more accurate results than k-mean centroids, which use averaged periods. A qualitative analysis using aggregated time series samples showed that the series representing entire regions can be more easily aggregated than those for single locations, i.e., less typical periods, can be sufficiently representative. Hence, aggregation methods are expected to be more valuable for spatially-aggregated systems than for models with finer resolution. Furthermore, we illustrate that the trade-off between the depth of time series reduction and the resulting modeling error depends highly on the system configuration. 5. Summary and discussion Comparing the aggregation methods, the results show that averaging time series based on their appearance in the year, for example the average daily profile of a month, leads to an inaccurate system design. As alternative aggregation methods, k-mean clustering, k-medoid clustering and hierarchical clustering have been compared for the creation of typical periods. In general, no aggregation method outperforms all the others for every case, but a trend is recognizable: The medoid, the most representative candidate period, performs better than the centroid, respectively an averaged time-series. The choice of the aggregation method itself, in this case k-medoid or hierarchical, has a fairly small influence. The comparison of the aggregations of different time series indicates that solar irradiation, temperature and the electricity load of a whole region can be easily represented with a small error by means of the introduced aggregation methods. An electricity load of a single building is difficult to aggregate due to high fluctuation and the small daily 13 While energy systems based on centralized supply resources can be well represented with a few typical days, energy systems heavily relying on storage technologies cannot be properly represented by independent typical days at all, nor by independent typical weeks. This leads to the conclusion that the impact of applying time series aggregation methods must be evaluated separately for each energy system model, or at least for a simplified model version. Merely assessing the aggregated time series by performance indicators can lead to significant deviation from an optimal design. The capital expenditure of each component is divided into the existing related costs [eur], which only appear if the component is installed, and scale related costs [eur/kW], specific costs, which are scale dependent [48]. For this reason, each component is modeled by a binary variable δd that defines whether the component exists, and a continuous variable Dd , which defines the installed capacity of the component. The resulting device specific annualized fixed cost can be calculated with the existing related capital expenditure (CAP EXexist ), the scaling-related capital expenditure (CAP EXspec ) and fixed operational expenditure (OP EXf ix,d ) as follows 7. Outlook Based on the conclusion, new modeling methods are required that take the sequence of the aggregated typical periods into account, with the objective of modeling the operation of long term storage contingencies. Furthermore, future research should identify more clusterrelevant parameters like gradients and variance, etc., because the current clustering leads to smoothed typical periods that underestimate the variability of the original time series. All methods introduced are published in the Python package tsam - Time Series Aggregation Module and can be easily applied and extended. Acknowledgments This work was supported by the Helmholtz Association under the Joint Initiative ”EnergySystem 2050 A Contribution of the Research Field Energy”. cexist,d = CAP EXexist,d (CRFd + OP EXf ix,d ) cspec,d = CAP EXspec,d (CRFd + OP EXf ix,d ) The costs that variate with the operation of the system cvar,i,j,t are related to the energy flows Ėi,j,t . Along with the scaling of the devices Dd , the following objective function can be stated: X X X cexist,d δd + cspec,d Dd + min cvar,i,j,t Ėi,j,t 4t (i,j)∈L t∈T d (A.3) Appendix A.2. Constraints The device models establish the constraints of the system. They are divided into five classes: Source/Sinks, Collectors, Transformers and Storages. The Source/Sink class q represents input and output flows to the system, like photovoltaic feed-in or electricity demand. It is essentially defined by a single equation: X ηlb,q,t Dq ≤ Ėq,j,t ≤ ηub,q,t Dq ∀ t, q (A.4) (q,j)∈L Appendix A. System modeling For validation purposes, a comprehensible simple MixedInteger Linear Program has been chosen as the system model. This is defined by a network of specific technologies that are connected by energy flow variables Ėi,j,t at time step t. Each connection is therefore defined by an output component i and input component j and belongs to a connection set (i, j) ∈ L. These connections are restricted by the introduced component models. For a typical period, the time steps t are replaced by the time steps g within a single period k. Appendix A.1. Objective function The objective function describes the annualized cost of the supply system considered. Therefore, for each device d, the annualized cost are calculated with a capital recovery factor CRFd , which considers the Weighted Average Cost of Capital W ACCd and lifetime τd of the device in years: CRFd = (1 − W ACCd )τd W ACCd (1 − W ACCd )τd − 1 (A.2) (A.1) where ηlb,q,t Dq could be a certain demand that must at least be satisfied at timestep t, or ηub,q,t Dq could be the maximal photovoltaic feed-in per installed capacity. The Collectors class n can be seen as a hub where all input energy flows must be equivalent to all output energy flows: X X Ėi,n,t − Ėn,j,t = 0 ∀ t, n (A.5) (i,n)∈L (n,j)∈L The Transformer class f represents devices that transform the energy from one form to another. Examples are a fuel cells or heat pumps. For their definition, the energy type (electricity, gas, etc.)  must be introduced. Each energy flow Ėi,j,t has a certain energy type . With the energy type specific transformation efficiency ηf,in ,out , the following equation can be stated for each energy transformation in the device: X X ηf,in ,out Ėi,f,t − Ėf,j,t = 0 ∀ t, f (i,f )∈L,in (f,j)∈L,out (A.6) 14 The Storage class s is defined by an additional variable the State of Charge SOCs,t at time step t. We can utilize the Euler method to state for the state of charge in the next time step SOCs,t+1 : SOCs,t+1 = SOCs,t (1 − ηsself ∆t) P +ηschar Ėi,s,t ∆t (i,s)∈L P 1 − ηdis Ės,j,t ∆t s ∀ t, s (A.7) (s,j)∈L char where Ės,t describes the charging flow with an efficiency char dis of ηs and Ės,t the discharging flow with related effidis self ciency ηs . ηs defines the self-discharge of the storage and ∆t the step length of a single time step. The state of charge at the beginning of the considered time frame SOCs,1 is related to that in the end of the time frame SOCs,Nt +1 . The design variable of the storage s which is described by its capacity Ds limits the state of charge to the following: SOCs,t ≤ Ds ∀ t, s (A.8) The existing related variable δd restricts the scalingdependent device variable Dd by the so called BigM-Method [49] as follows: Mδd ≥ Dd (A.9) The method is inspired by Stadler et al. [3] and Lindberg et al. [48]. References References [1] R. Baños, F. Manzano-Agugliaro, F. G. Montoya, C. Gil, A. Alcayde, J. Gómez, Optimization methods applied to renewable and sustainable energy: A review, Renewable and Sustainable Energy Reviews 15 (4) (2011) 1753–1766, ISSN 13640321, doi: 10.1016/j.rser.2010.12.008. [2] P. Petruschke, G. Gasparovic, P. Voll, G. Krajačić, N. Duić, A. Bardow, A hybrid approach for the efficient synthesis of renewable energy systems, Applied Energy 135 (2014) 625–633, ISSN 03062619, doi:10.1016/j.apenergy.2014.03.051. [3] M. Stadler, M. Groissböck, G. Cardoso, C. Marnay, Optimizing Distributed Energy Resources and building retrofits with the strategic DER-CAModel, Applied Energy 132 (2014) 557–567, ISSN 03062619, doi:10.1016/j.apenergy.2014.07.041. [4] S. Kwon, W. Won, J. Kim, A superstructure model of an isolated power supply system using renewable energy: Development and application to Jeju Island, Korea, Renewable Energy 97 (2016) 177–188, ISSN 09601481, doi:10.1016/j.renene.2016. 05.074. [5] S. Samsatli, N. J. Samsatli, A general spatio-temporal model of energy systems with a detailed account of transport and storage, Computers & Chemical Engineering 80 (2015) 155–176, ISSN 00981354, doi:10.1016/j.compchemeng.2015.05.019. [6] E. Merkel, R. McKenna, W. Fichtner, Optimisation of the capacity and the dispatch of decentralised micro-CHP systems: A case study for the UK, Applied Energy 140 (2015) 120–134, ISSN 03062619, doi:10.1016/j.apenergy.2014.11.036. [7] C. Milan, C. Bojesen, M. P. Nielsen, A cost optimization model for 100% renewable residential energy supply systems, Energy 48 (1) (2012) 118–127, ISSN 03605442, doi:10.1016/j.energy. 2012.05.034. 15 [8] D. Lauinger, P. Caliandro, J. Van herle, D. Kuhn, A linear programming approach to the optimization of residential energy systems, Journal of Energy Storage 7 (2016) 24–37, ISSN 2352152X, doi:10.1016/j.est.2016.04.009. [9] G. Merei, J. Moshövel, D. Magnor, D. U. Sauer, Optimization of self-consumption and techno-economic analysis of PV-battery systems in commercial applications, Applied Energy 168 (2016) 171–178, ISSN 03062619, doi:10.1016/j.apenergy.2016.01.083. [10] H. Wang, W. Yin, E. Abdollahi, R. Lahdelma, W. Jiao, Modelling and optimization of CHP based district heating system with renewable energy production and energy storage, Applied Energy 159 (2015) 401–421, ISSN 03062619, doi:10.1016/ j.apenergy.2015.09.020. [11] A. Palzer, H.-M. Henning, A comprehensive model for the German electricity and heat sector in a future energy system with a dominant contribution from renewable energy technologies –Part II: Results, Renewable and Sustainable Energy Reviews 30 (2014) 1019–1034, ISSN 13640321, doi:10.1016/j.rser.2013. 11.032. [12] P. Mancarella, MES (multi-energy systems): An overview of concepts and evaluation models, Energy 65 (2014) 1–17, ISSN 03605442, doi:10.1016/j.energy.2013.10.041. [13] M. Geidl, G. Andersson, Optimal Power Flow of Multiple Energy Carriers, IEEE Transactions on Power Systems 22 (1) (2007) 145–155, ISSN 0885-8950, doi:10.1109/tpwrs.2006. 888988. [14] C. Milan, M. Stadler, G. Cardoso, S. Mashayekh, Modeling of non-linear CHP efficiency curves in distributed energy systems, Applied Energy 148 (2015) 334–347, ISSN 03062619, doi:10. 1016/j.apenergy.2015.03.053. [15] DWD, Testreferenzjahre (TRY) . [16] T. Tjaden, J. Bergner, J. Weniger, V. Quaschning, Repraesentative elektrische Lastprofile fuer Wohngebaeude in Deutschland auf 1-sekuendiger Datenbasis doi:10.13140/RG.2.1.5112.0080. [17] C. Golling, A cost-efficient expansion of renewable energy sources in the European electricity system - an integrated modelling approach with a particular emphasis on diurnal and seasonal patterns, Thesis, URL http://kups.ub.uni-koeln.de/ 4856/, 2012. [18] K. Poncelet, H. Höschle, E. Delarue, A. Virag, W. D’ haeseleer, Selecting representative days for capturing the implications of integrating intermittend renewables in generation expansion planning problems, IEE Transaction on Power Systems URL http://ieeexplore.ieee.org/stamp/stamp.jsp? arnumber=7527691. [19] J. Ortiga, J. C. Bruno, A. Coronas, Selection of typical days for the characterisation of energy demand in cogeneration and trigeneration optimisation models for buildings, Energy Conversion and Management 52 (4) (2011) 1934–1942, ISSN 01968904, doi:10.1016/j.enconman.2010.11.022. [20] G. Mavrotas, D. Diakoulaki, K. Florios, P. Georgiou, A mathematical programming framework for energy planning in services sector buildings under uncertainty in load demand: The case of a hospital in Athens, Energy Policy 36 (7) (2008) 2415–2429, ISSN 03014215, doi:10.1016/j.enpol.2008.01.011. [21] E. D. Mehleri, H. Sarimveis, N. C. Markatos, L. G. Papageorgiou, Optimal design and operation of distributed energy systems: Application to Greek residential sector, Renewable Energy 51 (2013) 331–342, ISSN 09601481, doi:10.1016/j.renene. 2012.09.009. [22] M. Casisi, P. Pinamonti, M. Reini, Optimal lay-out and operation of combined heat & power (CHP) distributed generation systems, Energy 34 (12) (2009) 2175–2183, ISSN 03605442, doi: 10.1016/j.energy.2008.10.019. [23] M. A. Lozano, J. C. Ramos, M. Carvalho, L. M. Serra, Structure optimization of energy supply systems in tertiary sector buildings, Energy and Buildings 41 (10) (2009) 1063–1075, ISSN 03787788, doi:10.1016/j.enbuild.2009.05.008. [24] C. E. Lythcke-Jørgensen, M. Münster, A. V. Ensinas, F. Haglind, A method for aggregating external operating conditions in multi-generation system optimization models, Ap- [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] plied Energy 166 (2016) 59–75, ISSN 03062619, doi:10.1016/ j.apenergy.2015.12.050. S. P. Adhau, R. M. Moharil, P. G. Adhau, K-Means clustering technique applied to availability of micro hydro power, Sustainable Energy Technologies and Assessments 8 (2014) 191–201, ISSN 22131388, doi:10.1016/j.seta.2014.09.001. R. Green, I. Staffell, N. Vasilakos, Divide and Conquer - Means Clustering of Demand Data Allows Rapid and Accurate Simulations of the British Electricity System, IEEE Transactions on Engineering Management 61 (2) (2014) 251–260, ISSN 00189391 1558-0040, doi:10.1109/tem.2013.2284386. B. Bahl, A. Kuempel, M. Lampe, A. Bardow, Time-series aggregation for synthesis of distributed energy supply systems by bounding error in operational expenditure, in: Z. Kravanja (Ed.), 26th European Symposium on Computer Aided Process Engineering, Elsevier B.V, 2016. S. Fazlollahi, S. L. Bungener, P. Mandel, G. Becker, F. Maréchal, Multi-objectives, multi-period optimization of district energy systems: I. Selection of typical operating periods, Computers & Chemical Engineering 65 (2014) 54–66, ISSN 00981354, doi:10.1016/j.compchemeng.2014.03.005. J. H. Merrick, On representation of temporal variability in electricity capacity planningmodels, Energy Economics 59 (2016) 261–274, ISSN 01409883, doi:10.1016/j.eneco.2016.08.001. P. Nahmmacher, E. Schmid, L. Hirth, B. Knopf, Carpe diem: A novel approach to select representative days for long-term power system modeling, Energy 112 (2016) 430–442, ISSN 03605442, doi:10.1016/j.energy.2016.06.081. J. M. F. Rager, F. Maréchal, Urban Energy System Design from the Heat Perspective using mathematical Programming including thermal Storage, Thesis, doi:10.5075/epfl-thesis-6731, 2015. P. Stadler, A. Ashouri, F. Maréchal, Model-based optimization of distributed and renewable energy systems in buildings, Energy and Buildings 120 (2016) 103–113, ISSN 03787788, doi: 10.1016/j.enbuild.2016.03.051. F. Domı́nguez-Muñoz, J. M. Cejudo-López, A. Carrillo-Andrés, M. Gallardo-Salazar, Selection of typical demand days for CHP optimization, Energy and Buildings 43 (11) (2011) 3036–3043, ISSN 03787788, doi:10.1016/j.enbuild.2011.07.024. T. Schuetz, L. Schiffer, H. Harb, M. Fuchs, D. Müller, Optimal design of energy conversion units and envelopes for residential building retrofits using a comprehensive MILP model, Applied Energy 185 (2017) 1–15, ISSN 03062619, doi:10.1016/ j.apenergy.2016.10.049. T. Schuetz, M. H. Schraven, H. Harb, M. Fuchs, D. Müller, Clustering algorithms for the selection of typical demand days for the optimal design of building energy systems, in: Efficiency, Cost, Optimization, Simulation and Environmental Impact of Energy Systems, 2016. K. Poncelet, E. Delarue, J. Duerinck, D. Six, W. Dhaeseleer, The importance of integrating the variability of renewables in long-term energy planning models, Report, KU Leuven, URL https://www.mech.kuleuven.be/en/tme/research/ energy_environment/Pdf/wp-importance.pdf, 2014. H. Harb, C. Schwager, R. Streblow, D. Müller, Optimal Design of Energy Systems in Residential Districts with Interconnected Local Heating and Electrical Networks, in: Building Simulation Conference, doi:10.13140/RG.2.1.2144.6488, 2015. A. K. Jain, Data clustering: 50 years beyond K-means, Pattern Recognition Letters 31 (8) (2010) 651–666, ISSN 01678655, doi: 10.1016/j.patrec.2009.09.011. S. Fazlollahi, G. Becker, F. Maréchal, Multi-objectives, multiperiod optimization of district energy systems: II-Daily thermal storage, Computers & Chemical Engineering 71 (2014) 648–662, ISSN 00981354, doi:10.1016/j.compchemeng.2013.10.016. A. P. Reynolds, G. Richards, B. D. L. Iglesia, V. J. RaywardSmith, Clustering Rules: A Comparison of Partitioning and Hierarchical Clustering Algorithms, Journal of Mathematical Modelling and Algorithms 5 (2006) 475–504, URL http:// link.springer.com/article/10.1007/s10852-005-9022-1. M. Robinius, Strom- und Gasmarktdesign zur Versorgung des deutschen Straßenverkehrs mit Wasserstoff, Thesis, 2015. [42] M. Robinius, F. t. Stein, A. Schwane, D. Stolten, A TopDown Spatially Resolved Electrical Load Model, Energies 10 (3) (2017) 361, ISSN 1996-1073, doi:10.3390/en10030361. [43] W. E. Hart, C. Laird, D. L. Woodruff, Pyomo: modeling and solving mathematical programs in Python, Mathematical Programming Computation 3 (3) (2011) 219–260. [44] I. Gurobi Optimization, Gurobi Optimizer Reference Manual, URL http://www.gurobi.com, 2016. [45] D. EN ISO, Thermal performance and energy use in the build environment (ISO 13790:2008) . [46] R. W. Andrews, J. S. Stein, C. Hansen, D. Riley, Introduction to the Open Source PV-LIB for Python Photovoltaic System Modeling Package . [47] S. Schiebahn, T. Grube, M. Robinius, V. Tietze, B. Kumar, D. Stolten, Power to gas: Technological overview, systems analysis and economic assessment for a case study in Germany, International Journal of Hydrogen Energy 40 (12) (2015) 4285– 4294, ISSN 03603199, doi:10.1016/j.ijhydene.2015.01.123. [48] K. B. Lindberg, G. Doorman, D. Fischer, M. Korpås, A. Ånestad, I. Sartori, Methodology for optimal energy system design of Zero Energy Buildings using mixed-integer linear programming, Energy and Buildings 127 (2016) 194–205, ISSN 03787788, doi:10.1016/j.enbuild.2016.05.039. [49] A. Bemporad, M. Morari, Control of systems integrating logic, dynamics, and constraints, Automatica 35 (3) (1999) 407–427, ISSN 0005-1098, doi:Doi10.1016/S0005-1098(98)00178-2, URL <GotoISI>://WOS:000079457800006. 16
5cs.CE
1 Distributed Kalman filtering with minimum-time consensus algorithm arXiv:1703.05438v1 [cs.SY] 16 Mar 2017 Ye Yuan, Ling Shi, Jun Liu, Zhiyong Chen, Hai-Tao Zhang and Jorge Goncalves Abstract Fueled by applications in sensor networks, these years have witnessed a surge of interest in distributed estimation and filtering. A new approach is hereby proposed for the Distributed Kalman Filter (DKF) by integrating a local covariance computation scheme. Compared to existing well-established DKF methods, the virtue of the present approach lies in accelerating the convergence of the state estimates to those of the Centralized Kalman Filter (CKF). Meanwhile, an algorithm is proposed that allows each node to compute the averaged measurement noise covariance matrix within a minimal discrete-time running steps in a distributed way. Both theoretical analysis and extensive numerical simulations are conducted to show the feasibility and superiority of the proposed method. I. I NTRODUCTION Distributed estimation and data fusion have many applications in a variety of fields ranging from target tracking to control of mobile networks [1]–[12]. In such scenarios, networks of sensors are employed to take measurements on various kinds of signals of interest, which are This is an unpublished technical report that summarizes the results in [18], [29]. Y. Yuan and H.-T. Zhang are with School of Automation and State Key Lab of Digital Manufacturing Equipment and Technology, Huazhong University of Science and Technology, Wuhan 430074, P.R. China. L.Shi is with Department of Electronic and Computer Engineering, The Hong Kong University of Science and Technology, Hong Kong. J. Liu is with Department of Applied Mathematics, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada. Z. Chen is with School of Electrical Engineering and Computer Science, The University of Newcastle, Callaghan, NSW 2308, Australia. J. Goncalves is with Department of Engineering, University of Cambridge, CB2 1PZ, UK, and University of Luxembourg, Faculté des Sciences, de la Technologie et de la Communication, L-4362 BELVAL, Luxembourg. H.-T. Zhang was supported by the National Natural Science Foundation of China under Grants 61322304, 61673189 and 51120155001. (Corresponding author: H.-T. Zhang, email: [email protected].) March 16, 2017 DRAFT 2 regarded as the state variables. Since multiple sensors are involved, it is necessary to make full use of the available measurements to yield an optimal estimate of system states. Kalman filters [13], which are unbiased, minimum mean-squared error estimators, are commonly used to perform the required integration due to their effective estimation capabilities [14]. Such traditional integration approaches employ a single Kalman filter for the entire network to estimate system states, which is thus named as the Centralized Kalman Filter (CKF). Another typical kind of network state estimators is the decentralized Kalman filter proposed by Speyer [15]. Therein, each node consists of both a sensor and a local Kalman filter. By exchanging information with every other node in the network, each node will be able to calculate the average value of the measurements. This value is afterwards used for state estimation, which is as optimal as the CKF by using a local Kalman filter. However, high communication complexity is still a main issue of the decentralized Kalman filter. The reason lies in the all-to-all communication protocol to calculate the optimal state estimate [16]. Afterwards, this issue was alleviated with the introduction of the Distributed Kalman Filter (DKF) by Olfati-Saber [17], [18]. Therein, each node is equipped with an additional consensus filter (CF). Thus, it only needs to exchange both its measurement and its measurement noise covariance with the immediate neighbors. By this means, the CF will be able to compute the average value of the measurements asymptotically. As a result, each node obtains the optimal state estimate solely by using local information, which remarkably decreases the communication complexity. The DKF has similar asymptotic performance to the CKF, but with superior scalability and robustness to uncertainties and external noises in the network [19]. Following this line, an observer-based distributed Kalman filter was afterwards proposed in [20]. However, so far, an efficient distributed estimator with minimal convergence time to the DKF is still lacking for sensor networks. To fulfill such an urgent yet challenging task, a novel DKF estimator is developed hereby to enable each node in the sensor network to calculate the consensus value in finite-time. Unlike conventional asymptotically convergence methods [21], [22], the present algorithm only uses its own past state estimates to form a Hankel matrix, with which the eventual consensus value can be calculated in a minimum number of time steps. This algorithm has improved the existing finite-time consensus algorithms in [23], [24] to a minimal time consensus [18]. The proposed method shares the same spirit of the well-known Ho-Kalman method [25]. It can substantially shorten the convergence time of the DKF to the CKF status. Meanwhile, the algorithm is robust March 16, 2017 DRAFT 3 to the uncertainties in the local measurements. Moreover, a trade-off is considered between communication cost and computation complexity. Still worth-mentioning is that, each node in the network calculates the eventual consensus value of CF and therefore guarantees a finite-time performance. Significantly, the present algorithm supports the convenient “plug-in-and-play” mode favored by modern industrial filters. Especially for the scenarios where a sensor can be naturally disabled or dropped when a new one needs to be added. The remainder of the paper is organized as follows: Section II introduces the preliminaries of graph theory, the CF and the DKF, and then provides the problems addressed by this paper. The two DKF estimators are then developed in Section III. Numerical simulations are conducted in Section IV to show the feasibility and superiority of the proposed DKF estimators. Finally, conclusion is drawn in Section V. Throughout the paper, the following symbols will be used. R, Z and N denote the sets of real numbers, integers and positive integers, respectively. For a matrix A ∈ RM ×N , A[i, j] ∈ R denotes the {i, j}th element, A[i, :] ∈ R1×N and A[:, j] ∈ RM ×1 denotes its ith row and j th column, respectively. A[i1 : i2 , j1 : j2 ] ∈ R(i2 −i1 +1)×(j2 −j1 +1) denotes the submatrix of A corresponding to the rows i1 to i2 and the columns j1 to j2 . The symbol ∗[i] represents the ith element of a column or row vector ∗. The symbol eTr = [0, . . . , 0, 1rth , 0, . . . , 0] ∈ R1×N . IN denotes the identity matrix of dimension N . II. P RELIMINARIES AND P ROBLEM D ESCRIPTION A. Graph Theory A sensor network with n nodes can be represented by a graph G = (V, E) of order n. The set of nodes, {v1 , v2 , . . . , vn }, is represented by V and the set of edges, or communication links, between each node is represented by E ⊆ V × V. A direct communication link from node vj to node vi is denoted by e[j, i] = (vj , vi ) ∈ E and vi is said to be a neighbor of vj as a result of this direct connection. All neighbors of a particular node vj constitute to the set Nj = {vi ∈ V | e[i, j] ∈ E}. For an undirected graph, the degree of a node is the number of b refers to an n-by-n edges that are incident on the node. The adjacency matrix of the graph, A, b j] is the weight of the edge from vj to vi . The degree matrix where the off-diagonal element A[i, b is an n-by-n diagonal matrix such that matrix of the graph, D,   P A[i, b j] if i = j; j b D[i, j] =  0 otherwise. March 16, 2017 DRAFT 4 b is given by L b := D b − A. b The graph Laplacian matrix, L, B. Distributed Kalman Filters The aim of distributed Kalman filtering is to estimate the state of a process with the following dynamics: x(k + 1) = Ax(k) + Bw(k), (1) with the ith sensor node having a sensing model given by: zi (k) = Hi (k)x(k) + vi (k). (2) Both w(k) and vi (k) are assumed to be zero-mean white Gaussian noise with covariance matrices given by: E[w(k)w(l)T ] = Q(k)δkl , and E[vi (k)vj (l)T ] = Ri (k)δkl δij , where δ is the Kronecker delta, i.e., δkl = 1 for k = l, and δkl = 0 otherwise. Let x bi (k) and xi (k) be the minimum mean-squared error state estimates of the ith node based on the available measurement data up to time instants k and k − 1, respectively. The measurement data, noise, noise covariance matrix, and model of the CKF for time instant k can be defined in terms of the individual node parameters, respectively, as zc := [z1 , z2 , . . . , zn ], vc := [v1 , v2 , . . . , vn ], Rc := diag(R1 , R2 , . . . , Rn ), and Hc := [H1 ; H2 ; . . . ; Hn ], where Hc is a column block matrix [17]. We also assume that (A, Hc ) is observable and (A, Hi ) is observable for every i. The measurement of the CKF is thus given by zc = Hc x + vc , and the CKF state estimate, i.e., x bc , writes x bc (k) = xc (k) + Mc (HcT Rc−1 zc − HcT Rc−1 Hc xc (k)), (3) where xc is the prior state estimate, Mc = (Pc−1 + HcT Rc−1 Hc )−1 and Pc is the error covariance matrix of xc . To propose the main problem, it is necessary to introduce a lemma [17] guaranteeing asymptotic performance of the DKF. Lemma 1: ( [17]) Suppose every node in the network obtains the average consensus value of S c and g c , then by performing the following computation Mi (k) = (Pi (k)−1 + S c (k))−1 , x bi (k) = xi (k) + Mi (k)[g c (k) − S c (k)xi (k)], Pi (k + 1) = AMi (k)AT + BQi (k)B T , (4) xi (k + 1) = Ab xi (k), March 16, 2017 DRAFT 5 where Pi (k) = nPc (k), Mi (k) = nMc (k), Qi (k) = nQ(k) and P S c (k) = n1 ni=1 HiT (k)Ri−1 (k)Hi (k) = 1 H T (k)Rc−1 (k)Hc (k), n c g c (k) = = 1 n Pn i=1 HiT (k)Ri−1 (k)zi (k) 1 H T (k)Rc−1 (k)zc (k), n c (5) (6) with S c (k) and g c (k) being the network-wide average inverse-covariance matrix and average measurement, respectively, then one has lim x bi (k) − x bc (k) = 0, k→∞ where x bi (k) and x bc (k) are the estimates obtained by the DKF and the CKF, respectively. C. Consensus filters By Lemma 1, in order to obtain the same state estimates as the CKF, it is necessary for each agent to compute the average consensus values g c (k) and S c (k) by exchanging information only with its neighbors Ni . This can be done through consensus filters. There are three types of consensus filters that are used in the DKF algorithm in [17]: low-pass, high-pass and band-pass filters. Note that, Si (k), i.e., the estimate of S c (k) by node i, can be obtained as the output with HiT (k)Ri−1 (k)Hi (k) as the input. In this set-up, each node exchanges its measurement and covariance data with its neighbors at each time step. These data will be processed by consensus filters to obtain estimates of the average consensus values of g c (k) and S c (k). These values are then used by the local Kalman filter to calculate the state estimate at that time step.Figure showing the original DKF node setup By Lemma 1, one has x bi (k) = xi (k) + Mi (k)[gi (k) − Si (k)xi (k)]. (7) If gi and Si are the average consensus values, respectively, i.e., gi = g c , Si = S c , then the states estimate will asymptotically converge to that the CKF given by substituting Eqs. (5) and (6) to Eq. (7), or x bc (k) = xc (k) + Mc (HcT Rc−1 zc − HcT Rc−1 Hc xc (k)) (8) = xc (k) + nMc (g c (k) − S c xc (k)). March 16, 2017 DRAFT 6 Measurement Data Low-Pass Consensus Filter Kalman Filter Node i Covariance Data Band-pass Consensus Filter Fig. 1: Architecture for node i employing the algorithm from [17]. The exchange of data from node i to its neighbors j is not shown in this figure. Consider the case where consensus has not yet been obtained, the error between the state estimate x bi by the ith node and state estimate x bc of the CKF will thus be given by x bc − x bi = xc + nMc (g c − S c xc ) − xi − Mi (gi − Si xi ) (9) = xc − xi + nMc (g c − S c xc ) − Mi (gi − Si xi ). D. Problem formulation The DKF algorithm [17] adopts the low-pass and band-pass CFs to compute the average consensus values g c and S c respectively. Since these CFs only obtain these values asymptotically, the error between the state estimates given in Eq. (9) only tends towards zero asymptotically as well, i.e., limk→∞ kb xc (k) − x bi (k)k2 = 0. However, in industrial applications, it is unsatisfactory to asymptotically attain the convergence to the CKF estimates. Accordingly, to guarantee the convergence of the DKF estimates to the CKF estimates in finite time, rather than asymptotically, we consider two main problems this paper addresses as below, Problem 1: DKF estimator with finite steps of convergence: For an n-node connected networked system G = (V, E) governed by Eqs. (1) and (2), design a distributed estimator ui = Ψzi for each agent i ∈ V such that for all t ≥ M March 16, 2017 kb xi (t) − x bc (t)k2 = 0 DRAFT 7 for arbitrary initial estimates x bi (0) and x bc (0). Here, M ∈ N, x bi (t) and x bc (t) are estimates gained by the DKF and the CKF, respectively, and Ψ is a compatible filter matrix to be designed. Note that, another virtue of the above-mentioned filters lies in that it favors the requirement of “plug-in-and-play” fashion. That is, when a sensor is disabled and drops out or if a new one needs to be added– as long as the new graph is connected– the performance of underlying distributed Kalman filter should be converging to the CKF shortly. To this end, we will propose a new distributed filter development framework, where each node computes the final consensus value of CF online in a distributed way. III. M AIN R ESULTS We consider a connected DKF network G = (V, E) where the measurement noise covariance matrix for each node i, Ri , is constant. Since the measurement model, Hi , for each node is fixed P as well, the average consensus value S c = n1 ni=1 HiT Ri−1 Hi will therefore be a constant. The new framework for the DKF is proposed in Algorithm 1 (in abbr. A1), whose technical analysis is give below. A. Technical analysis of A1 Consider a discretized system of the band-pass CF in [17] Si (k + 1) hP = Si (k) +  j∈Ni (Sj (k) − Si (k)) i P + j∈Ni ∪{i} (Pj (k) − Si (k)) , Pi (k + 1) = Pi (k) +  P j∈Ni [(Pj (k) − Pi (k)) + (Uj (k) − Ui (k))] , with Ui (k) = Hi (k)T Ri−1 (k)Hi (k). For arbitrary element in Si (k) and Pi (k), one has      b − D b b ε(k + 1) I − L A ε(k)   =    b p(k + 1) 0 I − L p(k)   0  u(k) + b −L   ε(k)  + Bu(k), := A  p(k)   ε(k)  = Si (k)[h, l] y(k) = eTi ε(k) := C  p(k) March 16, 2017 (10) DRAFT 8 with ε(k) := h iT S1 (k)[h, l] . . . Sn (k)[h, l] , h iT p(k) := P1 (k)[h, l] . . . Pn (k)[h, l] , h iT u(k) := U1 (k)[h, l] . . . Un (k)[h, l] , b D, b A b being the Laplacian matrix, the degree matrix and the adjacency matrix for the and L, b matrix has underlying sensor network. The sensor network is assumed to be connected so that L a single eigenvalue at 0 and the sampling time  satisfies 0<< 1 . b i]} max{L[i, (11) which guarantees consensus, as shown in [21], [26]. Proposition 1: Given a consensus filter in Eq. (10), all eigenvalues of A are within the unit disk apart from one eigenvalue at 1. Proof: This is straightforward using Gershogrin’s theorem [28] and the block diagonal structure of A. Significantly, Proposition 1 guarantees the system asymptotical consensus of the constructed filter (10). Next, we shall introduce some definitions and lemmas before giving the main results. For conciseness, we drop the subscript i, j as the result is valid for any i, j ∈ V. Definition 1: (Minimal polynomial of a matrix pair) The minimal polynomial associated with P the matrix pair (A, C) (A ∈ R2n×2n , C ∈ Rm×2n ) denoted by q(t) := td+1 + di=0 αi ti is the monic polynomial of smallest degree d + 1 that satisfies Cq(A) = 0. Since q(t) is the minimal polynomial of the pair (A, C), it then follows from Definition 1 that Cq(A) = 0. Therefore, we obtain C(Ad+1 + αd Ad + . . . + α1 A + α0 I) = 0, which immediately leads to that y(d + 1) = CAd+1 x(0) = −C(αd Ad + · · · + α1 A + α0 I)x(0) = −αd y(d) − · · · − α1 y(1) − α0 y(0). One then has that the dynamics of y(k) satisfies the linear regression equation: d+1 X i=0 March 16, 2017 αi y(k + i) = 0, ∀k ∈ N, (12) DRAFT 9 with αd+1 = 1 [27]. Denote the z−transform of y(k) as Y (z) := Z(y(k)). From the time-shift property of the z−transform, it is easy to show that Pd+1  i=1 Y (z) = αi Pi−1 i−` `=0 y(`)z q(z)  := H(z) . q(z) (13) It follows from Proposition 1 that the polynomial equation q(t) = 0 does not possess any unstable roots except one at 1. With the polynomial p(z) := p(z) = d X q(z) , z−1 one has that (14) βi z i , i=0 h iT for β = β0 . . . βd−1 1 . Then, it can be obtained that " #T d d X X β = 1+ αi , 1 + αi , · · · , 1 + αd , 1 . i=1 (15) i=2 As a result, one can calculate the consensus value φ by applying the final-value theorem and some simple algebra φ = lim y(k) = lim(z − 1)Y (z) = z→1 k→∞ ydT β . 1T β (16) Remark 1: The final value of y, i.e., y(∞), can be computed once we know β and the historical sequence of y from y(0) to y(d). Next, we propose an algorithm that obtains β from the historical observation of y. Let Y 0,1,...,2k := {y(1) − y(0), y(1), . . . , y(2k + 1) − y(2k)}(k ∈ Z), and consider the following Hankel matrix  y(1)−y(0)   Γ(Y 0,1,··· ,2k ) =y(2)−y(1)  .. .  y(2)−y(1) ···  ..  . .  .. . y(2k + 1)−y(2k) It has been shown in [27] that when Γ(Y 0,1,··· ,2k ) loses rank upon k = K, then β in Eq. (16) can be calculated by Γ(Y 0,1,··· ,2K )β = 0. (17) Proposition 2: [27] Given a consensus filter in Eq. (10) and the corresponding minimal polynomial q(A) in Definition 1, then the degree d + 1 ≤ dim{A} March 16, 2017 (18) DRAFT 10 Now we are ready to propose a new DKF algorithm that merely uses local observations to compute S c in a minimum-number of steps. From Proposition 2, we see that the minimumnumber of steps for every sensor to compute the consensus value is upper-bounded by 2dim{A}. Accordingly, for an arbitrary node i, given the collection of successive outputs of Si from the band-pass CF, (19) S2k {h, l} = {Si (0)[h, l], . . . , Si (2k)[h, l]} where the indices of Si refer to the time index. One can calculate a vector of differences given by1 S2k [h, l] = {S(1)[h, l] − S(0)[h, l], . . . , (20) S(2k + 1)[h, l] − S(2k)[h, l]} = {S(0)[h, l], . . . , S(2k)[h, l]}, at every time step k. This vector is then used to build up a Hankel matrix such that  S(0)[h, l] S(1)[h, l]  S(1)[h, l] S(2)[h, l]  Γ(S2k [h, l]) =  S(2)[h, l] S(3)[h, l]  .. .. . . S(2)[h, l] ··· S(3)[h, l] .. . ··· S(2k)[h, l]     .    (21) The next step is to check whether the Hankel matrix has full rank. If not, the dimension of the Hankel matrix is increased by including the output of S(·)[h, l] from the next time step k + 1, and the process is repeated afterwards. Once the Hankel matrix has lost rank or been closed to losing rank (i.e., its smallest singular value is less than a small positive threshold σ), compute h,l the smallest singular vector of this defective Hankel matrix, given by KSh,l = [β0h,l , . . . , βk−1 , 1]T . This kernel is then used to compute the final consensus value, S c [h, l] according to the following equation: S c [h, l] = h i with Sk [h, l] = S(0)[h, l] . . . S(k)[h, l] . Sk [h, l]T KSh,l 1T KSh,l , (22) Remark 2: Using this approach, the consensus value S c will be obtained in minimum-time as opposed to asymptotically. Motivated by this result, Algorithm 1 is proposed which incorporates the minimum-time static consensus algorithm into the DKF. A robust version of the proposed algorithm is presented in the Appendix. 1 We drop index i for notational simplicity. March 16, 2017 DRAFT 11 Algorithm 1 Distributed Kalman Filter with minimum-time consensus scheme Inputs: Measurement of the state zi Outputs: Estimate of the state of the system x b At each time step: Step 1: Update state of Low-pass Consensus Filter : uj ← HjT Rj−1 zj , ∀j ∈ Ni ∪ {i}, hP i P gi ← gi +  (g − g ) + (u − g ) i i j∈Ni j j∈Ni ∪{i} j where  is the sampling period. Step 2: Update state of Band-pass Consensus Filter: Uj ← HjT Rj−1 Hj , ∀j ∈ Ni ∪ {i}, P Pi ← Pi +  j∈Ni [(Pj − Pi ) + (Uj − Ui )] , i hP P Si ← Si +  j∈Ni ∪{i} (Pj − Si ) . j∈Ni (Sj − Si ) + (23) Step 3: For each node i, compute the differences between successive values of Si (for any h, l): S2k [h, l] = {Si (1)[h, l] − Si (0)[h, l], . . . , Si (2k + 1)[h, l] − Si (2k)[h, l]} where Si (k) is the value of Si at the k th time step and form a Hankel matrix Γ(S2k [h, l]). If the smallest singular value of Hankel matrix is less than a prescribed small real value  at some time k h,l , find the h,l corresponding singular vector KSh,l = [β0h,l , . . . , βk−1 , 1]T , and compute the final consensus value for S c [h, l] using eq. (22). Then for discrete-time k > maxh,l k h,l , Steps 4 and 5 can be computed using S c instead of Si , and Steps 2 and 3 itself will no longer be necessary. Step 4: Estimate the state of the process using the local KF at each node: Mi ← (Pi−1 + Si )−1 , x b ← x + Mi (gi − Si x). Step 5: Update the state of the local KF for the next time step Pi ← AMi AT + BQi B T , x ← Ab x. March 16, 2017 DRAFT 12 B. Estimator performance analysis A virtue of the proposed estimator saves communication cost and accelerated convergence speed to the CKF estimator. Meanwhile, the performance is preserved as that of the CKF. Once S c is calculated, communication of exchanging Si (k) is no needed. Hence the more quickly the average consensus matrix is calculated, the more communication savings we have. More precisely, the communication cost is reduced from O(n4 ) to O(n3 ), while the time taken for reaching the optimal performance has been reduced from O(n2 ) to O(n) as well. In terms of performance, by using Algorithm 1, it will take a much shorter time for the error between x bi and the CKF estimates x bc to reduce to Mi (g c − gi ), by noting that nMc = Mi when Si = S c . Measurement Data Low-Pass Consensus Filter Minimal-time consensus algorithm Node i Covariance Data Kalman Filter Band-pass Consensus Filter Fig. 2: Architecture for node i employing Algorithm 1 [18]. In this case, we introduce a new algorithm to compute S c using S(k). The exchange of data from node i to its neighbors j is not shown. A comparison is conducted between the algorithm proposed in [17] (referred to as Algorithm 0 or A0) , and the proposed algorithm A1. More precisely, for A0, each node i exchanges its estimate on g c (k) and S c (k) with its neighbors j at each time step k. These estimates are then transferred to the respective CFs to update the estimates, gi and Si . Then a local Kalman filter is adopted to calculate the state estimate. In A1, the output Si of the band-pass CF is fed to the minimum-time static consensus algorithm. Once the consensus value for all elements of S c has March 16, 2017 DRAFT 13 been obtained at a time instant t = K, the local Kalman filter uses S c instead of Si to compute the state estimates. Therefore, using A1, the difference between the state estimates obtained by the DKF and the CKF will be minimized in a much shorter time. Now, we are ready to give the main technical result as below, Theorem 1: Given a connected sensor network running DKF, for any node i, assume that a) the prior state estimate xi = xc ; b) there exists a time constant K and a prescribed small positive value ρ such that kgi (k) − g c (k)k2 ≤ ρ for any k > K; then one has kb xA1 bc (k)k2 ≤ kb xA0 bc (k)k2 i (k) − x i (k) − x (24) with x bA1 bA0 i (k) and x i (k) being the state estimates of A1 and A0 respectively for any time k > K. Moreover, the equality holds if and only if Si (k) = S c . Proof: The state estimate of the ith node is given by: x bi (k) = xi (k) + Mi (k)[gi (k) − Si (k)xi (k)], and that of the CKF is given by x bc (k) = xc (k) + nMc (g c (k) − S c xc (k)). Thus the error between the state estimates of the ith node and that of the CKF at time k will be given by: x bc − x bi =xc + nMc (g c (k) − S c xc ) − xi − Mi (gi (k) − Si (k)xi ) =xc − xi + nMc (g c (k) − S c xc ) − Mi (gi (k) − Si (k)xi )  = (Pi (k) + S c )−1 − (Pi (k) + Si (k))−1 g c + (−(Pi (k) + S c )−1 S c + (Pi (k) + S i (k))−1 S i (k))xc + nMc (g c (k) − gi (k)). Assume that gi (k) = gc and xc = xi , then we can formulate the following optimization problem as: minSi kb xc − x bi k2 . That is minSi k ((Pi (k) + S c )−1 − (Pi (k) + Si )−1 ) g c + (−(Pi (k) + S c )−1 S c + (Pi (k) + S i )−1 S i ) xc +nMc (g c (k) − gi (k))k2 , which can be approximated as minSi k ((Pi (k) + S c )−1 − (Pi (k) + Si )−1 ) g c + (−(Pi (k) + S c )−1 S c + (Pi (k) + Si )−1 Si ) xc k2 March 16, 2017 (25) DRAFT 14 for any k > K using the triangle inequality and the assumption that kg c (k) − gi (k)k2 is small. It follows from Eq. (25) that the minimum value 0 is achieved when Si = S c which is scheme for A1. Therefore, A1 outperforms A0, which completes the proof. Remark 3: Theorem 1 shows the theoretical improvement of A1 compared to A0 in terms of a smaller state estimate error, as seen in Eq. (24). Empirically, the improved performance can even be gained when assumptions a) and b) are not fulfilled. IV. N UMERICAL S IMULATIONS We shall now show how the proposed new local computation can speed up the DKF. In addition to the theoretical analysis, a comparison by numerical simulations is conducted between the algorithm proposed in [17] (referred to as Algorithm 0 or A0) , and the proposed algorithm A1. The control task is to track the position of a target in two-dimensional space, i.e, x = [x1 , x2 ]T . The target is moving in a noisy circular path with ẋ = F x + Gw where w is a white noise process with covariance matrix Q and:   0 −3  , G = I2 , Q = 25I2 . F = 3 0 (26) x(k + 1) = Ax(k) + Bw(k) with     0.9990 −0.0450 0.0150 −0.0003 ,B =  . A= 0.0450 0.9990 0.0003 0.0150 (27) half the nodes have sensing model matrix of H1 and the other half have H2 :   1 2 . H1 = I2 , H2 =  2 1 (28) This system was then discretized with sampling time  = 0.015s to yield a discrete-time system The sensor network used to track the target, shown in Fig. 3, consists of twenty nodes where The measurement noise covariance matrix for node i, Ri , is taken to be constant with time and is given by: Ri−1   √ −1 0 (0.01 i) . = √ 0 (0.01 i)−1 (29) Fig. 4 shows the evolution comparison of the variation of the first element of S between A0 and A1. It is observed that A1 calculates the average consensus value S c in about 0.2s, whereas A0 March 16, 2017 DRAFT 15 500 400 300 200 100 0 0 100 200 300 400 500 Fig. 3: A randomly generated twenty-node sensor networks. The network is undirected and connected. Red dots represent sensors while blue lines their interconnections. 100 50 A0 A1 0 0 1 2 Time(s) Amplitude Amplitude 60 40 20 0 3 A0 A1 0 1 2 Time(s) 3 100 40 20 0 A0 A1 0 1 2 Time(s) 3 Amplitude Amplitude 60 50 A0 A1 0 0 1 2 Time(s) 3 Fig. 4: The simulation results are plotted for node 19, which is randomly picked: A comparison between A0 and A1 on elements of S, clockwise from top left: S[1, 1], S[1, 2], S[2, 2] and S[2, 1]. The black curves show that S c [i, j] (i, j = 1, 2) can be calculated in a much shorter time comparing to A0. 1.6s. Table I compares the shortest, longest and average times taken across the nodes to obtain the average consensus value for all elements of S c between A0 and A1. It shows that A1 obtains S c in about 10% of the time taken by A0. To show the comparison among CFK, A0 and A1 more vividly, we propose a way to assess the performances in terms of state estimates. To ensure that the estimate difference are only due to the differences in values of S, it is assumed that all the three algorithms know the consensus March 16, 2017 DRAFT x1 16 60 40 20 0 A0 A1 CKF 0 0.2 0.4 0.6 0.8 1 x2 Time (s) 10 0 -10 -20 -30 A0 A1 CKF 0 0.1 0.2 0.3 0.4 0.5 0.6 Time (s) 0.7 0.8 0.9 Fig. 5: Node 19 (a randomly picked node): A comparison of the state estimates by the CKF, A0 and A1. The estimates by A1 is closer to that of the CKF than A0, which indicates an improved performance. Time taken A0 A1 Shortest (s) 1.14 0.18 Longest (s) 1.83 0.21 Average (s) 1.338 0.1845 TABLE I: Times taken for A0 and A1 to calculate average consensus for S. Since different nodes have different dynamics and estimate, we look at the shortest/longest time that a node takes to know S c and the average time of the whole network to know S c . value g c (0). The comparison among the three algorithms for a twenty-node network are shown in Fig. 5. Therein, in the beginning stage (t < 0.15s), the state estimates by both A0 and A1 are much larger (beyond what is shown on the graph) than that of the CKF as they have yet to obtain S c . Afterwards, at t = 0.18s, A1 has obtained S c according to Fig. 4, and the state estimates drastically improved until it was almost the same as that of the CKF. The slight differences from this time point onwards are due to numerical inaccuracies in the simulation. As for A0, the state estimates only converge to that of the CKF at about t = 0.75s and t = 1s for the states x1 and x2 , respectively. Therefore, A1 outperforms A0 in terms of converge time for the state estimates to those of the CKF. March 16, 2017 DRAFT 17 V. C ONCLUSION This paper develops a DKF algorithm that enables each node in a sensor network to calculate the global average consensus matrix of measurement noise covariances without access to global information. Theoretical analyses have shown that state estimates converge to that of the CKF in a shorter time. A robust DKF is afterwards developed to overcome communication/observation noises and system uncertainties. Extensive numerical simulations are conducted to show the feasibility and superiority of the proposed DKF estimators. VI. ACKNOWLEDGEMENT We wish to thank Prof. Richard Murray for discussions. The simulation was built on Manuel Mazo Jr.’s code (TU Delft) on the realization of distributed Kalman filter (Olfati-Saber 2007 [31]) and the simulation was performed by Jerry Thia. R EFERENCES [1] A. Esna Ashari, A. Y. Kibangou, and F. Garin. Distributed input and state estimation for linear discrete-time systems. In Proc. 51st IEEE Conference on Decision and Control, 2012. [2] P. Torreblanca, P. Giselsson, and A. Rantze. Distributed receding horizon kalman filter. In Proc. 50th IEEE Conference on Decision and Control, 2011. [3] R. Olfati-Saber and P. Jalalkamali. Coupled distributed estimation and control for mobile sensor networks. IEEE Transactions on Automatic Control, 57(10):2609–2614, 2012. [4] A. Petitti, D. Di Paola, A. Rizzo, and G. Cicirelli. Distributed target tracking for sensor networks with only local communication’. In Proc. 19th Mediterranean Conference on Control & Automation, pages 662–667, 2011. [5] H. Dong, Z. Wang, and H. Gao. Distributed filtering for a class of time-varying systems over sensor networks with quantization errors and successive packet dropouts. IEEE Transactions on Signal Processing, 60(6):3164–3173, 2012. [6] Z. Chen, H.-T. Zhang, M.C. Fan, D. Wang, and D. Li. Algorithms and experiments on flocking of multiagents in a bounded space. IEEE Transactions on Control Systems Technology, 22(4):1544–1549, 2013. [7] H.-T. Zhang and Z. Chen. Consensus acceleration in a class of predictive networks. IEEE Transactions on Neural Networks and Learning Systems, 25(10):1921–1927, 2014. [8] J. Li and A. Nehorai. Distributed particle filtering via optimal fusion of gaussian mixtures. In International Conference on Information Fusion, pages 1182–1189, 2015. [9] Shahin Shahrampour and Ali Jadbabaie. Distributed online optimization in dynamic environments using mirror descent. 2016. [10] Usman A Khan. On connectivity, observability, and stability in distributed estimation. 58(8):6639–6644, 2010. [11] Qing Shan Jia, Ling Shi, Yilin Mo, and Bruno Sinopoli. On optimal partial broadcasting of wireless sensor networks for kalman filtering. IEEE Transactions on Automatic Control, 57(3):715–721, 2012. [12] S Kar, B Sinopoli, and J. M. F Moura. Kalman filtering with intermittent observations: Weak convergence to a stationary distribution. Automatic Control IEEE Transactions on, 57(2):405–420, 2012. March 16, 2017 DRAFT 18 [13] R. Kalman. A new approach to linear filtering and prediction problems. Journal of basic Engineering, 82(2):35–45, 1960. [14] B. D. O Anderson and J. B. Moore. Optimal Filtering. Prentice-Hall. Englewood Cliffs. NJ., 1979. [15] J. Speyer. Computation and transmission requirements for a decentralized linear-quadratic-gaussian control problem. IEEE Transactions on Automatic Control, 24(2):266–269, 1979. [16] U. A. Khan and J. M. F. Moura. Distributing the kalman filter for large-scale systems. IEEE Transactions on Signal Processing, 56(10):4919–4935, 2008. [17] R. Olfati-Saber. Distributed kalman filter with embedded consensus filters. In Proc. 44th IEEE Conference on Decision and Control, pages 8179–8184, 2005. [18] J. Thia, Y. Yuan, L. Shi, and J. Goncalves. Distributed kalman filter with minimum-time covariance computation. In Proc. 52st IEEE Conference on Decision and Control, 2013. [19] M. Nourian, A. S. Leong, S. Dey, and D. E. Quevedo. An optimal transmission strategy for kalman filtering over packet dropping links with imperfect acknowledgements. IEEE Transactions on Control of Network Systems, 1(1):259 – 271, 2014. [20] H.-N. Wu and H.-D. Wang. Distributed consensus observers-based h∞ control of dissipative pde systems using sensor networks. IEEE Transactions on Control of Network Systems, 2(2):112–121, 2014. [21] R. Olfati-Saber and R. Murray. Consensus problems in networks of agents with switching topology and time-delays. IEEE Transactions on Automatic Control, 49(9):1520–1533, 2004. [22] J. Fax R. Olfati-Saber and R.M. Murray. Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE, 95(1):215–233, 2007. [23] S Sundaram and C. N Hadjicostis. Finite-time distributed consensus in graphs with time-invariant topologies. In American Control Conference, pages 711–716, 2007. [24] A. Y Kibangou. Finite-time average consensus based protocol for distributed estimation over awgn channels. In Decision and Control and European Control Conference, pages 5595–5600, 2011. [25] B. L. Ho and R. Kalman. Effective construction of linear, state-variable models from input/output functions. Regelungstechnik, 14(12):545–548, 1966. [26] W. Ren and R. W. Beard. Consensus seeking in multiagents systems under dynamically changing interaction topologies. IEEE Transactions on Automatic Control, 50(5):655–661, 2005. [27] Y. Yuan, G. Stan, L. Shi, M. Barahona, and J. Goncalves. Decentralised minimum time consensus. Automatica, 49(5):1227– 1235, 2013. [28] R. A. Horn and C. R. Johnson. Matrix Analysis. Cambridge University Press, 1985. [29] Y. Yuan, J. Liu, R. M. Murray, and J. Goncalves. Decentralised minimal-time dynamic consensus. In Proc. American Control Conference, 2012. [30] S. Rump. Structured perturbations part i: Normwise distances. SIAM Journal of Matrix Analysis, Application, 25(1):1–30, 2003. [31] R. Olfati-Saber. Distributed kalman filtering for sensor networks. In Prof. 46th IEEE Conference on Decision and Control, pages 5492–5498, 2007. March 16, 2017 DRAFT 19 A PPENDIX A. Robust DKF algorithm, A2 In the application of A1 to the DKF, due to the communication/observation noise and the numerical error, the Hankel matrix Γ(Y 0,1,··· ,2k ) will not lose rank for any finite dimension k. It is necessary to propose a new robust algorithm that can incorporate both uncertainties and internal/external noises. So, we will design a robust DKF estimator to address Problem 2 In this end, the essential issue is to find a Hankel matrix Γ(Yb0,1,··· ,2k ) to approximate Γ(Y 0,1,··· ,2k ). Since Γ(Yb0,1,··· ,2k ) has finite rank, it can be used to estimate the final consensus value [29] as follows Γ(Yb0,1,··· ,2k ) = argminkΓ(Y 0,1,··· ,2k ) − Γ(Yb0,1,··· ,2k )k, s.t.: det Γ(Yb0,1,··· ,2k ) = 0, Γ(Yb0,1,··· ,2k ) is Hankel (30) where k · k can be any norm and here we pick 2-norm without loss of generality. Accordingly, we present the following procedures (see Algorithm 2 or A2). To explain how A2 works more clearly, we seek assistance from the following lemma and then give a proposition. Lemma 2: [30] Let x ∈ Rn , then there exists a Hankel matrix D ∈ Rn×n , such that Dx = x and kDk2 ≤ 1. Proposition 3: Assume that the Hankel matrix Γ(Y 0,1,··· ,2k ) has full rank, then min kΓ(Y 0,1,··· ,2k ) − H(k, k)k2 = σ(Γ(Y 0,1,··· ,2k )) s.t.: det H(k, k) = 0, H(k, k) is Hankel. (31) where H(k, k) can be obtained by A2. Proof: We first define the hvec operator as a mapping from a square Hankel matrix Rn×n to a h iT vector R(2n+1)×1 . For example, hvec(Γ(Y 0,1,··· ,2k )) = y0 y1 · · · y2k . We now propose an algorithm for computing the nearest defective Hankel matrix with respect to Γ(Y 0,1,··· ,2k ). From A2 , we can see that H(k, k) satisfies the constraints in optimization (30), because a). H(k, k) is Hankel by construction; March 16, 2017 DRAFT 20 b). It is verified that Dv(Γ(Y 0,1,··· ,2k ) = v(Γ(Y 0,1,··· ,2k )), and hence H(k, k)v(Γ(Y 0,1,··· ,2k )) = Γ(Y 0,1,··· ,2k )v(Γ(Y 0,1,··· ,2k )) −σ(Γ(Y 0,1,··· ,2k ))Dv(Γ(Y 0,1,··· ,2k )) = 0. As a consequence, H(k, k) does not have full rank; c). Since H(k, k) − Γ(Y 0,1,··· ,2k ) = −σ(Γ(Y 0,1,··· ,2k ))D and kDk2 ≤ 1, then kH(k, k) − Γ(Y 0,1,··· ,2k )k2 ≤ σ(Γ(Y 0,1,··· ,2k )). Therefore, Γ(Yb0,1,··· ,2k ) = H(k, k) solves the optimization problem (30), which completes the proof. Remark 4: σ(Γ(Y 0,1,··· ,2k )) quantifies the approximation accuracy. More specifically, if it is large (or a bad approximation), then a greater number of observations are required to increase the dimension of the Hankel matrix to gain a better approximation. Meanwhile, in A2, the Hankel matrix H(k, k) is constructed in Step 2. Besides, the c) part of the proof of Proposition 3 has shown the relationship between D and H(k, k). Remark 5: We shall replace Step 3 in A1 with the A2 to make the prediction robust to uncertainty. March 16, 2017 DRAFT 21 Algorithm 2 Decentralized robust minimum-time consensus value computation Data: Successive observations of y(i), i = 0, 1, · · · . Result: Final consensus value: φ. Step 1: At each time step k starting form 0, we take the singular value decomposition of Γ(Y 0,1,··· ,2k ) = U ΣV T , where Σ = diag{σ1 , σ2 , . . . , σk+1 } with σ1 ≥ σ2 . . . ≥ σk+1 = σ(Γ(Y 0,1,··· ,2k )); Step 2: Conduct a singular value decomposition of Γ(Y 0,1,··· ,2k ) and find the smallest singular value σ(Γ(Y 0,1,··· ,2k )) and corresponding singular vector v(Γ(Y 0,1,··· ,2k )). If σ(Γ(Y 0,1,··· ,2k )) ≤ ρ, then go to Step 3, otherwise k = k + 1 and go to Step 1; Step 3: Compute the Hankel vector hvec(D) = Cx+ CxT e1 , where Cx+ is the Moore-Penrose pseudoinverse of Cx , e1 = [1, 0, . . . , 0]T has length of 2k − 1 and  v[1],       Cx =   v[k]   .  ..  v[2] . . . v[k − 1] v[k] .. .. . . v[1] .. . ... v[k]      . . . v[k − 1] v[k]   . v[1] ... v[k − 1]   .. ..  . .  v[1] .. . Step 4: Let Γ(Yb0,1,··· ,2k ) = Γ(Y 0,1,··· ,2k ) − σ(Γ(Y 0,1,··· ,2k ))D. Step 5: Upon obtaining Γ(Yb0,1,··· ,2k ), we adopt Eq. (16) to compute the final consensus value. March 16, 2017 DRAFT
3cs.SY
Convex Computation of the Reachable Set for Hybrid Systems with Parametric Uncertainty Shankar Mohan∗, Victor Shia†, Ram Vasudevan‡ arXiv:1601.01019v1 [math.OC] 5 Jan 2016 January 7, 2016 Abstract To verify the correct operation of systems, engineers need to determine the set of configurations of a dynamical model that are able to safely reach a specified configuration under a control law. Unfortunately, constructing models for systems interacting in highly dynamic environments is difficult. This paper addresses this challenge by presenting a convex optimization method to efficiently compute the set of configurations of a polynomial hybrid dynamical system that are able to safely reach a user defined target set despite parametric uncertainty in the model. This class of models describes, for example, legged robots moving over uncertain terrains. The presented approach utilizes the notion of occupation measures to describe the evolution of trajectories of a nonlinear hybrid dynamical system with parametric uncertainty as a linear equation over measures whose supports coincide with the trajectories under investigation. This linear equation with user defined support constraints is approximated with vanishing conservatism using a hierarchy of semidefinite programs that are each proven to compute an inner/outer approximation to the set of initial conditions that can reach the user defined target set safely in spite of uncertainty. The efficacy of this method is illustrated on a collection of six representative examples. 1 Introduction Computing the set of configurations that are able to safely reach a desired configuration is critical to ensuring the correct performance of a system in dynamic environments where deviations from planned behavior are to be expected. Many methods have been proposed to efficiently compute this set that is generally referred to as the backwards reachable set for deterministic systems. Unfortunately, the effect of intermittent contact with the world, especially in fluctuating environments, is demanding to model deterministically. A roboticist, for example, may be tasked with ensuring that a control for a legged robot beginning from an initial configuration is able to safely reach a desired goal; however, limitations in sensing or environment variability may render exact modeling of terrain height or friction impossible. The development of numerical tools to tractably compute the backwards reachable set of dynamical systems undergoing contact, or hybrid dynamical systems, with parametric uncertainty while providing systematic guarantees has been challenging due to the difficulty of efficiently accounting for the uncertainty. Given the potential utility of the set of configurations that are able to reach a target set despite parametric uncertainty, called the uncertain backwards reachable set, many researchers have attempted to develop numerical tools to approximate this set. For instance, in [9], given a Lyapunov function, the largest ellipsoidal level-set contained in the uncertain backwards reachable set (where the terminal set is the origin) for polynomial systems is computed by formulating an eigenvalue problem. While the method developed is able to address systems with either time-varying or constant uncertainties, the computed ellipsoid is dependent on the provided Lyapunov function and hence is not guaranteed to be the uncertain backwards reachable set. ∗ Shankar Mohan ([email protected]) is with the Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI 48109 † Victor Shia ([email protected]) is with the Department of Electrical Engineering and Computer Sciences, University of California at Berkeley, Berkeley, CA 94720 ‡ Ram Vasudevan ([email protected]) is with the Department of Mechanical Engineering, University of Michigan, Ann Arbor, MI 48109 1 Several other researchers have attempted to utilize this set to construct controllers for legged robots that are able to walk over terrains of varying heights [8, 11, 15, 27]. Their approach has relied on discretizing the height of the terrain or selecting specific terrain profiles while constructing a safe controller across these specified heights, which verifies the performance of the controller only at those specific heights. Moreover, these approaches are unable to account for uncertainty associated with imperfect knowledge of terrain friction or parameters affecting the continuous dynamics. Other researchers have developed tools to outer approximate the uncertain backwards reachable for linear systems with uncertain parameters using a variety of approaches [2, 13]. These methods can be extended to nonlinear hybrid systems, but can require the introduction of a large number of discrete states to represent the nonlinear behavior or require overly conservative estimates of potential uncertainty; this approach of using zonotopes to generate an envelope for system trajectories has been more recently explored in [20]. More generally, Hamilton-Jacobi Bellman based approaches have also been applied to compute the uncertain backwards reachable set for nonlinear systems with arbitrary uncertainty affecting the state at any instance in time [30]. These approaches solve a more general problem, but rely on state space discretization which can be prohibitive for systems of dimension greater than four without relying upon specific system structure [19]. This paper leverages a method developed in several recent papers [16,21,28,29] that describe the evolution of trajectories of a deterministic hybrid dynamical system using measures, to describe the evolution of a hybrid dynamical system with parametric uncertainty as a linear equation over measures. As a result of this characterization the uncertain backwards reachable set can be computed as the solution to an infinite dimensional linear program over the space of nonnegative measures. To compute an approximate solution to this infinite dimensional linear program, a sequence of finite dimensional relaxed semi-definite programs are constructed that satisfy an important property: each solution to this sequence of semi-definite programs is an outer approximation to the uncertain backwards reachable set with asymptotically vanishing conservatism. The approach is most comparable to those that check Lyapunov’s criteria for stability via sums-of-squares programming to verify the safety of a system [25,26]. In contrast to these approaches, the algorithm described in this paper does not require solving a bilinear optimization problem that requires feasible initialization and allows for more general descriptions of the parametric uncertainty in the model. The remainder of the paper is organized as follows: Section 2 introduces the notation used in the remainder of the paper, the class of systems under consideration, and the backwards reachable set problem under parametric uncertainty; Section 3 describes how the backwards reachable set under parametric uncertainty is the solution to an infinite dimensional linear program; Section 4 constructs a sequence of finite dimensional semidefinite programs that outer approximate the infinite dimensional linear program with vanishing conservatism; Section 5 provides extensions to the contents in Section 3 by presenting amongst others, a converging inner approximations of the BRS; Section 6 describes the performance of the approach on a set of examples; and, Section 7 concludes the paper. 2 Preliminaries This section defines the notation, the class of systems, and the problem considered throughout this paper. The reader is directed to [5, 6, 12] for an introduction to some of the measure theoretic concepts utilized in this paper. 2.1 Notation In the remainder of this text the following notation is adopted: sets are italicized and capitalized (ex. K). The boundary of a set K is denoted by ∂K. Finite truncations of the set of natural numbers are expressed as Nn ∶= {1, . . . , n}. The set of continuous functions on a compact set K are denoted by C(K). The ring of polynomials in x is denoted by R[x], and the degree of a polynomial is equal to degree its largest multinomial; the degree of the multinomial xα , α ∈ Nn is ∣α∣ = ∥α∥1 ; and Rd [x] is the set of polynomials in x with maximum degree d. The dual to C(K) is the set of Radon measures on K, denoted as M(K), and the pairing of µ ∈ M(K) 2 and v ∈ C(K) is: ⟨µ, v⟩ = ∫ v(x) dµ(x). (1) K We denote the nonnegative Radon measures by M+ (K). The space of Radon probability measures on K is denoted by P(K). The Lebesgue measure is denoted by λ. Finally, supports of measures, µ, are identified as spt(µ). 2.2 Quasi-Uncertain Hybrid Systems We next define the class of uncertain hybrid systems considered throughout the remainder of the paper; the definition is an adaptation of the description in [7]. Definition 1. A ‘quasi-uncertain’ hybrid system is a tuple H = (J , E, D, Γ, F, G, R), where • J is a finite set of indices of discrete states in of H (discrete states will also be referred to as modes); • E ⊂ J × J is a set of two-tuples describing directed edges; • D = {Dj }j∈J is the set of domains where each Dj is a compact nj -dimensional manifold with boundary where nj ∈ N; • Γ = {µθj }j∈J where µθj ∈ P(Θj ) describes the uncertainty associated with discrete state j ∈ J with Θj being a compact set; • F = {f˜j }j∈J where f˜j ∶ Dj × Θj → Dj is a Lipschitz continuous function (in all variables) describing the dynamics on Dj ; • G = {Ge }e∈E is the set of guards where each G(j,j ′ ) ⊂ ∂Dj is a guard in domain j ∈ J that defines a transition from mode j to mode j ′ ∈ J ; • R = {Re }e∈E is the set of continuous reset maps, where each map is a continuously differentiable injection R(j,j ′ ) ∶ G(j,j ′ ) → Dj ′ . The definition of reset maps needs some clarification. Let A ⊂ G(j,k) be a set such that R(j,k) (A) ⊂ G(k,l) . In this case, we will not be altering the system behaviour by identifying a new guard (or coalescing with an existing guard) G(j,l) such that A ⊂ G(j,l) and re-defining G(j,k) ∶= G(j,k) /A. Hence, without loss of generality, we require that Re (Ge ) ⋂ Ga = ∅, ∀e ∈ E. a∈E a≠e (2) To avoid any ambiguity during transitions between discrete states, we assume the following: Assumption 2. In each discrete state, the guards are mutually exclusive; i.e. G(i,j) ∩ G(i,k) = ∅, ∀(i, j), (i, k) ∈ E, ∀j ≠ k (3) In addition, the systems are not allowed to undergo infinite mode transitions in any finite time-interval. Assumption 3. H has no zeno execution. Algorithm 1 describes the finite-time execution, [0, T ], of a hybrid system, H, as in Defn. 1 as follows: Suppose that the system enters mode j at time t at location x ∈ Dj . Recall that the dynamics in this domain, f˜j , are a function of a random parameter drawn from the distribution µθj ; let this random variable take the value θ. The trajectory of the hybrid system beginning at time t at x is then given by any absolutely continuous function that satisfies the differential equation f˜j with a fixed θ as described in Steps 5 & 6 . This trajectory evolves until either the time evolution passes T or the trajectory arrives at a guard, whichever 3 Algorithm 1 Execution of H 1: Initialization: t = 0, j ∈ J , x0 ∈ Dj , x(0) = x0 2: While 1 do 3: Let θ be drawn according to µθj 4: Let γ∶ [t, T ] → Dj , absolutely continuous st. 5: γ̇(s) = f˜(γ(s), θ) λat -a.e., s ∈ [t, T ] 6: γ(t) = x(t) 7: Λ(j,t) ∶= {r ∈ [t, T ]∣∃(j, k) ∈ E st. (γ(r), θ) ∈ G(j,k) } 8: If Λ(j,t) ≠ ∅ then 9: t′ ∶= min Λ(j,t) , k st. γ(t′ ) ∈ G(j,k) 10: x(s) ← γ(s), ∀s ∈ [t, t′ ) 11: t ← t′ , x(t′ ) ← R(j,k) (γ(t′ )), j ← k 12: else 13: x(s) = γ(s), ∀s ∈ [t, T ] 14: Stop 15: end 16: end a where λt is the Lebesgue measure on [t, T ] 2α β δ θ γ Figure 1: Schematic of the rimless wheel with θ describing the effect of unknown terrain. happens first. Steps 7 – 11 isolates the first hitting-time of a guard of mode j and resets the solution trajectory to a new mode whereafter the same procedure is repeated until t = T . Note that the uncertainty does not evolve with time; the uncertainty only changes when the state trajectory is reset. This class of systems is rich as is illustrated by the following two examples: a simple 1D pedagogical example and a 2D representative of walking models. Example 4 (1-D Quasi-Uncertain Linear System). Consider a quasi-uncertain linear system evolving with dynamics: ẋ = −0.7x + 0.2θ − 0.1, ∀x ∈ D1 (4) where θ is an unknown parameter affecting the dynamics. The system state evolves on D1 = [−1, 1] and the value of θ is drawn from a uniform distribution on Θ1 = [0.2, 1]. The uncertain parameter can be thought of as having arisen due to structural modeling errors, or as a result of reducing a system with time-scale separation. Example 5 (Rimless Wheel on an uneven terrain). The rimless wheel—constituted by a massless axle to which n (angularly) equidistant spokes are connected—is a simple model of legged locomotion [25, 28]. Figure 1 presents a schematic of a rimless wheel—with spokes separated by an angle 2α—rolling down an inclined plane. The rimless wheel is a hybrid system consisting of one mode; every time the spoke makes contact with the surface of the inclined plane, the system undergoes a reset. The continuous dynamics of the rimless wheel are: β̈ = sin(β) (5) where β is the angle between the vertical (which is defined as the line that is perpendicular to the base of the inclined plane) and the pivoting spoke. Once the swinging spoke makes contact with the terrain, the 4 states are reset as: R(1,1) (β − , β̇ − ) = [2γ − β − T cos(2α) β̇ − ] . (6) For a rimless wheel rolling down an inclined plane with flat terrain, at the instance when the swinging spoke makes contact with the ground, β = γ + α. To encode the uncertainty due to terrain height, suppose the δ ), the guard is defined as: rimless wheel encounters a step of size δ, then if we let θ = arcsin ( 2l sin α G(1,1) = {(β, β̇, θ) ∣ β = γ + α + θ}. (7) Observe that as the rimless wheel continues to roll, the terrain is allowed to change since the random variable θ is allowed to take a distinct value after each contact with the ground. 2.3 Problem Description The objective of this work is to estimate the largest set of initial conditions from which all state trajectories of H, regardless of any encountered uncertainty, reach a terminal set by a pre-specified time, T . To formalize the definition of this uncertain backwards reachable set, we denote the terminal set as XT and its projection into each mode by X(T,j) , which we assume is compact. For convenience, we let T = [0, T ]. We define the uncertain backwards reachable set mode-wise: Alg. 1 X(0,j) = {x0 ∈ Dj ∣ ∀x ∶ [0, T ] ÐÐÐ→ D, with x(0) = x0 , x(T ) ∈ XT } (8) The uncertain backwards reachable set is then defined as X0 = {X(0,j) }j∈J . Observe that by definition, all initial conditions originating in any member of X0 must reach XT at time T regardless of mode transitions and uncertainty encountered along the way. Lastly, we assume that mode transitions take place instantaneously. As a consequence, XT and guards must have empty intersections. Assumption 6. The guards and terminal set are mutually exclusive. Remark 7. In describing the execution of the hybrid system, H, it is assumed that guard is a subset of ∂D. There is no loss of generality in making this assumption, since it is always possible to define new modes (by partitioning existing modes) such that the guard lies at the boundary. 3 Problem Formulation In this section, we present a pair of dual infinite dimensional linear programs that compute the uncertain backwards reachable set. Critically, note that despite the uncertainty being drawn from a distribution at the arrival into each mode, it remains constant throughout that mode. As a result, this unknown parameter can be appended to the dynamics of every mode j and treated as a portion of the state-space: T fj = [f˜jT 0Tnθ ] . j (9) To address the problem of estimating the uncertain backwards reachable set (BRS), we rely on the notion of occupation measures, first introduced in [24], to transform the hybrid nonlinear dynamics of the system into a set linear dynamics over measures that can more readily be solved. For instance, suppose the system enters mode j at τk with the states being initialized as x(τk ) = x0 and θ(τk ) = θ, the occupation measure, µj (⋅ ∣ τk , x0 , θ) ∈ M+ (T × Dj × Θj ), is defined as: T µj (A × B × C∣τk , x0 , θ) =∫ IA×B×C (t, x(t∣τk , x0 , θ), θ)dt. 0 5 (10) Note that the following relation between the Lebesgue measure on T , λ, and µj (⋅ ∣ τk , x0 , θ) holds for all v ∈ C(T × Dj × Θj ): ⟨µj (⋅ ∣ τk , x0 , θ), v⟩ = ⟨λ, v(t, x(t ∣ τk , x0 , θ), θ)⟩ . (11) The occupation measure, as defined, is a conditional measure – conditioned on the arrival-time and initial values of the states in that mode. To consider a set of possible arrival-times and initial conditions, we define the average occupation measure by integrating the conditional occupation measure against a measure on the set of possible initial conditions of the mode, µsj ∈ M+ (T × Dj × Θj ): µj (A × B × C) =∫ µj (A × B × C ∣ τk , x0 , θ) dµsj . (12) T ×Dj ×Θj The occupation measure is to be interpreted as the total time that a particular solution trajectory (with a given initial conditions of states, uncertainty and initial time) spends in a set of interest. In contrast, the average occupation measure is the total time spent by all solution trajectories whose initial conditions are in a given set, in a set of interest. Observe that by definition, the uncertain variables are independent of the states’ initial conditions; hence µsi ∈ M+ (T × Dj × Θj ) is expressible as a product measure: µsj = µ̄0j ⊗ µθj , (13) where µ̄0j ∈ M+ (T × Dj ) is a measure describing the set of initial conditions of the states, and µθj ∈ M+ (Θj ) is as in the definition of H. Lemma 9 completes the characterization of the initial measure, µsj . Similarly, measures on terminals sets, µTj ∈ M+ (X(T,j) × Θj ): µTj (A × B) = ∫ IA×B (x(T ∣ τk , x0 , θ), θ) dµsj , (14) T ×Dj ×Θj and guards, µGe ∈ M+ (T × G(j,k) × Θj ): µG(j,k) (A × B × C) =∫ µj (A × B × C ∣ τk , x0 , θ) dµsj , (15) T ×Dj ×Θj for all (j, k) ∈ E are defined. The measures µG(j,k) are supported on the guards of mode j and should be interpreted as the hitting times of the guard. Note that µG(i,j) has been defined with a slight abuse of notation. Guards were introduced in Defn. 1 as subsets of ∂D. In the uncertain description, if the guard description does not depend on θ, then spt(µGe ) = G(j,k) × Θj ; otherwise spt(µGe ) ⊂ G(j,k) × Θj . Remark 8. Note the similarity between the definitions of µJ and µGE (Eqns. (12) and (15)); µG(j,k) is the restriction of µj to G(j,k) (denoted by µj ∣G(j,k) ). The final measure in each mode j is then defined as: µfj = δT ⊗ µTj + ∑ µG(j,k) . (16) k∈{l∣(j,l)∈E} To compute X0 , we relate {µsj }j∈J with {µfj }j∈J using the dynamics of the system. As a first step, define linear operators Lfj ∶ C 1 (T × Dj × Θj ) → C(T × Dj × Θj ) as: Lfj v = ∂v + ⟨∇x v, f˜j ⟩ ∂t (17) where v ∈ C 1 (T × Dj × Θj ; R) is an arbitrary test function and ∇x v computes the gradient of v in the Dj coordinates. Suppose the system transitioned to mode j at t = τk−1 with the state vector taking value upon 6 reset x(τk−1 ) and θ. The value of v, evaluated along the flow of the system and at t = τk is computed using the Fundamental Theorem of Calculus: v(τk , x(τk ∣ x(τk−1 ), θk−1 )) = v(τk−1 , x(τk−1 ), θk−1 ) τk +∫ Lf v(t, x(t ∣ τk−1 , x(τk−1 ), θk−1 )) dt. (18) τk−1 Using Eqn. (11), Eqn. (18) can be re-written as: v(τk ,x(τk ∣ τk−1 , x(τk−1 ), θk−1 )) = v(τk−1 , x(τk−1 ), θk−1 ) + ⟨µj (⋅ ∣ τk−1 , x(τk−1 , θk−1 ), Lf v⟩ , (19) which can be simplified further by using Eqns. (12)–(16): ⟨µfj , v⟩ = ⟨µsj , v⟩ + ⟨µj , Lf v⟩ . (20) Alternatively, using the standard definition of adjoint operators1 , Eqn. (20) is re-written as: ⟨µfj , v⟩ = ⟨µsj , v⟩ + ⟨L′f µj , v⟩ . (21) Eqn. (21) defines a linear relation that initial and final measures evolving according to the hybrid dynamics must satisfy. Lemma 19 formalizes this relation between trajectories of the system and Eqn. (21). With the average occupation and final measures defined, Lemma 9 completes the characterization of the Liouville eqn. by providing an explicit expression for the starting measure. Lemma 9. The initial measure in each mode j, µsj , is expressible as the following µsj = δ0 ⊗ µ0j ⊗ µθj + ∗ ∗ R(i,j) (π(t,x) µG(i,j) ) ⊗ µθj , ∑ (22) i∈{k∣(k,j)∈E} ∗ where π(t,x) denotes the pushforward constructed by lifting the (t, x)-projection operator, π(t,x) ∶ T ×Dj ×Θj → ∗ T × Dj , to measures; and R(i,j) is the lifting of the reset map between modes i and j. Proof. During the execution of a hybrid system, any mode can be entered either at t = 0 or due to a reset. By definition of quasi-uncertain systems (Defn. 1 and Alg. 1), the value of the uncertain parameter in each mode is independent of the state’s initial condition. Hence, the measure on initial states and uncertainty values is a product measure. Let δ0 ⊗ µ0j × µθj ∈ M+ ({0} × Dj × Θj ) be the measure on the set of initial conditions of system states at t = 0; and σ0j ∈ M+ (T × Dj × Θj ) be the measure on initial conditions because of trajectory resets. Then, the initial measure in the (t, x)-coordinate, using notations from Eqn. (13), can be decomposed as: ∗ µ̄0j = δ0 ⊗ µ0j + π(t,x) σ0j (23) ∗ where π(t,x) is the pushforward measure under the projection operator (refer to Chapter 11 in [18] for an introduction to pushforwards). Trajectory resets occur if and only if trajectories reach any of the guards; hence σ0j and µGe , ∀e ∈ E must be related. To formalize this relationship notice that σ0j can be decomposed into measures corresponding to the source of each reset: σ0j = σ(i,j) ⊗ µθj , ∑ i∈{k∣(k,j)∈E} where σ(i,j) is the measure describing initial conditions that are reset into mode j from guard G(i,j) . 1A linear operator L and its adjoint, L′ , satisfy the following relation: ⟨L′ µ, v⟩ = ⟨µ, Lv⟩ . 7 (24) Upon reaching guard G(i,j) , the trajectories transition according to the reset map, R(i,j) . Reset R(i,j) is independent of the value of the uncertainty (by Defn. 1); and the uncertainty in the dynamics upon reset (if any), in mode j, is independent of the uncertainty (if any) in mode i. Thus, only the (t, x)-marginal of ∗ µG(i,j) affects σ(i,j) . Finally, since µθi is a probability measure, the (t, x)-marginal is equal to π(t,x) µG(i,j) . Applying a change of variables formula we have for all w ∈ C(T × Dj ) [5, Theorem 3.6.1]: ∗ ⟨σ(i,j) , w⟩ = ⟨π(t,x) µG(i,j) , w ○ R(i,j) ⟩ . (25) ∗ Essentially, σ(i,j) is the pushforward measure of π(t,x) (µG(i,j) ) under R(i,j) , and we have the expression in the statement of the Lemma. 3.1 The primal The problem of computing the uncertain backwards reachable set of H can be formulated as an infinitedimensional linear program that supremizes the volume of the set of initial condition: ∑ ⟨µ0j , 1⟩ sup (P ) Λ j∈J st. µsj + L′f µj = µfj ∀j ∈ J (26) µ0j + µ̂0j = λj ∀j ∈ J (27) ∑ ⟨µTj , 1⟩ = ∑ ⟨µ0j , 1⟩ (28) j∈J j∈J where λj is the Lebesgue measure supported on Dj , Λ = {(µJ , µ0J , µTJ , µ̂0J , µGE ) ∈ ⨉ M+ (T × Dj × Θj ) ⨉ M+ (Dj ) ⨉ M+ (X(T,j) × Θj ) ⨉ M+ (Dj ) j∈J j∈J j∈J j∈J ⨉ M+ (T × Ge × Θj )}, and 1 denotes the function that takes value 1 everywhere. µ̂0j ∈ M(Dj ) are slack e∈E variables introduced to ensure that the mass of the µ0j are identical to the volume (under the Lebesgue measure) of the uncertain backwards reachable set, as proven in Thm. 10. Eqn. (28) ensures that all trajectories that emanate ∪j∈J spt(µ0j ) reach XT at t = T . Theorem 10. If ({µsj }j∈J , {µj }j∈J , {µfj }j∈J ) is a solution to (P ), then X(0,j) = spt(µ0j ) for each j ∈ J . In addition, the optimal value of (P ) is equal to the sum of volumes of the uncertain backwards reachable set in each mode, i.e. ∑j∈J λj (X0j ). Proof. We prove this Theorem by showing that the BRS contains the supports of µ0j , ∀j ∈ J and that the union of supports of µ0j contains the BRS. Suppose that ⋃j∈J spt(µ0j )/X0 ≠ ∅; this implies that by Lemma 19 (in the appendix), there exist trajectories that begin in ⋃j∈J (spt(µ0j )/X(0,j) ) and terminate in XT . This is a contradiction since the BRS is the largest set of initial conditions from which trajectories can reach XT at time t = T . Thus, ⋃ spt(µ0j ) ⊂ ⋃ X(0,j) , j∈J (29) j∈J ∑ λj (spt(µ0j )) ≤ ∑ λj (X(0,j) ). j∈J (30) j∈J By definition of the BRS, all state trajectories that emanate from a subset of X0 end in XT . That is, for each j ∈ J and initial measure µ0j , if spt(µ0j ) ⊂ X(0,j) , there exist measures µj and µfj that satisfy Eqn. (26). Thus the following inequality is true: ∑ λj (spt(µ0j )) ≥ ∑ λj (X(0,j) ) j∈J (31) j∈J From Eqns. (30) and (31), ⋃j∈J spt(µ0j ) is the BRS of the system. That the optimal value of (P ) is the volume of the uncertain backward reachable set follows by noting that the slack variables ensure absolute continuity of each µ0j with respect to the Lebesgue measure and the observation that λj ∣X(0,j) , ∀j ∈ J is feasible in (P ). 8 3.2 The dual The dual to (P ) for a quasi-uncertain hybrid system H can be written as: ∑ ⟨λj , wj ⟩ inf (D) F j∈J st. wj ≥ 0 ∀x ∈ Dj ∀j ∈ J (32) vj (T, x, θ) + q ≥ 0, ∀(x, θ) ∈ Φj ∀j ∈ J (33) − Lf vj (t, x, θ) ≥ 0, ∀(t, x, θ) ∈ Ωj ∀j ∈ J (34) wj − ⟨µθj , vj (0, x, θ)⟩ − q ≥ 1, ∀x ∈ Dj ∀j ∈ J (35) vj − ⟨µθk , vk ⟩ ○ R(j,k) ≥ 0, ∀(x, θ) ∈ G(j,k) × Θj ∀j ∈ J (36) (j, k) ∈ E where F = {(vJ , wJ , q) ∈ ⨉ C 1 (T × Dj × Θj ) ⨉ C(Dj ) × R}, Φj = X(T,j) × Θj and Ωj = T × Dj × Θj . j∈J j∈J Remark 11. The dual to (P ) as stated in (D), is a result of a slight abuse of notations. By definition, ∀(i, j) ∈ E, R(i,j) ∶ Di → Dj ; however, for notational convenience, in (D), R(i,j) is assumed to have been defined as R(i,j) ∶ T × Di → T × Dj with the mapping being identity in the t-component and the standard R(i,j) in the x-components. The solution to D can be used to determine the uncertain backwards reachable set: Lemma 12. If ({v}j∈J , {wj }j∈J , q) is a feasible point to D, then the super-level set: ⋃ {x ∈ Dj ∣ wj (x) ≥ 1} (37) j∈J is an outer approximation of the uncertain backwards reachable set of H. Furthermore there is a sequence of feasible solutions to (D) such that for each j ∈ J , the 1-super-level set of the feasible wj converges from above to the indicator function on X(0,j) in the L1 norm and almost uniformly. Proof. To prove this lemma we project the uncertain backwards reachable set into each mode and show that it is part of the 1-level set of w. Assume that the state trajectory terminates in X(T,jk ) for some jk The state trajectory must have arrived in mode jk through a finite sequence of mode-transitions (according to Assumption 3). Let this sequences of mode-transitions be of length k. Suppose the trajectory entered mode jk at time τk , then from the Fundamental Theorem of Calculus (FTC) and the constraints in (D), the following inequalities hold: −q ≤ vjk (T, x(T ∣ x(τk+ ), θ), θ) ≤ vjk (τk , x(τk+ ), θ) (Eqn. (33)) (38) (FTC & Eqn. (34)) (39) Now, integrating both sides of Eqn. (39) wrt. µθjk , and noting that µθjk is a probability measure, we get −q ≤ ⟨µθjk , vjk (τk , x(τk+ ), θ)⟩ . 9 (40) By iterative application of the constraints in (D), it follows that: −q ≤ ⟨µθjk , vjk ⟩ ○ R(jk−1 ,jk ) (τk , x(τk− )) (Reset) ≤ vjk−1 (τk , x(τk− ≤ + ∣ x(τk−1 ), θ), θ) + ⟨µθjk−1 , vjk (τk , x(τk−1 ), θ)⟩ (41) (Eqn. (36)) (42) (43) ⋮ ≤ vj0 (τ1 , x(τ1− ∣ x0 , θ), θ) (44) ≤ vj0 (0, x0 , θ) (45) ≤ ⟨µθj0 , vj0 (0, x0 , θ)⟩ (46) ≤ wj0 (x0 ) − q − 1. (Eqn. (35)) (47) The final inequality implies that the initial condition of every trajectory that ends in the terminal set belongs to the 1-superlevel set of wj for some j ∈ J . The remainder of the proof follows from a straightforward extension to [16, Theorem 2]. Finally, note that the value computed by either optimization problem is equal which follows from [4, Theorem 3.10] and is similar to [16, Theorem 2]: Lemma 13. Formulations (P ) and (D) are equivalent and have the same optimal value. In the next section, we present a method to numerically solve the dual problem. Remark 14. There are two key aspects of the presentation that deserve re-iteration: First, the uncertainties that influence the dynamics are drawn from the distribution each time a trajectory enters a new mode; Second, the uncertain backwards reachable set corresponds to the set of initial conditions for all trajectories that are able to reach the terminal set in spite of all possible sequences of uncertainty that each have non-zero probability. Notice that the uncertain backwards reachable set is the intersection of the backwards reachable set for every possible discrete uncertainty with non-zero probability. 4 Numerical Implementation In this section, a sequence of Semidefinite Programs (SDP)s that approximate the solution to the infinite dimensional primal and dual defined in §3.1 and §3.2 are introduced. This sequence of relaxations is constructed by characterizing each measure using a sequences of moments2 and assuming the following: Assumption 15. The vector field in each mode and reset map between modes is a polynomial. Moreover the domain, the value of uncertainties, the guard, and the target set in each mode is a semi-algebraic set. Recall that polynomials are dense in the set of continuous functions by the Stone-Weierstrass Theorem [12]; so this assumption is made without much loss of generality. Under this assumption, given any finite d-degree truncation of the moment sequence of all measures in the primal (P ), a primal relaxation, (Pd ), can be formulated over the moments of measures to construct an SDP. The dual to (Pd ), (Dd ), can be expressed as a sums-of-squares (SOS) program by considering d-degree polynomials in place of the continuous variables in D. To formalize this dual program, first note that a polynomial p ∈ R[x] is SOS or p ∈ SOS if it can be written 2 m as p(x) = ∑m i=1 qi (x) for a set of polynomials {qi }i=1 ⊂ R[x]. Note efficient tools exist to check whether a finite dimensional polynomial is SOS using SDPs [23]. Next, suppose we are given a semi-algebraic set A = {x ∈ Rn ∣ hi (x) ≥ 0, hi ∈ R[x], ∀i ∈ Nm }. We denote the d-degree quadratic module of A as: Qd (A) = {q ∈ Rd [x] ∣ ∃{sk }k∈Nm ∪{0} ⊂ SOS s.t. q = s0 + ∑ hk sk } k∈Nm 2 The nth moment of a measure (µ) is obtained by evaluating the following expression yµ,n = ⟨µ, xn ⟩ . 10 (48) The d-degree relaxation of the dual, Dd , can be written as: inf ∑ ∫ Ξ d j∈J Dj wj (x) dλj (x) st. wjd ∈ Qd (X(T,j) ) vjd (T, ⋅) + q ∈ Qd (Dj × Θj ) − Lfj vjd ∈ Qd (T × Dj × Θj ) wjd − ⟨µθj , vjd (0, ⋅)⟩ − q − 1 ∈ Qd (Dj ) vjd − ⟨µθk , vkd ⟩ ○ R(j,k) ∈ Qd (T × Dj × Θj ) (Dd ) (49) ∀j ∈ J (50) ∀j ∈ J (51) ∀j ∈ J (52) ∀j ∈ J (53) ∀(j, k) ∈ E (54) d d where Ξd = {(vJ , wJ , q) ∈ ⨉ Rd [t, x, θ] ⨉ Rd [x] × R}. A primal can similarly be constructed, but the j∈J j∈J solution to the dual can be used directly generate a sequence of outer approximations to the uncertain backwards reachable set: Theorem 16. For each d ∈ N and j ∈ J , let wjd denote the j-slice of the w-component of the solution to Dd . Then X(0,jd ) = {x ∈ Dj ∣ wjd (x) ≥ 1} is an outer approximation to X(0,j) and limd→∞ λnj (X(0,jd ) /X(0,j) ) = 0. Proof. The proof to this lemma is an extension of Theorems 5–7 in [28] given Lemma 12. 5 Extensions In this section, we present extensions to the problem formulation presented in §3. All results presented in §3 and 4 hold for the formulations contained herein; proofs are largely identical and are omitted. 5.1 Free terminal time The formulation in §3 aimed at identifying the BRS of quasi-uncertain hybrid systems given a fixed terminal time T and a terminal set XT . Suppose it is of interest to estimate the BRS which includes all initial conditions from which trajectories reach XT at some time t ≤ T . This problem of computing the uncertain backwards reachable set of H can be formulated as the following infinite-dimensional linear program that supremizes the volume of the set of initial conditions: sup (P T ) ∑ ⟨µ0j , 1⟩ Λ j∈J st. µsj + L′f µj = µfj ∀j ∈ J (55) µ0j + µ̂0,j = λj ∀j ∈ J (56) ∑ ⟨µTj , 1⟩ = ∑ ⟨µ0j , 1⟩ j∈J (57) j∈J where λj is the Lebesgue measure supported on Dj , Λ = {(µJ , µ0J , µTJ , µ̂0J , µGE ) ∈ ⨉ M+ (T × Dj × Θj ) ⨉ M+ (Dj ) ⨉ M+ (X(T,j) × Θj ) ⨉ M+ (Dj ) j∈J j∈J j∈J j∈J M+ (T × Ge × Θj )}. ⨉ e∶=(j,k)∈E This formulation differs from (P ) only in that µTj , is now supported on T × X(T,j) × Θj as opposed to X(T,j) × Θj . This change in support translates into admitting initial conditions from which solution trajectories reach XT at some time before t = T + for all sequences of uncertainties, as a part of the BRS. Note that this does not mean that solution trajectories remain in X(T,j) × Θj for all time, upon first entry. 5.2 Inner approximations As as review, according to the execution of quasi-uncertain hybrid systems (Alg. 1), the BRS of a set XT is the set of initial conditions that reach XT for all possible sequences of uncertainties (refer to §2 for 11 definition). Given a terminal set XT , the problem formulation presented in §3 and the subsequent relaxations in §4 provide outer approximations of the BRS. In some situations, inner approximations of the BRS are more informative since they guarantee that points in the interior of the set obtained through relaxations will satisfy the problem objectives. In this section, we present a problem formulation whose relaxations provide convergent inner approximations of the BRS by adapting the technique presented in [17]. For quasi-uncertain hybrid systems with the BRS as defined in §2, constructing a sequence of convergent inner approximations of the BRS of a set XT is analogous to constructing a sequence of convergent outer approximations of the set of initial conditions for which there exists a set (of non-zero measure) of sequences of uncertainties, (θ)n , for which the resulting trajectories fail to arrive at the terminal set at t = T . The infinite-dimensional problem of interest in this case, employing the nomenclature adopted in §3, is the following: (P p ) ∑ ⟨µ0j , 1⟩ sup Λ j∈J st. µsj + L′f µj = µfj ∀j ∈ J (58) µ0j + µ̂0,j = λj ∀j ∈ J (59) ∑ ⟨µTj , 1⟩ = ∑ ⟨µ0j , 1⟩ j∈J (60) j∈J where λj is the Lebesgue measure supported on Dj , c Λ = {(µJ , µ0J , µTJ , µ̂0J , µGE ) ∈ ⨉ M+ (T × Dj × Θj ) ⨉ M+ (Dj ) ⨉ M+ ((X(T,j) ⋂ Dj )) ⨉ M+ (Dj ) j∈J j∈J j∈J j∈J M+ (T × Ge × Θj )}. ⨉ e∶=(j,k)∈E Problem (P p ) differs from (P ) on two main counts – (1) how uncertainty in incorporated; (2) definition of the final measure in each mode. In problem (P ), uncertainty was augmented as a state with a given initial distribution; in (P p ), the uncertainty is considered as a bounded input to the system. This difference harks back to the objective of the inner approximation problem – find all initial conditions that fail to reach XT for some sequence of uncertainty. By assuming that θ is a bounded control whose value can be arbitrarily chosen, we are able to search over all possible uncertainty sequences (which includes, specifically, the class of uncertainties that is constant in each mode and changes value upon trajectory reset). For solution trajectories to fail to arrive ar XT at t = T , one of the following must be true: solution trajectories either leave the space at some time3 t ∈ [0, T ] or they arrive at D/XT at t = T for some sequence of uncertainty. That is, employing the same nomenclature as in §3, the final measure in each mode is give by µfj = δT ⊗ µTj + µ∂j + ∑ µG(j,k) (61) k∈{l∣(j,l)∈E} c where µTj ∈ M+ ((X(T,j) ⋂ Dj )×Θj ), µ∂j ∈ M+ (T ×(∂Dj − ⋃k∈{l∣(j,l)∈E} G(j,k) )) and µG(j,k) ∈ M+ (T ×G(j,k) × Θj ), ∀(j, k) ∈ E. In the above definition, µ∂j is a measure that traps trajectories that leave the domain, Dj , and not pass through any of the guards. Note that µTj in (P p ), unlike in (P ), is supported on the complement of X(T,j) ; that is, mirroring out desire to characterize the set of initial conditions from which solution trajectories fail to reach X(T,j) . It should be remarked that to be able to derive guarantees/results for (P p ) as we have done for (P ), we need the following technical assumption. Assumption 17. XT is an open subset of D; hence XTc is closed; and XTc ⋂(⋃e∈E Ge ) = ∅. 6 Examples In this section, the proposed method is applied to six examples of varying complexities. The examples are chosen to highlight different variants of the problem description: 3 For a hybrid system, given that guards are subsets of the boundary (Remark 7), leaving the space is equivalent to arriving at ⋃j (∂Dj − ⋃k∈{l∣(j,l)∈E} G(j,k) ) at t ∈ [0, T ]. 12 βst βsw Figure 2: Schematic of the compass gait walker. 1. The compass-gait without uncertainty shows the applicability to deterministic systems 2. The 1D example in Ex. 4 and another example adopted from [9] are used to as benchmark examples for computing the uncertain BRS for linear and nonlinear systems 3. The rimless wheel is an example in which guards are uncertain 4. The bean-bag toss serves as an example for the free terminal-time formulation in §5.1 and frictional cone uncertainties 5. A variant of logistic resource growth dynamics is used to demonstrate inner approximations The relaxed dual problems are constructed using the SPOTLESS toolbox [1] and solved with MOSEK on a computer equipped with a Intel Xeon W3540 processor and 12GB of RAM. Note that, considering the definition of BRS in §2, for all probability distributions with identical support, the problem formulation will generate the same uncertain backwards reachable set. As a result it is assumed that the disturbance, θ, is uniformly distributed (denoted as θ ∼ U([a, b]) for θ uniformly distributed in the interval [a, b]). Additionally for numerical stability, the domains of modes of the hybrid system are scaled to a box of the appropriate dimension. 6.1 Compass Gait Walker without Uncertainty The compass gait (CG) walker is a simple model of legged locomotion consisting of two legs: one leg fixed to the ground called the stance leg, and one leg that swings called the swing leg and shown in Fig. 2. The CG is a one mode hybrid system in which the guard is reached when the swing leg makes contact with the inclined plane, upon which the swing and stance leg switch. With different slopes and parameters, the CG has been found to reach a limit cycle consisting of 1, 2+ steps [14]. In this example, we consider a passive CG walker with no actuation. Let β = [βsw , βst ] and l = a + b, the dynamics of the passive CG are given by: M (β, β̇)β̈ + C(β, β̇)β̇ + N (β) = 0 where M (β, β̇) = [ C(β, β̇) = [ mb2 −mlb cos(βst − βsw ) 0 mlb sin(βst − βsw )β̇sw N (β) = [ (62) −mlb cos(βst − βsw ) ] (mh + m)l2 + ma2 (63) mlb sin(βst − βsw )β̇st ] 0 (64) mbg sin(βsw ) ] −(mh l + ma + ml)g sin(βst ) (65) The guard is defined as when the swing leg hits the inclined slope and mathematically defined as: G(1,1) = {(β, β̇) ∣ βsw + βst + 2γ = 0}. 13 (66) 3 2 β̇ 1 0 -1 -2 -3 -0.4 -0.2 0 0.2 0.4 0.6 β Figure 3: The finite time region of attraction, shaded in gray, for the compass gait’s limit cycle. The swing and stance leg limit cycles are projected down to the (β, β̇) domain and denoted by the blue and red line, respectively. The time horizon is 1s. The reset map is given by: R(1,1) (β − , β̇ − ) = [βst where Q−α = [ Q+α = [ −mab 0 βsw (Q+α ) −1 Q−α β̇ − ] ′ −mab + (mh l2 + 2mal) cos(2α) ] −mab mb(b − l cos(2α)) mb2 ml(l − b cos(2α)) + ma2 + mh l2 ] −mbl cos(2α) (67) (68) (69) and α = βsw2−βst . The reset dynamics are derived using conservation of momentum resulting in a loss of kinetic energy. The loss of kinetic energy is recovered via change in potential energy as the CG walks down the slope. Prior to [22] which presents an inner-approximation to the BRS, the BRS was limited to exhaustive simulation. However, [22] is limited to a small region and misses much of the BRS. For computation, we consider the 5th order Taylor approximation of the dynamics about the origin and a linearized reset map about the point where the limit cycle encounters the guard. Figure 3 presents the polynomial degree 10 approximation to the backwards reachable set for the compass gait (with γ = 0.05) which is tasked with reaching within 0.1 of the limit cycle (in black) in T = 1 second with mh = 10kg, m = 5kg, a = b = 1. Through simulation of 10,000 points in the BRS, we find that 70% of the BRS reaches within 0.1 of the limit cycle. 6.2 1-D Quasi-Uncertain Linear System Recall the 1-D linear dynamical system from Ex. 4 whose dynamics are: ẋ1 = −0.7x1 + 0.2θ − 0.1, 14 (70) 1.6 1.4 w20 1.2 @BRS 1 @BRS 0.8 @X 0.6 0.2 0 0 0.4 0.2 0 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 x Figure 4: Comparison between indicator functions on analytically computed backwards reachable sets of the 1D linear system in Eqn. (70) and w20 obtained as a part of the solution to D20 . The 1-level superset of w20 encompasses the intersection of the backward reachable sets when the uncertainty takes extreme constant values. where θ ∈ U([0.2, 1]). Setting T = 1, the target set is chosen as XT = [0.2, 0.4]. If θ was a fixed constant then the BRS for the system evolving with this known constant is analytically computed to be 2θ − 1 0.7 2θ − 1 )e + , 7 7 2θ − 1 0.7 2θ − 1 (0.4 − )e + ]. 7 7 BRSθ = [(0.2 − (71) Note that the expression for the BRSθ is linear in θ and that the width of BRSθ is constant for all values of θ. As the value of θ changes, BRSθ slides along R; thus, the intersection of BRS0.2 and BRS1 is the uncertain backwards reachable set of the system in Eqn. (70) system. Figure 4 plots the degree 20 approximation of the indicator function of X0 , w20 , that solves D20 and the analytically computed indicator functions supported on BRS0.2 and BRS1 , and χX0 . Observe that the 1-level superset of w20 contains X0 and hence is an outer approximation of X0 . 6.3 Rimless Wheel on Uneven Terrain The rimless wheel, introduced in Ex. 5, is a one mode hybrid system in which the guard is reached when the swinging spoke makes contact with the inclined plane. For a rimless wheel rolling along an inclined plane with no terrain height variation (apart from the deterministic incline), an analytically computable stable limit cycle exits [10]; however, for the case considered in this example—with the inclined plane having variations in terrain height—the definition of a limit cycle is less clear. In this example, we define the terminal set as an  band around the stable limit-cycle of the disturbance-free system. Figure 5 presents the polynomial degree 14 approximation to the uncertain backwards reachable set (black dashed) for the rimless wheel (with α = 0.4) which is tasked with arriving within the red band in T = 4 seconds, as it is rolling down an inclined plane with slope γ = 0.2. The uncertain parameter, θ, which affects the terrain height as described earlier in Ex. 5, is drawn from a uniform distribution, θ ∼ U([−0.1, 0.1]). The maximum terrain variation is about 25% of the length of each spoke. With this setup, by the terminal time, somewhere between four and six spokes will have made contact with the wedge. The outer approximation of the uncertain BRS is validated by performing Monte Carlo simulations; the unit box is discretized into 51 points in either direction and 100 independent trajectories are simulated (using MATLAB’s ode45 function) from each initial condition. The blue dots depict the initial conditions that arrived within the terminal set at the desired time without violating any constraint. Note that the set 15 1 0.9 0.8 0.7 -_ 0.6 0.5 0.4 0.3 0.2 0.1 0 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 Figure 5: Comparing outer approximations with Monte Carlo simulations. The dotted curve depicts the boundary of the outer approximation of the backward reachable set of a PRW tasked with reaching the red band by t = 4 seconds. The blue dots represent a sampling of the true backwards reachable set obtained by performing Monte Carlo simulation; for each initial condition, 100 trials were performed and only those initial conditions from which no trajectory violated constraints and reached XT at t = 4 were included. of points that succeeded in the Monte Carlo simulation is contained entirely in the uncertain BRS computed using our formulation. In fact, as a result of our method, we know that for points outside of the black region there exist a sequence of terrain heights that produces a trajectory that does not arrive at the target set at the designated time. Monte Carlo simulations for this example were performed on a computer with two Intel Xeon E5-2660 processors and 128 GB of RAM. The program was written and executed in parallel in MATLAB 8.4.0 using the parallel processing toolbox and took 21019 seconds to compute the result. In comparison, the proposed method, when solved on an arguably lesser computational resource, took 4487 seconds to solve D14 . 6.4 An example from literature We next consider the following benchmark example from [9, 31] −x1 −6x2 + x22 + x31 4x2 − x22 ẋ = [ ]+[ ]δ + [ ] δ2 3x1 − 2x2 −10x1 + 6x2 + x1 x2 12x2 − 4x2 (72) with δ ∼ U([0, 1]). We solve the outer approximation dual formulation with the terminal set described by a ball of radius 0.05 centered at the origin, for different values of terminal time, T . Figure 6 presents a comparison between the obtained 16-degree outer approximations and the true BRS as estimated by sampling the space for when T = 5 s and T = 10 s; in both cases, the 1-superlevel set is an outer approximation of the BRS. 6.5 Bean-bag toss In this example, we consider a simplified version of the party game involving tossing a bean-bag onto an inclined plane which has a designated target-zone. If the motion of the bean-bag (of mass m) is considered 16 5 0 x1 1 1 T =5 s T = 10 s 0.5 x2 0.5 x2 0 0 -0.5 -0.5 -0.5 0 x1 -1 -1 0.5 0 x1 1 Figure 6: Estimated degree-16 BRSs with terminal set B0 (0.05) (dashed) and corresponding0.5 result of MC simulation (dots); (a) terminal time T = 5 s, (b) terminal time T = 10 s. as it leaves the hand of the player, its equation of motion can be modeled as a hybrid system0 with three states: (mode 1) flight, (mode 2) sliding, and (mode 3) rest. The dynamic equations in each mode is given by the following x2 1 -1 Mode 1 Mode 2 Mode 3 T T [ẋ1 ẋ2 ẏ1 ẏ2 ] = [x2 0 y2 −g] d˙ d2 [ ˙1 ] = [ ] mg sin(γ) − sgn(d d2 2 ) µk mg cos(γ) [d˙1 ] = [0] . -0.5 -0.5 (73) (74) (75) In the above description, in mode 1, the states correspond to position and velocities in cartesian coordinates; when the bean-bag makes contact with the wedge (of slope γ), it is assumed that the impact is inelastic and the system transitions to mode 2. Upon transitioning to mode 2, a coordinate transformation is applied and the states of the dynamic model correspond to the position of the bean-bag relative to the end of the wedge ˙ If the bean-bag slides along the wedge, it may reach the (d), and the sliding velocity along the wedge (d). target-zone located at d = 0.55 and shaped as a ball of radius 0.05 m; whereupon the bean-bag falls and comes to rest (dynamics transitions to mode 3). It should be noted that as the bean-bag slides, its motion is impeded by friction with an uncertain kinetic frictional coefficient µk ∈ [0.37, 0.97]. The various guards and reset maps of this hybrid system are mathematically represented as G(1,2) = {(x1 , x2 , y1 , y2 ) ∈ R4 ∣ y1 = x1 tan(γ)}, 2 (76) G(2,3) = {(d1 , d2 ) ∈ R ∣ d2 = 0}, (77) R(1,2) ↦ [y1 csc(γ); x2 cos(γ) + y2 sin(γ)], (78) R(2,3) ↦ d1 . (79) Suppose the mass of the bean-bag is m = 0.5 Kg, γ = π/6, and the length of the inclined face of the wedge is 1 m, and additionally that the velocity of the bean-bag as it slides d˙ ∈ [−1, 1]. We are interested in knowing the positions, (x1 , y1 ), and velocities, (x2 , y2 ), at which one should toss the bag to ensure that it falls into the hole on the wedge. In Fig. 7 we present the projection of the BRS onto mode 2. The blue dots correspond to the initial values of states on mode 2 that reach XT at some time for all admissible values of µk (the true BRS); the dashed red line is the outer approximation obtained by utilizing the formulation in §5.1. 6.6 An example of inner approximation Consider the 1D system whose dynamics is described by a variant of the logistic resource growth equation ẋ = 0.2x2 + θx, ∀(x, θ) ∈ [−1, 1] × [0, 0.3]. 17 (80) 0 x1 1 d_ 0.5 0 -0.5 -1 0 0.2 0.4 0.6 0.8 1 d Figure 7: Projection of the BRS of a bean-bag of mass 0.5 Kg thrown onto a 1 m long π/6-wedge with hole located at XT = [0.5, 0.6]. The kinetic frictional coefficient of the wedge’s slope, µf ∈ [0.37, 0.97], is not known with certainty. The blue dots are the landing points that hit the target; the interior of the red region in the outer approximation of the BRS. iBRS3 1.5 oBRS3 w 1 0.5 0 -1 -0.5 0 x 0.5 1 Figure 8: Outer and inner approximations of the BRS of a 1D system exhibiting transcritical bifurcation. The terminal set, XT , T = 1 is a ball of radius 0.3 about the origin. The dashed black boxes are characteristic functions of the true BRS of the uncertain system (Eqn. (80)). The indicator functions of degree 12 for outer and inner approximations are presented in solid red and dot-dashed blue respectively. This system exhibits transcritical bifurcation as the value of θ changes. That is, when θ = 0, the origin is attractive for all x < 0, and for other values of θ, the origin is unstable and a new stable equilibrium is created in the left half plane; regardless of the value of θ, the origin is repulsive for all x > 0. Let the space be divided two modes D1 = [−1, 0] and D2 = [0, 1], with a guard, G(1,2) at x = 1, and associated reset map R(1,2) (x) = −x/6. This reset maps traps trajectories leaving the space from the right and maps them into the left half plane, and closer to the equilibria. Suppose it is of interest to determine the BRS associated with the terminal set XT = [−0.3, 0.3] with T = 1. Figure 8 presents the degree 12 outer (oBRSθ ) and inner approximations (iBRSθ ) of the indicator function, w, on the BRS, and the true BRS of this uncertain system. Observe that the inner and outer approximations of the BRS are as expected. 18 7 Conclusions In this paper, a convex optimization approach is presented to compute the backwards reachable set of quasi-uncertain hybrid systems. The presented method optimizes over the set of unsigned measures using converging moment relaxations that can be solved using SDPs. A commentary on the accuracy and the adequacy of the proposed method is provided using examples. Future work will extend the work herein by incorporating control laws while computing the backwards reachable set. A Existence of solutions In Lemma 19 we concern ourselves with establishing that if measures µsJ , µJ , and µfJ satisfy Eqn. (20), then there exist solutions to the hybrid system H that originate in the support of µsJ and terminate at t = T in the support of µTJ . The critical ingredient of the proof is the relation between the existence of solutions to a Conservative Continuity Equations (CCE) and an Ordinary Differential Equation (ODE) – if a solution to the CCE exists, solutions to the ODE exist [3]. As a review, a continuity equation is a PDE of the following form ∂ρ + ∇ ⋅ (ρv) = 0, ∂t (81) i where v is the ‘flux’ and ρ is the conserved quantity mass. We first show that solutions to CCEs are related to the average occupation measure defined in Eqn. (12). Subsequently, we show that the Liouville eqn. in Eqn. (20) is a CCE with the associated ODE given by Eqn. (9), and conclude that µJ which solves the Liouville eqn. is an average occupation measure associated with H. Since µJ solves a CCE, solutions to the ODE in Eqn. (9) and hence to H, exist. As as review, we present, below, the problem of finding solutions to CCE and an associated theorem about the existence of a representing measure. Lemma 18. Consider the homogeneous conservative continuity problem in any one mode of the system; say mode j: d ζt + ∇ ⋅ (f˜j ζt ) = 0 dt (82) where ζt are stochastic kernels supported on Dj , conditioned on time, t; and f˜j is the Lipschitz vector field. If ζt satisfies the continuity equation, then there exists η ∈ M+ (Dj × Ξ) such that ∀(φ, t) ∈ Cb (Dj ) × T ∫ Dj φ(x) dζt = ∫ Dj ×Ξ φ(γ(t)) dη(x, γ), (83) where Ξ is the space of all absolutely continuous functions supported on {T } and map to Dj ; i.e. Ξ ∶= C(T ; Dj ); and Cb is the space of bounded functions. The measure η can be interpreted as a measure on the space of absolutely continuous solutions to the differential equation γ̇(t) = f˜(γ(t)) γ(0) = x0 , (84a) x0 ∈ Dj (84b) such that the conditionals ηx are dirac masses. In addition, if λ is the Lebesgue measure on T , the measure ζtη ⊗ λ is the average occupation measure defined in Eqn. (12). Here ζtη satisfies the following equality ⟨ζtη , φ⟩ = ∫ Dj ×Ξ φ(γ(t)) dη(x, γ) ∀φ ∈ Cb (Dj ) (85) Proof. The first part of this Lemma is an immediate consequence of Theorem 3.1 in [3]; the remainder of this proof will establish the relation between the average occupation measure and solutions to the continuity equation. 19 By definition, the following equality holds (ζtη ⊗ λ)(A × B) = ∫ ∫ T Dj ×Ξ IA×B (t, x(t)) d(ζtη ⊗ λ) (86) Since η ∈ M+ (Dj ×Ξ), and this is a Polish space, we can decompose η to satisfy the following equality [6, Corr. 10.4.13] dη = dηx dµ0 where µ0 is the distribution of initial conditions for the ODE in Eqn. (84) and ηx is a regular conditional measure, conditioned on the initial value of x. Thus, (ζtη ⊗ λt )(A × B) = ∫ ∫ ∫ IA×B (t, x(t ∣ x0 )) dηx dµ0 dt (87) T Dj Ξ = ∫ IA (t) ∫ IB (x(t ∣ x0 )) dµ0 dt (88) Dj T = ∫ ∫ IA×B (t, x(t ∣ x0 )) dt dµ0 (89) Dj T = ∫ µj (A × B ∣ x0 ) dµ0 (90) Dj = µj (A × B); (91) where the transition from Eqn. (87) to Eqn. (88) uses the fact that ηx is a dirac measure; Fubini’s theorem is used to get to Eqn. (89); and the definition of occupation measure and average occupation measure are used to arrive at Eqns. (90) and (91) respectively. Lemma 19. Let (µ0J , µTJ , µGE , µJ ) satisfy Eqn. (26). Then, there exists a family of absolutely continuous state trajectories starting emanating from each µ0j , j ∈ J such the occupation and terminal measures (at t = T ) in each mode generated by this family of trajectories coincide with µj and µTj , j ∈ J . In addition, µGE s coincide with the restrictions of µJ on the respective guards. Proof. This lemma is a generalization of [16, Lemma 3] and is proven using the same technique adopted by the authors of [16]. In presenting this proof, it is assumed that uncertain parameters are augmented to the state-space description of the system, similar to §3. In addition, given the description of hybrid systems considered in this paper (refer §2.2), it is sufficient to restrict our attention to one particular mode of the system, say mode j. For notational convenience, let σ0j denote the measure on the image of reset maps originating from the guards of in H; and let the starting measure µsj be defined as µsj = δ0 ⊗ µ0j ⊗ µθj + σ0j (92) In accordance with the hybrid system definition, trajectories of the state can arrive in mode j at time τ ∈ [0, T ] via spt(µsj ); and once in the mode, can arrive at spt(µfj ) at any time t ∈ [0, T ], and hence possibly leave the mode. Equation (20) has a conserved quantity – mass. To see this, consider the test function φ(t) = tk with k = 0; then it follows that µsj (A × B × C) = µfj (A × B × C). (93) That is, along the flow of solutions in each mode, mass is conserved and the Liouville eqn. is a CCE in terms of the measure µj . The measures given by the statement of this Lemma satisfy the Liouville eqn. and hence a CCE; thus solutions to the associated family of ODEs exists in each mode. To see that solutions to the hybrid description of ODEs exists, refer to the results in [7]. Also, using Lemma 18, since µj (x, θ ∣ t) solves the CCE in each mode, µj is the average occupation measure. Having established that solutions to the ODE exists in every mode, we have to demonstrate that the solution trajectories begin in ⋃j∈J spt(µ0j ) and terminate in ⋃j∈J spt(µTj ); this, again, can be demonstrated 20 in a per-mode basis. Since µj (⋅ ∣ t) solves a CCE, conditioned at t = 0, this measure coincides with the initial distribution (ν0j ) of states and at t = T , it coincides with the final distribution of states; we have to show that spt(ν0j ) = spt(µ0j ) and that spt(µj (⋅ ∣ T )) = X(T,j) . We do the same in the ensuing presentation. Since we are concerned with solutions evolving on Polish spaces, we can decompose µj into the following form [6, Corr. 10.4.13] dµj (t, x, θ) = dµ̃j (x, θ ∣ t) dξµj (t) (94) where µ̃j (⋅ ∣ t) is the regular conditional measure and ξµj is the normalized projection of µj on T . We claim that if λ is the Lebesgue measure on T , ξµj is a scaled version of λ. That is, we have to demonstrate that the moments of ξµ are a scaled version of that of λ. Since each µj is an average occupation measure, by definition (Eqn. (12)), we have that T µj (A × B × C) = ∫ ∫ IA×B×C (t, x(t∣τk , x0 , θ), θ) dt dν0j , 0 T ×Dj ×Θj (95) where ν0j ∈ M+ (T × Dj × Θj ) is the initial distribution of states (not yet known to be related to µsj ). Hence, the t-moments of µj are T ∫ tk dµj = ∫ k ∫ t dt dν0j , (96) T ×Dj ×Θj 0 T ×Dj ×Θj = T k+1 ν0 (T × Dj × Θj ), k+1 j (97) which are scaled moments of the λ. Thus it follows that Eqn. (94) can be written as dµj = dµj (x, θ ∣ t) dt. (98) Recall that in each mode, the supports of measures in Liouville eqn. have the following properties: spt(µsj ) ⊂ (T × Dj○ × Θj ); spt(µj ) ⊂ (T × Dj × Θj ), spt(µTj ) ⊂ X(T,j) / ⋃e∶=(j,k),e∈E Ge × Θj ; and spt(µGe ) ⊂ (T × Ge × Θj ). Observe that only µj and µGe are supported on T × Ge × Θj ; it thus follows from Eqn. (26)that for all e ∶= (j, k), ∀k ∈ {l ∣ (j, l) ∈ E} µGe (T × Ge × Θj ) = L′fj µj (T × Ge × Θj ). (99) Since µj is an unsigned measure whose t-marginal is a scaled version of λ, it follows that for all A ⊂ T st. λ(A) = 0 0 = µj (A × Dj × Θj ) ≥ µj (A × Ge × Θj ). (100) From Eqns. (99) and (100), it follows that the t-marginal of µGe is absolutely continuous wrt. λ. Thus, the measures on the guards can be decomposed as follows: dµGe = we (t) dµGe (x, θ ∣ t) dt, ∀e ∈ E (101) where we (t) is the density of the t-marginal of µGe wrt. to λ. In each mode j ∈ J , σ0j is a sum of the push-forward of some measures on guards through reset maps that are identity maps in the t-component; that is, σ0j = ∗ Re∗ (π(t,x) µGe ) ⊗ µθj . ∑ (102) e∈{(k,j)∣E} Now, by considering test functions of the form v(t, x, θ) = ϕ(t)φ(x, θ) in Eqn. (26), we get (by employing integration by parts): T ϕ(T )αT − ϕ(0)α0 = ∫ 0 ϕ̇αt + ϕ ⋅ (αf + ασ − αG ) dt 21 (103) where αT ∶= [φ(x, θ)] dµTj , ∫ (104) X(T ,j) ×Θj α0 ∶= [φ(x, θ)] dµ0j dµθj , ∫ (105) X(0,j) ×Θj αt (t) ∶= ∫ [φ(x, θ)] dµj (x, θ ∣ t), (106) [∇φ(x, θ) ⋅ fj ] dµj (x, θ ∣ t), (107) Dj ×Θj αf (t) ∶= ∫ Dj ×Θj ασ (t) ∶= ∑ ∫ [we ∫ e∈{(k,j)∈E}G ×Θ e k αG (t) ∶= ∑ e∈{(j,k)∈E} ∫ Θj φ(Re (x), θ) dµθj ] dµGe (x, θ ∣ t), [we φ(x, θ)] dµGe (x, θ ∣ t). Ge ×Θj (108) (109) Given functions αT , α0 , αf , ασ and αG , Eqn. (103) admits an dt-a.e. unique solution for αt . To see this, suppose c1 (t) and c2 (t) are any two admissible solutions. Then T ϕ(T )αT − ϕ(0)α0 =∫ [ϕ̇c1 + ϕ(αf + ασ − αG )] dt (110a) 0 T ϕ(T )αT − ϕ(0)α0 =∫ [ϕ̇c2 + ϕ(αf + ασ − αG )] dt (110b) 0 Taking the difference between Eqns. (110a) and (110b) and noting that ϕ(t) ∈ C(T ) is any arbitrary function and that C(T ) is dense in L1 (T ), it follows that c1 (t) = c2 (t), dt-a.e.. By construction, with αT , α0 , αf , ασ and αG as defined, we know that αt (t) as defined in Eqn. (106) satisfies Eqn. (103). We claim that α̃t (t) defined as t α̃t (t) = α0 + ∫ [αf + ασ − αG ] dτ (111) 0 also solves Eqn. (103). Observe from Eqn. (111) that: 0 α̃t (0) = α0 + ∫ [αf + ασ − αG ] dτ = α0 , (112) 0 T α̃t (T ) = α0 + ∫ [αf + ασ − αG ] dτ = αT (113) 0 dα̃t = αf + ασ − αG , dt (114) where the equality in Eqn. (113) follows from considering v = ϕ(x, θ) as the test function in Eqn. (26), and the last equality follows from Leibniz rule. Now consider evaluating ∫T (ϕ̇α̃t ) dt. T dα̃t dt dt (115) = ϕ(T )αT − ϕ(0)α0 − ∫ ϕ [αf + ασ − αG ] dt. (116) ∫ (ϕ̇α̃t ) dt = ϕ(T )α̃t (T ) − ϕ(0)α̃t (0) − ∫ ϕ 0 T T 0 22 This is of the form of Eqn. (103) and hence α̃t (t) solves Eqn. (103). Since the solution to Eqn. (103) is dt-a.e. unique, it follows that, ∀φ ∈ C 1 (Dj × Θj ): t ∫ φ(x, θ) dµj (x, θ ∣ t) = α0 + ∫ [αf + ασ − αG ] dτ (117) 0 Dj ×Θj From Eqn. (117) it follows that the stochastic kernel of µj at t = 0 coincides with µ0j , and that it coincides with µTj at t = T . This implies that the solutions to the associated ODE, at time t = T terminate in spt(µTj ) = X(T,j) . To complete the proof, we now show that the restriction of µj onto the guards is, dt-a.e., identical to the measure on the guards; further that ν0 (from Eqn. (95)) is identical to µsj (from Eqn. (93)). Recall the definition of the average occupation measure (Eqn. (12)), its relation to the initial state distribution µsj , and the form of the Liouville eqn. (Eqn. (26)); it is clear that (in mode j) the following equality holds ν0 + L′fj µj = δT ⊗ µT + µG , (118) where µG is the sum of measures on all guards in mode j. From Remark 8, the following equality holds ν0 + L′fj µj = δT ⊗ µT + ∑ µj ∣G(j,k) . (119) k∈{l∣(j,l)∈E} Taking the difference between Eqns. (118) and (119), noting that since µj is decomposable in the form of Eqn. (98), so is its restriction, recalling that µG is also decomposable (Eqn. (101)), and considering the product of arbitrary test functions in C 1 (T ) and C 1 (Dj × Θj ), it is concluded that the t-conditionals of µG and µj are equal dt-a.e.. Hence, µG is the restriction of µj to the guards. That that ν0 is equal to µ0j + µsj follows as a natural consequence of Eqn. (92) and our conclusion about the t-conditional of µj at t = 0. References [1] SPOTLESS. Available at https://goo.gl/n6CS7f. [2] Matthias Althoff, Olaf Stursberg, and Martin Buss. Reachability analysis of nonlinear systems with uncertain parameters using conservative linearization. In 47th IEEE Conference on Decision and Control, pages 4042–4048. IEEE, 2008. [3] Luigi Ambrosio. Transport equation and cauchy problem for non-smooth vector fields. In Bernard Dacorogna Paolo Marcellini, editor, Calculus of Variations and Nonlinear Partial Differential Equations, volume 1927 of C.I.M.E. Foundation Subseries, page 206. Springer-Verlag Berlin Heidelberg, 1 edition, 2008. [4] E.J. Anderson and P. Nash. Linear programming in infinite-dimensional spaces: theory and applications. Wiley-Interscience series in discrete mathematics and optimization. Wiley, 1987. [5] V.I. Bogachev. Measure Theory. Number v. 1 in Measure Theory. Springer Berlin Heidelberg, 2007. [6] V.I. Bogachev. Measure Theory. Number v. 2 in Measure Theory. Springer Berlin Heidelberg, 2007. [7] S. Burden, H. Gonzalez, R. Vasudevan, R. Bajcsy, and S. Shankar Sastry. Metrization and Simulation of Controlled Hybrid Systems. IEEE Trans. Autom. Control, 60(9):2307–2320, 2015. [8] Katie Byl. Metastable legged-robot locomotion. PhD thesis, Massachusetts Institute of Technology, 2008. [9] G. Chesi. On the estimation of the domain of attraction for uncertain polynomial systems via lmis. In Decision and Control, 2004. CDC. 43rd IEEE Conference on, volume 1, pages 881–886 Vol.1, Dec 2004. 23 [10] Michael Jon Coleman. A stability study of a three-dimensional passive-dynamic model of human gait. Cornell University, May, 1998. [11] Hongkai Dai and Russ Tedrake. Optimizing robust limit cycles for legged locomotion on unknown terrain. In 2012 IEEE 51st Annual Conference on Decision and Control, pages 1207–1213. IEEE, 2012. [12] Gerald B Folland. Real analysis: modern techniques and their applications. John Wiley & Sons, 2013. [13] Antoine Girard. Reachability of uncertain linear systems using zonotopes. In Hybrid Systems: Computation and Control, pages 291–305. Springer, 2005. [14] Ambarish Goswami, Thuilot Benoit, and Bernard Espiau. A study of the passive gait of a compass-like biped robot: Symmetry and chaos. The International Journal of Robotics Research, 17:1282–1301, 1998. [15] Brent Griffin and Jessy Grizzle. Walking gait optimization for accomodation of unknown terrain height variations. In American Control Conference 2015, 2015. [16] Didier Henrion and Milan Korda. Convex computation of the region of attraction of polynomial control systems. IEEE Trans. Autom. Control, 59(2):297–312, 2014. [17] Milan Korda, Didier Henrion, and Colin N. Jones. Inner approximations of the region of attraction for polynomial dynamical systems. In 9th IFAC Symposium on Nonlinear Control Systems (NOLCOS), Toulouse, France, September 4-6, 2013, 2013. [18] John M Lee. Smooth manifolds. Springer, 2003. [19] John N Maidens, Shahab Kaynama, Ian M Mitchell, Meeko MK Oishi, and Guy A Dumont. Lagrangian methods for approximating the viability kernel in high-dimensional systems. Automatica, 49(7):2017– 2029, 2013. [20] M. Maiga, N. Ramdani, L. Trave-Massuyes, and C. Combastel. A comprehensive method for reachability analysis of uncertain nonlinear hybrid systems. IEEE Trans. Autom. Control, PP(99):1–1, 2015. [21] Anirudha Majumdar, Ram Vasudevan, Mark M Tobenkin, and Russ Tedrake. Convex optimization of nonlinear feedback controllers via occupation measures. The International Journal of Robotics Research, page 0278364914528059, 2014. [22] Ian Manchester, Mark Tobenkin, Michael Levashov, and Russ Tedrake. Regions of attraction for hybrid limit cycles of walking robots. Proceedings of the 18th IFAC World Congress, 2011. [23] Pablo A Parrilo. Structured semidefinite programs and semialgebraic geometry methods in robustness and optimization. PhD thesis, Citeseer, 2000. [24] J. W. Pitman. Occupation measures for markov chains. Advances in Applied Probability, 9(1):pp. 69–86, 1977. [25] M. Posa, M. Tobenkin, and R. Tedrake. Stability analysis and control of rigid-body systems with impacts and friction. IEEE Trans. Autom. Control, PP(99):1–1, 2015. [26] Stephen Prajna and Ali Jadbabaie. Safety verification of hybrid systems using barrier certificates. In Hybrid Systems: Computation and Control, pages 477–492. Springer, 2004. [27] Cenk Oguz Saglam and Katie Byl. Switching policies for metastable walking. In 2013 IEEE 52nd Annual Conference on Decision and Control (CDC), pages 977–983. IEEE, 2013. [28] Victor Shia, Ram Vasudevan, Ruzena Bajcsy, and Russ Tedrake. Convex computation of the reachable set for controlled polynomial hybrid systems. In 2014 IEEE 53rd Annual Conference on Decision and Control (CDC), pages 1499–1506. IEEE, 2014. 24 [29] Christoffer Sloth and Rafael Wisniewski. Safety analysis of stochastic dynamical systems. IFACPapersOnLine, 48(27):62 – 67, 2015. Analysis and Design of Hybrid Systems ADHSAtlanta, GA, USA, Oct. 14-16, 2015. [30] Claire J Tomlin, Ian Mitchell, Alexandre M Bayen, and Meeko Oishi. Computational techniques for the verification of hybrid systems. Proceedings of the IEEE, 91(7):986–1001, 2003. [31] Ufuk Topcu, Andrew K. Packard, P. Seiler, and G.J. Balas. Robust region-of-attraction estimation. IEEE Trans. Autom. Control, 55(1):137–142, Jan 2010. 25
3cs.SY
Output-sensitive Complexity of Multiobjective Combinatorial Optimization Fritz Bökler*1 , Matthias Ehrgott2 , Christopher Morris†1 , and Petra Mutzel1 1 arXiv:1610.07204v1 [math.OC] 23 Oct 2016 Department of Computer Science, TU Dortmund University, Dortmund, Germany, {fritz.boekler, christopher.morris, petra.mutzel}@tu-dortmund.de 2 Department of Management Science, Lancester University, Lancester, United Kingdom, [email protected] Abstract We study output-sensitive algorithms and complexity for multiobjective combinatorial optimization problems. In this computational complexity framework, an algorithm for a general enumeration problem is regarded efficient if it is output-sensitive, i.e., its running time is bounded by a polynomial in the input and the output size. We provide both practical examples of MOCO problems for which such an efficient algorithm exists as well as problems for which no efficient algorithm exists under mild complexity theoretic assumptions. Keywords Multiobjective Optimization, Combinatorial Optimization, Output-sensitive Complexity, Linear Programming 1 Introduction Computational complexity theory in multiobjective optimization has been considered in different shapes for quite a while. In this paper, we argue that in contrast to the traditional way of investigating the complexity of multiobjective optimization problems, especially multiobjective combinatorial optimization (MOCO) problems, output-sensitive complexity theory yields deeper insights into the complexity of these problems. We stress here, that our discussions and results apply not only to MOCO problems, but also to every multiobjective optimization problem with a well-defined and finite set to output. For example, they also apply to multiobjective integer optimization problems with finite Pareto-fronts. The problem on which we will exemplify our considerations is the following. Definition 1.1 (Multiobjective Combinatorial Optimization Problem). An instance of a multiobjective combinatorial optimization problem is a pair (𝒮, 𝐶), where ∙ 𝒮 ⊆ {0, 1}𝑛 is the set of solutions, and ∙ 𝐶 ∈ Q𝑑×𝑛 is the objective function matrix. The multiobjective combinatorial optimization problem consists of all its instances. The goal is to enumerate for a given instance (𝒮, 𝐶) all minimal elements of 𝒴 = {𝐶𝑥 | 𝑥 ∈ 𝒮} with respect to the canonical partial order on vectors. * Correspondence to: Department of Computer Science, TU Dortmund, Otto-Hahn-Str. 14, 44225 Dortmund, Germany. E-mail: [email protected]. The author has been supported by the Bundesministerium für Wirtschaft und Energie (BMWi) within the research project “Bewertung und Planung von Stromnetzen” (promotional reference 03ET7505) and by DFG GRK 1855 (DOTS). † The author is funded by the German Science Foundation (DFG) within the Collaborative Research Center SFB 876 “Providing Information by Resource-Constrained Data Analysis”, project A6 “Resource-efficient Graph Mining”. 1 The canonical partial order on vectors is the componentwise less-or-equal partial order, denoted as ≤. We call the minima of 𝒴 the Pareto-front, which we denote by 𝒴N . Points in 𝒴N are called nondominated points. The preimage of the Pareto-front is called Pareto-set; solutions in the Pareto-set are called Pareto-optimal or efficient solutions. Note that the MOCO problem defined as above is different from the problem of enumerating the Pareto-set. In the definition of the MOCO problem, we only allow rational numbers in the input as real numbers cannot be encoded in our model of computation. But of course, if we show that these problems are already hard on rational numbers, they do not become easier when extending the set of numbers allowed. When investigating the complexity of these problems, it is important to define the input size precisely. As 𝒮 can be very large, it is supposed to be implicitly given. This accounts for the fact that searching 𝒮 exhaustively is explicitly not what we want to do. Thus, the input size is supposed to be 𝑛 plus the encoding length of the matrix 𝐶, denoted as ⟨𝐶⟩, which will be defined in the preliminaries in Section 2. In practice we also want to find a solution 𝑥 ∈ 𝒮 which maps to a point 𝑦 ∈ 𝒴N . Regarding the formal definition above, this renders the problem to not be well-defined. Thus, when describing an algorithm, we usually expect that also a solution is produced for each point of the Pareto-front. When we prove a hardness result, Definition 1.1 gives us problems which are not harder than a variant of the problem where we also want to find solutions. Hence, proving hardness of the problem as defined in Definition 1.1 will lead to a hardness result for the problem including finding of a representative solution. 1.1 Traditional Complexity Results for MOCO In the past, complexity of MOCO problems has been investigated in the sense of NP-hardness. The canonical decision problem of a MOCO problem is as follows. Definition 1.2 (Canonical Decision Problem). Given a MOCO problem 𝑃 , the canonical decision problem 𝑃 Dec is defined as follows: We are given an instance (𝒮, 𝐶) of 𝑃 and a vector 𝑘 ∈ Q𝑑 and the goal is to decide whether there exists an 𝑥 ∈ 𝒮, such that 𝐶𝑥 ≤ 𝑘. The input size is supposed to be 𝑛 + ⟨𝐶⟩ + ⟨𝑘⟩. Obviously, any MOCO problem that is NP-hard for 𝑑 = 1 is also NP-hard for 𝑑 ≥ 2. Moreover, known results in the literature show that even for MOCO problems with 𝑑 = 2 objectives 𝑃 Dec is NP-hard, even for problems that are in P when 𝑑 = 1 such as the biobjective shortest path problem (Serafini, 1986), biobjective minimum spanning tree problem (Camerini, Galbiati, and Maffioli, 1984), biobjective assignment problem (Serafini, 1986), and biobjective uniform matroid problem (Ehrgott, 1996). The proof of Proposition 3.2 also shows that 𝑃 Dec for a MOCO problem with two objectives and no constraints is NP-complete. One remark is in order here. It is not clear if the NP-hardness of 𝑃 Dec implies the NP-hardness of the MOCO problem 𝑃 . In fact, Serafini (1986) proved the polynomial-time equivalence of 𝑃 and 𝑃 Dec only for the case where ||𝐶𝑥 − 𝐶𝑥′ ||∞ < 𝛿𝑛𝑙 for every two solutions 𝑥, 𝑥′ ∈ 𝒮 and some 𝛿, 𝑙 ≥ 1. Furthermore, we note that 𝑃 Dec for 𝑑 = 2 is the same as the decision problem of the so-called resource-constrained combinatorial optimization problem (𝒮, 𝑐, 𝑟, 𝑟^), where 𝒮 is as in Definition 1.1, 𝑐 ∈ Q𝑛 , 𝑟 ∈ Q𝑛 , 𝑟^ ∈ Q, and the goal is to find a minimizer of {𝑐𝑇 𝑥 | 𝑥 ∈ 𝒮, 𝑟𝑇 𝑥 ≤ 𝑟^}. This observation reveals that the canonical decision problem for a MOCO problem with 𝑑 = 2 and that for a related resource-constrained combinatorial optimization 2 problem are identical, despite the fundamental difference in the goals of these two problems. We can therefore question, whether studying the NP-hardness of 𝑃 Dec can provide much insight in the hardness of MOCO problems on top of insights into the hardness of resource-constrained single objective combinatorial optimization problems. Another important consideration is the size of the Pareto-front. Many researchers have provided instances of MOCO problems for which the size of 𝒴N is exponential, we refer to (Hansen, 1979) for the biobjective shortest path problem, (Hamacher and Ruhe, 1994) for the biobjective minimum spanning tree problem, (Ruhe, 1988) for the biobjective integer minimum-cost flow problem, and (Ehrgott, 2005) for the biobjective unconstrained combinatorial optimization problem. This consideration also raises the question, if the NP-hardness of a MOCO problem 𝑃 which has a Pareto-front of exponential size, does add information to the picture. Because NP-hardness is still only an indication that 𝑃 cannot be solved in polynomial time, but 𝑃 having a Pareto-front of exponential size is an actual proof of this fact. Despite these negative results, a few results on MOCO problems with a Pareto-front of polynomial size or which belong to P are known. We refer to (Figueira et al., 2016) in this issue for more details. This brief overview on complexity results for MOCO problems reveals what one could consider a bleak picture: Multiobjective versions of even the simplest combinatorial optimization problems have Pareto-fronts of exponential size, and thus there is no prospect for finding polynomial time algorithms to determine the Pareto-front. A closer look at some of the pathological biobjective instances does, however, reveal, that despite the exponential size of the Pareto-front, all elements of the Pareto-front lie on a single line in Q2 . Hence, we might hypothesize that traditional worst case complexity analysis, which measures complexity in relation to input size, is not the right tool to investigate the complexity of MOCO problems. Instead, we propose to investigate output-sensitive complexity. 1.2 The Pareto-front Size within the Smoothed Analysis Framework Before we move forward to output-sensitive complexity, we need to adress one practical objection regarding MOCO problems. It is often argued that computing the entire Pareto-front of a MOCO problem is too costly to pursue, because it can have exponential size in the worst-case. But in practice, it was observed that usually the situation is not so bad when the number of objectives is small. This observed discrepancy between practice and the traditional worst case analysis motivates stochastic running time analysis, where the inputs are drawn from a certain distribution. One prominent stochastic running time analysis framework, so called Smoothed Analysis, can be used to bound the expected worst-case size of the Pareto-front of a MOCO problem. In classical running time analysis, we play against an adversary who gives us ill posed instances in the sense that the running time is very high or the Pareto-front is very large. Smoothed Analysis aims at weakening this adversary. In the context of multiobjective optimization, a model by Ackermann et al. (2007) was used to show the best expected bound on the smoothed worst-case size of the Pareto-front of general MOCO problems. Instead of all the objective function matrix entries, the adversary is only allowed to choose the first row of it deterministically and for all remaining rows 𝑖 ∈ {2, . . . , 𝑑} and columns 𝑗 ∈ [𝑛] it may choose a probability density function 𝑓𝑖,𝑗 : [0, 1] → R, describing how potential entries are drawn. The adversary is not allowed to choose these densities arbitrarily, because otherwise it could again choose the coefficients deterministically. Rather, the 𝑓𝑖,𝑗 are bounded by a model parameter 𝜑. Consequently, the adversary gives us a set of solutions 𝒮 ⊆ {0, 1}𝑛 , the first row of the objective function matrix 𝑐 ∈ Q𝑛 and the probability densities 𝑓𝑖,𝑗 . Brunsch and Röglin (2012) showed that the expected size of the Pareto-front of these instances is at most 𝒪(𝑛2𝑑 𝜑𝑑 ). Thus, when we fix the number of objectives, we can expect to have only polynomial Pareto-front sizes of any MOCO problem in practice. This emphasizes the need for output-sensitive algorithms, 3 because when the Pareto-front is small, we want our algorithms to be fast and when the Pareto-front is large, we want them to be not too slow. 1.3 Organization In the remainder of the paper, we will first give some definitions in Section 2. In particular, we will give necessary definitions from theoretical computer science, including output-sensitive complexity. Afterwards, we will be concerned with a sufficient condition for a MOCO problem to be efficiently solvable in the sense of output-sensitive complexity in Section 3. This sufficient condition can be applied to the multiobjective global minimum-cut problem which will be our first example of an efficiently solvable MOCO problem. We will show that the multiobjective shortest path problem is an example of a problem which is not efficiently solvable under weak complexity theoretic assumptions in Section 4. Moreover, we will demonstrate a general method from output-sensitive complexity for showing that an enumeration problem is not efficiently solvable under the assumption that P ̸= NP. In Section 5, we will again be concerned with efficiently solvable multiobjective optimization problems. We will discuss some connections between MOCO problems and multiobjective linear programming. We will show that the impression that computing extreme points of the Pareto-front is easier than computing the whole Pareto-front is indeed true in the world of output-sensitive complexity, at least for the multiobjective shortest path problem. Moreover, we review some recent results from the literature about output-sensitive algorithms for computing supported solutions and extreme nondominated points and also provide some new results for the special case of 𝑑 = 2. 2 Preliminaries In the following section we fix notation. Let 𝑣 be a vector in R𝑛 , then we denote its 𝑖-th component by 𝑣𝑖 . We assume that all vectors are column vectors. The 𝑖-th unit vector is denoted by 𝑒𝑖 . Let 𝑀 be a matrix in R𝑚×𝑛 , then we denote its 𝑖-th row by 𝑀𝑖 and the scalar in the 𝑖-th row and the 𝑗-th column by 𝑚𝑖𝑗 . The transpose of 𝑀 is denoted by 𝑀 𝑇 . For 𝑟 in R, the ceiling function is ⌈𝑟⌉ := min {𝑧 ∈ Z | 𝑧 ≥ 𝑟} and let [𝑛] := {0, . . . , 𝑛} ⊂ N and [𝑛 : 𝑚] := [𝑛, 𝑚] ∩ N. Let (𝑆, ⪯) be a partially ordered set. Then 𝑠 <lex 𝑡 for 𝑠 and 𝑡 in 𝑆 𝑝 , 𝑝 ∈ N, if there is 𝑗 in [1 : 𝑝] such that 1. 𝑠𝑖 = 𝑡𝑖 for 𝑖 < 𝑗, and 2. 𝑠𝑗 < 𝑡𝑗 . 2.1 Theoretical Computer Science In theoretical computer science, it is important to define the model of computation used for running time analyses. In the complexity of enumeration problems, the model of computation usually is the Random Access Machine (RAM). It can be concieved as a formal model of a computer, with a fixed and small set of instructions and an infinite number of memory cells. These memory cells are only allowed to hold integer numbers with up to 𝒪(𝑛𝑙 ) bits on inputs of size 𝐿 for some constant 𝑙 ≥ 1 to account for the precision needed in optimization. For more details, we refer the reader to the book by Cormen et al. (2001, 23 sqq.). Moreover, we also need to discuss encoding lengths of numbers. The following is largely based on Grötschel, Lovász, and Schrijver (1988, 29 sqq.). For 𝑧 ∈ Z ∖ {0}, the encoding length of 𝑧, i.e., an upper bound for the minimum number of bits to encode 𝑧 in binary representation, is ⟨𝑧⟩ := 1 + ⌈log2 (|𝑧| + 1)⌉ . 4 That is, one bit to represent the sign and ⌈log2 (|𝑧| + 1)⌉ bits to encode the binary representation of the absolute value of 𝑧. For 𝑧 = 0 one bit is sufficient, i.e., ⟨0⟩ := 1. Let 𝑞 ∈ Q and let 𝑞 = 𝑎/𝑏 for 𝑎 and 𝑏 ∈ Z such that 𝑎 and 𝑏 are coprime, and 𝑏 > 0, then the encoding length of 𝑞 is ⟨𝑞⟩ := ⟨𝑎⟩ + ⟨𝑏⟩ . Let 𝑣 be a vector in Q𝑛 , then ⟨𝑣⟩ := 𝑛 + 𝑛𝑖=1 ⟨𝑣𝑖 ⟩. Moreover, let 𝑀 be a matrix in Q𝑚×𝑛 , then ∑︀ ⟨𝑀 ⟩ := 𝑚𝑛 + 𝑚 𝑖=1 ⟨𝑀𝑖 ⟩. Due to the special importance of polynomial running time, we define the set of functions not growing faster than a polynomial function as follows: Let 𝑓 : R𝑑 → R be a function, then 𝑓 is in poly(𝑛1 , . . . , 𝑛𝑑 ) if there is a polynomial function 𝑝 : R𝑑 → R such that 𝑓 in 𝒪(𝑝(𝑛1 , . . . , 𝑛𝑑 )). For a more concise introduction to formal languages and complexity theory, e.g., NP and co-NP, we refer to (Arora and Barak, 2009). ∑︀ 2.2 Introduction to Output-sensitive Complexity Classically, the running time of an algorithm is measured with respect to the input size. An algorithm which has a running time which is polynomially-bounded in the input size is widely regarded as efficient. For certain problems, such as MOCO problems, the size of the output varies widely or even becomes exponentially large in the input size. Here, the notion of output-sensitive algorithms comes into play, where running time is not only measured in the input size but also in the size of the output, cf. (Johnson, Yannakakis, and Papadimitriou, 1988) for examples of output-sensitive algorithms. The point here is that we can view the MOCO problem of Definition 1.1 as an enumeration problem, i.e., enumerating the elements of the (finite) Pareto-front, see Section 2.3. This task is solved by an enumeration algorithm, i.e., an algorithm that outputs every element of the the Pareto-front exactly once. In the following, we give a formal definition of the terms enumeration problem and enumeration algorithm. Moreover, we define complexity classes for enumeration problems. This section is largely based on (Schmidt, 2009). Definition 2.1 (cf. (Schmidt, 2009, 7 sq.)). An enumeration problem is a pair (𝐼, 𝐶), such that 1. 𝐼 ⊆ 𝛴 * is a language for some fixed alphabet 𝛴, 2. 𝐶 : 𝐼 → 𝛴 * maps each instance 𝑥 in 𝐼 to its configurations 𝐶(𝑥), and 3. the encoding length ⟨𝑠⟩ for 𝑠 in 𝐶(𝑥) for 𝑥 in 𝐼 is in poly(𝑥). We assume that 𝐼 is decidable in polynomial time and that 𝐶 is computable. If the reader is not familiar with the term language, the set 𝛴 * can be interpreted as the set of all finite strings over {0, 1}. This is important, because all instances and all configurations need to be encoded by finite strings, while the exact encoding is not relevant here. The third requirement means, that the configurations need to be compact, i.e., the encoding length of a configuration of an instance 𝑥 should be polynomially bounded in the size of 𝑥. The reason for this is to limit the number of configurations to be at most exponentially many. Definition 2.2 (cf. (Schmidt, 2009, p. 8)). Let 𝐸 = (𝐼, 𝐶) be an enumeration problem. An enumeration algorithm for 𝐸 is a RAM that 1. on input 𝑥 in 𝐼 outputs 𝑐 in 𝐶(𝑥) exactly once, and 2. on every input terminates after a finite number of steps. Let 𝑥 in 𝐼 and let |𝐶(𝑥)| = 𝑘, then the 0-th delay is the time before the first solution is output, the 𝑖-th delay for 𝑖 in [1 : 𝑘 − 1] is the time between the output of the 𝑖-th and the (𝑖 + 1)-th solution, and the 𝑘-th delay is the time between the last output and the termination of the algorithm. 5 The following complexity classes can be used to classify enumeration problems, cf. (Johnson, Yannakakis, and Papadimitriou, 1988). Definition 2.3 (cf. (Schmidt, 2009, p. 12)). Let 𝐸 = (𝐼, 𝐶) be an enumeration problem. Then 𝐸 is in 1. 2. 3. 4. TotalP (Output-Polynomial Time/Polynomial Total Time)1 , IncP (Incremental Polynomial Time), DelayP (Polynomial Time Delay), PSDelayP (Polynomial Time Delay with Polynomial Space) if there is an enumeration algorithm such that 1. 2. 3. 4. its running time is in poly(|𝑥|, |𝐶(𝑥)|) for 𝑥 in 𝐼, its 𝑖-th delay for 𝑖 in [𝑛] is in poly(|𝑥|, |𝐶 𝑖 (𝑥)|) for 𝑥 in 𝐼, its 𝑖-th delay for 𝑖 in [𝑛] is in poly(|𝑥|, |𝐶 𝑖 (𝑥)|) for 𝑥 in 𝐼, and the same as in 3. holds and the algorithm requires at most polynomial space in the input size, respectively, where 𝐶 𝑖 (𝑥) denotes the set of solution that have been output before the 𝑖-th solution has been output. We say that an algorithm is output-sensitive if it fulfills condition 1 of the above definition. Moreover, we say that an algorithm has incremental delay (polynomial delay) if it fulfills the second (third) condition of the above definition. The following hierarchy result holds. Theorem 2.4 (Schmidt, 2009, 14 sqq.). PSDelayP ⊆ DelayP ⊆ IncP ⊂ TotalP . An enumeration algorithm will be regarded efficient if it is output-sensitive. 2.3 MOCO Problems are Enumeration Problems We will now explain, how MOCO problems as defined in Definition 1.1 relate to enumeration problems as defined in Definition 2.1. More formally, we will show that the general MOCO problem is an enumeration problem. Given a MOCO instance (𝒮, 𝐶) we need to define the set 𝐼 of instances of the enumeration problem and the configuration mapping. To define 𝐼, we fix a binary representation of (𝒮, 𝐶) with encoding length of at most 𝒪(𝑛 + ⟨𝐶⟩). Then 𝐼 is the set of all such encodings of instances of our MOCO problem. The configuration mapping now maps an instance to its Pareto-front 𝒴N , by fixing an arbitrary encoding of rational numbers with at most 𝒪(⟨𝑟⟩) bits for a rational number 𝑟. We observe that the value of each com∑︀ ponent 𝑗 of each point of the Pareto-front is at most 𝑛𝑖=1 |𝐶𝑗𝑖 | ∈ 𝒪(⟨𝐶⟩) and thus the encoding of each point in the Pareto-front is polynomial in the instance encoding size. Thus, the configurations of a MOCO problem are the points of the Pareto-front and not, for example, the solutions of the MOCO problem. Solving the so defined enumeration problem will give us the set of configurations, i.e., the Paretofront in the given encoding. This corresponds exactly to our definition of solving a MOCO problem. 3 A Sufficient Condition for Output-sensitivity from the MOCO Literature In this section, we will show a sufficient condition for a MOCO problem being solvable in outputpolynomial time, which follows directly from the multiobjective optimization literature. A broad 1 Although we use the term output-polynomial time in the remaining text, we abbreviate it to TotalP for historical and notational reasons. 6 subject of investigation in the multiobjective optimization literature is the 𝜀-constraint scalarization: min{1𝑇 𝐶𝑥 | 𝑥 ∈ 𝒮, 𝐶1𝑇 𝑥 ≤ 𝜀1 , . . . , 𝐶𝑑𝑇 𝑥 ≤ 𝜀𝑑 }, for 𝜀 ∈ Q𝑑 . It is well known that the complete Pareto-front can be found using this scalarization, cf. (Chankong and Haimes, 1983), but the scalarization itself can be hard to solve, cf. (Ehrgott, 2006). In the past, authors have proven several bounds on the number of 𝜀-constraint scalarizations needed to find the Pareto-front of a general MOCO problem. It is possible to construct a sufficient condition for enumerating the Pareto-front of a MOCO problem in output-polynomial time from these results. One of the first such bounds is due to Laumanns, Thiele, and Zitzler (2006), who prove that at most 𝒪(|𝒴N |𝑑−1 ) single-objective 𝜀-constraint scalarization problems need to be solved. The currently best known bound is due to Klamroth, Lacour, and Vanderpooten (2015), who prove a 𝑑 bound of 𝒪(|𝒴N |⌊ 2 ⌋ ). From these results we can formulate the following corollary. Corollary 3.1. If the 𝜀-constraint scalarization of a given MOCO problem 𝑃 can be solved in polynomial time for a fixed number of objectives, 𝒴N can be enumerated in output-polynomial time for a fixed number of objectives. One example for such a problem is the multiobjective global minimum-cut problem. Armon and Zwick (2006) showed, that the 𝜀-constraint version of the problem can be solved in time 𝒪(𝑚𝑛2𝑑 log 𝑛). Thus, the multiobjective global minimum-cut problem is an example of a multiobjective optimization problem that can be solved in output-polynomial time for each fixed number of objectives. Now, the question arises if this condition is also necessary, i.e., can we show that a MOCO problem cannot be solved in output-polynomial time by showing that the 𝜀-constraint scalarization cannot be solved in polynomial time. But as the following proposition shows, the condition of Corollary 3.1 is not necessary, unless P = NP. Proposition 3.2. There is a MOCO problem 𝑃 ∈ IncP with 𝑃 Dec being NP-complete. Proof. We consider the following biobjective problem (𝑃 ) min{(𝑐𝑇 𝑥, −𝑐𝑇 𝑥) | 𝑥 ∈ {0, 1}𝑛 } with 𝑐 ∈ N𝑛 . We will first show NP-hardness and membership in NP of 𝑃 Dec and then show membership in IncP of 𝑃 . Recall that 𝑃 Dec is defined as the decision problem in which we are given an instance (𝒮, 𝐶) of 𝑃 and a vector 𝑘 ∈ Q𝑑 and the goal is to decide whether there exists an 𝑥 ∈ 𝒮, such that 𝐶𝑥 ≤ 𝑘. Setting (︃ )︃ 1 1 𝑘 := 1𝑇 𝑐 , −1 2 we can reformulate 𝑃 Dec in the following way: Decide for a given vector 𝑐 ∈ N𝑛 if there is an ∑︀ 𝑥 ∈ {0, 1}𝑛 , such that 𝑐𝑇 𝑥 = 21 𝑛𝑖=1 𝑐𝑖 . We observe that this decision problem is the well-known partition problem shown by Garey and Johnson (1979) to be NP-hard. It follows from Definition 1.2 that 𝑃 Dec is in NP and thus 𝑃 Dec is NP-complete. Enumerating the Pareto-front of 𝑃 can be done in incremental polynomial time by employing a recursive enumeration scheme on the first 𝑖 variables (fixing an arbitrary variable ordering). Setting all variables to 0 yields point (0, 0)𝑇 . Now we fix all variables after the 𝑖-th to 0 and allow the first 𝑖 variables to vary. Let 𝐹𝑖 be the Pareto-front for this restricted problem. If we know 𝐹𝑖 , we can compute 𝐹𝑖+1 by computing 𝐹𝑖 ∪ (𝐹𝑖 + {𝑐𝑖+1 }). Each such step yields time 𝒪(|𝐹𝑖 | log |𝐹𝑖 |) and we have 𝐹0 ( 𝐹1 ( . . . ( 𝐹𝑛 , i.e., we find at least one new point in each iteration. 7 4 Example of a Hard Problem: Multiobjective Shortest Path In this section, we will classify a problem as not efficiently solvable under mild complexity theoretic assumptions in the sense of output-sensitive complexity, namely the multiobjective shortest path problem, or more precisely, the multiobjective 𝑠-𝑡-path problem. Definition 4.1 (Multiobjective 𝑠-𝑡-path problem (MOSP)). Given a directed graph 𝐺 = (𝑉, 𝐸) where 𝐸 ⊆ 𝑉 × 𝑉 , two nodes 𝑠, 𝑡 ∈ 𝑉 , and a multiobjective arc-cost function 𝑐 : 𝐸 → Q𝑑≥ . A ∑︀ feasible solution is a path 𝑃 from node 𝑠 to node 𝑡. We set 𝑐(𝑃 ) := 𝑒∈𝑃 𝑐(𝑒). The set of all 𝑠-𝑡-paths is 𝒫𝑠,𝑡 . The goal is to enumerate the minima of 𝑐(𝒫𝑠,𝑡 ) with respect to the canonical partial order on vectors. It has long been investigated in the multiobjective optimization community. One of the first systematical studies was by Hansen (1979). In practice, MOSP can be solved relatively well. But usually algorithms which solve MOSP solve a more general problem which we call the multiobjective single-source shortest-path (MO-SSSP) problem. In the MO-SSSP problem, instead of enumerating one Pareto-front of the Pareto-optimal 𝑠-𝑡-paths, we enumerate for every vertex 𝑣 ∈ 𝑉 ∖{𝑠} the Pareto-front of all Pareto-optimal 𝑠-𝑣-paths. One example of such an algorithm is the well known label setting algorithm by Martins (1984), which solves the MO-SSSP problem in incremental polynomial time. We stress here that MOSP and MO-SSSP are indeed different problems. The insight that the MO-SSSP problem is solvable in incremental polynomial time does not immediately transfer to the MOSP problem. This can be seen, when using Martins’ algorithm for solving MOSP on a given instance, where we cannot even guarantee output-polynomial running time. More modern label setting and label correcting algorithms usually start from there and try to avoid enumerating too many unneccessary 𝑠-𝑣-paths. The following considerations show that a large number of these 𝑠-𝑣-paths are needed in these algorithms and that—in contrast to the MO-SSSP problem—there is no ouput-sensitive algorithm solving MOSP in general, if we assume P ̸= NP. Moreover, we will exemplify a general methodology in output-sensitive complexity for showing that there is no output-sensitive algorithm unless P = NP. Similar to single objective optimization, we show that an enumeration problem is hard by showing the hardness of a decision problem, which is defined as follows. Definition 4.2 (Finished Decision Problem). Given an enumeration problem 𝐸 = (𝐼, 𝐶) the finished decision problem 𝐸 Fin is the following problem: We are given an instance 𝑥 ∈ 𝐼 of the enumeration problem and a subset 𝑀 ⊆ 𝐶(𝑥) and the goal is to decide if 𝑀 = 𝐶(𝑥). That is, when we are given an instance 𝑥 ∈ 𝐼 of the enumeration problem (𝐼, 𝐶) and a subset 𝑀 ⊆ 𝐶(𝑥) of the configuration set, we ask the question: Do we already have all configurations? As commonly done in theoretical computer science, we will identify a decision problem 𝑃 with its set of “Yes”-instances. So for an instance 𝑥 of 𝑃 , we write 𝑥 ∈ 𝑃 if 𝑥 is a “Yes”-instance and 𝑥 ∈ / 𝑃 if 𝑥 is a “No”-instance of 𝑃 . Lawler, Lenstra, and Rinnooy Kan (1980) showed that if there is an output-polynomial algorithm for an enumeration problem, then we can solve the associated finished decision problem in polynomial time. Or equivalently: If the finished decision problem cannot be solved in polynomial time, then we cannot solve the enumeration problem in output-polynomial time. Lemma 4.3 (Lawler, Lenstra, and Rinnooy Kan, 1980). If 𝐸 ∈ TotalP then 𝐸 Fin ∈ P. Proof. Let 𝐸 = (𝐼, 𝐶) be given. Since 𝐸 ∈ TotalP, there exists a polynomial function 𝑝 and a RAM 𝐴 which enumerates 𝐶(𝑥) for a given 𝑥 ∈ 𝐼 in time at most 𝑝(|𝑥|, |𝐶(𝑥)|). We will now construct an algorithm which will decide for a given instance (𝑥, 𝑀 ) of 𝐸 Fin whether it is a “Yes”- or “No”-instance. We simulate 𝐴 on 𝑥 for time 𝑝(|𝑥|, |𝑀 |). If 𝐴 does not halt on 𝑥, 8 s  1 c1 0  1 c2 0 ...   0 c21 t   0 c22   k1 + 1 0  0 c2 1 − k2 + 1  T v Figure 1: Showing the reduction in the proof for Theorem 4.4. Arcs with no label have cost 0. then |𝑀 | < |𝐶(𝑥)| and we can safely answer “No”. If 𝐴 does halt on 𝑥, we are almost done. It can still be the case that the input 𝑀 was invalid, i.e., 𝑀 ∖𝐶(𝑥) ̸= ∅ or that 𝑀 ( 𝐶(𝑥) and the algorithm was by chance faster than expected. Both conditions can be tested by checking whether 𝑀 is equal to the output of 𝐴. If it is, we return “Yes”, otherwise “No”. Simulation takes time poly(|𝑥|, |𝑀 |). The output of 𝐴 has at most size poly(|𝑥|, |𝑀 |) and the final check can thus be done in poly(|𝑥|, |𝑀 |). We can now use this method to finally show that the MOSP problem is indeed a hard enumeration problem. For a definition of co-NP, we refer the reader to the book by Arora and Barak (2009). Theorem 4.4. There is no output-sensitive algorithm for the MO 𝑠-𝑡-path problem unless P = NP, even if the input graph is outerplanar. Proof. We will show that MOSPFin is co-NP-hard. By Lemma 4.3 this shows that a TotalP algorithm for MOSP implies P = co-NP and thus P = NP. We reduce instances of the complement of the Knapsack problem: 𝑇 𝑇 (KP) {(𝑐1 , 𝑐2 , 𝑘1 , 𝑘2 ) | 𝑐1 𝑥 ≤ 𝑘1 , 𝑐2 𝑥 ≥ 𝑘2 , 𝑥 ∈ {0, 1}𝑛 } . 𝑇 𝑇 Without loss of generality, we can assume that 𝑐1 , 𝑐2 ∈ N𝑛 , 𝑘1 , 𝑘2 ∈ N, 𝑐1 1 > 𝑘1 and 𝑐2 1 > 𝑘2 . The problem above is still NP-complete under these restrictions, cf. (Kellerer, Pferschy, and Pisinger, 2004). We now construct an instance 𝐼^ of the MOSPFin problem from an instance 𝐼 of the KP problem. 1 . It has one arc The instance has nodes {𝑣𝑖1 , 𝑣𝑖2 } for every variable 𝑥𝑖 and one additional node 𝑣𝑛+1 1 ) with for every 𝑖 ∈ [1 : 𝑛] : (𝑣𝑖1 , 𝑣𝑖2 ) with cost (𝑐1𝑖 , 0)𝑇 and for every 𝑖 ∈ [1 : 𝑛] it has one arc (𝑣𝑖1 , 𝑣𝑖+1 2 𝑇 2 1 1 1 cost (0, 𝑐𝑖 ) and one arc (𝑣𝑖 , 𝑣𝑖+1 ) with cost 0. The node 𝑣1 is identified with 𝑠, the node 𝑣𝑛+1 is 𝑇 identified with 𝑡. There is one additional arc (𝑠, 𝑡) with cost (𝑘1 + 1, 0) and one additional path 𝑇 𝑇 (𝑠, 𝑣, 𝑡) with cost (0, 𝑐2 1 − 𝑘2 + 1). To complete the reduction, we set 𝑀 := {(𝑘1 + 1, 0)𝑇 , (0, 𝑐2 1 − 𝑘2 + 1)𝑇 }. An example of this reduction can be seen in Figure 1. We observe that the instance is valid, and that there are at least two Pareto-optimal paths, 𝑇 namely (𝑠, 𝑡) and (𝑠, 𝑣, 𝑡) having cost (𝑘1 + 1, 0)𝑇 and (0, 𝑐2 1 − 𝑘2 + 1)𝑇 , respectively. Both paths are Pareto-optimal because 𝑐1𝑖 , 𝑐2𝑖 > 0 for all 𝑖 ∈ [1 : 𝑛] and thus all other paths have either non-zero components in their objective function values or the sum of all values in one objective function and 0 in the other. All steps can be performed in polynomial time in the input instance 𝐼. 𝑇 Now, we take an instances 𝐼 ∈ KP. Accordingly, there exists 𝑥 ∈ {0, 1}𝑛 with 𝑐1 𝑥 ≤ 𝑘1 and 𝑇 𝑇 𝑇 𝑐2 𝑥 ≥ 𝑘2 ⇔ 𝑐2 (1 − 𝑥) ≤ 𝑐2 1 − 𝑘2 . Using this solution, we construct a path 𝑃 in the MOSP ^ For every 𝑖 with 𝑥𝑖 = 1, we take the route through node 𝑣 2 , inducing cost of (𝑐1 , 0)𝑇 . instance 𝐼: 𝑖 𝑖 9 1 ), inducing cost (0, 𝑐2 )𝑇 . For every 𝑖 with 𝑥𝑖 = 0, we take the route directly through arc (𝑣𝑖1 , 𝑣𝑖+1 𝑖 𝑇 𝑇 𝑇 We observe that 𝑐1 (𝑃 ) = 𝑐1 𝑥 ≤ 𝑘1 and 𝑐2 (𝑃 ) = 𝑐2 (1 − 𝑥) ≤ 𝑐2 1 − 𝑘2 . But then, 𝐼^ ∈ / MOSPFin , since 𝑃 is neither dominated by (𝑠, 𝑡) nor (𝑠, 𝑣, 𝑡). Now, suppose for some instance 𝐼, the constructed instance 𝐼^ ∈ / MOSPFin , i.e., there is an additional nondominated path 𝑃 apart from (𝑠, 𝑡) and (𝑠, 𝑣, 𝑡). Since it is not dominated by (𝑠, 𝑡) 𝑇 and (𝑠, 𝑣, 𝑡), it must hold that 𝑐1 (𝑃 ) ≤ 𝑘1 and 𝑐2 (𝑃 ) ≤ 𝑐2 1 − 𝑘2 . But then, we can construct a solution to KP in 𝐼 as follows: The path 𝑃 cannot take arcs from (𝑠, 𝑡) or (𝑠, 𝑣, 𝑡), so it needs to take the route through the 𝑣𝑖1 and 𝑣𝑖2 nodes. For every 𝑖 ∈ [1 : 𝑛] it can only either take arc (𝑣𝑖1 , 𝑣𝑖2 ) 1 ). If it takes the first arc, we set 𝑥 := 1; if it takes the second arc, we set 𝑥 := 0. This or (𝑣𝑖1 , 𝑣𝑖+1 𝑖 𝑖 𝑇 𝑇 𝑇 𝑇 𝑇 solution then has cost 𝑐1 𝑥 = 𝑐1 (𝑃 ) ≤ 𝑘1 and 𝑐2 𝑥 = 𝑐2 1 − 𝑐2 (𝑃 ) ≥ 𝑐2 1 − 𝑐2 1 + 𝑘2 = 𝑘2 . Hence, 𝐼 ∈ KP. This proves that the reduction is a polynomial time reduction from the complement of KP to the finished decision variant of MOSP and thus the theorem. The proof also shows that deciding whether the Pareto-front of a MO 𝑠-𝑡-path instance is larger than 2 is NP-hard. Moreover, it gives us a lower bound on the quality we can approximate the size of the Pareto-front. Corollary 4.5. It is co-NP-hard to approximate the size of the Pareto-front of the MO 𝑠-𝑡-path problem within a factor better than 23 . Since MOSP can be seen as a special case of many important MOCO problems, e.g., the multiobjective minimum perfect matching problem and the multiobjective minimum-cost flow problem, these problems also turn out to be hard. 5 Enumerating Supported Efficient Solutions and Nondominated Extreme Points In the history of multiobjective optimization, it has been repeatedly observed that in the case of two objectives a certain subset of the Pareto-front can be enumerated efficiently. This subset is usually defined as the set of Pareto-optimal solutions that can be obtained by using weighted-sum scalarizations of a MOCO problem 𝑃 , i.e., (𝑃 WS (ℓ)) min{ℓ𝑇 𝐶𝑥 | 𝑥 ∈ 𝒮}, for ℓ ≥ 0 . One of the pioneering works in this respect was the discovery of the Dichotomic Approach (DA) independently by Aneja and Nair (1979); Cohen (1978); Dial (1979). The algorithm finds the extreme supported points of the Pareto-front of a biobjective combinatorial optimization problem, i.e., the nondominated extreme points of conv 𝑐(𝒮). We will give different definitions for these terms later in this section. Especially, Aneja and Nair showed that if we have access to an algorithm 𝐴 which solves a lexicographic version of the MOCO problem, we can find the set of nondominated extreme points of size 𝑘 ≥ 2 by needing 2𝑘 −1 calls to 𝐴. The theory of output-sensitive complexity is able to add more ground to the intuition that the set of nondominated extreme points can be computed efficiently for every fixed 𝑑 ≥ 2. A more general view on supported Pareto-optimal solutions can be obtained by extending the view to multiobjective linear programming. Definition 5.1 (Multiobjective Linear Programming (MOLP)). Given matrices 𝐴 ∈ Q𝑚×𝑛 , 𝐶 ∈ Q𝑑×𝑛 and a vector 𝑏 ∈ Q𝑚 , enumerate the extreme points 𝒴X of the polyhedron 𝒫 := {𝐶𝑥 | 𝐴𝑥 ≥ 𝑏} + R𝑑≥ . We also write an MOLP in the form min 𝐶𝑥 𝐴𝑥 ≥ 𝑏 . 10 We call the polyhedron 𝒫 the upper image of a given MOLP instance, cf. also (Hamel, Löhne, and Rudloff, 2013)), and set 𝒴 := {𝐶𝑥 | 𝐴𝑥 ≥ 𝑏}. In the definition of the MOLP problem, we again only allow rational numbers, as real numbers cannot be encoded in our model of computation. We stress here that this is not the only possible definition of MOLP. One could also be interested in finding the nondominated facets of the upper image and this would result in a different computational problem. But for the study of extreme points of MOCO problems, the above problem will serve us better. We observe that there is a difference between the above version of the MOLP problem and the problem of enumerating all Pareto-optimal basic feasible solutions: The latter problem cannot be solved in output-polynomial time unless P = NP, because it subsumes the vertex enumeration problem even when allowing only two objectives. Khachiyan et al. (2008) proved that the vertex enumeration problem for general polyhedra cannot be solved in output-polynomial time unless P = NP. But we conjecture that there exists an output-sensitive algorithm for the MOLP problem as in Definition 5.1. The central connection between supported efficient solutions and supported nondominated points and MOLP lies in the concept of convex relaxations of MOCO problems, cf. (Ehrgott and Gandibleux, 2007; Cerqueus, Przybylski, and Gandibleux, 2015). Definition 5.2 (Convex Relaxation). Given a MOCO problem 𝑃 = (𝒮, 𝐶), the convex relaxation of 𝑃 is the MOLP min 𝐶𝑥 𝑥 ∈ conv 𝒮 . Definition 5.2 hides the fact, that a convex relaxation is not in the correct form of Definition 5.1. Although the convex relaxation of a MOCO problem exists in general, it might be computationally hard to obtain a representation of the MOLP as in Definition 5.1 (i.e., an inequality representation), as it might have a large number of constraints or it might have large numbers in the matrix 𝐴. But the convex relaxation will serve as a theoretical vehicle to define the extreme points of a MOCO problem and show some connections between MOCO problems and MOLP. Accordingly, we define the nondominated extreme points 𝒴X of a MOCO problem 𝑃 to be the extreme points of the upper image of the associated convex relaxation. An efficient solution 𝑥 to a MOCO problem 𝑃 is called supported, if 𝑥 is an efficient solution to the convex relaxation of 𝑃 . In the following sections, we will first review some literature to shed some lights on solving MOLP in the output-sensitivity framework in Section 5.1. Then in Section 5.2 we are concerned with finding nondominated extreme points to MOCO problems and show how the results from Section 5.1 can be applied to MOCO problems using the relation between a MOCO problem and its convex relaxation. 5.1 Multiobjective Linear Programming There are many ways of solving MOLP problems in the multiobjective optimization literature. But performance guarantees are seldomly given. Recently, Bökler and Mutzel proved that MOLP, under some restrictions, is solvable efficiently in the theory of output-sensitive complexity (Bökler and Mutzel, 2015). We will first review this result and later show that in some special cases better running times can be achieved. 5.1.1 The General Case with an Arbitrary Number of Objectives In (Bökler and Mutzel, 2015), the authors prove the following theorem: If the ideal point of an MOLP exists, we can enumerate the extreme points of the upper image in output-polynomial time. 11 Theorem 5.3 (Enumeration of Extreme Points of MOLP having an ideal point (Bökler and Mutzel, 2015)). If an ideal point of an MOLP (𝐶, 𝐴, 𝑏) exists, the extreme points 𝒴X of 𝒫 can be enumerated 𝑑 in time 𝒪(|𝒴X |⌊ 2 ⌋ (poly(⟨𝐴⟩, ⟨𝐶⟩) + |𝒴X | log |𝒴X |)) for each fixed number 𝑑 of objectives. The ideal point of an MOLP is the point (min{𝐶𝑖 𝑥 | 𝑥 ∈ 𝒮})𝑖∈[𝑑] , where 𝐶𝑖 is the 𝑖-th row of 𝐶. We remark that an ideal point does not exist for every MOLP, even though the MOLP is feasible, e.g., if one of the linear programming problems min{𝐶𝑖 𝑥 | 𝑥 ∈ 𝒮} does not have a finite optimal value. To achieve this result, the authors conducted a running time analysis of a variant of Benson’s algorithm. Benson’s algorithm was proposed by Benson (1998) and the mentioned variant, called the dual Benson algorithm, was proposed by Ehrgott, Löhne, and Shao (2012). From a highlevel point of view, the algorithm computes a representation of a polyhedron 𝒟, called lower image, which is geometrically dual to the upper image 𝒫. The theory of geometric duality of MOLP was introduced by Heyde and Löhne (2008), and in some sense discovered independently by Przybylski, Gandibleux, and Ehrgott (2010). The representation consists of the extreme points and facet inequalities which define 𝒟. Because of geometric duality of MOLP, the extreme points and facet inequalities of 𝒟 correspond to the facet inequalities and extreme points of 𝒫, respectively, and can be efficiently computed from them. To compute the extreme points and facet inequalities of 𝒟, the algorithm first computes a polyhedron 𝑃0 which contains 𝒟 entirely. Then, in each iteration 𝑖, it discovers one extreme point 𝑣 of the polyhedron 𝑃𝑖 and checks if 𝑣 lies on the boundary of 𝒟. If this is the case, the point is saved as a candidate extreme point of 𝒟. If this is not the case, the algorithm finds an inequality which separates 𝑣 from 𝒟 and supports 𝒟 in a face. Then, 𝑃𝑖+1 is computed by intersecting 𝑃𝑖 with the halfspace defined by the inequality found. In the end, redundant points are removed from the set of candidates and the remaining set is output. To check if 𝑣 lies on the boundary of 𝒟 and to compute the separating hyperplane, we only have to solve a weighted-sum LP of the original MOLP P: (𝑃 WS (ℓ)) min {ℓ𝑇 𝐶𝑥 | 𝐴𝑥 ≥ 𝑏}, where ℓ ∈ Q𝑑 and ||ℓ||1 = 1. Another important subproblem to solve is a variant of the well-known vertex enumeration problem. To arrive at the running time of Theorem 5.3, Bökler and Mutzel also provide an improvement to the algorithm by guaranteeing to find facet supporting inequalities exclusively. This is possible at the expense of solving a lexicographic linear programming problem (𝑃 Lex-WS (ℓ)) lexmin {(ℓ𝑇 𝐶𝑥, 𝑐1 𝑥, . . . , 𝑐𝑑 𝑥) | 𝐴𝑥 ≥ 𝑏}, which turns out to be polynomial-time solvable in general. 5.1.2 The Special Case with Two Objectives Now let 𝑃 be a biobjective linear program. In the following we present a polynomial delay algorithm, which only needs polynomial space in the size of the input, for enumerating nondominated extreme points. We assume that we have access to a solver for the lexicographic linear programming problem. The idea of the algorithm is the following: We start by computing a nondominated extreme point 𝑦 1 that minimizes the second objective, i.e., we solve 𝑃 Lex-WS ((0, 1)). Then, by solving a lexicographic linear program, a facet 𝐹 of 𝒴 is computed that supports 𝑦 1 such that 𝑦 1 is the lexicographic maximum of 𝐹 . By solving another lexicographic linear program, the algorithm finds the other nondominated extreme point 𝑦 * that is also supported by 𝐹 , see Figure 2 for a geometric illustration. We then restart the procedure with 𝑦 * . The algorithm terminates when the nondominated extreme point is found that minimizes the first objective. 12 C2 Y Y y∗ F y1 C1 Figure 2: Illustration of the idea of the algorithm with polynomial delay and polynomial space. In order to compute a facet that supports a nondominated extreme point 𝑦 of 𝑃 , we need the LP 𝐷2 (𝑦), cf. (Isermann, 1974): maximize 𝑏𝑇 𝑢 − 𝑦 𝑇 𝜆 subject to (𝑢, 𝜆) ≥ 0𝑚+𝑝 𝐴𝑇 𝑢 = 𝐶 𝑇 𝜆 (𝐷2 (𝑦)) 𝑝 𝑇 (1 ) 𝜆 = 1 (𝑢, 𝜆) ∈ Q𝑚+𝑝 . We get the following result. Lemma 5.4. Let 𝑃 be a biobjective linear program, let 𝑦 be a nondominated extreme point for 𝑃 ¯ for 𝐷2 (𝑦) so and let (𝑢, 𝜆) be a maximum 𝑢, 𝜆) 2 (𝑦) such that {︁ for 𝐷 }︁ there is no other maximum (¯ ⃒ 𝑇 2 𝑇 ¯ ⃒ that 𝜆 <lex 𝜆. Then 𝐹 := 𝑦 ∈ R 𝜆 𝑦 = 𝑏 𝑢 is a facet of 𝒴 that supports 𝒴 in 𝑦 such that 𝑦 is the lexicographic maximum of 𝐹 . Proof. The result easily follows from Proposition 4.2 in Ehrgott, Löhne, and Shao (2012). Moreover, in order to compute the other extreme point of 𝐹 , we can simply add the constraint 𝜆𝑇 𝐶𝑥 = 𝑏𝑇 𝑢 to 𝑃 and solve the lexicographic linear programm for 𝑃 Lex-WS (𝜆), where (𝑢, 𝜆) is a maximum of 𝐷2 (𝑦) as stated in Lemma 5.4. We get the following result. Theorem 5.5. Let 𝑃 be a biobjective linear program, then the above described algorithm outputs the nondominated extreme points of 𝑃 with polynomial delay and polynomial space. Proof. Let 𝑦 * in 𝒴X and let (𝑢, 𝜆) be a lexicographic maximum{︁ for the lexicographic }︁ linear program 2 𝑇 𝑇 𝐷2 (𝑦) as stated in Lemma 5.4. Then, by Lemma 5.4, 𝐹 := 𝑦 ∈ R | 𝜆 𝑦 = 𝑏 𝑢 is a facet of 𝒴 with 𝑦 in 𝐹 such that 𝑦 is a lexicographic maximum of 𝐹 . At some point, the algorithm will find the point that minimizes the first objective as it is the lexicographic minimum of a facet of 𝒴. Hence, the algorithm is finite. 13 By Bökler and Mutzel (2015), each iteration can be computed in polynomial time. In each iteration one nondominated extreme point is output, therefore the 𝑖-th delay of the algorithm is polynomial in the input size. Moreover, observe that at most three nondominated extreme points have to be kept in memory during each delay. Hence, the space is bounded polynomially in the input size. 5.2 Enumerating Supported Nondominated Points Now, we will come back to MOCO problems and show how we can find supported nondominated and extreme nondominated points. In Section 5.2.1 we show how we can make use of the results from Section 5.1.1, even when we do not have a compact LP formulation of our MOCO problem. We show that in the case of two objectives, we can again achieve better running times in Section 5.2.2. In the end, we discuss a result by Okamoto and Uno (2011), where the authors are concerned with finding supported spanning trees. 5.2.1 Enumerating Extreme Points of MOCO with an Arbitrary Number of Objectives To find nondominated extreme points we can apply the algorithms from Section 5.1.1 to the convex relaxation of the MOCO we want to solve. On one hand, convex relaxations of MOCO problems have an ideal point if and only if the MOCO instance is feasible. On the other hand, because of the aforementioned problems, we cannot easily compute the convex relaxation of a MOCO problem to apply the Dual Benson algorithm. But the only interaction between the algorithm and the MOLP at hand lies in solving weighted-sum linear programs. Hence, instead of solving the weighted-sum objective over the feasible set of the convex relaxation, we can optimize the weighted-sum objective over the feasible set of the MOCO problem. These considerations lead us to the following theorem. Theorem 5.6 (Enumeration of Extreme Points of MOCO Problems I (Bökler and Mutzel, 2015)). For every MOCO problem 𝑃 with a fixed number of objectives, the set of extreme nondominated points of 𝑃 can be enumerated in output-polynomial time if we can solve the weighted-sum scalarization of 𝑃 in polynomial time. Moreover, if we are able to solve lexicographic objective functions over the feasible set of the MOCO problem, we can even bound the delay of the algorithm. Theorem 5.7 (Enumeration of Extreme Points of MOCO Problems II (Bökler and Mutzel, 2015)). For every MOCO problem 𝑃 with a fixed number of objectives, the set of extreme nondominated points of 𝑃 can be enumerated in incremental polynomial time if we can solve the lexicographic version of 𝑃 in polynomial time. One example of a problem where it is hard to compute the whole Pareto-front, but enumerating the nondominated extreme points can be done in incremental polynomial time is thus the MOSP problem although both the size of the Pareto-front and the number of nondominated extreme points can be superpolynomial in the input size, cf. (Gusfield, 1980; Carstensen, 1983). There are two further methods which are concerned with finding extreme nondominated points of the Pareto-front of general multiobjective integer problems: The methods by Przybylski, Gandibleux, and Ehrgott, 2010 and Özpeynirci and Köksalan, 2010. Both do not give any running time guarantees, but the investigation of these can be subject to further research. 14 y0 y0 Y Y y3 Y Y y3 ȳ ȳ y2 y2 y1 y1 (a) Case 1 (b) Case 2 Figure 3: Illustration of the idea of the DA 5.2.2 Enumerating Extreme Points of Bicriterial Combinatorial Optimization Problems In the following, we investigate different variants of the DA, i.e., with and without access to an algorithm to solve the lexicographic version of a biobjective combinatorial optimization (BOCO) problem 𝑃 . Especially, we show that the nondominated extreme points of 𝑃 can be enumerated with polynomial delay if we have access to an algorithm to solve the lexicographic version of 𝑃 . 5.2.3 The Dichotomic Approach Let 𝑃 be a BOCO problem. We begin by describing the DA without access to an algorithm to solve the lexicographic version of 𝑃 . Notice that Aneja and Nair (1979) assume access to such an algorithm. In a first step, the DA computes optimal solutions 𝑦 0 and 𝑦 1 to the weighted-sum scalarizations WS 𝑃 ((1, 0)) and 𝑃 WS ((0, 1)), respectively. If 𝑦 0 equals 𝑦 1 , the algorithm terminates since the ideal point is a member of the Pareto-front. Otherwise, the pair (𝑦 0 , 𝑦 1 ) is added to the queue 𝒬. In each iteration, the algorithm retrieves a pair (𝑦 2 , 𝑦 3 ) from 𝒬 and 𝜆 is computed such that 𝜆𝑇 𝑦 2 = 𝜆𝑇 𝑦 3 . (1) Hence, the algorithm computes 𝜆 = (|𝑦22 − 𝑦23 |, |𝑦12 − 𝑦13 |). The algorithm proceeds by computing an optimal solution 𝑦¯ to the weighted-sum scalarization 𝑃 WS (𝜆). If 𝑦¯ is located in the line segment spanned by 𝑦 2 and 𝑦 3 , i.e., 𝜆𝑇 𝑦 2 = 𝜆𝑇 𝑦¯ = 𝜆𝑇 𝑦 3 , the algorithm neglects 𝑦¯ as it is either not a nondominated extreme point or was already discovered by the algorithm in a previous iteration, see Figure 3(a). Otherwise, 𝑦¯ is added to the set 𝒜 and the pairs (¯ 𝑦 , 𝑦 2 ) and (¯ 𝑦 , 𝑦 3 ) are added to 𝒬, see Figure 3(b). The algorithm terminates when 𝒬 is empty. Moreover, the nondominated non-extreme points in 𝒜 are removed and the remaining points are output. We get the following result. Theorem 5.8. Let 𝑃 be a BOCO problem, then the DA without access to an algorithm to solve the lexicographic version of 𝑃 outputs the nondominated extreme points of 𝑃 . Moreover, if the weighted-sum scalarization of 𝑃 is solvable in polynomial time, the algorithm is output-sensitive. 15 Proof. First, observe that there is no nondominated extreme point 𝑦 such that 𝑦1 < 𝑦10 and 𝑦2 < 𝑦21 , where 𝑦 0 and 𝑦 1 are the points found in the first step of the algorithm. Secondly, observe that there is at most one nondominated non-extreme point found by the algorithm per facet of 𝒴. Hence, the algorithm is finite. Moreover, by Isermann (1974) all points computed by the algorithm except possibly 𝑦 0 and 𝑦 1 are nondominated. Now assume there is a nondominated extreme point 𝑦¯ that is not found by the algorithm. By the first observation, 𝑦 0 <lex 𝑦¯ <lex 𝑦 1 . Hence, there must be a pair of points (𝑦 2 , 𝑦 3 ) such that 𝑦 2 <lex 𝑦¯ <lex 𝑦 3 and there is no other pair (𝑦 4 , 𝑦 5 ) that is “closer” to 𝑦¯, i.e., 𝑦 2 <lex 𝑦 4 <lex 𝑦¯ <lex 𝑦 5 <lex 𝑦 3 . Since the algorithm investigates each such pair, the algorithm will eventually discover 𝑦¯ and we arrive at a contradiction. Hence, the algorithm finds all nondominated extreme points of 𝑃. Because of the second observation and the fact that the number of nondominated facets of 𝒴 is linearly bounded in the cardinality of 𝒴X , the number of weighted-sum scalarizations the algorithm has to solve is linearly bounded in the cardinality of 𝒴X . Moreover, the encoding lengths of the points discovered during the computation of the algorithm are polynomially bounded in the size of the input, cf. (Bökler and Mutzel, 2015). Hence, the algorithm is output-sensitive if the weightedsum scalarization of 𝑃 is solvable in polynomial time. The above algorithm does not lead directly to an algorithm with polynomial delay since there may exist several solution to the weighted-sum scalarization 𝑃 WS (𝜆), which are not necessarily extreme. However, if we assume access to an algorithm to solve the lexicographic version of 𝑃 , we get the following result. Corollary 5.9. Let 𝑃 be a BOCO problem, then the DA with access to an algorithm to solve the lexicographic version of 𝑃 enumerates the nondominated extreme points of 𝑃 . Moreover, if the lexicographic version of 𝑃 is solvable in polynomial time, the points are enumerated with incremental delay. Proof. The correctness follows from the proof of Theorem 5.8. Since we have access to an algorithm to solve the lexicographic version of 𝑃 , each point found by the algorithm is nondominated extreme. Hence, the running time to discover a new nondominated extreme point or to conclude that no such point exists is linearly bounded in the number of the nondominated extreme points found so far. Therefore, the algorithm enumerates the nondominated extreme points with incremental delay if the lexicographic version of 𝑃 is solvable in polynomial time. Note that a lexicographic version of many BOCO problems can be solved as fast as the single objective problem. For example the biobjective shortest path, matroid optimization and assignment problems. Also if a compact formulation is available, the lexicographic weighted sum problem can be solved as a lexicographic linear programming problem, which can also be solved as fast as a single objective linear programming problem (cf. Bökler and Mutzel, 2015). A Variant of the Dichotomic Approach with Polynomial Delay We present a simple modification of the DA with access to an algorithm to solve the lexicographic version of 𝑃 . The idea is the following: When a new nondominated extreme point is found, the DA puts two pairs of nondominated extreme points into the queue 𝒬. At some point, the orginal algorithm checks if there is any nondominated extreme point 𝑦¯ “between” such a pair (𝑦 2 , 𝑦 3 ) of points, i.e., 𝑦 2 <lex 𝑦¯ <lex 𝑦 3 or 𝑦 3 <lex 𝑦¯ <lex 𝑦 2 . Now instead the modified algorithm computes 𝜆 as in (1) and solves 𝑃 Lex-WS (𝜆) resulting in a nondominated extreme point 𝑦. If 𝑦 equals 𝑦 2 or 𝑦 3 , we have verified that there is no point between the two points. Otherwise we add the triple (𝑦, 𝑦 2 , 𝑦 3 ) to the queue ̃︀ If such a triple is retrieved from 𝒬, ̃︀ we can output the nondominated extreme point 𝑦. The rest 𝒬. of the algorithm is analogous to original Dichotomic Approach. Therefore, in each iteration exactly 16 one nondominated extreme point is output. Moreover, in each iteration at most two lexicographic weighted sum-scalarization problems have to be solved. Hence, we can easily derive the following result. Corollary 5.10. Let 𝑃 be a BOCO problem, then the above described variant of the DA outputs the nondominated extreme points of 𝑃 with polynomial delay if the lexicographic version of 𝑃 is solvable in polynomial time. We remark here that we obtain a polynomial delay algorithm by keeping back points which we would have presented to the user already in the original DA. This is not what we usually want to do in practice. To overcome this issue, one could investigate the amortized delay, i.e., the amortized time needed per output. Moreover, we get the following result which follows from Theorem 5.5. Corollary 5.11. Let 𝑃 be a BOCO problem. If there is a compact formulation of 𝑃 , then the above described algorithm outputs the nondominated extreme points of 𝑃 with polynomial delay and polynomial space. 5.2.4 Enumerating Supported Efficient Spanning Trees The first paper discussing techniques from enumeration algorithmics in the context of multiobjective optimization is by Okamoto and Uno (2011). They propose a solution to the multiobjective spanning tree problem, which is defined as follows. Definition 5.12 (Multiobjective Spanning Tree Problem (MOST)). Given an undirected Graph 𝐺 = (𝑉, 𝐸), where 𝐸 ⊆ {𝑒 ⊂ 𝑉 | |𝑒| = 2}, and a multiobjective edge-cost function 𝑐 : 𝐸 → Q𝑑≥ . A feasible solution is a spanning tree 𝑇 of 𝐺, i.e., an acyclic, connected subgraph of 𝐺 containing ∑︀ all nodes 𝑉 . We set 𝑐(𝑇 ) := 𝑒∈𝑇 𝑐(𝑒). The set of all such trees is denoted by 𝒯 . The goal is to enumerate the minima of 𝑐(𝒯 ) with respect to the canonical partial order on vectors. However, the model considered by Okamoto and Uno (2011) is different from the one considered in this paper. They consider enumerating all supported weakly efficient spanning trees, i.e., all 𝑇 ∈ 𝒯 , such that 𝑇 is an optimal solution to MOSTWS (ℓ) for some ℓ ≥ 0. This includes nonPareto-optimal spanning trees for ℓ ∈ {𝑒𝑖 | 𝑖 ∈ [𝑑]} and also equivalent trees 𝑇 and 𝑇 ′ with 𝑇 ̸= 𝑇 ′ and 𝑐(𝑇 ) = 𝑐(𝑇 ′ ). For this problem, the authors propose an algorithm which runs with polynomial delay by employing a variant of the reverse search method by Avis and Fukuda (1992). The authors also generalize this algorithm to the case of enumerating Pareto-optimal basic feasible solutions of an MOLP if it is nondegenerate, i.e., every basic solution has exactly 𝑛 active inequalities. 6 Conclusion In this paper, we showed that output-sensitive complexity is a useful tool to investigate the complexity of multiobjective combinatorial optimization problems. We showed that in contrast to traditional computational complexity in multiobjective optimization, output-sensitive complexity is able to separate efficiently solvable from presumably not efficiently solvable problems. On one hand, we provided examples of problems for which output-sensitive algorithms exist, e.g., the multiobjective global minimum-cut problem, and also computing the nondominated extreme points for many MOCO problems can be done efficiently. On the other hand, we demonstrated that it is also possible to show that a MOCO problem does not admit an output-sensitive algorithm under weak complexity theoretic assumptions as P ̸= NP. One example is the multiobjective shortest path problem, which in turn also rules out the existence 17 of output-sensitive algorithms for the multiobjective versions of the minimum perfect matching and the minimum-cost flow problem. To conclude, we will raise some questions which can be investigated in further work. Multiobjective Linear Programming While in Section 5.2.1 it was shown that we can enumerate the extreme points of the upper image of an MOLP in incremental polynomial time, we needed the assumption that an ideal point exists. We are looking forward to being able to lift this assumption to the general case of MOLP and obtain at least an output-sensitive algorithm. Another question is, if it is necessary to fix the number of objectives 𝑑 in the running time to obtain an output-sensitive algorithm. We conjecture that this is actually the case when using standard assumptions from complexity theory and will investigate this in the future. A longer reaching question is, if we can find an algorithm with polynomial delay for the case of general MOLP and a fixed number of objectives. Multiobjective Combinatorial Optimization Not much is known in this regard. A very intriguing problem is the following: Definition 6.1 (Unconstrained Biobjective Combinatorial Optimization Problem). Given two vectors 𝑐1 , 𝑐2 ∈ Q𝑛 . The set of feasible solutions is {0, 1}𝑛 and the objective function is (︃ 𝑇 )︃ 1 𝑐 : 𝑥 ↦→ 𝑐 𝑥 . 𝑇 𝑐2 𝑥 The goal is to enumerate the minima of 𝑐({0, 1}𝑛 ) with respect to the canonical partial order on vectors. Even for this problem, which is an unconstrained version of the biobjective knapsack problem, it is unkown if an output-sensitive algorithm exists. Moreover, if there is no output-sensitive algorithm for this problem we can rule out output-sensitive algorithms for many MOCO problems, e.g., the multiobjective assignment and the multiobjective spanning tree problem. Additional Complexity Classes There has been some research on new complexity classes, combining fixed parameter tractability theory and output-sensitive complexity theory, which is Parameterized Enumeration by Creignou et al. (2013). It is very interesting to see if parameters can be found which make MOCO problems hard, apart from the fact that multiple objectives are present. References [1] H. Ackermann, A. Newman, H. Röglin, and B. Vöcking. “Decision-making based on approximate and smoothed Pareto curves”. In: Theoretical Computer Science 378.3 (2007), pp. 253– 270. [2] Y. P. Aneja and K. P. K. Nair. “Bicriteria transportation problem”. In: Management Science 25.1 (1979), pp. 73–78. [3] A. Armon and U. Zwick. “Multicriteria Global Minimum Cuts”. In: Algorithmica 46.1 (2006), pp. 15–26. [4] S. Arora and B. Barak. Computational Complexity: A Modern Approach. 1st. New York: Cambridge University Press, 2009. 18 [5] D. Avis and K. Fukuda. “A pivoting algorithm for convex hulls and vertex enumeration of arrangements of polyhedra”. In: Discrete and Computational Geometry 8.1 (Dec. 1992), pp. 295–313. [6] H. P. Benson. “An outer approximation algorithm for generating all efficient extreme points in the outcome set of a multiple objective linear programming problem”. In: Journal of Global Optimization 13.1 (1998), pp. 1–24. [7] F. Bökler and P. Mutzel. “Output-Sensitive Algorithms for Enumerating the Extreme Nondominated Points of Multiobjective Combinatorial Optimization Problems”. In: Algorithms – ESA 2015. LNCS 9294. Berlin: Springer, 2015, pp. 288–299. [8] T. Brunsch and H. Röglin. “Improved Smoothed Analysis of Multiobjective Optimization”. In: STOC 2012. New York: ACM, 2012, pp. 407–426. [9] P.M. Camerini, G. Galbiati, and F. Maffioli. “The complexity of multi-constrained spanning tree problems”. In: Theory of Algorithms. Ed. by L. Lovasz. Amsterdam: North-Holland, 1984, pp. 53 –101. [10] P. J. Carstensen. “The Complexity of Some Problems in Parametric Linear and Combinatorial Programming”. PhD thesis. University of Michigan, 1983. [11] A. Cerqueus, A. Przybylski, and X. Gandibleux. “Surrogate upper bound sets for bi-objective bi-dimensional binary knapsack problems”. In: European Journal of Operational Research 244.2 (2015), pp. 417–433. [12] V. Chankong and Y.Y. Haimes. Multiobjective Decision Making Theory and Methodology. Amsterdam: Elsevier, 1983. [13] J. L. Cohen. Multiobjective Programming and Planning. Vol. 140. Mathematics in Science and Engineering. New York: Academic Press, 1978. [14] T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson. Introduction to Algorithms. 2nd ed. Cambridge, MA: MIT Press, 2001. [15] N. Creignou, A. Meier, J.-S. Müller, J. Schmidt, and H. Vollmer. “Paradigms for Parameterized Enumeration”. In: Mathematical Foundations in Computer Science. LNCS 8087. Berlin: Springer, 2013, pp. 290–301. [16] R. B. Dial. “A Model and Algorithm for Multicriteria Route-Mode Choice”. In: Transportation Research 13B (1979), pp. 311–316. [17] M. Ehrgott. “A Discussion of Scalarization Techniques for Multiple Objective Integer Programming”. In: Annals of Operations Research 147.1 (2006), pp. 343–360. [18] M. Ehrgott. Multicriteria Optimization. 2nd. Vol. 491. Lecture Notes in Economics and Mathematical Systems. Berlin: Springer, 2005. [19] M. Ehrgott. “On matroids with multiple objectives”. In: Optimization 38.1 (1996), pp. 73–84. [20] M. Ehrgott and X. Gandibleux. “Bound Sets for Biobjective Combinatorial Optimization Problems”. In: Computers & Operations Research 34.9 (2007), pp. 2674–2694. [21] M. Ehrgott, A. Löhne, and L. Shao. “A dual variant of Benson’s “outer approximation algorithm” for multiple objective linear programming”. In: Journal of Global Optimization 52.4 (2012), pp. 757–778. [22] J. R. Figueira, C. Fonseca, P. Halffmann, K. Klamroth, L. Paquete, S. Ruzika, B. Schulze, M. Stigelmayr, and D. Willems. “Easy to say they’re hard, but hard to say they are easy – Towards a categorization of tractable multiobjective combinatorial optimization problems”. In: JMCDA (to appear) (2016). 19 [23] M. R. Garey and D. S. Johnson. Computers and Intractability; A Guide to the Theory of NP-Completeness. 1st ed. Series of Books in the Mathematical Sciences. New York: W. H. Freeman & Co., 1979. [24] M. Grötschel, L. Lovász, and A. Schrijver. Geometric Algorithms and Combinatorial Optimization. 1st. Vol. 2. Algorithms and Combinatorics. Berlin: Springer, 1988. [25] D. Gusfield. “Sensitivity Analysis for Combinatorial Optimization”. PhD thesis. UC Berkeley, 1980. [26] H.W. Hamacher and G. Ruhe. “On spanning tree problems with multiple objectives”. In: Annals of Operations Research 52 (1994), pp. 209–230. [27] A. H. Hamel, A. Löhne, and B. Rudloff. “Benson type algorithms for linear vector optimization and applications”. In: Journal of Global Optimization (2013). [28] P. Hansen. “Bicriterion Path Problems”. In: Multiple Criteria Decision Making Theory and Application. Ed. by G. Fandel and T. Gal. Vol. 177. Lecture Notes in Economics and Mathematical Systems. Berlin: Springer, 1979, pp. 109–127. [29] F. Heyde and A. Löhne. “Geometric duality in multiple objective linear programming”. In: SIAM Journal of Optimization 19.2 (2008), pp. 836–845. [30] H. Isermann. “Technical note—Proper efficiency and the linear vector maximum problem.” In: Operations Research 22.1 (1974), pp. 189–191. [31] D. S. Johnson, M. Yannakakis, and C. H. Papadimitriou. “On generating all maximal independent sets”. In: Information Processing Letters 27.3 (1988), pp. 119–123. [32] H. Kellerer, U. Pferschy, and D. Pisinger. Knapsack Problems. Berlin: Springer, 2004. [33] L. Khachiyan, E. Boros, K. Borys, K. Elbassioni, and V. Gurvich. “Generating All Vertices of a Polyhedron Is Hard”. In: Discrete and Computational Geometry 39 (2008), pp. 174–190. [34] K. Klamroth, R. Lacour, and D. Vanderpooten. “On the representation of the search region in multi-objective optimization”. In: European Journal of Operational Research 245.3 (2015). [35] M. Laumanns, L. Thiele, and E. Zitzler. “An efficient, adaptive parameter variation scheme for metaheuristics based on the epsilon-constraint method”. In: European Journal of Operational Research 169 (2006), pp. 932–942. [36] E. L. Lawler, J. K. Lenstra, and A. H. G. Rinnooy Kan. “Generating All Maximal Independent Sets: NP-Hardness and Polynomial-Time Algorithms”. In: SIAM Journal on Computing 9.3 (Aug. 1980), pp. 558–565. [37] E. Q. V. Martins. “On a Multicriteria Shortest Path Problem”. In: European Journal of Operational Research 16 (1984), pp. 236–245. [38] Y. Okamoto and T. Uno. “A polynomial-time-delay and polynomial-space algorithm for enumeration problems in multi-criteria optimization”. In: European Journal of Operational Research 210.1 (2011), pp. 48–56. [39] Ö. Özpeynirci and M. Köksalan. “An exact algorithm for finding extreme supported nondominated points of multiobjective mixed integer programs”. In: Management Science 56.12 (2010), pp. 2302–2315. [40] A. Przybylski, X. Gandibleux, and M. Ehrgott. “A recursive algorithm for finding all nondominated extreme points in the outcome set of a multiobjective integer programme”. In: INFORMS Journal on Computing 22.3 (2010), pp. 371–386. [41] G. Ruhe. “Complexity results for multicriteria and parametric network flows using a pathological graph of Zadeh”. In: Zeitschrift für Operations Research 32 (1988), pp. 9–27. 20 [42] J. Schmidt. Enumeration: Algorithms and Complexity. Diplomarbeit. Mar. 2009. [43] P. Serafini. “Some considerations about computational complexity for multi objective combinatorial problems”. In: Recent Advances and Historical Development of Vector Optimization. Vol. 294. Lecture Notes in Economics and Mathematical Systems. Berlin: Springer, 1986, pp. 222–232. 21
8cs.DS
arXiv:1612.00198v2 [math.GR] 7 Jul 2017 Pro-p subgroups of profinite completions of 3-manifold groups Henry Wilton∗ and Pavel Zalesskii† July 10, 2017 Abstract We completely describe the finitely generated pro-p subgroups of the profinite completion of the fundamental group of an arbitrary 3manifold. We also prove a pro-p analogue of the main theorem of Bass–Serre theory for finitely generated pro-p groups. 1 Introduction In recent years there has been a great deal of interest in detecting properties of the fundamental group π1 M of a 3-manifold via its finite quotients, or more conceptually by its profinite completion. This motivates the study of the profinite completion π[ 1 M of the fundamental group of a 3-manifold. As in the case of finite groups, there is a Sylow theory for profinite groups, and pro-p subgroups play the same central role in profinite group theory that p-subgroups play in the theory of finite groups. Note that pro-p subgroups of π[ 1 M are infinitely generated in general, so it is natural to begin the study from the finitely generated case. Amazingly enough, it is possible to give a complete description of the finitely generated pro-p subgroups of the profinite completions of all 3-manifold groups, and this is one of the objectives of this paper (see Theorem 1.3 below). ∗ Department of Pure Mathematics and Mathematical Statistics, Centre for Mathematical Sciences, Wilberforce Road, Cambridge, CB3 0WB, United Kingdom † Department of Mathematics, University of Brası́lia, 70910-9000 Brası́lia, Brazil 1 The work of this paper was partially motivated by [WZ17, Theorem F], where it was proved that if M is hyperbolic then any finitely generated prop subgroup of π[ 1 M is free. In fact the proof of Theorem 1.3 follows the same strategy as in [WZ17]. By applying first the (profinite) Kneser–Milnor decomposition and then the (profinite) JSJ decomposition, the theorem is reduced to the cases of Seifert-fibred and hyperbolic manifolds, possibly with cusps. The main difficulty at this point is provided by hyperbolic manifolds with cusps. In the closed case the result was proved in [WZ17]. In this case (after passing to a finite-sheeted cover) there is a suitable hierarchy in which the corresponding actions on profinite trees are relatively profinitely acylindrical. However, we have to deal with cusps. At this point we make heavy use of the profinite analogue of Bass–Serre theory for groups acting on trees. Note that this theory does not have the full strength of its classical original. The main theorem of Bass–Serre theory asserts that a group G acting on a tree T is the fundamental group of a graph of groups (G, T /G, D), where D is a maximal subtree of T /G and G consists of edge and vertex stabilizers of a connected transversal of T /G. This does not hold in the profinite case: firstly D does not always exist and secondly even if it exists it might not lift to T . In this paper we prove a pro-p analogue of the main theorem of Bass– Serre theory for finitely generated pro-p groups, that stands independently as a contribution to the combinatorial theory of pro-p groups. Theorem 1.1. Let G be a finitely generated pro-p group acting on a pro-p tree T . Then G is the fundamental pro-p group of a profinite graph of pro-p groups (G, Γ). Moreover, the vertex and edge groups of (G, Γ) are stabilizers of certain vertices and edges of T respectively, and stabilizers of vertices and edges of T in G are conjugate to subgroups of vertex and edge groups of (G, Γ) respectively. We observe that (G, Γ) in this theorem is not (G, T /G) as in classical Bass–Serre theory. To construct the graph of pro-p groups (G, Γ) we use a decomposition of G as an inverse limit G = limU GU of finitely generated ←− virtually free pro-p groups GU , and their splittings as the fundamental groups of finite graphs of finite p-groups obtained in [HZ13]. We then apply this theorem to describe the finitely generated pro-p subgroups of the profinite completion of the fundamental group of a cusped hyperbolic 3-manifold. 2 Theorem 1.2. Let π1 M be the fundamental group of an orientable hyperbolic 3-manifold with cusps and H a finitely generated pro-p subgroup of π b1 M. Then H is a free pro-p product of free abelian pro-p groups of rank ≤ 2. [ Analysing π 1 M for Thurston’s geometries case-by-case, we obtain the [ classification of finitely generated pro-p subgroups of π 1 M for an arbitrary compact, orientable 3-manifold. Theorem 1.3. A finitely generated pro-p subgroup of the profinite completion π[ 1 M of the fundamental group π1 M of a compact, orientable 3-manifold M is a free pro-p product of the pro-p groups from the following lists of isomorphism types. (i) For p > 3: Cp ; Zp ; Zp ×Zp ; the pro-p completion of (Z×Z)⋊Z; and the pro-p completion of a residually-p fundamental group of a non-compact Seifert fibred manifold with hyperbolic base orbifold; (ii) For p = 3, in addition to the list of (i) of possible free factors we have a torsion-free extension of Z3 × Z3 × Z3 by C3 . (iii) For p = 2, in addition to the list in (i) we have the following free factors: (1) the cyclic groups C2m ; (2) the dihedral groups D2k ; (3) the generalized quaternion groups Q2n ; (4) the infinite dihedral pro-2 group Z2 ⋊ C2 ; (5) the torsion-free extensions of Z2 × Z2 × Z2 by one of the following finite 2-groups: C2 , C4 , C8 , D2 , D4 , D8 , Q16 ; (6) the pro-2 extension of the Klein-bottle group Z ⋊ Z; (7) the pro-2 completion of all torsion free extensions of a soluble group (Z ⋊ Z) ⋊ Z with a group of order at most 2. We note that, because the finitely generated pro-p subgroups of profinite completions of 3-manifold groups are so restricted, they are not very useful for distinguishing 3-manifolds from each other. However, for the same reason, they are potentially useful for distinguishing the profinite completions of 3manifold groups from the profinite completions of other discrete groups. 3 Acknowledgements The first author was supported by the EPSRC and the second author by Capes. Much of the work for this paper was completed while the second author was a visiting fellow at Trinity College, Cambridge, and he acknowledges their hospitality. Thanks are also due to the anonymous referee for pointing out a mistake in the first version of this paper. 2 Preliminaries In this section, we recall the necessary elements of the theory of profinite trees. A graph Γ is a disjoint union E(Γ)∪V (Γ) with two maps d0 , d1 : Γ → V (Γ) that are the identity on the set of vertices V (Γ). For an element e of the set of edges E(Γ), d0 (e) is called the initial and d1 (e) the terminal vertex of e. Definition 2.1. A profinite graph Γ is a graph such that: 1. Γ is a profinite space (i.e. an inverse limit of finite discrete spaces); 2. V (Γ) is closed; and 3. the maps d0 and d1 are continuous. Note that E(Γ) is not necessary closed. A morphism α : Γ −→ ∆ of profinite graphs is a continuous map with αdi = di α for i = 0, 1. By [ZM88, Prop. 1.7] every profinite graph Γ is an inverse limit of finite quotient graphs of Γ. For a profinite space X that is the inverse limit of finite discrete spaces b b j ], where [ZX b j ] is the free Z-module b Xj , [[ZX]] is the inverse limit of [ZX with basis Xj . For a pointed profinite space (X, ∗) that is the inverse limit b of pointed finite discrete spaces (Xj , ∗), [[Z(X, ∗)]] is the inverse limit of b b b [Z(Xj , ∗)], where [Z(Xj , ∗)] is the free Z-module with basis Xj \ {∗} [RZ10, Chapter 5.2]. For a profinite graph Γ, define the pointed space (E ∗ (Γ), ∗) as Γ/V (Γ), with the image of V (Γ) as a distinguished point ∗, and denote the image of 4 e ∈ E(Γ) by ē. By definition a profinite tree Γ is a profinite graph with a short exact sequence δ ǫ b b ∗ (Γ), ∗)]] → b (Γ)]] → 0 → [[Z(E [[ZV Z→0 where δ(ē) = d1 (e)−d0 (e) for every e ∈ E(Γ) and ǫ(v) = 1 for every v ∈ V (Γ). If v and w are elements of a profinite tree T , we denote by [v, w] the smallest profinite subtree of T containing v and w and call it a geodesic. A profinite graph is called a pro-p tree if one has the following exact sequence: δ ǫ 0 → [[Fp (E ∗ (Γ), ∗)]] → [[Fp V (Γ)]] → Fp → 0 where δ(ē) = d1 (e)−d0 (e) for every e ∈ E(Γ) and ǫ(v) = 1 for every v ∈ V (Γ). Note that any profinite tree is a pro-p tree, but the converse is not true. In fact, a connected profinite graph is a profinite tree if and only if it is a pro-p tree for every prime p. By definition, a profinite group G acts on a profinite graph Γ if we have a continuous action of G on the profinite space Γ that commutes with the maps d0 and d1 . When we say that G is a finite graph of profinite groups, we mean that it contains the data of the underlying finite graph, the edge profinite groups, the vertex profinite groups and the attaching continuous maps. More precisely, let ∆ be a connected finite graph. The data of a graph of profinite groups (G, ∆) over ∆ consists of a profinite group G(m) for each m ∈ ∆, and continuous monomorphisms ∂i : G(e) −→ G(di (e)) for each edge e ∈ E(∆). A finite graph of groups (G, Γ) is said to be reduced, if for every edge e which is not a loop neither ∂1 : G(e) → G(d1 (e)) nor ∂0 : G(e) → G(d0 (e)) is an isomorphism; we call an edge e which is not a loop and such that one of the edge maps ∂i is an isomorphism fictitious. Any finite graph of groups can be transformed into a reduced finite graph of groups by collapsing fictitious edges using the following procedure. If e is a fictitious edge, we can remove {e} from the edge set of Γ, and identify d0 (e) and d1 (e) to a new vertex y. Let Γ′ be the finite graph given by V (Γ′ ) = {y} ⊔ V (Γ) \ {d0 (e), d1 (e)} and E(Γ′ ) = E(Γ)\{e}, and let (G′ , Γ′ ) denote the finite graph of groups based on Γ′ given by G′ (y) = G(d1 (e)) if ∂0 (e) is an isomorphism, and G′ (y) = G(d0 (e)) if ∂0 is not an isomorphism. This procedure can be continued until there are no fictitious edges. The resulting finite graph of groups (G, Γ) is reduced. 5 Remark 2.2. The reduction procedure just described does not change the fundamental group (as a group given by presentation), i.e. choosing a maximal subtree to contain the collapsing edge the morphism (G, Γ) −→ (G′ , Γ′ ) induces the identity map on the fundamental group given by presentation by eliminating redundant relations associated with fictitious edges that are just collapsed by reduction. The definition of the profinite fundamental group of a connected profinite graph of profinite groups is quite involved (see [ZM89]). However, the profinite fundamental group Π1 (G, Γ) of a finite graph of finitely generated profinite groups (G, Γ) can be defined as the profinite completion of the abstract (usual) fundamental group Πabs 1 (G, Γ) (we use here that every subgroup of finite index in a finitely generated profinite group is open [NS07, Theorem 1.1 ]). The fundamental profinite group Π1 (G, Γ) has the following presentation: Π1 (G, Γ) = hG(v), te | rel(G(v)), ∂1 (g) = ∂0 (g)te , g ∈ G(e), te = 1 for e ∈ T i; (1) here T is a maximal subtree of Γ and ∂0 : G(e) −→ G(d0 (e)), ∂1 : G(e) −→ G(d1 (e)) are monomorphisms. In contrast to the abstract case, the vertex groups of (G, Γ) do not always embed in Π1 (G, Γ), i.e., Π1 (G, Γ) is not always proper. However, the edge and vertex groups can be replaced by their images in Π1 (G, Γ) and after this replacement Π1 (G, Γ) becomes proper. Thus from now on we shall assume that Π1 (G, Γ) is always proper, unless otherwise stated. To obtain the definition of the fundamental pro-p group of a finite graph of finitely generated pro-p groups one simply replaces ‘profinite’ by ‘pro-p’ in the above definition. The profinite (resp. pro-p) fundamental group Π1 (G, Γ) acts on the standard profinite (resp. pro-p) tree S (defined analogously to the abstract one) associated to it, with vertex and edge stabilizers being conjugates of vertex and edge groups, and such that S/Π1 (G, Γ) = Γ [ZM88, Proposition 3.8]. Example 2.3. If G = π1 (G, Γ) is the fundamental group of a finite graph of (abstract) groups then one has the induced graph of profinite completions b Γ) (not necessarily proper) and a natural hoof edge and vertex groups (G, b Γ). It is an embedding if π1 (G, Γ) is momorphism G = π1 (G, Γ) −→ Π1 (G, b is simply the profinite completion. residually finite. In this case Π1 (G, Γ) = G 6 b if and only if the Moreover, the standard tree S(G) naturally embeds in S(G) edge and vertex groups G(e), G(v) are separable in π1 (G, Γ), or equivalently G(e) are closed in G(d0 (e)), G(d1 (v)) with respect to the topology induced by the profinite topology on G [CB13, Proposition 2.5]. In particular, this is the case if vertex and edge groups are finitely generated and G is subgroup separable. In what follows, the notion of the fundamental pro-p group of an infinite profinite graph of pro-p groups is used only in Theorem 3.1, and in fact only in the form of the inverse limit of fundamental groups of finite graphs of finite p-groups. We state this as a proposition that the reader can use as a definition. We need to define first a profinite graph of profinite groups. The definition is different from, but equivalent to, the one given in [ZM89]1 . Definition 2.4. An inverse limit of finite graphs of finite groups is called a profinite graph of profinite groups. Proposition 2.5. An inverse limit (G, Γ) = limi (Gi , Γi ) of finite graphs of ←− profinite (resp. pro-p) groups induces an inverse limit of the fundamental profinite (resp. pro-p) groups limi Π1 (Gi , Γi ) and Π1 (G, Γ) = limi Π1 (Gi , Γi ). ←− ←− Proof. One uses Definition 9 (a) in [Ser77] with a base vertex (rather than a maximal subtree). Then by [Bas93, Proposition 2.4 ] a morphism of graphs of groups induces a homomorphism of fundamental groups, that in turn induces a homomorphism of profinite completions. So choosing a base vertex v0 in Γ and considering its image voi in Γi to be the base point in Γi , we have an inverse system {Π1 (Gi , Γi )}. The proof of Π1 (G, Γ) = limi Π1 (Gi , Γi ) is just a ←− straightforward verification of the universal property from [ZM89, 2.1]. 3 Finitely generated pro-p groups acting on profinite trees We now prove Theorem 1.1. Theorem 3.1. Let G be a finitely generated pro-p group acting on a pro-p tree T . Then G is the fundamental pro-p group of a profinite graph of pro-p groups (G, Γ). Moreover, the vertex and edge groups of (G, Γ) are stabilizers 1 The equivalence is an easy argument which we leave as an exercise to the reader. 7 of certain vertices and edges of T respectively, and stabilizers of vertices and edges of T in G are conjugate to subgroups of vertex and edge groups of (G, Γ) respectively. Proof. For every open normal subgroup U of G consider Ũ , a subgroup generated by all intersections with vertex stabilizers. Then by Proposition 3.5 and Corollary 3.6 of [RZ00], the quotient group U/Ũ acts freely on the pro-p tree T /Ũ and therefore it is free pro-p. Thus GU := G/Ũ is virtually free pro-p. By [HZ13, Theorem 1.1] it follows that GU is the fundamental pro-p group Π1 (GU , ΓU ) of a finite graph of finite p-groups with cyclic edge stabilizers. By Remark 2.2 we have a morphism of graphs of groups η : (GU , ΓU ) −→ (GU , ΓU ) to a reduced graph of groups. By [WZar, Corollary 3.3] the number of reduced graphs of groups (GU , ΓU ) that can be obtained from (GU , ΓU ) is finite. Let ΩU be the set of such reduced graphs of groups. Since G is finitely generated we can choose a linearly ordered system B of open normal subgroups U that form a basis of neighbourhoods of 1. By [RZ14, Proposition 1.10] (see also its proof), for V ⊆ U both in B with G/Ṽ written as the fundamental pro-p group G/Ṽ = Π1 (GV , ΓV ) of a reduced graph of p-groups, one has a natural decomposition of G/Ũ as the pro-p fundamental group G/Ũ = Π1 (GV,U , ΓV ) of a finite graph of finite pgroups (GV,U , ΓV ), where the vertex and edge groups are GV,U (x) = G(x)Ũ /Ũ , x ∈ V (ΓV )⊔E(ΓV ). Thus we have a morphism νV,U : (GV , ΓV ) −→ (GV,U , ΓV ) of graphs of groups such that the induced homomorphism on the pro-p fundamental groups coincides with the canonical projection ϕV,U : G/Ṽ −→ G/Ũ . Choose a reduction morphism ηU : (GV,U , ΓV ) −→ (GV,U , ΓU ) to a reduced graph of groups (GV,U , ΓU ) (it is not unique); it induces the identity map on the fundamental group G/Ũ (see Remark 2.2) and so ηU νV,U induces the homomorphism Π1 (GV , ΓV ) −→ Π1 (GV,U , ΓU ) on the pro-p fundamental groups that coincides with the canonical projection ϕU V : G/Ṽ −→ G/Ũ. Observe that the morphisms νV,U and therefore ηU νV,U restricted on the second variable is just the collapse of fictitious edges. Thus, for V ⊆ U, one has a map ωV,U : ΩV → ΩU . Since B is linearly ordered this yields an inverse system (otherwise it would have not, since the reduction morphism is not unique). Hence Ω = limU ΩU is non-empty. Let (GU , ΓU ) ∈ Ω. Then (G, Γ) given ←− by (G, Γ) = lim(GU , ΓU ), is a profinite graph of pro-p groups satisfying G ≃ ←− Π1 (G, Γ) (cf. Proposition 2.5). 8 Corollary 3.2. Suppose the graphs ΓU in the proof of Theorem 3.1 are bounded independently of U. Then Γ is finite and so G is the fundamental group of a finite graph of pro-p groups (G, Γ). It is not known whether Γ can be made finite in Theorem 3.1. In the abstract case it comes automatically. One could achieve it if one could bound the size of a reduced finite graph of finite p-groups in terms of the minimal number of generators of its pro-p fundamental group. In the case of cyclic edge groups this is possible. Corollary 3.3. Let G be a finitely generated pro-p group acting on a pro-p tree T with cyclic edge stabilizers. Then G is the fundamental pro-p group of a finite graph of pro-p groups (G, Γ). Moreover, the vertex and edge groups of (G, Γ) are stabilizers of certain vertices and edges of T respectively, and stabilizers of vertices and edges of T in G are conjugate to subgroups of vertex and edge groups of (G, Γ) respectively. Proof. By [SZ14, Lemma 2.2] in the case of cyclic edge stabilizers the size of ΓU from the proof of Theorem 3.1 is bounded independently of U, so the result follows from Corollary 3.2. b on a profinite (or pro-p) Definition 3.4. The action of a profinite group Γ tree T is said to be k-acylindrical, for k a constant, if the set of fixed points of γ has diameter at most k whenever γ 6= 1. Proposition 3.5. Let G be a finitely generated pro-p group acting k-acylindrically and virtually freely on a pro-p tree. Then G is a free pro-p product of finite p-groups and a free pro-p group. Proof. Let F be an open subgroup of G acting freely on T . By [RZ00, Corollary 3.6] F is free pro-p. By [HZ08, Theorem 1] a virtually free pro-p group whose torsion elements have finite centralizers satisfies the conclusion of the proposition. So we just need to show that torsion elements have finite centralizers. Let g be a torsion element of G and let T g be the subtree of fixed points (see [ZM88, Theorem 2.8]. Then CG (g) acts on T g . Since the action is virtually free |CG (g)| = ∞ would imply |T g | = ∞ contradicting the hypothesis. Hence CG (g) is finite. This finishes the proof. Remark 3.6. The proposition is valid for second countable pro-p groups. One just needs to replace the reference [HZ08] in the proof with [MZ17]. 9 For a normal subgroup U of a profinite group G acting on a profinite tree T we denote by Ũ the subgroup of U generated by all vertex stabilizers. Clearly Ũ is normal in G and by [ZM88, Prop. 2.5] T /Ũ is a profinite tree. Lemma 3.7. Let G be a pro-p group acting k-acylindrically on a profinite tree T and U a closed normal subgroup of G. Then the action of GU = G/Ũ on TU = T /Ũ is k-acylindrical. Proof. First note that a nontrivial stabilizer of any edge e coincides with one of its vertex stabilizers Gv or Gw , say Gw , since otherwise by [WZ17, Lemma 11.2] the stabilizers of two vertices of e do not generate a pro-p group. It follows that a maximal connected subgraph D of T having nontrivial stabilizers in G of all its edges has diameter at most k. We shall prove that the same is true in GU ; we use the subscript U for images in T /Ũ . Consider 1 6= gU ∈ GU that stabilizes a vertex in TU . It suffices to show that a maximal connected subgraph containing vU such that all edge stabilizers of it are non-trivial is contained in DU . Let eU be an edge not in DU having a vertex wU ∈ DU . Let g ∈ G, stabilizing a vertex v ∈ T , be such that g Ũ/Ũ = gU , and choose D with v ∈ D. Let w be a vertex of D whose image in TU is wU . Then Gw 6= {1} and there exists an edge e incident to w whose image in TU is eU . But Ge is trivial and so (GU )eU is trivial. Thus all edges not in DU with vertices in DU have trivial stabilizers in GU , as required. Proposition 3.5 and Lemma 3.7 enable us to generalize [WZ17, Theorem 11.1] from the 1-acylindrical case to the k-acylindrical case, for any natural number k. Theorem 3.8. Let G be a finitely generated pro-p group acting k-acylindrically on a profinite tree T . Then G is a free pro-p product of vertex stabilizers and a free pro-p group. Proof. Since G is finitely generated, its Frattini series Φn (G) is a fundamen^ n (G) be the subgroup of Φn (G) tal system of neighbourhoods of 1. Let Φ ^ n (G) generated be all vertex stabilizers of Φn (G). By Lemma 3.7, Gn = G/Φ ^ n (G) and so by Proposition acts k-acylindrically on a profinite tree Tn = T /Φ 3.5 is a free pro-p product ! a ^ n (G) = Gn = G/Φ Gnv ∐ F0n , v 10 of finite p groups Gnv and a free group F0n in Gn . Since G = lim Gn and G is finitely generated, by choosing n large enough ←− we may assume that the number of free factors is the same for every m > n, i.e. v ranges over a finite set V . By [RZ00, Theorem 4.2] every finite subgroup of a free pro-p product is conjugate to a subgroup of a free factor. Therefore, the free factors of Gm+1 are mapped onto the free factors of Gm up to conjugation. But in a free pro-p product decomposition replacing any free factor by its conjugate does not change the group. So, starting from n, we can inductively choose Gm+1v in such a way that its image in Gm is Gmv .`Let Gv be the inverse limit of Gmv . Then by [RZ10, Lemma 9.1.5] G = v∈V Gv ∐ F0 . It remains to observe that Gmv is a stabilizer of a vertex in Tm so the set of fixed points T Gmv is non-empty and closed [RZ00, Theorem 3.7]. Therefore, Gv is the stabilizer of a non-empty set of vertices lim T Gvm . This finishes the ←− proof. We shall need these auxiliary lemmas in Section 4. Lemma 3.9. Let H be a pro-p group acting on a profinite tree T with compact non-empty set of edges having only finitely many maximal vertex stabilizers up to conjugation. Then H acts on a profinite tree D with non-empty set of edges such that, for every edge e of D, the edge stabilizer He fixes at least two edges in the original tree T . Proof. Let Hv1 , . . . Hvn be maximal stabilizers of vertices in T up to conjugation. Then the stabilizer Hm of any edge or vertex m ∈ T is contained in some of Hvi up to H-translation of m. So assuming Hm ≤ Hvi we see that Hm fixes the geodesic [m, vi ]. Since E(T ) is compact, Hm stabilizes an edge incident to vi whenever m 6= vi by [ZM88, Lemma 2.15]. So Snif m 6∈ star(vi ), the stabilizer Hm fixes at least two distinct edges. Now i=1 Hstar(vi ) is a profinite subgraph of T and, collapsing all its connected components in T , by the Proposition on page 486 of [Zal92], we get a profinite tree D on which H acts with edge stabilizers each stabilizing at least two distinct edges of S T (as was just explained). Finally note that the connected components of ni=1 Hstar(vi ) are stars, since the geodesic [gvi , hvj ] is infinite whenever gvi 6= hvj and g, h ∈ H. Indeed, otherwise choose a geodesic [gvi , hvj ] of minimal length with gvi 6= hvj for g, h ∈ H. To arrive at a contradiction we show that the group K generated by the stabilizers of gvi and hvj is not 11 pro-p. Note that B = K[gvi , hvj ] is a profinite tree with B/K finite. Since [gvi , hvj ] is minimal, the stabilizers of all internal vertices of the geodesic are equal to the stabilizers of their incident edges. Thus collapsing all but one edges of this geodesic and their K translates, we may assume that B/K has just one edge. Now we can apply [WZ17, Lemma 11.2 ] to deduce that K is not pro-p as required. Lemma 3.10. Let G be a profinite group acting on a profinite tree T with compact set of edges such that any non-trivial subgroup K of G stabilizing two edges e1 , e2 is at most procyclic. Let H be a finitely generated pro-p subgroup of G. Then H is the fundamental pro-p group Π1 (H, ∆) of a finite graph of finitely generated pro-p groups with edge groups that are stabilizers of some pairs of distinct edges of T . In particular, if the action of G on T is ` 1-acylindrical then H splits as a free pro-p product H = v∈V (∆) H(v) ∐ F , where F is a free pro-p group intersecting trivially all conjugates of vertex groups in H. Proof. First note that a nontrivial stabilizer of any edge e coincides with one of its vertex stabilizers Hv or Hw , say Hw , since otherwise by [WZ17, Lemma 11.2] the stabilizers of two vertices of e do not generate a pro-p group. This means that connected components of the abstract subgraph whose edges have non-cyclic H-stabilizers are at most edges. Now since H is finitely generated, its Frattini series Φn (H) is a fundan (H) be the subgroup of Φn (H) mental system of neighbourhoods of 1. Let Φ^ n (H) acts on a generated be all vertex stabilizers of Φn (H). Then Hn = H/Φ^ n (H) (cf. [ZM88, Proposition 2.5]) and Φn (H)/Φ ^ n (H) profinite tree Tn = T /Φ^ acts freely on Tn and therefore is free pro-p (see Theorem 2.6 [ZM88]). Note that the vertex and edge stabilizers of Hn acting on Tn are finite epimorphic images of the corresponding vertex and edge stabilizers of H acting on T and so the images in Tn of edges of T with trivial edge stabilizers have trivial stabilizers. Therefore, every abstract connected component Ωn of the subgraph of points of Tn with non-cyclic edge stabilizers in Hn is exactly the image of some abstract connected components Ω of the subgraph of points of T with non-procyclic H-stabilizers in T . Indeed, suppose on the contrary there exists an edge en ∈ Ωn not in the image of Ω but having a vertex vn in it. Let v be a vertex of Ω whose image in Tn is vn . Then Hv is not procyclic and there exists an edge e incident to v whose image in Tn is en . But e 6∈ Ω, so He is procyclic and therefore Hen is cyclic, contradicting the choice of en . 12 By [HZ08, Lemma 8], a virtually free pro-p group has only finitely many finite subgroups up to conjugation. This means that Tn has only finitely many edges en up to translation with (Hn )en that are not cyclic. Hence the union of them is a profinite subgraph of S and collapsing all its connected components in Tn , by the Proposition on page 486 in [Zal92] we get a profinite tree Dn on which Hn acts with cyclic edge stabilizers. Hence, by Corollary 3.3, Hn is the fundamental pro-p group of a finite graph of finite p-groups (Hn , Γn ) with cyclic edge groups, where the vertex and edge groups of (Hn , Γ) are stabilizers of certain vertices and edges of Dn respectively. Moreover, by collapsing edges that are not loops with a vertex group equal to the edge group we may assume that (Hn , Γ) is reduced (see Remark 2.2). Then by [SZ14, Lemma 2.2], the size of Γ is limited in terms of the minimal number of generators d(H) of H, i.e. is bounded independently of n. Therefore, by Corollary 3.2, H is the fundamental group Π1 (H, Γ) of a finite graph of pro-p groups with cyclic edge stabilizers whose vertex and edge groups are stabilizers of certain vertices and edges of T . In particular, it has only finitely many maximal stabilizers of vertices in T up to conjugation. Then we can apply Lemma 3.9 to deduce that H acts on a profinite tree D such that every edge stabilizer He , e ∈ D fixes at least two edges in T . Now applying Corollary 3.2 again we deduce that H is the fundamental group Π1 (H, ∆) of a finite graph of pro-p groups satisfying the statement of the lemma. Finite generation of the vertex groups H(v) follow easily from the presentation of Π1 (H, ∆), the finiteness of ∆, and the fact that the edge groups H(e) are procyclic. To show the last statement, observe that in the case of a 1-acylindrical action the edge groups H(e) of (H, ∆) are trivial (since each of them stabilizes a pair of distinct edges of T ), so the result follows from the presentation (1) of Π1 (H, ∆). We finish the section with two simple lemmas. Lemma 3.11. Let G = HNN(F (Y ∪ X), Ci , ti ), i = 1, . . . n be a pro-p HNN-extension of a free pro-p group F = F (Y ∪ X) on a finite set Y ∪ X ti such that ` each Ci and Ci are a conjugate of hyi in F for some y ∈ Y . Then G = y∈Y \Z (hyi × F (Ty )) ∐ F (Z ∪ X) is a free pro-p product, where Z is a subset of Y and Ty is a (possibly empty) subset of the set of stable letters t1 , . . . tn . Proof. We use induction on the cardinality of Y . If there exists ti such 13 that y1f1ti = y2f2 for some y1 6= y2 and f1 , f2 ∈ F then we can rewrite G as G = HNN(F (Y \ y2 ∪ (X ∪ f1 ti f2−1 ), Cj , tj ), j = 1, . . . i − 1, i + 1 . . . , n and the result follows from the inductive hypothesis. Thus we may assume that Cifi = Citi for some fi ∈ F for all i. Then replacing ti with ti fi−1 we may assume that ti centralizes Ci for every i. Moreover, conjugating Ci in F , we may assume that every Ci is generated by an element of Y . Now the result follows from the presentation G = HNN(F (Y ∪ X), Ci , ti ), i = 1, . . . n. Lemma 3.12. (i) Let H = H1 ∐H0 H2 be a pro-p free amalgamated product over a procyclic group H0 . Suppose CH (H0 ) is abelian of rank at most 2 and Hi = CH (H0 ) ∐ Li . Then H = CH (H0 ) ∐ L1 ∐ L2 . (ii) Let H = HNN(H1 , H0 , t) be a pro-p HNN-extension over a procyclic subgroup H0 . Suppose CH (H0 ) is abelian of rank at most 2, H1 = CH (H0 ) ∐ L1 and H0t is conjugate in H1 either to H0 or to a subgroup of L1 . Then either H = (Zp × H0 ) ∐ L1 or H = Zp ∐ L1 . Proof. (i) Since CH (H0 ) is abelian of rank at most 2, either H0 is selfcentralized in H1 or it is self-centralized in H2 ; say H0 is self-centralized in H1 . Then H = L1 ∐ H2 and the result follows. (ii) If H0 is conjugate to a subgroup of L1 then H = L1 ∐ hti. If H0t = H0h1 ` −1 for some h1 ∈ H1 then H = L1 (hth1 i × H0 ) so we are done as well. 4 4.1 Pro-p subgroups of profinite completions of 3-manifold groups Reduction to the geometric cases Let M be a compact, orientable, non-geometric 3-manifold. Since every compact manifold is a retract of a closed manifold, it follows easily that we may reduce to the case in which M is closed. If M is reducible then its Kneser–Milnor decomposition is non-trivial. In particular, π1 M acts on a tree with trivial edge stabilizers (i.e. 0-acylindrically), and with vertex stabilizers exactly the conjugates of the reducible factors of M; such an action is 0-acylindrical. Since 3-manifold groups are residually finite, π[ 1M acts 0-acylindrically on a profinite tree, with vertex stabilizers the conjugates 14 of the completions of the irreducible factors. Therefore, by Theorem 3.8, we may reduce to the case where M is irreducible. If M is non-geometric, we now argue similarly using the JSJ decomposition. The action of an irreducible, non-geometric 3-manifold on its JSJ tree is 4-acylindrical [WZ10, Lemma 2.4]. The same is true for the action of the profinite completion on the profinite tree, as follows essentially from the results of [WZ10] and [HWZ13]. For completeness and ease of reference, we state the result here. Proposition 4.1. Let M be a closed, irreducible 3-manifold. Then the action [ of π 1 M on the profinite tree associated to the JSJ decomposition of M is 4acylindrical. This was stated in [WZ17, p. 376], and a careful proof was written down in [Wil17, Proposition 6.8]. Proposition 4.1 follows in a straightforward manner from the following statement. Lemma 4.2. Let N be geometric 3-manifold with incompressible toral boundary, not homeomorphic to an interval bundle over a torus or Klein bottle, and let P1 , P2 be two Z2 subgroups conjugate to the fundamental groups of boundγ̂ ary components. Then, for any γ̂ ∈ πd 1 N, P 1 ∩ P 2 is equal to the maximal normal procyclic subgroup of πd 1N . Gareth Wilkes has pointed out that the results of [WZ10] and [HWZ13] in fact prove a weaker statement than Lemma 4.2, since they only handle the case in which γ̂ ∈ π1 N. However, similar techniques do indeed establish Lemma 4.2, and hence Proposition 4.1. For the Seifert fibred case, one argues as in [WZ10], appealing to [CZ07, Proposition 3.4 and Lemma 3.5] instead of [RZ96, Lemma 3.6]. (Alternatively, a proof using more recent technology might appeal to [WZ17, Theorem 3.3].) For the hyperbolic case, one argues as in [HWZ13], but replaces [HWZ13, Lemma 4.7] by [WZ17, Lemma 4.5]. With Proposition 4.1 in hand, by Theorem 3.8, a finitely generated pro-p [ subgroup of π 1 M is a free pro-p product of pro-p subgroups of the vertex groups, so it suffices to consider the geometric cases. 4.2 Hyperbolic manifolds The closed hyperbolic case is the subject of [WZ17, Theorem F]; in this case our subgroup is free pro-p. 15 Thus we consider cusped hyperbolic 3-manifolds in this subsection. Recall that a subgroup of π1 M is called peripheral if it is conjugate to the fundamental group of a cusp and so is isomorphic to Z × Z. A conjugate of [ the closure of a peripheral group in π 1 M will also be called peripheral; it is b b isomorphic to Z × Z. Definition 4.3. Suppose that a group G is hyperbolic relative to a collection of parabolic subgroups {P1 , . . . , Pn }. A subgroup H of G is called relatively malnormal if, whenever an intersection of conjugates H γ ∩H is not conjugate into some Pi , we have γ ∈ H. It is well known that π1 M is hyperbolic relative to its peripheral subgroups. Following Wise, we analyse the cusped hyperbolic 3-manifold M by cutting along an embedded family of surface Σi so every cusp is cut by some Σi . The following theorem is [WZ17, Theorem 9.1]. Theorem 4.4. A hyperbolic 3-manifold M with cusps has a finite-sheeted covering space N → M that contains a disjoint family of connected, geometrically finite, incompressible subsurfaces {Σ1 , . . . , Σn } such that: 1. each cusp of N contains a boundary component of some Σi ; 2. each π1 Σi ⊆ π1 N is relatively malnormal. Cutting along the family of surfaces given by Theorem 4.4 produces a graph-of-groups decomposition (G, ∆) for G = π1 N, with the property that every vertex and edge group is hyperbolic and virtually special. Any peripheral subgroup Pi leaves invariant an infinite (Tits’) axis and splits into direct product of infinite cyclic groups Pi = Li × Ri such that Li fixes every edge of the axis and Ri acts by translations. The stabilizer of any pair of distinct edges of the Bass–Serre tree S is conjugate to such Li for some peripheral subgroup Pi . Moreover, π1 N is subgroup separable (see [AFW15, Corollary 5.5]) and so by Example 2.3 we can pass to the corresponding b ∆) such that G b ∆) with G b = Π1 (G, b acting on graph of profinite groups (G, b By [WZ17, Theorem 4.2], π\ the standard profinite tree S(G). 1 (Σi ) are relatively malnormal in the profinite completion of peripheral subgroups and so b is conjugate to every non-trivial stabilizer of a pair of distinct edges of S(G) bi ≤ Pbi . a certain L We shall need however a more specific hierarchy on vertex groups G(v) of G given by the next proposition. 16 Theorem 4.5. Let M be a cusped hyperbolic 3-manifold. The fundamental group π1 M possesses a finite index subgroup G that admits a a graph-ofgroups decomposition (G, Γ) such that: 1. every vertex and edge group is hyperbolic and virtually special, and the stabilizer of any pair of two distinct edges of the Bass–Serre tree S is cyclic and is conjugate to a cyclic subgroup Li of a peripheral subgroup; 2. moreover, each vertex group G(v) has a malnormal hierarchy, which can be chosen so that, at each step, every Li belongs to a vertex group of the corresponding step-decomposition (so that at the last step of the vertex group being a free product of cyclic groups each Li is contained in some cyclic free factor). Proof. We consider the finite-sheeted cover N of M provided by Theorem 4.4. The fundamental group of N comes equipped with a decomposition that satisfies item (1) above. For item (2), we appeal to [AGM16, Theorem 2.11]. Indeed, let Nv be a component of the given decomposition of N. Then the Li that are conjugate into Nv from a malnormal family Lv , and so the pair (π1 Nv , Lv ) is relatively hyperbolic by [Bow12, Theorem 7.11]. Since π1 Nv is also hyperbolic and virtually special, we may apply [AGM16, Theorem 2.11] to obtain a normal subgroup Gv of finite index in π1 Nv so that the induced pair (Gv , L′v ) ⊳ (π1 Nv , Lv ) admits, in the terminology of [AGM16], a malnormal, quasiconvex, fully L′v -elliptic hierarchy. This means precisely that there is a finite hierarchy in which every vertex group is hyperbolic and virtually special, and every edge group is malnormal and quasiconvex, and in which the intersection with every conjugate of Li ∈ Lv is always elliptic, terminating in free products of groups from L′v and free groups. Since the subgroups π1 Nv are separable in π1 N, we may pass to a finiteindex normal subgroup G of π1 N so that every vertex group of the induced decomposition is contained in some π1 Nv . The subgroup G then has the properties claimed. We deduce from Lemma 3.10 the following. Corollary 4.6. Let H be a finitely generated pro-p subgroup of the profinite b Then H = (H, ∆) is the fundamental pro-p group of a finite completion G. graph of finitely generated pro-p groups with cyclic edge groups conjugate to subgroups of Li , and where the vertex groups of (H, ∆) are conjugate to some vertex groups of (G, Γ). 17 Corollary 4.7. Let H be a finitely generated pro-p subgroup of the profinite b b completion of a vertex group G(v). Let ṽ be a vertex in the standard tree S(G) mapping to v; consider the action of H on the set of incident edges at ṽ, and let e1 , . . . , en be a set of orbit representatives, with corresponding stabilizers ` H(ei ) in H. Then H splits as a free pro-p product H = i H(ei ) ∐ F , where F is a free pro-p group. Proof. We use induction on the hierarchy of Theorem 4.5 for G(v). So let K be a subgroup that belongs to this hierarchy. The base of the induction is the case in which K is a free product of cyclic vertex groups K(v). Since Pb is malnormal in π[ 1 M (see [WZ17, Lemma 4.5]) g b b and H(e) = Li for some g ∈ G, in this case each non-trivial intersection bg = K(v) so each H(e) = L bg generates a free factor. K(v) ∩ H(e) = K(v) ∩ L i i Now, to perform the inductive step, note that in this case by Lemma 3.10 ` H = v∈V (∆K ) H(v) ∐ F is a free pro-p product of vertex groups and a free pro-p group F intersecting trivially all conjugates of vertex groups. Applying the induction hypothesis to each vertex group HK (v) and using that a pro-p free factor of a finitely generated pro-p group is finitely generated, we deduce the statement. We are now ready to deduce the classification of pro-p subgroups in the cusped hyperbolic case. Theorem 4.8. Let π1 M be the fundamental group of an orientable hyperbolic 3-manifold with k cusps, and H a finitely generated pro-p subgroup of π[ 1M . Then H is a free pro-p product of free abelian pro-p groups of rank ≤ 2. Proof. Let G be the finite-index subgroup of π1 M given by Theorem 4.5. We b By Corollary 4.6, H is the fundamental prove first the theorem for H ≤ G. pro-p group of a finite graph of finitely generated pro-p groups (H, ∆), with bi , where the vertex groups of cyclic edge groups conjugate to subgroups of L b Moreover, by (H, ∆) are stabilizers of certain vertices and edges of` S(G). Corollary 4.7, for each vertex v ∈ ∆ we have H(v) = ( He ≤H(v) H(e)) ∐ Lv . We use induction on the size of ∆ to prove that H is a free pro-p product bg g ∈ G b being of free abelian pro-p groups of rank ≤ 2, with every H ∩ L i conjugate to a free factor. If`∆ is a vertex then the result just follows from the decomposition H(v) = ( He ≤H(v) H(e)) ∐ Lv mentioned above. Now let e be an edge of ∆. Then H = H1 ∐H(e) H2 or H = HNN(H1 , H(e), t), where H1 and H2 are the fundamental groups of the graph of groups (H, ∆) 18 restricted to the connected components ∆i of ∆ \ {e} (i = 1, 2 o i = 1). If H(e) = 1 then the amalgamated free products or HNN-extensions are free products and the result follows directly from the induction hypothesis. Suppose H(e) 6= 1. By the induction hypothesis we may assume that Hi = (H(e) × H0i ) ∐ Li . Since the profinite completion Pb of a parabolic subgroup P is malnormal in π[ 1 M the centralizer of H(e) in H is abelian of at most rank 2 so the result follows from Lemma 3.12. Now, to prove the general case, we observe that by what we just proved b satisfies the statement of the theorem. Then the statement for H H∩G follows from [Zal16, Theorem 1.2]. 4.3 Seifert fibred manifolds over hyperbolic bases In this section we deal with the cases in which N admits a geometric structure ^ modelled on either H2 × R or SL 2 (R). Recall that, when N is Seifert fibred, the fundamental group π1 N is torsion-free of the form 1 → Z → π1 N → π1 O → 1 (not necessarily central) where π1 O is a Fuchsian group. (We refer the reader to [Sco83] for details.) Our classification theorem in this case shows that the pro-p subgroups of the profinite completion of π1 N are either free pro-p products, or pro-p completions of fundamental groups π1 M, where M is a non-compact Seifert fibred manifold with residually p fundamental group. Theorem 4.9. Let G be the fundamental group a Seifert fibred manifold with ^ either H2 × R or SL 2 (R) geometry and H a finitely generated pro-p subgroup b Then H is a cyclic extension of a free pro-p-product of cyclic pro-p of G. groups. Proof. Consider H0 , the image of H in πd 1 O, and note that H0 is a finitely generated, pro-p subgroup. It suffices to prove that H0 is a free pro-p-product of cyclic pro-p groups. Indeed, let S be a surface subgroup of finite index of π1 O. Then H ∩ Sb is free pro-p by [Zal05, Proposition 1.2]. We now prove that the centralizer in πd 1 O of a torsion element of H0 is d finite. Since no open subgroup of π1 O is pro-p, we may replace O by a nontrivial finite-sheeted cover of degree n > 2, where n is coprime to p, whose completion contains H0 . We may therefore assume that π1 O is not a triangle 19 group. If π1 O is torsion-free there is nothing to prove; otherwise, π1 O splits as an amalgamation over an infinite cyclic group π1 O = K ∗C F , where F is free and K = ∗i Ci is a free product of cyclic groups. It follows that b b Fb is a free profinite product with cyclic amalgamation. Applying πd 1 O = K ∐C b [ZM88, Theorem 3.10] twice, any finite subgroup of πd 1 O is conjugate into K, b ∩K b g is contained in and thence to some Ci . By [ZM88, Theorem 3.12], K b b It follows that the centralizer C d (ci ) of any element a K-conjugate of C. π1 O b and so by [RZ10, Theorem 9.1.12], the centralizer ci of Ci is contained in K, coincides with Ci , as required. By [HZ08, Theorem 1], virtually free pro-p groups in which torsion elements have finite centralizers split as a free pro-p product of finite subgroups and a free pro-p group. Applying this to H0 now completes the proof. 4.4 Sol and Nil manifolds Suppose that N is a compact 3-manifold with solvable fundamental group. The groups that arise in this way were classified by Evans and Moser [EM72], and are all virtually polycyclic. It follows from this classification that a compact, orientable manifold N with Nil or Sol geometry has a cover N0 of index at most two such that π1 N0 ∼ = Z2 ⋊ Z, and we deduce the following. Theorem 4.10. Let N be a compact, orientable, Nil- or Sol-manifold. If p is odd then the Sylow p-subgroup of πd 1 N is isomorphic to the pro-p completion 2 of a semidirect product Z ⋊ Z, and for p = 2, the Sylow p-subgroup has a subgroup of index at most 2 with this structure. Proof. Let H = π1 N0 as above. Denote by Op (G) the kernel of the epimorb −→ phism of a profinite group G to its maximal pro-p quotient. Let f : H 2 b b H/Op (Z ) be the canonical map. Clearly f restricts to an injection on H, so b 2 ) is Z2 on which H/O b p (H) b acts we identify H with f (H). The image f (Z p b p (H) b −→ GL2 (Zp ). by conjugation. Thus we have a homomorphism η : H/O Note that GL2 (Zp ) is virtually pro-p. Hence the preimage U of a p-Sylow subgroup of η(H) is open in H/Op (H). Consider the intersection K = U ∩ π1 N, a finite-index subgroup of π1 N. The pro-p completion Kp̂ has a normal subgroup Z2p which is the closure of Z2 and the kernel of the natural map Kp̂ −→ U intersects it trivially. One deduces then that this kernel is trivial, and the result follows. 20 4.5 The Euclidean case This case consists of all 3d Bieberbach groups – i.e. torsion-free Z3 -by-finite groups with the finite groups of the following 32 types [Hah87, Chapter 10.1, p. 794]: 27 cyclic and dihedral groups, 3 tetrahedral groups T, Td , Th and 2 octahedral groups O and Oh . The orders of the these groups are divisors of 48, so only the primes p = 2, 3 can lead to non-trivial Sylow subgroups. For p = 3, all Sylow subgroups are C3 . See also [EM72, Lemma 4.9]. Suppose p = 2. Then we have the following list. 1. Cyclic groups: C2 , C4 , C8 . 2. Dihedral groups: D2 , D4 , D8 of orders 4, 8, 16 respectively. 3. Tetrahedral groups T, Td , Th have orders 12, 24, 24 and their Sylow 2subgroups are D4 and D8 , so we do not get anything new from the previous item. 4. The two octohedral groups O ∼ = S4 and Oh of order 24 and 48 respectively. The Sylow 2-subgroup of the first one is D4 , and of the second is the generalized quaternion group Q16 . Thus we can deduce the following: Proposition 4.11. The Sylow p-subgroup of the profinite completion of the fundamental group of a Euclidean 3-manifold is a pro-p group of one of the following types: (i) Z3p for any p. (ii) if p = 3, Z33 -by-C3 . (iii) p = 2, Z32 -by-C2 , -C4 , -C8 , -D2 , -D4 , -D8 , -Q16 . Remark 4.12. Each extension may yield several isomorphism classes, so this does not give the number of groups. There are the cases of Z and D∞ . We do not get anything new, just the pro-p and pro-2 completions respectively. 21 4.6 Interval bundles over Klein bottles The JSJ decomposition of a non-geometric 3-manifold M may include pieces N which are homeomorphic to twisted interval bundles over the Klein bottle, with fundamental group the Klein-bottle group Z⋊Z. These can be removed by passing to a double cover, but when p = 2, the pro-2 completion of Z ⋊ Z \ arises as the Sylow 2-subgroup of Z ⋊ Z. We record this observation for later use. Proposition 4.13. The Sylow 2-subgroup of the profinite completion of the fundamental group of the twisted interval bundle over the Klein bottle is the pro-2 completion of Z ⋊ Z. 4.7 Spherical manifolds We shall use here [Wol11, Theorem 2.4 ]. Theorem 4.14. (Theorem 2.4 [Wol11] ) Finite fixed-point free subgroup of SO(4) belongs to the following list: 1. Cyclic group Cn of order n. 2. Dihedral groups D2k (2n+1) , for k ≥ 2 and n ≥ 1, with presentation k hx, y | x2 = y 2n+1 = 1, xyx−1 = y −1i of order 2k (2n + 1). 3. Generalised quaternion groups Q4k of order 4k. 4. The binary icosahedral group I = SL2 (F5 ) of order 120. ′ 5. The groups P8·3 k = Q8 ⋊ C3k defined by the following presentation k 2 hx, y, z|x = (xy)2 = y 2, zxz −1 = y, zyz −1 = xy, z 3 = 1i of order 8 · 3k . 6. The direct product of any of the above group with a cyclic group of relatively prime order. We shall list p-subgroups of all these groups. Since Case 6 does not produce anything new we analyse cases 1–5 only. Looking at the orders we see that for p odd p-Sylow subgroups are cyclic. So we concentrate on the case p = 2. Then we have only 3 types of 2groups: cyclic, dihedrals D2k , generalized quaternions Q2n . Thus we deduce the following 22 Theorem 4.15. Let G be the profinite completion of the fundamental group of a spherical 3-manifold. (a) If p is odd, its Sylow p-subgroups are cyclic. (b) If p = 2, we have the following list of possible Sylow 2-subgroups: 1. cyclic; 2. dihedrals D2k ; 3. generalized quaternions Q2n . Putting the above results together we obtain Theorem 1.3. References [AFW15] Matthias Aschenbrenner, Stefan Friedl, and Henry Wilton. 3manifold groups. Series of Lecture Notes in Mathematics. European Mathematical Society (EMS), Zürich, 2015. [AGM16] Ian Agol, Daniel Groves, and Jason Fox Manning. An alternate proof of Wise’s malnormal special quotient theorem. Forum Math. Pi, 4:e1, 54, 2016. [Bas93] Hyman Bass. Covering theory for graphs of groups. J. Pure Appl. Algebra, 89(1-2):3–47, 1993. [Bow12] B. H. Bowditch. Relatively hyperbolic groups. Internat. J. Algebra Comput., 22(3):1250016, 66, 2012. [CB13] Owen Cotton-Barratt. Detecting ends of residually finite groups in profinite completions. Math. Proc. Cambridge Philos. Soc., 155(3):379–389, 2013. [CZ07] S. C. Chagas and P. A. Zalesskii. Limit groups are conjugacy separable. Internat. J. Algebra Comput., 17(4):851–857, 2007. [EM72] Benny Evans and Louise Moser. Solvable fundamental groups of compact 3-manifolds. Trans. Amer. Math. Soc., 168:189–210, 1972. 23 [Hah87] Theo Hahn, editor. International tables for crystallography. Vol. A. Published for the International Union of Crystallography, Chester; by D. Reidel Publishing Co., Dordrecht, 5-th edition, 2002. Spacegroup symmetry. [HWZ13] Emily Hamilton, Henry Wilton, and Pavel A. Zalesskii. Separability of double cosets and conjugacy classes in 3-manifold groups. J. Lond. Math. Soc. (2), 87(1):269–288, 2013. [HZ08] W. Herfort and P. A. Zalesskii. Virtually free pro-p groups whose torsion elements have finite centralizer. Bull. Lond. Math. Soc., 40(6):929–936, 2008. [HZ13] Wolfgang Herfort and Pavel Zalesskii. Virtually free pro-p groups. Publ. Math. Inst. Hautes Études Sci., 118:193–211, 2013. [MZ17] J. W. MacQuarrie and P. A. Zalesskii. Second countable virtually free pro-p groups whose torsion elements have finite centralizer. Selecta Math. (N.S.), 23(1):101–115, 2017. [NS07] Nikolay Nikolov and Dan Segal. On finitely generated profinite groups. I. Strong completeness and uniform bounds. Ann. of Math. (2), 165(1):171–238, 2007. [RZ96] Luis Ribes and Pavel A. Zalesskii. Conjugacy separability of amalgamated free products of groups. Journal of Algebra, 179(3):751— 774, 1996. [RZ00] Luis Ribes and Pavel Zalesskii. Pro-p trees and applications. In New horizons in pro-p groups, volume 184 of Progr. Math., pages 75–119. Birkhäuser Boston, Boston, MA, 2000. [RZ10] Luis Ribes and Pavel Zalesskii. Profinite groups, volume 40 of Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in Mathematics]. Springer-Verlag, Berlin, second edition, 2010. [RZ14] Luis Ribes and Pavel A. Zalesskiı̆. Normalizers in groups and in their profinite completions. Rev. Mat. Iberoam., 30(1):165–190, 2014. 24 [Sco83] Peter Scott. The geometries of 3-manifolds. The Bulletin of the London Mathematical Society, 15(5):401–487, 1983. [Ser77] Jean-Pierre Serre. Arbres, amalgames, SL2 , volume 46 of Astérisque. Société Mathématique de France, Paris, 1977. [SZ14] Ilir Snopce and Pavel A. Zalesskii. Subgroup properties of prop extensions of centralizers. Selecta Math. (N.S.), 20(2):465–489, 2014. [Wil17] Gareth Wilkes. Profinite rigidity of graph manifolds and JSJ decompositions of 3-manifolds. arXiv:1605.08244v2, 2017. [Wol11] Joseph A. Wolf. Spaces of constant curvature. AMS Chelsea Publishing, Providence, RI, sixth edition, 2011. [WZ10] Henry Wilton and Pavel Zalesskii. Profinite properties of graph manifolds. Geometriae Dedicata, 147(1):29—45, 2010. [WZ17] Henry Wilton and Pavel Zalesskii. Distinguishing geometries using finite quotients. Geom. Topol., 21(1):345–384, 2017. [WZar] Thomas S. Weigel and Pavel A. Zalesskii. Virtually free pro-p products. Israel J. Math., to appear. [Zal92] P. A. Zalesskiı̆. Open subgroups of free profinite products. In Proceedings of the International Conference on Algebra, Part 1 (Novosibirsk, 1989), volume 131 of Contemp. Math., pages 473– 491. Amer. Math. Soc., Providence, RI, 1992. [Zal05] P. A. Zalesskii. Profinite surface groups and the congruence kernel of arithmetic lattices in SL2 (R). Israel J. Math., 146:111–123, 2005. [Zal16] Pavel A. Zalesskii. Virtually free pro-p products. J. Group Theory, 19(3):543–560, 2016. [ZM88] P. A. Zalesskii and O. V. Mel’nikov. Subgroups of profinite groups acting on trees. Matematicheskii Sbornik, 135(177)(4):419—439, 1988. 25 [ZM89] P. A. Zalesskii and O. V. Mel’nikov. Fundamental groups of graphs of profinite groups. Algebra i Analiz, 1(4):117—135, 1989. 26
4math.GR
TESTING FOR PRINCIPAL COMPONENT DIRECTIONS UNDER WEAK IDENTIFIABILITY arXiv:1710.05291v1 [math.ST] 15 Oct 2017 By Davy Paindaveine∗ , Julien Remy and Thomas Verdebout Université libre de Bruxelles We consider the problem of testing, on the basis of a p-variate Gaussian random sample, the null hypothesis H0 : θ 1 = θ 01 against the alternative H1 : θ 1 6= θ 01 , where θ 1 is the “first” eigenvector of the underlying covariance matrix and θ 01 is a fixed unit p-vector. In the classical setup where eigenvalues λ1 > λ2 ≥ . . . ≥ λp are fixed, the Anderson (1963) likelihood ratio test (LRT) and the Hallin, Paindaveine and Verdebout (2010) Le Cam optimal test for this problem are asymptotically equivalent under the null, hence also under sequences of contiguous alternatives. We show that this equivalence does not survive asymptotic scenarios where λn1 − λn2 = o(rn ) √ with rn = O(1/ n). For such scenarios, the Le Cam optimal test still asymptotically meets the nominal level constraint, whereas the LRT becomes extremely liberal. Consequently, the former test should be favored over the latter one whenever the two largest sample eigenvalues are close to each other. By relying on the Le Cam theory of asymptotic experiments, we study in the aforementioned asymptotic scenarios the non-null and optimality properties of the Le Cam optimal test and show that the null robustness of this test is not obtained at the expense of efficiency. Our asymptotic investigation is extensive in the sense that it allows rn to converge to zero at an arbitrary rate. To make our results as striking as possible, we not only restrict to the multinormal case but also to single-spiked spectra of the form λn1 > λn2 = . . . = λnp . 1. Introduction. Principal Component Analysis (PCA) is one of the most classical tools in dimension reduction. For a random p-vector X with mean zeroPand a covariance matrix Σ admitting the spectral decomposition Σ = pj=1 λj θ j θ 0j (λ1 ≥ . . . ≥ λp ), the jth principal component is θ 0j X, that is, the projection of X onto the jth unit eigenvector θ j of Σ . In practice, Σ is usually unknown, so that one of the key issues in PCA is to perform ∗ Research is supported by the IAP research network grant nr. P7/06 of the Belgian government (Belgian Science Policy), the Crédit de Recherche J.0113.16 of the FNRS (Fonds National pour la Recherche Scientifique), Communauté Française de Belgique, and a grant from the National Bank of Belgium. MSC 2010 subject classifications: Primary 62F05, 62H25; secondary 62E20 Keywords and phrases: Le Cam’s theory of asymptotic experiments, Local asymptotic normality, Principal component analysis, Spiked covariance matrices, Weak identifiability 1 2 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT inference on eigenvectors. The seminal paper Anderson (1963) focused on the multinormal case and derived asymptotic results for the maximum likelihood estimators of the θ j ’s and λj ’s. Later, Tyler (1981, 1983a) extended those results to the elliptical case, where, to avoid moment assumptions, Σ is then the corresponding “scatter” matrix rather than the covariance matrix. Still under ellipticity assumptions, Hallin, Paindaveine and Verdebout (2010) obtained Le Cam optimal tests on eigenvectors and eigenvalues, whereas Hallin, Paindaveine and Verdebout (2014) developed efficient R-estimators for eigenvectors. Croux and Haesbroeck (2000), Hubert, Rousseeuw and Vanden Branden (2005) and He et al. (2011) proposed various robust methods for PCA. Recently, Johnstone and Lu (2009), Berthet and Rigollet (2013) and Han and Liu (2014) considered inference on eigenvectors of Σ in sparse high-dimensional situations. PCA has also been extensively considered in the functional case; see, e.g., Boente and Fraiman (2000), Bali et al. (2011) or the review paper Cuevas (2014). In this work, we focus on the problem of testing, on the basis of a random sample X1 , . . . , Xn from the p-variate normal distribution with mean µ and covariance matrix Σ , the null hypothesis H0 : θ 1 = θ 01 against the alternative H1 : θ 1 6= θ 01 , where θ 01 is a fixed unit vector. Denoting as λ̂1 ≥ λ̂2 P ≥ . . . ≥ λ̂p the eigenvalues of the sample covariance maP trix S := n1 ni=1 (Xi − X̄)(Xi − X̄)0 (as usual, X̄ := n1 ni=1 Xi here), the classical test for this problem is the Anderson (1963) likelihood ratio test, φA say, rejecting the null at asymptotic level α when  0 −1 00 2 −1 0 QA := n λ̂1θ 00 1 S θ 1 + λ̂1 θ 1 S θ 1 − 2 > χp−1,1−α , where χ2`,1−α stands for the α-upper quantile of the chi-square distribution with ` degrees of freedom. Hallin, Paindaveine and Verdebout (2010) obtained the Le Cam optimal for the same problem. This test, φHPV say, rejects the null at asymptotic level α when QHPV := p n X λ̂1 0 λ̂−1 θ̃θ j Sθθ 01 j 2 > χ2p−1,1−α , j=2 where θ̃θ j , j = 2, . . . , p, defined recursively through (1.1) θ̃θ j := (Ip − θ 01θ 00 1 − k(Ip − θ 01θ 00 1 − 0 θ kθ̃θ k )θ̂θ j k=2 θ̃ Pj−1 0 θ kθ̃θ k )θ̂θ j k k=2 θ̃ Pj−1 (with summation over empty collection of indices being equal to zero), result from a Gram-Schmidt orthogonalization of θ 01 , θ̂θ 2 , . . . , θ̂θ p , where θ̂θ j is a unit TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 3 eigenvector of S associated with the eigenvalue λ̂j , j = 2, . . . , p. When the eigenvalues of Σ are fixed and satisfy λ1 > λ2 ≥ λ3 ≥ . . . ≥ λp (the minimal condition under which θ 1 is identified — up to an unimportant sign, as usual), both tests above are asymptotically equivalent under the null, hence also under sequences of contiguous alternatives, which implies that φA is also Le Cam optimal; see Hallin, Paindaveine and Verdebout (2010). The tests φA and φHPV can therefore be considered perfectly equivalent, at least asymptotically so. In the present paper, we compare the asymptotic behaviors of these tests in a non-standard asymptotic framework where eigenvalues may depend on n and where λn1 − λn2 is o(1) as n goes to infinity. Such asymptotic scenarios provide weak identifiability since the first eigenvector θ 1 is not properly identified in the limit. To make our results as striking as possible, we will stick to the Gaussian framework considered above and restrict to single-spiked spectra of the form λn1 > λn2 = . . . = λnp . In other words, we will consider triangular arrays of observations Xni , i = 1, . . . , n, n = 1, 2, . . ., where Xn1 , . . . , Xnn form a random sample from the p-variate normal distribution with mean µ n and covariance matrix (1.2) Σ n := σn2 (Ip + rn v θ 1θ 01 ) = σn2 (1 + rn v)θθ 1θ 01 + σn2 (Ip − θ 1θ 01 ), where v is a positive real number, (σn2 ) is a positive real sequence, (rn ) is a bounded nonnegative real sequence, and I` denotes the `-dimensional identity matrix. The eigenvalues of the covariance matrix Σ n are then λn1 = σn2 (1 + rn v) (with corresponding eigenvector θ 1 ) and λn2 = . . . = λnp = σn2 (with corresponding eigenspace being the orthogonal complement of θ 1 in Rp ). If rn ≡ 1 or if rn converges to 1 as n → ∞, then this setup is similar to the classical one where the first eigenvector θ 1 remains identified in the limit. In contrast, if rn = o(1), then the resulting weak identifiability (n) (n) intuitively makes the problem of testing H0 : θ 1 = θ 01 against H1 : θ 1 6= θ 01 increasingly hard as n goes to infinity. Our results show that, while they are, as mentioned above, equivalent in the standard asymptotic scenario associated with rn ≡ 1, the tests φHPV and φA actually exhibit very different behaviors under weak identifiability. More precisely, we show that this asymptotic equivalence survives scenarios √ √ where rn = o(1) with nrn → ∞, but not scenarios where rn = O(1/ n). Irrespective of the asymptotic scenario considered, the test φHPV asymptotically meets the nominal level constraint, hence may be considered robust to √ weak identifiability. On the contrary, in scenarios where rn = O(1/ n), the test φA becomes dramatically liberal. Consequently, despite the asymptotic 4 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT equivalence of these tests in standard asymptotic scenarios, the test φHPV should be favored over φA . Of course, this nice robustness property of φHPV only refers to the null asymptotic behavior of this test, and it is of interest to investigate whether or not this null robustness is obtained at the expense of efficiency. In order to do so, we study the non-null and optimality properties of φHPV under suitable local alternatives. This is done by exploiting the Le Cam theory of asymptotic experiments. In every asymptotic scenario considered, we show that the corresponding sequence of experiments converges to a limiting experiment in the Le Cam sense. Interestingly, (i) the corresponding contiguity rate crucially depends on the underlying scenario and (ii) the resulting limiting experiment is not always a Gaussian shift experiment, such as in the standard local asymptotic normality (LAN) setup. In all cases, however, we can derive the asymptotic non-null distribution of QHPV under contiguous alternatives by resorting to the Le Cam third lemma, and we can establish that this test enjoys excellent optimality properties. The problem we consider in this paper is characterized by the fact that the parameter of interest (here, the first eigenvector) is unidentified when a nuisance parameter (here, the difference between both largest eigenvalues) is equal to some given value. Such situations have been much considered in the statistics and econometrics literatures; we refer, e.g., to Dufour (1997), Pötscher (2002), Forchini and Hillier (2003), Dufour (2006), or Paindaveine and Verdebout (2017). To the best of our knowledge, however, no relevant results have been obtained in PCA. We think that, far from being of academic interest only, our results should also be crucial for practitioners: they indeed provide a clear warning that, when the underlying distribution is close to spherical (more generally, when both largest sample eigenvalues are nearly equal), the daily-practice Gaussian test φA is extremely liberal, hence may lead to wrong conclusions (false positives) with very high probability, whereas the test φHPV remains a reliable procedure in such cases. The paper is organized as follows. In Section 2, we introduce the distributional setup and notation to be used throughout and we derive preliminary results on the asymptotic behavior of sample eigenvalues/eigenvectors. In Section 3, we show that the null asymptotic distribution of QHPV is χ2p−1 under all asymptotic scenarios, whereas that of QA is guaranteed to be χ2p−1 √ only if nrn → ∞. We also explicitly provide a case where the null asymptotic distribution of QA indeed fails to be χ2p−1 . In Section 4, we show that, in all asymptotic scenarios, the sequence of experiments considered converges to a limiting experiment. Then, this is used to study the non-null and optimality properties of φHPV . Both in Sections 3 and 4, our results TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 5 are illustrated through Monte Carlo exercises. We wrap up in Section 5 and present all proofs in an appendix. 2. Preliminary results. As mentioned above, we will consider throughout triangular arrays of observations Xni , i = 1, . . . , n, n = 1, 2, . . ., where Xn1 , . . . , Xnn form a random sample from the p-variate normal distribution with mean µ n and covariance matrix Σ n = σn2 (Ip +rn v θ 1θ 01 ), where σn2 , v > 0, rn ≥ 0 and θ 1 is a unit p-vector. The resulting hypothesis will be denoted (n) as Pµ n ,σn2 ,θθ 1 ,rn ,v = Pµ ,σ2 ,θθ 1 ,rn ,v (the superscript (n) will be dropped in the sen n P P quel). Throughout, X̄n := n1 ni=1 Xni and Sn := n1 ni=1 (Xni − X̄n )(Xni − X̄n )0 will denote the sample average and sample covariance matrix based on Xn1 , . . . , Xnn . For any j = 1, . . . , p, the jth largest eigenvalue of Sn and the corresponding unit eigenvector will be denoted as λ̂nj and θ̂θ nj , respec(n) (n) tively. With this notation, the tests φA = φA and φHPV = φHPV from the introduction reject the null at asymptotic level α when  (n) 0 −1 00 −1 0 QA = QA = n λ̂n1θ 00 1 Sn θ 1 + λ̂n1 θ 1 Snθ 1 − 2 (2.1) = p n X λ̂n1 0 2 θ nj θ 01 λ̂−1 nj (λ̂n1 − λ̂nj ) θ̂ 2 > χ2p−1,1−α j=2 and (2.2) QHPV = (n) QHPV = p n X λ̂n1 0 θ nj Snθ 01 λ̂−1 nj θ̃ 2 > χ2p−1,1−α , j=2 respectively, where θ̃θ n2 , . . . , θ̃θ np result from the Gram-Schmidt orthogonalization in (1) applied to θ 01 , θ̂θ n2 , . . . , θ̂θ np . Under Pµ n ,σn2 ,θθ 1 ,rn ,v , the sample eigenvalue λ̂nj is uniquely defined with probability one, but θ̂θ nj is, still with probability one, defined up to a sign only. Clearly, this sign does not play any role in (2.1)-(2.2), hence will be fixed arbitrarily. At a few places below, this sign, however, will need to be fixed in an appropriate way. For obvious reasons, the asymptotic behavior of Sn will play a crucial role when investigating the asymptotic properties of the tests above. To describe this behavior, we need to introduce the following notation. For an ` × ` matrix A, denote as vec(A) the vector obtained by stacking the columns of A on top of each other. We will let A⊗2 := A ⊗ A, where A ⊗ B is the Kronecker product of A and B. The commutation matrix Kk,` , that is such that Kk,` (vec A) = vec(A0 ) for any k × ` matrix A, satisfies Kp,k (A ⊗ B) = (B ⊗ A)Kq,` for any k × ` matrix A and p × q matrix B; see, e.g., Magnus and Neudecker (2007). If X is p-variate standard normal, then 6 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT the covariance matrix of vec(XX0 ) is Ip2 + Kp , with Kp := Kp,p ; the LevyLindeberg central limit theorem then easily provides the following result. Lemma 2.1. Fix a unit p-vector θ 1 , v > 0 and a bounded nonnegative √ Σ−1/2 real sequence (rn ). Then, under P0,1,θθ 1 ,rn ,v , n(Σ )⊗2 vec(Sn − Σ n ) is n asymptotically normal with mean zero and covariance matrix Ip2 + Kp . In √ particular, (i) if rn ≡ 1, then n vec(Sn − Σ n ) is asymptotically normal Σ(v))⊗2 , with Σ (v) := with mean zero and covariance matrix (Ip2 + Kp )(Σ √ 0 Σn ) is asymptotically normal Ip + v θ 1θ 1 ; (ii) if rn is o(1), then n vec(Sn −Σ with mean zero and covariance matrix Ip2 + Kp . Clearly, the tests φA and φHPV above are invariant under translations and scale transformations, that is, respectively, under transformations of the form (Xn1 , . . . , Xnn ) 7→ (Xn1 + t, . . . , Xnn + t), with t ∈ Rp , and (Xn1 , . . . , Xnn ) 7→ (sXn1 , . . . , sXnn ), with s > 0. This implies that, when investigating the behavior of these tests, we may assume without loss of generality that µ n ≡ 0 and σn2 ≡ 1, that is, we may restrict to hypotheses of the form Pθ 1 ,rn ,v := P0,1,θθ 1 ,rn ,v , as we already did in Lemma 2.1. We therefore restrict to such hypotheses in the rest of the paper. The tests φA and φHPV are based on statistics that not only involve the sample covariance matrix Sn , but also the sample eigenvalues and eigenvectors. It is therefore no surprise that investigating the asymptotic behavior of these tests under weak identifiability will require controlling the corresponding asymptotic behaviors of sample eigenvalues and eigenvectors. For eigenvalues, we have the following result (throughout, diag(A1 , . . . , Am ) stands for the block-diagonal matrix with diagonal blocks A1 , . . . , Am ). Lemma 2.2. Fix a unit p-vector θ 1 , v > 0 and a bounded nonnegative real sequence (rn ). Let Z(v) be a p × p random matrix such that vec(Z(v)) ∼ Λ(v))⊗2 ), with Λ (v) := diag(1 + v, 1, . . . , 1), and let Z22 (v) N (0, (Ip2 + Kp )(Λ be the matrix obtained from Z(v) by deleting its first row and first column. Write Z := Z(0) and Z22 := Z22 (0). Then, under Pθ 1 ,rn ,v , `n := √ n(λ̂n1 −(1+rn v)), √ 0 D √ n(λ̂n2 −1), . . . , n(λ̂np −1) → ` = (`1 , . . . , `p )0 , D where → denotes weak convergence and where ` is as follows: (i) if rn ≡ 1, then `1 and (`2 , . . . , `p )0 are mutually independent, `1 is normal with mean zero and variance 2(1 + v)2 , and `2 ≥ . . . ≥ `p are the eigenvalues of Z22 (v); TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 7 √ (ii) if rn is o(1) with nrn → ∞, then `1 and (`2 , . . . , `p )0 are mutually independent, `1 is normal with mean zero and variance 2, and `2 ≥ . . . ≥ `p are the eigenvalues of Z22 ; √ (iii) if rn = 1/ n, then `1 is the largest eigenvalue of Z − diag(0, v, . . . , v) and `2 ≥ . . . ≥ `p are the p−1 smallest eigenvalues of Z+diag(v, 0, . . . , 0); √ (iv) If rn = o(1/ n), then ` is the vector of eigenvalues of Z (in decreasing order), hence has density (2.3)   Y  p 1X 2 0 (`1 , . . . , `p ) 7→ cp exp − `j (`k − `j ) I[`1 ≥ . . . ≥ `p ] 4 j=1 1≤k<j≤p where cp is a normalizing constant and where I[A] is the indicator function of A. Lemma 2.2 shows that, unlike the sample covariance matrix Sn , sample eigenvalues exhibit an asymptotic behavior that crucially depends on (rn ). √ The important threshold, associated with rn = 1/ n, provides sequences of hypotheses Pθ 1 ,rn ,v that are contiguous to the spherical hypotheses Pθ 1 ,0,v under which the first eigenvector θ 1 is unidentified (contiguity follows, e.g., from Proposition 2.1 in Hallin and Paindaveine, 2006). Lemma 2.2 then identifies four regimes that will be present throughout our double asymptotic investigation below, namely away from contiguity (rn ≡ 1, case (i)), above √ contiguity (rn is o(1) with nrn → ∞, case (ii)), under contiguity (rn = √ √ 1/ n, case (iii)), and under strict contiguity (rn = o(1/ n), case (iv)). While Lemmas 2.1-2.2 will be sufficient to study the asymptotic behavior of φHPV , the test φA , as hinted by the expression in (2.1), will further require 0 0 investigating the joint asymptotic behavior of θ̂θ n2θ 01 , . . . , θ̂θ npθ 01 . To do so, fix arbitrary p-vectors θ 2 , . . . , θ p such that Γ := (θθ 01 , θ 2 , . . . , θ p ) is orthogonal. Γn := (θ̂θ n1 , . . . , θ̂θ np ), where the “signs” of θ̂θ nj , j = 1, . . . , p, are Let further Γ̂ fixed by the constraint that, with probability one,   0 En,11 En,12 Γ nΓ = (2.4) En := Γ̂ En,21 En,22 has positive diagonal elements only (note that the diagonal entries of En are non-zero with probability one). With this notation, En,21 collects the ran0 0 dom variables θ̂θ n2θ 01 , . . . , θ̂θ npθ 01 of interest above. We then have the following result. 8 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT Lemma 2.3. Fix a unit p-vector θ 1 , v > 0 and a bounded nonnegative real sequence (rn ). Let Z be a p×p random matrix such that vec(Z) ∼ N (0, Ip2 + Kp ). For any v > 0, let E(v) := (w1 (v), . . . , wp (v))0 , where wj (v) is the unit eigenvector associated with the jth largest eigenvalue of Z + diag(v, 0, . . . , 0) and such that (w1 (v))j > 0 almost surely. Then, we have the following under Pθ 1 ,rn ,v : √ (i) if rn ≡ 1, then En,11 = 1+oP (1), En,22 E0n,22 = Ip−1 +oP (1), nEn,21 = √ 0 √ 0 OP (1), and both nEn,22 En,21 and nEn,12 are asymptotically normal with mean zero and covariance matrix v −2 (1 + v)Ip−1 ; √ (ii) if rn is o(1) with nrn → ∞, then En,11 = 1 + oP (1), En,22 E0n,22 = √ √ Ip−1 + oP (1), nrn En,21 = OP (1), and both nrn E0n,22 En,21 and √ nrn E0n,12 are asymptotically normal with mean zero and covariance matrix v −2 Ip−1 ; √ (iii) if rn = 1/ n, then En converges weakly to E(v); √ (iv) if rn = o(1/ n), then En converges weakly to E(0). This result shows that the asymptotic behavior of En,21 , which, as mentioned above, is the only part of En involved in the Anderson test statistic QA , depends on the regimes identified in Lemma 2.2. (i) Away from contiguity, En,21 converges to the zero vector in probability at the standard root-n rate. (ii) Above contiguity, En,21 is still oP (1), but the rate of convergence is slower. (iii) Under contiguity, consistency is lost and En,21 converges weakly to a distribution that still depends on v. (iv) Under strict contiguity, on the contrary, the asymptotic distribution of En does not depend on v and is the same as for v = 0. As a direct corollary, the asymptotic distribution of En is then the same as in the spherical Gaussian case, so that, up to the fact that E has almost surely positive diagonal entries (a constraint inherited from the corresponding one on En ), this asymptotic distribution is the invariant Haar distribution on the group of p × p orthogonal matrices; see Anderson (1963), page 126. 3. Null results. In this section, we study the null asymptotic behaviors of φA and φHPV under weak identifiability, that is, we do so under the sequences of (null) hypotheses Pθ 01 ,rn ,v introduced in the previous section. This will obviously heavily rely on Lemmas 2.2-2.3. Regarding φHPV , we have the following result. TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 9 Theorem 3.1. Fix a unit p-vector θ 01 , v > 0 and a bounded nonnegative real sequence (rn ). Then, under Pθ 01 ,rn ,v , D QHPV → χ2p−1 , so that, in all regimes (i)-(iv) from the previous section, the test φHPV has asymptotic size α under the null. This result shows that the test φHPV is validity-robust to weak identifiability in the sense that it will asymptotically meet the nominal level constraint in scenarios that are arbitrarily close to the spherical case. The following result shows that, if one restricts to regimes (i)-(ii), then this extends to the Anderson test φA . Theorem 3.2. Fix a unit p-vector θ 01 , v > 0 and a nonnegative real √ sequence (rn ) satisfying (i) rn ≡ 1 or (ii) rn = o(1) with nrn → ∞. Then, under Pθ 01 ,rn ,v , D QA → χ2p−1 , so that, in regimes (i)-(ii), the test φA has asymptotic size α under the null. Note that (2.1) allows to write QA = p X √ j=2 (3.1) =: p X n(λ̂n1 − (1 + rn v)) − q λ̂n1 λ̂nj √ n(λ̂nj − 1) 0 θ̂θ nj θ 01 !2 √ nrn v 0 0 +q θ̂θ nj θ 1 λ̂n1 λ̂nj 2 Rnj + Snj . j=2 In regimes (i)-(ii), Parts (i)-(ii) of Lemmas 2.2-2.3 imply P that, for any j = 2 + o (1) 2, . . . , p, Rnj = oP (1) and Snj = OP (1), so that QA = pj=2 Snj P in these regimes. In regimes (iii)-(iv), on the contrary, the Rnj ’s will play a role in the null asymptotic behavior of the Anderson test statistic QA , which suggests that the corresponding asymptotic distribution may differ from the χ2p−1 one obtained in regimes (i)-(ii). To explore this and to illustrate our theoretical results above, we performed the following Monte Carlo exercise. For any ` = 0, 1, . . . , 5, we generated M = 10, 000 mutually (`) independent random samples Xi , i = 1, . . . , n, from the (p = 10)-variate normal distribution with mean zero and covariance matrix (3.2) −`/6 0 00 Σ (`) θ 1θ 1 , n := Ip + n 10 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT where θ 01 is the first vector of the canonical basis of Rp . For each sample, we (n) performed the tests φHPV and φA for H0 : θ 1 = θ 01 at nominal level 5%. The present simulation therefore focuses on the null behavior of these tests. The value of ` allows to consider the various regimes above, namely (i) away from contiguity (` = 0), (ii) beyond contiguity (` = 1, 2), (iii) under contiguity (` = 3), and (iv) under strict contiguity (` = 4, 5). Increasing values of ` therefore provide harder and harder inference problems. In order to investigate the finite-sample relevance of our asymptotic results and to check their correctness, this exercise was performed for n = 200 and n = 500, 000, respectively. Figure 1, that reports the resulting empirical rejection frequencies, clearly support Theorems 3.1-3.2 in the sense that φHPV shows the target Type 1 risk in all regimes and that φA does so (asymptotically) in regimes (i)-(ii). More importantly, these results reveal that φA is dramatically liberal in regimes (iii)-(iv), even asymptotically. We conclude that only φHPV is validity-robust to weak identifiability. (i) ℓ=0 (ii) ℓ=1 n=500,000 (iii) ℓ=2 ℓ=3 (iv) ℓ=4 0.00 0.15 0.30 0.45 0.60 0.75 0.90 0.00 0.15 0.30 0.45 0.60 0.75 0.90 Null rejection frequencies n=200 ℓ=5 (i) (ii) (iii) (iv) HPV A ℓ=0 ℓ=1 ℓ=2 ℓ=3 ℓ=4 ℓ=5 Fig 1. Empirical rejection frequencies, under the null hypothesis, of the tests φHPV and φA performed at nominal level 5%. Results are based on M = 10, 000 independent tendimensional Gaussian random samples of size n = 200 and size n = 500, 000. Increasing values of ` bring the underlying spiked covariance matrix closer and closer to a multiple of the identity matrix; see Section 3 for details. The links between the values of ` and the asymptotic regimes (i)-(iv) from Section 2 are provided in each barplot. The previous simulation showed empirically that, in regimes (iii)-(iv), the null asymptotic distribution of φA is not χ2p−1 . From an academic point of view, of course, it would be more satisfactory to derive theoretically the corresponding asymptotic distributions. Unfortunately, the complicated asymptotic behavior of sample eigenvalues and eigenvectors in Lemmas 2.2-2.3 TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 11 makes this extremely challenging. For regime (iv), though, we have the following result in the bivariate case p = 2. Theorem 3.3. Fix p = 2, a unit p-vector θ 01 , v > 0 and a nonnegative √ real sequence (rn ) such that nrn → 0. Then, under Pθ 01 ,rn ,v , D QA → 4χ21 , so that, irrespective of α ∈ (0, 1), the test φA has an asymptotic size under the null that is strictly larger than α. This result shows in a striking way the impact weak identifiability may have, in the bivariate case, on the null asymptotic distribution of the Anderson test statistic QA : away from contiguity and beyond contiguity (regimes (i)-(ii)), QA is asymptotically χ21 under the null (Theorem 3.2), whereas under strict contiguity (regime (iv)), this statistic is asymptotically 4χ21 under the null. The result also allows to quantify, for any nominal level α, how liberal the bivariate Anderson test will asymptotically be in regime (iv). More precisely, the Type 1 risk, in this regime, of the level-α bivariate Anderson test converges to P[4Z 2 > χ21,1−α ], where Z is standard normal. For α = 0.1%, 1% and 5%, this provides in regime (iv) an asymptotic Type 1 risk of about 10%, 19.8% and 32.7%, respectively (which exceeds the nominal level by about a factor 100, 20 and 6.5, respectively!) We conducted another simulation to illustrate Theorem 3.3 and its consequences. To do so, we generated, for any ` = 0, 1, . . . , 5, a collection of M = 10, 000 mutually independent random samples of size n = 500, 000 from the bivariate normal distribution with mean zero and covariance ma−`/6θ 0θ 00 , with θ 0 = (1, 0)0 . This is therefore essentially trix Σ (`) n := I2 + n 1 1 1 the bivariate version of the ten-dimensional numerical exercise above. For each value of `, Figure 2 provides histograms of the resulting M values of the Anderson test statistic QA , along with plots of the densities of the χ21 and 4χ21 distributions, that is, densities of the null asymptotic distribution of QA in regimes (i)-(ii) and in regime (iv), respectively. In these three regimes, the histograms are perfectly fitted by the corresponding density. The figure also provides the empirical Type 1 risks of the level-α Anderson test for α = 0.1%, 1% and 5%. Clearly, these Type 1 risks are close to the theoretical asymptotic ones both in regimes (i)-(ii) (namely, α) and in regime (iv) (namely, the Type 1 risks provided at the end of the previous paragraph). 12 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT 0.04 (α=0.1%) 0.89 (α=1%) 1.0 1.12 (α=1%) 4.72 (α=5%) 0.0 0.0 0.5 5.03 (α=5%) 0.5 1.0 2.0 0.12 (α=0.1%) χ21 (pdf) 4χ21 (pdf) ℓ=1 (ii) 1.5 1.5 2.0 ℓ=0 (i) 0.0 0.5 1.0 1.5 2.0 2.5 0.5 1.0 1.5 2.0 0.23 (α=0.1%) 2.5 4.6 (α=0.1%) 10.86 (α=1%) 1.0 1.32 (α=1%) 1.0 2.0 ℓ=3 (iii) 1.5 1.5 2.0 ℓ=2 (ii) 0.0 0.5 21.27 (α=5%) 0.0 0.0 0.5 5.71 (α=5%) 0.0 0.5 1.0 1.5 2.0 2.5 0.5 1.0 1.5 2.0 9.3 (α=0.1%) 2.5 9.83 (α=0.1%) 19.18 (α=1%) 1.0 17.97 (α=1%) 1.0 2.0 ℓ=5 (iv) 1.5 1.5 2.0 ℓ=4 (iv) 0.0 0.5 32.38 (α=5%) 0.0 0.0 0.5 30.8 (α=5%) 0.0 0.5 1.0 1.5 2.0 2.5 0.0 0.5 1.0 1.5 2.0 2.5 Fig 2. For each ` = 0, 1, . . . , 5, histograms of values of QA from M = 10, 000 independent (null) Gaussian random samples of size n = 500, 000 and dimension p = 2. Increasing values of ` bring the underlying spiked covariance matrix closer and closer to a multiple of the identity matrix; see Section 3 for details. The links between the values of ` and the asymptotic regimes (i)-(iv) from Section 2 are provided in each case. For any value of `, the density of the null asymptotic distribution of QA in regimes (i)-(ii) (resp., in regime (iv)) is plotted in orange (resp., in blue) and the empirical Type 1 risk of the level-α Anderson test is provided for α = 0.1%, 1% and 5%. TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 13 4. Non-null and optimality results. The previous section shows that, unlike φA , the test φHPV is validity-robust to weak identifiability. However, the trivial level-α test, that randomly rejects the null with probability α, of course enjoys the same robustness property. This motivates investigating whether or not the validity-robustness of φHPV is obtained at the expense of efficiency. In this section, we therefore study the asymptotic non-null behavior of this test and show that it actually still enjoys strong optimality properties under weak identifiability. Throughout, optimality is to be understood in the Le Cam sense. In the present hypothesis testing context, Le Cam optimality requires studying local log-likelihood ratios of the form (4.1) Λn := log dPθ 01 +νnτ n ,rn ,v dPθ 01 ,rn ,v , where the bounded sequence (ττ n ) in Rp and the positive real sequence (νn ) are such that, for any n, θ 01 + νnτ n is a unit p-vector, hence, is an admissible perturbation of θ 01 . This imposes that (ττ n ) is bounded and satisfies θ 00 1 τn = − (4.2) νn kττ n k2 2 for any n. The following result then describes, in each of the four regimes (i)(iv) considered in the previous sections, the asymptotic behavior of the loglikelihood ratio Λn . Theorem 4.1. Fix a unit p-vector θ 01 , v > 0 and a bounded nonnegative real sequence (rn ). Then, we have the following under Pθ 01 ,rn ,v : √ (i) if rn ≡ 1, then, with νn = 1/ n, ∆n = v √ v2 θ 01 and Γ = n(Ip − θ 01θ 00 (Ip − θ 01θ 00 1 )(Sn − Σ n )θ 1 ), 1+v 1+v we have that Λn = τ 0n ∆ n − 12 τ 0nΓτ n + oP (1) and that ∆ n is asymptotically normal with mean zero and covariance matrix Γ ; √ √ (ii) if rn is o(1) with nrn → ∞, then, with νn = 1/( nrn ), √ θ 01 and Γ = v 2 (Ip − θ 01θ 00 ∆ n = v n(Ip − θ 01θ 00 1 )(Sn − Σ n )θ 1 ), we similarly have that Λn = τ 0n ∆ n − 21 τ 0nΓτ n + oP (1) and that ∆ n is still asymptotically normal with mean zero and covariance matrix Γ ; 14 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT √ (iii) if rn = 1/ n, then, letting νn ≡ 1, h √  1 i Λn = τ 0n v n(Sn − Σ n ) θ 01 + τ n (4.3) 2 − v2 v2 kττ n k2 + kττ n k4 + oP (1), 2 8 √ where, if (ττ n ) → τ , then τ 0n n(Sn − Σ n )(θθ 01 + 12 τ n ) is asymptotically normal with mean zero and variance kττ k2 − 41 kττ k4 ; √ (iv) if rn = o(1/ n), then, even with νn ≡ 1, we have that Λn is oP (1). This result shows that, for any fixed v > 0 and for any fixed sequence rn associated with regime (i) (away from contiguity) or regime (ii) (beyond contiguity), the sequence of models {Pθ 1 ,rn ,v : θ 1 ∈ S p−1 } is LAN, with central sequence √  nv θ 01 (4.4) ∆ n,δ := Ip − θ 01θ 00 1 (Sn − Σ n )θ 1 + δv and Fisher information matrix (4.5) Γ δ :=  v2 Ip − θ 01θ 00 1 , 1 + δv where δ := 1 if regime (i) is considered and δ := 0 otherwise. Denoting as A− the Moore-Penrose inverse of A, it follows that the locally asymptotically (n) (n) maximin test for H0 : θ 1 = θ 01 against H1 : θ 1 6= θ 01 rejects the null at asymptotic level α when  n 0 00 0 00 2 (4.6) Qδ = ∆ 0n,δΓ − δ ∆ n,δ = 1 + δv θ 1 Sn Ip − θ 1θ 1 Snθ 1 > χp−1,1−α . In view of (A.11) in the proof of Theorem 3.1, we have that QHPV = Qδ + oP (1) under Pθ 01 ,rn ,v , for any v > 0 and any bounded sequence (rn ), hence also, from contiguity, under local alternatives of the form Pθ 01 +ττ n /(√nrn ),rn ,v . We may therefore conclude that, away from contiguity and beyond contiguity, the test φHPV is Le Cam optimal for the problem at hand. We have the following result. Theorem 4.2. Fix a unit p-vector θ 01 , v > 0 and a nonnegative real √ sequence (rn ) satisfying (i) rn ≡ 1 or (ii) rn = o(1) with nrn → ∞. Then, (n) the test φHPV is locally asymptotically maximin at level α when testing H0 : (n) θ 1 = θ 01 against H1 : θ 1 6= θ 01 . Moreover, under Pθ 01 +ττ n /(√nrn ),rn ,v , with (ττ n ) → τ , the statistic QHPV is asymptotically non-central chi-square with p − 1 degrees of freedom and with non-centrality parameter (v 2 /(1 + δv))kττ k2 . TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 15 Under strict contiguity (Theorem 4.1(iv)), no asymptotic level-α test can show non-trivial asymptotic powers against the most severe alternatives of the form θ 01 + τ . Therefore, the test φHPV is also optimal in regime (iv), even though this optimality is degenerate since the trivial level-α test is also optimal in this regime. We then turn to Theorem 4.1(iii), where the situation is much less standard, as the sequence of experiments {Pθ 1 ,1/√n,v : θ 1 ∈ S p−1 } there is not LAN. However, by using the Le Cam first lemma (see, e.g., Lemma 6.4 in van der Vaart, 1998), Theorem 4.1(iii) readily entails that, for any v > 0, the hypotheses Pθ 01 ,1/√n,v and Pθ 01 +ττ n ,1/√n,v , with (ττ n ) → τ , are mutually contiguous. Consequently, the asymptotic non-null distribution of the test statistic QHPV under contiguous alternatives may still be obtained from the Le Cam third lemma. We have the following result. Theorem 4.3. Fix a unit p-vector θ 01 , v > 0 and a nonnegative real √ √ sequence (rn ) satisfying (iii) rn = 1/ n or (iv) rn = o(1/ n). Then, in case (iii), the test statistic QHPV , under Pθ 01 +ττ n ,rn ,v , with (ττ n ) → τ , is asymptotically non-central chi-square with p − 1 degrees of freedom and with non-centrality parameter (4.7)  2 v2 kττ k2 4 − kττ k2 2 − kττ k2 , 16 so that the test φHPV is rate-consistent. In case (iv), this test is locally (n) (n) asymptotically maximin at level α when testing H0 : θ 1 = θ 01 against H1 : θ 1 6= θ 01 , but trivially so since its asymptotic power against any sequence of alternatives Pθ 01 +ττ n ,rn ,v , with (ττ n ) → τ , is then equal to α. Figure 3 plots the non-centrality parameter in (4.7) as a function of τ ∈ √ [0, 2] (since θ 1 is defined up to a sign, one may restrict to alternatives θ 01 +ττ in the hemisphere centered at θ 01 ), as well as the asymptotic powers of the test φHPV in dimensions p = 2, 3. This test √ shows no power when θ 1 is or0 thogonal to θ 1 (equivalently, when kττ k = 2), hence clearly does not enjoy global-in-ττ optimality properties in regime (iii). As we now explain, however, φHPV exhibits excellent local-in-ττ optimality properties in this regime. 0 00 In order to see this, note that decomposing Ip into Ip − θ 01θ 00 1 + θ 1θ 1 and using repeatedly (4.2) allows to rewrite (4.3) as (4.8) 1 Λn = τ 0n∆ n,0 − τ 0nΓ 0τ n 2 √ √ nv nv 0 0 2 00 − kττ n k θ 1 (Sn − Σ n )θθ 1 + τ (Sn − Σ n )ττ n + oP (1), 2 2 n 16 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT where ∆ n,0 and Γ 0 were defined in (4.4) and (4.5), respectively. For small perturbations τ n , the righthand side of (4.8), after neglecting the secondorder random terms in τ n , becomes 1 τ 0n∆ n,0 − τ 0nΓ 0τ n + oP (1), 2 so that the sequence of experiments is then LAN again, with central sequence ∆ n,0 and Fisher information matrix Γ 0 . This implies that the test in (4.6) and (in view of the asymptotic equivalence stated below (4.6)) the test φHPV are locally(-in-ττ ) asymptotically maximin. Now, if the objective is to construct a test that will perform well also for large perturbations τ n , it may be tempting to consider as a test statistic the ˜ n := v √n(Sn −Σ Σn )θθ 01 . linear-in-ττ part of the random term in (4.3), namely ∆ ˜ n , under P 0 √ , is asymptotically normal with mean zero and Since ∆ θ 1 ,1/ n,v Γ := v 2 (Ip + θ 01θ 100 ), the resulting test, φoracle say, rejects the null covariance Γ̃ at asymptotic level α when  −1 0 00 −1 ˜ 0 Γ̃ ˜ θ 00 Q̃ := ∆ (Sn − Σ n )θθ 01 n Γ ∆ n = nθ 1 (Sn − Σ n ) Ip + θ 1θ 1  0    = n Snθ 01 − 1 + √vn θ 01 Ip − 12 θ 01θ 00 Snθ 01 − 1 + √vn θ 01 > χ2p,1−α ; 1 (4.9) the terminology “oracle” stresses that this test requires knowing the true ˜ n , under P 0 √ value of v. The Le Cam third lemma entails that ∆ θ 1 +ττ n ,1/ n,v , 1 2 2 with (ττ n ) → τ , is asymptotically normal with mean v (1 − 2 kττ k )ττ − Γ. Therefore, under the same sequence (v 2 /2)kττ k2θ 01 and covariance matrix Γ̃ of hypotheses, Q̃ is asymptotically non-central chi-square with p degrees of freedom and with non-centrality parameter (4.10)   v2 1 kττ k2 4 − kττ k2 4 − 2kττ k2 + kττ k4 . 16 2 Note that the difference between this non-centrality parameter and the one in (4.7) is O(kττ k4 ) as kττ k goes to zero. Since φHPV is based on a smaller number of degrees of freedom (p − 1, versus p for the oracle test), it will therefore exhibit larger asymptotic powers than the oracle test for small values of τ , which reflects the aforementioned local-in-ττ optimality of φHPV . Figure 3 also plots the non-centrality parameter in (4.10) as a function of kττ k, as well as the asymptotic powers of the oracle test in dimensions p = 2, 3. As predicted above, φHPV dominates φoracle for small values of kττ k, that is, for small perturbations. The opposite happens for large values of the perturbation and it is seen that φoracle overall is quite efficient. It is 17 TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY important to recall, however, that this test cannot be used in practice since it requires knowing the value of v. The figure further reports the results of a Monte Carlo simulation we conducted to check correctness of the highly non-standard asymptotic results obtained in this regime. In this simulation, (k) we generated M = 200, 000 mutually independent random samples Xi , i = 1, . . . , n = 10, 000, k = 0, 1, . . . , 20, of p-variate (p = 2, 3) Gaussian random vectors with mean zero and covariance matrix −1/2 0 Σ (k) (θθ 1 + τ k )(θθ 01 + τ k )0 n := Ip + n (4.11) 0.2 0.4 0.09 0.6 0.8 Norm of τ 1.0 1.2 1.4 0.08 p=2 p=3 0.07 p=2 p=3 0.06 Asymptotic powers, rejection frequencies 0.4 0.3 0.2 0.1 0.0 Asymptotic powers Rejection frequencies 0.05 Oracle HPV 0.0 Non-centrality parameters 0.5 where θ 01 = (1, 0, . . . , 0)0 ∈ Rp and θ 01 +ττ k = (cos(kπ/40), sin(kπ/40), 0, . . . , 0)0 ∈ Rp . In each replication, we performed the tests φHPV and φoracle for (n) H0 : θ 1 = θ 01 at nominal level 5%. The value k = 0 is associated with the null hypothesis, whereas the values k = 1, . . . , 20 provide increasingly severe alternatives, the most severe of which involves a first eigenvector that is orthogonal to θ 01 . The resulting rejection frequencies are plotted in the right panel of Figure 3. Clearly, they are in perfect agreement with the asymptotic powers, which supports our theoretical results. 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 Norm of τ √ Fig 3. (Left:) Non-centrality parameters (4.7) and (4.10), as a function of kττ k(∈ [0, 2]), in the asymptotic non-central chi-square distributions of the test statistics of φHPV and φoracle , respectively, under alternatives of the form Pθ 0 +ττ ,1/√n,1 . (Right:) The corre1 sponding asymptotic power curves in dimensions p = 2 and p = 3, as well as the empirical power curves resulting from the Monte Carlo exercise described at the end of Section 4. We conclude this section by stressing that, as announced in the introduction, the contiguity rate in Theorem 4.1 depends on the regime considered. Clearly, the weaker the identifiability (that is, the closer the underlying distribution to the spherical Gaussian one), the slower the contiguity rate, that 18 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT is, the hardest the inference problem on θ 1 . 5. Wrap up. In this paper, we tackled the problem of testing the (n) (n) null hypothesis H0 : θ 1 = θ 01 against the alternative H1 : θ 1 6= θ 01 , where θ 1 is the eigenvector associated with the largest eigenvalue of the underlying covariance matrix and where θ 01 is some fixed unit vector. We analyzed the asymptotic behavior of the classical Anderson (1963) test φA and of the Hallin, Paindaveine and Verdebout (2010) test φHPV under sequences of p-variate Gaussian models with spiked covariance matrices of the form Σ n = σn2 (Ip + rn vθθ 1θ 01 ), where (σn2 ) is a positive sequence, v > 0 is fixed, and (rn ) is a nonnegative sequence that converges to zero. We showed that in these situations where θ 1 is increasingly closer to being unidentified, φHPV performs better than φA : (i) φHPV , unlike φA , meets asymptotically the nominal level constraint without any condition on the rate at which rn converges to zero, and (ii) φHPV remains locally and asymptotically max√ imin in all regimes, but in the contiguity regime rn = 1/ n where φHPV still enjoys the same optimality property locally in τ . These considerations, along with the asymptotic equivalence of φHPV and φA in the standard case rn ≡ 1, clearly imply that the test φHPV , for all practical purposes, should be favored over φA . APPENDIX: PROOFS Throughout the appendix, we will write vn := rn v and δ will take value one if regime (i) is considered and zero otherwise. All convergences are as n → ∞. Proof of Lemma 2.2. Fix arbitrarily θ 2 , . . . , θ p such that the p × p matrix Γ := (θθ 01 , θ 2 , . . . , θ p ) is orthogonal. Letting Λ n := diag(1 + vn , 1, . . . , 1), we have ΣnΓ = ΓΛn , so that Γ is an eigenvectors matrix for Σn . Clearly, √ `n1 := n(λ̂n1 − (1 + vn )) is the largest root of the polynomial Pn1 (h) := √ √ √ det( n(Sn −(1+vn )Ip )−hIp ) and `n2 := n(λ̂n2 −1), . . . , `np := n(λ̂np −1) √ are the p − 1 smallest roots of the polynomial Pn2 (h) := det( n(Sn − Ip ) − hIp ). Letting √ √ Γ0 SnΓ − Λ n ) = Γ 0 n(Sn − Σ n )Γ Γ, (A.1) Zn := n(Γ a key ingredient in this proof is to rewrite these polynomials as √ 0 √ Γ SnΓ − n(1 + vn )Ip − hIp ) Pn1 (h) = det( nΓ √ Λn − (1 + vn )Ip ) − hIp ) (A.2) = det(Zn + n(Λ TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 19 and (A.3) √ 0 √ Γ SnΓ − nIp − hIp ) Pn2 (h) = det( nΓ √ Λn − Ip ) − hIp ). = det(Zn + n(Λ Note that Lemma 2.1 readily implies that Zn converges weakly to Z(v) in case (i) and to Z = Z(0) in cases (ii)-(iv), where Z(v) is the random matrix defined in the statement of the theorem. In all cases, thus, Zn converges weakly to Z(δv), where δ was introduced at the beginning of this appendix. We start with the proofs of (i)-(ii). Partition Zn and Z(δv) into     Zn,11 Z0n,21 Z11 (δv) Z021 (δv) Zn = and Z(δv) = , Z21 (δv) Z22 (δv) Zn,21 Zn,22 where Zn,11 and Z11 (δv) are random variables, whereas Zn,22 and Z22 (δv) are (p − 1) × (p − 1) random matrices. It follows from the discussion above that `n1 is the largest root of the polynomial Pn1 (h) Qn1 (h) := √ ( nvn )p−1   1 Zn,11 − h Z0n,21 √ det = √ Zn,21 Zn,22 − ( nvn + h)Ip−1 ( nvn )p−1   √ Zn,11 − h ( nvn )−1 Z0n,21 √ √ = det . Zn,21 ( nvn )−1 (Zn,22 − ( nvn + h)Ip−1 ) √ In cases (i)-(ii), ( nvn )−1 Zn,21 is oP (1), so that the largest root `n1 converges weakly to the root of the weak limit of Zn,11 − h, namely to Z11 (δv) (note √ that, still since ( nvn )−1 Zn,21 is oP (1), the p − 1 smallest roots of Qn1 (h) converge to −∞ in probability). Similarly, `n2 , . . . , `np are the p − 1 smallest roots (in decreasing order) of the polynomial Pn2 (h) Qn2 (h) := √ nvn   √ 1 Zn,11 + nvn − h Z0n,21 = √ det Zn,21 Zn,22 − hIp−1 nvn  √  √ ( nvn )−1 (Zn,11 + nvn − h) Z0n,12 √ = det . ( nvn )−1 Zn,21 Zn,22 − hIp−1 √ Using again the fact that ( nvn )−1 Zn,21 is oP (1) yields that (`n2 , . . . , `np )0 converges weakly to the vector of roots (still in decreasing order) of the weak 20 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT limit of the polynomial det(Zn,22 (δv) − hIp−1 ) = 0, namely to the vector of (ordered) eigenvalues of Z22 (δv); note that the largest root of Qn2 (h) converges to ∞ in probability. The result then follows from the fact that, in both cases (i)-(ii), Z11 (δv) ∼ N (0, 2(1 + δv 2 )) and Z22 (δv) are mutually independent. We turn to the proof of (iii). In this case, we have Pn1 (h) = det(Zn − diag(0, v, . . . , v) − hIp ) and Pn2 (h) = det(Zn + diag(v, 0, . . . , 0) − hIp ). It readily follows that `n1 converges weakly to the largest root of the polynomial det(Z − diag(0, v, . . . , v) − hIp ), that is, to the largest eigenvalue of Z − diag(0, v, . . . , v), while (`n2 , . . . , `np )0 converges weakly to the vector of the p − 1 smallest roots (in decreasing order) of the polynomial det(Z + diag(v, 0, . . . , 0) − hIp ), namely to the vector of the p − 1 smallest (ordered) eigenvalues of Z + diag(v, 0, . . . , 0). Finally, we prove the result in (iv). In that case, we have  √ Pn1 (h) = det Zn − nvn diag(0, 1, . . . , 1) − hIp and Pn2 (h) = det Zn + √  nvn diag(1, 0, . . . , 0) − hIp , √ where nvn is o(1). Parallel as above, it follows that `n1 (resp., (`n2 , . . . , `np )0 ) converges weakly to the largest root (resp., the p − 1 smallest roots, in decreasing order) of the polynomial det(Z − hIp ). In other words, ` = (`1 , . . . , `p )0 is equal in distribution to the vector collecting the eigenvalues (in decreasing order) of Z. It only remains to establish that the density of ` is the one given in (2.3). To do so, let Dp be the p-dimensional duplication matrix, that is such that Dp (vech A) = vec A for any p × p symmetric matrix A, where vech A is the p(p + 1)/2-vector obtained from vec A by restricting to the entries from the upper-triangular part of A. Con−1 0 0 − sider then W := vech Z = D− p (vec Z), where Dp = (Dp Dp ) Dp is the Moore-Penrose inverse of Dp ; see page 57 in Magnus and Neudecker (2007). Lemma 2.1 implies that W has density  1 p(p+1)/2  1  − 0 −1 w 7→ g(w) = exp − w0 (D− (I + K )(D ) ) w 2 p p p p 2π 2  1  1 p(p+1)/2  = exp − w0 D0p Dp w , 2π 4 where we used the identity Kp Dp = Dp ; see again page 57 in Magnus and Neudecker (2007). The resulting density for Z is therefore z 7→ f (z) = g(vech z) =  1 p(p+1)/2   1 exp − (tr z2 ) . 2π 4 TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 21 The explicit density for ` in (2.3) then follows from Lemma 2.3 of Tyler (1983b).  The proof of Lemma 2.3 requires the following linear algebra result. Lemma A.1. Let A be a p × p matrix and λ be an eigenvalue of A. Assume that v = (C11 , . . . , C1p )0 6= 0, where C = (Cij ) stands for the cofactor matrix of A − λIp . Then v is an eigenvector of A associated with eigenvalue λ. Proof of Lemma A.1. For any j = 1, . . . , p, denote as (A − λIp )j the jth row of A − λIp (left as a row vector). Since λ is an eigenvalue of A, we then have (A − λIp )1 v = det(A − λIp ) = 0. Now, for j = 2, . . . , p,   (A − λIp )j  (A − λIp )2    (A − λIp )j v = det   = 0, ..   . (A − λIp )p since this is the determinant of a matrix with (at least) twice the same row. We conclude that (A − λIp )v = 0. Since v 6= 0, this shows that v is an eigenvector of A associated with eigenvalue λ.  Proof of Lemma 2.3. First note that since   0 En,11 En,12 Γ nΓ = En = Γ̂ En,21 En,22 is an orthogonal matrix, we easily obtain that (A.4) (A.5) En,21 = − 1 En,11 En,22 E0n,12 , En,22 E0n,22 = Ip−1 − En,21 E0n,21 and (A.6) En,11 E0n,12 = −E0n,22 En,21 . We start with the proof of (i)-(ii). As in the proof of Lemma 2.2, we have from (A.2) that, still with the random vector Zn defined in (A.1), `n1 = √ n(λ̂n1 − (1 + vn )) is the largest eigenvalue of √ 0 √ √ Γ SnΓ − n(1 + vn )Ip = Zn + n(Λ Λn − (1 + vn )Ip ) nΓ √ √ (A.7) = Zn − diag(0, nvn , . . . , nvn ). 22 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT One readily checks that wn1 := Γ 0θ̂θ n1 = (En,11 , En,12 )0 is a corresponding unit eigenvector. Using the same notation as in the proof of Lemma 2.2, Lemma A.1 yields that wn1 is proportional to the vector of cofactors associated with the first row of   Zn,11 − `n1 Z0n,21 √ , (A.8) Mn,1 := Zn,21 Zn,22 − nvn Ip−1 − `n1 Ip−1 or equivalently, of 1 √ Mn,1 = ( nvn )p−1 Z0n,21 Zn,11 − `n1 √ 1 Zn,21 nvn √ 1 Zn,22 nvn − Ip−1 − ! √ 1 `n1 Ip−1 nvn . Since `n1 is OP (1) (Lemma 2.2) and so are Zn,21 and Zn,22 , we obtain that (En,11 , En,12 )0 = (1, 0, . . . , 0)0 + oP (1) (recall that En,11 > 0 almost √ surely) and that nvn E0n,12 = OP (1). Since En,22 is bounded, it directly fol√ lows from (A.4) that nvn En,21 = OP (1). In view of (A.5), we then obtain that En,22 E0n,22 − Ip−1 is oP (1). Now, by using (A.6), we have Zn,21 = `n1 En,11 E0n,12 + E0n,22 diag(`n2 , . . . , `np )En,21 √ √ + n(1 + vn )En,11 E0n,12 + nE0n,22 En,21 √ (A.9) = E0n,22 diag(`n2 − `n1 , . . . , `np − `n1 )En,21 − nvn E0n,22 En,21 , √ which yields nvn E0n,22 En,21 = −Zn,21 + oP (1). Since Lemma 2.1 entails that Zn,21 is asymptotically N (0, Ip−1 ) in case (i) and N (0, (1 + v)Ip−1 ) in √ case (ii), the asymptotic normality result for nrn E0n,22 En,21 follows, which, √ in view of (A.6), also establishes the one for nrn E0n,12 . We turn to the proof of (iii)-(iv). As above, wn1 = Γ 0θ̂θ n1 = (En,11 , En,12 )0 √ is the unit eigenvector associated with the largest eigenvalue `n1 = n(λ̂n1 − (1 + vn )) of (A.7), or equivalently, with the largest eigenvalue `˜n1 = `n1 + √ √ nvn = n(λ̂n1 − 1) of √ (A.10) Zn + diag( nvn , 0, . . . , 0). Similarly, wnj := Γ 0θ̂θ nj = E0n ej , j = 2, . . . , p, where ej stands for the jth vector of the canonical basis of Rp , are the unit eigenvectors associated with √ √ the p − 1 smallest eigenvalues `n2 = n(λ̂n2 − 1), . . . , `np = n(λ̂np − 1) of (A.10). Consequently, the joint distribution of wnj , j = 1, . . . , p — that is, the joint distribution of the columns of E0n — converges weakly to the joint distribution of the unit eigenvectors (associated with eigenvalues in TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 23 decreasing order, and with the signs fixed as in the statement of the theorem) of √ Z + lim diag( nvn , 0, . . . , 0) n→∞ (recall that, in cases (iii)-(iv), Zn converges weakly to the random matrix Z defined in Lemma 2.2). This establishes the result.  Proof of Theorem 3.1. In this proof, all stochastic convergences are as n → 0 ∞ under Pθ 01 ,rn ,v . Since θ̃θ j Σ nθ 01 = 0 for j = 2, . . . , p, the test statistic in (2.2) rewrites p 2 n X −1 0 QHPV = λ̂nj θ̃θ nj Snθ 01 = N0n Nn , λ̂n1 j=2 with 0 1  −1/2 0 √ 0 √ 0 θ θ θ̃ n(S − Σ )θ Nn := p λ̂n2 θ̃θ n2 n(Sn − Σ n )θθ 01 , . . . , λ̂−1/2 n n 1 . np np λ̂n1 √ Since the θ̃θ nj ’s are unit vectors and since n(Sn − Σ n ) is OP (1) as soon 0 √ as rn = O(1) (Lemma 2.1), we have that θ̃θ nj n(Sn − Σn )θθ 01 is OP (1) for any j = 2, . . . , p. Therefore, Lemma 2.2 entails that, still with δ being equal to one if rn ≡ 1 and to zero if rn = o(1), Nn = √  0 √  1 0 √ θ̃θ n2 n(Sn − Σ n )θθ 01 , . . . , θ̃θ np n(Sn − Σ n )θθ 01 + oP (1). 1 + δv Using the fact that QHPV 0 θ nj θ̃θ nj j=2 θ̃ Pp = Ip − θ 01θ 00 1 is idempotent, it follows that p n X 00 0 = θ 1 (Sn − Σ n )θ̃θ nj θ̃θ nj (Sn − Σ n )θθ 01 + oP (1) 1 + δv j=2 (A.11) = n θ 01 + oP (1) θ 00 (Sn − Σ n )(Ip − θ 01θ 00 1 )(Sn − Σ n )θ 1 + δv 1 = Vn0 Vn + oP (1), √ Σn )θθ 01 . Since Lemma 2.1 where we let Vn := (1+δv)−1/2 (Ip −θθ 01θ 00 1 ) n(Sn −Σ entails that Vn is asymptotically normal with mean zero and covariance 0 00 matrix Ip − θ 01θ 00 1 and since Ip − θ 1θ 1 is idempotent with trace p − 1, the result then follows from, e.g., Theorem 9.2.1 in Rao and Mitra (1971).  24 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT Proof of Theorem 3.2. In this proof, all stochastic convergences are as n → ∞ under Pθ 01 ,rn ,v . Recall that we showed below (3.1) that, in regimes (i)-(ii), QA = p X j=2 !2 √ nrn v 0 0 q θ̂θ nj θ 1 + oP (1). λ̂n1 λ̂nj Consequently, 0 √  √ v2 nrn En,21 nrn En,21 + oP (1), 1 + δv √ where we used the fact that nrn En,21 = OP (1). Therefore, we may write QA = QA = 0 √  √ v2 nrn E0n,22 En,21 nrn E0n,22 En,21 1 + δv + 0  √ √ v2 nrn En,21 (Ip−1 − En,22 E0n,22 ) nrn En,21 + oP (1), 1 + δv and the result follows from Lemmas 2.3(i)-(ii).  Proof of Theorem 3.3. First note that, for p = 2, (2.1) yields !2 !2 √ √ n(λ̂n1 − λ̂n2 ) 0 0 `n1 − `n2 + nrn 0 0 p p (θ̂θ n2θ 1 ) = (θ̂θ n2θ 1 ) . QA = λ̂n1 λ̂n2 λ̂n1 λ̂n2 In view of Lemmas 2.2-2.3, the continuous mapping theorem therefore implies that 2 D (A.12) QA → `1 − `2 (E21 (0))2 , where ` = (`1 , `2 )0 and E21 (0) are mutually independent and have the distributions described in Part (iv) of Lemma 2.2 and Lemma 2.3, respectively (mutual independence follows from Anderson (1963), once it is seen that 0 the asymptotic joint distribution of ` n = (`n1 , `n2 )0 and En,21 = θ̂θ n2θ 01 is the same in regime (iv) as in the spherical case associated with rn ≡ 0). 2 is the squared of the lower left entry of a random In particular, Z := E21 matrix E that has an invariant Haar distribution over the collection of 2 × 2 orthogonal matrices; see the remark below Lemma p 2.3. It follows that Z is 1 p−1 Beta( 2 , 2 ), hence has density z 7→ fZ (z) = 1/(π z(1 − z)). As for ` , it has density 1 2 2 (`1 , `2 )0 7→ f(`1 ,`2 ) (`1 , `2 ) = √ (`1 − `2 )e−(`1 +`2 )/4 I[`1 ≥ `2 ], 4 2π TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 25 √ where I[A]√is the indicator function of A. Letting U1 = (`1 −`2 )/ 2 and U2 = (`1 + `2 )/ 2, we thus have that (U1 , U2 )0 has density √ √  (u1 , u2 )0 7→ f(U1 ,U2 ) (u1 , u2 ) = f(`1 ,`2 ) (u1 + u2 )/ 2, (−u1 + u2 )/ 2 1 √ 1 2 2 2 2 = √ 2u1 e−(u1 +u2 )/4 I[u1 > 0] = √ u1 e−(u1 +u2 )/4 I[u1 > 0]. 4 π 4 2π √ Therefore, U1 = (`1 − `2 )/ 2 has density Z ∞ 1 2 2 √ u1 e−(u1 +u2 )/4 du2 fU1 (u1 ) = I[u1 > 0] 4 π −∞ Z ∞ 1 1 1 2 2 2 √ √ e−u2 /4 du2 = u1 e−u1 /4 I[u1 > 0]. = u1 e−u1 /4 I[u1 > 0] 2 2 2π × 2 −∞ We conclude that Y = (`1 − `2 )2 = 2U12 has density 1 1 √ √ y 7→ fY (y) = √ fU1 ( y/ 2) = e−y/8 I[y > 0]. 8 2 2y Finally, we obtain that the asymptotic distribution of QA in the regime considered, that coincides with the distribution of Y Z (see (A.12)), has density Z 1 Z 1 1 1 e−q/(8z) q 7→ fQ (q) = I[q > 0] fY (q/z)fZ (z) dz = I[q > 0] dz 3/2 (1 − z)1/2 8π 0 z 0 z √  r  1 1 4 2π −q/8 q(1 − z) 1 (A.13) = I[q > 0] = √ e−q/8 I[q > 0], − √ e Φ 8π q 4z 8πq 0 which, as was to be proved, is the pdf of the 4χ21 distribution. To justify the integral computation in (A.13), note that, denoting respectively as Φ and φ the cumulative distribution function and probability density function of the standard normal distribution, r  r  s   d q(1 − z) q(1 − z) 1 4z −4qz − 4q(1 − z) Φ =φ dz 4z 4z 2 q(1 − z) 16z 2 r r  r 1 q(1 − z) q 1 q(1 − z) q = − √ exp − , =− φ 3 3 4 4z z (1 − z) 8z z (1 − z) 4 2π so that √   r   s 4 2π q d q(1 − z) q 1 − √ exp − Φ = exp − , 3 q 8 dz 4z 8z z (1 − z) 26 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT that is, Z √  r   4 2π e−q/(8z) q q(1 − z) dz = − √ exp − Φ . q 8 4z z 3/2 (1 − z)1/2  Proof of Theorem 4.1. Clearly, Σn = (1 + rn v)θθ 1θ 01 + (Ip − θ 1θ 01 ) has −1θ θ 0 + (I − determinant 1 + rn v and inverse matrix Σ −1 1 1 p n = (1 + rn v) P 0 0 1 θ 1θ 1 ) = Ip − (rn v/(1 + rn v))θθ 1θ 1 . Thus, letting Sn0 := n ni=1 Xni X0ni , the hypothesis Pθ 1 ,rn ,v is associated with the density (with respect to the Lebesgue measure µ over (Rp )n ) n  1 X    dPθ 1 ,rn ,v (2π)−np/2 0 0 θ = exp − X I − (r v/(1 + r v))θ θ X n n 1 1 ni ni p dµ 2 (1 + rn v)n/2 i=1 n  1 X  (2π)−np/2 nrn v 0 2 θ S θ = exp − kX k + , n0 1 ni 1 2 2(1 + rn v) (1 + rn v)n/2 i=1 which yields (see (4.1)) Λn = =  nrn v  0 0 (θθ 1 + νnτ n )0 Sn0 (θθ 01 + νnτ n ) − θ 00 S θ 1 n0 1 2(1 + rn v) nrn vνn2 nrn vνn 0 τ n Sn0θ 01 + τ 0 Sn0τ n . 1 + rn v 2(1 + rn v) n Throughout the rest of the proof, we work under Pθ 01 ,rn ,v , and, accordingly, 0 Σ n = Ip + rn v θ 01θ 00 1 . Since n(Sn0 − Sn ) = nX̄n X̄n is OP (1), we obtain that, in cases (i)-(iv), Λn = nrn vνn 0 nrn vνn2 τ n Snθ 01 + τ 0 Snτ n + oP (1). 1 + rn v 2(1 + rn v) n Now, τ 0nΣ nθ 01 = (1 + rn v)ττ 0nθ 01 = − 12 (1 + rn v)νn kττ n k2 (see (4.2)), so that Λn = nrn vνn 0 nrn vνn2 nrn vνn2 τ n (Sn − Σ n )θθ 01 + τ 0n Snτ n − kττ n k2 + oP (1) 1 + rn v 2(1 + rn v) 2 = nrn vνn 0 nrn vνn2 τ n (Sn − Σ n )θθ 01 + τ 0 (Sn − (1 + rn v)Ip )ττ n + oP (1). 1 + rn v 2(1 + rn v) n TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 27 The identity (1 + rn v)Ip = Σ n + rn v(Ip − θ 01θ 00 1 ) then provides Λn = nrn vνn2 nrn vνn 0 τ n (Sn − Σ n )θθ 01 + τ 0 (Sn − Σ n )ττ n 1 + vn 2(1 + rn v) n − = nrn vνn 0 nrn vνn2 τ n (Sn − Σ n )θθ 01 + τ 0 (Sn − Σ n )ττ n 1 + rn v 2(1 + rn v) n − (A.14) nrn2 v 2 νn2 0 τ n + oP (1) τ (Ip − θ 01θ 00 1 )τ 2(1 + rn v) n nrn2 v 2 νn2 nrn2 v 2 νn4 kττ n k2 + kττ n k4 + oP (1), 2(1 + rn v) 8(1 + rn v) where we used (4.2) again. We can now consider the cases (i)-(iv). √ Let us start with cases (i)-(ii). Take then νn = 1/( nrn ) (recall that rn ≡ 1 in case (i)) and let δ = 1 (resp., δ = 0) if case (i) (resp., case (ii)) is √ considered. The facts that, in both cases (i)-(ii), n(Sn − Σ n ) = OP (1) √ (Lemma 2.1), τ 0nθ 01 = − 21 νn kττ n k2 = o(1) and nrn νn2 = o(1) yield √ v v2 τ 0n n(Sn − Σ n )θθ 01 − kττ n k2 + oP (1) 1 + δv 2(1 + δv) √ √ v v θ 01 + θ 01 = τ 0n (Ip − θ 01θ 00 (ττ 0nθ 01 )θθ 00 1 ) n(Sn − Σ n )θ 1 n(Sn − Σ n )θ 1 + δv 1 + δv Λn = − = v2 v2 τ τ 0n (Ip − θ 01θ 00 )τ − (ττ 0 θ 0 )2 + oP (1) n 1 2(1 + δv) 2(1 + δv) n 1 √ v v2 τ n + oP (1). θ 01 − τ 0n (Ip − θ 01θ 00 τ 0 (Ip − θ 01θ 00 1 ) n(Sn − Σ n )θ 1 )τ 1 + δv 2(1 + δv) n Now, Lemma 2.1 implies that √ √ 0 00 θ 01 = (θθ 00 (Ip − θ 01θ 00 1 ) n(Sn − Σ n )θ 1 ⊗ (Ip − θ 1θ 1 ))vec( n(Sn − Σ n )) is asymptotically normal with mean zero and covariance matrix (1+δv)(Ip − θ 01θ 00 1 ), which establishes the result in cases (i)-(ii). Let us turn to the proof in cases (iii)-(iv). The facts that, in both cases, √ √ we have n(Sn − Σ n ) = OP (1) and nrn = O(1) implies that, with ν ≡ 1, (A.14) becomes nrn v 0 τ (Sn − Σ n )ττ n 2 n nr2 v 2 nr2 v 2 − n kττ n k2 + n kττ n k4 + oP (1). 2 8 Λn = nrn vττ 0n (Sn − Σ n )θθ 01 + (A.15) 28 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT √ In case (iv), where nrn = o(1), it directly follows that Λn = oP (1). √ In case (iii), where rn = 1/ n, (A.15) yields the announced stochastic quadratic expansion of Λn . Finally, still in case (iii), Lemma 2.1 implies √ that, if (ττ n ) → τ , then τ 0n n(Sn − Σ n ) θ 01 + 21 τ n is asymptotically normal with mean zero and variance kττ k2 − 41 kττ k4 , which establishes the result.  Proof of Theorem 4.2. Since optimality of the test φHPV was established above the statement of the theorem, we only have to derive the asymptotic non-null distribution of QHPV under Pθ 01 +ττ n /(√nrn ),rn ,v . Recall that, √ θ 01 is asymptotically normal with under Pθ 01 ,rn ,v , n(Ip − θ 01θ 00 1 )(Sn − Σ n )θ mean zero and covariance matrix (1 + δv)(Ip − θ 01θ 00 1 ); see the proof of Theorem 4.1(i)-(ii). A routine application of the Le Cam third lemma thus √ provides that, under Pθ 01 +ττ n /(√nrn ),rn ,v , with (ττ n ) → τ , n(Ip − θ 01θ 00 1 )(Sn − 0 0 00 Σ n )θθ 1 is asymptotically normal with mean v (Ip − θ 1θ 1 )ττ and covariance matrix (1 + δv)(Ip − θ 01θ 00 1 ). Since contiguity implies that the asymptotic equivalence (see (A.11)) QHPV = n θ 01 + oP (1) θ 00 (Sn − Σ n )(Ip − θ 01θ 00 1 )(Sn − Σ n )θ 1 + δv 1 also holds under Pθ 01 +ττ n /(√nrn ),rn ,v , we obtain that, under the same sequence of hypotheses, QHPV is asymptotically non-central chi-square with p − 1 τ )0 ((1 + degrees of freedom and with non-centrality parameter (v (Ip − θ 01θ 00 1 )τ − θ 01θ 100 )ττ ), which establishes the result (note that (4.2) δv)(Ip −θθ 01θ 00 1 )) (v (Ip −θ 00 here implies that θ 1 τ = 0).  Proof of Theorem 4.3. Since the claims in regime (iv) are trivial, we only show the result in regime (iii). The sequences of hypotheses Pθ 01 ,1/√n,v and Pθ 01 ,1/√n,v are mutually contiguous (which follows, as already mentioned, from the Le Cam first lemma). The Le Cam third lemma then yields that, √ Σn )θθ 01 is asymptotically under Pθ 01 +ττ n ,rn ,v , with (ττ n ) → τ , n(Ip −θθ 01θ 00 1 )(Sn −Σ normal with mean    1 1 0 00 2 2 0 τ τ τ kτ k τ + kτ k θ v(1 + θ 00 τ )(I − θ θ )τ = v 1 − p 1 1 1 1 2 2 and covariance matrix Ip −θθ 01θ 00 1 , where we used (4.2). As in the proof of the previous theorem, contiguity yields that the asymptotic equivalence (which, in (A.11), also holds in regime (iii)) QHPV = n θ 01 + oP (1) θ 00 (Sn − Σ n )(Ip − θ 01θ 00 1 )(Sn − Σ n )θ 1 + δv 1 TESTING FOR PC DIRECTIONS UNDER WEAK IDENTIFIABILITY 29 extends to Pθ 01 +ττ n ,rn ,v , with (ττ n ) → τ , and we may therefore conclude that, under this sequence of hypotheses, QHPV is asymptotically non-central chisquare with p − 1 degrees of freedom and with non-centrality parameter h  h   i0  i 1 1 1 1 − v 1 − kττ k2 τ + kττ k2θ 01 . v 1 − kττ k2 τ + kττ k2θ 01 (Ip − θ 01θ 00 1) 2 2 2 2 This establishes the result since a direct computation shows that this noncentrality parameter coincides with the one in (4.7).  REFERENCES Anderson, T. W. (1963). Asymptotic theory for principal component analysis. Ann. Mathem. Statist. 34 122–148. Bali, J. L., Boente, G., Tyler, D. E., Wang, J.-L. et al. (2011). Robust functional principal components: A projection-pursuit approach. Ann. Statist. 39 2852–2882. Berthet, Q. and Rigollet, P. (2013). Optimal detection of sparse principal components in high dimension. Ann. Statist. 41 1780–1815. Boente, G. and Fraiman, R. (2000). Kernel-based functional principal components. Statist. Probab. Lett. 48 335–345. Croux, C. and Haesbroeck, G. (2000). Principal component analysis based on robust estimators of the covariance or correlation matrix: influence functions and efficiencies. Biometrika 87 603–618. Cuevas, A. (2014). A partial overview of the theory of statistics with functional data. J. Statist. Plann. Inference 147 1–23. Dufour, J. M. (1997). Some impossibility theorems in econometrics with applications to instrumental variables and dynamic models. Econometrica 65 1365–1388. Dufour, J. M. (2006). Monte Carlo tests with nuisance parameters: a general approach to finite-sample inference and nonstandard asymptotics. J. Econometrics 133 443–477. Forchini, G. and Hillier, G. (2003). Conditional inference for possibly unidentified structural equations. Econometric Theory 19 707–743. Hallin, M. and Paindaveine, D. (2006). Semiparametrically efficient rank-based inference for shape. I. Optimal rank-based tests for sphericity. Ann. Statist. 34 2707–2756. Hallin, M., Paindaveine, D. and Verdebout, T. (2010). Optimal rank-based testing for principal components. Ann. Statist. 38 3245–3299. Hallin, M., Paindaveine, D. and Verdebout, T. (2014). Efficient R-estimation of principal and common principal components. J. Amer. Statist. Assoc. 109 1071–1083. Han, F. and Liu, H. (2014). Scale-invariant sparse PCA on high-dimensional metaelliptical data. J. Amer. Statist. Assoc. 109 275–287. He, R., Hu, B.-G., Zheng, W.-S. and Kong, X.-W. (2011). Robust principal component analysis based on maximum correntropy criterion. IEEE Trans. Image Process. 20 1485–1494. Hubert, M., Rousseeuw, P. J. and Vanden Branden, K. (2005). ROBPCA: a new approach to robust principal component analysis. Technometrics 47 64–79. Johnstone, I. M. and Lu, A. Y. (2009). On consistency and sparsity for principal components analysis in high dimensions. J. Amer. Statist. Assoc. 104 682–693. Magnus, J. R. and Neudecker, H. (2007). Matrix Differential Calculus with Applications in Statistics and Econometrics, 3rd edition ed. John Wiley & Sons, Chichester. 30 D. PAINDAVEINE, J. REMY AND TH. VERDEBOUT Paindaveine, D. and Verdebout, T. (2017). Inference on the mode of weak directional signals: a Le Cam perspective on hypothesis testing near singularities. Ann. Statist. 45 800–832. Pötscher, B. M. (2002). Lower risk bounds and properties of confidence sets for ill-posed estimation problems with applications to spectral density and persistence estimation, unit roots, and estimation of long memory parameters. Econometrica 70 1035–1065. Rao, C. R. and Mitra, S. K. (1971). Generalized Inverses of Matrices and its Applications. J. Wiley, New York. Tyler, D. E. (1981). Asymptotic inference for eigenvectors. Ann. Statist. 725–736. Tyler, D. E. (1983a). A class of asymptotic tests for principal component vectors. Ann. Statist. 1243–1250. Tyler, D. E. (1983b). The asymptotic distribution of principal component roots under local alternatives to multiple roots. Ann. Statist. 1232–1242. van der Vaart, A. W. (1998). Asymptotic Statistics. Cambridge Univ. Press, Cambridge. Université libre de Bruxelles ECARES and Département de Mathématique Avenue F.D. Roosevelt, 50 ECARES, CP114/04 B-1050, Brussels Belgium E-mail: [email protected] [email protected] [email protected] URL: http://homepages.ulb.ac.be/˜dpaindav http://tverdebo.ulb.ac.be
10math.ST
arXiv:1306.0514v4 [cs.NE] 3 Feb 2015 Riemannian metrics for neural networks II: recurrent networks and learning symbolic data sequences Yann Ollivier February 4, 2015 Abstract Recurrent neural networks are powerful models for sequential data, able to represent complex dependencies in the sequence that simpler models such as hidden Markov models cannot handle. Yet they are notoriously hard to train. Here we introduce a training procedure using a gradient ascent in a Riemannian metric: this produces an algorithm independent from design choices such as the encoding of parameters and unit activities. This metric gradient ascent is designed to have an algorithmic cost close to backpropagation through time for sparsely connected networks. We use this procedure on gated leaky neural networks (GLNNs), a variant of recurrent neural networks with an architecture inspired by finite automata and an evolution equation inspired by continuous-time networks. GLNNs trained with a Riemannian gradient are demonstrated to effectively capture a variety of structures in synthetic problems: basic block nesting as in context-free grammars (an important feature of natural languages, but difficult to learn), intersections of multiple independent Markov-type relations, or long-distance relationships such as the distant-XOR problem. This method does not require adjusting the network structure or initial parameters: the network used is a sparse random graph and the initialization is identical for all problems considered. The problem considered here is to learn a probabilistic model for an observed sequence of symbols (x0 , . . . , xt , . . .) over a finite alphabet A. Such a model can be used for prediction, compression, or generalization. Hidden Markov models (HMMs) are frequently used in such a setting. However, the kind of algorithmic structures HMMs can represent is limited because of the underlying finite automaton structure. Examples of simple sequential data that cannot be, or cannot conveniently be, represented by HMMs are discussed below; for instance, subsequence insertions, or intersections of multiple independent constraints. 1 Recurrent neural networks (RNNs) are an alternative with higher modelling power. However, their training comes with its own limitations; in particular, picking long-distance dependencies remains problematic [BSF94, HS97, Jae02]. Techniques to deal with this problem include long short-term memory (LSTM) networks [HS97] or echo state networks (ESN) [Jae02]. Here we use a new training procedure which realizes a gradient ascent using a suitable Riemannian metric, instead of backpropagation, at a small computational cost. Moreover, we use gated leaky neural networks (GLNNs), a variation on the RNN architecture. More precisely: • Rather than standard backpropagation through time, for training the model we use a gradient inspired by Riemannian geometry, using metrics for neural networks as introduced in [Oll13], adapted to a recurrent context. This makes learning less sensitive to arbitrary design choices, and provides a substantial improvement in learning speed and quality. An important point is doing so while keeping a scalable algorithm. Here the asymptotic algorithmic complexity is identical to backpropagation through time for sparsely connected networks. • In GLNNs, at each time in the production of a sequence of symbols, the neural network weights depend on the symbol last produced (“gated” units). This is inspired by finite automata in which the next state depends both on the current state and the currently produced symbol, and allows for an easy representation of automaton-like structures. Such “gated” models have already been used, e.g., in [SMH11], and arguably the LSTM architecture. • The dynamics of GLNNs is modified in a way inspired by continuoustime (or “leaky”) neural networks: the connection weights between the units control the variation of the activation levels, rather than directly setting the activation levels at the next step. This provides an integrating effect and is efficient, for instance, at modelling some hierarchical, context-free-grammar–like structures in which an internal state must be held constant while something else is happening. Much of this text is devoted to the derivation of Riemannian metrics for recurrent networks. Indeed, we believe the use of a proper gradient is a major ingredient for an effective learning procedure. The standard gradient ascent update over a parameter θ can be seen as a way to increase the value of a function f (θ) while changing as least as possible the numerical value θ: ∂f θ =θ+η ∂θ ′ ⇒ 1 θ ≈ arg max f (θ ) − θ − θ′ 2η θ′  ′ ′ 2  (1) for small enough learning rates η (where ≈ means “up to O(η 2 ) when η → 0”). The norm kθ − θ ′ k depends on how the parameters are cast as a set of 2 real numbers. If, instead, one uses a measure of distance between θ and θ ′ depending on what the network does, rather than how the numbers in θ and θ ′ differ, the penalty for moving θ in different directions becomes different and hopefully yields better learning. One possible benefit, for instance, is self-adaptation of the cost of moving θ in certain directions, depending on the current behavior of the network. Another benefit is invariance of the learning procedure from a number of designing choices, such as using a logistic or tanh activation function, or scaling the values of parameters (choices which affect the conventional gradient ascent). The primary example of an invariant gradient ascent is Amari’s natural gradient, which amounts to replacing kθ − θ ′ k2 with the Kullback–Leibler divergence KL(Prθ || Prθ′ ) between the distributions defined by the network (seen as a probabilistic model of the data). However, the natural gradient comes at a great algorithmic cost. “Hessian-free” techniques [Mar10, MS11, MS12] allow to approximate it to some extent and have yielded good results, but are still quite computationally expensive. Here we build two metrics for recurrent neural networks having some of the key properties of the natural gradient, but at a computational cost closer to that of backpropagation through time. The resulting algorithm is first presented in Section 2 in its final form. The algorithm might look arbitrary at first sight, but is theoretically well-grounded; in Sections 3.1–3.5 we derive it step by step from the principles in [Oll13] adapted to a recurrent setting. This construction builds on the Riemannian geometry framework for neural networks from [Oll13]. The activities of units in the network are assumed to belong to a manifold: intuitively, they represent “abstract quantities” representable by numbers, but no preferred correspondence with R is fixed. This forces us to write only invariant algorithms which do not depend on the chosen numerical representation of the activities. Such algorithms are more impervious to design choices (e.g., changing the activation function from logistic to tanh has no effect); as a consequence, if they work well on one problem, they will tend to work well on rewritings of the same problem using different numerical representations. Thus, such algorithms are more “agnostic” as to physical meaning of the activities of the units (activation levels, activation frequencies, log-frequencies, ...). Remark 1. The three changes introduced above with respect to standard RNNs are independent and can be used separately. For instance, the metrics can be used for any network architecture. Remark 2. The approach is not specific to symbolic sequences: instead of transition parameters τijxt depending on the latest symbol xt , one can use transition weights which depend on the components of the latest input vector xt . 3 Remark 3. The gradient update proposed is independent of the training example management scheme (batch, online, small batches, stochastic gradient. . . ). Remark 4. The algorithm presented here is quadratic in network connectivity (number of connections per unit), and we have used it with very sparse networks (as few as 3 connections per unit), which apparently perform well. For non-sparse networks, a version with complexity linear in the number of connections, but with fewer invariance properties, is presented at the end of Section 2. Examples. Let us present a few examples of data that we have found can be efficiently learned by GLNNs. Other techniques that have been used to deal with such sequences include long short-term memory (LSTM) networks [HS97] (see for instance [Gra13] for a recent application using stacked LSTMs for text modelling) and echo state networks (ESN) [Jae02]. Here we do not have to engineer a particular network structure or to have prior knowledge of the scale of time correlations for initialization: in our experiments the network is a sparse random graph and parameter initialization is the same for all problems. Example 1 illustrates a type of operation frequent in natural languages (and artificial programming languages): in the course of a sequence, a subsequence is inserted, then the main sequence resumes back exactly where it was interrupted. This kind of structure is impossible to represent within a Markovian model, and is usually modelled with context-free grammars (the learning of which is still problematic). In this example, the main sequence is the Latin alphabet. Sometimes a subsequence is inserted which spells out the digits from 0 to 9. In this subsequence, sometimes a subsubsequence is inserted containing nine random (to prevent rote learning) capital letters (Example 1). abcdefghijklmnopqrs(01[HSATXUEUZ]2[OYNFIWWOR]345[ZYMBOMYBZ]6789)tuvwxyz abcde(01234567[FFRLCMKVI]89)fghijklmnopqrstuvwxyz ... Example 1: Inserting subsequences, a simple context-free grammar. Here the difficulty, both for HMMs and recurrent neural networks trained by ordinary backpropagation through time, is in starting again at the right point after the interruption caused by the subsequence. Example 2 is a pathological synthetic problem traditionally considered among the hardest for recurrent neural networks (although it can be represented by a simple finite automaton): the distant XOR problem. In a random binary sequence, two positions are marked at random (here with the symbol X), and the binary symbol at the end of each line is the logical 4 XOR of the two random bits following the X marks. Use of the XOR function prevents detecting a correlation between the XOR result and any one of the two arguments. 1 1 1 0 0X1 1X1 1 1 1 1 0 0 1 0 1 0 0 0 1 0 1 0 0 1=0 0X1X0 1 1 0 1 0 1 1 1 0 1 0 1 0 0 1 0 0 1 0 0 1 0 0=1 ... Example 2: Long-distance XOR. On this example, apparently the best performance for RNNs is obtained in [MS11]: with 100 random bits on each line, the failure rate is about 75%, where “failure” means that a run examines more than 50 million examples before reaching an error rate below 1% [MS11, legend of Figure 3]. Example 3 is synthetic music notation (here in LilyPond format1 ), meant to illustrate the intersection of several independent constraints. Successive musical bars are separated by a | symbol. Each bar is a succession of notes separated by spaces, where each note is made of a pitch (a, b, c, ...) and value (4 for a quarter note, 2 for a half note, 4. for a dotted quarter note, etc.). In each bar, a hidden variable with three possible values determines a harmony which restricts the possible pitches used in this bar. Harmonies in successive bars follow a specific deterministic pattern. Additionally, in each bar, the successive durations are taken from a finite set of possibilities (rhythms commonly encountered in waltzes). Rhythm is chosen independently from pitch and harmony. The resulting probability distribution is the intersection of all these constraints. c2 c4 | f4. a8 c4 | g4 b4 g8 d8 | g4. g8 g4 | e4 c4 c4 | ... Example 3: Synthetic music. This example can be represented as a Markov chain, but only using a huge state space. The “correct” representation of the constraints is more compact, which allows for efficient learning, whereas a Markov representation would essentially need to see every possible combination of rhythm and pitches to learn the underlying structure. Example 4 is the textbook example of sequences that cannot be represented by a finite automaton (thus also excluding an HMM): sequences of the form an bn . The sequence alternates blocks of random length containing only a’s and only b’s, with the constraint that the length of a b-block is equal to the length of the a-block preceding it. The blocks are separated with newlines. Seen as a temporal sequence, this exhibits long-term dependencies, especially if the block lengths used in the training sequence are long. GLNNs 1 http://lilypond.org/ 5 aaaaaaa bbbbbbb aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb aaaaaaaaaaaaaaaaaaaaaaaaaaa bbbbbbbbbbbbbbbbbbbbbbbbbbb ... Example 4: an bn are found to be able to learn this model within minutes with a training set of as few as 10 examples with the block lengths ranging in the thousands. Experiments for each of these examples are given in Section 4, both for GLNNs and more traditional RNNs: a GLNN or RNN network is trained on a single (long) training sequence2 and evaluated on an independent validation sequence, for a given computation time. More experiments attempt to isolate the respective contributions of the three changes introduced (leakiness, gatedness, and Riemannian training). Hidden Markov models, LSTMs, and classical text compression methods are included as a baseline. The code for these experiments can be downloaded at http://www.yann-ollivier.org/rech/cod 1 1.1 Definition of the models Generative models for sequential data A generative model for symbolic sequences is a model which produces an infinite random sequence of symbols (x0 , . . . , xt , . . .) over a finite alphabet A. The model depends on a set of internal parameters θ: each θ defines a probability distribution Prθ ((xt )t=0,1,... ) over the set of infinite sequences. Given an actual training sequence (xt ), the goal of learning is to find the value of θ that maximizes the probability of the training sequence (xt ): θ = arg max Prθ ((xt )t=0,1,... ) = arg max log Prθ ((xt )t=0,1,... ) θ = arg max θ (2) θ X t log Prθ (xt |x0 x1 . . . xt−1 ) (3) where the latter sum can usually be computed step by step. This value of θ is then used for prediction of future observations, generation of new similar sequences, or compression of the training sequence. 2 We chose a single long training sequence rather than several short sequences, first, to avoid giving the algorithms a hint about the time scales at play; second, because in some of the problems presented here, there are no marked cuts (music example), or finding the relevant cuts is part of the game (an bn example); third, because having several training sequences is not always relevant, e.g., if there is a single temporal stream of data. 6 The generative models considered here work in an iterative way. At each time step t, the system has an internal state. This internal state is used to compute a probability distribution πt over the alphabet. The symbol xt printed at time t is drawn from this distribution πt . Then the new internal state as time t + 1 is a deterministic or random function of the internal state at time t together with the symbol xt just printed. Computing the probability of an actual training sequence (xt ) can be done iteratively, by computing the probability π0 assigned by the model to the first symbol x0 , then revealing the actual value of x0 , using this x0 to compute the internal state at time 1, which is used to compute the probabilistic distribution of x1 , etc. (forward pass). In a variant of the problem, only some of the symbols in the sequence (xt ) have to be predicted, while the others are given “for free”. For instance, in a classification task the sequence (xt ) might be of the form y0 z0 y1 z1 y2 z2 . . . where for each instance yi we have to predict the corresponding label zi . In this case the problem is to find the θ maximizing the probability of those symbols to be predicted: θ = arg max θ where χt = 1.2 X t ( χt log Prθ (xt |x0 x1 . . . xt−1 ) 1 if xt is to be predicted, 0 otherwise. (4) (5) Recurrent neural network models We now present the recurrent network models discussed in this work. These include ordinary recurrent neural networks (RNNs), gated neural networks (GNNs), and leaky GNNs (GLNNs). Neural network–based models use a finite oriented graph N , the network, over a set of units. The internal state is a real-valued function over N (the activities), and edges in the graph indicate which units of the network at time t contribute to the computation of the state of units at time t + 1. At each time step t, each unit i in the network N has an activation level ati ∈ R. As is usual for neural networks, we include a special, alwaysactivated unit i = 0 with at0 ≡ 1, used to represent the so-called “biases”. The activation levels at time t are used to compute the output of the network at time t and the activation levels at time t + 1. This transition function is different for RNNs, GNNs, and GLNNs, as defined below (Sections 1.2.1– 1.2.3). For the output of the network we always use the softmax function: each unit i ∈ N (including i = 0) has time-independent writing weights wix for each symbol x in the alphabet A. At each time, the network outputs a 7 random symbol x ∈ A with probabilities given by the exponential of the writing weights weighted by the activation levels at that time: πt (x) := P P e ati wix i P y∈A e i ati wiy (6) where πt (x) is the probability to print x ∈ A. This allows any active unit to sway the result by using a large enough weight. One effect of this “nonlinear voting” is to easily represent intersections of constraints: If an active unit puts high weight on a subset of the alphabet, and another active unit puts high weight on another subset of the alphabet, only the symbols in the intersection of these subsets will have high probability. Thus, given the activities (ati )i∈N at time t, the network prints a random symbol xt drawn from πt . Then the network uses its current state and its own output xt to compute the activities at time t + 1: the (at+1 i ) are a t deterministic function of both the (ai )i∈N and xt . Given the writing weights wix , the model-specific transition function (depending on model-specific transition parameters τ ), and the initial activation levels a0i , the model produces a random sequence of symbols x0 , x1 , . . . , xt , . . .. Given a training sequence (xt ), the goal of training is to find parameters wix , τ and a0i maximizing the probability to print (xt ): Pr((xt )t=0,...,T −1 ) = TY −1 πt (xt ) (7) t=0 The parameters θ = (w, τ, a0 ) can be trained by gradient ascent θ ← θ + The gradient of the (log-)probability to print (xt ) with respect to the parameters can be computed by the standard backpropagation through time technique [RHW87, Jae02]. Appendix B describes backpropagation through time for the GLNN model (Proposition 11). However, here we will use gradient ascents in suitable, non-trivial metrics kθ − θ ′ k given by a symmetric, positive-definite matrix M (θ). The corresponding gradient ascent will take the form θ ← θ + ηM (θ)−1 ∂ log∂θPr(x) (see Section 3.1). These metrics are built in Sections 3.3–3.5 to achieve reparametrization invariance at a reasonable computational cost, based on ideas from [Oll13]. We first give the full specification for the three neural network models used. η ∂ log∂θPr(x) . 8 1.2.1 Recurrent Neural Networks In this article we use the following transition function to compute the RNN activation levels at step t + 1 (see for instance [Jae02]): Vjt+1 := ρjxt + X τij ati (8) i := s(Vjt+1 ), at+1 j (9) where s is a fixed activation function, xt ∈ A is the symbol printed at time t, and the sum runs over all edges ij in the network. The sum also includes the always-activated unit i = 0 to represent “biases”3 . The parameters to be trained are the input parameters ρjxt and the transition parameters τij . The parameter ρixt can equivalently be thought of as a connection weight from an input unit activated when reading xt . Two standard choices for the activation function are the logistic function s(V ) := eV /(1 + eV ) = 1/(1 + e−V ) and the hyperbolic tangent s(V ) := tanh(V ). Actually the two are related: one is obtained from the other by an affine transform of V and a. Traditional learning procedures would yield different results for these two choices. With the training procedures below using an invariant metric, using the tanh function instead of the logistic function would result in the same learning trajectory so that this choice is indifferent. To fix ideas, the experiments were implemented using tanh. 1.2.2 Gated Neural Networks GNNs are an extension of recurrent neural networks, in which the neural network transition function governing the new activations depends on the last symbol written. This is inspired by finite automata. Such models have also been used in [SMH11], the main difference being the non-linear softmax function (6) we use for the output. In GNNs the activation levels at step t + 1 are given by Vjt+1 := X ati τijxt (10) i := s(Vjt+1 ), at+1 j (11) where s is the same activation function as in RNNs. The sum includes the always-activated unit i = 0. In the above, xt ∈ A is the symbol printed at step t, and the parameters τijx are the transition weights from unit i to unit j given context x ∈ A: contrary to RNNs, τijx depends on the current signal x. This amounts 3 Biases are actually redundant in this case: the bias τ0i at unit i has the same effect as adding τ0i to all the input weights ρix for all symbols x, since at any time, one and exactly one symbol is active. Still, since backpropagation is not parametrization-invariant, using or not using these biases has an effect on learning. 9 to having an RNN with different parameters τ for each symbol x in the alphabet. (This is not specific to discrete-valued sequences here: a continuous vector-valued signal xt with components xkt could trigger the use of P k k xt τijk as transition coefficients at time t.) Hidden Markov models are GNNs with linear activation function [Bri90]: if we set s(V ) := V and if τijx is set to (HMM probability that unit i prints symbol x)× (HMM transition probability from i to j), then the GNN transition (10) yields the update equation for the HMM forward probabilities4 . If, in Paddition, we replace the softmax output (6) with a linear output πt (x) := t a w i i ix P where at i i wix is the HMM probability to write x in state i, then the GNN model exactly reduces to the HMM model.5 GNNs have more parameters than standard recurrent networks, because each edge carries a parameter for each letter in the alphabet. This can be a problem for very large alphabets (e.g., when each symbol represents a word of a natural language): even storing the parameters can become costly. This is discussed in [SMH11], where a factorization technique is applied to alleviate this problem. 1.2.3 Gated Leaky Neural Networks Gated leaky neural networks are a variation over GNNs which allow for better handling of some distant temporal dependencies. They are better understood by a detour through continuous-time models. In GNNs we have P Vjt+1 = i τijxt ati . One possible way to define a continuous-time analogue is to set dVjt X τijxt ati (12) = dt i and set atj = s(Vjt ) as before. See [Jae02] for “continuous-time” or “leaky” neural networks. This produces an “integration effect”: units become activated when a certain signal xt occurs, and stay activated until another event occurs. Importantly, the transition coefficient τiixt from i to i itself provides a feedback control. For this reason, in our applications, loops i → i are always included in the graph of the network. Here, contrary to the models in [Jae02], the differential equation is written over V which results in a slightly different equation for the activity a.6 4 More precisely ati becomes the probability to have emitted y0 , . . . , yt−1 and be in state i at time t, i.e., the HMM probabilities right before emitting xt but after the t − 1 → t state transition. 5 Conversely, any system of the form at+1 = F (at , xt ) and law(xt+1 ) = G(at+1 ), can be viewed as a Markov process on the infinite continuous space in which (at , xt ) take values. 6 Making V rather than a the leaky variable comes from looking for the simplest possible nonlinear dynamics in the context of differential geometry for neural networks [Oll13]. In full generality, if the activity unit j is a point aj in a manifold Aj , the continuous-time 10 Gated leaky neural networks are obtained by the obvious time discretization of this evolution equation. This is summed up in the following definition. Definition 5. A gated leaky neural network (GLNN) is a network as above, subjected to the evolution equation Vjt+1 := Vjt + X atj := s(Vjt ) τijxt ati , (13) i (where the sum includes the always-activated unit i = 0). The probability to output symbol x at time t is given by πt (x) := P P e ati wix i P y∈A e i ati wiy (14) Appendix A provides a further discussion of the integrating effect by studying the linearized regime. This is useful to gain an intuition into GLNN behavior and to obtain a sensible parameter initialization. 2 An algorithm for GLNN training In Section 3 we expose theoretical principles along which to build Riemannian algorithms for RNN, GNN and GLNN training. For convenience, we first collect here the explicit form of the final algorithm obtained for GLNNs, and discuss its algorithmic cost. The derivatives of the log-likelihood of the training data with respect to the writing and transition weights, can be computed using backpropagation through time adapted to GLNNs (Appendix B). These derivatives are turned into a parameter update θ ← θ + ηM (θ)−1 ∂ log Pr(x) ∂θ (15) through a suitable metric M (θ). We present two algorithmically efficient choices for M : the recurrent backpropagated metric (RBPM) and the recurrent unitwise outer product metric (RUOP metric). dynamics will be daj /dt = Fj ((ai )i→j , xt ) where Fj is a vector field on Aj depending on the activitives of units connected to j and on the current signal xt . Looking for dynamics with a simple form, it makes sense to assume that the vector-field–valued function Fj is the product of a fixed vector field Fj0 times a real-valued function of the of the ai , and that the latterPdecomposes as a sum of the influences of individual units i, namely: Fj ((ai )i→j , xt ) = ( i fi (ai , xt ))Fj0 . For one-dimensional activitives, if Fj0 does not vanish, there always exists a particular chart of the manifold Aj , unique up to an affine transform, in which Fj0 is constant: we call this chart Vj . Further assuming that fi (ai , xt ) decomposes as a product of a function of xt and a function of ai , namely fi (ai , xt ) = τi (xt )gi (ai ), we can set ai := gi (ai ), and we obtain the dynamics (12). Both variables V and a are thus recovered uniquely up to affine transform, respectively, as the variable that makes the time evolution uniform and the variable that makes the contribution of incoming units additive. 11 For the update of the writing weights wix , we use the quasi-diagonal reduction [Oll13, Sect. 2.3] of the Hessian or Fisher information matrix (the two coincide in this case) as the metric. Quasi-diagonal reduction is a process producing an update with algorithmic cost close to using only the diagonal of the matrix, yet has some of the reparametrization invariance properties of the full matrix. The expression for this metric on wix is worked out in Section 3.2. The metric M used for updating the transition weights τijx is built in Sections 3.3–3.5. First, in Section 3.3 we build a metric on recurrent networks from any metric on feedforward networks. This involves “time-unfolding” [RHW87, Jae02] the recurrent network to view it as a feedforward network with T times as many units (T being the length of the training data), and then summing the feedforward metric over time (Definition 6). In Sections 3.4 and 3.5 we carry out this procedure explicitly for two feedforward metrics described in [Oll13]: this yields the RUOP metric and the RBPM, respectively. Before starting the gradient ascent, the parameters of the network are initialized so that at startup, the activation of each unit over time is a random linear combination of the symbols xt observed in the recent past. As this latter point provides interesting insight into the behavior of GLNNs, we discuss it in Appendix A. Algorithm description. Training consists in adjusting the writing weights wix , transition weights τijx , and starting values Vi0 (used by the network at t = 0), to increase the log-likelihood of the training sequence (xt )t under the model. The variable χt encodes which symbols in the sequence have to be predicted: it is set to 1 if the symbol xt has to be predicted, and to 0 if xt is given. Namely, the problem to be solved is arg max w,τ,V 0 X χt log πt (xt ) (16) t where πt is the probability attributed by the network to the next symbol knowing x0 , . . . , xt−1 . For simplicity we work with a single (long) training sequence (xt )t=0,...,T −1 ; the algorithm can be extended in a straightforward manner to cover the case of several training examples, or mini-batches of training sequences (as in a stochastic gradient algorithm), simply by summing the gradients W , G and the metrics h̃, M̃ below over the training examples. The procedure alternates between a gradient step with respect to the wix , and a gradient step with respect to the τijx and Vi0 , with two distinct learning rates ηw and ητ . We describe these two steps in turn. It is important to start with an update of wix , otherwise the metric at startup may be singular. 12 In the following expressions, all sums over units i in the network N include the always-activated unit i = 0 with at0 ≡ 1. Gradient update for the writing weights wix . to the following steps. This is done according 1. Forward pass: Compute the activations of the network over the training sequence (xt )t=0,...,T −1 , using the GLNN evolution equations in Definition 5. 2. Compute the partial derivatives with respect to the writing weights: Wiy = X t χt ati (1xt =y − πt (y)) (17) 3. Compute the following terms of the Hessian (or Fisher information matrix) of the log-likelihood with respect to w, using hyii = εy + TX −1 t=0 hy0i = TX −1 t=0 χt (ati )2 πt (y)(1 − πt (y)), χt ati πt (y)(1 − πt (y)), i ∈ N, y ∈ A i 6= 0, y ∈ A (18) (19) where εy is a dampening term to avoid divisions by 0. We set εy to the frequency of y in the training sequence plus the machine epsilon. 4. Update the weights using the quasi-diagonal reduction of the inverse Hessian: wiy ←wiy + ηw w0y Wiy − W0y hy0i /hy00 hyii − (hy0i )2 /hy00 i 6= 0  (20)  W0y X hy0i Wiy − W0y hy0i /hy00  ←w0y + ηw  y − h00 hy hyii − (hy0i )2 /hy00 i6=0 00 (21) (These formulas may look surprising, but they amount to using weighted covariances over time between desired output and activity of unit i, rather than just sums over time [Oll13, Sect. 1.1]; the constant terms are transferred to the always-activated unit.) Gradient update for the transition weights τijx . This goes as follows. 1. Forward pass: Compute the activations of the network over the training sequence (xt )t=0,...,T −1 , using the GLNN evolution equations in Definition 5. 13 2. Backward pass: Compute the backpropagated values Bit for each unit i 6= 0 using   Bit = Bit+1 + s′ (Vit ) χt wixt − P y πt (y)wiy  + X j  τijxt Bjt+1  (22) initialized with BjT = 0. This is the derivative of data log-likelihood with respect to Vit . Here s′ is the derivative of the activation function. 3. Compute the following “modulus” m̃ti for each unit i 6= 0 at each time t. In the RUOP variant, simply set m̃ti = (Bit )2 (23) In the RBPM variant, set by induction from t + 1 to t:  m̃ti = s′ (Vit )2 χt  P 2 y πt (y)wiy 2 + 1 + τiixt s′ (Vit ) −( P 2 y πt (y)wiy )  m̃t+1 i + X j6=i  2  (τijxt ) m̃t+1 j (24) initialized with m̃Ti = 0. 4. For each unit j 6= 0, for each symbol y ∈ A, compute the following (jy) (jy) vector Gi and matrix M̃ii′ indexed by the units i with i → j in the network N , including i, i′ = 0. (jy) Gi = TX −1 1xt=y ati Bjt+1 (25) t=0 (this is the derivative of the log-likelihood with respect to τijx ) and (jy) M̃ii′ = TX −1 1xt=y ati ati′ m̃t+1 j (26) t=0 (jy) Dampen the matrix M̃ii′ by adding ε to the diagonal (we use ε = 1 which is small compared to the T terms in the sum making up M̃ ). 5. Set G(jy) ← (M̃ (jy) )−1 G(jy) (27) and update the transition weights with (jy) τijy ← τijy + ητ Gi for each j 6= 0 and y ∈ A. 14 (28) 6. Update the starting values Vj0 with Vj0 ← Vj0 + ητ Bj0 /(m̃0j + ε) (29) (this is obtained by analogy: this would be the update of τijy with i = 0 and y a special dummy symbol read at startup—consistently with the fact that m̃0j and Bj0 have not been used to update τ ). Initialization of the parameters. At startup, the network N is chosen as an oriented random graph with d distinct edges from each unit i, always including a loop i → i. For the tanh activation function, the parameters are set up as follows (see the derivation in Appendix A): w0y ← log νy , where νy = P wiy ← 0 (i 6= 0), (30) χt 1xt =y P is the frequency of symbol y among symbols to be χ t t t predicted in the training data (this way the initial model is an i.i.d. sequence with the correct frequencies). The transition parameters are set so that each unit’s activation reflects a random linear combination of the signal in some time range, as computed in Appendix A from the linearization of the network dynamics, namely τiiy ← −α, τijy ← 0 (i 6= j, i 6= 0) (31) and P µj (32) (ujy − y′ ν̃y′ ujy′ ) 4 where the uP jy are independent random variables uniformly distributed in 1x =y [0; 1], ν̃y = t T t is the frequency of symbol y in the data, and where τ0jy ← βj + µj = 1/(j + 1), α = 1/2, q βj = − α(α − µj ) (33) for unit j (j > 1) are adjusted to control the effective memory7 of the integrating effect at unit j (see Appendix A). These values apply to the tanh activation function. The initial activation values are set to Vj0 = s−1 (βj /α) with s−1 the inverse of the activation function. 7 In particular, any foreknowledge of the time scale(s) of dependencies in the sequence may be used to choose relevant values for µj . With our choice, from Appendix A the time scale for unit j is O(j) at startup, though it may change freely during learning. Multiple time scales for recurrent networks can be found in several places, e.g., [HB95, KGGS14]. 15 Learning rate control. Gradient ascents come with a guarantee of improvement at each step if the learning rate is small enough. Here we test at each step whether this is the case: If an update of the parameter decreases data log-likelihood, the update is cancelled, the corresponding learning rate (ηw or ητ ) is divided by 2, and the update is tried again. On the contrary, if the update improves data log-likelihood, the corresponding learning rate is multiplied by 1.1. This is done separately for the writing weights and transition weights. This is a primitive, less costly form of line search8 . At startup the value ηw = ητ = 1/N (with N the number of units) seems to work well in practice (based on the idea that if each unit adapts its writing weights by O(1/N ) then the total writing probabilities will change by O(1)). Computational complexity. If the network connectivity d (number of edges i → j per unit j) is not too large, the cost of the steps above is comparable to that of ordinary backpropagation through time. Let N be the network size (number of units), A the alphabet size, T the length of the training data, and d the maximum number of edges i → j per unit j in the network. The cost of one forward pass is O(N T d) for computing the activities and O(N T A) for computing the output probabilities. The cost of computing the quantities Wiy is O(N T A) as well, as is the cost of computing the Hessian values hy . Applying the update of w costs O(N A). Thus the cost of the w update is O(N T (d + A)). Computing the backpropagated values Bjt costs O(N T (d+ A)). The cost of computing the backpropagated modulus m̃ti is identical. (jy) The cost of computing the gradients Gi is O(N T d) (note that each time t contributes for only one value of y, namely y = xt , so that there is no A factor). (jy) The costliest operation is filling the matrices M̃ii′ . For a fixed j and y this matrix is of size d × d. Computing the entries takes time O(T d2 ) for each j, hence a total cost of O(N T d2 ). (Once more, each time t contributes for only one value of y so that there is no A factor.) Inverting the matrix has a cost of O(N d3 ): as this requires no sum over t, this is generally negligible if T ≫ d. Thus, the overall cost√(if T ≫ d) of one gradient √ step is O(N T (d2 + A)). This suggests using d ≈ A. In particular if d = O( A) the overall cost is the same as backpropagation through time. If network connectivity is large, there is the possibility to use the quasidiagonal reduction of the matrices M̃ , as described in [Oll13, Sect. 2.3]. This 8 Experimentally, this leads to some slight oscillating behavior when the learning rate gets past the optimal value (as is clear for a quadratic minimum). This might be overcome by averaging consecutive gradient steps. 16 (jy) requires computing only the terms M̃ii′ with i = i′ or i = 0. This removes the d2 factor and also allows for O(d) inversion, as follows. Non-sparse networks: quasi-diagonal reduction. The algorithm above must maintain a matrix of size d×d for each unit i, where d is the number of units j pointing to i in the network. When d is large this is obviously costly. The quasi-diagonal reduction process [Oll13, Sect. 2.3] provides a procedure linear in d while keeping most invariance properties of the algorithm. This is the procedure already used for the writing weights wiy in (20)–(21). Essentially, at each unit j, the signals received from units i → j are considered to be mutually orthogonal, except for those coming from the always-activated unit i = 0. Thus only the terms M̃ii and M̃0i of the matrix are used. The update of the transition parameters τijy becomes as follows. 1. For each unit j ∈ N and each symbol y ∈ A, compute the vector G(jy) (jy) (jy) (jy) as before. Compute only the terms M̃00 , M̃ii , and M̃0i of the (jy) (jy) matrix M̃ (jy) in (26). Dampen the diagonal terms M̃00 and M̃ii as before. 2. Update the transition weights τijy with (jy) τijy ←τijy + ητ τ0jy ←τ0jy + 3 Gi (jy) M̃ii  (jy) − G0 (jy) (jy) M̃0i /M̃00 (jy) i 6= 0 (jy) − (M̃0i )2 /M̃00 (jy) G ητ  0(jy) M̃00 − (34) X M̃ (jy) G(jy) − G(jy) M̃ (jy) /M̃ (jy) 0 00 i 0i 0i i6=0 (jy) M̃00 (jy) M̃ii (jy) (jy) − (M̃0i )2 /M̃00   (35) Constructing invariant algorithms for recurrent networks We now give the main ideas behind the construction of the algorithm above. The approach is not specific to GLNNs and is also valid for classical recurrent networks. 3.1 Gradients and metrics Backpropagation performs a simple gradient ascent over parameter space to train a network. However, for GLNNs (at least), this does not work well. One reason is that gradient ascent trajectories depend on the chosen numerical representation of the parameters. For instance, a non-orthogonal change of basis in parameter space will yield different learning trajectories; yet such changes can result from simple changes in data representation (see the introduction of [Oll13]). 17 This is clear from the following viewpoint. Given a real-valued function f to be maximized depending on a vector-valued parameter θ, the gradient ascent update ∂f θ′ = θ + η (36) ∂θ with learning rate η, can be viewed, for small η, as a maximization of f penalized by the change in θ, namely 1 θ − θ′ θ ≈ arg max f (θ ) − ′ 2η θ ′  ′ 2  (37) where the equality holds up to an approximation O(η 2 ) for small η. The term kθ − θ ′ k2 defines a “cost” of changing θ. Clearly, different ways to represent the parameter θ as a vector will yield different costs kθ − θ ′ k2 . For instance, a linear change of basis for θ amounts to replacing kθ − θ ′ k2 with (θ − θ ′ )⊤M (θ − θ ′ ) with M a symmetric, positivedefinite matrix. The associated gradient update will then be θ ′ = θ + ηM −1 ∂f ∂θ (38) which is the general form of a gradient ascent when no privileged norm or basis is chosen for the parameter vector θ. Moreover, in general the matrix M may depend on the current value of θ, defining a (Riemannian) metric in which the norm of an infinitesimal change θ → θ + δθ of the parameter θ is kδθk2 = δθ⊤M (θ)δθ (39) The gradient ascent update defined by such a metric is thus θ ′ = θ + ηM (θ)−1 ∂f ∂θ (40) A suitable choice of M can greatly improve learning, by changing the cost of moving into various directions. Amari, in particular, advocated the use of the “natural gradient” for learning of probabilistic models: this is a norm kθ − θ ′ k2nat which depends on the behavior of the probability distribution represented by θ, i.e., the output probabilities of the network, rather than on the way θ is decomposed as a set of numbers. Thus the natural gradient provides invariance with respect to some arbitrary design choices. (As a consequence, learning does not depend on whether a logistic or tanh is used as the activation function, for instance, since one can be changed into the other by a change of variables.) In [Oll13] we introduced several metrics for feedforward neural networks sharing this key feature of the natural gradient, at a lesser computational cost. The main idea is to define the metric according to what the network does, rather than the numerical values of the parameters. We now show how these can be used to build invariant metrics for recurrent networks. 18 3.2 The Fisher metric on the output units and writing weights Whole-sequence Fisher metric and conditional Fisher metric. Metrics for neural networks first rely on choosing a metric on the output of the network [Oll13]. Here the network’s output is interpreted as a probability distribution on the sequence (xt ) printed by the network. Amari’s natural gradient and the metrics we use are both based on the Fisher metric [AN00] on the space of probability distributions. One way to define the Fisher metric is as an infinitesimal Kullback–Leibler divergence between two infinitesimally close probability distributions on the same set. For recurrent neural networks, there is a choice as to which probability distribution should be considered. One can either view the network as defining a probability distribution Pr over all output sequences (x0 , . . . , xt , . . .), or equivalently as defining a sequence of conditional probability distributions πt for the next symbol xt knowing the previous symbols. Thus there are two ways to define a divergence on the parameter θ based on Kullback–Leibler divergences for finite-length output sequences (xt )06t6T . One is D1 (θ, θ ′ ) := KL(Prθ (x0 , . . . , xt , . . .) || Prθ′ (x0 , . . . , xt , . . .)) (41) where Prθ is the probability distribution over the set of all sequences (x0 , . . . , xt , . . .) defined by the network with parameter θ. The other depends on the actual training sequence x and is D2 (θ, θ ′ ) := X t = X t KL(Prθ (xt |x0 , . . . , xt−1 ) || Prθ′ (xt |x0 , . . . , xt−1 )) (42) KL πt || πt′ (43)  where πt (resp. πt′ ) is the probability distribution on the next symbol xt defined by the network with parameter θ (resp. θ ′ ) knowing past observations x0 , . . . , xt−1 . Arguably, D2 is more adapted to prediction or (online) compression, while D1 is better suited for generalization and learning. For instance, if the actual training sequence starts with the letter a, a gradient ascent based on D2 will not care how a change of θ affects the probability of sequences starting with a b. Assuming that the training sequence (xt ) has actually been sampled from Prθ and is long enough, and under reasonable stationarity and ergodicity assumptions for Prθ , D2 should be a reasonable approximation of D1 .9 9 Indeed one has D1 = Ex∼Prθ ln Prθ (x) Prθ′ (x) = Q Ex∼Prθ ln Q t Prθ (xt |x0 ...xt−1 ) Prθ′ (xt |x0 ...xt−1 ) = t P P Prθ (xt |x0 ...xt−1 ) Prθ (xt |x0 ...xt−1 ) E E E ln = = x∼Pr x ∼Pr (x |x ...x ) ln Pr ′ (xt |x0 ...x (x ...x )∼Pr t t 0 0 θ t−1 t−1 θ θ Prθ′ (xt |x0 ...xt−1 ) t t−1 ) θ Pt KL(Prθ (xt |x0 . . . xt−1 ) || Prθ′ (xt |x0 . . . xt−1 )) so that if averaging over E t (x0 ...xt−1 )∼Prθ t in the actual training sequence is a good approximation of averaging over t for a Prθ -random sequence, then D1 and D2 are close. 19 However, in a learning situation, it may not be reasonable to assume that (xt ) is a sample from Prθ until the training of θ is finished. So we do not assume that D1 ≈ D2 . Algorithmically, when an actual training sequence x is given, the conditional divergence D2 is much easier to work with, because it can be computed in linear time, whereas computing D1 would require summing over all possible sequences, or using a Monte Carlo approximation and sampling a large number of sequences. For these reasons, we will define a metric based on D2 , i.e., on the Fisher metric on the successive individual distributions πt . Fisher metric on the output units. At each time step, the output of the network is a probability distribution over the alphabet A. The set of these probability distributions is naturally endowed with the Fisher metric: the square distance between two infinitesimally close probability distributions π and π + δπ is kδπk2nat := 2KL(π || π + δπ) = X (δπ(x))2 x∈A π(x) (44) = Ex∼π (δ log π(x))2 (45) at second order, where δ log π(x) = δπ(x)/π(x) is the resulting variation of log π(x). In the networks we consider, at each step the distribution πt for the next symbol is given by a softmax output πt (x) = P P e ati wix i P y∈A e i for each x in the alphabet A. Let us set Eyt := t Eyt ′ (46) ati wiy P i ati wiy , so that πt (y) = eEy / e . Then the norm kδπt knat of a change δπt resulting from a change δE t in the values of E t is, by standard arguments for exponential families, found to be X X (47) πt (y)(δEyt )2 − πt (y)πt (y ′ )δEyt δEyt ′ kδπt k2nat = P y y,y ′ (see Appendix C). By a property of exponential families, this is also, for any y ′′ , the Hessian of − log πt (y ′′ ) with respect to the variables E t . In particular, in this situation, for the parameters w, the natural gradient with learning rate 1 coincides with the Newton method. Metric over the writing coefficients. We can now compute the natural metric over the writing coefficients wix . Let δwix be an infinitesimal change 20 in the parameters wix : this creates a change δπt in the distribution πt , for all t. By the discussion above, we are interested in the quantity X t kδπt k2nat (48) Changing the writing weights wix does not change the activities of units P in the network. Consequently, we have δEyt = i ati δwiy . Thus the above yields X t kδπt k2nat = XXX t y,y ′ i,i′ πt (y ′ )(1y′ =y′′ − πt (y ′′ ))ati ati′ δwiy δwi′ y′ (49) so that the metric t kδπt k2nat over the parameters wiy is given by the Fisher matrix X (50) πt (y ′ )(1y′ =y′′ − πt (y ′′ ))ati ati′ Iwiy wi′ y′ = P t which is also, up to sign, the Hessian of the log-likelihood of the training sequence with respect to the parameters w. This is a full matrix whose inversion can be costly. The update of the parameters wiy given in Section 2 corresponds to the quasi-diagonal inverse of this metric, whose only non-zero terms correspond to y = y ′ and i = i′ or i = 0. By [Oll13, Sect. 2.3], the quasi-diagonal inverse respects invariance under affine reparametrization of the activities of each unit. 3.3 Invariant metrics for recurrent networks The natural gradient arising from the whole-network Fisher metric is algorithmically costly to compute for neural networks (though the “Hessianfree” conjugate gradient method introduced in [Mar10, MS11, MS12] approximates it). We now introduce metrics for recurrent networks that enjoy some of the main properties of the Fisher metric (in particular, invariance with respect to a number of transformations of the parameters or of the activities), at a computational cost close to that of backpropagation through time. Any invariant metric for feedforward networks can be used to build an invariant metric for recurrent networks, by first “time-unfolding” the network as in backpropagation through time [RHW87, Jae02], and then by defining the norm of a change of parameters of the recurrent network as a sum over time of the norms of corresponding changes of parameters at each time in the time-unfolded network, as follows. A recurrent neural network with n units, working on an input of length T , can be considered as an ordinary feedforward neural network with nT units with shared parameters [RHW87, Jae02]. We will refer to it as the timeunfolded network. In the time-unfolded network, a unit is a pair (i, t) with i a unit in the original network and t a time. The unit (i, t) directly influences 21 the units (j, t + 1) where i → j is an edge of the recurrent network. We also consider the output distribution πt at time t as a (probability distribution– valued) output unit of the time-unfolded network, directly influenced by all time-unfolded units (i, t). If all time-unfolded units (i, t) use the same parameters θi as the corresponding unit i in the recurrent network, then the behaviors of the timeunfolded and recurrent networks coincide. Thus, let us introduce dummy time-dependent parameters θit for unit (i, t) of the time-unfolded network, and decide that the original parameter θi for unit i in the recurrent network is a “meta-parameter” of the time-unfolded network, which sets all dummy parameters to θit = θi . We are now ready to build a metric on recurrent networks from a metric k·k on feedforward networks. A variation δθ of the parameters of the recurrent network determines a variation δθ t of the (dummy) parameters of the time-unfolded network, which is an ordinary feedforward network. Thus we can simply set kδθk2 := X δθ t 2 (51) t where for each t, δθ t is a variation of the parameters of an ordinary feedforward network, for which we can use the norm δθ t . If the metric used on the time-unfolded network is reparametrizationinvariant, then so will be the metric on the recurrent network (since its definition does not use any choice of coordinates). Using this definition for kδθk is actually the same as making independent gradient updates δθ t for each θ t based on the metric δθ t , then projecting the resulting update onto the subspace where the value of θ t does not depend on t (where the projection is orthogonal in the metric k·k). Equivalently, this amounts to making independent updates for each θ t and then finding the P 2 time-independent update δθ minimizing t δθ t − δθ .10 Thus, we can use any of the metrics mentioned in [Oll13] for feedforward networks. Two will be of particular interest here, but other choices are possible; in particular, in case network connectivity is high, quasi-diagonal reduction [Oll13, Sect. 2.3] should be used. Definition 6. Let k·kff be a metric for feedforward networks. The recurrent metric associated with k·kff is the metric for recurrent network parameters defined by kδθk2rff := X 10 t δθ t 2 ff (52) For these equivalent interpretations, one has to assume that there is more than one training sequence. Indeed, for typical choices of the feedforward network metric δθt , with only one training sequence the metric δθt on each individual θt is only of rank one, hence the corresponding update of θt is ill-defined. On the other hand, even with only one training sequence, the metric on δθ is generally full-rank, being a sum over time of rank-one metrics. 22 namely, by summing over time the metric k·kff on the time-unfolded network. The recurrent backpropagated metric (RBPM) is the norm k·krbp on a recurrent network associated with the backpropagated metric k·kbp on the time-unfolded network. The recurrent unitwise outer product metric (RUOP metric) is the norm k·kruop associated with the unitwise outer product metric k·kuop on the timeunfolded network. The latter two metrics are described in more detail below. Both of them are “unitwise” in the sense that the incoming parameters to a unit are orthogonal to the incoming parameters to other units, so that the incoming parameters to different units can be treated independently. (Given a unit k in the network, we call incoming parameters to k the parameters directly influencing the activity of unit k, namely, the weights of edges leading to k and the bias of k.) Remark 7. We shall use these metrics only for the transition parameters τ of recurrent networks and GLNNs. For the writing parameters w, the Hessian, or equivalently the Fisher metric, is easily computed (Section 3.2) and there is no reason not to use it. Remark 8 (Multiple training sequences). Definition 6 is given for a single training sequence (xt ). In the case of multiple training sequences, one has to first compute the metric for each sequence separately (since the time-unfolded networks are different if the training sequences have different lengths) and then define a metric by averaging the square norm kδθk2rff over the training dataset, as in [Oll13]. There is a choice to be made as to whether training sequences of different lengths should be given equal weights or weights proportional to their lengths; the relevant choice arguably depends on the situation at hand. Remark 9 (Natural metric and recurrent natural metric). The natural metric of a recurrent network is defined in its own right and should not be confused with the recurrent-natural metric obtained by applying Definition 6 to the natural metric of the time-unfolded network. For the natural metric of the recurrent network, the norm of a change of parameter δθ is the norm of the change it induces on the network outputs πt . For the recurrent-natural metric, the square norm of δθ is the sum over time t, of the square norm of the change induced on the output by a change δθ t = δθ of the dummy parameter θ t, so that the influence of δθ is decomposed as the sum of its influences on each dummy parameter δθ t considered independently. (Still, the influence of θ t on the output at times t′ > t is taken into account.) Explicitly, if πt is the network output at time t, then the natural norm is kδθk2nat = composing ∂πt ∂θ = P P t t′ 6t ∂πt ∂θ δθ ∂πt ∂θ t′ 2 where k·k is the norm on the outputs πt . De- this is P t  P 23 t′ 6t ∂πt ∂θ t′  2 δθ . On the other hand the recurrent-natural norm is kδθk2rnat = P ′ t′ δθ t 2 nat = P P t′ t>t′ ∂πt ∂θ t 2 δθ ′ which is generally different and accounts for fewer cross-time dependencies. We now turn to obtaining more explicit forms of these metrics for the case of GLNNs. We describe, in turn, the RUOP metric and the RBPM. For simplicity we will assume that all symbols in the sequence have to be predicted (χt ≡ 1). Section 2 includes the final formulas for the general case. 3.4 The recurrent unitwise outer product metric Let us now describe the recurrent unitwise outer product metric (RUOP metric) in more detail. We briefly recall the definition of the (non-recurrent) unitwise outer product metric. Suppose we have a loss function L depending on a parameter θ, and moreover that L decomposes as a sum or average L = Ex∈D ℓ(x) of a loss function ℓ over individual data samples x in a dataset D. The outer products of the differentials ∂ℓ(x) ∂θ , averaged over x, provide a metric on θ, ∂ℓ(x) ∂ℓ(x) namely, Ex∈D ∂θ ⊗ ∂θ given by the matrix Cij = Ex∈D ∂ℓ(x) ∂ℓ(x) ∂θi ∂θj (53) This is the outer product (OP) metric on θ. The associated gradient ascent for L, with step size θ, is thus θ ← θ + ηC −1 ∂L ∂θ , and this gradient direction is parametrization-invariant. (One must be careful that scaling L by a factor λ will result in scaling this gradient step by 1/λ, which is counter-intuitive, thus step-size for this gradient must be carefully adjusted.) When the loss function ℓ is the logarithmic loss ℓ(x) = log Prθ (y|x) of a probabilistic model Prθ (y|x), as is the case for feedforward networks with y θ (y|x) θ (y|x) ⊗ ∂ log Pr is the desired output for x, then the OP metric Ex∈D ∂ log Pr ∂θ ∂θ a well-known approximation to the Fisher metric (for the latter, y would be sampled from the output of the network seen as a probability distribution, instead of using only the target value of y). In this context it has been used for a long time [APF00, RMB07]—sometimes under the name “natural gradient”, though it is in fact distinct from the Fisher metric, see discussion in [PB13] and [Oll13]. The OP metric has the following unique property: For a given increment δL in the value of L, the OP gradient step is the one for which the increment is most uniformly spread over all samples x ∈ D, in the sense that the variance Varx∈D δℓ(x) is minimal [Oll13, Prop. 15]. For feedforward networks, the OP metric is given by a full matrix on parameter space. This is computationally unacceptable for large networks; a more manageable version is the unitwise OP metric (UOP metric), in which 24 the incoming parameters for each unit are made orthogonal [Oll13]. The unitwise OP metric is still invariant under reparametrization of the activities of each unit. This decomposition is also used in [RMB07] (together with a further low-rank approximation in each block which breaks invariance). The recurrent UOP metric is obtained from the UOP metric by Definition 6, through summing over time in the time-unfolded network. Let i be a unit in the recurrent network, and let θi be the set of incoming parameters to i. A change δθi in θi results in a change δθit of all the dummy parameters θit of units (i, t) in the time-unfolded network. The square norm of δθi in the RUOP metric is, by definition (52), the sum over t of the square norms of δθit in the UOP metric of the time-unfolded network. For each t and each unit i, the unitwise OP metric on the dummy parameter θit is given by the outer product square of the associated change of the Prθ (x) . objective function log Prθ (x), namely, the outer product square of ∂ log∂θ t i Now θit is a dummy parameter of the time-unfolded network, and is used exactly once during computation of the network activities, namely, only at time t to compute the activity Vit and ati = s(Vit ) of unit i. Thus we have t ∂ log Prθ (x) ∂Vit ∂ log Prθ (x) t ∂Vi = = B i ∂θit ∂Vit ∂θit ∂θit (54) where the derivatives Bit := ∂ log∂VPrtθ (x) are computed in the usual way by i backpropagation through time (Appendix B). ∂V t The partial derivative ∂θit is readily computed from the evolution equai tion defining the network: for instance, for GLNNs, the evolution equation of the time-unfolded network (using dummy parameters) is Vit = Vit−1 + P t t−1 t t j τjixt−1 aj , so that the derivative of Vi w.r.t. the parameter τjiy is 1y=xt−1 at−1 j . The unitwise OP metric for the dummy parameter θit is given by the ∂V t ∂V t Prθ (x) , which by the above is (Bit )2 ∂θit ⊗ ∂θit . outer product square of ∂ log∂θ t i i i This has to be summed over time to find the recurrent UOP metric for the true parameter θi . So in the end, the RUOP metric for the incoming parameters θi at unit i is given for each i by the matrix (i) M̃kk′ = (Bit )2 X t ∂Vit ∂Vit ∂(θit )k ∂(θit )k′ (55) where (θit )k denotes the k-th component of the parameter θit , and where the derivative is with respect to the dummy parameter θit used only at time t. For GLNNs, this results in the expression given in the algorithm of Section 2: In the end, for the GLNN transition parameter θ = (τjiy )j,i,y , using t−1 t =1 that ∂Vit /∂τjiy y=xt−1 aj , the recurrent UOP metric is kδθk2ruop = XXX i j,j ′ t (Bit+1 )2 atj atj ′ δτjix δτjt′ ixt t t 25 (56) The same expression holds for GNNs (but B has a different expression). The form of the metric. Thus, we find that the RUOP metric on τ is given by a symmetric matrix with the following properties. These remarks also hold for the other metric we use, the RBPM below. First, different units i are orthogonal (there are no cross-terms between δτjix and δτj ′ i′ x′ for i 6= i′ ). Second, for GNNs and GLNNs, different symbols x are independent: the transition parameters τijx and τijx′ with x 6= x′ are mutually orthogonal in the RUOP metric, i.e., there are no cross-terms for x 6= x′ . This is because, at any given time t, only the parameters τjixt using the currently read symbol xt contribute to the evolution equation. This results in a separate matrix M̃ (ix) for each pair ix in the final algorithm, reducing computational burden. On the other hand, for RNNs with the evolution equation at+1 = s(ρixt + i P t j τji aj ), there is no such block decomposition because the transition parameters τij have non-trivial scalar product with all the input parameters ρix for all x; thus, handling this metric would be quadratic in alphabet size. If alphabet size is large, one solution is to restrict input to a subset of units. Another is to use quasi-diagonal reduction [Oll13, Sect. 2.3] to obtain a more lightweight but still invariant algorithm; this was tested in Section 4. Third, different units j and j ′ connected to the same unit i are not independent. (In particular, the “biases” τ0ix corresponding to the alwaysactivated unit j = 0, aj ≡ 1 are not orthogonal to the other transition weights.) The cross-term between δτjix and δτj ′ ix is X 1xt=x atj atj ′ (Bit+1 )2 (57) t Besides, the derivative of log-likelihood with respect to τjix is t 1xt =x atj Bit+1 (Proposition 11), and the gradient step is obtained by applying the inverse of the matrix above to this derivative. This problem has an interesting structure. Indeed, vectors obtained as M −1 G where M is a matrix of the P P form Mjk = t atj atk ct , and G of the form Gj = t atj Y t , are weighted leastsquare regression problems: M −1 G gives the best way to write the vector Y t /ct , seen as a function of t, as a linear combination of the family atj , seen as functions of t. This is the “best-fit” interpretation [Oll13, Section 3.3]. Thus, using metrics of this form, each unit i in the network combines the signals from its incoming units j in an optimal way to match a desired change in activity (given by Bit ) over time. The two metrics presented here, RUOP and RBPM, differ by the choice of the weighting ct . P Remark 10 (UOP metric and recurrent UOP metric). The recurrent unitwise OP metric should not be confused with the unitwise OP metric applied to the recurrent network, which is defined in its own right but unsuitable for several reasons. For instance, with only one training sequence 26 x, the OP metric for the recurrent network is simply ∂ log∂θPr(x) ⊗ ∂ log∂θPr(x) , which is a rank-1 matrix and thus not invertible. On the other hand, on a single training sequence of length T , the recurrent UOP metric is a sum of T matrices of rank 1. Thus for a recurrent network, k·kruop 6= k·kuop in general: one is a time sum of outer product squares, the other is the outer product square of a time sum. (Compare Remark 9.) So the recurrent UOP metric performs an averaging of the metric over time rather than over samples, as is expected in a recurrent setting. Another similar-looking metric would be the OP metric associated with P P the decomposition log Pr(x) = t log πt (xt ) t log Pr(xt |x0 , . . . , xt−1 ) = of the objective function. Such a decomposition gives rise to a metric P ∂ log πx (xt ) ⊗2 ) . This metric is generally full-rank even for a single training t( ∂θ P sequence. The recurrent OP metric, on the other hand, is t ( ∂ log∂θPr(x) )⊗2 . t So while the recurrent OP is the sum over time of the effect of the dummy time-t parameter θ t on the objective function, the metric just introduced is the sum over time of the effect of the parameter θ on the t-th component of the objective function. These are generally different. Computing all partial πx (xt ) for all t and θ is algorithmically costlier, which is why derivatives ∂ log∂θ we did not use this metric. 3.5 The recurrent backpropagated metric We now work out an explicit form for the recurrent backpropagated metric. For a feedforward network, the backpropagated metric (BPM), introduced in [Oll13], is defined as follows. Given a metric on the output units of a network (here the Fisher metric on πt ), one can inductively define a metric on every unit by defining the square norm kδai k2bp of a change of activity P δai at unit i, as the sum j, i→j kδaj k2bp of the square norms of the resulting changes in activity at units j directly influenced by i, thus “backpropagating” the definition of the metric from output units to inner units. The metric kδaj k2bp at unit j is then turned into a metric on the incoming parameters to j, by setting kδθj k2bp := kδaj k2bp with δaj the change of aj resulting from the change δθj . The recurrent BPM is obtained from the BPM by Definition 6, through summing over time in the time-unfolded network. Let i be a unit in the recurrent network, and let θi be the set of incoming parameters to i. A change δθi in θi results in a change δθit of all the dummy parameters θit of units (i, t) in the time-unfolded network. The square norm of δθi in the RBPM is, by definition (52), the sum over t of the square norms of δθit in the backpropagated metric metric of the time-unfolded network. So let us work out the backpropagated metric in the time-unfolded network. The time-unfolded unit (i, t) directly influences the time-unfolded units (j, t + 1) for all edges i → j in the graph of the original network, and 27 it also directly influences the distribution πt at time t. Thus, let δati be an infinitesimal change in the activity of time-unfolded unit (i, t). Let δπt be the resulting change in the probability distribution πt , ∂at+1 and δat+1 = ∂aj t δati the resulting change in the activity of time-unfolded j i unit (j, t + 1). The BPM is obtained by backwards induction over t δati 2 bp := kδπt k2nat + δat+1 j X j 2 (58) bp The term kδπt k2nat is readily computed from Section 3.2: in the notation P above, the change in Eyt = j wjy atj from a change of activity in ati is δEyt = wiy δati , so that (47) yields kδπt k2nat = (δati )2 P 2 y πt (y)wiy −( P 2 y πt (y)wiy )  (59) i.e., proportional to the πt -variance of wiy (in line with the fact that translating weights does not change output). Since activities are one-dimensional, the backpropagated metric is simply 2 proportional to δati , so that we have 2 δati bp  2  X =: mti δati (60) for some positive number mti , the backpropagated modulus [Oll13]. The definition (58) of the backpropagated metric thus translates as mti = P 2 y πt (y)wiy −( P 2 y πt (y)wiy ) + ∂at+1 j ∂ati j !2 mt+1 j (61) (initialized with mTi = 0), in which one recognizes a source term from the output at time t, and a term transmitted from t + 1 to t. It is advisable to express the backpropagated metric using the variable Vit ∂V t+1 rather than ati (because the expression for ∂Vj t is simpler). The variables i V and a correspond bijectively to each other, and their variations are related 2  2 by δati = s′ (Vit )δVit so that δati bp = mti δati = m̃ti δVit with m̃ti := mit s′ (Vit )2 (62) from which we derive the induction equation for m̃, namely m̃ti =s ′ (Vit )2 P 2 y πt (y)wiy −( P 2 y πt (y)wiy ) in which we can now easily compute the equation defining the recurrent network. 28  + ∂Vjt+1 ∂Vit X j ∂Vjt+1 ∂Vit !2 m̃t+1 (63) j term from the evolution For instance, for GLNNs we have Vjt+1 = Vjt + P t i τijxt s(Vi ) so we find ∂Vjt+1 = 1i=j + τijxt s′ (Vit ) ∂Vit (64) which, plugged into the above, yields the explicit equation (24) given in the algorithm description. Once the backpropagated modulus is known, the backpropagated metric on the dummy parameters θit at each unit (i, t) of the time-unfolded network ∂at is obtained by δθit bp := δati bp where δati = ∂θti .δθit is the variation of ati i resulting from a variation δθit . Thus 2 δθit bp = mti ∂ati t .δθ ∂θit i !2 = m̃ti ∂Vit t .δθi ∂θit !2 (65) ∂V t where, as in the case of the RUOP metric above, the derivative ∂θit can be i obtained from the evolution equation defining the network. In components, 2 δθit bp is thus given by a matrix whose kk′ entry is m̃ti ∂Vit ∂Vit ∂(θit )k ∂(θit )k′ (66) where (θit )k denotes the k-th component of the incoming parameter θit to unit i. A parameter θi of the recurrent network influences all dummy parameters t θi for all t. The recurrent backpropagated metric is obtained by summing the backpropagated metric over time as in (52). So in the end the recurrent backpropagated metric for the incoming parameter θi to unit i is given by the matrix X ∂Vit ∂Vit (i) (67) m̃ti M̃kk′ = ∂(θit )k ∂(θit )k′ t with (θit )k the k-th component of θit , and where the derivative is with respect to the dummy parameter θit used only at time t. For instance, in GLNNs, the incoming parameter to unit i is θi = (τjiy )j,y . P t at−1 using the dummy paramThe evolution equation Vit = Vit−1 + j τjix t−1 j eters yields ∂Vjt t ∂τjiy = 1xt−1=y at−1 j . This results in the expression given in the algorithm of Section 2. In the end, for the GLNN parameter θ = (τjiy )j,i,y , the recurrent backpropagated metric is kδθk2rbp = XXX i j,j ′ t t m̃t+1 i aj aj ′ δτjixt δτj ′ ixt (68) t The structure of this metric is the same as for the RUOP metric above, and the same remarks apply (see Section 3.4): incoming parameters to distinct units i are independent; parameters corresponding to distinct symbols 29 y 6= y ′ are independent for GNNs and GLNNs but not for RNNs; finally, the transition parameters from different units j and j ′ incoming to the same unit i are not independent, and the gradient ascent in this metric realizes, at each unit i, a weighted least-square regression on the incoming signals from units j to best match a desired activation profile given by the backpropagation values. 3.6 Invariance of the algorithms Amari [Ama98, AN00] pioneered the use of “invariant” algorithms for statistical learning that do not depend on a chosen numerical representation (parametrization) of the parameter space of the model. Invariance can often improve performance; for instance, in the standard RNNs in the experiments below, replacing the standard inverse diagonal Hessian with the (invariant) quasi-diagonal inverse brings performance of RNNs closer to that of GLNNs, at very little computational cost. The gradient ascent presented above is invariant by reparametrization of the activities and by reparametrization of the incoming parameters to each unit (but not by reparametrizations mixing incoming parameters to different units, as the natural gradient is). This stems from its construction using a metric which depends only on the behavior of the network. For instance, using tanh instead of sigmoid activation function and following the same procedure would result in an algorithm with identical learning trajectories. However, in practice three factors limit this invariance. 1. The invariance holds, in theory, only for the continuous-time gradient trajectories. The actual gradient steps with non-zero learning rate are only approximately invariant when the learning rate is small. Still, the actual gradient steps are exactly invariant under affine reparametrizations of the parameters and activity (such as changing sigmoid into tanh). 2. Parameter initialization is done by setting numerical values for the parameters in an explicit numerical representation. Changing parametrization obviously means changing the initial values in the same way. If initialization is based on an intended parametrization-independent behavior at startup, as in Section 2, this is not a problem. 3. The dampening procedure for matrix inversion (the various ε terms in Section 2) formally breaks invariance. Using a Moore-Penrose pseudoinverse (which is simply the limit ε → 0) does not solve this problem. It would be nice to have a dampening scheme preserving invariance11 . 11 Here is a possibility for defining a matrix for the incoming parameters to a unit i, which could be used as dampening the metric at i in an invariant way: Compute a copy 30 4 Preliminary experiments Here we report a comparison of the performance of GLNNs and more traditional RNNs on some synthetic data examples: the “alphabet with insertion” (Example 1 from the Introduction), synthetic music (Example 3), the distant XOR problem (Example 2), and finally the an bn problem (Example 4). LSTMs are used as an additional benchmark. GLNNs were trained with either the recurrent backpropagated metric or the recurrent unitwise outer product metric, as described in Section 2. The reference RNN was trained using traditional (but not naive) techniques as described below. For the distant XOR example, RNN performance is known to be poor unless the “Hessian-free” technique is used [MS11], so we did not test RNN on this example and instead directly compare performance to [MS11]. Reference RNN training. The RNN used as a baseline is described in Section 1.2.1. In particular, both this RNN and GLNNs use a softmax (6) for the probability to produce a symbol x given the internal state of the network. RNN training is done via backpropagation through time. As plain backpropagation was too slow, for the parameters wiy the inverse diagonal Hessian (obtained from (18)) is applied to the gradient update, and the learning rate for each ρix is inversely proportional to the frequency of symbol x in the data (thus compensating for the number of terms making up the corresponding gradient, so that rare symbols learn as fast as frequent symbols12 ). A method similar to RMSprop or Adagrad [DHS11], in which the learning rate for each transition parameter is divided by the root mean square (RMS) average over time of the gradient magnitude, is also reported in Table 1. Initialization of the RNN parameters has been set along the same principles as for GLNNs, namely w0y ← log νy , τii ← 1 − 1/i, ρjy ← P 1 (ujy − y′ ν̃y′ ujy′ ) 2 (69) with u and ν̃ as in Section 2, and with all other weights set to 0, where the symbol frequencies νy and ν̃y are as in Section 2, and the ujy are independent random variables uniformly distributed in [0; 1]. This way, at startup the of the metric (RUOP or RBPM) but replacing the actual training sequence (xt ) with a randomly generated sequence (e.g., uniform, or a perturbation of (xt )). More copies with more random sequences can be used until one gets a non-degenerate metric. The resulting metric can be multiplied by a small number and used as a dampening term. But this does not solve all problems: for instance, if a unit i has no effect whatsoever on the output given the current parameters, the corresponding metric will vanish. It seems difficult to define a non-zero invariant metric in the latter situation. 12 If ρix is seen as the weight from an input unit activated when symbol x occurs, then this is equivalent to scaling the input unit signals to a given L2 norm over time. 31 activation of each unit is given by a random linear combination of past symbols with weights exponentially decreasing with time, with unit i having a decay time of order i thanks to τii . More combinations of models (RNN, GNN, GLNN) and training methods are reported in Table 1. LSTMs. LSTMs [HS97] are included as an additional benchmark. For this we have kept the same overall procedure and simply replaced each RNN cell with an LSTM cell following Eqs. (7)–(11) in [Gra13], and modified the gradient accordingly. We kept the softmax output from the other models (also as used in [Gra13]). The weights were initialized to uniform random values in [−0.1, 0.1] [Gra12, GSS03]. Network construction, network sizes, and CPU time budget were identical to the other models, as described below. Since plain gradient resulted in slow training, we have also included a variant described above for RNNs: using the diagonal Hessian for the writing parameters w, and frequency-adjusted learning rates for the input symbols (equivalent to rescaling the inputs). Still, training is quite slow and from Table 1 it appears that LSTMs are not competitive in this setup13 , at least for the computational time budget used here. Regularization. When working with discrete alphabets, the problem arises of having probability 0 for certain symbols in certain situations after training; if the trained model is used on a validation set, validation log-likelihood can thus be very low. In our situation this is especially the case near the beginning of the sequence: since the model is trained on only one training sequence and has parameters for the activities at startup, it can frequently learn to start in a specific configuration to reproduce the first few letters of the training sequence. For this reason, a crude regularization procedure was used: before computing log-likelihood of the validation sequence, the predic1 1 )πt + t+2 unif A tion πt for the next symbol at time t was replaced with (1− t+2 with unif A the uniform distribution over the alphabet. (This kind of regularization has some backing from information theory.) Experimental setup. The same overall procedure (construction of a random graph, learning rate control) has been used for both GLNNs and RNNs as described in Section 2, following nearly identical implementations. In each case, a single14 training sequence (xt ) is generated using the exact synthetic model. Another, independent sequence (x′t ) is used for validation: we report the log-likelihood (in base 2) of the validation sequence (x′t ) using 13 Good performance of LSTMs has been reported for one of the problems we use, the a b problem [GSS03]. However this involved more samples and small values of n in the training set. With these settings we were able to obtain similar results. 14 see footnote 2 n n 32 the GLNN or RNN trained on (xt ). The baseline for performance is the number of random bits used by the exact synthetic model to generate (x′t ). As a sanity check, we also report the performance of a well-known, efficient online text prediction method, context tree weighting (CTW): the algorithm is presented with the concatenation of the training and validation sequence, and we report the number of bits used to predict the validation sequence after having read the training sequence. The comparison between GLNNs and RNNs is made for identical computation time on the same machine, for a series of hyper-parameter settings (network size and connectivity). Indeed, as RNNs and GLNNs have different parameter sets, direct comparison for the same network size is difficult. Spanning different network sizes shows the performance each model can attain for a given time budget if the right hyper-parameters are used. In each case, the size of the network was chosen to increase√from 4 units to a maximum of 256 or 512 units by increments of a factor 2. For each network size, we tested both a sparse network with connectivity d = 3 edges per unit (including √ a loop at each unit), and a “semi-sparse” network with connectivity d = 2#A for GLNNs and d = #A for RNNs, where #A is the alphabet size; this latter choice balances the various contributions to algorithmic complexity (see Section 2). This way, RNNs can take advantage of their lesser computational sensitivity to connectivity d. For each hyper-parameter setting, the corresponding model was allowed to learn for the same time (10 or 30 minutes depending on the example). The experiments were run on a standard laptop computer with an Intel Core i7-3720QM CPU at 2.60GHz 15 , using a straightforward implementation in C++. The code for these experiments can be downloaded at http://www.yann-ollivier.org/rech/cod Let us now discuss each example in turn. Alphabet with insertions. The synthetic generative model is as follows. The training sequence is the concatenation of 1000 lines, separated by a newline symbol. Each line is obtained by writing the 26 lowercase letters of the Latin alphabet, in the standard order, and then inserting (independently) a sub-block after each letter with probability 1/26 for each letter. A subblock starts with an opening parenthesis, followed by the 10 digits from 0 to 9 (in that order), and ends with a closing parenthesis. After each digit in the sub-block, with probability 1/5 a sub-sub-block is inserted, which consists of an opening square bracket, nine random uppercase letters chosen from A–Z, and a closing bracket. Thus a typical line might look like ab(0123[WZPYCPEEH]456789[HYDVTWATR])cdefghijklmnopqrstuvwxyz 15 For technical reasons the experiments for LSTMs and the RMS variant of RNNs were done on a slightly faster machine; an empirically adjusted scaling factor was applied to the corresponding CPU time. 33 -80000 True model entropy Sanity check (CTW) RNN BP GLNN RUOP GLNN RBPM Validation log-likelihood (bits) -85000 -90000 -95000 -100000 -105000 -110000 0 200 400 600 800 1000 1200 Computation time (seconds) 1400 1600 1800 Figure 1: Validation log-likelihood on the alphabet with insertions example. The validation sequence has the same law: the concatenation of 1000 independent such lines. Randomization of the innermost blocks prevents rote learning. GLNNs and RNNs with a variety of network sizes ranging from 4 to 512 units, as described above, were run for 30 minutes each on the training sequence. The validation sequence log-likelihood is reported in Figure 1 and Table 1. GLNNs come more than ten times closer to the true model log-likelihood than RNNs: the best validation log-likelihood for GLNNs is -89,126 bits while that for RNNs is -96,099 bits, compared to -88,482 bits for the true model. Such a difference of roughly 7,000 bits represents roughly 7 bits per line of the training sequence. Note that the cost of representing a letter in the alphabet is log(26)/ log(2) ≈ 4.7 bits: this would be the log-likelihood difference, for each line of the training sequence, between a model that resumes at the correct place in the alphabet after a sub-block insertion, and one that resumes at a random letter. This is confirmed by visual inspection of the models obtained after training. Indeed, since we train generative models, the trained network can be used to generate new sequences, hopefully similar to the training sequence. Doing so with RNNs and GLNNs reveals qualitative differences in the models learned, in line with the difference in performance: After a sub-block has been inserted, GLNNs resume at the correct letter or sometimes one letter off the correct position in the alphabet; on the other hand, RNNs seldom 34 resume at the correct position. The remaining small difference in log-likelihood between GLNNs and the true model can, from visual inspection, be attributed to various factors: residual errors like occasional duplicated or omitted letters, or resuming one letter off after an insertion, as well as arguably good generalizations of the training sequence such as having more than one sub-block between two letters or starting a new line with a sub-block. There is no obvious pattern of dissimilar performance between sparse and semi-sparse networks. However, GLNNs are apparently quite sensitive to overfitting over time: validation log-likelihood increases at first, then steadily decreases as parameter optimization progresses. This phenomenon is also present to a lesser extent for RNNs, but only after much longer training times. Note that for a given network size, GLNNs have more parameters (because each edge has as many parameters as symbols in the alphabet A). This illustrates the importance of using a validation sequence to stop training of GLNNs. One GLNN run exhibits wild variations of validation log-likelihood, for unknown reasons (perhaps a badly invertible matrix M̃ ). On the other hand, surprisingly, GLNNs are less sensitive to overfitting due to a too large network size: while increasing network size past some value results in worse performance for RNNs (lower curves on Figure 1), for GLNNs it seems that the best validation log-likelihood over an optimization trajectory stays the same for a wide range of network sizes. Running RNNs for longer times only partially bridges the gap in performance: RNNs after 4 hours are still seven times farther from the true model than GLNNs are after 30 minutes (with a gain of 2,810 bits of log-likelihood for RNNs). After some time, RNNs slow down considerably or sometimes exhibit the same overfitting phenomenon as GLNNs and their validation performance decreases. Overall, the “resume-after-insertion” phenomenon illustrated by this example is well captured by GLNNs. Synthetic music. The next example is synthetic music notation, meant to illustrate the intersection of several independent constraints. The training sequence is a succession of musical bars. Successive musical bars are separated by a | symbol and a newline symbol. Each bar is a succession of notes separated by spaces, where each note is made of a pitch (a,b,c,...) and value (4 for a quarter note, 2 for a half note, 4. for a dotted quarter note, etc.). In each bar, a hidden variable determines a harmony with three possible values I, IV, or V. If the harmony is I, every pitch in the bar is taken uniformly at random from the set (“chord”) {c,e,g}; pitches are taken from {c,f,a} if harmony is IV, and from {g,b,d} if harmony is V. Harmonies in 35 True model entropy Sanity check (CTW) RNN BP GLNN RUOP GLNN RBPM Validation log-likelihood (bits) -16000 -18000 -20000 -22000 -24000 -26000 -28000 0 100 200 300 400 Computation time (seconds) 500 600 Figure 2: Validation log-likelihood on the synthetic music example. successive bars follow a specific deterministic pattern: an 8-bar-long cycle I-IV-I-V-I-IV-V-I as encountered in simple tunes. Finally, in each bar, the successive durations are taken from a finite set of 5 rhythmic possibilities (commonly encountered in waltzes), namely: 4-4-4; 2-4; 4.-8-4; 2.; 4-4-8-8. Rhythm is chosen independently from pitch and harmony. See Example 3. The training sequence is made of 2,700 musical bars. The validation sequence is taken independently with the same law. GLNNs and RNNs with a variety of network sizes ranging from 4 to 256 units, as described above, were run for 10 minutes each on the training sequence. The validation sequence log-likelihood is reported in Figure 2 and Table 1. Only one RNN run beats the sanity check (CTW). There is a difference of roughly 2,000 bits between the best RNN and best GLNN performance; GLNNs come roughly three times closer to the true model. Visual inspection of the output of the networks seen as generative models confirms that this difference is semantically significant: GLNNs correctly learn the rhythmic and harmonic constraints inside each bar, whereas RNNs still display “mistakes”. On the other hand, even GLNNs were not able to learn the underlying 8-bar-long harmonic progression, which was apparently approximated by probabilistic transitions. This is reflected in the remaining gap between the true model and GLNNs. Running an RNN with backpropagation for a longer time (3 hours in- 36 stead of 10 minutes) only partially bridged the gap, only bringing RNN an additional 604 bits in log-likelihood. Once more, visual inspection of RNN output revealed a correct learning of the possible set of rhythms, but imperfect learning of the harmonic constraints even inside each musical bar. The pattern of decrease in validation log-likelihood because of overfitting is present but less pronounced than for the alphabet-with-insertions example. Still, on Figure 2 one can notice one GLNN run exhibiting a wild variation of validation log-likelihood at some point. Once more this points out the importance of using validation sets during GLNN training, although using only one training sequence of relatively small size may also play a role here. Distant XOR. The setting is taken from [MS11], after [HS97]; here we recast it in a symbolic sequence setting. A parameter T is fixed (T = 100 below), which determines the length of the instances. The training sequence is a concatenation of lines separated by newline symbols. Each line is made of T ′ random bits preceded by whitespaces, where T ′ is taken at random between T and 1.1T . Two of these random bits are preceded by a special symbol X instead of a whitespace. The positions of these two special symbols are taken at random from the intervals J0; T ′ /10J and JT ′ /10; T ′ /2J respectively. At the end of each line, a symbol = is inserted and is followed by a bit giving the XOR result of the two bits following the two X symbols. Example 2 gives a typical training sequence. The goal is to correctly predict the value of the final bit of each line. So in the gradient computation an error term is included only for the bits to be predicted, as in [HS97]. Namely, in the notation of Section 2, we set χt = 1 if and only if xt−1 is the symbol =. For this problem, we did not run the reference RNN and directly compared to the best performance we found in the literature, in [MS11], using “Hessian-free” second-order RNN training. The success rate reported in the latter, for T = 100, is about 25% (proportion of runs achieving a classification error below 1% using at most 50,000 minibatches of 1,000 instances each). We ran eight distinct instances of the problem, each with a different random training and validation sequence. Each such sequence was the concatenation of 10,000 lines as above with T = 100. We used a fully connected network with 10 units. Optimization was run for 1,500 gradient passes over the training sequence (amounting to roughly 12 hours of computation and 750 gradient steps for each of the writing and transition parameters, since we alternate those). We discuss the results for training using the recurrent BPM; the results using the recurrent UOP metric are extremely similar. Figure 3 reports two measures of performance on the validation sequence: the log-likelihood score for prediction of the final bit of each line (following the score (4)), and the classification error (equal to 0 if the correct bit value 37 2000 60 0 50 -2000 40 -4000 30 -6000 20 -8000 10 -10000 0 0 100 200 300 400 500 Computation time (minutes) 600 700 Classification error (%) Validation log-likelihood (bits) log-likelihood classification error 800 Figure 3: Validation log-likelihood and classification error on the distant XOR problem using GLNNs. is given a probability > 1/2 and to 1 otherwise—this is always bounded by the log-likelihood error) expressed as a percentage. The results are binary: each run either successfully achieves low error rates after enough time, or does not perform better than random prediction. 4 out of 8 independent runs reached error rates below 1% within less than 1,500 gradient passes over the training set, and 6 out of 8 within 2,000 gradient passes. The sample size is too small to tell for sure that this is better than the success rate in [MS11]. Still, the algorithm is simpler and uses fewer training examples. Direct comparison of the algorithmic cost with the approach in [MS11] is difficult, because for each gradient pass the latter can perform up to 300 passes of the conjugate gradient algorithm used in the implicit Hessian computation. For reference, in our approach, each run of the experiment above (1,500 gradient passes on a training sequence of 10,000 lines) takes slightly above 4h of CPU time on an Intel Core i7-3720QM CPU at 2.60GHz using a straightforward C++ implementation (no parallelism, no use of GPUs). an bn problem. In this problem, the training sequence is made of lines separated by newlines. The first line is a block of n1 symbols a; the second line is a block of n1 symbols b; the third line contains n2 a, the fourth line contains n2 b, etc. See Example 4. In this experiment, the block lengths n were taken at random in J1024; 2048J 38 True model entropy Sanity check (CTW) RNN BP GLNN RUOP GLNN RBPM -50 Validation log-likelihood (bits) -100 -150 -200 -250 -300 -350 0 100 200 300 400 Computation time (seconds) 500 600 Figure 4: Validation log-likelihood on the an bn example. to build the training and validation sequences. We used training and validation sequences made of only ten an bn blocks. RNNs and GLNNs with sizes ranging from 4 to 64, as described above, were run for 10 minutes each. For each independent run, a new random training sequence and validation sequence was generated. The results are reported in Figure 4 and Table 1. The log-likelihood of a validation sequence under the true model is 10 bits for each block of a (choosing an integer n between 1024 and 2048), after which the length next block of b is known and comes for free. Thus the reference log-likelihood of the whole validation sequence (which contains 10 blocks of each) is 100 bits. However, from only 10 training samples as used here, the exact distribution of the length n cannot reasonably be inferred; a reasonable inference would be, for instance, a geometric law with mean = 1536 somewhere in this interval. The geometric law with mean 1024+2048 2 has an entropy of about 12 bits instead of 10. Thus, at best, one can expect a reasonable model to attain an entropy of about 120 bits on the 10-instance-long validation set. On the other hand, a model which would not catch the equality of the sizes of consecutive a and b blocks would require twice as much entropy, i.e., about 240 bits for the validation set. Indeed, the sanity check (CTW) has a log-likelihood of -243.5 bits. The best GLNN log-likelihood value obtained is -129.7 bits, while the best RNN log-likelihood value is -222.4 bits. 39 Surprisingly, the best GLNN value was obtained with a network of size 4; a size-23 network came close second at -129.98 bits. Not all GLNN runs find the optimum: there is a cluster of runs around -230 bits, presumably corresponding to the model with independent lengths for a and b blocks, and one run (with 64 units) provided aberrant validation log-likelihood after some point because of overfitting. Visual inspection of the output of the best trained GLNN runs, used as generative models, shows that consecutive blocks of a and b indeed have the same or very close lengths, with sometimes an error of ±1 on the length. This imperfection would likely disappear with more than ten training sequences. The kind of internal representation used by the GLNN to reach this result is unclear, especially given the small network size: does it build a kind of base-2 counter, does it take advantage of the analog nature of the units’ activities, or something in between? Influence of the various choices. The difference in performance between GLNNs and RNNs above results from various factors: choices in model design (leakiness and gatedness) and in the training method (backpropagation or a Riemannian gradient). We now try to isolate these factors, by testing various combinations of models (RNNs, GNNs and GLNNs) and training methods. In particular, it is possible to apply invariant training methods to RNNs. The recurrent BPM and recurrent UOP metric are well-defined for RNNs. However, contrary to GNNs and GLNNs, the parameters corresponding to different symbols in the alphabet are not mutually orthogonal, and thus, using them directly would result in a complexity quadratic in the alphabet size, which we deem unacceptable. Therefore, we used the quasi-diagonal reductions of these metrics, as defined in [Oll13]. This still provides training methods that are invariant under reparametrization of the activity of each unit. Each model and training method was tested as described above, spanning various values of the hyperparameters (network size and connectivity). For each method we report the best performance found over the hyperparameters. The performance reported is the cumulative regret with respect to the true generating model, a standard measure used in sequential prediction contexts. It is defined as the difference between the log-likelihood of the validation data sequence under the true model used to generate the data, and the log-likelihood of the validation data sequence under the trained model. We also included three sanity checks for reference. Two are text compressors known for their performance (CTW as mentioned above, and the file compressor bzip2), for which, to incorporate the effect of training, we 40 Cumulative regret (bits) Alphabet Music an bn Method Sanity checks: bzip2 Context tree weighting Hidden Markov model Non-invariant methods: RNN with DH and FB RNN with DH and RMS GNN with DH and FB GLNN with DH and FB LSTM with plain gradient LSTM with DH and FB Invariant methods: RNN with QDH and QDRUOP RNN with QDH and QDRBPM GNN with QDH and RUOP GNN with QDH and RBPM GLNN with QDH and RUOP GLNN with QDH and RBPM 27206.1 18272.1 10212.0 6035.7 3611.0 4818.1 244.0 143.5 125.7 7616.8 6721.5 4059.0 5883.9 20073.1 11843.1 2898.9 2295.0 2688.7 3616.4 8796.1 5590.9 122.4 129.9 132.0 74.4 139.8 101.7 3372.8 3623.9 1759.0 2166.0 1011.9 644.2 1349.5 1224.3 1148.3 1596.0 1055.9 1055.9 89.5 106.0 71.6 115.4 29.7 30.0 Table 1: Cumulative regret (bits) of the learned model with respect to the true generative model, over the validation data sequence. Best value found over the hyperparameters in the allocated CPU time budget is reported. Models are: RNN, GNN, GLNN, LSTM, and HMM. Training methods for the writing parameters: inverse diagonal Hessian (DH), or quasi-diagonal inverse Hessian (QDH). Training methods for the transition parameters: frequency-adjusted backpropagation (FB), root mean square gradient rescaling (RMS), recurrent backpropagated metric (RBPM), recurrent unitwise outer product metric (RUOP), and the quasi-diagonal reduction of the latter (QDRBPM and QDRUOP). 41 report the number of bits used to compress the concatenation of the training and validation sequences minus the number of bits used to compress the training sequence alone. The third sanity check is a hidden Markov model (HMM), trained using a variety of network sizes as for the neural networks.16 The comparison with HMMs is especially interesting, since these are a classical tool for modelling sequential data. The “classical” training method is as described above for RNNs: diagonal inverse Hessian for the writing parameters w, and backpropagation for the transition parameters; for the latter, parameters like ρiy (for RNNs) or τijy (for GNNs and GLNNs) related to a given symbol y have a learning rate divided by the frequency of y in the training sequence (“frequency-adjusted” backpropagation, which compensates for the number of terms making up the corresponding gradient, and, for RNNs, is equivalent to scaling the input signals). Pure backpropagation was tested but is simply too slow. The results are collected in Table 1. From this table it is clear that an invariant method is the first step to improve performance: RNNs trained with an invariant method beat GNNs and GLNNs trained with a non-invariant method. Still, the leaky aspect of GLNNs seems to be necessary to bring the best performance in problems with very long dependencies (the alphabet with insertions and the an bn example). On the other hand, on the problem where dependencies are most local (synthetic music), all network models achieve quite comparable results if trained with an invariant method. Conclusions and perspectives The viability of GLNNs with Riemannian training to capture complex algorithmic dependencies in symbolic data sequences has been established. Metrics inspired by a Riemannian geometric viewpoint, allow us to write invariant algorithms at an algorithmic cost comparable to backpropagation through time for sparsely connected networks. These metrics bring down the necessary number of gradient steps to a few hundreds in the various examples studied. This approach seems to work with small training samples. Better than state-of-the-art performance has been obtained on difficult synthetic problems. 16 Details as follows. Training is done by the expectation-maximization algorithm. The network is obtained, as for the neural networks, by taking an oriented random graph with a given number of edges per node (including loops); this number of edges per node is set to the alphabet size, because this gives an algorithmic complexity similar to that of the neural networks. Initialization of the transition probabilities is by a Dirichlet(1/2, . . . , 1/2) (i.e., Jeffreys) prior on the edges from a node. Initialization of the production probabilities is done by multiplying the actual frequency of each symbol in the sequence to be modelled, by a random uniform([0; 1]) number. 42 In the experiments, the importance of invariance seems to supercede that of model choice: in our tests, any model with an invariant training algorithm did better than any model with a non-invariant one. More experiments are needed to investigate the isolated effect of each feature of this training procedure (memory effect in the definition of GLNNs, gatedness, and the choice of metric). Other issues in need of investigation are the influence of parameter initialization (especially if some expert knowledge on the time scale of dependencies in the data is available) and a better, invariant dampening procedure. It would also be interesting to acquire insight into the dynamical behavior of GLNNs (ergodicity, multiple equilibrium regimes, etc.) and how it is affected by training. Furthermore, the Riemannian approach can in principle be extended to more complex architectures: testing Riemannian methods for LSTMs seems promising. Finally, scalable Riemannian training algorithms should be developed for a fully online “lifelong learning” setting where there is a single training sequence which grows with time and where it is not possible to fully store the past states and signal, so that backpropagation through time is excluded. A Parameter initialization, the linearized regime, and integrating effects in GLNNs Let us examine the dynamics of a GLNN, and in particular the linearized regime (the regime in which the connection weights are small). This will provide some insight into the time-integrating effect of the model, and also suggest relevant initializations of the parameter values before launching the gradient ascent, as presented in the algorithm above. P In the GLNN evolution equation Vjt+1 = Vjt + i τijxt ati let us isolate the contributions of i = j and of the always-activated unit i = 0. Substituting atj = s(Vjt ) and at0 ≡ 1 we get Vjt+1 = Vjt + τjjxt s(Vjt ) + τ0jxt + X τijxt ati (70) i6=0, i6=j Since s(Vjt ) is an increasing function of Vjt , the contribution i = j provides a feedback loop: if τjjx is negative for all x, then the feedback will be negative, whereas positive τjjx would result in perpetual increase of Vjt if the other contributions are ignored. Meanwhile, τ0jxt provides the reaction of unit j to the signal xt . For instance, if we set τjjx = −α for all x with α > 0, τ0jx = β for all x, and all other weights τijx to 0, the dynamics is Vjt+1 = Vjt − αs(Vjt ) + β (71) which has a fixed point at Vjt = V̄ := s−1 (β/α), i.e., atj = β/α (assuming β/α lies in the range of the activation function s). The linearized dynamics 43 around this fixed point (Vjt close to V̄ ) is  Vjt+1 − V̄ ≈ (1 − αs′ (V̄ )) Vjt − V̄  (72) so that if 1 − αs′ (V̄ ) < 1 this fixed point is attractive. A more interesting choice is to let τjjx = −α, τ0jx = β + ερx (73) with small ε, where ρx is chosen to that the average of ρ over the data xt is 0. Then, the value of V t as a function of t and the data can be found by induction using the linearized dynamics: Vjt ≈ V̄ + ε X t′ <t ′ (1 − µ)t−t ρxt′ (74) where µ := αs′ (V̄ ) (75) namely, the activation level Vjt is a linear combination of the past values of the signal xt , with weights exponentially decreasing with time at rate (1 − µ). This provides insights into reasonable values of the parameter leading to interesting internal dynamics, to be used at the start of the learning procedure. Indeed, negative values of α would lead to unstability, whereas positive values of α presumably stabilize the network. However, values of α above 1/ sup s′ (= 1 for tanh activation) will provide too much feedback, resulting in non-monotonous V t+1 as a function of V t and an oscillating behavior. Indeed we have found that setting α = 1/(2 sup s′ ), i.e., τjjx = −α = −1/2 (76) (for tanh) for all j and x at startup, yields a good behavior of the network. With τjjx and τ0jx as above, the value of (1−µ) controls the effective time window of the integrating effect: data much older than t − t′ ≫ µ1 has little weight. Thus µ1 presumably gives the order of magnitude of the distances t−t′ for which the model can reasonably be expected to capture correlations in the data (at least at startup, since µ will change during learning). The value of µ can be directly controlled through β via µ = αs′ (V̄ ) = ′ αs (s−1 (β/α)): for the tanh activation function, this yields q β = − α(α − µ) (77) which is used to set β from an arbitrary choice for µ. We have found that using different values of µ for different units yields good results. We have used µj = 1/(j + 1) (78) 44 for unit number j (starting at j = 1); this yields a characteristic time of order j and seems to perform well. Finally, the “reading rates” ρx are taken at random independently for each unit j in the following way. The value of ε must be small enough to ensure that Vjt stays close to Vj (otherwise the linear regime assumption is P ′ unjustified), namely, that the sum ε t′ <t (1 − µ)t−t ρxt′ stays small. If each ρ is roughly of size 1, the sum is ε/µ so taking ε somewhat smaller than µ is reasonable. We have used µ (79) ε= 4 which apparently yields good performance. Finally, ρx is taken at random uniformly in [0; 1] for each symbol x (independently for each unit j), and then shifted by a constant so that the average of ρxt over the training data P xt is 0 (namely, the constant νx ρx is removed from each ρx where νx is the frequency of symbol x in the training data)17 . The other transition weights τijx , with i 6= 0, i 6= j, were set to 0 at startup. The explicit initialization values described here are specific to the tanh activation function; however, the reasoning extends to any activation function. B Derivative of the log-likelihood: Backpropagation through time for GLNNs Let (xt )t=0,...,T −1 be an observed sequence of T symbols in the alphabet A. Here we compute the derivatives of the log-probability that a GLNN prints (xt ) with respect to the GLNN parameters, via the standard backpropagation through time technique. Given a training sequence x = (xt ), let Pr(x) be the probability that the model prints (x0 , . . . , xT −1 ). Here, for simplicity we assume that all symbols in the sequence have to be predicted (i.e., χt ≡ 1). The algorithm in Section 2 gives the formulas for the general case. Proposition 11 (log-likelihood derivative for GLNNs). The derivative of the log-probability of a sequence x = (xt )t=0,...,T −1 with respect to the parameters of a gated leaky neural network is given as follows. Setting ∂ log Pr(x) (80) Bjt := ∂Vjt 17 The choice to use a uniform random variable in [0; 1] rather than, e.g., Gaussian random variables, is justified by the feedback mechanism. Indeed since the activation function s ranges in [0; 1], the feedback term −αs(Vjt ) is bounded. If an unbounded signal ρxt can occur at each step, it may take a long time to stabilize. Empirically, using Gaussian rather than bounded random variables seems to decrease performance, confirming this viewpoint. 45 we have the backpropagation relation Bit = Bit+1  + s′ (Vit ) wixt − X πt (y)wiy + y X j  τijxt Bjt+1  (81) (initialized with BjT := 0). In particular Bj0 gives the derivative with respect to the initial values Vj0 at time 0. The derivatives with respect to the writing weights are ∂ log Pr(x) X t ai (1xt =y − πt (y)) = ∂wiy t (82) and the derivatives with respect to the transition weights are ∂ log Pr(x) X 1xt=y ati Bjt+1 = ∂τijy t (83) These relations include the always-activated unit i = 0, ai ≡ 1. The meaning of the partial derivative with respect to Vjt is the following: P if, in the equation Vjt+1 = Vjt + j τijxt ati defining GLNNs, we artificially P introduce a term ε ≪ 1 at unit j at time t, namely, Vjt+1 = Vjt + j τijxt ati +ε for a single unit at a single time, and let the network evolve normally except for this change, then the value of log PT changes by εBjt + O(ε2 ). Proof. Given a training sequence (xt )t=0,...,T −1 of length T , let P0 := 1 and Pt+1 := πt (xt )Pt (84) so that PT is the probability of printing (x0 , . . . , xT −1 ). By definition of πt we have log Pt+1 = log Pi + X ati wixt i − log X P e at w i i iy y ! (85) Let us compute the infinitesimal variations of these quantities under an infinitesimal variation δw, δτ of the parameters. Ultimately we are interested in the variation of log PT , to perform gradient ascent on the parameters. By a first-order Taylor expansion, the variation of log Pt+1 satisfies δ log Pt+1 = δ log Pt + X ati δwixt + − y πt (y) wixt δati i i X X X i 46 ati δwiy + X i wiy δati ! (86) and rearranging and substituting δati = s′ (Vit )δVit where s′ (87) is the derivative of the activation function, this yields δ log Pt+1 = δ log Pt + X ati δwixt − i + X wixt − i X X πt (y)δwiy y ! πt (y)wiy s y ′ ! (88) (Vit )δVit Consequently, the variation δ log Pt of log Pt can be expressed in terms of the variation of log Pt−1 , the variations of the parameters w and τ , and the variations of the values Vjt−1 at time t − 1. Let us assume, by backward induction, that we can write the differential of log PT with respect to the parameters, as δ log PT =: δ log Pt + X Bit δVit + X t Ciy δwiy + t Dijy δτijy (89) i,j,y i,y i X For t = T this is satisfied with B T = C T = D T = 0. Thus Bit represents the backpropagated value at unit i at time t, and C and D will cumulatively compute the gradient of log PT with respect to the parameters w and τ , namely: and ∂ log Pr(x) 0 = Ciy ∂wiy (90) ∂ log Pr(x) 0 = Dijy ∂τijy (91) and moreover Bj0 will contain the derivatives with respect to the initial levels Vj0 . P Using the evolution equation Vjt+1 = Vjt + i τijxt ati we find δVjt+1 = δVjt + X δτijxt ati + X τijxt s′ (Vit )δVit (92) i i Using these relations to go from time t + 1 to time t in (89), namely, expressing δ log Pt+1 in terms of δ log Pt and expanding V t+1 in terms of V t , we find t+1 t Ciy = Ciy + 1xt =y ati − πt (y)ati (93) t+1 t Dijy = Dijy + 1xt =y ati Bjt+1 and  Bit = Bit+1 + s′ (Vit ) wixt − X πt (y)wiy + y 0 and D 0 follow. from which the expressions for Ciy ijy 47 (94) X j  τijxt Bjt+1  (95) C Fisher metric for the output distribution πt Let us compute the Fisher norm of the variation δπ of π resulting from a P change δEyt in the values of Eyt = i ati wiy . (Such a change in E can result from a change in the writing weights w or the activities a; this will be used to compute the metric on the writing weights and the transition weights, respectively.) The effect of a change δE t on log πt is δ log πt (y) = X ∂ log πt (y) y′ ∂Eyt ′ δEyt ′ (96) and the norm of this δπt in Fisher metric is kδπt knat = Ey∼πt (δ log πt (y))2  = Ey∼πt  (97) X ∂ log πt (y) ∂ log πt (y) y ′ ,y ′′ ∂Ey′ ∂Ey′′  δEyt ′ δEyt ′′  (98) By a standard formula for exponential families of probability distributions we find: ∂ log πt (y) (99) = 1y=y′ − πt (y ′ ) ∂Ey′ so that Ey∼πt " #   ∂ log πt (y) ∂ log πt (y) = Ey∼πt (1y=y′ − πt (y ′ ))(1y=y′′ − πt (y ′′ )) ′ ′′ ∂Ey ∂Ey (100) = πt (y ′ )(1y′ =y′′ − πt (y ′′ )) (101) (this is also18 the Hessian of − log πt (y) with respect to the values E t ). Consequently, the Fisher metric for πt , expressed in terms of the variations δEyt , is X X kδπt k2nat = πt (y)(δEyt )2 − πt (y)πt (y ′ )δEyt δEyt ′ (102) y y,y ′ References [Ama98] Shun-ichi Amari. Natural gradient works efficiently in learning. Neural Comput., 10:251–276, February 1998. [AN00] Shun-ichi Amari and Hiroshi Nagaoka. Methods of information geometry, volume 191 of Translations of Mathematical Monographs. American Mathematical Society, Providence, RI, 2000. Translated from the 1993 Japanese original by Daishi Harada. 18 because for exponential families, the Hessian of log π(y) does not depend on y 48 [APF00] Shun-ichi Amari, Hyeyoung Park, and Kenji Fukumizu. Adaptive method of realizing natural gradient learning for multilayer perceptrons. Neural Computation, 12(6):1399–1409, 2000. [Bri90] John S. Bridle. Alpha-nets: A recurrent ’neural’ network architecture with a hidden Markov model interpretation. Speech Communication, 9(1):83–92, 1990. [BSF94] Y. Bengio, P. Simard, and P. Frasconi. Learning long-term dependencies with gradient descent is difficult. Neural Networks, IEEE Transactions on, 5(2):157–166, 1994. [DHS11] John C. Duchi, Elad Hazan, and Yoram Singer. Adaptive subgradient methods for online learning and stochastic optimization. Journal of Machine Learning Research, 12:2121–2159, 2011. [Gra12] Alex Graves. Sequence transduction with recurrent neural networks. Preprint, http://arxiv.org/abs/1211.3711 , 2012. [Gra13] Alex Graves. Generating sequences with recurrent neural networks, 2013. Preprint, http://arxiv.org/abs/1308.0850v5 . [GS11] Lise Getoor and Tobias Scheffer, editors. Proceedings of the 28th International Conference on Machine Learning, ICML 2011, Bellevue, Washington, USA, June 28 – July 2, 2011. Omnipress, 2011. [GSS03] Felix A. Gers, Nicol N. Schraudolph, and Jürgen Schmidhuber. Learning precise timing with lstm recurrent networks. The Journal of Machine Learning Research, 3:115–143, 2003. [HB95] Salah El Hihi and Yoshua Bengio. Hierarchical recurrent neural networks for long-term dependencies. In David S. Touretzky, Michael Mozer, and Michael E. Hasselmo, editors, Advances in Neural Information Processing Systems 8, NIPS, Denver, CO, November 27-30, 1995, pages 493–499. MIT Press, 1995. [HS97] Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural Computation, 9(8):1735–1780, 1997. [Jae02] Herbert Jaeger. Tutorial on training recurrent neural networks, covering BPTT, RTRL, EKF and the ‘‘echo state network’’ approach. Technical Report 159, German National Research Center for Information Technology, 2002. 49 [KGGS14] Jan Koutník, Klaus Greff, Faustino J. Gomez, and Jürgen Schmidhuber. A clockwork RNN. In Proceedings of the 31th International Conference on Machine Learning, ICML 2014, Beijing, China, 21-26 June 2014, volume 32 of JMLR Proceedings, pages 1863–1871. JMLR.org, 2014. [Mar10] James Martens. Deep learning via hessian-free optimization. In Johannes Fürnkranz and Thorsten Joachims, editors, Proceedings of the 27th International Conference on Machine Learning (ICML-10), June 21-24, 2010, Haifa, Israel, pages 735–742. Omnipress, 2010. [MS11] James Martens and Ilya Sutskever. Learning recurrent neural networks with Hessian-free optimization. In Getoor and Scheffer [GS11], pages 1033–1040. [MS12] James Martens and Ilya Sutskever. Training deep and recurrent neural networks with Hessian-free optimization. In Grégoire Montavon, Geneviève B. Orr, and Klaus-Robert Müller, editors, Neural Networks: Tricks of the Trade, volume 7700 of Lecture Notes in Computer Science, pages 479–535. Springer, 2012. [Oll13] Yann Ollivier. Riemannian metrics for neural networks I: feedforward networks. Preprint, http://arxiv.org/abs/1303.0818 , 2013. [PB13] Razvan Pascanu and Yoshua Bengio. ing natural gradient for deep networks. http://arxiv.org/abs/1301.3584 , 2013. RevisitPreprint, [RHW87] D. E. Rumelhart, G. E. Hinton, and R. J. Williams. Learning internal representations by error propagation. In D. E. Rumelhart and J. L. McClelland, editors, Explorations in the Microstructure of Cognition, volume 1 of Parallel Distributed Processing, pages 318–362. MIT Press, Cambridge, MA, 1987. [RMB07] Nicolas Le Roux, Pierre-Antoine Manzagol, and Yoshua Bengio. Topmoumoute online natural gradient algorithm. In John C. Platt, Daphne Koller, Yoram Singer, and Sam T. Roweis, editors, NIPS. Curran Associates, Inc., 2007. [SMH11] Ilya Sutskever, James Martens, and Geoffrey E. Hinton. Generating text with recurrent neural networks. In Getoor and Scheffer [GS11], pages 1017–1024. 50
9cs.NE
arXiv:1802.02183v1 [cs.CV] 5 Jan 2018 Enhanced Image Classification With Data Augmentation Using Position Coordinates Avinash Kori Ganapathy Krishnamurthi Balaji Srinivasan [email protected] [email protected] [email protected] Abstract—In this paper we propose the use of image pixel position coordinate system to improve image classification accuracy in various applications. Specifically, we hypothesize that the use of pixel coordinates will lead to (a) Resolution invariant performance. Here, by resolution we mean the spacing between the pixels rather than the size of the image matrix. (b) Overall improvement in classification accuracy in comparison with network models trained without local pixel coordinates. This is due to position coordinates enabling the network to learn relationship between parts of objects, mimicking the human vision system. We demonstrate our hypothesis using empirical results and intuitive explanations of the feature maps learnt by deep neural networks. Specifically, our approach showed improvements in MNIST digit classification and beats state of the results on the SVHN database. We also show that the performance of our networks is unaffected despite training the same using blurred images of the MNIST database and predicting on the high resolution database. Index Terms — Position Digit classification, MNIST,SVHN, Deep Learning, CNN I. I NTRODUCTION Image classification using images acquired with different pixel spacing or scales is a difficult problem and is in general solved using very deep neural networks trained with a large amount of data. However, in many problems of interest such large data is not readily available and alternate approaches are desirable. Typically, CNNs are trained using a multi-resolution approach wherein images down sampled or blurred to various resolutions, these whole lot of images with different resolutions are used to train network and their predictions are used for final classification. However, this leads to large networks and a cumbersome training process. The capability to classify images at various resolutions is, however, achieved almost seamlessly by the human vision system. One model of human perception is based on sets of neurons representing hierarchical representations of objects starting with basic shapes. For instance, certain cells in the human retina are sensitive to horizontal and vertical lines which can be used to compose basic shapes[1]. CNNs mimic this model by using layers of filter to construct hiearchical representations and the presence of a local coordinate system in the input would definitely help learn these representations better by learning relationships between parts of objects. One key difference between typical CNNs and the human vision system is that position information is more immediately present in the latter due to the geometric arrangement of neurons; In the case of usual neural networks position information can only be learnt (and that too, implicitly) via training as, typically, any image is unrolled into a single column vector before training. Similarly, the level of explicit coordinate position encoded into even CNNs is limited by the size of the filter. In this article, we explore the advantages of mimicing the geometric feature of the human vision system by explicitly encoding a normalized coordinate system into the CNN. We hypothesize that introducing a local pixel coordinate system on the images, i.e. a XY cartesian coordinate system and using it as one of the input channels would enable the network to learn the relationships between parts of objects. We expect, in turn, that this recognition would enhance performance in both image classification as well in multiresolution problems. In a simple sense, one would expect the network to learn Euclidean distances between significant features in an object. As a result, an improvement in classification accuracy can be expected. One would also expect an invariance to pixel spacing, as recognition should be based on relative distances rather than on the actual resolution of the images. In our work we test the use of local pixel coordinates using commonly used digit datasets like MNIST[2], SVHN[3]( MNIST is a benchmark dataset for an images of segmented handwritten digits, each with 28x28 pixels. It includes 60,000 training examples and 10,000 testing examples, Figure 3. The SVHN dataset is a real life application oriented dataset for digits which includes images with 32x32 pixels, with 73257 digits for training and 26032 digits for testing, Figure 4), and show empirical evidence in terms of improvement in classification accuracy over regular approaches. In the case of SVHN, we demonstrate the capability to beat state of the art results using position coordinates as input to a deep neural network. We also examine feature maps for less complex networks like the one used for digit recognition and we demonstrate how these networks combine coordinate data and shape information. II. M ETHODOLOGY We discuss below our approach to encoding position information and creating tests for multi-resolution efficacy. a) Encoding Position Information: The CNN is fed with a 3 channel input, the first channel comprises of the actual input image (gray-scale image). The remaining two channels are for encoding spatial position along X and Y dimension with respect to Cartesian coordinate frame of reference(auxillary frames). These position encoded image frames are spatial coordinate grids normalized between 0 and 1. Figure: 1 . illustrates this. conventional network without using position information[4]. In other words, the error rate was reduced by approximately a factor of 2 due to the use of position information. Figure 1. a. Standard input image used — b. Shows the layers of position information with an input image — c. Our input image encoded with position information b) Validating multi-resolution behavior : In this analysis we trained the network with images of one specific resolution and in testing phase, we used images of entirely different resolution. In this study of multi-resolution behavior, the previously shown method is followed however the coordinate grid is also resized to the same resolution as that of an image. In many applications involving images, we train the model using images of a fixed resolution; but for most of the practical and real life applications there will always be varying resolutions, frame of reference which need to be detected, due to which most of the models fails. Since the downsampled coordinate information is obviously image independent, position encoding is a potentially promising approach to tackle such scenarios. In the next subsection we discuss how the results were improved just by encoding position information with input image. Figure 2. MNIST network — architecture details: convolutional layer : 5x5x32— pooling1: 2x2—convolutional layer : 5x5x64— pooling2: 2x2 III. E XPERIMENTS AND R ESULTS Our hypothesis was that encoding position information explicitly would improve both image classification as well as multi-resolution performance. We tested our hypothesis through the relative performance of our network in comparison to conventional networks on the following tasks: 1) Classification accuracy on the MNIST dataset 2) Classification accuracy on the SVHN dataset 3) Digit translation test 4) Multi-resolution test A. Test On MNIST Dataset A schematic of the network architecture followed for MNIST digit classification is shown in Figure 2. In this network we use two sets convolutional layers with maxpooling layer followed by two fully connected layers with softmax layer to obtain the posterior probability of an input digit. On MNIST handwritten digits dataset, with 45,000 images for training, 5,000 for validation and 10,000 images for testing, with our auxiliary input (XY-Position matrix) channels, We were able to achieve 99.84% accuracy. This was about 0.2% greater than maximum accuracy achieved using a Figure 3. examples of MNIST digits B. Test On SVHN Dataset In the SVHN classification task, we set an upper limit for number of digits in the image as 5, and remove all other images with more than 5 digits from dataset and didn’t use them either in training or for testing. We use VGG16 (16 layered deep convolutional network which is used for image classification tasks) convolutional architecture [5] for feature extraction and we use attention based modeling [6] for predicting existing digits in an image. The input image is appended with XY position information and all the digits are predicted simultaneously. The entire model was trained endto-end without data augmentation. In attention mechanism is basically weighted superposition of higher level features extracted by VGG16 convolutional neural network. Figure 4. examples of SVHN digits Training images were obtained by down sampling the original 28x28 image to 14x14 and again up sampling it to the original resolution. Basically, the network is trained on low resolution images and tested on high resolution images (original data). In this case, adding XY position information, in addition to gray channel, increases digit classification accuracy by 2-3%. With this kind of data our network with encoded position information gives an accuracy about 98.26% while the standard network gives an accuracy of about 96.32%. Once again, the error rate was reduced by approximately a factor of 2 due to the use of position information. D. Digit Translation Test Figure 5. Network architecture followed for SVHN classification Typically, in CNNs[7] used for digit recognition tasks, features learnt by network after a few convolutional layers would correspond to entire digit itself. However, the learnt features could also be combination of multiple digits. The attention model used in our network has learnable parameters which helps in providing specific weightage to feature maps in predicting final output. Our results indicate that the use of attention model mechanism has a positive impact on the classification accuracy. We were able to reduce the the digit recognition MSE by 1.2%, by including the XY position channel information. On a real life dataset like SVHN, with auxiliary (XY-position matrix) channels, we achieved around 95.44%(average of all 5 digits) accuracy with 1.83% classification error. Whereas the current state of the art result is 94.6%(average of all 5 digits) accuracy with 1.64% classification error[8]. In this test we show how translation invariance can be obtained by using by employing XY position information with an image. (which is equivalent to labeling pixels in an image) our model could predict digits correctly, regardless of finite translations. This would not be possible to accomplish merely with a standard input or even with max pooling (without position information) Some of these results are shown in the figure below. C. Resolution Change Test Our next endeavor was to show that using XY position information makes the network resolution invariant. Networks were trained with MNIST digits whose resolution was artificially degraded by blurring and tested with digits at the original resolution. The classification results indicate that implementing position matrix aided in achieving exceedingly good outputs (improvement by 2-3%) despite mismatch in training and testing resolution. Figure 7. Example images which are used in translation test The results obtained so far on MNIST, SVHN databases and the translational invariance experiment indicate that the XY coordinate information improves prediction accuracy. We assert that using XY inputs could also help to reduce the number of parameters required for achieving a certain level of accuracy. The following numerical experiments demonstrate that using XY position input can help reduce the number of network weights. IV. D ISCUSSION AND R ESULTS A. What does this position matrix learn? Figure 6. Variation in resolution among training and testing images To see what exactly could be learnt from the position matrix, we implemented convolutional variational autoencoders([9] & [10]). These auxillary layer (XY position matrix) helps in removing useless information(noise) for any given data. Figure 8 & figure 9 shows input and corresponding output for convolutional variational autoencoders experiment. The reconstructed outputs are revealing as the reconstruction of the position matrix contains the digits superimposed on it. B. What is the significance of using XY Position Information? Figure 8. Normalized input given to Variational Auto Encoder Figure 11. The layer wise loss of edge information can be clearly seen in the above image. Figure 9. Variational Auto Encoder Output (After Reconstruction) Figure 10. Joint position matrix(Sum of reconstructed x and y position matrix) As the input and output images are normalized to unity, the black pixel values correspond to lower probability values and white pixel correspond to higher probability information. As the XY position matrix was auxiliary input to the network there are no specific features which helps in reconstruction of these matrices. But at the same time, as mentioned earlier we can see that the reconstructed position matrices are related to the corresponding input digit image. If we consider the sum of the reconstructed position matrices as the joint probabilities of X and Y matrix (As all image pixels are bounded between 0 and 1, and pixel probability distribution is linear(uniform to certain extent)) then the input image is clearly reconstructed. As a result of which, we conclude that the position matrix helps in learning joint probability distribution of the pixels constituting the digits. In standard convolution operation of any image, only the local (bound to kernel size) relative information is captured. It takes many number of layers to capture the global relative pixel information with some loss of edge information at each convolutional step. But by adding an XY position layer as a channel information, capturing global pixel relative information becomes easier, and the information is procured at a very early stage. As the position information is encoded within the input image channel, the network learns some sort of features or patterns and their relative positions which makes it possible to capture global information at the very initial layers. Mathematically, for any image, it will take about n−s [ ] (1) k steps of convolution to capture whole global information(without pooling). [where, n is the image dimension(assuming image is square), s is the stride size,and k is the kernel size] Mathematically Convolution is defined as: XXXX Y (i, j) = I(i + ki, j + kj) ∗ K(ki, kj), (2) i j ki kj where I is the image and K is the kernel Convolution on an image with XY position stacked is XXXX Y (i, j) = I(i + ki, j + kj, x, y) ∗ K(ki, kj), i ⇒ j ki kj XXXX i j ki I(i + ki, j + kj) ∗ K(ki, kj)+ kj δ(x, y, i + ki, j + kj) The term δ(x, y, i + ki, j + kj) (3) saves the encoded XY position information, technically saving pixel-to-pixel relative information which is preserved after successive convolutions, and can enable the network to learn the relative position between features. Another observation was that the feature maps learnt by networks using XY position information was less redundant as compared to feature maps of standard image input. maps shown in the bottom row(with position info.). Using position information seems to help the network learn features that are normally learnt at deeper layers. Consequently using position helps to reduce the depth and consequently the number of weights making the network computationally less expensive. V. C ONCLUSIONS AND F UTURE WORK We have demonstrated that implementing position coordinates as an auxillary input results in enhanced accuracy as well improved mutliresolution performance. Our results consistently provide an improvement over state of the art results on publicly available classification datasets. We aim to extend this study from gray images to colored images and test the result on CIFAR-10 and STL-10 datasets. We also expect that improved performance could be obtained by integrating the position information into a complex number i.e. by replacing XY position information with Z (i.e X+iY). We expect that implementing position information via the complex domain will helps in reducing the number of parameters as well as number of layers. R EFERENCES Figure 12. Without position information Figure 13. With position information The figure 12 and 13 shows feature maps obtained after the first convolutional layer. It can be observed that quite a few of the feature maps on the top image(without position info.) are fully blank (corresponding to redundant information), but our network using position information was still able to extract some unique features, as is evident from some of the feature [1] “Foundationsofvision.stanford.edu. (2017). foundations of vision  chapter 5: The retinal representation. [online] available at: https://foundationsofvision.stanford.edu/chapter-5-the-retinalrepresentation/ [accessed 27 oct. 2017].,” [2] “Mnist handwritten digit database, yann lecun, corinna cortes and chris burges [online] available at: http://yann.lecun.com/exdb/mnist/ [accessed 27 oct. 2017].,” [3] “Ufldl.stanford.edu. (2017). the street view house numbers (svhn) dataset. [online] available at: http://ufldl.stanford.edu/housenumbers/ [accessed 27 oct. 2017].,” [4] “Benenson, r. (2017). classification datasets results. [online] rodrigob.github.io. available at: http://rodrigob.github.io/are we there yet/build/ classification datasets results.html/ [accessed 31 oct. 2017].,” [5] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014. [6] Y. Kim, C. Denton, L. Hoang, and A. M. Rush, “Structured attention networks,” arXiv preprint arXiv:1702.00887, 2017. [7] “[ebook] iccv2015 tutorial on convolutional feature maps [online] available at: http://kaiminghe.com/iccv15tutorial/iccv2015 tutorial convolutional feature maps kaiminghe.pdf [accessed 27 oct. 2017].,” [8] P. Sermanet, S. Chintala, and Y. LeCun, “Convolutional neural networks applied to house numbers digit classification,” in Pattern Recognition (ICPR), 2012 21st International Conference on, pp. 3288–3291, IEEE, 2012. [9] A. Makhzani, J. Shlens, N. Jaitly, I. Goodfellow, and B. Frey, “Adversarial autoencoders,” arXiv preprint arXiv:1511.05644, 2015. [10] C. Doersch, “Tutorial on variational autoencoders,” arXiv preprint arXiv:1606.05908, 2016.
1cs.CV
Typical Approximation Performance for Maximum Coverage Problem Satoshi Takabe,1, 2, ∗ Takanori Maehara,2 and Koji Hukushima3 1 arXiv:1706.08721v2 [cond-mat.dis-nn] 7 Feb 2018 Department of Computer Science, Nagoya Institute of Technology, Gokiso-cho, Showa-ku, Nagoya, Aichi, 466-8555, Japan 2 RIKEN Center for Advanced Intelligence Project 15F, 1-4-1, Nihonbashi, Chuo-ku, Tokyo, 103-0027, Japan 3 Graduate School of Arts and Sciences, The University of Tokyo, 3-8-1 Komaba, Meguro-ku, Tokyo 153-8902, Japan (Dated: February 8, 2018) This study investigated typical performance of approximation algorithms known as belief propagation, greedy algorithm, and linear-programming relaxation for maximum coverage problems on sparse biregular random graphs. After using the cavity method for a corresponding hard-core lattice–gas model, results show that two distinct thresholds of replica-symmetry and its breaking exist in the typical performance threshold of belief propagation. In the low-density region, the superiority of three algorithms in terms of a typical performance threshold is obtained by some theoretical analyses. Although the greedy algorithm and linear-programming relaxation have the same approximation ratio in worst-case performance, their typical performance thresholds are mutually different, indicating the importance of typical performance. Results of numerical simulations validate the theoretical analyses and imply further mutual relations of approximation algorithms PACS numbers: 75.10.Nr, 89.70.Eg, 89.20.Ff, 02.60.Pn I. INTRODUCTION Approximation algorithms, which are important for hard optimization problems, have attracted researchers’ interest because, for NP-hard optimization problems, one encounters difficulty when solving optimal solutions exactly in polynomial time of the problem size. Since the P versus NP problem arose, development and performance analyses of approximation algorithms have persisted as a central issue of computer science and operations research. Two performance evaluations of approximation algorithms exist: worst-case performance and typical (or average-case) performance. As described in this paper, we specifically examine the latter mainly using statistical–mechanical methods, although the former has been investigated mainly in the literature of theoretical computer science [1]. Worst-case performance is defined by the pair of an optimization problem and its approximation algorithm. An approximation ratio is then defined by the maximal ratio of an optimal value to an approximation value over all instances if the problem is a maximization problem (and vice versa, otherwise). It is important to provide strict performance guarantee of the algorithm, although the worst-case instance is sometimes pathological. However, the typical performance is defined as the average performance of approximation algorithm for a given optimization problem over randomized instances. It is sometimes useful for practical use. It sheds light on properties of optimization problems and approximation algorithms in a perspective that is different from worst-case analysis. ∗ E-mail: s [email protected] An interesting point of the typical property of optimization problems is found in a close relation to the spin-glass theory in statistical physics. Extensive studies of various computational problems have revealed that the concept of replica symmetry (RS) and its breaking (RSB) in spin-glass theory reflects average computational complexity [2] and structure of the solution space [3] of the problems. Typical performance of approximation algorithms often exhibits a phase transition on typical goodness or accuracy of approximation, which is called threshold phenomena in the literature of theoretical computer science [4]. Some approximation algorithms for minimum vertex covers (min-VC) are good examples of threshold phenomena. The problem is defined on a graph. The randomized problem is characterized using a random graph ensemble with c being the average degree. From a statistical–mechanical perspective, the problem on Erdös-Rényi random graphs has the RS-RSB threshold at c = e = 2.71 . . . [5]. Moreover, three approximation algorithms have been investigated: belief propagation (BP) (or message passing) [6], greedy leafremoval algorithm [7], and linear-programming (LP) relaxation [8, 9]. Approximation algorithms other than BP naively have no direct connection to the spin-glass theory. Nevertheless, for Erdös-Rényi random graphs, these algorithms have the same performance threshold as the RS-RSB threshold. However, subsequent studies of general random graphs [10] indicate that their thresholds are not equivalent for some random graphs because of their graph structure. Using statistical–mechanical techniques, typical performance has been studied for variants of leaf removal [11–15] and relaxation technique such as LP relaxation [16, 17] and semidefinite-programming relaxation [18]. These studies have revealed not only typi- 2 cal approximate performance itself but also a suggestive connection to typical properties of optimization problems, random graph structure, and the spin-glass theory. As described in this paper, we examine the unweighted maximum coverage (max-COV) problem defined in the next section. Although the max-COV belongs to the class of NP-hard, it has several practical applications such as pan and scan problems [19], multi-topic blog watch [20], and text summarization [21]. Our main purpose is to examine the typical performance of approximation algorithms for the problem and to compare their performance thresholds. We specifically examine three approximation algorithms: belief propagation, greedy algorithm, and LP relaxation. Some statistical–mechanical methods applied to both analytical and numerical analyses together with mathematical rigorous discussions clarify typical performance of those algorithms and a suggestive mutual relation among approximation algorithms. This paper is organized as follows. In the next section, we define details of the max-COV and its approximation algorithms. As a random graph ensemble, biregular random graphs are also defined. In Section III, a hard-core lattice–gas model for the problem is introduced. Its BP equations are obtained based on Bethe–Peierls approximation. In Section IV, we present a study of the typical performance of BP using the RS cavity method. Calculation of the spin-glass susceptibility provides the threshold below which BP typically approximate max-COV with high accuracy. In Section V, the greedy algorithm is analyzed based on a mean-field rate equation of its deletion process. Using the obtained solution, the typical performance threshold of the greedy algorithm is evaluated. In Section VI, LP-relaxed approximate values are evaluated rigorously. The theorem is proved using the weak duality theorem. In Section VII, we describe some numerical results which support the validity of theoretical analyses presented in the previous sections. We also execute some additional simulations to consider the typical performance of a modified greedy algorithm and randomized rounding of LP relaxation. These results provide suggestive relation between approximation algorithms. The last section is devoted to a summary and discussion of the results. II. MAX-COVER PROBLEM AND APPROXIMATION ALGORITHMS A. Maximum coverage problem The max-COV is defined as follows: Let S be a set of M elements and S = {S1 , · · · , SN } be a collection of subsets of S. For a given positive integer K(≤ N ), the problem is to choose at most K subsets to maximize the total number of elements in the union of chosen subsets. An example of an instance with M = 4 and N = 3 is shown at the left-hand side of Fig. 1. Given that K = 2, one can select subsets S1 and S3 such that all elements FIG. 1. Example of the maximum coverage problem. (Left) An example with M = 4 and N = 3. S1 , S2 , and S3 represent subsets of S = {1, 2, 3, 4}. (Right) A bipartite graph corresponding to the left example. Each vertex in V1 stands for a subset in the left example. are included in the union of the subsets. Converting an instance to a bipartite graph, one obtains an integer-programming (IP) representation of the max-COV. Let G = (V1 , V2 , E) be a bipartite graph where each edge in E connects to a vertex in V1 and a vertex in V2 . Vertices in V1 and V2 are labeled respectively by i ∈ {1, . . . , N } and a ∈ {1, . . . , M }. V1 corresponds to a collection of subsets S, whereas V2 represents S. Each edge (i, a) is set if subset Si includes element a. For Fig. 1, the left example is converted to a bipartite graph in the right-hand side. We then introduce binary variables {xi } and {ya }, respectively, to V1 and V2 . Also, xi is set to one if vertex i (or subset Si ) is selected and zero otherwise. Similarly, ya is set to one if vertex a is connected to a selected vertex (or element a belongs to the union of chosen subsets) and zero otherwise. The problem is therefore represented by the following IP problem: Max. M X ya , a=1 subject to ya ≤ X xi ∀a ∈ V2 , i; (i,a)∈E N X i=1 xi ≤ K, xi ∈ {0, 1} ∀i ∈ V1 , ya ∈ {0, 1} ∀a ∈ V2 . (1) The inequality in the second constraint can be replaced with an equality sign because the problem is a maximization problem. As described in this paper, typical-case property of the max-COV is analyzed by randomizing its instance. Then, we introduce ρx = K/N and assume that ρx ∈ [0, 1] is constant. For random bipartite graphs, we specifically examine (L, R)-biregular random graphs where degrees of each vertex in V1 and V2 respectively denote L and R. Using this simple random graph ensemble, our statistical– mechanical analyses reveal interesting properties of the problem. To take the large graph limit, the number of vertices in V2 is rescaled as M = αN with a constant factor α. We assume that a random graph is sparse, i.e., L and R are constant with respect to N . For the randomized 3 max-COV, we define an average optimal cover ratio over random graphs with cardinality N + M and a given ρx by M X Max. ya , a=1 M 1 X opt ρy (ρx ; N ) = ya (G, ρx ), M a=1 (2) Approximation algorithms We introduce three approximation methods for maxCOVs. The first algorithm is belief propagation (BP). The recursive equations called BP equations are derived from Bethe–Peierls approximation for a spin system corresponding to a given optimization problem. For systems on trees, graphs with no cycles, the Bethe–Peierls approximation and BP are exact. In general, however, there exist cycles in a graph yielding correlations between variables or spins, which results in inexact estimation of solutions (or configurations). BP on graphs with some cycles is regarded as an approximation method. It is called loopy BP [22]. The second one is a simple greedy algorithm. At each step, this algorithm has the following procedure: (i) choose one vertex named i with the maximum degree in V1 , (ii) delete vertices neighboring to vertex i from V2 , and (iii) update V1 to V1 \i and return to (i) if |V1 | > N − K. This simple algorithm gives an approximation ratio of 1 − 1/e [23]. The problem cannot be approximated within this ratio unless P=NP [24]. The last is linear programming (LP) relaxation. An integer programming problem including the max-COV is relaxed to LP problems by replacing integral constraints with real constraints. The LP-relaxed max-COV is given III. X subject to ya ≤ xi ∀a ∈ V2 , i; (i,a)∈E N X where {yaopt (G, ρx )} represents optimal solutions in V2 and (· · · ) represents an average over random bipartite graphs with size N + M . Its limiting value to N → ∞ is denoted by ρy . We simply call it the average optimal cover ratio. B. as (3) xi ≤ K, i=1 xi ∈ [0, 1] ∀i ∈ V1 , ya ∈ [0, 1] ∀a ∈ V2 . Actually, LP approximation value gives the upper bound of the problem. Because LP problems are solvable exactly in polynomial time, LP relaxation is a widely used approximation technique. The approximate solution obtained by LP relaxation usually involves non-integers. One must round those numbers appropriately to obtain an approximate integral solution for the IP problem. Here, we consider randomized rounding [25]. Using the obtained approximation solution {xLP i }, one selects vertex i ∈ V1 to set I ⊂ V1 with probability xLP i /K up to K vertices. Then, the rounded solution {xLPr } is set i to xLPr = 1 for i ∈ I and xLPr = 0 otherwise. The i i rounded approximation value is readily calculated from {xLPr }. In terms of the worst-case performance, LP rei laxation and its randomized rounding in expectation has the same approximation ratio as the greedy algorithm. As described in this paper, we study the typical performance of these approximation algorithms. It is evaluated by approximate values averaged over randomized max-COVs defined in the last subsection. Similar to the average optimal cover ratio, the average cover ratio is defined as the average ratio of the approximate value to the cardinality M of vertex set V2 . It is regarded as exhibiting good typical performance if the average cover ratio obtained by an approximation algorithm is equal to the average optimal cover ratio in the large-N limit. The main aim of this paper is to evaluate the typical performance threshold of ρx below which an approximate algorithm exhibits good typical performance with L and R fixed. Evaluation of the approximation algorithms is accomplished by comparing their typical performance thresholds. BP EQUATIONS FOR MAX-COV As explained in this section, BP equations for max-COV are derived based on the statistical–mechanical model for the problem. We set particles on vertices in V1 and V2 , which respectively occupy vertex i and a if xi = 1 and ya = 1. The hard-core lattice-gas model for max-COVs on bipartite graph G is then naively given as the following partition function. ! ! M ! M N X X X X Y X Ξ0 (µ; G) = exp µ ya H K − xi H xi − ya , (4) x∈{0,1}N y∈{0,1}M a=1 i=1 a=1 i∈∂a Therein, H(x) = 1 (x ≥ 0), 0 (x < 0) is the Heaviside step function and ∂a = {i ∈ V1 | (i, a) ∈ E} stands for a set of neighbors of vertex a ∈ V2 . In the partition function, µ represents a chemical potential for particles on V2 . One 4 can construct BP equations for this model. However, it is inconvenient for practical use because of the constraint PN i=1 xi ≤ K. Therefore, we use the following alternative partition function of ! M ! N M X X X X Y X 0 Ξ(µ; G) = exp µ xi + µ ya H xi − ya , (5) a=1 i=1 x∈{0,1}N y∈{0,1}M a=1 i∈∂a where µ0 = µ0 (µ, ρx ; G) is a chemical potential for particles on V1 . The ratio of µ0 with respect to µ is defined as κ=− µ0 . µ (6) This parameter is regarded as a Lagrange multiplier for the constraint on the number of selected vertices. The appropriate value of κ must satisfy the condition given by * + N 1 X ρx (µ, κ) = ρx , ρx (µ, κ) ≡ xi , (7) N i=1 µ where h. . . iµ is a grand-canonical average with a given µ. To consider ground states, we take the large-µ limit with parameter κ fixed. First, we construct BP equations for Eq. (5). Using the Bethe–Peierls approximation, the single spin probability Pi (x) which xi takes x is Y Pi (x) ' Zi−1 e−µκx Pa→i (x), , (8) ya under the condition xi = x. Similarly, single spin probability Pa (y) that ya takes y reads ! Pa (y) ' Za−1 eµy Y −1 −µκx Pi→a (x) ' Zi→a e H x∂a a∈∂i where ∂i = {a ∈ V2 | (i, a) ∈ E} is a set of neighbors of vertex i ∈ V1 . Z∗ is a normalization factor hereinafter. Pa→i (x) represents the marginal probability of x∂a\i and X X xi − y i∈∂a Y Pi→a (x), (9) i∈∂a where Pi→a (x) is the probability of xi taking x on the cavity graph G\a. These probabilities satisfy the following recursive relations under the same approximation. Pa→i (x), (10) b∈∂i\a  −1 Pa→i (x) ' Za→i X eµy y X H x + x∂a\i To take the large-µ limit later, it is convenient to introduce cavity fields {hia } and {ĥai } defined respectively by Pi→a (x) ∝ exp(µhia x) and Pa→i (y) ∝ exp(µĥai y). Then, BP equations for cavity fields are given as X hia = −κ + ĥbi , (12) b∈∂i\a  ĥai = −  Y 1  1 1 . ln 1 − −µ µ 1+e 1 + eµhja  X xj − y  j∈∂a\i Y Pj→a (x). (11) j∈∂a\i and {ξˆa }, Eqs. (8) and (9) then read ξi = −κ + X ĥai , (14) a∈∂i " # Y 1 1 1 ξˆa = − ln 1 − . µ 1 + e−µ 1 + eµhia (15) i∈∂a (13) j∈∂a\i By rescaling the single spin probability as Pi (x) ∝ exp(µξi x) and Pa (y) ∝ exp(µξˆa y) using local fields {ξi } One can estimate the single spin probability by solving BP equations (12) and (13) as the loopy belief propagation. 5 IV. Taking the large-µ limit, the average cover ratio for ρx < 1/R is obtained as REPLICA-SYMMETRIC SOLUTION In this section, typical performance of BP is studied using the RS cavity method based on the simplest RS ansatz. The RS ansatz assumes that cavity fields {h} and {ĥ} are independent random variables respectively following probability distributions P (h) and P̂ (ĥ). For biregular random graphs, it is apparent that these distributions have no variance because of the absence of fluctuation of degree in V1 and V2 . We therefore introduce the cavity fields h and ĥ on (L, R)-biregular random graphs. Using BP equations (12) and (13), they satisfy the following RS cavity equations in the large-N limit as h = −κ + (L − 1)ĥ,   1 1 ĥ = − ln 1 − . µ (1 + e−µ )(1 + eµh )R−1 (16) (17) (18) (19) According to Eq. (7), for a given ρx , the local field ξ is determined as eµξ = ρx . 1 + eµξ (20) Then, using Eqs. (18) and (20), the appropriate parameter κ is represented as κ = Lĥ − 1 ln r, µ (26) This relation indicates that each vertex in V2 is connected to at most one chosen vertex in V1 . However, if ρx is larger than 1/R (R ≥ 2), then the solution x remains constant for sufficiently large µ. In this case, a simple solution ρRS = 1 is obtained by Eq. (24) because the y average cover ratio in Eq. (26) touches to one at ρx = 1/R. Before closing this section, we discuss the stability of the RS solutions using spin-glass susceptibility defined as X X 1 (hxi ya iµ − hxi iµ hya iµ )2 . χSG (µ) = N +M i∈V1 a∈V2 Similarly, the local fields on (L, R)-biregular random ˆ which satisfy graphs are set to ξ and ξ, ξ = −κ + Lĥ,   1 1 ˆ . ξ = − ln 1 − µ (1 + e−µ )(1 + eµh )R ρRS y = Rρx . (21) where r = ρx /(1 − ρx ). By substituting Eqs. (16) and (21) to Eq. (17) and by introducing x = e−µĥ , one obtains the self-consistent equation as (27) Another representation of χSG using cavity fields is known based on the fluctuation–dissipation theorem [26]. As shown in [27], in the case of biregular random graphs, it reads  !2  ∞ X X ∂ ĥ ai d , χSG (µ) ' λ , λ = E ∂ ĥ bj d=0 j∈∂a\i; b∈∂j\a (28) where E[· · · ] represents an average over vertices in V1 and random graphs. The cavity fields are mutually correlated in general. Actually, BP cannot converge any more [28] if the susceptibility diverges. In this sense, the divergence of χSG not only means the instability of the RS solution, but also poor typical performance of BP as an approximation algorithm in the static sense. In the low-density region where ρx < 1/R holds, it is evaluated as 2  r(1 − x) , λ = (L − 1)(R − 1) 1 + rx → (L − 1)(R − 1)r2 (µ → ∞). (29) (22) The RS-RSB threshold in the large-µ limit therefore reads 1 p ρRS . (30) x = 1 + (L − 1)(R − 1) The order of this solution changes depending on the value of ρx . The solution x vanishes as µ becomes large if ρx < 1/R holds. Using Taylor expansion of the left-hand side of Eq. (22), it is estimated as Otherwise, the other threshold ρRS x (> 1/R) satisfies " #2 0 ∗ ρRS x (1 − x ) (L − 1)(R − 1) = 1, (31) 0 ∗ (1 − ρRS x )(1 + x ) (1 + rx) R−1 (1 − x) = 1 . 1 + e−µ e−µ x= + O(e−2µ ). 1 − (R − 1)r 0 where x∗ is a solution of (23) Using Eq. (19), an average density of particles on V2 reads 0 ρRS x ∗ 1+ 0 x 1 − ρRS x !R−1 (1 − x∗ ) = 1. 0 * lim M →∞ M 1 X ya M i=1 + = µ −R 1 − (1 + rx) 1 − (1 + rx)−R + e−µ = Rρx + O(e−µ ) (24) (25) (32) RS In Fig. 2, RS-RSB thresholds ρRS on (3R, R)x and ρx regular random graphs are shown as a function of R. Except for the case R = 1, the RS-RSB thresholds separate RS and RSB regions. The RSB region remains for a finite ρx while they converge to zero in the large-R limit. 6 the algorithm, i.e., ρgy = Rρx . However, the algorithm typically mistakes selections of vertices in V1 and underestimates the average cover ratio. Results show that ρgx ≤ ρRS x where the equality holds for R = 1, indicating that BP is better than the greedy algorithm in terms of the typical performance threshold. 1 ρRS x ′ ρRS x 0.8 RS ρx 0.6 0.4 RSB 0.2 0 VI. RS 1 2 3 4 5 R 6 7 8 9 10 0 FIG. 2. RS-RSB thresholds ρRS (squares) and ρRS (cycles) x x on (3R, R)-regular random graphs. V. TYPICAL ANALYSIS OF GREEDY ALGORITHM In this section, typical behavior of the greedy algorithm on (L, R)-biregular random graphs is investigated in the low-density region of ρx < 1/R. The corresponding RS solution indicates that one can choose vertices in V1 without overlapping their neighbors. It is therefore sufficient to analyze the fraction of vertices in V1 with maximum degree during the deletion process. Here we analyze a rate equation that is used frequently for analyses of similar greedy algorithms [4, 29]. Let V (T ) be the expected number of vertices with maximum degree in V1 at T -th step of the algorithm. By the definition of the algorithm in sec. II B, we find that N V (T ) N V (T + 1) = N V (T ) − 1 − L(R − 1) + O(N −1 ), N − RT (33) where the assumption L = O(1) is used. By introducing v(t) = V (T )/N and t = T /N , we obtain the following differential equation in the large graph limit. dv(t) L(R − 1) = −1 − v(t). dt 1 − Rt (34) Under the initial condition v(0) = 1, the solution reads L(R−1) R (L − 1)(R − 1)(1 − Rt) v(t) = LR − L − R An LP-relaxed value of the max-COV on any biregular graph is evaluated exactly using the LP duality [30] as follows. Theorem 1 An LP-relaxed value of the max-COV on any (L, R)-biregular graph is LK if K ≤ 1/R holds. Proof. xi = K/N (1 ≤ i ≤ N ), ya = RK/N (1 ≤ a ≤ M ) is a feasible solution of LP-relaxed max-COV (3). The value of the cost function is then RKM/N = LK. The Lagrangian function of Eq. (3) is written as ! M N X X L(x, y, p, q) = ya + p K − xi a=1 + i=1 M X ! qa a=1 X xi − ya , (37) i∈∂a where p ∈ R and q ∈ RM . Using the weak duality theorem, one finds the following inequalities. max min L(x, y, p, q) ≤ min max L(x, y, p, q) x,y p,q p,q x,y ≤ max L(x, y, p, q). x,y (38) Consequently, maxx,y L(x, y, p, q) is an upper bound of the LP-relaxed value. Because Eq. (37) is represented by ! N M X X X L(x, y, p, q) = −p + qa xi + (1−qa )ya +pK, i=1 a∈∂i a=1 (39) where a solution xi = ya = 1 (1 ≤ i ≤ N, 1 ≤ a ≤ M ) realizes P the maximum of the function with p, q satisfying −p+ a∈∂i qa ≥ 0 and 1−qa ≥ 0(1 ≤ a ≤ M ). Assuming that qa = q holds for 1 ≤ a ≤ M , one finds that max L (x, y, p, q) = −pN + LN q + M − M q + pK. (40) x,y − (1 − Rt) . (35) Let ρgx be a threshold below which vertices with the maximum degree are left at the end of the algorithm. Considering that t represents a fraction of chosen vertices in V1 , we find v(ρgx ) = 0, that is, ρgx = ANALYSIS OF LP RELAXATION o R 1 n 1 − [(L − 1)(R − 1)]− LR−L−R . R (36) If ρx < ρgx , then no chosen vertex in V1 has overlapped neighbors in V2 resulting in good typical performance of On the right-hand side, setting (p, q) = (M/N, K/N ) results in LK, which indicates that the upper bound of the LP-relaxed max-COV on (L, R)-biregular graph is LK. Because the approximate solution denoted above achieves this bound, the LP-relaxed value is equivalent to the bound.  This theorem claims that ρy = Rρx (ρx ≤ 1/R), suggesting that LP relaxation typically finds good approximate values in the RS regime. The LP-relaxed value is equivalent to ρRS in the high-density regime where y ρx > 1/R. 7 NUMERICAL RESULTS 0.9 0.7 0.6 Average cover ratio To examine the validity of theoretical analyses on the typical performance of approximation algorithms, the average cover ratio ρy is evaluated using several methods. We employ a BP-guided decimation (BPD) algorithm [22] as a variant of loopy BP to obtain a feasible solution satisfying all the constraints. The algorithm fixes a value of a variable based on a solution of BP equations (11) until all variables are fixed to either zero or one. When a variable is fixed, BP equations are updated by applying the fixed value. If the number of variables in V1 fixed to one reaches to K, the remainders of x are immediately fixed to zero to satisfy the constraint. An approximate value of the algorithm is thus a function of the parameter κ, which depends on inputs, i.e., µ, K and a graph. Here, the BP equations with µ = 20 are solved iteratively up to 150 steps, which enables the algorithm to fix a variable practically even if the iterations cannot reach to the RS fixed point. The parameter κ is tuned to maximize an approximate value while the detail will be reported elsewhere. In addition, the RS estimation of RS average cover ratio ρRS y in the RS regime ρx < ρx is used for comparison to BPD though its typical performance is possibly evaluated directly as in [32]. The theoretical result presented in section VI is used for LP relaxation, which is valid for arbitrary biregular graphs. Average approximate values of the greedy algorithm are estimated numerically with N = 103 . We also evaluate the average optimal value using the replica exchange Monte Carlo (EMC) method [33]. Results show that single-spin flip updates of the model (4) takes a long relaxation time for equilibration even using the exchange MC, indicating the existence of deep valleys of the free energy. Consequently, it is necessary to accelerate equilibration for a system with sufficiently small chemical potential µ. To avoid such slow relaxation, we consider an alternative lattice–gas model on bipartite graph G represented as Ξ1 (µ; G) = X x∈{0,1}N exp µ M X a=1 !! θ X i∈∂a xi δ K, N X ! xi , i=1 (41) 0.04 0.5 0.03 0.4 0.02 0.01 0.3 0.2 A. BPD (N = 400) EMC (N = 200) EMC (N = 400) Greedy (N = 1000) RS/LP 0.8 ∆ρy This section presents description of some numerical results for validation of the theoretical analyses. Here, we set (L, R) = (9, 3) as an example. Then, the RSRSB threshold and the typical performance threshold of the greedy algorithm are evaluated as ρRS = 0.2 and x ρgx = (1 − 2−4/5 )/3 = 0.1418 . . . . Biregular random graphs are generated based on implementation of the configuration model [31]. At least 400 random graphs are used to take a random graph average. ρy VII. ρgx 0.1 0.12 0.14 ρRS x 0.16 0.18 0.2 ρx 0 0.22 0.1 0.15 0.24 ρx 0.2 0.26 0.25 0.28 0.3 FIG. 3. Maximum cover ratio ρy obtained by some approximation algorithms as a function of ρx . Average optimal cover ratios are estimated for the cardinality N = 200 (squares) and 400 (triangles) by the replica exchange Monte Carlo (EMC) method, for N = 1000 by the greedy algorithm (circles), and for N = 400 by the BP-guided decimation (BPD) algorithm (cross marks). The solid line is the RS solution, equivalent to the LP relaxed value. Two vertical lines respectively represent the analytical performance threshold ρgx of the greedy algorithm and the RS-RSB threshold ρRS x . (Inset) The difference ∆ρy between the RS optimal cover ratio and numerical estimations by corresponding approximation algorithms as a function of ρx . where θ(x) takes one if x > 0 and zero otherwise, and δ(x, y) is Kronecker’s delta. In this P model, variables y are eliminated because ya = θ( i∈∂a xi ) holds in the large-µ limit. The ground states of the alternative model therefore correspond to the optimal solutions of the maxCOV on the same graph. Moreover, single-spin flip updates in the model are substantially equivalent to multispin updates in the original model (4), which makes the relaxation time to equilibrium states markedly short. Because optimal values are invariant by replacing inequalPN ity constraint i=1 xi ≤ K to equality one, the equality constraint is adopted and Kawasaki dynamics for a density-conserved system [34] is applied. The results are presented in Fig. 3. Numerical results are compatible to the RS estimation nearly up to the RSRSB threshold ρRS x = 0.2 for the BPD and EMC, and up to the typical performance threshold ρgx predicted analytically for the greedy algorithm. As shown in the inset of Fig. 3, the average cover ratio by the greedy algorithm deviates from the average optimal ratio above ρgx , while other estimates split above ρRS x , indicating that the Bethe–Peierls approximation and LP relaxation are no longer appropriate. In fact, as shown in Fig. 4, the loopy BP for N = 400 fails its convergence above ρx ' 0.195, which may imply the existence of dynamical one-step RSB phase. It is expected that BPD finds approximate solutions with good accuracy if a corresponding loopy BP converges to a fixed point. Otherwise, decimation in BPD is performed based on a wrong estimation by the 8 1 0.3 Greedy (N = 1000) 0.8 0.25 Greedy (N = 5000) 0.2 Modified (N = 1000) Theory Modified (N = 5000) rg pconv 0.6 0.15 0.4 0.1 0.2 0 0.1 0.2 0.3 0.4 ρx 0.5 0.6 0.7 0.8 FIG. 4. Probability of successfully convergent samples in the loopy BP for (9, 3)-biregular random graphs as a function of ρx . The dotted vertical lines represents RS-RSB thresholds shown in Fig. 2. Bethe–Peierls approximation. We emphasize, however, that BPD finds relatively good approximate solutions even in the RSB phase as shown in Fig. 3. From these observations, we confirm that statistical–mechanical analyses successfully predict typical performance thresholds by approximation algorithms. B. Greedy algorithm and its variant Here we examine the greedy algorithm more closely. To validate the correctness of our analysis, we specifically examine a fraction of selected vertices without the maximum degree. The value rg is evaluated by rg = 1 − ρgx , ρx ρgx 0.05 N = 100 N = 400 0 L = 9, R = 3 0 0.1 0.12 0.14 ρx 0.16 0.18 0.2 FIG. 5. Fraction rg of selected vertices without maximum degree until the greedy algorithm stops as a function of ρx . Symbols represent numerical results of the greedy algorithm with cardinality N = 1000 (squares) and 5000 (circles) and modified one with N = 1000 (cross marks) and 5000 (stars). The solid line exhibits the analytical estimation of the fraction rg . W1 . The modified greedy algorithm is given as follows: at each step, (i) choose vertex named i ∈ W1 so that |∂ 2 i ∩ W1 | is minimized, (ii) delete vertices neighboring to vertex i from V2 , and (iii) update W1 and V1 and return to (i) if |V1 | > N − K. In Fig. 5, the fraction rg of the modified algorithm is also shown with that of the original greedy algorithm. As shown in Fig. 5, the typical performance threshold of the proposed algorithm is improved, although it is still below the RS-RSB threshold. This fact suggests that the typical performance of greedy algorithms depends of approximate choices and BP selects vertices better than those greedy selections. (42) where ρgx is given as Eq. (36). The algorithm finds an optimal solution of the problem if rg = 0. As depicted in Fig. 5, the analytical estimations of rg averaged over biregular random graphs agree well with the numerical results. The fraction arises at ρgx corresponding to the typical performance threshold. Additionally, we modify the greedy algorithm to reduce the gap of its typical performance to that of BP. As suggested above, the reason lies in the point that the greedy algorithm often chooses wrong vertices leading to shortage of vertices with maximum degree. To avoid the situation, one must select a vertex to preserve as many vertices to a maximum degree as possible, meaning that the optimal selection requires an exhaustive search. We therefore propose a modified algorithm in consideration of the influence of the selection on other vertices in V1 , the simplest improved algorithm toward the optimal selection. Let ∂ 2 i = {j ∈ V1 \i | j ∈ ∂a (∀a ∈ ∂i)} be a set of the second neighbors of vertex i ∈ V1 . We also define the subset of vertices with the maximum degree in V1 by C. Randomized rounding of LP relaxation In Sec. VII A, we examine the typical performance of LP relaxation in terms of its approximate value. In this subsection, randomized rounding, a practical means of constructing a feasible integer solution from LP relaxation, is applied to LP-relaxed solutions. It is noteworthy that the typical performance of randomized rounding probably depends on the selection of an LP solver and its setting. Here, we use IBM ILOG CPLEX with a default setting. The approximate value of the rounded solution is compared to that of the RS solution in the RS phase, which is LK. One considers that the rounding finds an optimal integer solution of the problem if two estimates mutually coincide. We define a success ratio pr by the fraction of random graphs on which the rounding finds an optimal solution. Fig. 6 presents the average approximation ratio ρry and the success ratio pr as a function of ρx , which strongly suggests that the randomized rounding exhibits a phase transition in terms of its typical performance. The threshold ρrx is less than 0.1, which is much 9 0.6 1 ρry (N = 1000) ρry (N = 5000) 0.5 ρLP y pr (N = 1000) 0.4 pr (N = 5000) 0.6 0.3 pr ρy 0.8 0.4 L = 9, R = 3 0.2 0.2 0.1 0 0 0.02 0.04 0.06 ρx 0.08 0.1 0 0.12 FIG. 6. Typical performance of randomized rounding of LP relaxation as a function of ρx (left vertical axis). Symbols represent approximation values ρry of rounded LP-relaxed solutions with cardinality N = 1000 (squares) and 5000 (cross marks). The solid line represents the average cover ratio equivalent to that of LP relaxation in the region shown. Squares and stars respectively represent the success ratio pr (right vertical axis) of randomized rounding with N = 1000 and 5000. lower than ρgx , whereas the LP-relaxed value is regarded as nearly optimal in the RS region ρx < ρRS x = 0.2. We therefore conclude that the typical performance of the randomized rounding of LP-relaxed solution is inferior to that of the greedy algorithm. VIII. SUMMARY AND DISCUSSION As described in this paper, we investigate the typical performance of approximation algorithms called belief propagation, greedy algorithm, and linear-programming relaxation for maximum coverage problem on sparse biregular random graphs. The typical performance of BP is studied by application of the RS cavity method to a correspondent hard-core lattice–gas model. Results show that, in the large-µ limit, there exist two distinct RS-RSB thresholds regarded as typical performance thresholds of BP. In addition, the greedy algorithm performance and LP relaxation were studied especially in the low-density region. Results show that the typical performance threshold of the greedy algorithm is lower than that of BP and that LP-relaxed values are always equivalent to the RS solutions leading to the threshold equivalent to that of BP. Those analytical results were validated by executing some numerical simulations. Results of additional numerical studies suggest that BP typ- [1] V. V. Vazirani, Approximation Algorithms (Springer Berlin Heidelberg, Berlin, Heidelberg, 2003). ically works better than the modified greedy algorithm and that randomized rounding of LP-relaxed solutions has a lower threshold than the greedy algorithm. To assess the typical performance of BP as an approximation algorithm, we concentrated on statistical– mechanical analysis of max-COV up to the RS level. Further analyses based on the one step RSB will be necessary to reveal statistical–mechanical properties of the problem and typical performance analysis of another algorithm called survey propagation. Another possible avenue of future work is the extension of our analyses to other random bipartite graphs. As with min-VCs, it is an attractive question whether the magnitude relation of typical performance thresholds changes depending on the random graph ensembles. Our results provide not only respective typical performance of approximation algorithms but also their suggestive mutual relations. Specifically examining LP relaxation, it is worth emphasizing that the LP relaxation finds good approximate values compared to optimal values but the typical performance of its randomized rounding has the smallest threshold among approximation algorithms studied here. To fill the gap of thresholds, it is important to examine modifications of LP relaxation such as the cutting-plane approach [35]. As for the greedy algorithms and their modification, numerical results suggest that evaluation of the influence of their deletion process affects the marked improvement of the typical performance threshold. The fact that BP is better than the greedy algorithm and its modification indicates that BP incorporates the influence more efficiently. These suggestions are expected to be of great help to understand properties and relations of approximation algorithms in terms of typical performance. In addition, our analyses of the greedy algorithm and randomized rounding of LP relaxation illustrate that typical case and worst case evaluations capture different notions of approximate performance in optimization problems. This fact indicates the importance of the typical-case analysis of approximation algorithms. We hope that the arguments and results presented herein stimulate further studies and that the typical performance analyses of approximation algorithms will attract the interest of researchers in many diverse fields. ACKNOWLEDGMENTS ST warmly thanks T. Takaguchi for stimulating this study. The use of IBM ILOG CPLEX has been supported by the IBM Academic Initiative. This research was supported by JSPS KAKENHI Grant Nos. 25120010 (KH), 16K16011 (TM), and 15J09001 (ST). [2] R. Monasson, R. Zecchina, S. Kirkpatrick, B. Selman, 10 and L. Troyanskyk, Nature 400, 133 (1999). [3] M. Mézard, F. Ricci-Tersenghi, and R. Zecchina, J. Stat. Phys. 111 (2003). [4] R. M. Karp and M. Sipser, in 22nd Annu. Symp. Found. Comput. Sci. (sfcs 1981) (IEEE, 1981) pp. 364–375. [5] M. Weigt and a. K. Hartmann, Phys. Rev. Lett. 84, 6118 (2000). [6] M. Weigt and H. Zhou, Phys. Rev. E 74, 046110 (2006). [7] M. Bauer and O. Golinelli, Eur. Phys. J. B - Condens. Matter 352, 339 (2001). [8] T. Dewenter and A. K. Hartmann, Phys. Rev. E 86, 041128 (2012). [9] S. Takabe and K. Hukushima, Journal of the Physical Society of Japan 83, 043801 (2014). [10] S. Takabe and K. Hukushima, J. Stat. Mech. Theory Exp. 2016, 113401 (2016). [11] Y.-Y. Liu, E. Csóka, H. Zhou, and M. Pósfai, Phys. Rev. Lett. 109, 205703 (2012). [12] S. Takabe and K. Hukushima, Phys. Rev. E 89, 062139 (2014). [13] C. Lucibello and F. Ricci-Tersenghi, Int. J. Stat. Mech. 2014, 1 (2014). [14] Y. Habibulla, J.-H. Zhao, and H.-J. Zhou, in Int. Work. Front. Algorithmics. (Springer International Publishing., 2015) pp. 78–88. [15] J. Takahashi, S. Takabe, and K. Hukushima, Journal of the Physical Society of Japan 86, 073001 (2017). [16] H. Schawe and A. K. Hartmann, Eur. Phys. Lett. 113, 30004 (2016). [17] S. Takabe and K. Hukushima, Phys. Rev. E 93, 053308 (2016). [18] A. Javanmard, A. Montanari, and F. Ricci-Tersenghi, Proc. Natl. Acad. Sci. 113, E2218 (2016). [19] M. P. Johnson and A. Bar-Noy, Proc. - IEEE INFOCOM , 1071 (2011). [20] B. Saha and L. Getoor, in Ninth SIAM Int. Conf. Data Min. (Society for Industrial and Applied Mathematics, Philadelphia, PA, 2009) pp. 697–708. [21] H. Takamura and M. Okumura, in Proc. Conf. Eur. Chapter Assoc. Comput. Linguist. (2009) pp. 781–789. [22] M. Mézard and A. Montanari, Information, Physics, and Computation (Oxford University Press, 2009) p. 560, arXiv:1412.0611. [23] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, Math. Program. 14, 265 (1978). [24] U. Feige, J. ACM 45, 634 (1998). [25] P. Raghavan and C. D. Tompson, Combinatorica 7, 365 (1987). [26] O. Rivoire, G. Biroli, O. C. Martin, and M. Mézard, Eur. Phys. J. B - Condens. Matter 37, 55 (2003). [27] M. Mézard and M. Tarzia, Phys. Rev. E 76, 041124 (2007). [28] L. Zdeborová, Acta Phys. Slovaca. Rev. Tutorials 59, 169 (2009). [29] M. Weigt, Eur. Phys. J. B - Condens. Matter 28, 369 (2002). [30] R. T. Rockafellar, Convex Analysis (Princeton University Press, 1972). [31] M. E. J. Newman, S. H. Strogatz, and D. J. Watts, Phys. Rev. E 64, 026118 (2001). [32] F. Ricci-Tersenghi and G. Semerjian, J. Stat. Mech. Theory Exp. 2009, P09001 (2009). [33] K. Hukushima and K. Nemoto, J. Phys. Soc. Japan 65, 1604 (1996). [34] K. Kawasaki, Phys. Rev. 145, 224 (1966). [35] A. Schrijver, Theory of linear and integer programming (John Wiley & Sons Ltd,, West Sussex, 1998).
8cs.DS
F -SINGULARITIES UNDER GENERIC LINKAGE arXiv:1607.03972v2 [math.AC] 18 Mar 2018 LINQUAN MA, JANET PAGE, REBECCA R.G., WILLIAM TAYLOR, AND WENLIANG ZHANG Dedicated to Prof. Craig Huneke on the occasion of his 65th birthday Abstract. Let R = k[x1 , . . . , xn ] be a polynomial ring over a prefect field of positive characteristic. Let I be an equi-dimensional ideal in R and let J be a generic link of I in S = R[uij ]c×r . We describe the parameter test submodule of S/J in terms of the test ideal of the pair (R, I) when a reduction of I is a complete intersection or almost complete intersection. As an application, we deduce a criterion for when S/J has F -rational singularities in these cases. We also compare the F -pure threshold of (R, I) and (S, J). 1. Introduction Let R = k[x1 , . . . , xn ] be a polynomial ring over a field of positive characteristic. Let I = (f1 , . . . , fr ) be an equi-dimensional ideal in R of height c, where equi-dimensional means that all associated primes of I have the same height [Mat86]. We can define a regular sequence g1 , . . . , gc in S = R[uij ]c×r via gi := ui1 f1 +· · ·+uir fr , where the uij are variables over S. Then J = (g1 , . . . , gc ) : I is called a generic link of I in S = R[uij ]. The study of generic linkage has attracted considerable attention and has been developed widely from both algebraic and geometric points of view [HU87], [HU88], [CU02], [EHU04], [Niu14]. In contrast to the quick and deep development of singularity theories in the past decades, much less has been known about the behaviors of singularities under generic linkage. A special case is a result of Chardin and Ulrich [CU02] which says that if R/I is a complete intersection and has rational (resp. F rational) singularities, then a generic link S/J also has rational (resp. F -rational singularities). This result in characteristic zero has been vastly extended in recent work of Niu [Niu14], which is our main motivation for this research. Theorem 1.1 (Theorem 1.1 in [Niu14]). Let J be a generic link of a reduced and equidimensional ideal I in S = R[uij ] and assume that the characteristic of k is 0. We have GR GR ∼ denotes the Grauert-Riemenschneider canonical sheaf of S/J (1) ωS/J = J (R, I c ) · (S/J), where ωS/J c and J (R, I ) denotes the multiplier ideal of the pair (R, I c ), (2) lct(S, J) ≥ lct(R, I). In particular, if the pair (R, I c ) is log canonical, then the pair (S, J c ) is also log canonical. This result gives a nice criterion for a generic link to have rational singularities in characteristic 0. It also has applications to bounding the Castelnuovo-Mumford regularity of projective varieties [Niu14, Corollary 1.2]. Since test ideals and F -pure thresholds are characteristic p analogues of multiplier ideals and log canonical thresholds (c.f. [BST15] and [HY03]), it is natural to ask whether analogues of Theorem 1.1 hold for test ideals and F -pure thresholds. Our main result is the following, which partially extends Theorem 1.1 to characteristic p and generalizes [CU02, Theorem 3.13] in characteristic p. Theorem 1.2 (Theorem 3.3, Corollary 4.4). Let J be a generic link of an equi-dimensional ideal I in S = R[uij ] and assume the characteristic of k is p > 0. (1) Suppose I is reduced and that a reduction of I is a complete intersection or an almost complete intersection. Then τ (ωS/J ) ∼ = τ (R, I c ) · (S/J), where τ (ωS/J ) denotes the parameter test submodule c and τ (R, I ) denotes the test ideal of the pair (R, I c ). (2) Suppose that a reduction of I is a complete intersection. Then fptS (J) ≥ fptR (I). In particular, if the pair (R, I c ) is F -pure, then the pair (S, J c ) is also F -pure. This paper is organized as follows: in Section 2 we recall and prove some basic result for F -singularities and test ideals; in Section 3 we give a description of the parameter test submodule of S/J in terms of the test 1 ideal of the pair (R, I), when a reduction of I is a complete intersection or an almost complete intersection. This generalizes earlier results in [CU02]. In Section 4 we compare the F -pure threshold of the pairs (S, J) and (R, I) when a reduction of I is a complete intersection. Acknowledgements. Part of this work was done at Mathematics Research Community (MRC) in Commutative Algebra in June 2015. The authors would like to thank the staff and organizers of the MRC and the American Mathematical Society for their support. The first author would like to thank Karl Schwede, Shunsuke Takagi and Bernd Ulrich for fruitful discussions. The first author was partially supported by NSF Grant DMS #1600198, NSF CAREER Grant DMS #1252860/1501102 and a Simons Travel Grant when preparing this article. The second author was partially supported by NSF RTG grant DMS #1246844. The third author was partially supported by the NSF grant DGE #1256260. The fifth author was partially supported by the NSF grant DMS #1606414. The authors thank the referee for some comments which lead to improvement of the presentation of the paper. 2. F -singularities and test ideals In this section we collect some basic definitions of F -singularities and test ideals and prove a characteristic p > 0 analogue of Ein’s Lemma in [Niu14], which will be used in later sections. Let R be a Noetherian commutative ring of characteristic p > 0. We will use F∗e R to denote the target of r7→r p e the e-th Frobenius endomorphism F e : R −−−−→ R, i.e. F∗e R is an R-bimodule, which is the same as R as an abelian group and as a right R-module, that acquires its left R-module structure via the e-th Frobenius r7→r p e e endomorphism F e : R −−−−→ R. When R is reduced, we will use R1/p to denote the ring whose elements e are pe -th roots of elements of R. Note that these notations (when R is reduced) F∗e R and R1/p are used interchangeably in the literature; we will do so in this paper as well assuming no confusion will arise. Remark 2.1. If R is a commutative ring essentially of finite type over a perfect field of characteristic p > 0, then R admits a canonical module denoted by ωR . Applying HomR (−, ωR ) to the e-th Frobenius R → F∗e R produces an R-linear map HomR (F∗e R, ωR ) → HomR (R, ωR ) = ωR . e ∼ Moreover, we have F∗ ωR = HomR (F∗e R, ωR ) (see [BST15, Example 2.4] for more details). Hence we have a natural R-linear map: ΦeR : F∗e ωR ∼ = HomR (F∗e R, ωR ) → HomR (R, ωR ) = ωR called the trace map of the e-th Frobenius. Example 2.2. When R = k[x1 , . . . , xn ] is a polynomial ring over a perfect field k of characteristic p > 0, we can identify ωR with R, and ΦeR can be identified with the usual trace TreR , that is:  e −1) i2 −(pe −1) in −(pe −1) e  i1 −(p −1) pe pe pe x ∈ Z for each t x · · · x , if it −(p e in e i1 i2 n 1 2 pe TrR (F∗ (x1 x2 · · · xn )) = 0, otherwise In this case HomR (F∗e R, R) is a cyclic F∗e R-module generated by TreR . Furthermore, if f1 , . . . , fc is a regular sequence in R and T = R/(f1 , . . . , fc ), then we have ([Fed83, Corollary on page 465]1) e ΦeT (F∗e (−)) = image of TreR (F∗e (f1p −1 e · · · fcp −1 · −)) in T . Remark 2.3. Let R = k[x1 , . . . , xn ] be a polynomial ring over a field k of characteristic p > 0 and A = R[y1 , . . . , ym ] be a polynomial ring over R. For each ideal I in R, it is well known and straightforward to check that TreR (F∗e (I))A = TreA (F∗e (IA)). Lemma 2.4. Let S → R be a surjection of Noetherian commutative rings of characteristic p. Assume that both S and R admit canonical module ωS and ωR respectively and dim S = dim R. Then ΦeR = ΦeS |ωR . 1Fedder’s result [Fed83, Corollary on page 465] assumes that the ring R is a Gorenstein local ring only to ensure that HomR (F∗ R, R) ∼ = F∗ R. In our case, R = k[x1 , . . . , xn ] is a polynomial ring, so HomR (F∗ R, R) is clearly isomorphic to F∗ R. Hence Fedder’s result applies in our case. 2 Proof. Under our assumptions, we have ωR = HomS (R, ωS ) and the surjection S → R induces an inclusion ωR = HomS (R, ωS ) ֒→ ωS . Consider the following diagram HomR (F∗e R, HomS (R, ωS )) // HomR (R, HomS (R, ωS )) ∼ // HomS (R, ωS )  HomS (F∗e S, ωS )  // HomS (S, ωS ) ∼ // ωS Note that the top row (resp. the bottom row) induces the trace map ΦeR (resp. ΦeS ). To prove our lemma, it suffices to prove (a) the vertical map on the left is an inclusion, and (b) the diagram commutes To prove (a), note that the vertical map on the left can be refined further as HomR (F∗e R, HomS (R, ωS )) = HomS (F∗e R, HomS (R, ωS )) ֒→ HomS (F∗e S, HomS (R, ωS )) since F∗e S ։ F∗e R ֒→ HomS (F∗e S, ωS ) since HomS (R, ωS ) ֒→ ωS To prove (b), note that the commutativity follows directly from the commutativity of S // F∗e S  R  // F e R ∗  Definition 2.5 (cf. Definition 3.1 in [Har01] and Definition 2.33 in [BST15]). Let R be an F -finite Noetherian integral domain of characteristic p. The parameter test submodule τ (ωR ) is the unique smallest nonzero submodule M of ωR such that ΦR (F∗ M ) ⊆ M . R is called F -rational if R is Cohen-Macaulay and τ (ωR ) = ωR . Note that this is not the original definition of F -rationality, but is known to be equivalent [Smi97]. Definition 2.6 (cf. Definition 3.16 and Theorem 3.18 in [Sch11]). Let R be an F -finite Noetherian integral domain of characteristic p. Let I ⊆ R be a nonzero ideal and t ∈ Q≥0 . We define the test ideal τ (R, I t ), e abbreviated τ (I t ), to be the unique smallest nonzero ideal J ⊆ R such that φ(F∗e (I ⌈t(p −1)⌉ J)) ⊆ J for all e > 0 and all φ ∈ HomR (F∗e R, R). Definition 2.7 (cf. Definitions 1.3 and 2.1 and Proposition 2.2 in [TW04]). Let R be an F -finite, local, Noetherian, integral domain of characteristic p. Let I ⊂ R be an ideal and t ≥ 0 be a real number. e (1) The pair (R, I t ) is F -pure if for all large e ≫ 0, there exists an element d ∈ I ⌊t(p −1)⌋ such that (F∗e d)R ֒→ F∗e R splits as an R-module homomorphism. e (2) The pair (R, I t ) is strongly F -regular if for every c 6= 0 there exists e ≥ 0 and d ∈ I ⌈tp ⌉ such that F∗e (cd)R ֒→ F∗e R splits as an R-module homomorphism. (3) The F -pure threshold fptR (I) of (R, I) is sup{s ∈ R≥0 | the pair (R, I s ) is F -pure}, and when R is strongly F -regular, we also have fptR (I) = sup{s ∈ R≥0 | the pair (R, I s ) is strongly F -regular}. Remark 2.8. Note that when R is local, (R, I t ) is strongly F -regular if and only if τ (I t ) = R. Indeed, e suppose (R, I t ) is strongly F -regular. Pick a nonzero element c ∈ J and take e ≫ 0 and d ∈ I ⌈tp ⌉ satisfying the conditions of strong F -regularity for c, and let φ : F∗e R → R be a map such that φ(F∗e (cd)) = 1. Then e φ(F∗e (I ⌈t(p −1)⌉ e J)) ⊇ φ(F∗e (I ⌈tp ⌉ J)) = R, and so τ (I t ) = R. On the other hand, if τ (I t ) = R, 0 6= c ∈ R, and a ∈ I ⌈t⌉ , then there exists e ≥ 0 and φ : F∗e R → R such e e that φ(F∗e (I ⌈t(p −1)⌉ acR)) = R. Let b ∈ I ⌈t(p −1)⌉ and f ∈ R such that φ(F∗e (c(abf ))) = 1. Then we are e e done once we note that abf ∈ I ⌈t⌉ I ⌈t(p −1)⌉ ⊆ I ⌈tp ⌉ . 3 We will need the following important description of test ideals: Theorem 2.9 (cf. Proof of Theorem 3.18 in [Sch11]). With the notations as in Definition 2.6, for any nonzero a ∈ τ (I t ), we have: XX e τ (I t ) = φ(F∗e (aI ⌈t(p −1)⌉ )) e≥0 φ where the inner sum runs over all φ ∈ HomR (F∗e R, R). Remark 2.10. With the notations as in Definition 2.6, the following holds ([BSTZ10, 3.3]) X X e φ(F∗e (dI ⌈tp ⌉ )) (2.10.1) τ (I t ) = e≥0 φ∈HomR (F∗e R,R) where d is a big test element (which is just a nonzero element in τ (R) = τ (R, I 0 )). If R = k[x1 , . . . , xn ] is a polynomial ring over a perfect field k of characteristic p > 0, then one can set d = 1 in (2.10.1) and HomR (F∗e R, R) is a cyclic F∗e R-module generated by TreR as discussed earlier. Hence by (2.10.1), X X X e e φ(F∗e (aI ⌈t(p −1)⌉ )) = TreR (F∗e (aI ⌈t(p −1)⌉ )), for any a ∈ τ (I t ) τ (I t ) = e≥0 φ∈HomR (F∗e R,R) = X X e≥0 φ∈HomR (F∗e R,R) e≥0 e φ(F∗e (I ⌈tp ⌉ )) = X e TreR (F∗e (I ⌈tp ⌉ )) e≥0 Remark 2.11. With the notations as in Definition 2.5, one can show that if Ra′ is regular, then for every P sufficiently large power a of a′ , τ (ωR ) = e ΦeR (F∗e (a · ωR )). This can be proved by a similar argument as [ST12, Lemma 3.6, Lemma 3.8] so we omit the details. The following result from [ST12] will also be used. These results were originally proved in [HY03] and [HT04], and they hold as long as R is F -finite. We will only state the version of these results that we need. Lemma 2.12 (cf. Theorem 6.9 in [ST12]). Let R be an integral domain essentially of finite type over a perfect field of characteristic p > 0 and let I, J ⊆ R be nonzero ideals and t ∈ R≥0 . (1) If J is a reduction of I, then τ (I t ) = τ (J t ). (2) If J is generated by r elements, then τ (J r ) = Jτ (J r−1 ). We are ready to prove the characteristic p > 0 analogue of Ein’s Lemma in [Niu14]: Lemma 2.13 (Ein’s Lemma in characteristic p > 0). Let R be an integral domain essentially of finite type over a perfect field of characteristic p > 0 and let I ⊆ R be an equi-dimensional and unmixed ideal of codimension c. If τ (I c−1 ) = R, then τ (I c ) = I. In particular, if R is strongly F -regular and (R, I c ) is F -pure, then τ (I c ) = I. Proof. The lemma will follow from the following two inclusions: (2.13.1) τ (I c ) ⊆ I. (2.13.2) Iτ (I t−1 ) ⊆ τ (I t ) for all t ≥ 1. Indeed, if τ (I c−1 ) = R, then I = Iτ (I c−1 ) ⊆ τ (I c ) ⊆ I, and so we have equality throughout. Proof of (2.13.1). Since inclusion is a local condition, we may assume that R is local with maximal ideal m. By replacing R by R[x]mR[x] , we may assume that R has infinite residue field: it is straightforward to check that τ (I c )R[x]mR[x] = τ ((IR[x]mR[x] )c ). Now let p be a minimal prime of I. Since I is equi-dimensional, dim Rp = c. Hence IRp has a reduction J ⊆ IRp generated by c elements. Therefore, since test ideals localize, τ (I c )Rp = τ ((IRp )c ) = τ (J c ) = Jτ (J c−1 ) ⊆ J ⊆ IRp . Since every associated prime of I is minimal, this inclusion holds for all associated primes of I, hence it holds globally, i.e. τ (I c ) ⊆ I.  4 Proof of (2.13.2). This should be well known to experts in the field; we opt to provide a proof here since we could not locate a proper reference. Let t ∈ R≥1 , and pick 0 6= a ∈ τ (I t ). Then  XX   e Iτ (I t−1 ) = I φ F∗e aI ⌈(t−1)(p −1)⌉ e≥0 φ  XX   e e = φ F∗e aI [p ] I ⌈(t−1)(p −1)⌉ e≥0 φ  XX   e e ⊆ φ F∗e aI p I ⌈(t−1)(p −1)⌉ e≥0 φ  XX   e e = φ F∗e aI p +⌈(t−1)(p −1)⌉ e≥0 φ  XX   e ⊆ φ F∗e aI ⌈t(p −1)⌉ e≥0 φ = τ (I t ), where the inner sum runs over all φ ∈ HomR (F∗e R, R) and the last inclusion following from the fact that pe + ⌈(t − 1)(pe − 1)⌉ = ⌈pe + (t − 1)(pe − 1)⌉ = ⌈t(pe − 1) + 1⌉ > ⌈t(pe − 1)⌉.  For the last statement, if (R, I c ) is F -pure, then the F -pure threshold of I is at least c. Since the F -pure threshold is the supremum of those values t for which (R, I t ) is strongly F -regular when R is strongly F regular [TW04, Proposition 2.2], we have that (R, I c−1 ) is strongly F -regular. This means that τ (I c−1 ) = R by Remark 2.8, and hence the first statement of the lemma tells us τ (I c ) = I.  3. F -rationality under generic linkage In this section, we investigate how F -singularities (e.g. F -purity, F -rationality, etc) behave under a generic linkage. To this end, we will also consider the behaviors of test ideals under a generic linkage. We begin with recalling the definition of a generic link. Definition 3.1. Let R = k[x1 , . . . , xn ] be a polynomial ring over a perfect field of positive characteristic. Let I be an equi-dimensional and unmixed ideal of R of height c. Fix a generating set {f1 , . . . , fr } of I. Let (uij ), 1 ≤ i ≤ c, 1 ≤ j ≤ r, be a c × r matrix of variables. Consider c elements g1 , . . . , gc in S = R[uij ] defined by gi := ui1 f1 + ui2 f2 + · · · + uir fr for 1 ≤ i ≤ c. Then J = (g1 , . . . , gc ) : (IS) is called the first generic link of I with respect to {f1 , . . . , fr } (we also call S/J the generic link of R/I with respect to {f1 , . . . , fr }). Remark 3.2. It is well known that under the above assumptions, if I is reduced, then IS and J are geometrically linked, i.e., IS = (g1 , . . . , gc ) : J and IS ∩ J = (g1 , . . . , gc ). Moreover, J is actually a prime ideal of height c [HU85, 2.6]. The following theorem is our main technical result in this section. Theorem 3.3. With the notation as in Definition 3.1, assuming I is reduced, we have (1) τ (ωS/J ) ⊆ τ (I c ) · (S/J); (2) If I has a minimal reduction generated by at most c + 1 elements, then τ (ωS/J ) ⊇ τ (I c ) · (S/J); hence τ (ωS/J ) = τ (I c ) · (S/J) in this case. Our proof of Theorem 3.3(2) requires considering different sets of generators of I. A priori, a generic link (S, J) depends on the choice of generators. The following lemma guarantees that the statement in Theorem 3.3(2) is independent of the choice of generators of I. Its proof follows the same line as the proof of [HU87, Proposition 2.11]. Lemma 3.4. Let Λ1 and Λ2 be two sets of generators of I and let (S1 , J1 ) and (S2 , J2 ) be generic links of I with respect to Λ1 and Λ2 respectively. Then τ (ωS1 /J1 ) ⊇ τ (I c ) · (S1 /J1 ) iff τ (ωS2 /J2 ) ⊇ τ (I c ) · (S2 /J2 ). 5 Proof. By considering Λ1 ∪ Λ2 , we can assume that Λ1 ⊆ Λ2 . By induction on the difference between the cardinality of Λ1 and Λ2 , we may assume that Λ2 has one more element than Λ1 , i.e. we may assume that Λ1 = {f1 , . . . , fr } and Λ2 = Λ1 ∪ {fr+1 }. Denote the height of I by c. Let {uij | 1 ≤ i ≤ c, 1 ≤ j ≤ r + 1} be indeterminates over R. Set S1 = R[uij ]1≤i≤c,1≤j≤r and S2 = R[uij ]1≤i≤c,1≤j≤r+1 . For i = 1, . . . , c, set gi := ui1 f1 + · · · + uir fr and hi := ui1 f1 + · · · ui,r+1 fr+1 . Then J1 = ((g1 , . . . , gc ) :S IS) is the first generic link of I with respect to Λ1 and J2 = ((h1 , . . . , hc ) :S2 IS2 ) is the first generic link of I with respect to Λ2 . Pr It is clear that S2 = S1 [u1,r+1 , . . . , uc,r+1]. Since fr+1 ∈ I, we must have that fr+1 = j=1 aj fj for some aj ∈ R. Let ϕ : S2 → S2 be the automorphism given by the linear change of variables uij 7→ uij + ui,r+1 aj for 1 ≤ i ≤ c and 1 ≤ j ≤ r and ui,r+1 7→ ui,r+1 for 1 ≤ i ≤ c. We claim that ϕ(J1 S2 ) = J2 and we reason as follows. For i = 1, . . . , c, we have that ϕ(gi ) = r X j=1 (uij + ui,r+1 aj )fj = r X uij fj + ui,r+1 r X aj f j = j=1 j=1 r X uij fj + ui,r+1 fr+1 = hi . j=1 Now since S1 ֒→ S2 is a faithfully flat extension, we have that J1 S2 = ((g1 , . . . , gc ) :S1 IS1 )S2 = ((g1 , . . . , gc )S2 :S2 IS2 ), and hence ϕ(J1 S2 ) = ϕ((g1 , . . . , gc )S2 :S2 IS2 ) = (ϕ(g1 , . . . , gc )S2 :S2 ϕ(IS2 )) = ((h1 , . . . , hc ) :S2 IS2 ) = J2 . S2ϕ denote the S1 -algebra that is the same as S2 as a ring and whose S1 -module structure is induced by Let ϕ → S2 . Then we have shown that J1 ⊗S1 S2ϕ = J2 and hence S1 /J1 ⊗S1 S2ϕ = S2 /J2 . Combining S1 ֒→ S2 − Remarks 2.3 and 2.11, one can check that τ (ωS1 /J1 ) ⊗S1 S2ϕ = τ (ωS1 /J1 ⊗S1 S2ϕ ) where the right hand side is precisely τ (ωS2 /J2 ). Our lemma follows immediately since S2ϕ is faithfully flat over S1 .  The following lemma is also needed in the proof of Theorem 3.3. Lemma 3.5. Let c, r be positive integers such that c = r orP c = r − 1. Let β = (β1 , . . . , βr ) be an element of Nr , where N is the set of non-negative integers. Assume i βi = c(pe − 1). Then there exist c elements α1 , ..., αc in Nr such that: (1) each αi has at most two nonzero entries; e (2) the sum P of the entries of each αi is p − 1; (3) βj = i αij , where αi = (αi1 , . . . , αir ). Proof. We will induce on r. If c = r = 1, then β = (pe − 1) and we let α1 = β. If c = 1, r = 2, we have β = (β1 , β2 ) where β1 + β2 = pe − 1 and we can let α1 = (β1 , β2 ) and again (1)-(3) hold. If c = r and β1 = · · · = βc = pe − 1, then we can set αi to be the vector with pe − 1 at i-th spot and 0 elsewhere. Otherwise, there must be a βi < pe − 1. Without loss of generality, we assume that βr < pe − 1. We claim that βj ≥ pe − 1 − βr for some j between 1 and r − 1, and we reason as follows. If c = r, then there must be a j such that βj > pe − 1, and hence βj ≥ pe − 1 − βr . Now assume that c = r − 1. Suppose βi < pe − 1 − βr for all i ≤ r − 1, as then we would have: r X βi < (r − 1)(pe − 1 − βr ) + βr ≤ (r − 2)(pe − 1 − βr ) + (pe − 1) ≤ (r − 1)(pe − 1) = c(pe − 1) i=1 6 Pr which contradicts the assumption that i=1 βi = c(pe − 1). So, there is a j between 1 and r − 1 such that βj ≥ p e − 1 − βr . Set αc := (0, . . . , 0, pe − 1 − βr , 0, . . . , βr ) where pe − 1 − βr appears in the j-th spot. Consider (β1 , . . . , βj−1 , βj − (pe − 1 − βr ), βj+1 , . . . , βr−1 ). This is an element of Nr−1 such that the sum of its entries is (c − 1)(pe − 1). By our induction hypotheses, there are γ1 , . . . , γc−1 ∈ Nr−1 that satisfy (1), (2), and (3). For 1 ≤ i ≤ c − 1, setting αi be γi with a 0 added to the end completes the proof of our lemma.  Proof of Theorem 3.3. By Remark 3.2, J is a minimal prime of (g1 , . . . , gc ). Hence once we identify ωS/J = HomS/(g1 ,...,gc ) (S/J, S/(g1 , . . . , gc )) = ((g1 , . . . , gc ) : J) · (S/J) = I · (S/J), we know from Lemma 2.4 that e ΦeS/J (F∗e (−)) = ΦeS/(g1 ,...,gc ) (F∗e (−))|ωS/J = TreS (F∗e (g1p −1 e · · · gcp −1 · −))|I·(S/J) . Next we notice that for every 1 ≤ k ≤ r, (S/J)fk ∼ = Rfk [uij |j 6= k] is regular. Hence for N ≫ 0, fkN is a test element for S/J. Thus by Remark 2.11, we have: X X e e (3.5.1) τ (ωS/J ) = ΦeS/J (F∗e (fkN · ωS/J )) = TreS (F∗e (g1p −1 · · · gcp −1 · fkN · IS)) · (S/J) e≥0 e≥0 Since fk ∈ I and R is regular, by Remark 2.10, for N ≫ 0 we also have: X e (3.5.2) τ (I c ) · (S/J) = TreR (F∗e ((f1 , . . . , fr )c(p −1) · fkN · R)) · (S/J) e≥0 e e When we expand g1p −1 · · · gcp −1 , it is easy to see from (3.5.1) that τ (ωS/J ) can be generated by elements of the form        e e Y Y p −1 p −1 γ  α   uijij  uijij · fkN · s · ··· f β1 f β2 · · · frβr (3.5.3) TreS F∗e  α11 , . . . , α1r αc1 , . . . , αcr 1 2 1≤i≤c 1≤i≤c 1≤j≤r 1≤j≤r where 0 ≤ αij ≤ pe − 1, βj = is equal to Y αij +γij −(pe −1) pe uij · Pc i=1 TreR 1≤i≤c αij , Pr j=1 βj = c(pe − 1) and s ∈ I. By definition of the trace map, this       pe − 1 pe − 1 β1 β2 e N βr ··· F∗ f f · · · fr · fk · s α11 , . . . , α1r αc1 , . . . , αcr 1 2 1≤j≤r α +γ −(pe −1) denotes 0 if αij + γij 6≡ −1 mod pe . But it is clear that this element is in τ (I c ) · S by where ij ijpe expression (3.5.2). This proves (1). Next we prove (2). By Lemma 3.4 we can assume that I˜ = (f1 , . . . , fc+1 ) is a reduction of I (the case that I has a reduction generated by c elements is similar). Hence by the arguments above, we have that, for 1 ≤ k ≤ c and N ≫ 0, X e τ (I c ) · (S/J) = τ (I˜c ) · (S/J) = TreR (F∗e ((f1 , . . . , fc+1 )c(p −1) · fkN +1 · R)) · (S/J) e≥0 f1β1 βc+1 · · · fc+1 Given a generator sion of Lemma 3.5. Then e of (f1 , . . . , fc+1 )c(p Y , we can find α1 , . . . , αc ∈ Nc+1 satisfying the concluY (uij fj )αij = 1≤i≤c 1≤i≤c 1≤j≤c+1 1≤j≤c+1 pe −1 pe −1 α11 ,...,α1,c+1 · · · αc1 ,...,αc,c+1   pe −1 pe −1 for some ji by αi1 ,...,αi,c+1 = αiji appears with coefficient mial coefficient −1)   α uijij β Y fj j 1≤j≤c+1 e in the product g1p −1 e · · · gcp −1 . Because each multino- Lemma 3.5 (1)-(2), they are nonzero in k. 7 Each αij is less than pe , so let  Y  s′ =  pe −1−αij   uij 1≤i≤c 1≤j≤c+1 Then TreS (F∗e (− · s′ )) sends e Q e 1≤l≤n xlp e −1 Q    Y 1≤i≤c c+2≤j≤r pe −1  uij . α 1≤i≤c 1≤j≤c+1 uijij to 1 and all other basis elements to 0. Hence, TreS (F∗e (g1p −1 · · · gcp −1 · fkN +1 · s′ · R))        Y c+1 e e Y e p −1 p −1  β   p −1 fj j · fkN +1 R uij ··· · = TreS F∗e  α11 , . . . , α1,c+1 αc1 , . . . , αc,c+1 j=1 1≤i≤c 1≤j≤r   = TreR F∗e  c+1 Y j=1 In particular,   TreR F∗e  c+1 Y j=1 β fj j  β fj j · fkN +1 · R .  e · fkN +1 · R · (S/J) = TreS (F∗e (g1p −1 e · · · gcp −1 · fkN · fk s′ R)) · (S/J) ⊆ τ (ωS/J ) Q e βj of (f1 , . . . , fc+1 )c(p −1) , where the second inclusion follows from expression for every generator c+1 j=1 fj (3.5.1). Therefore we have τ (I c ) · (S/J) = τ (I˜c ) · (S/J) X e = TreR (F∗e ((f1 , . . . , fc+1 )c(p −1) · fkN +1 · R)) · (S/J) e≥0 ⊆ τ (ωS/J ).  Remark 3.6. The proof of Theorem 3.3 (2) requires the minimal reduction be generated by at most c + 1 elements. If not, then we are not in the case of Lemma 3.5 and it may be the case that there are always at least three nonzero entries in some αi . Consequently, multinomial coefficients must be taken into consideration. Corollary 3.7. With the notation as in Definition 3.1 and the assumptions as in Theorem 3.3 (2), τ (ωS/J ) = ωS/J if and only if τ (I c ) = I. In particular, S/J has F -rational singularities if and only if S/J is CohenMacaulay and τ (I c ) = I. Proof. If τ (I c ) = I, then Theorem 3.3 immediately implies τ (ωS/J ) = ωS/J . Conversely, assume that τ (I c ) 6= I and τ (ωS/J ) = ωS/J . Since τ (I c ) is always contained in I by (2.13.1), at least one of the generators of I is not in τ (I c ), say f1 . From Theorem 3.3, we can see that τ (I c )S+J = IS+J; hence f1 ∈ τ (I c )S + J. Thus, there are elements a ∈ τ (I c )S and b ∈ J such that f1 = a + b. (Note that b 6= 0.) Then we have f1 − a ∈ J which implies that (f1 − a)f1 ∈ (g1 , . . . , gc ). However, this is impossible because of the degrees in the uij . This is a contradiction. The last assertion is clear because S/J is F -rational if and only if S/J is Cohen-Macaulay and τ (ωS/J ) = ωS/J .  Corollary 3.8. With the notation as in Definition 3.1 and the assumptions as in Theorem 3.3 (2), if the pair (R, I c ) is F -pure and R/I is Cohen-Macaulay, then S/J is F -rational. In particular, if R/I is an F -pure complete intersection, then S/J is F -rational. Proof. By Lemma 2.13, (R, I c ) is F -pure implies τ (I c ) = I. The first statement thus follows from Corollary 3.7. Finally, it is well known that when R/I is an F -pure complete intersection, the pair (R, I c ) is F -pure. This follows from a Fedder type criterion ([Tak04, Lemma 3.9] and others).  We can recover [Niu14, Corollary 3.4] in the complete intersection and almost complete intersection cases. 8 Corollary 3.9. Let I = (f1 , . . . , fr ) be an ideal of C[x1 , . . . , xn ] and let c be the codimension of I. Let S and J be in Definition 3.1. Assume that r ≤ c + 1. Then S/J has rational singularities if and only if S/J is Cohen-Macaulay and I (I c ) = I, where I (I c ) is the multiplier ideal of I c . Proof. By [Smi97] and [Har98], S/J has rational singularities if and only if its reduction (S/J)p is F -rational for all p ≫ 0. It is easy to see that, for p ≫ 0, the reduction Jp of J is a generic link of the reduction Ip of I. Hence, S/J has rational singularities if and only if (S/J)p is Cohen-Macaulay and τ (Ipc ) = Ip for p ≫ 0 by Corollary 3.7. On the other hand, it was proved in [HY03] that I (I c )p = τ (Ipc ) for all p ≫ 0. Therefore, we have S/J has rational singularities if and only if (S/J)p is Cohen-Macaulay and I (I c )p = Ip for p ≫ 0. This completes the proof.  4. Behavior of F -pure threshold under generic linkage In this section we investigate behaviors of F -pure thresholds under generic linkages. We begin with an easy lemma. Lemma 4.1. Let R = k[x1 , . . . , xn ] be a polynomial ring over a perfect field of characteristic p and I be an equi-dimensional and unmixed ideal of R. Let Λ1 and Λ2 be 2 sets of generators of I and let (Si , Ji ) be the generic link with respect to Λi (i=1,2). Then fptS1 (J1 ) = fptS2 (J2 ). Proof. As in the proof of Lemma 3.4, we can assume that Λ1 = {f1 , . . . , fr } and Λ2 = {f1 , . . . , fr , fr+1 }. Let ϕ and S2ϕ be the same as in the proof of Lemma 3.4. It is straightforward to check that τ (J1t ) ⊗S1 S2ϕ = τ (J2t ) for each nonnegative real number t. Our lemma follows immediately.  Remark 4.2. Let k ⊆ K be an extension of perfect fields and let R = k[x1 , . . . , xn ] and T = K[x1 , . . . , xn ]. e e Since HomR (R1/p , R) and HomT (T 1/p , T ) are generated by the same projection, we have τR (I t ) = τT ((IT )t ) (c.f. [BMS08, Remark 2.18]). Theorem 4.3. Let R = k[x1 , . . . , xn ] be a polynomial ring over a perfect field of characteristic p and I be an equi-dimensional and unmixed ideal of height c in R. Assume that I = (f1 , . . . , fs ) and that I has a reduction I˜ generated by r elements. Let S = R[uij ]1≤i≤c,1≤j≤s be a polynomial ring over R. For 1 ≤ i ≤ c, let gi = ui1 f1 + ui2 f2 + . . . + uis fs . c Then fptS (g1 , . . . , gc ) ≥ r fptR (I). Proof. By Lemma 4.1, we can add the generators of I˜ to those of I and then assume that I˜ = (f1 , . . . , fr ). ˜ Hence it Since I˜ is a reduction of I, it follows from [TW04, Proposition 2.2(6)] that fptR (I) = fptR (I). ct t ˜ suffices to show that τR (I ) = R implies τS ((g1 , . . . , gc ) r ) = S for any positive real number t < c. To this end, assume that τR (I˜t ) = R. By Remark 4.2, we may assume that k is algebraically closed. ct We wish to show that τS ((g1 , . . . , gc ) r ) = S. Suppose otherwise and we seek a contradiction. There ct is a maximal ideal m of S such that τS ((g1 , . . . , gc ) r ) ⊆ m. Since k is algebraically closed, we can write m = (x1 − a1 , . . . , xn − an , u11 − b11 , . . . , ucr − bcr ) for some ai , bij ∈ k. Set n = (x1 − a1 , . . . , xn − an ). e Since τR (I˜t ) = R, there exist an integer e, an R-linear map φ ∈ HomR (R1/p , R), and nonnegative integers e e P α /p α /p / n. α1 , . . . , αr with i αi = ⌈tpe ⌉ such that φ(f1 1 · · · fr r ) ∈ At this point we show that each fj ∈ n, and therefore αj ≤ pe − 1 for all j. Indeed, let e ≥ 1 such e (pe −1)/pe (pe −1)/pe (pe −1)/pe to 1 · · · ucj u2j that pe ≥ c/(c − t) and let ψ : S 1/p → S send the basis element u1j a /pe b /pe and all other basis elements xℓ ℓ uijij (ct/r)pe ≤ tpe ≤ c(pe − 1). Therefore fjc −1 pe −1 g2 · · · ucj c/pe (pe −1)/pe (pe −1)/pe g1 g2 · · · gc(p ψ(fj = ψ(fj ⌈(ct/r)pe ⌉ 1/pe ψ(((g1 , · · · , gc ) ) 9 e · · · gcp −1 e )⊆m −1)/pe ) e ∈ (g1 , · · · , gc )⌈(ct/r)p ⌉ , because (pe −1)/pe c(pe −1)/pe ) fj c/pe (pe −1)/pe (pe −1)/pe u2j u1j = ⊆ e to 0. Now fjc g1p ct by our choice of ψ and the assumption that τS ((g1 , . . . , gc ) r ) ⊆ m. It follows that fj ∈ m ∩ R = n. Without loss of generality, we may assume that pe − 1 ≥ α1 ≥ α2 ≥ · · · ≥ αr . Consequently, lc m lc m lc m α1 + · · · + αc ≥ (α1 + · · · + αr ) = ⌈tpe ⌉ ≥ tpe r r r α /pe α /pe α /pe α /pe c+1 c+1 · · · fr r followed by the application · · · fr r ·−), i.e. pre-multiplication by fc+1 Let φα = φ(fc+1 e α1 /pe αc /pe 1/p → R is an R-linear map and that φα (f1 · · · fc )∈ / n. We can extend of φ. It is clear that φα : R e e φα to an S-linear map ψα : R1/p [uij ] → S = R[uij ] that sends each uij to itself and restricts to φα on R1/p . e e Q e e e b /p 1/p It is clear that S 1/p = R1/p [uij ] is a free R1/p [uij ]-module with a basis { 0≤bij ≤pe −1 uijij }. Let e 1/pe α /pe α /pe e to 1 and all other basis elements πα : R1/p [uij ] → R1/p [uij ] be the projection that sends u111 · · · uccc to 0. ψz a πα e e Let θα be the composition of S 1/p −−→ R1/p [uij ] −−→ S. It is clear that θα is S-linear. By the construction of πα , it is straightforward to check that α /pe e α /pe Since φ(f1 1 α /pe · · · fr r e α /p φ(f1 1 e e α /pe · · · gcαc /p ) = θα ((u11 f1 )α1 /p · · · (ucc fc )αc /p ) = φ(f1 1 θa (g1 1 e · · · frαr /p ). ) in R but not in n = (x1 − a1 , . . . , xn − an ), we must have e · · · frαr /p ) ∈ / m = (x1 − a1 , . . . , xn − an , u11 − b11 , . . . , ucr − bcr ), ct ct e a contradiction to the assumption that τS ((g1 , . . . , gc ) r ) ⊆ m (note that g1α1 · · · gcαc ∈ (g1 , . . . , gc )⌈ r p ⌉ ).  We have some immediate corollaries. Corollary 4.4. Let R = k[x1 , . . . , xn ] be a polynomial ring over a perfect field of characteristic p and I be an equi-dimensional and unmixed ideal of height c in R. Let J be a generic link of I in S = R[uij ]. The following hold: (1) If I has a reduction generated by r elements, then fptS (J) ≥ rc fptR (I). (2) If I has a reduction generated by c elements, in particular if I is a complete intersection, then fptS (J) ≥ fptR (I). (3) fptS (J) ≥ nc fptR (I) (note n = dim(R)). Proof. To prove (1), note that since (g1 , . . . , gc ) ⊆ J, we have fptS (J) ≥ fptS (g1 , . . . , gc ). Theorem 4.3 then completes the proof. (2) is an immediate consequence of (1). (3) By Remark 4.2, passing to the algebraic closure of k doesn’t affect fptR (I) and fptS (J). Hence we can assume that k is algebraically closed and hence is infinite. [Lyu86, Theorem] asserts that each ideal I admits a reduction generated by n elements. We are done by (1).  References [BMS08] Manuel Blickle, Mircea Mustaţǎ, and Karen E. Smith. Discreteness and rationality of F -thresholds. Michigan Math. J., 57:43–61, 2008. Special volume in honor of Melvin Hochster. [BST15] Manuel Blickle, Karl Schwede, and Kevin Tucker. F -singularities via alterations. Amer. J. Math., 137(1):61–109, 2015. [BSTZ10] Manuel Blickle, Karl Schwede, Shunsuke Takagi, and Wenliang Zhang. Discreteness and rationality of F -jumping numbers on singular varieties. Math. Ann., 347(4):917–949, 2010. [CU02] Marc Chardin and Bernd Ulrich. Liaison and Castelnuovo-Mumford regularity. Amer. J. Math., 124(6):1103–1124, 2002. [EHU04] David Eisenbud, Craig Huneke, and Bernd Ulrich. Heights of ideals of minors. Amer. J. Math., 126(2):417–438, 2004. [Fed83] Richard Fedder. F -purity and rational singularity. Trans. Amer. Math. Soc., 278(2):461–480, 1983. [Har98] Nobuo Hara. A characterization of rational singularities in terms of injectivity of Frobenius maps. Amer. J. Math., 120(5):981–996, 1998. [Har01] Nobuo Hara. Geometric interpretation of tight closure and test ideals. Trans. Amer. Math. Soc., 353(5):1885–1906, 2001. [HT04] Nobuo Hara and Shunsuke Takagi. On a generalization of test ideals. Nagoya Math. J., 175:59–74, 2004. [HU85] Craig Huneke and Bernd Ulrich. Divisor class groups and deformations. Amer. J. Math., 107(6):1265–1303 (1986), 1985. [HU87] Craig Huneke and Bernd Ulrich. The structure of linkage. Ann. of Math. (2), 126(2):277–334, 1987. 10 [HU88] [HY03] [Lyu86] [Mat86] [Niu14] [Sch11] [Smi97] [ST12] [Tak04] [TW04] Craig Huneke and Bernd Ulrich. Algebraic linkage. Duke Math. J., 56(3):415–429, 1988. Nobuo Hara and Ken-Ichi Yoshida. A generalization of tight closure and multiplier ideals. Trans. Amer. Math. Soc., 355(8):3143–3174 (electronic), 2003. Gennady Lyubeznik. A property of ideals in polynomial rings. Proc. Amer. Math. Soc., 98(3):399–400, 1986. Hideyuki Matsumura. Commutative ring theory, volume 8 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge, 1986. Translated from the Japanese by M. Reid. Wenbo Niu. Singularities of generic linkage of algebraic varieties. Amer. J. Math., 136(6):1665–1691, 2014. Karl Schwede. Test ideals in non-Q-Gorenstein rings. Trans. Amer. Math. Soc., 363(11):5925–5941, 2011. Karen E. Smith. F -rational rings have rational singularities. Amer. J. Math., 119(1):159–180, 1997. Karl Schwede and Kevin Tucker. A survey of test ideals. In Progress in commutative algebra 2, pages 39–99. Walter de Gruyter, Berlin, 2012. Shunsuke Takagi. F-singularities of pairs and inversion of adjunction of arbitrary codimension. Invent. Math., 157(1):123–146, 2004. Shunsuke Takagi and Kei-ichi Watanabe. On F-pure thresholds. J. Algebra, 282(1):278–297, 2004. Department of Mathematics, University of Utah, Salt Lake City, UT 84112 E-mail address: [email protected] Department of Mathematics, University of Illinois at Chicago, Chicago, Illinois 60607 E-mail address: [email protected] Department of Mathematics, Syracuse University, Syracuse, NY 13244 E-mail address: [email protected] Department of Mathematical Sciences, University of Arkansas, Fayetteville, AR 72701 E-mail address: [email protected] Department of Mathematics, University of Illinois at Chicago, Chicago, Illinois 60607 E-mail address: [email protected] 11
0math.AC
1 A Stochastic Geometry-based Demand Response Management Framework for Cellular Networks Powered by Smart Grid arXiv:1612.01636v1 [cs.SY] 6 Dec 2016 Muhammad Junaid Farooq, Hakim Ghazzai, and Abdullah Kadri Qatar Mobility Innovations Center (QMIC), Qatar Science & Technology Park, Doha, Qatar, Email: {junaidf, hakimg, abdullahk}@qmic.com. Abstract—In this paper, the production decisions across multiple energy suppliers in smart grid, powering cellular networks are investigated. The suppliers are characterized by different offered prices and pollutant emissions levels. The challenge is to decide the amount of energy provided by each supplier to each of the operators such that their profitability is maximized while respecting the maximum tolerated level of CO2 emissions. The cellular operators are characterized by their offered quality of service (QoS) to the subscribers and the number of users that determines their energy requirements. Stochastic geometry is used to determine the average power needed to achieve the target probability of coverage for each operator. The total average power requirements of all networks are fed to an optimization framework to find the optimal amount of energy to be provided from each supplier to the operators. The generalized alphafair utility function is used to avoid production bias among the suppliers based on profitability of generation. Results illustrate the production behavior of the energy suppliers versus QoS level, cost of energy, capacity of generation, and level of fairness. Index Terms—Cellular networks, demand response, smart grid, stochastic geometry. I. I NTRODUCTION Cellular networks have seen an enormous growth in the number of connected subscribers, particularly after the advent of smart phones and 3G/4G mobile broadband technologies. To cater for the existing, as well as future communication requirements of emerging wireless technologies such as the 5G and internet of things (IoT), there is a need for massive network deployment, i.e., base stations (BSs) to increase network capacity of cellular operators [1]. This will lead to a surge in the energy consumption of cellular networks and hence, negative environmental impact in the form of pollutant gases emissions mainly carbon dioxide (CO2 ). It is estimated that the carbon footprint of wireless communications could almost triple in 2020 if no actions are taken [2]. In order to counter the increasing carbon footprint of cellular networks, steps must be taken to limit the pollutant emissions by incorporating green renewable sources of energy alongside conventional fossil fuel energy generation. Moreover, effective energy management techniques are required in order to achieve the goal of reducing CO2 emissions. The development of the smart grid, a modern electricity grid that allows integration of energy generated from different sources, has enabled intelligent energy management both at the demand and supply side. The smart grid comprises of multiple energy suppliers, some of which provide renewable energy. This work was made possible by NPRP grant # 6-001-2-001 from the Qatar National Research Fund (A member of The Qatar Foundation). The statements made herein are solely the responsibility of the authors. The demand side management (DSM) in smart grid powered cellular networks allows operators to make profitable and environment-friendly energy procurement decisions according to the changes in price or carbon footprint of the energy [3]. On the other hand, an increase in energy demand from the side of cellular operators requires a decision at the smart grid level about the quantity of energy provided by the suppliers to the cellular operators and the price of energy. This is also known as demand response management (DRM) [4]. The objective of DRM is to determine the average amount of energy to be produced by each supplier in smart grid such that the profit of the suppliers is maximized while respecting the CO2 emissions threshold set by the regulatory authority. For this, an accurate estimate of the total energy requirements of the cellular operators is required, that depends on the quality of their transmissions and the number of subscribers using their services. The average radiated power of BSs of each operator is the most crucial component in determining the total power consumption. Stochastic Geometry (SG) [5] is employed to estimate the transmit power required by operators to provide their subscribers with a certain quality of service (QoS) level. SG allows the computation of important network statistics such as the probability of coverage (or outage) as spatial averages [6]. Since cellular networks involve BSs and users which can be modeled as points from a particular point process, we can use SG for performance analysis of such networks. The Poisson point process (PPP), which is well known for its analytical tractability, is used to model the location of operator BSs and subscribers. The resulting analysis enables us to ensure that, on average, any user in the network is served with a predefined QoS and to determine the corresponding power requirements. Existing works on DRM in smart grid deal with capacity planning by a single energy supplier in response to the changes in the energy demand of generic consumers [4]. Realtime pricing in smart grid with demand of the consumers is investigated in [7]. Most of the previous works are based on DRM for general electricity consumers. Few works have dealt with smart grid DRM for cellular networks. However, they are based on instantaneous network statistics [8], [9] without considering fairness in the supply decision. In this paper, a generalized α-fairness-based DRM framework for cellular networks is proposed using average network statistics provided by SG. The system model comprises a set of cellular operators, characterized by the offered QoS to their subscribers, powered by a common pool of energy suppliers. SG is exploited to evaluate the total power requirements of the cellular networks. Then, closed-form expressions for the amount of energy provided by each supplier to the operators are derived while respecting the maximum tolerated CO2 emissions level set by the environmental regulator. A generalized α-fair utility function based on the profit of energy suppliers is used to avoid production bias towards any single supplier. The optimization is performed while taking into account the production capacity of each supplier, their cost of generation, the dynamic pricing strategy, and the pollutant emissions levels. Simulation results investigate the energy suppliers’ behaviors according to different system parameters. Also, the obtained results show that suppliers’ production decisions are adapted to the changing demand of cellular networks to achieve maximum profitability in an environment-friendly manner. II. S YSTEM M ODEL A. Network Geometry The network consists of Nop mobile operators serving their subscribers in an area of A km2 . The BSs of each mobile operator l = 1, . . . , Nop are randomly deployed in R2 according to a homogeneous PPP denoted by Φ(l) with density (l) λBS BS/km2 . The total number of BSs that belong to each (l) (l) operator is NBS = λBS A. Each mobile operator uses frequency reuse within its network to avoid adjacent cell interference. The set of BSs using the same frequency are, therefore, separated by a certain exclusion distance denoted by R. The location of the interfering BSs of each operator are modeled by the Matérn hard core point process (MHCPP) obtained via a dependent thinning of the original PPP. No two selected BSs in the MHCPP are closer than the exclusion distance. This new set is denoted by Φ̃(l) ⊆ Φ(l) (see [10] for details). For tractability of analysis, the MHCPP is approximated by an equi-dense PPP. The intensity of the MHCPP is evaluated (l) −λ (l) πR2 as ΛBS = 1−e πRBS2 , [11]. The subscribers of operator l are (l) uniformly distributed in R2 with density λu users/km2 . Each user is associated to its nearest BS and, hence, the coverage regions of BSs form a Voronoi tessellation [6]. The number of users served by each BS of operator l are evaluated as (l) (l) (l) Nu = λu A/NBS . B. Operator Characteristics In this framework, each mobile operator is characterized by the offered QoS, determined by the downlink signalto-interference-plus-noise ratio (SINR) thresholds T (l) and the probability of coverage P (l) for l = 1, . . . , Nop . The assumption is that a user connected to the BS of operator l, is served only if the downlink SINR at the user exceeds the predefined threshold T (l) . To ensure that each operator meets the set transmission quality standards, the transmit power levels of its BSs need to be adjusted. The total transmit power from all the BSs determines the energy requirements of the operator. C. Channel Model It is assumed that the BSs of operator l transmit with (l) an average power denoted by Pt for l = 1, . . . , Nop to serve a single user. The power decays with the distance according to the power law and, hence, the received power at a test user located at the origin from a BS located at xj is (l) (l) (l) (l) (l) given as, Pr = Pt hj kxj k−η , where hj represents the channel fast fading effect and is assumed to be independent and identically distributed (i.i.d.) exponential random variables with mean µ−1 for each j, l, k.k represents the vector norm, and η is the path-loss exponent. Without loss of generality, it is assumed that the effects of shadowing are catered for by the randomness of the BS locations. The downlink SINR at a typical user located at the origin served by operator l can be expressed as: −η (l) (l) SINR(l) = Pt h0 r(l) , P (l) (l) (l) Pt hj kxj k−η σ2 + (1) j∈Φ̃(l) \0 (l) where h0 and r(l) are the channel fading and the distance between the test user and the nearest BS of operator l, respectively, and σ 2 is the Gaussian noise power. The interference P (l) (l) (l) (l) power denoted by Iagg is Pt hj kxj k−η , where j∈Φ̃(l) \0 Φ̃(l) \0 denotes the set of BSs of operator l excluding the BS closest to the considered user. D. Power Consumption Model for Mobile Operators Each BS of operator l is considered to be equipped with a single omni-directional antenna. Its average power consump(l) tion, denoted by PBS , is expressed as follows [12]: (l) (l) PBS = a Ptx + b, (2) (l) Ptx where is the average power radiated by each BS of operator l. The coefficient a corresponds to the power consumption that scales with the radiated power due to amplifier and feeder losses. The term b models an offset of BS site power which is consumed independently of the average transmit power and (l) is due to signal processing, battery backup, and cooling. Ptx (l) (l) (l) can be evaluated as Ptx = Pt Nu . E. Energy Pricing and Environmental Impact In this study, it is assumed that the cellular networks are powered by a smart grid where NR different sources exist to supply energy with different prices and have different pollutant levels depending on the nature of the generated energy. The suppliers use a dynamic pricing strategy, whereby, the unit charge of supplied energy depends directly on the energy demand. In order to increase production, an energy supplier needs to employ additional infrastructure and resources, thus bearing additional expenses. Therefore, the price of energy from supplier n charged to operator l, denoted by π (n,l) , is expressed in monetary units (MU) as follows: π (n,l) =w (n)  q (n,l) Q̄(n) γ (n) , (3) where w(n) is the benchmark price charged per unit by supplier n, q (n,l) is the average energy provided by supplier n to operator l, Q̄(n) is the maximum generation capacity of each supplier, and γ (n) is a non-negative integer representing the price sensitivity of supplier n. If γ (n) = 0, the dynamic pricing is ignored and the suppliers charge a fixed price for energy independently of the quantity purchased. Otherwise, the price increases with the demand and vice versa. The suppliers have different environmental impacts in terms of CO2 emissions depending on the quantity and type of energy generated. This can be quantified using the following pollutant emissions function F (see [12]): F(q (n,l) ) = ψn Nop  Nop 2 X X q (n,l) + φn q (n,l) , l=1 (4) l=1 where ψn and φn are the pollutant emissions coefficients of supplier n. III. M ETHODOLOGY OF A NALYSIS In this section, the probability of coverage for a typical user in the network of operator l is determined using analytical tools from SG. This helps us in identifying the transmit power requirements of each operator to meet the transmission quality standards and, hence, determining the average power consumption of the operators. Consequently, an optimization framework is developed to supply the required energy from the smart grid in an environment-friendly yet profitable manner. A. Operator Coverage Analysis SG is employed to evaluate the probability that a typical user of operator l is covered by the cellular network. The coverage is defined as the probability that the received SINR per user exceeds a target service threshold T (l) . In other words, it corresponds to the complementary cumulative distribution function (ccdf) of the SINR, denoted by P (l) , evaluated as P (l) = P[SINR(l) > T (l) ] and it can be expressed as [6]: (l) σ 2 r η Z∞ − µT (l) (l) (l) −λ(l) (l) (l) πr 2 Pt BS P (Pt , T ) = 2πrλBS e × e 0  e (l) −ΛBS πT (l) ∞ R 2/η 2 r T (l) −2/η 1 1+uη/2 du   dr. (5) Note that the probability of coverage depends on the transmitted power and the target SINR threshold of each operator. Therefore, for a fixed P (l) , the transmit power can be compromised to achieve a higher SINR threshold and vice versa. B. Problem Formulation and Solution The decision on production quantity by the suppliers is based on their profitability as well as the CO2 emissions. The profitability of the suppliers depends on the quantity of energy supplied to mobile operators Q, where Q is a matrix of size NR × Nop with elements q (n,l) ∀ n = 1, . . . , NR , l = 1, . . . , Nop , the per unit price of energy set by suppliers π (n,l) , and the per unit cost of generation c(n) . The profit of supplier n can be expressed as follows: Πn (Q) = Nop X   q (n,l) π (n,l) − c(n) , ∀ n = 1, . . . , NR . (6) l=1 The environment friendliness of the suppliers is determined by the pollutant emissions levels that depend on the amount of energy supplied. It is quantified by the cost function NR P C(Q) = F(q (n,l) ). In order to reduce pollutant emissions, n=1 the smart grid needs to produce more green energy from renewable sources while curtailing the use of fossil fuel sources. However, the renewable energy generation might be expensive and/or limited in amount and therefore, may lead to lower profitability for the suppliers. Hence, the suppliers use multiple energy sources depending on their cost, available amount, and environmental impact in order to increase their revenues while respecting the maximum tolerated CO2 emissions level imposed by the regulator. The objective now is to solve a constrained optimization problem which results in an optimal matrix Q∗ that maximizes a utility U based on the vector Π = [Π1 , Π2 , . . . , ΠNR ] containing the individual profits of the energy suppliers. The optimization problem is expressed as follows: maximize U(Π) (7) Q subject to Nop X (l) NBS q (n,l) ≤ Q̄n , ∀ n = 1, . . . , NR , (8) l=1 NR X (l) (l) q (n,l) = NBS (a Pt Nu(l) + b)τ, ∀ l = 1, . . . , Nop , (9) n=1 C(Q) ≤ Cth . (10) The constraint (8) enforces the total amount of energy produced by a supplier n not to exceed its maximum energy production capacity Q̄n . Assuming that there are no losses, the average energy provided by the suppliers should be equal to the total power consumption of all BSs of operator l during its operation time τ , as indicated in constraint (9). The total (l) transmit power for each operator Pt can be obtained by solving (5) for a fixed QoS requirement P (l) . As the expression of P (l) involves computation of a complicated integral which does not have a closed form, it is solved numerically using (l) Newton’s method to obtain Pt , ∀l. In constraint (10), a restriction is imposed on the pollutant emissions due to energy consumption. This forces the suppliers to produce more green energy to remain within regulated limits, denoted by Cth . C. Utility Function Since the objective is to determine the optimal amount of energy provided by the suppliers in the smart grid to multiple mobile operators, a fair power sharing framework needs to be introduced. Therefore, a unified mathematical formulation for power allocation known as α-fairness is used, where the parameter α determines the degree of fairness of profit distribution among the operators [13]. The generalized α-fairness utility function of the supplier profits is defined as follows:  NR 1−α P Πn   , if α ≥ 0, α 6= 1, 1−α n=1 U(Π) = (11) N R   P log(Πn ), if α = 1. n=1 The parameter α controls the tradeoff between the efficiency as well as the fairness in energy provided by the suppliers to the operators. In other words, the framework tends to avoid unfair allocation of energy depending on the value of α. For example, situations where the suppliers only supply the most expensive energy to meet the demand in order to achieve maximum profit. In the special cases, when α = 0, 1, ∞, the utility reduces to the sum, proportional fair and max-min fair utility, respectively. These cases are described as follows: Sum Utility (α = 0): The utility of this metric is equivalent to the sum of the profits of the energy suppliers (U(Π) = NR P Πn ). This approach promotes suppliers with higher profit n=1 margins by offering them the possibility to supply the most expensive energy to the operators at the least cost via smart grid to maximize their profits. On the other hand, suppliers with lower energy price will be deprived from the possibility to sell the cheapest energy as their profits are already low. Proportional fair utility (α = 1): The proportional fair metric maximizes the sum of the log of the profit of suppliers. It is equivalent to the maximization geometric mean of the QNR of the Πn )1/NR ), which is equivalent profits Πn i.e. (U(Π) = ( n=1 PNR ln(Πn )). The proportional fair (PF) metric to (U(Π) = n=1 is fairer since an energy supplier with a profit close to zero will make the entire utility go to zero. Hence, this metric avoids having a very low profit for any of the suppliers. In addition, it reasonably promotes suppliers with good profit margins since a high profit will contribute in increasing the product. Max-Min Utility (α → ∞): Max-Min utilities are a family of utility functions attempting to maximize the minimum profit among all energy suppliers: U(Π) = min(Πn ). By increasing n the priority of suppliers having lower profit margins, MaxMin utilities lead to more fairness in the system. In order to simplify the problem for this approach, a new decision variable Πmin = min(Πn ) is introduced. Therefore, the optimization n problem becomes: maximize Πmin (12) Q,Πmin subject to (8), (9) and (10), Πn ≥ Πmin , ∀n = 1, . . . , NR . (13) (14) D. Solution The optimization problem presented in eqs. (7) to (10) can be solved for special cases using the Lagrangian method [14] exploiting its strong duality property as follows: minimize maximize δ≥0 Q≥0 L(Q, δ, ξ, ζ), (15) where L(Q, δ, ξ, ζ) is the Lagrangian, δ = [δ1 , . . . , δNR ], ξ = [ξ1 , . . . , ξNop ], and ζ are the Lagrange multipliers corresponding to the constraints in (8), (9), and (10) respectively. Deriving the optimal amount of energy for a general value of α is highly elaborate and is left for future work. The closed form expressions for the special cases, i.e., α = 0, 1, ∞ are provided here. However, the investigation of the performance for different values of α is done via simulations in Section IV. For the case of Sum utility, i.e., α = 0, the optimal amount of energy supplied by supplier n to operator l, q (n,l)∗ is:    1 (l) (l) w(n) − c(n) − δn NBS − ζφn NBS + ξl ,  (l)   2ζψn NBSif γ = 0, n   (n,l)∗ q =  (l) (l) 1  −c(n) − δn N  BS − ζφn NBS + ξl , (l) w(n)  2 ζψn NBS − Q̄n  if γn = 1. We can deduce that q (n,l)∗ (16) is inversely proportional to the coefficient related to CO2 emissions of energy supplier n i.e., ζ. The Sum utility depends on the prices charged by the suppliers where the higher the price, the higher the amount of energy supplied from that source. For the case of Proportional fair utility, i.e., α = 1, the optimal amount of energy supplied by supplier n to operator l is given as follows:    N QR  (l) 1  w(n) − c(n) Πm − δn NBS −  (l)  2ζψn NBS  m=1   m6=n     (l)    ζφn NBS + ξl , if γn = 0, (n,l)∗  N q = QR (l) 1  c(n) Πm + δn NBS +  N  R Q (n) (l)  2w m=1  Q̄n Πm −2ζψn NBS  m6=n  m=1   m6=n      ζφn N (l) − ξl , if γn = 1. BS (17) The supplied energy q (n,l)∗ depends directly on the product of other supplier profits i.e., Πm . Hence, this approach avoids having any supplier with very low profit and maximizes the product of all suppliers profits simultaneously. For the case of Max-Min fair utility, i.e., α → ∞, the optimal amount of energy supplied by supplier n to operator l is given as follows:    1 (l) (l) (n) (n) θ (w − c ) − δ N − ζφ N + ξ ,  n n n l (l) BS BS  2ζψn NBS  if γ = 0, n   q (n,l)∗ =  (l) (l) 1  c(n) θn + δn N − ξ , + ζφ N n  l BS BS (n) (l) w   2 ζψn NBS − Q̄n θn if γn = 1. (18) θn are the additional Lagrange multipliers corresponding to (14). By taking the derivative of the Lagrangian with respect PN R to Πmin , we can deduce that n=1 θn = 1. By comparing with (16), we can notice that θn control the priority of the energy supply according to the profitability of the suppliers. Note that if a fixed pricing strategy is used, i.e., γn = 0, the amount of energy supplied is directly proportional to the price of energy, whereas for dynamic pricing strategy, the amount of energy supplied is inversely related to the price of energy. This is because the energy price increases with demand under dynamic pricing policy. Hence, the amount supplied should decrease with increasing price. The optimal Lagrange multipliers δ ∗ , ξ ∗ , ζ ∗ and θn∗ can be obtained using the subgradient method (see [15]) or other heuristic approaches. In order to achieve the optimal solution, we can start with random initial values of the Lagrange multipliers and evaluate the corresponding amount of energy. Then, we update the Lagrange multipliers at the next iteration with a step size updated according to the non-summable diminishing step length policy. The values of the optimal amount of energy supplied and the Lagrange multipliers are updated until convergence. IV. S IMULATION R ESULTS A cellular network with Nop = 3, denoted by Op. 1, Op. 2 and Op. 3, is considered. The BSs of each operator are distributed uniformly in R2 according to PPPs with BS density (3) Energy consumed (kJ) 100 90 80 70 60 50 Op. 1 Op. 2 Op. 3 40 30 10 11 12 13 14 15 SINR Threshold of operator 1, T1 (dB) (a) Energy consumed. Price of supplied energy π(n,l) (MU) (2) 2 1.5 1 n=1, l=1 n=2, l=1 n=1, l=2 n=2, l=2 n=1, l=3 n=2, l=3 0.5 0 10 11 12 13 14 15 SINR Threshold of operator 1, T1 (dB) (b) Price of energy. Fig. 1: Price of energy charged by suppliers to operators and the total energy consumed by operators versus SINR threshold of Op. 1. The simulation parameters are: α = 0, γ1 = γ2 = 1, Q̄1 = Q̄2 = 170 kJ, Cth = 4.5 × 107 kg/h. 140 120 Supplier Profit (MU) (1) λBS = λBS = λBS = (π(200)2 )−1 BS/m2 respectively. The simulation area A is chosen to be a square region of side 10 km2 in R2 . The subscribers of the operators are also uniformly (1) distributed in the simulation area with intensity λu = 15 (2) (3) 2 2 users/km , λu = 30 users/km , and λu = 40 users/km2 . The channel is assumed to experience exponential fading with a mean channel gain µ = 1. The operators are differentiated by the offered SINR levels and the QoS. The SINR levels offered by the three operators are T (1) = 15 dB, T (2) = 10 dB, and T (3) = 5 dB while the QoS requirements are specified as P (1) = 0.7, P (2) = 0.8, and P (3) = 0.9. Without loss of generality, the BS operation time τ is set to be 1 s. All BSs use the same power model [12] with a = 7.84 and b = 71.5. The path loss exponent η = 4 and the noise power is σ 2 = −115 dB. The BSs procure energy from a smart grid in which there are several available energy suppliers offering different prices and CO2 emissions levels. It is assumed that there are three available energy suppliers (i.e., NR = 3), namely; Sup. 1, Sup. 2, and Sup. 3. They are characterized as follows: Sup. 1 provides the cheapest energy at a benchmark price of w(1) = 1 MU but with the highest carbon footprint, i.e., pollutant coefficients ψ1 = 0.004 and φ1 = 0.001, Sup. 2 provides energy with an intermediate benchmark price and lower carbon footprint (w(2) = 2 MU, ψ2 = 0.002, φ2 = 0.0005), and Sup. 3 offers clean but expensive energy (i.e., w(3) = 3 MU, ψ3 = 0, φ3 = 0.0001). The maximum CO2 emissions level is taken as Cth = 107 kg/h. The costs of energy production for the suppliers is c(1) = 0.1 MU, c(2) = 0.5 MU, and c(3) = 2.5 MU. The base profit margin of the suppliers is, therefore, 0.9 MU, 1.5 MU and 0.5 MU, respectively. Each supplier has a maximum energy production capacity which is assumed to be equal (i.e., Q̄1 = Q̄2 = Q̄3 = 150 kJ), unless otherwise stated. The objective is to study the behavior of the system while changing system parameters and thresholds. Fig. 1 plots the price of energy charged to operators and the total energy consumed by the operators versus the SINR threshold of Op. 1. For ease of exposition, NR = 2, i.e., Sup. 1 and Sup. 3, is used in Fig. 1. We set γn = 1, which means that the dynamic pricing is in effect, and α = 0, which means that the Sum utility is used. It can be observed from Fig. 1(a), that an increase in transmission quality standards of a mobile operator increases its energy consumption due to additional transmit power required. This increased demand triggers a response from the suppliers as shown in Fig. 1(b). Since Op. 3 is the most power hungry operator, it is provided with the most expensive energy followed by Op. 2 and Op. 1, respectively. Op. 1 and Op. 2 are completely powered by the cheapest energy supplier with high carbon footprint while Op. 3 is powered by both suppliers. As the power requirements of Op. 1 increase, its price also increases due to the dynamic pricing policy. To supply more energy to Op. 1 from Sup. 1, the framework progressively cuts down the energy supplied by Sup. 1 to Op. 3 and increases the energy supplied by Sup. 2 to Op. 3. As soon as CO2 emissions threshold is reached, Op. 3 suffers further by completely being supplied by Op. 2 with very expensive energy. Further increase in demand is 100 Sup. 1 (α = 0) Sup. 2 (α = 0) Sup. 3 (α = 0) Sup. 1 (α = ∞) Sup. 2 (α = ∞) Sup. 3 (α = ∞) 80 60 40 20 5 10 15 SINR Threshold of operator 1, T1 (dB) Fig. 2: Profit of energy suppliers versus SINR threshold of Op. 1. compensated by providing Op. 2 with more green expensive energy. Finally, the framework shows an abrupt change in the production decision after T1 = 14.8 dB. This is because Op. 1 becomes the most power hungry operator as evident from Fig. 1(a). Therefore, it starts to receive green expensive energy and less cheap energy. The results in Fig. 1 motivate the introduction of fairness to the framework to avoid price exploitation of any single operator. In the sequel, the price sensitivity of suppliers γn = 0, ∀n = 1, . . . , NR and α = 0.5 is used unless otherwise stated. Fig. 2 plots the profit of the suppliers against the SINR threshold of Op. 1 for extreme values of α. It can be observed that for α = 0, i.e., Sum utility case, all the additional share of profit is received by Sup. 1 since it has the lowest profit among the suppliers. However, for α = ∞, i.e, Max-Min fair case, operator 2 already receives a higher profit and the additional share of the profit is given to Sup. 2 and Sup. 3. Energy Production (kJ) 140 the distribution of profit is biased. The supplier with the highest profit margin, i.e., Sup. 2 receives the highest share and the supplier with the lowest profit margin, i.e., Sup. 1 receives the lowest share. For α = 1, i.e., Proportional fair, the distribution of profits is according to the profit margins, however, the discrepancy is smaller. As α is increased, the share of the profits equalizes further to increase fairness. Sup. 1 Sup. 2 Sup. 3 120 100 80 60 40 0.5 V. C ONCLUSION 1 1.5 2 (3) Cost of energy production of supplier 3, c 2.5 (MU) (a) Energy production by suppliers. 350 Sup. 1 Sup. 2 Sup. 3 Supplier Profit (MU) 300 250 200 150 100 50 0 0.5 1 1.5 2 (3) Cost of energy production of supplier 3, c 2.5 (MU) (b) Profit of energy suppliers. Fig. 3: Energy production by suppliers and profit of suppliers versus production cost of Sup. 3 for α = 0.5. In this paper, a fair and optimized framework is proposed for energy production decisions made by suppliers in the smart grid powering cellular networks. Multiple energy suppliers are available in smart grid offering different energy prices and pollutant emissions. The goal is to first assess the power requirements of the mobile operators, for a given quality of transmission and the number of subscribers. Then, the framework needs to meet these requirements by intelligently providing energy from different suppliers in order to maximize the profitability of the suppliers. Stochastic geometry is used to quantify the network performance from the perspective of a typical user in terms of the average transmission power of the networks. It is observed that using the proposed framework, suppliers adapts their energy production decisions under different situations such that the CO2 emissions levels of the network do not exceed the set threshold and generate the optimal amount of energy for maximum profitability. 180 Supplier Profit (MU) R EFERENCES Sup. 1 Sup. 2 Sup. 3 160 140 120 100 80 60 40 20 0 0.5 1 1.5 2 Level of fairness (α) Fig. 4: Profit of energy suppliers versus the fairness level α. In Fig. 3(a), the impact of increasing the cost of energy production of Sup. 3 on the amount of energy produced by the suppliers is studied for T1 = 15 dB. It can be observed that increasing the cost of production reduces the profit margin of Sup. 3, thus leading to a reduction in its energy production. In order to meet the same energy demand, the production of Sup. 2 increases since Sup. 2 has the highest profit margin. An increase in the production of Sup. 1 is also observed since the fairness level α = 0.5 does not allow any single supplier to exploit the demand. The corresponding profit of the suppliers is shown in Fig. 3(b). It is shown that the Sup. 3 profit is linearly falling as the cost increases while there is a gentle increase in Sup. 1 and Sup. 2 profits due to increased production. Finally, in Fig. 4, the effect of the fairness level α on the the profits of the suppliers is demonstrated. It is apparent that Sup. 2 achieves the highest profit due to its high profit margin followed by Sup. 3 and Sup. 1 in order of their profit margins. As α is increased, the distribution of profits among the three suppliers becomes fairer. Particularly, when α = 0, [1] “5G radio access technology and capabilities,” Ericsson white paper. Available at: http://www.ericsson.com/res/docs/whitepapers/wp-5g.pdf. [2] A. Fehske, G. Fettweis, J. Malmodin, and G. Biczok, “The global footprint of mobile communications: The ecological and economic perspective,” IEEE Commun. Mag., vol. 49, no. 8, pp. 55–62, Aug. 2011. [3] M. J. Farooq, H. Ghazzai, and A. Kadri, “Optimized energy procurement for cellular networks powered by sart grid based on stochastic geometry,” in Proc. of IEEE Global Commun. Conf. (Globecom workshops), San Diego, USA, Dec. 2015. [4] L. Jiang and S. Low, “Real-time demand response with uncertain renewable energy in smart grid,” in Proc. of 49th Annual Allerton Conf. on Commun., Control, and Comput. (Allerton), IL, USA, Sept. 2011. [5] M. Haenggi, “Stochastic geometry for wireless networks,” Cambridge University Press, 2012. [6] J. Andrews, F. Baccelli, and R. Ganti, “A tractable approach to coverage and rate in cellular networks,” IEEE Trans. Commun., vol. 59, no. 11, pp. 3122–3134, Nov. 2011. [7] P. Tarasak, “Optimal real-time pricing under load uncertainty based on utility maximization for smart grid,” in Proc. of IEEE Intl. Conf. on Smart Grid Commun. (SmartGridComm), Brussels, Belgium, Oct. 2011. [8] H. Ghazzai, E. Yaacoub, and M.-S. Alouini, “A game theoretical approach for cooperative environmentally friendly cellular networks powered by the smart grid,” in IEEE Online Conf. Green Commun. (OnlineGreencomm), pp. 1 – 6, Nov. 2014. [9] S. Bu, F. Yu, Y. Cai, and X. Liu, “When the smart grid meets energyefficient communications: Green wireless cellular networks powered by the smart grid,” IEEE Trans. Wireless Commun., vol. 11, pp. 3014–3024, Aug. 2012. [10] H. ElSawy, E. Hossain, and M. Haenggi, “Stochastic geometry for modeling, analysis, and design of multi-tier and cognitive cellular wireless networks: A survey,” IEEE Commun. Surveys Tuts., vol. 15, no. 3, pp. 996–1019, Third 2013. [11] D. Stoyan, W. S. Kendall, and J. Mecke, “Stochastic geometry and its applications,” Wiley series in probability and mathematical statisitics, Wiley, 1987. [12] H. Ghazzai, E. Yaacoub, M.-S. Alouini, and A. Abu-Dayya, “Optimized smart grid energy procurement for LTE networks using evolutionary algorithms,” IEEE Trans. Veh. Technol., vol. 63, no. 9, pp. 4508–4519, Nov. 2014. [13] E. Altman, K. Avrachenkov, and A. Garnaev, “Generalized alpha-fair resource allocation in wireless networks,” in Proc. of 47th IEEE Conf. on Decision and Control (CDC), Dec. 2008. [14] S. Boyd and L. Vandenberghe, “Convex optimization,” Cambridge University Press, NY, USA, 2004. [15] S. Boyd and A. Mutapcic, “Subgradient methods,” Notes for EE364b, Stanford University, Winter 2006-07, 2008.
3cs.SY
ROBUST STABILIZATION OF LINEAR PLANTS UNDER UNCERTAINTIES AND HIGH-FREQUENCY MEASUREMENT NOISES1 Igor B. Furtat*,**. Artem N. Nekhoroshikh, *,** *Institute for Problems of Mechanical Engineering Russian Academy of Sciences, 61 Bolshoy ave V.O., St.-Petersburg, 199178, Russia (Tel: +7-812-321-47-66; e-mail: [email protected]). **ITMO University, 49 Kronverkskiy ave, Saint Petersburg, 197101, Russia. Abstract: The paper describes the robust algorithm for linear time-invariant plants under parametric uncertainties, external disturbances and high-frequency noises in measurements. The proposed algorithm allows one to reduce the noise impact on the output variable of the plant and to compensate parametric uncertainties and external disturbances independently. The modeling results illustrate the effectiveness of the algorithm. Keywords: Robust control, linear plants, high-frequency noise, time delay, Lyapunov-Krasovskii functional. 1. INTRODUCTION Design of simple control systems under parametric uncertainties and external disturbances when only plant output is available for measurement is important problem of control theory and practice. To construct such control schemes many solutions have been proposed in this regard. One of the most effective tools is to synthesize control structure using high-gain observer. At first high-gain observer was proposed in (Esfandiary and Khalil, 1992; Gauthier et al., 1992) for minimum phase plants. Later other kind of high-gain observer were considered in (Gauthier et al., 1992; Teel and Praly, 1994; Bobtsov, 2002; Tsykunov, 2008; Furtat, 2015). In (Esfandiary and Khalil, 1992; Gauthier et al., 1992; Teel and Praly, 1994; Bobtsov, 2002; Furtat, 2015) the dimension of the high-gain observer is equal to γ – 1, where γ is the relative degree of plant model. However, using high-gain observer can be unsatisfactory in case high frequency noise measurement application. The investigations of the high-gain observers under noises were considered in (Vasiljevic and Khalil, 2008; Boizot et al., 2010; Sanfelice and Praly, 2011). The problem is that the value of estimate derivative could be sufficiently greater than the real one. Moreover, the error accumulates in further estimation. In (Ahrens and Khalil, 2009; Sanfelice and Praly, 2011; Prasov and Khalil, 2013) adaptive high-gain observer was proposed to partially overcome this problem. Thus, initially 1 high-gain parameter of the observer has a large value, while in steady state mode high-gain parameter is decreased. In (Astolfi and Marconi, 2015; Wang et al., 2015) an extended high-gain observer was considered. The dimension of the modified observer is 2γ – 2. Doubling dimension is caused by the introduction of additional differential equations reducing the impact of high frequency measurement noises. The simulation results showed the effectiveness of the modified algorithm as compared with the standard high-gain observer. However, in (Astolfi and Marconi, 2015; Wang et al., 2015) quality of estimate derivatives and quality of filtering simultaneously depend on the solution of the observer equation. In the present paper we consider two independent algorithms: filtering and control ones. Differently from (Astolfi and Marconi, 2015; Wang et al., 2015), the proposed algorithm allows one 1) to improve the quality of the estimation derivatives; 2) to calculate independently the filter parameters and the parameters of the observer. The paper is organized as follows. The problem statement is presented in Section 2. In Section 3 we design the highfrequency filtering algorithm. In Section 4 we propose the control algorithm for linear plants. In Section 5 we consider simulation results and discuss an efficiency of the proposed control structure. Concluding remarks are given in Section 6. The results of Section 3 was developed under support of RSF (grant 14-29-00142) in IPME RAS. The results of Section 4 wsa supported solely by the Russian Federation President Grant (No. 14.W01.16.6325-MD (MD-6325.2016.8)). The other research were partially supported by grants of Russian Foundation for Basic Research No. 16-08-00282, № 16-08-00686, Ministry of Education and Science of Russian Federation (Project 14.Z50.31.0031) and Government of Russian Federation, Grant 074-U01. hx (t ) = f (x (t ), u(t ) ), 2. PROBLEM STATEMENT (7) where x ∈ R , f(x, u, h) is Lipschitz function in x and u, u is a bounded function, h > 0 is a small coefficient. Let system (7) be asymptotically stable when u = 0. Consider the set Ω = {x : f ( x, u ) = 0}. Then there exists h0 > 0 for any ε > 0 such that for any h < h0 the following condition holds s Consider a plant model in the form Q( p) z (t ) = kR( p )u (t ) + f (t ), y (t ) = z (t ) + w(t ), (1) where y(t) ∈ R is an output, u(t) ∈ R is an input, f(t) ∈ R is a unmeasured bounded disturbance, w(t) ∈ R is a high frequency bounded noise, Q(p), R(p) are linear differential operators with unknown coefficients, deg Q(p) = n, deg R(p) = m, k > 0, p = d / dt. lim dist (x(t ), Ω ) < ε . t →∞ The problem is to design the control system such that the following condition holds Let us verify conditions of Lemma for system (6). System (6) is asymptotically stable for z = 0, because the matrix G is Hurwitz. Substituting µ = 0 into (6), we get Gξ = –Bz or ξ1 = z and ξi = ξi + 1, i = 2, r − 1 . Thus, ~ y = z . According to Lemma, there exists µ > 0 such that for any µ ≤ µ0 the following condition holds lim z (t ) < δ1 , lim ~y (t ) − z (t ) < δ 4 , Assume that the coefficients of operators Q(p), R(p) and coefficient k > 0 belong to a known compact set Ξ. The polynomial R(λ) is Hurwitz, where λ is a complex variable. (2) t →∞ where δ1 > 0 is a required accuracy, hereinafter |⋅| is an Euclidean norm. 3. HIGH FREQUENCY FILTERING ALGORITHM Reject signal w from signal y. To this end, introduce the following algorithm µξ (t ) = Gξ(t ) + By (t ), yˆ (t ) = Lξ(t ), ξ(0) = 0, where − σ 1−1  −1  σ2 G= 0     0  [ 0 0 − σ −21 0 −1 3 σ  0 ] −σ  0 −1 3   0  0   0  σ −1 r (3) ξ = [ξ1, ξ2, ..., ξr]T, 0   0  0 , σi > 0,    − σ −r 1  B = σ , 0, ..., 0 , µ > 0 is a sufficient small coefficient, L = [0, ..., 0, 1]. Th eo re m 1 . Let signal z be bounded and the following condition holds t µ −1 lim ∫ eµ t →∞ where δ4 > 0 is a sufficiently small coefficient. Consider the signal y consisting of the signal z and the noise w. Find a condition such that (5) will be hold. ~ Taking into account (3) and (6), rewrite the error ζ = ξ − ξ in the following form 1 1 ζ (t ) = Gζ (t ) + Bw(t ), yˆ (t ) − ~ y (t ) = Lζ (t ). µ µ −1 G (t − s ) Bw( s )ds < δ 2 , (4) 0 where δ2 > 0 is a sufficiently small coefficient. Then there exists a coefficient µ0 > 0 such that for any µ ≤ µ0 the following condition holds lim yˆ (t ) − z (t ) < δ3 . t →∞ (5) Here δ3 > 0 is a sufficiently small coefficient. Pro o f o f Th eo rem 1 . Consider plant (3) with input signal z: ~ ~ ~ ~ µ ξ (t ) = G ξ (t ) + Bz (t ), ~ y (t ) = L ξ (t ), ξ (0) = 0. (6) For analysis of plant (6) let us use Lemma (Furtat, 2014; Furtat et al., 2014; Furtat et al., 2015). Le m ma. Consider a plant model (9) The solution of the first equation of (9) is ζ(t ) = e µ t −1 Gt ∫ ζ(0) + µ −1 e µ −1 G (t −s ) Bw( s )ds 0 t ∫ = µ −1 e µ T −1 1 (8) t →∞ −1 G (t −s ) (10) Bw( s )ds. 0 If condition (4) holds, then we have from (10) that lim ζ (t ) < δ 2 . (11) t →∞ Consider the following relations yˆ (t ) − z (t ) ≤ yˆ (t ) − ~y (t ) + ~y (t ) − z (t ) ≤ ζ(t ) + ~y (t ) − z (t ) . (12) Obviously, the upper bounds of (12) will be satisfied y (t ) − z (t ) . lim yˆ (t ) − z (t ) ≤ lim ζ (t ) + lim ~ t →∞ t →∞ t →∞ (13) Let δ2 + δ4 ≤ δ3. Taking into account (8) and (11), we get estimate (5) from (13). Theorem 1 is proved. Let noise w be sinusoidal signals w(t ) = ∑ Ai sin (ω i t + ϕ i ), v (14) i =1 where Ai, ωi and ϕi are the amplitude, the frequency and the phase accordingly. Th eo re m 2 . Let z be bounded function and noise w be signal (14). Then there exists µ0 > 0 such that for any µ ≤ µ0 the following condition holds 4. SYNTHESIS OF CONTROL SYSTEM Let us use the algorithm (Furtat, 2015) to synthesize the control system. According to Problem Statement, only the output signal y(t) is available for measurement. Therefore, introduce the control law as follows   r v 1   lim yˆ (t ) − z (t ) ≤ ∑ Ai  ∏ (15)  + δ4 . t →∞ 2 2 2 i =1  j =1 1 + ωi µ σ j  γ −1   (20) u (t ) = −α d i y ( i ) (t ) , Proof of Theorem 2. It follows from the proof of Theorem 1, i =0 that there exists µ > 0 for system (6) such that for any µ ≤ µ0 the condition (8) holds. Taking into account (3) and (6), write where α > 0 and d0, d1, …, d γ −1 are chosen such that the ~ the error ζ = ξ − ξ in the form (9). Rewrite system (9) as D(λ) = d γ −1λγ −1 + d γ − 2 λγ − 2 + ... + d1λ + d 0 is polynomial ∑ ζ 1 (t ) = −µ −1σ1−1ζ1 (t ) + µ −1σ1−1 ∑ Ai sin (ωi t + ϕi ), v i =1 (16) ζ j (t ) = −µ −1σ −j1ζ j (t ) + µ −1σ −j1ζ j −1 (t ), j = 2, r. Substituting (20) into (1), we get The solution of the first equation in (16) is ζ1 (t ) = µ −1σ1−1 t v ∑A ∫e i i =1 +e −µ −1σ1−1t F ( p ) z (t ) = αkR( p ) g (t ) + αkR( p ) D( p )ψ (t ) + f (t ) sin (ωi s + ϕ i )ds ∑ γ −1 g (t ) = D( p) yˆ (t ) − ∑ di y (i ) (t ) , ψ(t ) = z (t ) − yˆ (t ) . The value of i =0 Ai 1 + ωi2 µ 2 σ12 i =1 ϑ1,i = arccos sin(ωi t + ϕ i + ϑ1,i ), 1 1 + ωi2 µ 2 σ12 (17) . ζ 2 (t ) = e −µ v ∑ i =1 −1 −1 σ2 t ζ 2 ( 0) t Ai 1 + ωi2 µ 2 σ12 ∫ eµ y (t ) = yˆ (t ), (22) y ( j −1) (t ) − y ( j −1) (t − h) , j = 1, γ − 1. h Substituting (22) into (20), rewrite the control law (20) in the form −1 −1 σ2 ( s −t ) y ( j ) (t ) = 0 × sin(ωi s + ϕ i + ϑ1,i )ds v = ∑ A (1 + ω µ σ )(1 + ω µ σ ) 1 i 2 2 2 1 i i =1 2 2 i × sin (ωi t + ϕ i + ϑ1,i + ϑ 2,i ), ϑ 2,i = arccos γ −1  d u (t ) = −α ∑  ii i =0  h 2 2 1 1+ ωi2 µ 2 σ 22 where Ci j = . Therefore, the solution of the rth equation of (16) is  r 1  ζ r (t ) = ∑ Ai  ∏ i =1  j =1 1 + ωi2 µ 2 σ 2j  v where ϑ j ,i = arccos  r  ϑ j ,i ),  sin(ωi t + ϕi + ∑ j =1   1 1 + ωi2µ 2σ 2j g(t) depends on estimation quality of the signal yˆ (t ) and its derivatives, the value of ψ(t) depends on quality of (3). Since the set Ξ is known, then there exist the number α and the polynomial D(λ) such that the polynomial F(λ) is Hurwitz. To implement the control law (20) we use the following observer Substituting (17) into the second equation of (16), we get + µ −1σ 2−1 (21) F(p) = Q(p) + αkR(p)D(p), where 0 v ζ 1 ( 0) = µ −1σ1−1 ( s −t ) Hurwitz, γ = n – m is a relative degree of (1), y (i ) (t ) is an estimate of the ith derivative signal yˆ (t ) , i = 0, 1, ..., γ – 1. (18) . Upper bound of (18) is   r v 1   ζ r (t ) ≤ ∑ Ai  ∏ (19) . 2 2 2 i =1  j =1 1 + ωi µ σ j    Takin into account (8), (13) and (19), we get estimate (15). Theorem 2 is proved. i  ∑ (−1) j Ci j yˆ (t − jh) , j =0  (23) i! . j!⋅(i − j )! Th eo re m 3 . Let w be a bounded signal. Additionally let (γ – r – 1)th derivatives of w be bounded, if r ≤ γ . Then there exist coefficients α > 0 and h > 0 such that the control system consisting of filtering algorithm (3) and control law (23) ensures goal (2). Proof of Theorem 3. Transform system (21) to the form ε (t ) = Aε(t ) + αkB1 g (t ) + αkB2ψ (t ) + B3 f (t ), z (t ) = Jε(t ) , (24) where ε = [ε1, ε2, ..., εn]T, z(i) = εi + 1, i = 0, n − 1 , matrixes A, B1, B2, B3 and J = [1, 0, …, 0] are obtained at the transition from (21) to (24). Rewrite system (3) as the following differential equation ∏ (µσi p + 1)yˆ (t ) = y (t ). r i =1 Transform (25) to the state space form (25) θ (t ) = Mθ(t ) + Ny (t ), yˆ (t ) = Jθ(t ), (26) where θ = [θ1, θ2, ..., θr]T, yˆ (i ) = θi +1 , i = 0, r − 1 , matrix M and vector N are obtained at the transition from (25) to (26). Consider two cases. 1) Let r < γ. Rewrite the operator D(p) in the following form [ D( p ) = ρ1T p γ −1 , [ +ρ p T 2 r −1 , p γ −2 ,  , p r −2 ] pr ] (27) , , 1 , where ρ1 and ρ2 are vectors with corresponding coefficients of the operator D(p). Taking into account (27), rewrite function g(t) in the form γ −1 g (t ) = ∑ γ −1 ρ1, j Jθ ( j ) + ρ T2 θ(t ) − j =r d  ii − i =1  h ∑h di i =0 (28)  ( −1) C i Jθ(t − jh ),  j =1 γ −1 i ∑ ∑ j j θ( j ) = M j θ + ∑M j −i −1 + ∑M j −i −1 j −1 Ny (i ) = M j θ + i =0 ∑M Nw ∑M N , Ο, ..., Ο], = M θ + G jε + j j −i −1 Nz (i ) [ where G j = N , MN , ..., M (29) j −i −1 d   0 (−1) j +1 αkB1 ii Ci j J  , i = 1, γ − 1, j = 1, i, Fij =  h 0  0   γ −1 j −1 αkρ B JM j − i −1 N   B3  0  1, j 1 (i ) ϑ =  w + ∑ ∑  w +   f . j =r i =0  0  N  0   γ −1 i ε p (t ) = Ap ε p (t ) + ∑ ∑ Fij ε p (t − jh) + ϑ(t ), γ −1 i Nw , O is the zero γ −1 ∑∑ (ε ∑ γ −1 i  γ −1 d i ε (t ) = Aε(t ) − αkB1  i  i =1 h where χ > 0. γ −1 + ρ T2 θ(t ) − ∑h i =0 di i − jh ) − jh ) N ij ε p (t − jh ) ) (34) Consider upper bounds of terms in (34) ∑ ∑ i j j =1 j −1  C i j Jθ(t − jh )  ∑M i =0 ij p ( t T T p ( t ) N ij ε p ( t ) − ε p (t 2ε Tp (t ) P ∑ ∑∑ F ε + 2ε Tp (t ) Pϑ(t ).  M j −i −1 Nw (i )  + ρ T2 θ(t )  i =0   γ −1  + αkB1  ρ1, j J  M j θ + G j ε +     j =r i i j −1 ∑ ∑ (−1) γ −1 i =1 j =1 γ −1 ∑ ApT P + PAp = −Q, i =1 j =1 (30) d i  di  ii Jθ(t ) − − ( −1) j Ci j Jθ(t − jh ). i h h   i =1  j =1 i =0 It follows from (30), that derivatives of the signal w should be bounded up to the (γ – r – 1)th order for r ≤ γ . Taking into account (23) and (30), transform equation (24) to the form γ −1 (33) along trajectory of system (32), we get V = −ε Tp (t )Qε p (t ) + 2ε Tp (t ) P Substituting (29) into (28), we get ∑ 0 i =1 j =1 − jh +  g= ρ1, j J  M j θ + G j ε +  j =r  (32) V = ε Tp (t ) Pε p (t ) + ∑ ∑ ∫ ε Tp (t + s ) N ij ε p (t + s )ds, (i ) matrix. γ −1 T  NJ   , M   T Q = QT > 0, N ij = N ij > 0 . Taking the derivative of (33) i =0 j −1 γ −1  A + αkB1 ∑ ρ1, j JG j + αkB2 J  j =r Ap =  γ −1  αkB  ρ JM j + ρT − γ −1 di J  − αkB J ∑ i  2 1  ∑ 1, j 2  i =0 h   j =r  where P = PT > 0 is the solution of i =0 j −1 (i ) T Consider Lyapunov-Krasovskii functional i =0 j −1 ] i =1 j =1 where ρ1,j is the jth element of the vector ρ1. Taking into account (26), we find the jth derivative (j ≥ 1) of θ in the following form j −1 [ ε p (t ) = ε T (t ), θT (t ) , Here ϑ is a bounded signal. Taking into account the notations, rewrite systems (26) and (31) in the following form Jθ(t ) i Denote j −i −1  Nw (i )     Jθ(t )  + αkB2 Jε(t ) − αkB2 Jθ(t )   + B3 f (t ). ∑∑ F ε ij p ( t − jh ) ≤ 0.5γ (γ − 1)χεTp (t ) P 2 ε p (t ) i =1 j =1 + χ −1 γ −1 i ∑∑ ε T p (t − jh )FijT Fij ε p (t − jh ), i =1 j =1 2ε (t ) Pϑ(t ) ≤ χε Tp (t ) P 2 ε p (t ) + χ −1 ϑ(t ) , 2 T p Taking into account upper bounds, rewrite (34) in the following form (31) γ −1 i V ≤ −ε Tp (t )Wε p (t ) − ∑ ∑ ε Tp (t − jh) Rij ε p (t − jh) + χ −1τ, i =1 j =1 where γ −1 i W = Q − 0.5γ (γ − 1)χP 2 − χP 2 − ∑ ∑ N ij , i =1 j =1 −1 Rij = N ij − χ F Fij , T ij 2 τ = sup ϑ(t ) . t (35) Obviously, there exist coefficients α and χ such that W > 0 and Rij > 0. We get upper bound of (35) in the form V ≤ −λ min (W )εTp (t )ε p (t ) + χ −1τ . (36) Here λ min (W ) is the smallest eigenvalue of matrix W. It follows from (36), that z (t ) ≤ ε p (t ) ≤ χ −1τ λ min (W ) , therefore, δ1 ≤ χ τ λ min (W ) . y (t ) = yˆ (t ), y (t ) = 20[ y (t ) − y (t − 0.05)], (1) [ ] p γ −2 ,  , 1 . D( p ) = ρT p γ −1 , Taking into account (33), rewrite the signal g(t) as follows [ (t ) = 20[y ] (t − 0.05)]. y (t ) = 20 y (1) (t ) − y (1) (t − 0.05) , y ( 3) 2) Let r ≥ γ. Rewrite the operator D(p) in the following form (41) We use observer (22) for estimation of derivatives in (41). Let h = 1/20. Then the observer (22) is rewritten in the form ( 2) −1 ) ( u(t ) = −7 0.9 y (t ) + 1.5 y (1) (t ) + 2 y ( 2 ) (t ) + 0.5 y ( 3) (t ) . ( 2) (t ) − y ( 2 ) (42) In addition, compare algorithm (3), (41), (42) with the classical high-gain observer (Esfandiary and Khalil, 1992) and modified high-gain observer (Astolfi and Marconi, 2015; Wang et al., 2015). The control laws (41) are the same in all algorithms. γ −1  d i di  Jθ(t ) − ∑  ii ∑ (−1) j Ci j Jθ(t − jh) . (37) 1) Introduce high-gain observer (Esfandiary and Khalil, i i =1  h j =1 i =0 h  1992): Substituting (37) into (24), transform equation (24) to the 110 0 1 0 0   form 0 0 1 0  110 2 ⋅ 0.35   ξ(t ) +   γ −1 d ξ (t ) =     110 3 ⋅ 0.05   0 0 0 1 ε (t ) = Aε(t ) + αkB1  ρ T θ(t ) − ∑ ii Jθ(t )  i =0 h       0 0 0 0 110 4 ⋅ 0.0024 (43)    γ −1 d i i  j j × ( y (t ) − [1 0 0 0]ξ(t ) ), (38) − αkB1  ∑ i ∑ (−1) C i Jθ(t − jh) + αkB 2 Jε(t )  i =1 h j =1  y (t ) = [1 0 0 0]ξ(t ), y (1) (t ) = [0 1 0 0]ξ(t ), − B 2 Jθ(t ) + B3 f (t ). y ( 2 ) (t ) = [0 0 1 0]ξ(t ), y ( 3) (t ) = [0 0 0 1]ξ(t ); Rewrite systems (26) and (38): 2) Consider modified high-gain observer (Astolfi and γ −1 i (39) Marconi, 2015; Wang et al., 2015): ε p (t ) = Ap ε p (t ) + ∑ ∑ Fij ε p (t − jh) + ϑ(t ), γ −1 g (t ) = ρ T θ(t ) − ∑ i =1 j =1 where  A + B2 J Ap =    NJ γ −1  d   αkB1  ρT − ∑ ii J  − αkB2 J  , h 0 = i    M  B  ϑ =  3  f is a bounded function, matrix Fij structure 0  corresponds to matrix Fij one in (32). Since system (39) structure is similar to system (32) one, than further proof of the second case is similar to the first one. Theorem 3 is proved. 5. EXAMPLE 4 ) + q3 p 3 + q2 p 2 + q1 p + q0 z (t ) = u (t ) + f (t ), y (t ) = z (t ) + w(t ). 0   0.5  110 +  ([0 2   0 110  0.0525 0 η 3 (t ) =  0 1]η1 (t ) − [1 0]η2 (t ) ), (44) 1 η3 ( t ) 0 0   0.5  110 +  ([0 1]η2 (t ) − [1 0]η3 (t ) ), 2   0 110  0.0171 Consider the plant in the following form (p 0 1   0 0 η 1 (t ) =  η1 (t ) +    η2 (t )  0 0 0 1  0   0.5  110 +  ( y (t ) − [1 0]η1 (t ) ), 2   0 110  0.16 0 1   0 0 η 2 (t ) =  η2 (t ) +    η3 ( t )  0 0 0 1  (40) The set Ξ of parameters possible values in (40) is given by inequalities: –1 ≤ q3 ≤ 0.1, –2 ≤ q2 ≤ 2, –3 ≤ q1 ≤ 3, –1 ≤ q0 ≤ 1. Additionally, |f(t)| ≤ 1. We choose σi = 1 and µ = 0.01 in (3). The parameter r in (3) will be determined in Table 1. Let α = 7, d0 = 0.9, d1 = 1.5, d2 = 2 and d3 = 0.5. Then control law (23) could be rewritten in the following form y (t ) = [1 0]η1 (t ), y (1) (t ) = [1 0]η2 (t ), y ( 2 ) (t ) = [1 0]η3 (t ), y ( 3) (t ) = [0 1]η3 (t ). Let q3 = 0, q2 = 1, q1 = 1, q0 = 0, f(t) = 0, w(t) = sin(0.5⋅103t) and z(0) = 1, z (0) = z(0) = 0 , z(0) = −1 in (40). Table 1 shows the maximum errors of estimation of the signal z(t) derivatives at steady-state mode using control system (3), (41), (42), control system (41), (43) and control system (41), (44). Table 1. The value of e (i ) (t ) = sup z (i ) (t ) − y (i ) (t ) , i = 0,3 at t steady-state mode (after 8 s) for the proposed algorithm, algorithms (43) and algorithm (44) Control system e(t ) e (1) (t ) e (2 ) (t ) e (3 ) (t ) Control system (41), (43) (high-gain observer) 0.22 8.41 132.3 698 Control system (41), (44) (modified highgain observer) 0.26 z a z t, s 4.9 31.1 266.1 z  Proposed control system (3), (41), (42) when r = 2 in (3) 0.04 Proposed control system (3), (41), (42) when r = 5 in (3) 3⋅10–3 0.2 2 b 57 z 7.5⋅10–4 2⋅10–3 t, s 5⋅10–3 Table 1 shows that the proposed control algorithm can significantly reduce the estimate error of derivatives of signal z. However, the dynamical order of the proposed algorithm for r = 2 is one less than the dynamical order of the algorithm (44). Furthermore, it follows from Table 1 that increasing the parameter r can improve the quality of derivative estimates. q2 = 2, q1 = 3, q0 = 1, f(t) = sin t, Let q3 = 0.1, z(0) = 1, w(t) = sin(0.5⋅103t) + sin(103t) + sin(104t), z (0) = z(0) = 0 , z(0) = −1 in (40). Fig. 1 shows the simulation result of z(t), z (t ) , z(t ) и z(t ) using the proposed control algorithm (3), (41), (42) for r = 5 in (3). The simulation results of z(t) and z(t ) are represented by continuous curves and the simulation results of z (t ) and z(t ) are represented by dashed ones. The simulation results show (Fig. 1) that after 10 (s) the  (t ) do absolute values of the signals z(t), z(t ) , z(t ) and z not exceed 0.014. However, the absolute values of estimate errors of z(t), z(t ) , z(t ) and z(t ) do not exceed 2⋅10–3. 6. CONCLUSION In this paper the robust control algorithm under parametric uncertainties, external bounded disturbances and highfrequency noises in measurement signal was proposed. For synthesis of control algorithm we used the approach that allows one to control independently the quality of noise filtering and the quality of the error of stabilization of the Fig. 1. The simulation results z(t), z (t ) (Fig. 1, a) and z(t ) , z(t ) (Fig. 1, b). output variable. The simulation results show the effectiveness of the proposed algorithm as compared as standard high-gain observer (Esfandiary and Khalil, 1992) and modified highgain observer (Astolfi and Marconi, 2015; Wang et al., 2015). REFERENCES Ahrens J. and Khalil K. (2009). High-gain observers in the presence of measurement noise: A switched-gain approach. Automaica, 45, 936-943. Astolfi D. and Marconi L. (2015). A high-gain nonlinear observer with limited gain power. IEEE Trans. Automatic Control, 60(11), 3059-3064. Bobtsov, A.A. (2002). Robust output-control for a linear system with uncertain coefficients. Automation and remote control, 63(11), 1794–1802. Boizot N., Busvelle E. and Gauthier J. (2010). An adaptive high-gain observer for nonlinear systems. Automatica, 46, 1483-1488. Esfandiary F. and H.K. Khalil (1992). Output feedback stabilization of fully linearizable systems. Int. J. Control, 56(5), 1007-1037. Furtat I., Fradkov A. and Tsykunov A. (2014). Robust synchronization of linear dynamical networks with compensation of disturbances. International Journal of Robust and Nonlinear Control, 24(17), 2774-2784. Furtat I.B. (2014). Adaptive predictor-free control of a plant with delayed input signal. Automation and remote control, 75(1), 139-151. Furtat I.B. (2015). Robust static control algorithm for linear objects, Automation and Remote Control, 76(3), 446457. Furtat I.B., Fradkov A.L. and Liberzon D. (2015) Compensation of disturbances for MIMO systems with quantized output. Automatica, 60, 239–244. Gauthier J., Hammouri H. and Othman S. (1992). A simple observer for nonlinear systems application to bioreactors. IEEE Trans. Automat. Contr., 37(6). 875-880. Prasov A. and Khalil H. (2013). A nonlinear high-gain observer for systems with measurement noise in a feedback control framework. IEEE Trans. Automat. Contr., 58(3), 569-580. Sanfelice R. and Praly L. (2011). On the performance of high-gain observers with gain adaptation under measurement noise. Automatica, 47, 2165-2176. Teel A.R. and Praly L. (1994). Tools for semiglobal stabilization by partial state and output feedback. SIAM Journal on Control and Optimization, 33(5), 1443-1488. Tsykunov A.M. (2008) An algorithm of robust control of a non-stationary linear plant with perturbation compensation, Journal of Computer and Systems Sciences International, 47(4), 527-534. Vasiljevic L. and Khalil H. (2008). Error bounds in differentiation of noisy signals b high-gain observers. Syst. Contr. Lett., 57, 856-862. Wang L., Astolfi D., Hongye S., Marconi L. and Isidori A. (2015). Output stabilization for a class of nonlinear systems via high-gain observer with limited gain power. Proc. 1st IFAC Conference on Modelling, Identification and Control of Nonlinear Systems, MICNON 2015, Saint Petersburg, Russia. IFAC-PapersOnLine, 48(11), 730735.
3cs.SY
A COUNTEREXAMPLE TO QUESTIONS ABOUT BOUNDARIES, STABILITY, AND COMMENSURABILITY arXiv:1705.03984v3 [math.GR] 26 Jan 2018 JASON BEHRSTOCK A BSTRACT. We construct a family of right-angled Coxeter groups which provide counter-examples to questions about the stable boundary of a group, one-endedness of stable subgroups, and the commensurability types of right-angled Coxeter groups. I NTRODUCTION In this short note we construct right-angled Coxeter groups with some interesting properties. These examples show that a number of questions in geometric group theory have more nuanced answers than originally expected. In particular, these examples resolve the following questions in the negative: ‚ (Charney and Sisto): As is the case for right-angled Artin groups, do all (nonrelatively hyperbolic) right-angled Coxeter group have totally disconnected contracting boundary? ‚ (Taylor): Given that all known quasigeodesically stable subgroups of the mapping class group are virtually free, does it hold that in any (non-relatively hyperbolic) group that all quasigeodesically stable subgroups have more than one end? ‚ (Folk question): If a right-angled Coxeter group has quadratic divergence, must it be virtually a right-angled Artin group? We describe a family of graphs, any one of which is the presentation graph of a right-angled Coxeter group which provides a counterexample to all three of the above questions. We expect that in special cases, and perhaps in general with appropriate modifications, there are interesting positive answers to these questions; we hope this note will encourage the careful reader to formulate and prove such results. The construction we give was inspired by thinking about the simplicial boundary for the Croke–Kleiner group, see [BH, Example 5.12] and [Tat2]. In the process we give a quick introduction to a few topics of recent interest in geometric group theory, for further details on these topics see also [ABD, BDM, Cha, CS, Cor2, DT, Tra]. Acknowledgments. Thanks to Ruth Charney, Alessandro Sisto, and Sam Taylor for sharing with me their interesting questions and to the referee for some helpful comments which led to Remark 2.3. Also, thanks to Mark Hagen for many fun discussions relating to topics in this note. Date: January 29, 2018. 1 RACG COUNTEREXAMPLE 2 1. T HE CONSTRUCTION Let Γn be a graph with 2n vertices built in the following inductive way. Start with a pair of vertices a1 , b1 with no edge between them. Given the graph Γn´1 , obtain the graph Γn by adding a new pair of vertices an , bn to the graph Γn´1 and adding four new edges, one connecting each of tan´1 , bn´1 u to each of tan , bn u. See Figure 1. F IGURE 1. The graphs Γ14 (left) and Γ (right). Note that Γn is a join if and only if n ď 3. More generally, ai , aj are contained in a common join if and only if |i ´ j| ď 2. For any m ě 5 choose n sufficiently large so that there exists a set of points P “ tp1 , . . . , pm u Ă Γn with the property that for each 1 ď i ă j ď m the points pi and pj are not contained in a common join in Γn . For example, in Γ14 we could choose the vertices P “ ta1 , a4 , a7 , a10 , a13 u. For each 1 ď i ă m add an edge between pi and pi`1 ; also, add an edge between pm and p1 . Call this new graph Γ. There are many choices of Γ depending on our choices of n, m, and P; for the following any choice will work. Associated to any graph, one can construct the right-angled Coxeter group with that presentation graph, this is the group whose defining presentation is given by: an order-two generator, for each vertex of the graph, and a commutation relation, between each of the generators associated to a pair of vertices connected by an edge. Let W denote the right-angled Coxeter group whose presentation graph is the Γ constructed above. In the next section, we record some key properties about the group W and then, in the final section, apply this to the questions in the introduction. 2. P ROPERTIES 2.1. Quadratic divergence. Proposition 2.1. The group W has quadratic divergence. In particular, this group is not relatively hyperbolic. Proof. It is easily seen that the graph Γn has the property that each vertex is contained in at least one induced square. It is also easy to verify that given any pair of induced squares S, S 1 in Γn , there exists a sequence of induced squares S “ S1 , S2 , S3 , . . . , Sk “ S 1 where for each 1 ď i ă k the squares Si and Si`1 share 3 vertices in common. This property, that there are enough squares to chain together RACG COUNTEREXAMPLE 3 any pair of points, is called CFS; it was introduced in [DaT] and studied further in [BFRHS, Lev]. Since Γ has the same vertex set as Γn , and every induced square in Γn is still induced in Γ, it follows that Γ also has the CFS property. Given any graph with the CFS property and which is not a join, the associated right-angled Coxeter group has exactly quadratic divergence, see [DaT, Theorem 1.1] and [BFRHS, Proposition 3.1]. The second statement in the proposition follows from the fact that any relatively hyperbolic group has divergence which is at least exponential [Sis, Theorem 1.3].  2.2. Stable surface subgroups. An undistorted subgroup is said to be (quasi-geodesically) stable if each pair of points in that subgroup are connected by uniformly Morse quasigeodesics, see [DT]. Proposition 2.2. W contains a closed hyperbolic surface subgroup which is stable. Proof. Recall that in any right-angled Coxeter group an induced subgraph yields a subgroup isomorpic to the right-angled Coxeter group of the associated subgraph. Also, note that the right-angled Coxeter group associated to a cycle of length at least 5 is a 2–dimensional hyperbolic orbifold group. Thus, the subgraph spanned by P, which is a cycle of length m ě 5, yields a subgroup, H, which is isomorphic to a 2–dimensional hyperbolic orbifold group. By construction, the subgraph P doesn’t contain any pair of non-adjacent vertices in a common join of Γ (by assumption we use the term join to mean non-degenerate join, in the sense that both parts of the join have diameter at least 2); thus no special subgroup of H is a direct factor in a non-hyperbolic special subgroup of W . It is proven in [ABD, Theorem B] that, a subgroup of a hierarchically hyperbolic space is stable if and only if it is undistorted and has uniformly bounded projections to the curve graph of every proper domain in some hierarchically hyperbolic structure; in turn, this property is equivalent to the orbit of the subgroup being quasi-isometrically embedded in the curve graph of the nest-maximal domain. A hierarchically hyperbolic structure on right-angled Coxeter groups was built in [BHS]; in that structure the curve graphs are contact graphs which were first defined in [Hag1] where it was proven they are all quasi-trees. In the present context, a domain can be thought of as a certain convex subcomplex of the Davis complex arising from special subgroups and orthogonality holds when the Davis complex contains the direct product of a given such pair. Since a closed surface group can not be quasi-isometrically embedded in a quasitree, to verify the proposition a different hierarchically hyperbolic structure must be used; for this we now rely on a method developed in [ABD] for modifying structures. The construction given in [ABD, Theorem 3.11] modifies the structure, by removing certain domains and augmenting the curve graphs associated to domains in which they are nested. Indeed, passing to the new structure and back, it follows that to verify a given subgroup has uniformly bounded projections in a particular structure, it suffices to verify that the subgroup has uniformly bounded projections to the set of domains W with the property that for each W P W, there exists a domain U which is orthogonal to W and with infinite diameter curve graph (since all other domains RACG COUNTEREXAMPLE 4 will be removed in the new structure while only changing the curve graph of the nest-maximal domain). In the standard hierarchically hyperbolic structure the only domains to which H has unbounded projections are contained in the subcomplex of the Davis complex associated to the special subgroup H. As noted above, since no pair of vertices in P are contained in a common join in Γ, these domains all have the property that any domains orthogonal to one of them must have uniformly bounded diameter. Thus, applying the results of [ABD] just discussed, it follows that H is stable. Now take a cover of the orbifold to get the desired closed hyperbolic surface.  Remark 2.3. We note that in the subgroup H constructed in Proposition 2.2, it follows easily from [KL, Proposition 3.3] (or, more explicitly, from [Tra, Theorem 1.1]), that each infinite order element in H acts as a rank-one isometry of the Davis complex of W and is thus Morse. To see that such an argument alone is not enough to prove stability of the subgroup, we note that in [OOS] they construct lacunary hyperbolic groups which provide an obstruction. In particular, in [OOS, Theorem 1.12] it is proven that there exist infinite finitely generated non-hyperbolic groups in which every proper subgroup is infinite cyclic and generate uniformly Morse quasigeodesics. The next result follows from Proposition 2.2 and [Cor1, Proposition 4.2]. Corollary 2.4. The right-angled Coxeter group W contains a topologically embedded circle in its Morse boundary. 3. A PPLICATIONS 3.1. Morse boundaries. Charney and Sultan introduced a boundary for CAT(0) groups which captures aspects of the negative curvature of the group [CS]. Their construction was then generalized by Cordes to a framework which exists for all finitely generated groups [Cor1]; in this general context it is known as the Morse boundary. Charney and Sultan built examples of relatively hyperbolic right-angled Coxeter groups whose boundaries are not totally disconnected [CS]. More generally, it is now known that for hyperbolic groups, the Morse boundary coincides with the hyperbolic boundary [Cor1, Main Theorem (3)]; using this it is easy to produce many examples of hyperbolic and relatively hyperbolic right-angled Coxeter groups whose boundary are not totally disconnected. On the other hand, the Morse boundary of any right-angled Artin group AΓ is totally disconnected. The two-dimensional case of this is implicit in [CS]. In general, this fact follows from the fact that the contact graph has totally disconnected boundary (since it is a quasi-tree) and [CH, Theorem F]. To see this recall that [CH, Theorem F] provides a continuous map from the Morse boundary of AΓ to the boundary of the contact graph of the universal cover of the Salvetti complex of AΓ ; at which point the result follows since Morse geodesic rays lying at infinite Hausdorff distance cannot fellow-travel in the contact graph, so this continuous boundary map is injective. Accordingly, Ruth Charney and Alessandro Sisto raised the question of whether outside of the relatively hyperbolic setting, right-angled Coxeter groups all have totally disconnected Morse boundary. The group W constructed above shows the RACG COUNTEREXAMPLE 5 answer is no, since it is not relatively hyperbolic by Proposition 2.1 and its boundary is not totally disconnected, by Corollary 2.4. 3.2. Stable subgroups. Examples of stable subgroups are known both in the mapping class group [Beh, DT] and in right-angled Artin groups [KMT]. In both of these classes, all known examples of stable subgroups are virtually free; in the relatively hyperbolic setting on the other hand, it is easy to construct one-ended stable subgroups. Sam Taylor asked whether there exist non-relatively hyperbolic groups with one-ended stable subgroups. The example W is a non-relatively hyperbolic group with one-ended stable subgroups by Proposition 2.1 and Proposition 2.2. 3.3. Commensurability. A well-known construction of Davis–Januszkiewicz [DJ] shows that every right-angled Artin group is commensurable to some right-angled Coxeter group. The following is a well-known problem: Question 3.1. Which right-angled Coxeter groups are commensurable to rightangled Artin groups? It is known that any right-angled Artin groups either has divergence which is linear (if it is a direct product) or quadratic, see [BC] or [ABD` ]. Since divergence is invariant under quasi-isometry, and hence under commensurability as well, this puts a constraint on the answer to Question 3.1. Several people have raised the question of whether every right-angled Coxeter group with quadratic divergence is quasi-isometric to some right-angled Artin group. The group W shows that the answer is no, since [Cor1, Main Theorem (2)] proves that the Morse boundary is invariant under quasi-isometries, but Propositions 2.1 and 2.2 show that the group W is a right-angled Coxeter group with quadratic divergence whose Morse boundary contains an embedded circle, while the Morse boundary of any right-angled Artin group is totally disconnected. 4. F URTHER QUESTIONS In [BFRHS] it was established that for a large range of density functions that asymptotically almost surely the random graph yields a right-angled Coxeter group with quadratic divergence. More generally, it is known that among n–vertex graphs with density greater than 1{n and bounded away from 1, that asymptotically almost surely any random graph of this type will contain a large induced polygon. Accordingly, we expect that the proof of Corollary 2.4 could be used to verify: Conjecture 4.1. For any density greater than 1{n and bounded away from 1, asymptotically almost surely the random right-angled Coxeter group contains circles in its Morse boundary. In particular, it is not virtually a right-angled Artin group. The prevalence of right-angled Coxeter groups with quadratic divergence makes the following an appealing (but likely very difficult) question: Question 4.2. Classify right-angled Coxeter groups with quadratic divergence up to quasi-isometry. Classify them up to commensurability. The proof of Proposition 2.2 and Remark 2.3 indicate that there are some nontrivial constraints on what the set of domains could be in any potential hierarchically hyperbolic structure on a lacunary hyperbolic group. Accordingly we ask: RACG COUNTEREXAMPLE 6 Question 4.3. Is a lacunary hyperbolic group hierarchically hyperbolic if and only if it is hyperbolic? Further, in light of Proposition 2.2 and Remark 2.3 it would be interesting if the following was true in general or under some moderate hypotheses: Question 4.4. Let G be a hierarchically hyperbolic group with a subgroup H. If all infinite cyclic subgroups of H are uniformly Morse, does that imply that H is stable? R EFERENCES [ABD] Carolyn Abbott, Jason Behrstock, and Matthew G Durham. Largest acylindrical actions and stability in hierarchically hyperbolic groups. AR X IV:1705.06219. [ABD` ] A. Abrams, N. Brady, P. Dani, M. Duchin, and R. Young. Pushing fillings in right-angled Artin groups. J. Lond. Math. Soc. (2) 87 (2013), 663–688. J. Behrstock. Asymptotic geometry of the mapping class group and Teichmüller space. [Beh] Geometry & Topology 10 (2006), 1523–1578. [BC] J. Behrstock and R. Charney. Divergence and quasimorphisms of right-angled Artin groups. Math. Ann. 352 (2012), 339–356. [BDM] J. Behrstock, C. Druţu, and L. Mosher. Thick metric spaces, relative hyperbolicity, and quasi-isometric rigidity. Math. Ann. 344 (2009), 543–595. [BFRHS] J. Behrstock, V. Falgas-Ravry, M. Hagen, and T. Susse. Global structural properties of random graphs. Int. Math. Res. Not. (2016). To appear. J. Behrstock and M.F. Hagen. Cubulated groups: thickness, relative hyperbolicity, and [BH] simplicial boundaries. Geometry, Groups, and Dynamics 10 (2016), 649–707. [BHS] J. Behrstock, M.F. Hagen, and A. Sisto. Hierarchically hyperbolic spaces I: curve complexes for cubical groups. Geometry & Topology, 21:1731–1804, 2017. [Cha] Ruth Charney. An introduction to right-angled Artin groups. Geom. Dedicata 125 (2007), 141–158. Ruth Charney and Harold Sultan. Contracting boundaries of CATp0q spaces. J. Topol. 8 [CS] (2015), 93–117. [Cor1] Matthew Cordes. Morse boundaries of proper geodesic metric spaces. AR X IV:1502.04376. [Cor2] Matthew Cordes. A survey on Morse boundaries & stability. AR X IV:1704.07598. [CH] Matthew Cordes and David Hume. Stability and the Morse boundary. To appear in Groups, Geometry, and Dynamics (2016). [DaT] Pallavi Dani and Anne Thomas. Divergence in right-angled Coxeter groups. Trans. Amer. Math. Soc. 367 (2015), 3549–3577. [DJ] Michael W. Davis and Tadeusz Januszkiewicz. Right-angled Artin groups are commensurable with right-angled Coxeter groups. J. Pure Appl. Algebra 153 (2000), 229–235. [DT] Matthew Gentry Durham and Samuel J. Taylor. Convex cocompactness and stability in mapping class groups. Algebr. Geom. Topol. 15 (2015), 2839–2859. [Hag1] Mark F. Hagen. Weak hyperbolicity of cube complexes and quasi-arboreal groups. J. Topol. 7 (2014), 385–418. [KL] M. Kapovich and B. Leeb. 3-manifold groups and nonpositive curvature. Geom. Funct. Anal. 8 (1998), 841–852. [KMT] Thomas Koberda, Johanna Mangahas, and Samuel J Taylor. The geometry of purely loxodromic subgroups of right-angled Artin groups. AR X IV:1412.3663. [Lev] Ivan Levcovitz. Divergence of CAT(0) Cube Complexes and Coxeter Groups. arXiv:1611.04378. [OOS] Alexander Yu. Ol1 shanskii, Denis V. Osin, and Mark V. Sapir. Lacunary hyperbolic groups. Geom. Topol. 13(2009), 2051–2140. With an appendix by Michael Kapovich and Bruce Kleiner. [Sis] A. Sisto. On metric relative hyperbolicity. AR X IV:1210.8081. [Tat2] Mark F. Hagen. Tattoo. In preparation. [Tra] Hung Cong Tran. Purely loxodromic subgroups in right-angled Coxeter groups. AR X IV:1703.09032. RACG COUNTEREXAMPLE L EHMAN C OLLEGE AND T HE G RADUATE C ENTER , CUNY, N EW Y ORK , N EW Y ORK , USA E-mail address: [email protected] 7
4math.GR
arXiv:1603.07713v3 [math.GR] 18 May 2016 CHIRAL POLYHEDRA AND FINITE SIMPLE GROUPS DIMITRI LEEMANS AND MARTIN W. LIEBECK Abstract. We prove that every finite non-abelian simple group acts as the automorphism group of a chiral polyhedron, apart from the groups P SL2 (q), P SL3 (q), P SU3 (q) and A7 . Keywords: finite simple groups, abstract chiral polyhedra, regular maps. 1. Introduction Polyhedra and their generalisations to higher ranks, polytopes, are certain ranked partially ordered sets generalising geometric objects that have been studied since the Greeks (see [24, Chapter 1]). Those polytopes whose automorphism group acts transitively on maximal flags are called regular. They have maximum possible rotational and reflectional symmetries. Those that are chiral have maximum rotational symmetries but no reflections. It is already known which finite simple groups are automorphism groups of abstract regular polyhedra (see below for more details). The main purpose of this article is to determine which finite simple groups are automorphism groups of chiral polyhedra. In order to state the main results we require precise definitions of the above terms. Following [24], an (abstract) polytope (P, ≤) of rank n is a partially ordered set with a rank function ranging from −1 to n and satisfying the following properties. The elements of rank i are called the i-faces of P. There exists a unique least face F−1 and a unique greatest face Fn . The flags are the maximal totally ordered subsets of P and they must all contain exactly n + 2 faces. Two flags Φ and Ψ are called adjacent if they differ in exactly one face. They are called i-adjacent if this face is an i-face. The poset P must be strongly connected, that is, every pair of flags must be connected by a path of adjacent flags in P. Finally we require that for any (i − 1)-face F and any (i + 1)- face G of P such that F ≤ G, there are exactly two i-faces between F and G. If the rank of P is 3, we call P a polyhedron. An automorphism of (P, ≤) is a bijection of the faces of P that preserves the order ≤. The set of all automorphisms of (P, ≤) with composition forms a group called the automorphism group of (P, ≤) and denoted Γ(P). If Γ(P) has a unique orbit on the flags of P, we say that P is regular. If Γ(P) has two orbits such that any two adjacent flags belong to distinct orbits, we say that P is chiral. Date: May 20, 2016. 1 2 DIMITRI LEEMANS AND MARTIN W. LIEBECK As defined for instance in [24], a C-group is a group G generated by pairwise distinct involutions ρ0 , . . . , ρn−1 which satisfy the following intersection property: ∀J, K ⊆ {0, . . . , n − 1}, hρj | j ∈ Ji ∩ hρk | k ∈ Ki = hρj | j ∈ J ∩ Ki. A C-group (G, {ρ0 , . . . , ρn−1 }) is a string C-group if its generators satisfy the following relations: (ρj ρk )2 = 1 ∀j, k ∈ {0, . . . n − 1} with | j − k |≥ 2. In [24] it is shown that string C-groups and abstract regular polytopes are in one-to-one correspondence. Every string C-group gives an abstract regular polytope and, given an abstract regular polytope and one of its base flags, one can construct a set of distinguished generators that, together with the automorphism group of the polytope, give a string C-group. In particular, the automorphism group of an abstract regular polyhedron is generated by three involutions ρ0 , ρ1 , ρ2 , two of which commute (namely, ρ0 , ρ2 ). In 1980, it was asked in the Kourovka Notebook (Problem 7.30) which finite simple groups have this property. This was solved by Nuzhin and others in [25, 26, 27, 28, 23]: every non-abelian finite simple group can be generated by three involutions, two of which commute, with the following exceptions: P SL3 (q), P SU3 (q), P SL4 (2n ), P SU4 (2n ), A6 , A7 , M11 , M22 , M23 , M cL. Thus every finite simple group, apart from the above exceptions, is the automorphism group of an abstract regular polyhedron. Similarly, in [29], it is shown that for a finite group G, the chiral polyhedra having G as automorphism group are in bijective correspondence with pairs x, t ∈ G satisfying the following conditions: (i) G = hx, ti; (ii) t is an involution; (iii) there is no involution α ∈ Aut(G) such that xα = x−1 , tα = t. Our main result classifies those finite simple groups G possessing such generators: Theorem 1.1. Let G be a non-abelian finite simple group, not A7 , P SL2 (q), P SL3 (q) or P SU3 (q). Then there exist x, t ∈ G such that the following hold: (i) G = hx, ti; (ii) t is an involution; (iii) there is no involution α ∈ Aut(G) such that xα = x−1 , tα = t. As a consequence, for every nonabelian finite simple group G except A7 , P SL2 (q), P SL3 (q) or P SU3 (q), there exists an abstract chiral polyhedron having automorphism group G. This result was already known to be true for the Suzuki groups [16, 13], the small Ree groups [14], the alternating groups (see Section 5 for details) and some small sporadic groups [12]. CHIRAL POLYHEDRA AND FINITE SIMPLE GROUPS 3 We now discuss the exceptions in Theorem 1.1. The groups P SL2 (q) do not have pairs of elements x, t satisfying (i)–(iii) of the theorem; this a consequence of a result of Macbeath [22], as observed by Singerman [31, Theorem 3]. For the group A7 , an exhaustive computer search shows that no pair of elements x, t satisfying (i)–(iii) of Theorem 1.1 exists – see [12]. Thus it remains to consider the groups P SL3 (q) and P SU3 (q); it will be shown that these also do not possess generators x, t satisfying conditions (i)–(iii) in a forthcoming paper [19]. The rest of the paper is devoted to the proof of Theorem 1.1. This is divided into four cases: namely, the case where G is of exceptional Lie type (Section 3), the case where G is classical (Section 4), the case where G is an alternating group (Section 5), and the case where G is a sporadic group (Section 6). Observe that chiral polyhedra (and regular polyhedra) may be seen also as regular maps. In a recent paper [15], Gareth Jones has studied much further the link between automorphism groups of edge-transitive maps and finite simple groups. 2. Preliminaries In this section we prove some lemmas needed for the proof of Theorem 1.1, The first two lemmas are straightforward hence we omit their proofs. Lemma 2.1. Let G be a finite group, and suppose x, t ∈ G satisfy xt = x−1 . Then the set {y ∈ G : xy = x−1 } is contained in the coset CG (x)t. Lemma 2.2. Let G be a finite group with a subgroup A. Suppose M is a maximal subgroup of G containing A, such that any two G-conjugates of A that are contained in M are M -conjugate. Then the number of G-conjugates of M containing A is |NG (A) : NM (A)|. For a finite group G and a positive integer r, denote by Ir (G) the set of elements of order r in G, and let ir (G) = |Ir (G)|. The next two lemmas provide upper and lower bounds for the numbers of involutions i2 (G) in groups of Lie type. Recall that a simple group of Lie type over a finite field Fq can be written as (ḠF )′ , the derived group of the fixed point group of a Frobenius endomorphism F of the corresponding simple adjoint algebraic group Ḡ over F̄q . We use the notation Lǫn (q) (where ǫ = ±) to denote P SLn (q) when ǫ = +, and P SUn (q) when ǫ = −. Similarly, E6ǫ (q) denotes E6 (q) when ǫ = + and 2E (q) when ǫ = −. 6 Lemma 2.3. Let G be a finite simple group of Lie type over Fq , and write G = (ḠF )′ as above. Let r be the rank of Ḡ, and N the number of positive roots in the root system of Ḡ. Define  1 2 2 2 2 (N + r), if G is of type F4 , G2 or B2 , MG = N + r, otherwise. 4 DIMITRI LEEMANS AND MARTIN W. LIEBECK  Then i2 (Aut(G)) < 2 q MG + q MG −1 . Proof. This is [18, Prop. 1.3].  Lemma 2.4. Let G be a finite simple group of Lie type over Fq . (i) If G is of classical type, then i2 (G) > 14 q NG , where NG is defined as follows: G NG ǫ Ln (q) (ǫ = ±) [ 12 n2 ] P Sp2m (q), P Ω2m+1 (q) m2 + m P Ωǫ2m (q) (ǫ = ±) m2 − 1 (ii) If G is of exceptional type, then with one exception i2 (G) > 21 q NG , where NG is defined below; the exception is G = E7 (q), in which case i2 (G) > 14 q NG . G E8 (q) E7 (q) E6ǫ (q) F4 (q) G2 (q) 2F4 (q) 2G2 (q) 2B2 (q) 3D4 (q) NG 128 70 40 28 8 14 4 3 16 Proof. An asymptotic version of this result is proved in [21, Props. 4.1, 4.3]. The lemma is easily verified by keeping track of the constants in that proof.  Note that the exponents MG and NG in Lemmas 2.3 and 2.4 are equal, except in cases where G possesses an involutory graph automorphism (types Lǫn , P Ωǫ2m , E6ǫ ). 3. Proof of Theorem 1.1 for G of exceptional type Let G be a finite simple group of exceptional Lie type over Fq (i.e. of type E8 , E7 , E6ǫ , F4 , G2 , 2F4 , 2G2 , 2B2 or 3D4 ). Assume that q > 2 when G is of type G2 or 2F4 , and q > 3 for type 2G2 (for the excluded groups, G2 (2)′ ∼ = L2 (8) and these will be dealt with as classical = U3 (3) and 2G2 (3)′ ∼ groups in the next section). Write G = (ḠF )′ , the derived group of the fixed point group of a Frobenius endomorphism F of the corresponding simple adjoint algebraic group Ḡ over F̄q . Let d = |ḠF : G|, so that   (2, q − 1), if G = E7 (q), (3, q − ǫ), if G = E6ǫ (q), d=  1, otherwise. By [17, Section 2], there is a cyclic maximal torus hxi of G of order as given in Table 1. In the table, Φn (q) denotes the nth cyclotomic polynomial evaluated at q. Morover, T = CḠF (x) is a maximal torus of ḠF of order d|hxi|, and also CAut(G) (x) = T (see [30, 2.8(iii)]). Let w0 be the longest element of the Weyl group W (Ḡ). Suppose that w0 = −1 (i.e. Ḡ 6= E6 ). Then the involutions in NḠ (T ) that invert x are conjugates of t0 , a preimage in N (T ) of w0 . Now CḠ (t0 ) has dimension CHIRAL POLYHEDRA AND FINITE SIMPLE GROUPS 5 equal to the number of positive roots in the root system of Ḡ. Hence we see from the lists of possibilities for involution centralizers in G, in [10, Section 4.5] for q odd, and in [1] for q even, that CG (t0 ) is as given in Table 1. Similarly, if Ḡ = E6 , the involutions in Aut(G) inverting x are conjugate to t0 , a preimage in NGhτ i (T ) of w0 τ = −1, where τ is an involutory graph automorphism of G, and again CG (t0 ) is as in Table 1. Table 1. Torus hxi and centralizer CG (t0 ), G exceptional CG (t0 ) D8 (q), q odd [q 84 ].B4 (q), q even 1 E7 (q) Aǫ7 (q).2, q ≡ ǫ mod 4 d Φ18 (q)Φ2 (q), q ≥ 3 129, q = 2 [q 42 ].B3 (q), q even 1 ǫ E6 (q) C4 (q), q odd d Φ9 (q), ǫ = + 1 15 [q ].C3 (q), q even d Φ18 (q), ǫ = − F4 (q) Φ12 (q), q ≥ 3 (A1 (q)C3 (q)).2, q odd 17, q = 2 [q 18 ].A1 (q)2 , q even G2 (q) Φ6 (q), q ≥ 4 (A1 (q)A1 (q)).2, q odd 13, q = 3 [q 3 ].A1 (q), q even 3D (q) Φ12 (q) (A1 (q)A1 (q 3 )).2, q odd 4 [q 9 ].A1 (q), q even p √ 2F (q) q 2 + 2q 3 √ + q + 2q + 1 [q 9 ].A1 (q) 4 2G (q) q + √3q + 1 A1 (q) × 2 2 2B (q) q + 2q + 1 [q 2 ] 2 G E8 (q) |hxi| Φ30 (q) Table 2. Maximal overgroups of hxi, G exceptional G |M(x)| Groups in M(x) E8 (q) 0 − 2E (q). q+1 E7 (q), q ≥ 3 1 6 d 2A (2).2 E7 (2) 1 7 E6ǫ (q) 1 Aǫ2 (q 3 ).3 3D (q).3 F4 (q), q ≥ 3 (2, q) 4 F4 (2) 2 B4 (2) G2 (q), q ≥ 5 1 SU3 (q).2 G2 (4) 2 SU3 (4).2, L2 (13).2 G2 (3) 3 SL3 (3).2, SL3 (3).2, L2 (13) 3D (q), 2F (q) 0 − 4 4 2G (q), 2B (q) 0 − 2 2 6 DIMITRI LEEMANS AND MARTIN W. LIEBECK Let Inv(x) be the set of involutions in Aut(G) that invert x. By Lemma 2.1 we have Inv(x) ⊆ T t0 . Define M(x) to be the set of maximal subgroups of G containing x such that M 6= NG (hxi). It is shown in the proof of [11, Prop. 6.2] that the set M(x) is as given in Table 2. Define [ [ S= I2 (CG (α)) ∪ I2 (M ). α∈Inv(x) M ∈M(x) We claim that (3.1) i2 (G) > |S|. Given (3.1), there exists an involution t ∈ G such that (a) t lies in no maximal subgroup of G containing x, and (b) t centralizes no involution that inverts x. It then follows that x, t satisfy conditions (i)-(iii) of Theorem 1.1, completing the proof of the theorem for exceptional groups. So it remains to prove (3.1). By Lemma 2.1 we have |Inv(x)| ≤ |T |, and also from the above discussion we know that CG (α) is conjugate to CG (t0 ) for all α ∈ Inv(x). Hence X (3.2) |S| ≤ |T | i2 (CG (t0 )) + i2 (M ). M ∈M(x) Using Lemma 2.3 (and also the slightly stronger bound i2P (A1 (q)) < q 2 ), we obtain the following upper bounds for i2 (CG (t0 )) and for M ∈M(x) i2 (M ): P i2 (M ) ≤ i2 (CG (t0 )) < G 84 20 19 E8 (q) 2q (q + q ) 0 E7 (q) 2q 42 (q 12 + q 11 ) 2(q + 1)(q 42 + q 41 ) ǫ 2q 15 (q 12 + q 11 ) 2(q 15 + q 12 ) E6 (q) F4 (q) q 22 2(q 20 + q 19 ) 4(q 5 + q 4 ) G2 (q), q ≥ 5 q 5 11 3D (q) q 0 4 2F (q), q > 2 q 11 0 4 2G (q), q > 3 2q 2 0 2 In all these cases we check that the consequent upper bound for |S| using (3.2) is less than the lower bound for i2 (G) given by Lemma 2.4, proving (3.1). This leaves the following groups to deal with: G = 2B2 (q), G2 (3), G2 (4) and 2F4 (2)′ . In the first case, we see using [32] that i2 (CG (t0 )) = q − 1, while i2 (G) = (q − 1)(q 2 + 1), so (3.1) holds. In the other P cases we can use [9] to obtain the precise values of i2 (G), i2 (CG (t0 )) and i2 (M ), and again check that (3.1) holds. This completes the proof of Theorem 1.1 when G is an exceptional group of Lie type. CHIRAL POLYHEDRA AND FINITE SIMPLE GROUPS 7 4. Proof of Theorem 1.1 for G classical In this section we prove Theorem 1.1 in the case where G is classical. Let G be a finite simple classical group over Fq , and exclude L2 (q), L3 (q) and U3 (q). So G is one of the groups Lǫn (q) (n ≥ 4), P Sp2m (q) (m ≥ 2), P Ω2m+1 (q) (q odd), P Ωǫ2m (q) (m ≥ 4). Let V be the natural module for G. As in the previous section, write G = (ḠF )′ , where F is a Frobenius endomorphism of the corresponding simple adjoint algebraic group Ḡ over F̄q . Define  (n, q − ǫ), if G = Lǫn (q) d= (2, q − 1), if G = P Sp2m (q), P Ω2m+1 (q) or P Ωǫ2m (q). For convenience we handle first the following groups G: (4.1) Lǫ4 (2), Lǫ4 (3), Lǫ4 (4), Lǫ5 (2), Lǫ6 (2), Sp4 (2), P Sp4 (3), Sp4 (4), Sp6 (2), P Sp6 (3), Sp8 (2), ǫ Ω7 (3), Ωǫ8 (2), P Ω+ 8 (3), Ω10 (2). For these groups, generators x, t as in Theorem 1.1 can be found by a search using Magma [4]. So suppose from now on that G is not one of the groups in (4.1). The proof follows along the same lines as the previous section. There is an element x ∈ G of order given in Table 3; in all cases we take x to act either irreducibly on the natural module V , or irreducibly on both summands of an orthogonal decomposition V = Vi +Vi⊥ , where dim Vi = i ≤ 2. Then T = CḠF (x) is a maximal torus of order d|hxi| and also CAut(G) (T ) = T . Again, the involutions in Aut(G) that invert x are conjugates of t0 , a preimage in N (T ) of −1 = w0 or w0 τ (where τ is an involutory graph automorphism). The possibilities for CG (t0 ) are also given in Table 3. (In the symplectic and orthogonal cases, CG (t0 ) is either the given group, or the given group quotiented by the scalars h−Ii.) As in the previous section, define M(x) to be the set of maximal subgroups of G containing x such that M 6= NG (hxi). We claim that M(x) is as in Table 4. When hxi is a Singer subgroup (i.e. the intersection with G of a cyclic subgroup generated by a Singer cycle of P SL(V )), this follows from the main theorem of [3]. This covers the cases where G = Ln (q), Un (q) with n odd, P Sp2m (q) and P Ω− 2m (q). For the other cases we use [2, Thm. 3.1], which classifies subgroups of classical groups of orders divisible by numbers of the form Φd (q), where d > 12 dim V . Working through the possible subgroups, we find that the only ones containing x are those in Table 4. We calculate the number of groups in M(x) using Lemma 2.2. Again let Inv(x) be the set of involutions in Aut(G) that invert x, and define [ [ S= I2 (CG (α)) ∪ I2 (M ). α∈Inv(x) M ∈M(x) 8 DIMITRI LEEMANS AND MARTIN W. LIEBECK Table 3. Torus hxi and centralizer CG (t0 ), G classical G Ln (q), n≥4 Un (q), n≥4 |hxi| 1 q n +1 d q+1 , n odd 1 n−1 + 1), n even d (q P Sp2m (q), m≥2 1 m d (q + 1) P Ω2m+1 (q), m ≥ 3, q odd P Ω+ 2m (q), m≥4 1 m d (q + 1) P Ω− 2m (q), m≥4 CG (t0 ) P SOnǫ (q), q or n odd [q n−1 ]Spn−2 (q), q and n even P SOn (q) P SOnǫ (q), q odd n−1 [q ]Spn−2 (q), q even ǫ GLm (q).2, q ≡ ǫ mod 4 1 (m2 +3m−2) 2 [q ].Spm−2 (q), q and m even 1 2 [q 2 (m +m) ].Spm−1 (q), q even, m odd ǫ (q) × O ǫ′ (Om m+1 (q)) ∩ G 1 q n −1 d q−1 1 m−1 + 1)(q + 1), m odd d (q 1 m−1 + 1), m even d (q 1 m d (q + 1) ǫ (q))2 .2 ∩ G, q odd (Om [q ].Spm−2 (q), q and m even ].Spm−1 (q), q even, m odd [q ǫ (q) × O −ǫ (q)) ∩ G, q odd (Om m 1 2 (m +m−2) 2 [q ].Spm−2 (q), q and m even 1 2 [q 2 (m −m) ].Spm−1 (q), q even, m odd 1 (m2 +m−2) 2 1 (m2 −m) 2 We aim to show that i2 (G) > |S|, which will complete the proof of Theorem 1.1 when G is classical. P As in (3.2) we have |S| ≤ |T | i2 (CG (t0 )) + M ∈M(x) i2 (M ), and so it suffices to prove that (4.2) i2 (G) > |T | i2 (CG (t0 )) + X i2 (M ). M ∈M(x) P Lemma 2.3 gives the upper bounds for i2 (CG (t0 )) and for M ∈M(x) i2 (M ) in Table 5, where d(n) denotes the number of prime divisors of n. We can use these bounds together with Lemma 2.3 to get an upper bound for the right hand side of (4.2); and Lemma 2.4 gives a lower bound for i2 (G). In this way we check easily that (4.2) holds with the following possible exceptions (recalling that we have already excluded the groups in (4.1)): (1) G = Lǫ4 (q), P Sp4 (q) or P Ωǫ8 (q); (2) G = Lǫ5 (3), Lǫ6 (3), Lǫ8 (2), Sp6 (4), P Sp8 (3), Sp8 (4) or Ωǫ12 (2). For the groups under (1), we show that (4.2) still holds, by improving the lower bound on i2 (G) from Lemma 2.4 and the upper bound on i2 (CG (t0 )) CHIRAL POLYHEDRA AND FINITE SIMPLE GROUPS 9 Table 4. Maximal overgroups of hxi, G classical Groups in M(x) (GL nr (q r ).r) ∩ G, r prime, r|n Un (q) (GU nr (q r ).r) ∩ G, n odd, r prime, r|n GUn−1 (q), n even P Sp2m (q) Sp 2m (q r ).r, r r prime, r|m − O2m (q), q even − P Ω2m+1 (q) O2m (q) ∩ G − − P Ω+ (q) (O 2m 2m−2 (q) × O2 (q)) ∩ G (GUm (q).2) ∩ G, m even Ω7 (q) (irred.), m = 4 − r P Ω2m (q) (O − 2m (q ).r) ∩ G, G Ln (q) Number 1 for each r 1 for each r 1 1 for each r 1 1 1 2 d 1 for each r r r prime, r|m (GUm (q).2) ∩ G, m odd Table 5. Upper bounds for i2 (CG (t0 )) and 1 P i2 (M ), G classical P i2 (CG (t0 )) < i2 (M ) ≤ 1 2 n−1 q i2 (Spn−2 (q)) 2(q + 1)2 q 2 (n −n−4) 1 2 i2 (P SOn (q)) 2d(n) (q 3 + 1)q 6 (n +3n) 1 2 − q 2 (m +3m−2) i2 (Spm−2 (q)) i2 (O2m (q) + d(m) i2 (Spm (q 2 ).2) 1 2 +m) − (m q2 i2 (Spm−1 (q)) i2 (O2m (q)) + d(m) i2 (Sp2m/r (q r )), r largest prime divisor of m 1 2 (m2 +m−2) ǫ 2 P Ω2m (q), m ≥ 6 even q i2 (Spm−2 (q)) 2(q + 1)2 q (m−1) −1 + 1 2 2(q + 1)2 q 2 (m −m+4) 1 2 P Ωǫ2m (q), m ≥ 5 odd q 2 (m −m) i2 (Spm−1 (q)) as above ′ − ǫ ǫ P Ω2m+1 (q), m ≥ 3, q odd i2 (Om (q) × Om+1 (q)) i2 (O2m (q)) G ǫ Ln (q), n even Lǫn (q), n odd P Sp2m (q), m even P Sp2m (q), m ≥ 3 odd in Table 5 by direct calculation in G, as follows: G i2 (G) > 1 8 ǫ L4 (q) 2q 1 5 P Sp4 (q) 2 q (q − 1) ǫ P Ω8 (q), q even 12 q 16 P Ωǫ8 (q), q odd 18 q 16 i2 (CG (t0 )) < 2q 4 2q 3 q 11 4q 8 10 DIMITRI LEEMANS AND MARTIN W. LIEBECK Using these improved bounds, it is straightforward to check that (4.2) again holds. Finally, for the groups under (2) above, we again improve the bounds on i2 (G) and i2 (CG (t0 )) by direct calculation to show that (4.2) holds. This completes the proof of Theorem 1.1 when G is a classical group. 5. Proof of Theorem 1.1 for G an alternating group The existence of a pair x, t in An satisfying (i)–(iii) of Theorem 1.1 for every n ≥ 8 can be extracted from papers of Conder [5, 6], a more recent paper by Conder et al. [7], and some easy Magma computations. Gareth Jones recently gave the following pairs x, t in his plenary lecture at the conference ”Symmetries and Covers of Discrete Objects” (Queenstown, New Zealand, February 2016). For even n ≥ 8, take x = (2, 3, . . . , n) and t = (1, 2)(3, 4) And for odd n ≥ 9, take x = (1, 2, . . . , n) and t = (1, 2)(3, 6) Elementary arguments show that hx, ti = An , and it is an easy exercise to show that x, t also satisfy (iii) of Theorem 1.1. 6. Proof of Theorem 1.1 for G sporadic In this section, we show that each of the 26 sporadic simple groups has at least one pair x, t satisfying (i)–(iii) of Theorem 1.1. We shall use the fact that such pairs give abstract chiral polyhedra, as explained in the preamble to the theorem. When we give a pair x, y of generators of G, the corresponding pair x, t := xy is the one satisfying conditions (i)–(iii) of Theorem 1.1. 6.1. Mathieu groups. The groups Mi with i = 11, 12, 22 were fully investigated in [12]. They respectively have 66, 118 and 242 non-isomorphic chiral polyhedra, hence they have that many pairs x, t satisfying (i)–(iii) of Theorem 1.1. The following generators of M23 give a chiral polyhedron of type {11, 15} (the type being {p, q} where x, y have orders p, q): x := (1, 14, 17, 21, 10, 5, 2, 16, 18, 12, 8)(3, 6, 19, 22, 15, 9, 20, 23, 4, 7, 11), y := (1, 8, 6, 10, 21, 22, 19, 12, 11, 7, 4, 5, 3, 18, 9)(2, 23, 20, 16, 13)(14, 15, 17), and t := xy. The pair x, t satisfies (i)–(iii) of Theorem 1.1. The following generators of M24 give a chiral polyhedron of type {23, 15}: x := (1, 17, 23, 21, 2, 7, 3, 15, 4, 20, 10, 6, 16, 13, 19, 22, 11, 18, 5, 14, 9, 8, 12), y := (1, 20, 2)(3, 7, 4, 17, 21, 5, 18, 24, 11, 22, 19, 9, 14, 23, 15)(8, 13, 16, 10, 12), and t := xy. The pair x, t satisfies (i)–(iii) of Theorem 1.1. CHIRAL POLYHEDRA AND FINITE SIMPLE GROUPS 11 6.2. Janko groups. The groups J1 and J2 were investigated in [12]. They have respectively 1056 and 888 non-isomorphic chiral polyhedra. A Magma search gave a chiral polyhedron of type {19, 8} for J3 . We do not give its generators here as these are permutations on 6516 points. The group J4 has i2 (J4 ) = 51, 747, 149, 311. It also has a unique class of maximal subgroups containing elements of order 29. Take σ ∈ J4 of order 29. The normalizer NJ4 (hσi) = C29 : C28 is maximal in J4 . We have i2 (C29 : C28 ) = 29, and all the 29 involutions are conjugate in J4 . There are two conjugacy classes 2A and 2B of involutions in J4 . Using the character table in Atlas [9], we compute that the structure constant for the classes 2B, 2B, 29A is 1, and hence involutions in C29 : C28 are of type 2B. Now, the centralizer of an involution of type 2B has structure 211 : (M22 : 2). This subgroup has exactly 280831 involutions. Since 29 · 280831 << i2 (J4 ), there must exist at least one chiral polyhedron with automorphism group J4 . 6.3. Conway groups. A non-exhaustive computer search with Magma gives a chiral polyhedron of type {23, 23} for Co23 , one of type {14, 23} for Co2 and one of type {3, 60} for Co1 . 6.4. Fischer groups. The group F i′24 has Out = 2. In F i′24 , take σ of order 29. We have NAut(F i′24 ) (hσi) = C29 : C28 . This contains 29 involutions, all in F i′24 . These involutions belong to class 2B, and their centralizer C in F i24 satisfies i2 (C) = 5741695. Therefore i2 (C) · 29 << i2 (F i′24 ) and so F i′24 is the automorphism group of at least one chiral polyhedron. The group F i23 has Out = 1, and for an element σ of order 23, NF i23 (hσi) = C23 : C11 . This latter group does not contain any involutions. Moreover, there is obviously at least one involution that will, with σ, generate the whole of F i23 . Finally, a non-exhaustive computer search with Magma gives a chiral polyhedron of type {11, 13} for F i22 . 6.5. The Monster and the Baby Monster. The Monster M has Out = 1 and a unique class of maximal subgroups of order divisible by 71, namely subgroups L2 (71). Moreover, NL2 (71) (C71 ) = C71 : C35 , a group of odd order. Therefore, no element of order 71 in M is conjugate to its inverse. Take x of order 71 in M . The x is contained in a unique subgroup L2 (71) of M . Therefore, picking t an involution of M not in the L2 (71) containing hxi, we have ht, xi = M . The pair x, t satisfies (i)–(iii) of Theorem 1.1. The Baby Monster BM has Out = 1 and a unique class of maximal subgroups containing elements of order 47. Take x an element of order 47 in BM . We have NBM (hxi) = C47 : C23 . Any involution t of BM will give hx, ti = BM . The pair x, t satisfies (i)–(iii) of Theorem 1.1. 6.6. The remaining sporadics. The Thompson group T h has Out = 1, and for an element x of order 31, NT h (hxi) = C31 : C15 . This latter group 12 DIMITRI LEEMANS AND MARTIN W. LIEBECK does not contain any involutions. Moreover, there is obviously at least one involution that will, with x, generate the whole of T h. The Lyons group Ly has Out = 1 and a unique class of maximal subgroups of order divisible by 37, namely groups C37 : C18 . Moreover, Ly has a unique conjugacy class of involutions, and these have centralizers 2 · A11 . We have i2 (2 · A11 ) = 34650. Therefore i2 (2 · A11 ) · 37 << i2 (Ly) and Ly is the automorphism group of at least one chiral polyhedron. For the O’Nan group O ′ N , we refer to [8] where all possible types of chiral polyhedra for O′ N have been determined. Finally, a non-exhaustive computer search with Magma gives a chiral polyhedron of type {19, 20} for HN , one of type {5, 7} for He, one of type {14, 29} for Ru, one of type {13, 24} for Suz, one of type {11, 15} for M cL, and one of type {11, 6} for HS. This completes the proof of Theorem 1.1. 7. Concluding remarks It would be interesting to prove similar results to Theorem 1.1 and also that of Nuzhin described in the Introduction, for almost simple (rather than just simple) groups. Some results in this vein are known. For instance in [13], it is proved that every almost simple group G with socle Sz(q) is the automorphism group of at least one abstract chiral polyhedron. And in [20], it is shown that the only almost simple groups with socle L2 (q) that are not automorphism groups of abstract chiral polyhedra are L2 (q), P GL(2, q), and a group of the form L2 (9).2. 8. Acknowledgements This research was supported by a Marsden grant (UOA1218) of the Royal Society of New Zealand. References [1] M. Aschbacher and G.M. Seitz, Involutions in Chevalley groups over fields of even order, Nagoya Math. J. 63:1–91, 1976. [2] J. Bamberg and T. Penttila, Overgroups of cyclic Sylow subgroups of linear groups, Comm. in Algebra 36:2503–2543, 2008. [3] A. Bereczky, Maximal overgroups of Singer elements in classical groups, J. Algebra 234:187–206, 2000. [4] W. Bosma, J. Cannon, and C. Playoust. The Magma Algebra System. I. The User Language. J. Symbolic Comput., 24(3-4):235–265, 1997. [5] M. D. E. Conder. Generators for alternating and symmetric groups. J. London Math. Soc. (2), 22(1):75–86, 1980. [6] M. D. E. Conder. More on generators for alternating and symmetric groups. Quart. J. Math. Oxford Ser. (2), 32(126):137–163, 1981. [7] M. D. E. Conder, V. Hucı́ková, R. Nedela and J. Širáň. Chiral polyhedra of given hyperbolic type. Bull. Lond. Math. Soc., 48(1):38–52, 2016. [8] T. Connor and D. Leemans. Algorithmic enumeration of regular maps. Ars Math. Contemp. 10:211–222, 2016. CHIRAL POLYHEDRA AND FINITE SIMPLE GROUPS 13 [9] J.H. Conway, R.T. Curtis, S.P. Norton, R.A. Parker, and R.A. Wilson, Atlas of Finite Groups. Oxford U.P., 1985. [10] D. Gorenstein, R. Lyons and R. Solomon, The classification of the finite simple groups. Number 3. Part I. Chapter A. Almost simple K-groups. Mathematical Surveys and Monographs, 40.3. American Mathematical Society, Providence, RI, 1998. [11] R.M. Guralnick and W.M. Kantor, Probabilistic generation of finite simple groups, J. Algebra 234:743–792, 2000. [12] M.I. Hartley, I. Hubard and D. Leemans, Two atlases of abstract chiral polytopes for small groups. Ars Math. Contemp., 5(2):371–382, 2012. [13] I. Hubard, and D. Leemans. Chiral polytopes and Suzuki simple groups. In R. Connelly et al. (eds.), Rigidity and Symmetry, Fields Institute Communications 70:155– 175, 2014. [14] G. A. Jones. Ree groups and Riemann surfaces. J. Algebra, 165(1):41–62, 1994. [15] G. A. Jones. Automorphism groups of edge-transitive maps. Preprint, 2016. 62pp. [16] G. A. Jones and S. A. Silver. Suzuki groups and surfaces. J. London Math. Soc. (2), 48(1):117–125, 1993. [17] W.M. Kantor and Á. Seress, Prime power graphs for groups of Lie type, J. Algebra 247:370–434, 2002. [18] R. Lawther, M.W. Liebeck and G.M. Seitz. Fixed point ratios in actions of finite exceptional groups of Lie type. Pacific J. Math. 205:393–464, 2002. [19] D. Leemans and M. W. Liebeck, The non-existence of chiral polyhedra with automorphism group L3 (q) or U3 (q), in preparation. [20] D. Leemans and J. Moerenhout. Chiral polyhedra arising from almost simple groups with socle P SL(2, q). J. Algebraic Combin., to appear. [21] M.W. Liebeck and A. Shalev, Classical groups, probabilistic methods, and the (2, 3)generation problem, Annals of Math. 144:77–125, 1996. [22] A.M. Macbeath, Generators of the linear fractional groups. Number Theory (Proc. Sympos. Pure Math., Vol. XII, Houston, Tex., 1967) pp. 14–32 Amer. Math. Soc., Providence, R.I, 1969. [23] V. D. Mazurov. On the generation of sporadic simple groups by three involutions, two of which commute. Sibirsk. Mat. Zh., 44(1):193–198, 2003. [24] P. McMullen and E. Schulte, Abstract regular polytopes, volume 92 of Encyclopedia of Mathematics and its Applications. Cambridge University Press, Cambridge, 2002. [25] Y.N. Nuzhin, Generating triples of involutions of Chevalley groups over a finite field of characteristic 2, Algebra i Logika 29: 192–206, 1990. [26] Y.N. Nuzhin, Generating triples of involutions of alternating groups, Mat. Zametki 4:91–95, 1990. [27] Y.N. Nuzhin, Generating triples of involutions for Lie-type groups over a finite field of odd characteristic. I, Algebra i Logika 36:77–96, 1997. [28] Y.N. Nuzhin, Generating triples of involutions for Lie-type groups over a finite field of odd characteristic. II, Algebra i Logika 36:422–440, 1997. [29] E. Schulte and A.I. Weiss, Chiral polytopes. In Applied geometry and discrete mathematics, volume 4 of DIMACS Ser. Discrete Math. Theoret. Comput. Sci., pages 493–516. Amer. Math. Soc., Providence, RI, 1991. [30] G.M. Seitz, The root subgroups for maximal tori in finite groups of Lie type, Pacific J. Math. 106:153–244, 1983. [31] D. Singerman, Symmetries of Riemann surfaces with large automorphism group, Math. Ann. 210:17–32, 1974. [32] M. Suzuki, On a class of doubly transitive groups, Annals of Math. 75:105–145, 1962. 14 DIMITRI LEEMANS AND MARTIN W. LIEBECK Dimitri Leemans, University of Auckland, Department of Mathematics, Private Bag 92019, Auckland, New Zealand E-mail address: [email protected] Martin W. Liebeck, Department of Mathematics, Imperial College, London SW7 2AZ, UK E-mail address: [email protected]
4math.GR
ActiveMonitor: Non-blocking Monitor Executions for Increased Parallelism arXiv:1408.0818v1 [cs.DC] 4 Aug 2014 Wei-Lun Hung Himanshu Chauhan∗ Vijay K. Garg† The University of Texas at Austin {wlhung,himanshu}@utexas.edu [email protected] We present a set of novel ideas on design and implementation of monitor objects for multi-threaded programs. Our approach has two main goals: (a) increase parallelism in monitor objects and thus provide performance gains (shorter runtimes) for multi-threaded programs, and (b) introduce constructs that allow programmers to easily write monitor-based multi-threaded programs that can achieve these performance gains. We describe the concepts of our framework, called ActiveMonitor, and its prototype implementation using futures[11]. We evaluate its performance in terms of runtimes of multi-threaded programs on linked-list, bounded-buffer, and other fundamental problems implemented in Java. We compare the runtimes of our implementation against implementations using Java’s reentrant locks [29], recently proposed automatic signaling framework AutoSynch [23], and some other techniques from the literature. The results of of the evaluation indicate that monitors based on our framework provide significant gains in runtime performance in comparison to traditional monitors implemented using Java’s reentrant locks. 1 Introduction Monitors are the prevalent programming technique for synchronization between threads in sharedmemory parallel programs. They were designed [21] with two primary goals: (i) to ensure safety of shared data by enforcing mutual exclusion in critical sections, and (ii) to enable conditional synchronization using the wait-notify mechanism. Monitors ensure that while a thread is executing a critical section, other threads that cannot access the critical section wait for it to become available. Waiting threads are notified by some thread exiting the critical section. We argue that this monitor design has certain drawbacks: (a) For executions on multi-core CPUs, a thread’s update to the shared data may cause a cache invalidation for some other thread running on a different core, specially if the thread was waiting for the critical section. Thus, the penalty incurred due to cache misses would slow down the program on multi-core CPUs. (b) If threads do not require the result of their updates on shared data immediately after performing these updates, then the blocking executions of critical sections for these updates may become a bottleneck, and could reduce the program throughput. For example, consider a thread that inserts items in a linked-list. If this thread does not need the result of the insert operation then blocking insert operations lead to slower runtimes. ∗ Contact Author. Address: ACES 5.432, 201 E 24 Street, Austin, Texas, USA Supported in part by the NSF Grants CNS-1346245, CNS-1115808, and Cullen Trust for Higher Education Endowed Professorship † 1 In this paper, we focus on monitors methods that perform updates on shared data. Thus, the solution of using Read/Write locks [29] is not applicable. Observe that the design of monitors to enforce blocking executions was envisioned in 1970’s when processors were single-core, processing power was scarce and saving processor cycles was a primary concern for programmers. Under these settings, making the critical section executions blocking was not a performance issue. The current situation is drastically different: not only multi-core processors are now ubiquitous, but they are also significantly cheaper and faster. Therefore, it is important to explore alternate design and implementation of monitors to exploit the availability of multi-core processors. Given that the blocking executions of monitor methods seem to form a bottleneck for performance, we pose the following question: can monitor design and implementation be altered to allow non-blocking executions and thus improve the throughput of conditionally synchronized multi-threaded programs on multi-core machines? The motivation here is that non-blocking executions can increase parallelism by allowing more instructions to be executed in fixed time from the perspective of the thread(s). For this purpose, we propose two novel techniques: 1. A monitor object is instantiated as a thread, and invocation of monitor methods by application (worker) threads is replaced by submissions of equivalent tasks to the monitor thread. The monitor thread assumes the responsibility of executing these tasks and returning the result (if required) to the application threads. 2. The monitor methods, replaced by tasks in representation, can be executed in non-blocking manner. The non-blocking executions are explicitly indicated in the code. These two changes together tackle the drawbacks discussed above. Under our proposed design, the worker threads do not directly access the shared data, only monitor thread does, which helps in improving the data cache locality; and non-blocking executions reduce runtime due to parallelism. This paper presents our experience with design and implementation of these ideas. We propose a framework, called ActiveMonitor, that explores non-blocking executions of monitor methods — possibly at the expense of cheap and abundant processor and memory resources. Fig. 1 compares the implementation of a bounded-buffer monitor written using: (a) Java’s Reentrant locks [29], and (b) our proposed framework and its constructs. We propose two new keywords: activemonitor and nonblocking. The activemonitor keyword, in class declaration at line 1 of Fig. 1(b), is used to declare that this bounded-buffer is implemented as an ‘active’ monitor object, that is: it would exist as an independent thread. The nonblocking keyword in the method signature of put(), at line 6, indicates that the execution of this method can be non-blocking. As our experiments show (Section 4), this implementation provides ∼ 33% faster runtime in comparison to the conventional implementation of Fig. 1(a). Lastly, our implementation is shorter, cleaner, and more intuitive. This is because we use the waituntil construct (at lines 9,15 in Fig. 1(b)) that provides implicit/automatic signaling mechanism for threads [23]. This keyword and the automatic signaling1 is not a contribution of this paper; we merely use it in our framework’s implementation to exploit the performance benefits it provides. An immediate criticism of our approach is the need for additional resources for its realization. Creating a new thread for a monitor object consumes additional memory in the form of its stack allocation, as well as increases the demand for CPU time slices. However, it is well known that the processing power of the modern multi-core CPUs remains commonly under utilized2 . Additionally, with the trends of ever increasing data and computation size, most users tend to favor faster runtimes even at the cost of somewhat increased consumption of processor and memory resources. Our approach provides much faster runtimes for many multi-threaded use cases. In addition, we claim that with careful resource 1 Appendix A briefly covers the automatic signaling mechanism we collected resource usage data, at 10 min. intervals, of Stampede [1] supercomputer over a period of three days. The mean CPU idle time was 86%. 2 2 (a) Conventional Java Implementation return x; 30 } 31 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 class BoundedBuffer<V> { V[] items; int putPtr, takePtr, item_count, size; Lock mutex = new ReentrantLock(); Condition notFull = mutex.newCondition(); Condition notEmpty = mutex.newCondition(); public BoundedBuffer(int size) { this.size = size; items = new Object[size]; } void put(V item) { mutex.lock(); while (item_count == size) notFull.await(); items [putPtr++] = item; putPtr = putPtr % size; ++item_count; notEmpty.signal(); mutex.unlock(); } V take() { mutex.lock(); while (item_count == 0) notEmpty.await(); V x = items [takePtr++]; takePtr = takePtr % size; --item_count; notFull.signal(); mutex.unlock(); 32 } (b) ActiveMonitor Implementation 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 activemonitor class BoundedBuffer<V> { V[] items; int putPtr, takePtr, item_count, size; public BoundedBuffer(int size) { this.size = size; items = new V[size]; } nonblocking void put(V item) { waituntil(item_count < size); items [putPtr++] = item; putPtr = putPtr % size; ++item_count; } V take() { waituntil(item_count > 0); V x = items [takePtr++]; takePtr = takePtr % size; --item_count; return x; } } Figure 1: Comparsion of Bounded-Buffer programs written using (a) Java’s locks and (b) our approach management by the means of a dynamic thread creation policy that considers the processor/memory utilization, coupled with the automatic thread signaling mechanism [23], our approach’s performance improvements come at an acceptable cost of additional CPU and memory usage. In short, the key contributions of this paper are following: • we propose a new monitor design, based on two new keywords: activemonitor and nonblocking, that facilitates non-blocking executions of data updates within their critical sections. We describe the concepts required for this design’s implementation in Java. • we define rules to ensure correctness in presence of non-blocking operations, and show that with our proposed design, despite additional concurrent executions, the executions are linearizable [20] as per their non-blocking interpretation. • we evaluate the runtimes of some fundamental multi-threaded problems using our prototype implementation and Java’s Reentrant locks [29]. For majority of these problems, our design and implementation provides ∼ 30 − 40% faster runtimes in comparison to reentrant locks. The rest of this paper is organized as follows. Section 2 briefly covers the background concepts. Section 3 discusses the key concepts of the framework and correctness of executions. Section 4 presents experimental evaluation of our approach. We discuss some limitations of our approach, and future work in Section 5. Section 6 presents the related work, and Section 7 offers concluding remarks. 3 2 Background We use the concept of futures [11] to achieve non-blocking executions of critical sections. Futures: Futures [11] were proposed as a mechanism to facilitate task submissions (to threads) in shared memory parallel programs. In a task submission based model some threads, called executors, provide task execution as a service. Under this model, a thread makes an asynchronous call to some executor thread, and a future object is returned to the caller thread as a pointer to the computation and its possible result. The executor thread performs a task for the caller thread, and updates the returned future object with the result of the computation of the task. The caller thread can collect the result by evaluating the future. Evaluation of a future, i.e. the collection of the result, is performed by invoking a blocking method on the future object. Hence, if needed the thread would have to wait for the task computation to complete. In our framework, we use futures to realize non-blocking executions of monitor methods by treating method invocations as task submissions. Blocking and Non-Blocking methods: By design, methods provided by monitor objects are usually blocking (synchronous). If a thread invokes a blocking method m, then the thread can not execute its next instruction until it has exited m; whether by normally returning from the method or exiting the method due to an exception. Whereas, if a thread invokes a non-blocking method m′ then it would be able to execute its next instruction immediately after, while the non-blocking method is being executed in parallel, possibly by another thread. 3 ActiveMonitor Concepts In this section, we discuss the key concepts of the ActiveMonitor framework. The relevant implementation details are presented in Appendix D. We first explain our approach using the bounded-buffer monitor of Fig. 1(b). Observe that apart from using the implicit-signal construct of waituntil, the code uses two additional keywords that we propose: activemonitor and nonblocking. By including the activemonitor keyword in the declaration (eg. line 1), the programmer indicates that this monitor is an ‘active’ object, i.e. it should be instantiated as a thread. However, if there are many monitor objects in a user’s program we limit the number of monitor threads — this is an implementation detail, and discussed in Appendix D.2. In the conventional monitor design, worker threads, i.e. threads explicitly created by the user program, execute the instructions of the critical section and update the data protected by the monitor. In contrast, as per our design, once the monitor is instantiated as a thread, it executes its own critical sections on behalf of worker threads. For this, at compile time method calls made to the monitor are treated as task submissions to the monitor thread. Thus, for the program in Fig. 1b, a producer thread’s call to the put method, as well as a consumer thread’s call to the take method, are converted to submission of equivalent tasks to the monitor thread by our framework. The worker threads now have the option to perform blocking (synchronous) or non-blocking (asynchronous) executions of monitor methods. Asynchronous executions are made possible by using our second keyword proposal, nonblocking, that allows for non-blocking (asynchronous) execution of instructions of the method using this keyword. We first describe how monitor tasks are generated from monitor methods, and then discuss their asynchronous or synchronous executions. 3.1 Monitor Tasks In our framework, every monitor method call corresponds to an equivalent task. At compile-time, invocations of monitor methods by worker threads are replaced by submissions of the equivalent tasks to the monitor thread. 4 Definition 1 (Monitor Task). A monitor task t consists of a boolean predicate P and a set of statements S. If the precondition defined by P is true then t is ‘executable’ and statements in S can be executed to complete t. Otherwise, t is ‘unexecutable’. Observe that the syntax of a monitor task is similar to that of a guarded command [8]. Consider the put method (lines 8 − 13) of the bounded-buffer in Fig. 1b. For this monitor method, the equivalent monitor task T is defined by the code of lines 9−12. Here, the precondition P is (itemCount < buffer_size); and it checks if the buffer has any space to insert the item. If this condition is false, the waituntil construct ensures that any thread trying to complete this task has to wait unless the buffer is not full. Lines 10 and 11 together form the set of statements S. As indicated by the nonblocking keyword in the method signature at line 8, the generated task would be submitted for a non-blocking execution to the monitor thread. Removal of this keyword from the method signature makes the execution blocking. The details of compile time generation of tasks for monitor method calls are in Appendix D.1. Appendix B discusses some special cases of monitor tasks. Our current prototype cannot convert some particular types of monitor methods to equivalent tasks – for example, methods with waituntil not at the beginning of the critical section, or waituntil in a conditional branch. They are also discussed in Appendix D.1. 3.2 Monitor Tasks: Execution and Correctness Guarantees In the ActiveMonitor framework, monitor threads are responsible for executing monitor tasks. Based on the availability of resources, the framework tries to create one thread per monitor object. The implementation details for limiting the monitor thread count are in Appendix D.2. Monitor threads execute monitor tasks while observing the following rules. Rule 1 (Mutex Invariant). All the tasks of a single monitor object are executed by the same monitor thread. Thus, Rule 1 maintains the mutual exclusion of critical sections of a monitor. However, for correctness of executions, we require additional rules. Let proc(t) denote the thread that submits the task t to the a monitor; sub(t) be the time at which the task t is submitted to the monitor, and exe(t) indicate the time when the monitor thread starts executing t. Rule 2. For a pair of tasks s and t submitted to a monitor M , if proc(s) = proc(t), then sub(s) < sub(t) ⇒ exe(s) < exe(t). Rule 3. Let n1 , m2 be two successive method invocations by a worker thread on two different monitors M1 and M2 in the user program, and let t1 , t2 be the corresponding task submissions at runtime. Then, at runtime t1 must be completed before t2 ’s submission. The notions of method invocation and response used to define linearizability [20] need a different interpretation under non-blocking executions. In short, invocation now corresponds to submission of the equivalent task to monitor thread, and response corresponds to this tasks completion. With this interpretation, the following result establishes correctness of executions by proving linearizable executions. Lemma 1. With rules 1, 2, and 3 we get an execution that is equivalent to a lock-based execution. Proof. Sketched in Appendix C.1. Observe that Rule 3 forces a worker thread to wait for the previous task to finish even if that task was on a different monitor object. In many applications, a programmer may not require this constraint 5 on different monitor objects. Hence, to improve performance, we can drop Rule 3 for such applications. We show that the execution is still linearizable with the new interpretation of invocation and response. Note that in the standard model of concurrent history [20], the thread history is always sequential although the object history may not be sequential. In our model, due to non-blocking executions, we have the dual property: an object history is always sequential whereas a thread history may not be so. We first define the thread order in presence of non-blocking operations. Let s1 , s2 , ..., sm be m operations performed on a monitor object by a worker thread. Let si < sj denote that si was executed before sj . In the standard model, all operations are blocking and we get that si < si+1 for all i. In our model, we define the order as follows. If si is blocking, then si < sj for all j > i. If si and sj are operations on the same object and i < j, then si < sj . If si is non-blocking and the result of si is required before sk , then si < sj for all j ≥ k. Lemma 2. With Rules 1 and 2, we get an execution that is linearizable. Proof. Sketched in Appendix C.2. Observe that the legal sequential history we get may not preserve the order of invocation of operations, but only the thread order. 4 Evaluation We now present the experimental evaluation of our proposed approach. We evaluate our prototype implementation on five multi-threaded problems. The first problem is a bounded-buffer problem with multiple producers and consumers, the second is a sorted linked-list (of integers) on which threads perform updates. The remaining three are conditional synchronization problems involving varying levels of complexity in their conditional predicates. We implemented the problems using the ActiveMonitor framework, Java’s reentrant locks, and AutoSynch [23]. Additional use-case specific implementations (details given in problem descriptions below) are also compared for bounded-buffer, and the linked-list problem. For all the problems, we use a benchmark in which each worker thread performs 512000 operations on shared data protected by monitors. All the experiments are conducted on a machine with 1 socket, 2 AMD Opteron 6180 SE 12 Core, 2.5 GHz CPUs (= 24 hardware threads) and 64 GBs memory running Linux 2.6.18. We vary the number of worker threads, and measure the time required for all of them to complete their operations. All threads perform a fixed number of warm-up operations on shared data before starting the time measurements. For each problem, we measure runtimes for 25 runs, and report the mean values after removing the highest and the lowest values. For all the experiments, we restrict the ActiveMonitor framework to create only one monitor thread. We now discuss the setup of experiments and their results in a problem specific manner. Across all results, we denote the implementation techniques with the following notation: LK: Reentrant locks, AS: AutoSynch[23], AM: ActiveMonitor (this paper). For each problem, all the runtimes reported in their results exhibit negligible variance (< 5% of the mean value) across runs. 4.1 Bounded-Buffer (BB) problem [6, 7] Setup: Items are plain Java objects. Every producer’s put invocation is non-blocking, and every consumer’s take is blocking. We also compare runtimes of Java’s ArrayBlockingQueue [29], denoted by ABQ, based implementation. Number of producers (= number of consumers) is varied from 2 to 24. We perform three types of experiments, and measure: (a) runtimes wieh varying number of threads for a buffer of fixed size (=4). (b) runtimes with varying buffer-size for fixed number of producers/consumers (=16 each). (c) runtimes with varying limit on non-blocking tasks allowed on the buffer of size 4 with 16 producers and consumers each. 6 Runtime(secs) 8 7 6 5 4 3 2 1 0 AM ABQ LK AS 2 4 8 16 # of Producers (= Consumers) (a) Buffer size = 4 18 16 14 12 10 8 6 4 2 0 LK AS AM ABQ 1 2 4 8 16 32 64 128 256 8 7 6 5 4 3 2 1 0 Buffer size (b) Varying buffer size Queue size = x Blocking Unbounded Queue 5 10 15 20 25 30 35 40 45 50 Size of task queue (c) Varying queue size for tasks Figure 2: Runtimes for Bounded-Buffer problem Results Collective results are shown in Fig. 2. Fig. 2a plots the runtimes for experiment (a). Fig. 2b shows the runtimes for experiment (b). This result highlights the benefits of non-blocking executions. Recall that only put calls are non-blocking for AM; all take calls are blocking. For small size buffers, LK, AS, and ABQ are much slower in comparison to AM due to their blocking insert operations. For larger buffer sizes, LK and ABQ implementations perform slightly faster than AM. On larger buffer sizes, the frequency of threads getting blocked out is much lower, and both LK and ABQ benefit from greedy implementation of Java in lock acquisition; but AM ends up performing slightly more work in enforcing order on tasks (as per Rules 1,2). Fig. 2c shows the results for experiment (c). ‘Limit’ on the size of task queue means that whenever the queue maintained by the monitor thread to store tasks, reaches the ‘limit’ value then even a nonblocking task submission to the monitor is force to block. Making all the invocations blocking (queue size limit = 0) leads to an overall runtime (for completion) of ∼ 5 seconds, whereas with no limit on the size of task queue the runtime is ∼ 3 seconds. This observations clearly shows that our non-blocking task based approach is beneficial. However, an unbounded task queue might grow quite large. But as shown by the plot, even for a short limit (around 20) on the size of this queue, the runtime performance converges to optimal performance (of unbounded size). Thus, this result establishes that only a small number of non-blocking tasks can provide significant performance benefit. 4.2 Sorted Linked-List (SLL) Problem Setup: A linked-list of integers sorted in non-decreasing order. The number of worker threads is varied from 2 to 24. The list is pre-populated with 5000 integers. Each worker thread inserts or removes (with equal probability) a random integer. For a fair comparison, seeds are used for randomization so that the threads generate the same sequence of random integers across runs as well as across different monitor implementations. We make every thread execute some local instructions, simple mathematical computations, outside the critical section between any successive calls on the monitor. This is done in attempt to simulate some practical program behavior in which generation of data takes some time3 . Both insert and remove operations are non-blocking. Additional techniques used for performance comparison: lock-free implementation (LF) [18, 13, 32], fine-grained locking (FG) [18], and transactional memory (TM) implementation in Java [28]. We measured runtimes for two types of experiments: (a) runtimes with varying number of threads, when each thread performed 250 mathematical computations 3 Moreover, The results for the BB problem already showed that we perform better than conventional monitors for saturation tests. 7 LK AS AM LF FG TM 2 4 8 16 LK Runtime/AM Runtime Runtime(secs) 18 16 14 12 10 8 6 4 2 0 2T 1.4 4T 8T 16T 24T 1.3 1.2 1.1 1 0.9 0 # of Threads 200 400 600 800 1000 # of Operations outside CS (a) Runtimes for experiment (a) (b) Runtime ratio with varying number of operations outside CS Figure 3: Results for sorted linked-list problem (integer additions) outside the critical section between successive calls to the monitor. (b) runtimes with varying number of threads and varying number of operations performed outside the critical section. Results Fig. 3a shows the results for experiment (a). For this experiment, the ActiveMonitor implementation (AM) clearly outperforms the reentrant lock based monitor (LK), and AutoSynch (AS). However, lock-free (LF) and transactional memory (TM) based implementations perform better. This is because both of them use optimized algorithm for the linked-list data structure. Whereas, we do not use any linked-list specific optimization, and only use non-blocking executions on critical sections. Fig. 3b plots the ratio of runtimes using LK implementation and AM implementations for experiment (b). The ratio with no operations outside the critical section is close to 1, i.e. our approach provides no performance benefit. This is expected because no operations can be performed concurrently with the non-blocking updates to the list, and the opportunity of parallelism is effectively absent. As the number of operations outside the critical section is increased, we see significant performance gains with our approach, upto ∼ 30%, due to increased parallelism introduced by non-blocking executions. 4.3 Conditional Synchronization Problems We used three thread synchronization problems that involve different levels of complexity in their conditional predicates. For all three, we measured the time taken for all the worker threads to complete the designated number (512000) of operations on the monitor. Round-Robin (RR) Access: Every worker thread accesses the monitor in round-robin order. All operations on the monitor are non-blocking. The number of worker threads is varied from 2 to 24. Parametrized Bounded-Buffer (PBB) [6, 7]: Producers put a collection of items into a shared buffer, while consumers remove a number of items from the buffer. For producers, the number of items to be inserted, and for consumers, the count of items to be removed, both are randomly decided at runtime. Similar to the SLL problem, seeds are used for randomization for fair evaluation across implementations. The number of producers (= number of consumers) is varied from 2 to 24. Ticketed-Readers/Writers (TRR) [4, 3, 12]: A ticket is used to maintain the access order for readers and writers [3]. Every reader/ writer gets a ticket number indicating its arrival order. Readers/writers wait on the monitor for their turn. On their turn, they enter the monitor but do not 8 7 LK AS AM AS LK AM LK AS AM Runtime(secs) 6 5 4 3 2 1 0 2 4 8 16 2 # of Threads (a) Round-robin problem 4 8 16 # of Consumers (b) Parametrized bounded-buffer 2/10 4/20 8/40 16/80 24/120 # of Writers/Readers (c) Ticketed r/w problem Figure 4: Runtimes for RR, PBB, and TR/W problems: all plots have the same range on y-axis perform any computation inside the monitor, and immediately exit. Operations for arrival on monitor and waiting for turn to access the monitor are blocking, whereas operations after getting access to critical sections are non-blocking. The number of writer threads is varied from 2 to 24. The number of readers is kept 5 x the number of writers. Results Fig. 4 presents the runtimes of LK, AS, and AM based implementations for the three problems. For the RR problem, the performance of AM is 6 and 5 times faster than that of AS, and LK, respectively. This is due to better cache locality and fewer context switches. For this problem, after accessing the critical section, every thread is forced to wait unless all other threads have accessed the critical section. This constraint leads to poor cache locality and more context switches for conventional monitor design. However, in our approach, the monitor thread continuously executes all monitor accesses for each thread; therefore, there is minimal number of context switches between each monitor method invocation and that results in excellent cache locality. For the TR/W problems, AM performs poorly in comparison to LK. This is primarily due to the nature of the problem and its underlying implementation requirements. The problem requires conditional synchronization in the middle of the method calls, and thus our task based approach has to create two tasks per method call. In fact, any family of problems with such characteristics would lead to much higher number of tasks than the actual method calls. 4.4 CPU and Memory Consumption Table 1 presents the results on the CPU and memory usage by LK, AS, and AM for all the evaluated problems. For each problem, the CPU ratio stands for the ratio of an implementation’s mean (across runs) CPU consumption and mean (across runs) CPU consumption of LK implementation. As per memory usage, we report the maximum memory (in MBs) consumed across any of the runs performed by the implementations for each problem. As expected, our approach consumes more CPU resources. However, the maximum memory consumed by our approach is only incrementally larger than that of Java’s reentrant lock based approach. Thus, we have backed our claim that with careful resource management the cost for the performance benefit is relatively small. 5 Discussion & Future Work The benefits of our approach are manifold: improved runtime performance, better control over desired program behavior, and increased opportunities for applying optimizations such as execution re-ordering, 9 Problem Approach CPU Ratio Max Mem. BB SLL RR PBB TR/W LK AS AM LK AS AM LK AS AM LK AS AM LK AS AM 1.00 196 1.11 236 1.95 197 1.00 135 0.86 135 3.49 145 1.00 236 1.10 224 2.97 250 1.00 196 2.39 227 2.47 251 1.00 211 1.23 232 1.24 244 Table 1: CPU and memory consumption with Reentrant locks (LK), AutoSynch (AS), and ActiveMonitor (AM). operation combining, etc. However, some aspects of our framework are open to criticism. First and foremost, based on the design assumptions as well as the experimental results, it is evident that at present, our approach does not suit systems on which processor and memory resources are scarce. Even though our evaluation results indicate slightly increased memory consumption, the increase in CPU consumption is more drastic. Hence, an important future work is an improved implementation of our framework that lowers the CPU usage. Another future work is to address the issue of task generation for problems that require conditional synchronization in the middle of the method call, eg. Ticket-R/W, and causes large number of tasks to be created. It is important to note that our approach extends conventional multi-threaded programs and their constructs, and thus provides a programmer the choice of an implementation she thinks is most suited for her needs. We showed that we provide linearlizability of executions — interpreted under the non-blocking execution model. Although it is desirable in most of the cases, there are situations when this requirements can be relaxed to certain extents for even faster performance. Such relaxations are very much dependent on the use-cases and the expectations of the programmer. As shown by Kogan et al. in [25], having ‘weak’ consistency requirements could lead to significant performance gains. In fact, for specific use-cases programmers may only need eventual consistency [37], which requires that any update to shared data is eventually committed, in their programs. However, allowing weak or eventual consistency is not possible for all use-cases. For example, consider multi-threaded implementations (in shared memory model) of Dijkstra’s single-source-shortest-path algorithm [5, 31]. Weak or eventual consistency based implementations for this algorithm cannot guarantee correct results. However, for a large number of problems, approximate solutions are good enough, and their parallel implementations exhibit significant gains in performance. Thus, this opens up two interesting future problems for our work. First of them is evaluating performance of our non-blocking execution approach for problems that admit approximate solutions, and the second is to extend our evaluation to the weak consistency model of [25]. When it comes to evaluating the performance of our proposed design and its implementation, the exploration space is large. Not only there is a large number of problems related to multi-threaded updates on data structures, but the set of parameters that affect the runtime for these problems is also large. We also plan to perform experiments by varying more parameters such as load distributions of methods, size of shared data, etc. Another key experiment is to analyze the cache locality of our approach — in terms of cache miss rates per operation and per instruction — for different experiments, and comparing it to cache locality achieved by other techniques. Lastly, note that our current implementation does not use ideas such as operation combining [15], execution re-ordering, and batch updates [25]. Intuitively, incorporating these strategies in our implementation could lead to even better results than those observed in this paper. 6 Related Work The idea of having monitor objects execute as independent threads is not completely novel. Hoare proposed a similar mechanism, in which all objects are active, of communicating sequential processes (CSP) in [22] long ago. However, the proposal was a formal language for interactions between processes. 10 Its constructs are still mostly used for formal analysis. Our work focuses on making parallel programs faster by using futures to provide selective non-blocking executions on monitor methods. Research efforts to increase parallelism in programs have been continuous almost since the advent of computing. With the arrival of multi-core processors, improving multi-threaded programming with syntactic changes, as well as with novel designs of data structures and algorithms, has been the focus of many research efforts in the last decade. Transactional memory [17, 34] is a well-known research effort that proposes modified syntax for ease of writing multi-threaded programs. The prominent contributions in algorithmic direction are: lock-free data structures [13, 32, 16], and wait-free data structures [26, 27, 36]. Some other research efforts have explored increased parallelism for data structures by operation re-ordering and combining complementary operations (insert and remove) [14]. Transactional memory [17, 34] introduced an elegant and much needed design for writing multithreaded programs on shared memory. The promising feature in transactional memory proposal was to provide simplified syntax that guarantees correctness, and delegates the handling of mutual exclusion to the library providing the implementation. Our approach and ideology is similar on these goals. However, constructs for conditional waiting under transactional memory are limited [35, 30, 9]. Hence, writing many conditional synchronization based multi-threaded programs is rather difficult. Also, unlike transactional memory, our approach merely transfers the responsibility of data manipulation to a single monitor thread and does not require any complicated rollback mechanism for resolving conflicting updates on the shared data. Designing lock-free and wait-free algorithms is a challenging problem for any use-case. In addition, lock-free and wait-free implementations are currently available for a small set of data structures [10, 19]. Even though there is a lot of ongoing research to grow this set, the growth is slow. By using our approach, the end user benefits by an additional level of abstraction and does not have to deal with the complications involved in understanding and correctly implementing wait-free and lock-free algorithms. We use the concept of futures [11, 29] to realize the idea of non-blocking/asynchronous executions. The work by Kogan et al. [25] is similar to our approach, and makes use of futures for non-blocking executions. However, there are few key differences between our work and [25]. We explore changes to the paradigm of monitors, especially for conditional synchronization problems, whereas [25] focuses on throughputs, under saturation scenarios, of data structures such as stacks, queues, and linked-lists. Hence, our approach provides a more generic tool for performing safe updates and synchronization between threads. Frameworks such as Legion [2] and Galois [33] focus on improving runtime performance of parallel programs on scientific simulations and large graphs, respectively. Thus, they do not directly relate to thread synchronization and notification based use-cases such as bounded-buffer. Secondly, both of these libraries require advanced skills and familiarity with the features and syntactic details exposed by the libraries. Hence, the performance gains achieved by using them are highly correlated with a programmer’s knowledge of the involved optimization parameters needed to tweak the executions for optimal performance. 7 Conclusion Proposing changes to a well established programming paradigm is an ambitious goal. Moreover, convincing programmers to adopt a new programming framework in favor of the conventional one, usually requires the proposed approach to offer gains in terms of runtime performance as well as programming ease/productivity. The ActiveMonitor framework is a step in this direction. In almost all of the problems used in our evaluation, monitors with non-blocking executions outperform Java’s reentrant lock based monitors. Additionally, this gain is achieved by a simple mechanism of using only two new 11 keywords in existing Java programs. At present, our prototype implementation is costly in terms of processor usage. However, with the ubiquity of multi-core processors, optimized implementations of our proposed technique could lead to significant advantages at reduced costs. In this paper, our initial exploration in a new direction, that is: non-blocking executions on monitors, has showed promising results. We hope that with further research in this direction, our approach would lead to even stronger results. References [1] Texas advanced computing center stampede. https://www.tacc.utexas.edu/stampede/. [2] M. Bauer, S. Treichler, E. Slaughter, and A. Aiken. Legion: Expressing locality and independence with logical regions. In Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, SC ’12, pages 66:1–66:11, Los Alamitos, CA, USA, 2012. IEEE Computer Society Press. [3] P. A. Buhr and A. S. Harji. Implicit-Signal Monitors. ACM Transactions on Programming Languages and Systems, 27(6):1270–1343, Nov. 2005. [4] P. J. Courtois, F. Heymans, and D. L. Parnas. Concurrent control with “readers” and “writers”. Communications of the ACM, 14(10):667–668, 1971. [5] E. W. Dijkstra. A note on two problems in connexion with graphs. Numerische Mathematik, 1(1):269–271, 1959. [6] E. W. Dijkstra. Cooperating Sequential Processes, Technical Report EWD-123. Technical report, 1965. [7] E. W. Dijkstra. Hierarchical ordering of sequential processes. Acta Informatica, 1(2):115–138, 1971. [8] E. W. Dijkstra. Guarded commands, nondeterminacy and formal derivation of programs. Communications of the ACM, 18(8):453–457, Aug. 1975. [9] P. Dudnik and M. Swift. Condition variables and transactional memory: Problem or opportunity? In The 4th ACM SIGPLAN Workshop on Transactional Computing, 2009. [10] F. Fich, D. Hendler, and N. Shavit. On the inherent weakness of conditional synchronization primitives. In Proceedings of the Twenty-third Annual ACM Symposium on Principles of Distributed Computing, PODC ’04, pages 80–87, New York, NY, USA, 2004. ACM. [11] R. H. Halstead. Multilisp: A language for concurrent symbolic computation. ACM Trans. Program. Lang. Syst., 7(4):501–538, Oct. 1985. [12] P. B. Hansen. Structured Multiprogramming. Communications of the ACM, 15(7):574–578, 1972. [13] T. L. Harris. A Pragmatic Implementation of Non-blocking Linked-Lists. In Proceedings of the 15th International Conference on Distributed Computing, pages 300–314, London, UK, UK, 2001. Springer-Verlag. [14] S. Heller, M. Herlihy, V. Luchangco, M. Moir, W. I. Scherer, and N. Shavit. A Lazy Concurrent List-Based Set Algorithm. In J. Anderson, G. Prencipe, and R. Wattenhofer, editors, Principles of Distributed Systems, pages 3–16. Springer Berlin Heidelberg, 2006. 12 [15] D. Hendler, I. Incze, N. Shavit, and M. Tzafrir. Flat Combining and the Synchronizationparallelism Tradeoff. In Proceedings of the Twenty-second Annual ACM Symposium on Parallelism in Algorithms and Architectures, pages 355–364, New York, NY, USA, 2010. ACM. [16] D. Hendler, N. Shavit, and L. Yerushalmi. A scalable lock-free stack algorithm. In Proceedings of the Sixteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures, SPAA ’04, pages 206–215, New York, NY, USA, 2004. ACM. [17] M. Herlihy and J. E. B. Moss. Transactional memory: Architectural support for lock-free data structures. In Proceedings of the 20th Annual International Symposium on Computer Architecture, ISCA ’93, pages 289–300, New York, NY, USA, 1993. ACM. [18] M. Herlihy and N. Shavit. The Art of Multiprocessor Programming. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2008. [19] M. P. Herlihy. Impossibility and universality results for wait-free synchronization. In Proceedings of the Seventh Annual ACM Symposium on Principles of Distributed Computing, PODC ’88, pages 276–290, New York, NY, USA, 1988. ACM. [20] M. P. Herlihy and J. M. Wing. Linearizability: A Correctness Condition for Concurrent Objects. ACM Transactions on Programming Languages and Systems, 12(3):463–492, 1990. [21] C. A. R. Hoare. Monitors: An Operating System Structuring Concept. Communications of the ACM, 17(10):549–557, 1974. [22] C. A. R. Hoare. Communicating sequential processes, volume 178. Prentice-hall Englewood Cliffs, 1985. [23] W.-L. Hung and V. K. Garg. AutoSynch: An Automatic-signal Monitor Based on Predicate Tagging. In PLDI, pages 253–262, 2013. [24] V. Kodaganallur. Incorporating Language Processing into Java Applications: A JavaCC Tutorial. IEEE Softw., 21(4):70–77, 2004. [25] A. Kogan and M. Herlihy. The future(s) of shared data structures. In PODC, 2014. [26] A. Kogan and E. Petrank. Wait-free queues with multiple enqueuers and dequeuers. In Proceedings of the 16th ACM Symposium on Principles and Practice of Parallel Programming, PPoPP ’11, pages 223–234, New York, NY, USA, 2011. ACM. [27] A. Kogan and E. Petrank. A methodology for creating fast wait-free data structures. In Proceedings of the 17th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPoPP ’12, pages 141–150, New York, NY, USA, 2012. ACM. [28] G. Korland, N. Shavit, and P. Felber. Noninvasive concurrency with Java STM. In MultiProg 2010: Third Workshop on Programmability Issues for Multi-Core Computers, 2010. [29] D. Lea. The Java.Util.Concurrent Synchronizer Framework. Sci. Comput. Program., 58(3):293– 309, 2005. [30] V. Luchangco and V. J. Marathe. Revisiting condition variables and transactions. In The 6th ACM SIGPLAN Workshop on Transactional Computing, 2011. [31] U. Meyer and P. Sanders. δ-stepping: A parallelizable shortest path algorithm. J. Algorithms, 49(1):114–152, Oct. 2003. 13 [32] M. M. Michael. High Performance Dynamic Lock-free Hash Tables and List-based Sets. In Proceedings of the Fourteenth Annual ACM Symposium on Parallel Algorithms and Architectures, pages 73–82, New York, NY, USA, 2002. ACM. [33] K. Pingali, D. Nguyen, M. Kulkarni, M. Burtscher, M. A. Hassaan, R. Kaleem, T.-H. Lee, A. Lenharth, R. Manevich, M. Méndez-Lojo, D. Prountzos, and X. Sui. The Tao of Parallelism in Algorithms. In Proceedings of the 32Nd ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 12–25, New York, NY, USA, 2011. ACM. [34] N. Shavit and D. Touitou. Software transactional memory. In Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, PODC ’95, pages 204–213, New York, NY, USA, 1995. ACM. [35] A. Skyrme and N. Rodriguez. From locks to transactional memory: Lessons learned from porting a real-world application. In The 8th ACM SIGPLAN Workshop on Transactional Computing, 2013. [36] S. Timnat, A. Braginsky, A. Kogan, and E. Petrank. Wait-free linked-lists. In Proceedings of the 17th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPoPP ’12, pages 309–310, New York, NY, USA, 2012. ACM. [37] W. Vogels. Eventually Consistent. Communications of the ACM, 52(1):40–44, 2009. Appendix A Implicit/Automatic signal monitors: Monitors can be divided into two categories according to the different implementations of conditional synchronization: explicit-signal monitors and implicit-signal monitors [3]. In explicit-signal monitors, condition variables are used along with wait, and notfiy/notifyAll statements for conditional synchronization between threads. Programmers need to associate assertions with condition variables manually. When a thread wants to execute a set of instructions under a critical section, it first checks some condition variable(s), and waits if the predicate is not true. Once a thread enters the waiting state, another thread on detecting that the conditional predicate has become true, explicitly notifies the waiting thread. The bounded-buffer implementation in Fig. 1(a) that uses Java’s reentrant locks is an explicit-signal monitor. In fact, almost all of the prevalent programming languages, including Java, use the explicit-signal design for monitors. Implicit-signal monitors, also called automatic-signal monitors, require the underlying system to handle thread synchronization and wait/notification. Recently, Hung et al. [23] showed that implicitsignal monitors can be beneficial when implemented on modern multi-core processors. In an implicitsignal design, programmers need to use waituntil statements (line 9, 15 in automatic-signal program in Fig. 1(b)) instead of condition variables for synchronization. In this monitor design, a thread will wait as long as the condition of a waituntil statement is false, and execute the remaining instructions only after the condition becomes true. The responsibility of identifying a waiting thread to signal, and then signaling it, is that of the underlying system/framework rather than of the program logic explicitly put in the thread by a programmer. The details of design and implementations of such monitors is beyond the scope of this paper, and we refer the interested reader to [21, 23]. 14 B Monitor Task Examples Here, we highlight some key aspects of our framework’s handling of monitor tasks. First, note that the set of statements, S, of a task may be empty. Such a task serves as a barrier; and is legal in our framework. Second, the precondition can either be absent or appear later, and not as the first statement, in the monitor method. When a monitor method has no precondition, our framework creates a task with the precondition as tautology, indicating that the task can be executed at any time. If a monitor method does not start with a waituntil statement but has some such statement in between, then the precondition of the first derived task is a tautology. In Fig. 5, the method bar() has two corresponding tasks T1 and T2 , where T 1 has the precondition as tautology and the set of statements S1 ; T2 has the precondition P and the set of statements S2 . Furthermore, monitor tasks are compositional in nature. Consider the method foo() in Fig. 5. If a method declares n sets of preconditions and statements, then the framework would generate n tasks such that each task Ti , 1 ≤ i ≤ n, has a precondition Pi and a corresponding set of statements Si . Appendix B presents some detailed examples of these cases. void foo() { waituntil(P1 ); S1 ; waituntil(P2 ); S2 ; ... waituntil(Pn ); Sn ; } void bar() { S1 ; waituntil(P ); S2 ; } Figure 5: Examples of methods leading to compositional tasks and tautology as precondition C C.1 Lemma Proofs Proof Sketch for Lemma 1 We show that for any execution in our model there exists an equivalent lock-based execution. Since all tasks of any monitor object are executed by a single thread due to Rule 1, mutual exclusion is preserved just as in any lock-based execution. We only need to show that the order of execution of the tasks corresponds to a schedule in which worker threads execute the tasks. It is sufficient to show that all tasks submitted by a single worker thread execute in the order of submissions. Let s and t be two consecutive tasks submitted by a worker thread. If they are submitted for the same monitor, then the Rule 2 preserves the order. If s is a blocking task, then by definition of blocking task, t cannot be submitted before s is completed. Hence, execution of s precedes execution of t. If s is a non-blocking task and is on a different monitor object from t, then due to Rule 3 we wait for s to finish before submission of t. C.2 Proof Sketch for Lemma 2 It is sufficient to show that for every thread history there exists an equivalent sequential thread history that is consistent with the execution by the monitor thread. We get this sequence by considering as linearization point for an operation the instant at which the monitor thread finishes executing the corresponding task. We show that this order is consistent with the thread order. 15 Let s < t denote that operation(i.e. its corresponding task) s was executed before t. First consider the case when s < t because s is a blocking operation. In this case, task t cannot be submitted before task s is executed. Hence, the order of execution of monitor tasks preserves the thread order. Second, consider the case when s < t because they are operations on the same monitor object and s is invoked before t. In this case Rule 2 guarantees that the order of execution is s followed by t. Finally, consider the case when s and t are tasks submitted by the same thread, s is non-blocking but its results are used by t. In this case, the execution would have to block for collecting the results of s before executing any further. Hence t would be submitted later than the execution of s. D Implementation Details The translation of the code written with our two proposed keywords to an equivalent Java code is performed by using a pre-processor. For our implementation, we use JavaCC [24] pre-processor. We convert all the monitor methods to equivalent tasks, and use a threadpool based executor service framework for monitor threads. Here, we first discuss the pre-processing steps. D.1 Pre-processing We briefly summarize the concepts applied for compiling the code, using the ActiveMonitor framework, in which the two proposed keywords are used. First, our pre-processor identifies the waituntil statements that capture the preconditions of monitor tasks. Recall that the waituntil keyword is used for automatic signaling between threads, and the predicate provided as its argument forms the precondition for execution of monitor tasks. In the corresponding generated code (in Java) every predicate is created as an inner class with a method called isT rue(), which returns a boolean value as the result of the predicate evaluation. At runtime, our system invokes the isT rue() method to evaluate the predicate when deciding which task should be executed. Next, the pre-processor creates a Callable [29] or Runnable [29] object that contains the set of statements for each task inside its call() or run() method. If the return value of the original monitor method is void , then we create a Runnable object; otherwise, we create a Callable object. Note that if a non-blocking monitor method has been divided into multiple tasks, the resulting tasks may have some shared variables. To handle these variables, our system creates a data object to store them and all the tasks can access them through this data object. Finally, we replace the invocations of monitor methods by submitting monitor tasks to threadpool executor (Appendix D.2). The executor returns f, an instance of Java’s Future object [29], to the invoker thread when a task is submitted. If the task is blocking, then the thread needs to wait for the computation in f to finish; this is done by evaluating f within the task and returning the result. Otherwise, f is registered with the threadpool executor for exception checking and handling. In Section 3, we mentioned that our current implementation does not admit a particular family of methods for task based executions. Specifically, it does not admit recursive blocking calls, monitor methods in which conditional synchronization guards using automatic thread signaling (waituntil) are not initial statements of the program, or are present in conditional branches. This does not mean that programs requiring such method implementations are not allowed in our framework; just that at present we do not support task generation of such methods. A programmer can implement them using conventional Java syntax, and still use our framework for other methods. 16 D.1.1 Discussion: Thread Dependent Variables and Functions In our current implementation, thread dependent variables and functions within a monitor method cannot be used directly in the Runnable or Callable object that is used in task generation by our approach. This is because the tasks are executed by the monitor thread and not by the worker thread. For example, suppose there is a monitor method that invokes Thread.currentThread(), if we directly add this statement to the generated Runnable object (in the task), then this method’s invocation at runtime will return the reference to the monitor thread when it is executed. However, it is obvious that the intent of this call inside the monitor method was to refer to the worker thread. To handle this situation, currently, we require the programmer to perform reference copy and storage and storage in thread-local variables. For read operations of thread dependent variables and functions, the worker thread would need to evaluate them outside the monitor, and store the result with final variables. These final variables can be accessed by the runnable and callable objects. An additional constraint/limitation applies for the case of write operation on thread dependent variables. For write operations, if the monitor method is non-blocking then the results can be stored as intermediate data. The worker thread then writes these results back to its local variable after the task is executed. D.1.2 Discussion: Blocking recursive method Our current pre-processing implementation does not support a blocking recursive method on monitors. This is because the number of the method invocations to be made at the runtime is non-deterministic. Thus, we cannot know how many tasks we need to create at pre-processing time. In addition, since the method is blocking, the monitor thread will get blocked when it recurs. D.2 Limiting Monitor Threads using ThreadPools A threadpool is a collection of threads to execute tasks that are units of computation. These threads are usually created together at the start-up , and remain in the pool to provide executor service. For task execution based programs, the use of a threadpool can significantly improve the runtime performance by having an already existing thread ready to execute the tasks as they arrive. Generally, tasks are stored in a collection, and free threads are responsible for finishing the unexecuted tasks. If there is no task that is eligible for execution, the threads in the pool wait for one to arrive. This approach is especially beneficial when the number of tasks is greater than the number of threads in a pool. Thus, the size of the threadpool is a crucial factor as the timing of creating or destroying a thread may have a significant impact on performance. Given that we spawn a new thread for a monitor object, programs with a large number of monitors could be adversely affected by having too many additional threads in the ActiveMonitor framework. To keep the overhead of monitor threads relatively low, we control the number of monitor threads created by querying the operating system for available resources and managing the monitor threads dynamically. A component, called Monitor ThreadPool Executor, manages this process. This component instantiates monitor threads as threads of a threadpool at the start of the execution. The pre-processing phase collects the information about number of monitor objects in the program, and the threadpool executor uses this information for creating a threadpool balancing the resource consumption and performance benefit. D.2.1 Exception Handling For a non-blocking method invocation, after submitting its corresponding task to the executor, the invoker does not need to wait for the completion of the task. The task is executed in parallel by a thread of the monitor threadpool. Thus, if an exception occurs during its execution, the thread 17 that submitted it must be notified of this exception. The ActiveMonitor framework has an exception handler that keeps a log of every exception and provides different mechanisms for programmers to handle exceptions in the non-blocking method. The users may choose to ignore the exceptions or they can specify a maximum number of times a task may be considered for automatic re-tries. Furthermore, our system also provides a hook so that the programmer can write their custom exception handler. 18
6cs.PL
PORTRAIT GROWTH IN CONTRACTING, REGULAR BRANCH GROUPS arXiv:1710.02902v1 [math.GR] 9 Oct 2017 ZORAN ŠUNIĆ AND JONE URIA-ALBIZURI Abstract. We address a question of Grigorchuk by providing both a system of recursive formulas and an asymptotic result for the portrait growth of the first Grigorchuk group. The results are obtained through analysis of some features of the branching subgroup structure of the group. More generally, we provide recursive formulas for the portrait growth of any finitely generated, contracting, regular branch group, based on the coset decomposition of the groups that are higher in the branching subgroup structure in terms of the lower subgroups. Using the same general approach we fully describe the portrait growth for all non-symmetric GGS-groups and for the Apollonian group. 1. Introduction Regular branch groups acting on rooted trees have been extensively studied since the 1980s. The interest in these groups is due to their remarkable properties. For instance, some of the groups in this class provide counterexamples to the General Burnside Problem, many of them are amenable but not elementary amenable, and the first example of a group of intermediate word growth was of this type. The initial examples, constructed in the early 1980s, were the Grigorchuk 2-groups [Gri80, Gri84] and the Gupta-Sidki p-groups [GS83]. Many other examples and different generalizations have been introduced since then. The notion of word growth for a finitely generated group was introduced by A.S. Švarc [Šva55] and later, independently, by J. Milnor [Mil68a, Mil68b]. Given a finitely generated group, one can define the word metric with respect to a finite generating set. It is natural to ask what is the word growth function of a particular group, that is, what is the number of elements that can be written as words up to a given length (equivalently, what is the volume of the ball of a given radius in the word metric). A lot of work has been done in this direction. For instance, it is known that groups of polynomial growth are exactly the virtually nilpotent groups [Gro81]. Since the free group of rank at least 2 has exponential growth, the word growth of every finitely generated group is at most exponential. In 1968, Milnor [Mil68c] asked if every finitely generated group has either polynomial or exponential growth, and Grigorchuk [Gri83, Gri84] showed in the early 1980s that groups of intermediate growth exist. In particular, the growth of the first Grigorchuk group [Gri80], introduced in 1980 as an example of a Burnside 2-group, is superpolynomial, but subexponential. The first Grigorchuk group is a self-similar, contracting, regular branch group, and so are the Gupta-Sidki p-groups. The study of such groups often relies on the representation of their elements through portraits. For instance, the known estimate [Bar98] of word growth for the first Grigorchuk group is based on an estimate of the number of portraits of elements of given length. Thus, in the 2010 Mathematics Subject Classification. Primary 20E08. J. Uria-Albizuri acknowledge financial support from the Spanish Government, grants MTM2011-28229-C02 and MTM2014-53810-C2-2-P, and from the Basque Government, grants IT753-13, IT974-16 and the predoctoral grant PRE-2014-1-347. 1 2 ZORAN ŠUNIĆ AND JONE URIA-ALBIZURI context of self-similar, contracting groups acting on regular rooted trees, it is of interest to study the portrait growth of a group with respect to a finite generating set. The necessary definitions are given in Section 2, but let us provide here a rough description. Given a finitely generated group acting on a rooted tree, one can consider the action of the group on the subtrees below each vertex of the tree. If the action on such subtrees is always given by elements of the group itself, the group is called self-similar. Moreover, if the elements describing the action at the subtrees on each level are getting shorter (with respect to the word metric) with the level, with finitely many exceptions, the group is said to be contracting. Thus, in a finitely generated, contracting group G, there is a finite set M such that, for every element g in G, there exists a level such that all elements describing the action of g on the subtrees below that level come from the finite set M. The first level where this happens is called the depth of the element g (with respect to M), a concept introduced by Sidki [Sid87]. In this setting, the portrait growth function (growth sequence) counts the number of elements up to a given depth and one may ask what is the growth rate of such a function. This question was specifically raised by Grigorchuk [Gri05] for the first Grigorchuk group. We provide a system of recursive formulas for the portrait growth of the first Grigorchuk group (see Theorem 4.2) and the following asymptotic result. Theorem 1.1. There exists a positive constant γ such that the portrait growth sequence {an }∞ n=0 of the first Grigorchuk group G satisfies the inequalities n 1 γ2n e ≤ an ≤ 4eγ2 , 4 for all n ≥ 0. Moreover, γ ≈ 0.71. We note here that the recursive formulas from Theorem 4.2, together with the results of Lemma 3.2, may be used to estimate γ with any desired degree of accuracy. More generally, we provide recursive formulas (see (2)) for the portrait growth sequence of any finitely generated, contracting, regular branch group. The formulas are directly based on the branching subgroup structure of the group. As a further application, we also study the portrait growth for all non-symmetric GGS-groups and for the Appollonian group and, in each case, we resolve the obtained recursion and provide a straightforward description of the portrait growth. Theorem 1.2. Let G be a GGS-group defined by a non-symmetric vector e ∈ Fp−1 . p The portrait growth sequence of G {an }∞ is given by n=0 a0 = 1 + 2(p − 1) n−1 an = p(x1 + (p − 1)y1 )p , where x1 and y1 are the number of solutions in Fp of ((n0 , . . . , np−1 )C(0, e)) ⊙ (n0 , . . . , np−1 ) = (0, . . . , 0), with n0 + · · · + np−1 = 0 and n0 + · · · + np−1 = 1, respectively. For instance, for the so called Gupta-Sidki 3-group, which corresponds to the GGS-group defined by e = (1, −1) with p = 3, the portrait growth sequence is n−1 given by a0 = 5 and an = 3 · 93 , for n ≥ 1. Theorem 1.3. The portrait growth sequence {an }∞ n=0 of the Apollonian group is given by n n 3n −1 1  √ 3 . an = 3 2 · 7 3 = √ 7 3 3 PORTRAIT GROWTH IN CONTRACTING, REGULAR BRANCH GROUPS 3 Note that, in all three cases, the portrait growth is doubly exponential even though the word growth function is intermediate for the first Grigorchuk group, mostly unknown for the GGS-groups, and exponential for the Apollonian group. We conjecture that the portrait growth is doubly exponential for all finitely generated, contracting, regular branch groups. The paper is organized as follows: in Section 2 we provide the basic definitions regarding groups acting on regular rooted trees and we describe a procedure yielding recursive relations for the portrait growth sequence of a finitely generated, contracting, regular branch group. In Section 3 we state some useful observations about sequences of doubly exponential growth. Finally in Sections 4, 5 and 6 we describe the cases of the first Grigorchuk group, non-symmetric GGS-groups, and the Apollonian group. 2. Portrait growth sequence on a regular branch contracting group A regular rooted tree T is a graph whose vertices are the words over a finite alphabet X, and two vertices u and v are joined by an edge if v = ux for some x ∈ X. The empty word, denoted ∅, represents the root of the tree and the tree is called d-adic if X consists of d elements. The vertices represented by words of a fixed length constitute a level, that is, the words of length n constitute the nth level of the tree. The ternary rooted tree based on X = {1, 2, 3} is displayed in Figure 1. ∅ 1 11 12 2 .. . 13 21 22 3 .. . 23 31 32 .. . 33 Figure 1. A ternary rooted tree An automorphism of the tree T is a permutation of the vertices preserving incidence. Such a permutation, by necessity, must also preserve the root and all other levels of the tree. The automorphisms of T form the automorphism group Aut T under composition. A group acting faithfully on a regular rooted tree may be regarded as a subgroup of Aut T . Every automorphism g can be fully described by indicating how g permutes the d vertices at level 1 below the root, and how it acts on the subtrees hanging from each vertex at level 1. Observe that each subtree hanging from a vertex is isomorphic to the whole tree T , so that the following description makes sense. Namely, we decompose any automorphism g ∈ Aut T as (1) g = (g1 , . . . , gd )α, where α ∈ Sd is the permutation describing the action of g on the d vertices at level 1, and each gi ∈ Aut T describes the action of g on the ith subtree below level 1, for i = 1, . . . , d. This process can be repeated at any level, and the element 4 ZORAN ŠUNIĆ AND JONE URIA-ALBIZURI describing the action of g at a particular vertex u is called the section of g at the vertex u. Given a group G ≤ Aut T we say that G is self-similar if the sections of each element in G belong again to the group G. We say that a self-similar group G ≤ Aut T is contracting if there is a finite set M of elements in G such that, for every element g, there exists some level n such that all sections of g at the vertices at and below the nth level belong to M. The smallest set M among such finite sets is called the nucleus of G and we denote it by N (G) (or by N , when G is clear from the context). The definition of a contracting group, in this form, is due to Nekrashevych [Nek05]. For any finitely generating group G, generated by a finite symmetric set S = S −1 , we define the word length of g, denoted ∂(g), to be the length of the shortest word over the alphabet S representing the element g. A self-similar group G generated by a finite symmetric set S is contracting if and only if there exist constants λ < 1 and C ≥ 0, and level n such that for every g ∈ G and every vertex u on level n ∂(gu ) ≤ λ∂(g) + C. Note that, if ∂(g) > C 1−λ , then ∂(gu ) ≤ λ∂(g) + C < ∂(g), that is, the sections gu are strictly shorter than g. Thus, the elements that possibly have no shortening in their sections are the ones that belong to the finite set   C g ∈ G | ∂(g) ≤ . 1−λ In particular, the nucleus is part of this finite set. The metric approach to contracting groups precedes the nucleus definition of Nekrashevych and was used by Grigorchuk in his early works on families of groups related to the first Grigorchuk group [Gri80, Gri84]. Nekrasevych [Nek05] showed that he nucleus definition and the metric definition are equivalent in the case of finitely generated groups. Given a contracting group G acting on a d-ary tree and an element g in G, the nucleus portrait is a finite tree, whose interior vertices are decorated by permutations from Sd and whose leaves are decorated by elements of the nucleus, describing the action of the element g. The portrait is constructed recursively as follows. If g is an element of the nucleus the tree consist only of the root decorated by g. If g is not an element of the nucleus, then we consider its decomposition (1). The portrait of g is obtained by decorating the root by the permutation α and by attaching the portraits of the section g1 , . . . , gd at the corresponding vertices of the first level. Since G is contracting this recursive procedure must end at some point, and we obtain the portrait of the element g. (A concrete example in the case of the first Grigorchuk group is provided in Figure 2.) Let us denote by d(g) the depth of the portrait of an element g ∈ G, that is, the length of the largest ray from the root to a leaf in the portrait of g. For each n ∈ N, the set {g ∈ G | d(g) ≤ n} is finite, and the function a : N → N given by a(n) = |{g ∈ G | d(g) ≤ n}| is called the portrait growth function, or portrait growth sequence, of G (with respect to the nucleus). We now focus on regular branch groups, since their structure gives us a way to describe the portrait growth function of a contracting group in a recursive way. Given G ≤ Aut T , the elements of G fixing level n form a normal subgroup of G, called the nth level stabilizer and denoted stG (n). For every n ∈ N, we have an PORTRAIT GROWTH IN CONTRACTING, REGULAR BRANCH GROUPS 5 injective homomorphism ψn : stG (n) −→ Aut T × · · · × Aut T , | {z } dn sending each element g ∈ stG (n) to the dn -tuple consisting of the sections of g at n level n. Note that, if the group is self-similar, ψn (stG (n)) ≤ G × .d. . × G. For simplicity we write ψ = ψ1 . A group G ≤ Aut T is level transitive if it acts transitively on every level of the tree. A level transitive group G ≤ Aut T is called regular branch if there exists a normal subgroup K of finite index in G such that ψ(K ∩ stG (1)) ≥ K × · · · × K. Observe that, since K is of finite index in G, the group ψ −1 (K × · · · × K) has finite index in K ∩ stG (1), and hence in G. We now describe a procedure yielding recursive formulas for the portrait growth of any finitely generated, contracting, regular branch group G, branching over its normal subgroup K of index k. Consider a left transversal T = {t1 , . . . , tk } for K in G and denote by pn (ti ) = |{g ∈ ti K | d(g) ≤ n}| and pn = |{g ∈ G | d(g) ≤ n}| the sizes of the sets consisting of the elements of depth at most n in the coset ti K Pk and in the whole group G, respectively. We have pn = i=1 pn (ti ). Let S = {s1 , . . . , sℓ } be a left transversal for ψ −1 (K × · · · × K) in K. For i = 1, . . . , k and j = 1, . . . , ℓ we have ti sj = (g1 , . . . , gd )α ≡ (tij1 , . . . , tijd )α (mod K × · · · × K), for some tijr ∈ T , r = 1, . . . , d. Thus, for n ≥ 0, (2) pn+1 (ti ) = ℓ X pn (tij1 ) . . . pn (tijd ) j=1 (3) pn+1 = k X ℓ X pn (tij1 ) . . . pn (tijd ). i=1 j=1 The initial conditions p0 (ti ), i = 1, . . . , k, for the recursive formulas can be obtained simply by counting the members of the nucleus that come from the corresponding coset, while p0 is the size of the nucleus. The following observation will be helpful later on. A rooted automorphism is an automorphisms whose sections, other than at the root, are trivial. Lemma 2.1. Let G be a finitely generated, contracting, regular branch group branching over the subgroup K and let T be a transversal of K in G. If a ∈ G is a rooted automorphism then, for every t ∈ T and n ≥ 1, we have pn (t) = pn (at) = pn (ta) = pn (ta ). Proof. Observe that for every g ∈ tK and u ∈ Ln , n ≥ 1, we have (ag)u = au ga(u) = ga(u) , (ga)u = gu ag(u) = gu , (g a )u = ga−1 (u) . Thus, there are bijections between the sets of elements of depth n in tK, atK, taK and ta K.  6 ZORAN ŠUNIĆ AND JONE URIA-ALBIZURI 3. Doubly exponential growth We begin by defining sequences of doubly exponential growth. Definition 3.1. A sequence of positive real numbers {an }n∈N grows doubly exponentially if there exist some positive constants α, β and some γ, d > 1 such that n n αeγd ≤ an ≤ βeγd , for every n ∈ N. In order to show that the portrait growth sequences in our examples are doubly exponential we need the following auxiliary result. ∞ Lemma 3.2. Let {an }n=0 be a sequence of positive real numbers and d a constant with d > 1. The following are equivalent. (i) There exist positive constants A and B such that, for all n ≥ 0, Aadn ≤ an+1 ≤ Badn . (ii) There exist positive constants α, β, and γ such that, for all n ≥ 0, n n αeγd ≤ an ≤ βeγd .  ∞ Moreover, in case (i) is satisfied, the sequence lndann n=0 is convergent, we may set ln an γ = lim n→∞ dn −M and α and β can be chosen to be e and eM , respectively, where 1 M= max{| ln A|, | ln B|}. d−1 The error of the approximation γ ≈ γn = ln an dn is no greater than M/dn . Proof. (ii) implies (i). We have, for all n, β  γdn d β α d α  γdn d γdn+1 γdn+1 βe = αe ≤ a ≤ βe = αe ≤ d adn . a ≤ n+1 n d d d β β α α ≤ ln B, and therefore (i) implies (ii). For all i, we have ln A ≤ ln aai+1 d i ln ai+1 ≤ max{| ln A|, | ln B|} = (d − 1)M. adi For n ≥ 0, let rn = ∞ X ai+1 1 ln d . i+1 d ai i=n The series rn isPabsolutely convergent and we have the estimate |rn | ≤ M/dn , by M 1 comparison to ∞ i=n di+1 (d − 1)M = dn . Let ∞ X 1 ai+1 γ = ln a0 + r0 = ln a0 + ln d . i+1 d ai i=0 Since r0 is a convergent series, γ is well defined. We have 1 a1 γ = ln a0 + r0 = ln a0 + ln d + r1 d a0 a2 ln a1 1 ln a1 + r1 = + 2 ln d + r2 = d d d a1 ln a2 = 2 + r2 = . . . d PORTRAIT GROWTH IN CONTRACTING, REGULAR BRANCH GROUPS 7 Thus, for all n, ln an + rn . dn  ∞ Since |rn | ≤ M/dn , we see that the sequence lndann n=0 converges to γ. Moreover, the inequalities γ − M/dn ≤ lndann ≤ γ + M/dn yield γ= n n e−M eγd ≤ an ≤ eM eγd .  We end this section with a simple combinatorial observation that shows that an upper bound of the form required in condition (i) of the lemma always exists for regular branch groups. Lemma 3.3. Let G be a finitely generated, contracting, regular branch group acting on the d-adic tree and let {an }n≥0 be the portrait growth sequence of G. Then an+1 ≤ |G : stG (1)|adn , for n ≥ 0. Proof. Since every element of depth at most n + 1 has sections at the first level that have depth at most n, the number of possible decorations at level 1 and below for portraits of depth at most n + 1 is at most adn . On the other hand, the number of possible labels at the root is |G : stG (1)|, and we obtain the inequality.  4. Portrait growth in the first Grigorchuk group Denote by G the first Grigorchuk group, introduced in [Gri80]. In his treatise [Gri05] on solved and unsolved problems centered around G, Grigorchuk asked what is the growth of the sequence counting the number of portraits of given size in G (Problem 3.5). The first Grigorchuk group is defined as follows. Definition 4.1. Let T be the binary tree. The first Grigorchuk group G is the group generated by the rooted automorphism a permuting the two subtrees on level 1, and by b, c, d ∈ stG (1), where b, c and d are defined recursively by ψ(b) = (a, c) ψ(c) = (a, d) ψ(d) = (1, b) Already in his early works in 1980s Grigorchuk observed that G is contracting with nucleus N (G) = {1, a, b, c, d}. Since G is a contracting group, its elements have well defined portraits, which are finite decorated trees. For instance, the portrait of the element bacac is provided in Figure 2. Grigorchuk also showed that G is a regular branch group, branching over the subgroup K = h[a, b]iG of index |G : K| = 16. An accessible account can be found in Chapter VIII of [dlH00]. A transversal for K in G is given by T = { 1, d, ada, dada, a, ad, da, dad, b, c, aca, cada, ba, ac, ca, cad }. and a transversal for ψ −1 (K × K) in K is given by S = {1, abab, (abab)2, baba}. Theorem 4.2. The portrait growth sequence {an }∞ n=0 of the first Grigorchuk group G is given recursively by a0 = 5 an = 2xn + 4yn + 2zn + 2Xn + 4Yn + 2Zn , for n ≥ 1, 8 ZORAN ŠUNIĆ AND JONE URIA-ALBIZURI () () (1 2) 1 b (1 2) c d a Figure 2. portrait of the element bacac where xn , yn , zn , Xn , Yn , and Zn , for n ≥ 1, satisfy the system of recursive relations xn+1 = x2n + 2yn2 + zn2 , yn+1 = xn Yn + Yn zn + Xn yn + yn Zn , zn+1 = Xn2 + 2Yn2 + Zn2 Xn+1 = 2xn yn + 2yn zn , Yn+1 = xn Xn + 2yn Yn + zn Zn , Zn+1 = 2Xn Yn + 2Yn Zn , with initial conditions x1 = y1 = z1 = Y1 = 1, X1 = 2, Z1 = 0. Proof. Denote by pn (t) the number of portraits of depth no greater than n in Γ that represent elements in the coset tK. By Lemma 2.1, we have (4) pn+1 (t) = pn+1 (at) = pn+1 (ta ) = pn+1 (ta), for n ≥ 0, t ∈ T. Thus we only need to exhibit recursive formulas for the 6 coset representatives in the set {1, c, dada, b, d, cada}. We have PORTRAIT GROWTH IN CONTRACTING, REGULAR BRANCH GROUPS ψ(1) = (1, 1) ψ(abab) = (ca, ac) 2 ψ((abab) ) = (dada, dada) ψ(baba) = (ac, ca) ψ(c) = (a, d) ψ(cabab) = (aca, cad) 2 ψ(c(abab) ) = (dad, ada) ψ(dada) = (b, b) 2 ψ(dada(abab) ) = (cada, cada) 9 ψ(cbaba) = (c, ba) ψ(dadaabab) = (da, ad) ψ(dadababa) = (ad, da) ψ(b) = (a, c) ψ(babab) = (aca, dad) 2 ψ(b(abab) ) = (dad, aca) ψ(bbaba) = (c, a) ψ(d) = (1, b) ψ(dabab) = (ca, ad) 2 ψ(d(abab) ) = (dada, cada) ψ(cada) = (ba, d) 2 ψ(cada(abab) ) = (cad, ada) ψ(dbaba) = (ac, da) ψ(cadaabab) = (ada, cad) ψ(cadababa) = (d, ba), where the sections are already written modulo K by using representatives in T (the spacing into 6 groups of 4 indicates how each of the 6 cosets of K with representatives 1, c, dada, b, d, and cada splits into 4 cosets of K × K). Thus, for n ≥ 0, pn+1 (1) = pn (1)2 + 2pn (ac)pn (ca) + pn (dada)2 , pn+1 (c) = pn (a)pn (d) + pn (dad)pn (ada) + pn (c)pn (ba) + pn (aca)pn (cad), pn+1 (dada) = pn (b)2 + 2pn (ad)pn (da) + pn (cada)2 (5) pn+1 (b) = 2pn (a)pn (c) + 2pn (dad)pn (aca), pn+1 (d) = pn (1)pn (b) + pn (ac)pn (da) + pn (ca)pn (ad) + pn (dada)pn (cada), pn+1 (cada) = 2pn (d)pn (ba) + 2pn (ada)pn (cad), with initial conditions p0 (1) = p0 (a) = p0 (b) = p0 (c) = p0 (d) = 1, p0 (t) = 0, for t ∈ T \ {1, a, b, c, d}. Direct calculations, based on (5), give p1 (b) = 2 p1 (cada) = 0 p1 (t) = 1, for t ∈ {1, c, d, dada}. If we denote, for n ≥ 1, xn = pn (1) = pn (a), yn = pn (c) = pn (ac) = pn (aca) = pn (ca), zn = pn (dada) = pn (dad), Xn = pn (b) = pn (ba), Yn = pn (d) = pn (ad) = pn (ada) = pn (da), Zn = pn (cada) = pn (cad) we obtain, for n ≥ 1, an = 2xn + 4yn + 2zn + 2Xn + 4Yn + 2Zn , 10 ZORAN ŠUNIĆ AND JONE URIA-ALBIZURI where xn , yn , zn , Xn , Yn , and Zn satisfy the recursive relations and initial conditions as claimed, which follows from (5).  Theorem 4.3. There exists a positive constant γ such that the portrait growth sequence {an }∞ n=0 of the first Grigorchuk group G satisfies the inequalities n 1 γ2n e ≤ an ≤ 4eγ2 , 4 for all n ≥ 0. Moreover, γ ≈ 0.71. Proof. Following Lemma 3.2, we first determine positive constants A an B such that for each n ∈ N we have Aa2n ≤ an+1 ≤ Ba2n . By Lemma 3.3 we may take B = |G : stG (1)| = 2. For the other inequality, we need a constant A such that an+1 − Aa2n ≥ 0. Using Theorem 4.2 we may express, for n ≥ 1, both an+1 and an in terms of xn , yn , zn , Xn , Yn , Zn and if we set A = 14 , we obtain an+1 − Aa2n = (xn − zn + Xn − Zn )2 ≥ 0. 1 1 Since M = d−1 max{| ln A|, | ln B|} = 2−1 max{| ln 1/4|, | ln 2|} = ln 4, we obtain −M M α=e = 1/4 and β = e = 4. Finally, the approximation of γ ≈ 0.71 can be calculated by using the recursion given by Theorem 4.2 and Lemma 3.2.  5. Portrait growth in non-symmetric GGS-groups The GGS-groups (named after Grigorchuk, Gupta, and Sidki) form a family of groups generalizing the Gupta-Sidki examples [GS83] (which were in turn inspired by the first Grigorchuk group [Gri80]). Definition 5.1. For a prime p, p ≥ 3, and a vector e = (e1 , . . . , ep−1 ) ∈ Fp−1 , p the GGS-group defined by e is the group of p-ary automorphisms generated by the rooted automorphism a, which permutes the subtrees on level 1 according to the permutation (1 . . . p), and the automorphism b ∈ st(1) defined recursively by b = (b, ae1 , . . . , aep−1 ). Set S = S −1 = {a, a2 , . . . , ap−1 , b, . . . , bp−1 }. It is easy to see that G is contracting with nucleus N (G) = S ∪ {1}. Let   0 e1 e2 . . . ep−1 ep−1 0 e1 . . . ep−2    C(0, e) =  . . . ..  .. .. ..  .. . .  e1 e2 . . . ep−1 0 be the circulant matrix of the vector (0, e1 , . . . , ep−1 ). We say that the vector e = (e1 , . . . , ep−1 ) is symmetric if ei = ep−i , for i = 1, . . . , p − 1 (that is, the vector is symmetric precisely when the corresponding circulant matrix is symmetric). . Theorem 5.2. Let G be a GGS-group defined by a non-symmetric vector e ∈ Fp−1 p The portrait growth sequence {an }∞ of G is given by n=0 a0 = 1 + 2(p − 1) n−1 an = p(x1 + (p − 1)y1 )p , PORTRAIT GROWTH IN CONTRACTING, REGULAR BRANCH GROUPS 11 where x1 and y1 are the number of solutions in Fpp of ((n0 , . . . , np−1 )C(0, e)) ⊙ (n0 , . . . , np−1 ) = (0, . . . , 0), with n0 + · · · + np−1 = 0 and n0 + · · · + np−1 = 1, respectively, where ⊙ denotes the product by coordinates. Proof. Fernández-Alcober and Zugadi-Reizabal [FAZR14] showed that a GGS-group defined by a non-symmetric vector is regular branch over G′ , whose index in G is p2 . A left-transversal for G′ in G is given by T = {ai bj | i, j = 0, . . . , p − 1}. For each pair (i, j) ∈ {0, . . . , p − 1}2 denote by pn (i, j) the number of portraits of depth no greater than n in the coset ai bj G′ . We have 2 ai bj ≡ ai bn0 (ba )n1 (ba )n2 . . . (ba where j = n0 + · · · + np−1 in Fp . And then, ai bj ≡ ai (ai0 bn0 , . . . , aip−1 bnp−1 ) p−1 )np−1 (mod G′ ), (mod G′ × · · · × G′ ), where (i0 , . . . , ip−1 ) = (n0 , . . . , np−1 )C(0, e). We obtain that, X pn+1 (i, j) = n0 +···+np−1 =j p−1 Y pn (ir , nr ). r=0 Observe that the decomposition of pn+1 (i, j) does not depend on i, so we can set pn+1 (i, j) = Pn+1 (j) and we have (6) X pn+1 (j) = n0 +···+np−1 =j p−1 Y pn (ir , nr ), r=0 Pp−1 and then, for n ≥ 1, we have an = p j=0 pn (j), where we multiply by p because we have to sum for each i = 0, . . . , p − 1. Since the nucleus is S ∪ {1}, the initial conditions are the given by p0 (0, 0) = p0 (i, 0) = p0 (0, j) = 1 for i, j ∈ {1, . . . , p − 1}, p0 (i, j) = 0 otherwise. In other words, p0 (i, j) = 1 if ij = 0 and p0 (i, j) = 0, otherwise. By (6), p1 (0) is the number of solutions in Fpp of (7) (n0 , . . . , np−1 )C(0, e) ⊙ (n0 , n1 , . . . , np−1 ) = (i0 n0 , . . . , ip−1 np−1 ) = (0, . . . , 0), with n0 + · · · + np−1 = 0, and p1 (j) is the number of solutions of the same equation, but with n0 + · · · + np−1 = j. We prove by induction that pn (1) = pn (j), for n ≥ 1 and j 6= 0. Observe that, for n = 1, if (n0 , . . . , np−1 ) is a solution of (7), with n0 + · · · + np−1 = 1, then (jn0 , . . . , jnp−1 ) is also a solution, but with n0 + · · · + np−1 = j. Similarly, if we multiply a solution that sums up to j by the multiplicative inverse j −1 of j in Fp , we obtain a solution that sums up to 1. Thus, there is a bijection between the solutions and hence p1 (1) = p1 (j), for j 6= 0. Let us now assume that pn (1) = pn (j), for n ≥ 1 and j 6= 0, and let us prove the equality for n + 1. By (6) and the assumption that n ≥ 1, we have that pn (i, j) = pn (j) and pn+1 (j) = X n0 +···+np−1 =j p−1 Y r=0 pn (nr ). 12 ZORAN ŠUNIĆ AND JONE URIA-ALBIZURI By the inductive hypothesis we have pn (nr ) = pn (j −1 nr ) (this is true regardless of whether nr is 0 or not). Thus, pn+1 (j) = p−1 Y X n0 +···+np−1 =j pn (nr ) = n0 +···+np−1 =j r=0 X = j −1 n0 +···+j −1 np−1 =1 X p−1 Y pn (j −1 nr ) r=0 X pn (j −1 nr ) = r=0 p−1 Y n′0 +···+n′p−1 =1 p−1 Y pn (n′r ) = pn+1 (1). r=0 We now resolve the recursion (6). Denote xn = pn (0) and yn = pn (1), for n ≥ 1, so that an = p(xn + (p − 1)yn ). The fact that pn (ni ) = yn whenever ni 6= 0, together with (6), implies that X Y Y xn+1 = xn yn , yn+1 = n0 +···+np−1 =0 ni =0 X Y n0 +···+np−1 =1 ni 6=0 xn ni =0 Y yn ni 6=0 Thus, by making all possible choices of ℓ coordinates, ℓ = 0, . . . , p, in (n0 , . . . , np−1 ) that are equal to 0, we obtain   p X p−ℓ ℓ p (8) zℓ xn yn xn+1 = ℓ ℓ=0   p X ℓ p yn+1 = (9) z′ , xp−ℓ y n n ℓ ℓ ℓ=0 where zℓ is the number of solutions of n′1 + · · · + n′ℓ = 0 such that none of n′1 , . . . , n′ℓ is 0 and zℓ′ the number of solutions of n′1 + · · · + n′ℓ = 1 such that none of n′1 , . . . , n′ℓ is 0. For zℓ and zℓ′ , ℓ ≥ 1, we have the relations zℓ+1 = (p − 1)zℓ′ ′ zℓ+1 = zl + (p − 2)zℓ′ , with initial conditions z1 = 0 and z1′ = 1. The solution to this system is 1 ((p − 1)ℓ − (−1)ℓ−1 (p − 1)), p 1 zℓ′ = ((p − 1)ℓ − (−1)ℓ ), p zℓ = which, by (8) and (9), gives 1 (xn + (p − 1)yn )p + p 1 = (xn + (p − 1)yn )p − p xn+1 = yn+1 p−1 (xn − yn )p , p 1 (xn − yn )p . p Finally, we obtain xn+1 + (p − 1)(yn+1 ) = (xn + (p − 1)yn )p , and we conclude that n−1 an = p(x1 + (p − 1)y1 )p .  PORTRAIT GROWTH IN CONTRACTING, REGULAR BRANCH GROUPS 13 6. Portrait growth in the Apollonian group The Apollonian group is a subgroup of the Hanoi Towers group. The Hanoi Towers group was introduced by Grigorchuk and the first author [GŠ06] and the Apollonian group was introduced later by Grigorchuk, Nekrashevych and the first author [GNŠ06]. Definition 6.1. The Appolonian group A acting on the ternary tree is the group generated by the automorphisms x = (1, y, 1)(1 2), y = (x, 1, 1)(1 3), z = (1, 1, z)(2 3). Set S = {x, y, z, x−1 , y −1 , z −1 . It is easy to see that A is contracting with nucleus N (A) = S ∪ {1}. Theorem 6.2. The portrait growth sequence {an }∞ n=0 of the Apollonian group is given, for n ≥ 0, by n 3n −1 n 1  √ 3 . an = 3 2 · 7 3 = √ 7 3 3 Proof. Denote by E the subgroup of index 2 in A consisting of the elements in A that are represented by words of even length over the alphabet {x± , y ± , z ± }. A left transversal for E in A is given by T = {1, x}. It is known [GŠ07] that the Hanoi Towers group H is a regular branch group over its commutator H ′ , which is of index 8 in H, and that the index of H ′ × H ′ × H ′ in H ′ is 12. The Apollonian group A has index 4 in H and contains the commutator H ′ . Moreover, E = H ′ , implying that A is a regular branch group, branching over E. The index of E × E × E in E is 12, and a transversal is given by T ′ = {1, yx, (yx)2 , x2 , y 2 , z 2 , x2 yx, y 3 x, z 2 yx, x2 (yx)2 , y 2 (yx)2 , z 2 (yx)2 }. (1, 1, 1) =1 (x, y, 1)(1 3 2) = yx ≡ 1, 2 (x, yx, y)(1 2 3) = (yx) (y, y, 1) = x2 (x, 1, x) =y 2 =z 2 (1, z, z) 2 2 (yx, y , 1)(1 3 2) = x yx 2 (x , y, x)(1 3 2) (x, zy, z)(1 3 2) 3 =y x 2 = z yx ≡ x, (1, y, 1)(1 2) =x ≡ 1, (y, yx, 1)(2 3) = xyx (yx, yx, y)(1 3) = x(yx) ≡ 1, (y, y 2 , 1)(1 2) = x3 ≡ 1, ≡ 1, (1, yx, x)(1 2) ≡ 1, (z, y, z)(1 2) ≡ 1, 2 ≡ 1, ≡ 1, 2 2 2 = xy 2 = xz 2 3 (y , y x, 1)(2 3) = x yx (y, yx , x)(2, 3) (zy, yx, z)(2 3) 3 = xy x 2 = xz yx ≡ x, ≡ x, ≡ x, ≡ x, ≡ x, ≡ x, ≡ x, ≡ x, (yx, y 2 x, y)(1 2 3) = x2 (yx)2 ≡ 1, (y 2 x, y 2 x, y)(1 3) = x3 (yx)2 ≡ x, (x, zyx, zy)(1 2 3) = z 2 (yx)2 ≡ 1, (zyx, yx, zy)(1 3) = xz 2 (yx)2 ≡ x, (x2 , yx, xy)(1 2 3) = y 2 (yx)2 ≡ 1, (yx, yx2 , xy)(1 3) = xy 2 (yx)2 ≡ x, Table 1. The cosets of E × E × E decomposing the cosets of E 14 ZORAN ŠUNIĆ AND JONE URIA-ALBIZURI Denote by Xn and Yn the number of portraits of depth at most n in the cosets 1E and xE respectively. The coset decomposition provided in Table 1 implies that Xn+1 = 3Xn3 + 9Xn Yn2 , Yn+1 = 3Yn3 + 9Xn2 Yn . which then yields an+1 = Xn+1 + Yn+1 = 3(Xn + Yn )3 = 3a3n . Taking into account the initial condition a0 = 7, we obtain an = 3 induction. 3n −1 2 n 73 by  References [Bar98] Laurent Bartholdi. The growth of Grigorchuk’s torsion group. Internat. Math. Res. Notices, (20):1049–1054, 1998. [dlH00] Pierre de la Harpe. Topics in geometric group theory. Chicago Lectures in Mathematics. University of Chicago Press, Chicago, IL, 2000. [FAZR14] Gustavo A. Fernández-Alcober and Amaia Zugadi-Reizabal. GGS-groups: order of congruence quotients and Hausdorff dimension. Trans. Amer. Math. Soc., 366(4):1993– 2017, 2014. [GNŠ06] Rostislav Grigorchuk, Volodymyr Nekrashevych, and Zoran Šunić. Hanoi towers groups. In Topological and Geometric Methods in Group Theory, volume 3 issue 2 of Oberwolfach Reports. 2006. [Gri80] R. I. Grigorčuk. On Burnside’s problem on periodic groups. Funktsional. Anal. i Prilozhen., 14(1):53–54, 1980. [Gri83] R. I. Grigorchuk. On the Milnor problem of group growth. Dokl. Akad. Nauk SSSR, 271(1):30–33, 1983. [Gri84] R. I. Grigorchuk. Degrees of growth of finitely generated groups and the theory of invariant means. Izv. Akad. Nauk SSSR Ser. Mat., 48(5):939–985, 1984. [Gri05] Rostislav Grigorchuk. Solved and unsolved problems around one group. In Infinite groups: geometric, combinatorial and dynamical aspects, volume 248 of Progr. Math., pages 117–218. Birkhäuser, Basel, 2005. [Gro81] Mikhael Gromov. Groups of polynomial growth and expanding maps. Inst. Hautes Études Sci. Publ. Math., (53):53–73, 1981. [GS83] Narain Gupta and Saı̈d Sidki. On the Burnside problem for periodic groups. Math. Z., 182(3):385–388, 1983. [GŠ06] Rostislav Grigorchuk and Zoran Šuniḱ. Asymptotic aspects of Schreier graphs and Hanoi Towers groups. C. R. Math. Acad. Sci. Paris, 342(8):545–550, 2006. [GŠ07] Rostislav Grigorchuk and Zoran Šunić. Self-similarity and branching in group theory. In Groups St. Andrews 2005. Vol. 1, volume 339 of London Math. Soc. Lecture Note Ser., pages 36–95. Cambridge Univ. Press, Cambridge, 2007. [Mil68a] J. Milnor. A note on curvature and fundamental group. J. Differential Geometry, 2:1–7, 1968. [Mil68b] John Milnor. Growth of finitely generated solvable groups. J. Differential Geometry, 2:447–449, 1968. [Mil68c] John Milor. Problem 5603. Amer. Math. Monthly, 75:685–686, 1968. [Nek05] Volodymyr Nekrashevych. Self-similar groups, volume 117 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 2005. [Sid87] Said Sidki. On a 2-generated infinite 3-group: subgroups and automorphisms. J. Algebra, 110(1):24–55, 1987. [Šva55] A. S. Švarc. A volume invariant of coverings. Dokl. Akad. Nauk SSSR (N.S.), 105:32–34, 1955. Department of Mathematics, Hofstra University, Hempstead, NY 11549, USA E-mail address: [email protected] Department of Mathematics, University of the Basque Country, UPV/EHU, Leioa, Bizkaia, Spain. E-mail address: [email protected]
4math.GR
On Zariski’s Cancellation Problem in positive characteristic Neena Gupta Stat-Math Unit, Indian Statistical Institute arXiv:1309.1368v1 [math.AC] 5 Sep 2013 203 B.T. Road, Kolkata 700108, India e-mail: [email protected], [email protected] Abstract In this paper we shall show that when k is a field of positive characteristic the affine space Ank is not cancellative for any n ≥ 3. 1 Introduction Let k be an algebraically closed field. The Zariski Cancellation Problem for Affine Spaces asks whether the affine space Ank is cancellative, i.e., if V is an affine k-variety such that V × A1k ∼ , does it follow that V ∼ = An+1 = Ank ? Equivalently, if A is an affine k-algebra such k that A[X] is isomorphic to the polynomial ring k[X1 , . . . , Xn+1 ], does it follow that A is isomorphic to k[X1 , . . . , Xn ]? The affine line A1k was shown to be cancellative by S. S. Abhyankar, P. Eakin and W. J. Heinzer ([1]) and the affine plane A2k was shown to be cancellative by T. Fujita, M. Miyanishi and T. Sugie ([4], [7]) in characteristic zero and by P. Russell ([8]) in positive characteristic. However, in [5], the author showed when ch. k > 0, the affine space A3k is not cancellative by proving that a threefold constructed by Asanuma in [2] is not isomorphic to the polynomial ring k[X1 , X2 , X3 ]. In this paper, we shall show when ch. k > 0, the affine space Ank is not cancellative for any n ≥ 3 (Theorem 3.6). This completely settles the Zariski’s Cancellation problem in positive characteristic. 2 Preliminaries We shall use the notation R[n] for a polynomial ring in n variables over a ring R. We shall also use the following term from affine algebraic geometry. Definition. An element f ∈ k[Z, T ] is called a line if k[Z, T ]/(f ) = k [1] . A line f is called a non-trivial line if k[Z, T ] 6= k[f ][1] . 1 We recall the definition of an exponential map (a formulation of the concept of Ga -action) and associated invariants. Definition. Let A be a k-algebra and let φ : A → A[1] be a k-algebra homomorphism. For an indeterminate U over A, let the notation φU denote the map φ : A → A[U]. φ is said to be an exponential map on A if φ satisfies the following two properties: (i) ε0 φU is identity on A, where ε0 : A[U] → A is the evaluation at U = 0. (ii) φV φU = φV +U , where φV : A → A[V ] is extended to a homomorphism φV : A[U] → A[V, U] by setting φV (U) = U. The ring of φ-invariants of an exponential map φ on A is a subring of A given by Aφ = {a ∈ A | φ(a) = a}. An exponential map φ is said to be non-trivial if Aφ 6= A. For an affine domain A over a field k, let EXP(A) denote the set of all exponential maps on A. The Derksen invariant of A is a subring of A defined by DK(A) = k[f | f ∈ Aφ , φ a non-trivial exponential map]. We recall below a crucial observation (cf. [5, Lemma 2.4]). Lemma 2.1. Let k be a field and A = k [n] , where n > 1. Then DK(A) = A. We shall also use the following result proved in [5, Lemma 3.3]. Lemma 2.2. Let B be an affine domain over an infinite field k. Let f ∈ B be such that f − λ is a prime element of B for infinitely many λ ∈ k. Let φ be a non-trivial exponential map on B such that f ∈ B φ . Then there exist infinitely many β ∈ k such that each f −β is a prime element of B and φ induces a non-trivial exponential map φ̂ on B/(f − β). Moreover, B φ /(f − β)B φ is contained in (B/(f − β))φ̂ . We shall also use the following result proved in [6, Theorem 3.7]. Theorem 2.3. Let k be a field and A be an integral domain defined by A = k[X, Y, Z, T ]/(X mY − F (X, Z, T )), where m > 1. Set f (Z, T ) := F (0, Z, T ). Let x, y, z and t denote, respectively, the images of X, Y , Z and T in A. Suppose that DK(A) 6= k[x, z, t]. Then the following statements hold. (i) There exist Z1 , T1 ∈ k[Z, T ] and a0 , a1 ∈ k [1] such that k[Z, T ] = k[Z1 , T1 ] and f (Z, T ) = a0 (Z1 ) + a1 (Z1 )T1 . (ii) If k[Z, T ]/(f ) = k [1] , then k[Z, T ] = k[f ][1] . 2 An exponential map φ on a graded ring A is said to be homogeneous if φ : A → A[U] becomes homogeneous when A[U] is given a grading induced from A such that U is a homogeneous element. We state below a result on homogenization of exponential maps due to H. Derksen, O. Hadas and L. Makar-Limanov ([3], cf. [5, Theorem 2.3]). Theorem 2.4. Let A be an affine domain over a field k with an admissible proper Z-filtration and gr(A) the induced Z-graded domain. Let φ be a non-trivial exponential map on A. Then φ induces a non-trivial homogeneous exponential map φ̄ on gr(A) such that ρ(Aφ ) ⊆ gr(A)φ̄ . 3 Main Theorems Throughout the paper, k will denote a field (of any characteristic unless otherwise specified) and A an integral domain defined by A = k[X1 , . . . , Xm , Y, Z, T ]/(X1r1 · · · Xm rm Y − F (X1 , . . . , Xm , Z, T )), where ri > 1 for each i, 1 ≤ i ≤ m. The images of X1 , . . . , Xm , Y , Z and T in A will be denoted by x1 , . . . , xm , y, z and t respectively. Set B := k[x1 , . . . , xm , z, t](= k [m+2] ). We note that B ֒→ A ֒→ B[(x1 · · · xm )−1 ]. For each m-tuple (q1 , . . . , qm ) ∈ Zm , consider the Z-grading on B[(x1 · · · xm )−1 ] given by M M Bi , where Bi = k[z, t]x1 i1 x2 i2 . . . xm im . B[(x1 · · · xm )−1 ] = i∈Z (i1 ,...,im )∈Zm ,q1 i1 +q2 i2 +···+qm im =i P Each element a ∈ B[(x1 · · · xm )−1 ] can be uniquely written as a = ℓa ≤j≤ua aj , where aj ∈ Bj . (Note that if a ∈ B then aj ∈ B for each j, ℓa ≤ j ≤ ua .) We call ua the degree of a and aua the leading homogeneous summand of a. Using this gradingL on B[(x1 · · · xm )−1 ], we can define a proper Z-filtration {An }n∈Z on A by setting An := A ∩ i≤n Bi . Then xj ∈ Aqj \ Aqj −1 , 1 ≤ j ≤ m and z, t ∈ A0 \ A−1 . Since A is an integral domain, we have F 6= 0 and hence FuF 6= 0. Thus, y L ∈ Ab \ Ab−1 , where b = uF − (q1 r1 + · · · + qm rm ). Let gr A denote the induced graded ring n∈Z An /An−1 . Note that each element h ∈ A can be uniquely written as sum of monomials of the form x1 i1 · · · xm im z j1 tj2 y ℓ , (1) where ij ≥ 0, 1 ≤ j ≤ m and ℓ ≥ 0 satisfying that if ℓ > 0 then is < rs for at least one s, 1 ≤ s ≤ m. Therefore, it can be seen that, if h ∈ An \An−1 then h can be uniquely written as sum of monomials of the form as in equation (1) and each of these monomials lies in An . Thus, the filtration defined on A is admissible with the generating set Γ := {x1 , . . . , xm , y, z, t} and so gr A is generated by image of Γ in gr A (cf. [5, Remark 2.2 (2)]). We now exhibit a structure of gr A when FuF is not divisible by xj for any j. Lemma 3.1. Suppose that FuF is not divisible by xj for any j, 1 ≤ j ≤ m, then gr A is isomorphic to k[X1 , . . . , Xm , Y, Z, T ] D= . r1 (X1 · · · Xm rm Y − F (X1 , . . . , Xm , Z, T )uF ) 3 Proof. For a ∈ A, let gr(a) denote the image of a in gr A. Then, as discussed above, gr A is generated by gr(x1 ), . . . , gr(xm ), gr(y), gr(z) and gr(t). Note that if a ∈ B(⊆ A), then gr(a) = gr(aua ). As x1 r1 · · · xm rm y(= F ) ∈ AuF \ AuF −1 and hence x1 r1 · · · xm rm y − F (x1 , . . . , xm , z, t)uF ∈ AuF −1 . Therefore, gr(x1 )r1 · · · gr(xm )rm gr(y) − gr(FuF ) = 0 in gr A. Since FuF is not divisible by xj for any j, 1 ≤ j ≤ m, D is an integral domain. As gr A can be identified with a subring of gr(B[(x1 · · · xm )−1 ]) ∼ = B[(x1 · · · xm )−1 ], we see that the elements gr(x1 ), . . . , gr(xm ), gr(z), gr(t) of gr A are algebraically independent over k. Hence gr A ∼ = D. Lemma 3.2. We have B(= k[x1 , . . . , xm , z, t]) ⊆ DK(A). Proof. Define φ1 by φ1 (xj ) = xj for each j, 1 ≤ j ≤ m, φ1 (z) = z, φ1 (t) = t + x1 r1 · · · xm rm U and F (x1 , . . . , xm , z, t + x1 r1 · · · xm rm U) φ1 (y) = = y + Uα(x1 , . . . , xm , z, t, U) x1 r1 · · · xm rm and define φ2 by φ2 (xj ) = xj for each j, 1 ≤ j ≤ m, φ2 (t) = t, φ2 (z) = z + x1 r1 · · · xm rm U, φ2 (y) = F (x1 , . . . , xm , z + x1 r1 · · · xm rm U, t) = y + Uβ(x1 , . . . , xm , z, t, U). x1 r1 · · · xm rm Note that α(x1 , . . . , xm , z, t, U), β(x1 , . . . , xm , z, t, U) ∈ k[x1 , . . . , xm , z, t, U] and that k[x1 , . . . , xm , z] and k[x1 , . . . , xm , t] are algebraically closed in A of transcendence degree m + 1 over k. It then follows that φ1 and φ2 are nontrivial exponential maps on A with Aφ1 = k[x1 , . . . , xm , z] and Aφ2 = k[x1 , . . . , xm , t]. Hence k[x1 , . . . , xm , z, t] ⊆ DK(A). We now prove a generalisation of Theorem 2.3. Proposition 3.3. Suppose that f (Z, T ) := F (0, . . . , 0, Z, T ) 6= 0 and that DK(A) = A. Then the following statements hold. (i) There exist Z1 , T1 ∈ k[Z, T ] and a0 , a1 ∈ k [1] such that k[Z, T ] = k[Z1 , T1 ] and f (Z, T ) = a0 (Z1 ) + a1 (Z1 )T1 . (ii) Suppose that k[Z, T ]/(f ) = k [1] . Then k[Z, T ] = k[f ][1] . Proof. (i) We prove the result by induction on m. The result is true for m = 1 by Theorem 2.3. Suppose that m > 1. Set B := k[x1 , x2 , . . . , xm , z, t](⊆ A). Since DK(A) = A, there exists an exponential map φ on A such that Aφ * B. Let g ∈ Aφ \ B. Since g ∈ / B, by equations (1), there exists a monomial in g which is of the form x1 i1 . . . xm im z j1 tj2 y ℓ where ℓ > 0 and is < rs for some s, 1 ≤ s ≤ m. Without loss of generality, we may assume that s = 1. Consider the proper Z-filtration on A with respect to (−1, 0, . . . , 0) ∈ Zm and let A denote the induced graded ring. For h ∈ A, let h̄ denote the image of h in A. Since 4 A is an integral domain, we have F (0, x2 , . . . , xm , z, t) 6= 0 and so, F (x1 , . . . , xm , z, t)uF = F (0, x2 , . . . , xm , z, t) = G (say). Since f (Z, T ) 6= 0, by Lemma 3.1, we have A∼ = k[X1 , . . . , Xm , Y, Z, T ]/(X1r1 · · · Xm rm Y − G). By Theorem 2.4, φ induces a non-trivial homogeneous exponential map φ̄ on A such that φ̄ φ̄ ḡ ∈ A . By the choice of g and the filtration defined on A, we have ȳ | ḡ. Since A is φ̄ factorially closed in A (cf. [5, Lemma 2.1 (i)]), it follows that ȳ ∈ A . We now consider the proper Z-filtration on A with respect to (−1, −1, . . . , −1) ∈ Zm and e denote the induced graded ring. For h̄ ∈ A, let e e Since let A h denote the image of h̄ in A. f (Z, T ) 6= 0, we have GuG = f (z, t) and hence by Lemma 3.1, e∼ A = k[X1 , . . . , Xm , Y, Z, T ]/(X1r1 · · · Xm rm Y − f (Z, T )). e such Again by Theorem 2.4, φ̄ induces a non-trivial homogeneous exponential map φe on A e e φ φ e e that ye ∈ A . Since tr. degk A = m + 1, there exist m algebraically independent elements in eφe over k[e A y ]. e φ e eφe is algebraically closed in A, e we have A eφe = If A ⊆ k[e y , ze, e t], then since m ≥ 2 and A rm eφe is eφe as A e(= f (e z, e t)) ∈ k[e y , ze, e t], we have xe1 , . . . , xf e∈ A k[e y , ze, e t]. Since xe1 r1 · · · xf m, y m y e This would contradict the fact that φe is non-trivial. Thus, there factorially closed in A. eφe \ k[e y , ze, e t]. Hence, h contains a monomial which is exists an homogeneous element h ∈ A divisible by xei for some i, 1 ≤ i ≤ m. Without loss of generality we may assume that xe2 divides a monomial of h. e with respect to the m-tuple (0, 1, 0, . . . , 0) ∈ Now again consider the proper Z-filtration on A e For e of A. e Then gr A e∼ Zm defined as in Lemma 3.1 and the induced graded ring gr A = A. e let gr(a) denote the image of e e Then gr(x2 ) | gr(h) in gr A. Again by e a ∈ A, a in gr A. e such that Theorem 2.4, φe induces a non-trivial homogeneous exponential map gr φ on gr A gr φ gr φ gr(y) and gr(h) ∈ gr A . Since gr(x2 ) | gr(h) in gr A, we have gr(x2 ) ∈ gr A . Let F be an algebraic closure of the field k. Then gr φ induces a non-trivial exponential map ψ on e ⊗k F ∼ E = gr A = F [X1 , . . . , Xm , Y, Z, T ] = F [xˆ1 , . . . , xˆm , ẑ, t̂, ŷ], (X1 r1 · · · Xm rm Y − f (Z, T )) such that F [ŷ, xˆ2 ] ⊆ E ψ . Since xˆ2 − λ is a prime element in E for every λ ∈ F ∗ , by Lemma 2.2, ψ induces a non-trivial exponential map on E/(xˆ2 − λ)E(∼ = F [X1 , X3 , . . . , Xm , Y, Z, T ] (λr2 X1 r1 X3 r3 · · · Xm rm Y − f (Z, T )) for some λ ∈ F ∗ such that the image of ŷ lies in the ring of invariants. Therefore, using Lemma 3.2, we have DK(E/(xˆ2 − λ)E) = E/(xˆ2 − λ)E. We are thus through by induction on m. (ii) Suppose that f (Z, T ) is a line in k[Z, T ]. Then A/(x1 , . . . , xm ) = k[Y, Z, T ]/(f (Z, T )) ∼ = [2] ∗ ∗ k and hence (A/(x1 , . . . , xm )) = k . By (i) above, there exist Z1 , T1 ∈ k[Z, T ] and 5 a0 , a1 ∈ k [1] such that k[Z, T ] = k[Z1 , T1 ] and f (Z, T ) = a0 (Z1 ) + a1 (Z1 )T1 . If a1 (Z1 ) = 0, then f (Z, T ) = a0 (Z1 ) must be a linear polynomial in Z1 and hence a variable in k[Z, T ]. Now suppose a1 (Z1 ) 6= 0. As f (Z, T ) is irreducible in k[Z, T ], a0 (Z1 ) and a1 (Z1 ) are coprime 1 in k[Z1 ]. Hence A/(x1 , . . . , xm ) ∼ ][1] and since (A/(x1 , . . . , xm ))∗ = k ∗ , we have = k[Z1 , a1 (Z 1) a1 (Z1 ) ∈ k ∗ . This again implies that f (Z, T ) is a variable in k[Z, T ]. We now deduce a result for a field of positive characteristic. Corollary 3.4. Suppose that ch. k > 0 and that f (Z, T ) ∈ k[Z, T ] is a non-trivial line in k[Z, T ]. Then, A ≇ k [m+2] . Proof. Suppose, if possible that A ∼ = k [m+2] . Then, by Lemma 2.1, DK(A) = A. Therefore, by Proposition 3.3(ii), k[Z, T ] = k[f ][1] . This contradicts the given hypothesis. Theorem 3.5. Let k be a field of any characteristic and A an integral domain defined by A = k[X1 , . . . , Xm , Y, Z, T ]/(X1r1 · · · Xm rm Y − f (Z, T )), where ri > 1 for each i. Suppose that f (Z, T ) is a line in k[Z, T ]. Then A[1] = k[X1 , . . . , Xm ][3] ∼ = k [m+3] . Proof. Let h ∈ k[Z, T ] be such that k[Z, T ] = k[h] + (f )k[Z, T ]. Let P, Q ∈ k [1] be such that Z = P (h) + f P1 (Z, T ) and T = Q(h) + f Q1 (Z, T ) for some P1 , Q1 ∈ k[Z, T ]. Let W be an indeterminate over A. Set W1 : = X1 r1 · · · Xm rm W + h(Z, T ) Z1 : = (Z − P (W1 ))/X1 r1 · · · Xm rm T1 : = (T − Q(W1 ))/X1 r1 · · · Xm rm . Let y be the image of Y in A. We show that A[W ] = k[X1 , . . . , Xm , Z1, T1 , W1 ]. Set B := k[X1 , . . . , Xm , Z1 , T1 , W1 ]. We have Z = P (W1 ) + X1 r1 · · · Xm rm Z1 , T = Q(W1 ) + X1 r1 · · · Xm rm T1 , f (Z, T ) f (X1 r1 · · · Xm rm Z1 + P (W1 ), X1 r1 · · · Xm rm T1 + Q(W1 )) y = = X1 r 1 · · · Xm r m X1 r 1 · · · Xm r m f (P (W1 ), Q(W1 )) = + α(X1 , . . . , Xm , Z1 , T1 , W1 ), X1 r 1 · · · Xm r m W1 − h(X1 r1 · · · Xm rm Z1 + P (W1 ), X1 r1 · · · Xm rm T1 + Q(W1 )) W1 − h(Z, T ) = W = X1 r 1 · · · Xm r m X1 r 1 · · · Xm r m W1 − h(P (W1 ), Q(W1 )) + β(X1 , . . . , Xm , Z1 , T1 , W1 ) = X1 r 1 · · · Xm r m 6 for some α, β ∈ B. Since f (P (W1 ), Q(W1 )) = 0 and h(P (W1 ), Q(W1 )) = W1 , we see that y, W ∈ B. Hence, A[W ] ⊆ B. We now show that B ⊆ A[W ]. We have, Z − P (W1 ) Z − P (X1 r1 · · · Xm rm W + h(Z, T )) = X1 r 1 · · · Xm r m X1 r 1 · · · Xm r m f (Z, T )P1(Z, T ) Z − P (h(Z, T )) + γ(X1 , . . . , Xm , Z, T, W ) = r1 rm + γ(X1 , . . . , Xm , Z, T, W ) = X1 · · · Xm X1 r 1 · · · Xm r m = P1 (Z, T )y + γ(X1 , . . . , Xm , Z, T, W ), Z1 = and T − Q(W1 ) T − Q(X1 r1 · · · Xm rm W + h(Z, T )) = X1 r 1 · · · Xm r m X1 r 1 · · · Xm r m f (Z, T )Q1(Z, T ) T − Q(h(Z, T )) + δ(X1 , . . . , Xm , Z, T, W ) = r1 rm + δ(X1 , . . . , Xm , Z, T, W ) = X1 · · · Xm X1 r 1 · · · Xm r m = Q1 (Z, T )y + δ(X1 , . . . , Xm , Z, T, W ) T1 = for some γ, δ ∈ A[W ]. Thus, Z1 , T1 ∈ A[W ]. Hence B ⊆ A[W ]. Since B = k[X1 , . . . , Xm ][3] , the result follows. Theorem 3.6. When k is a field of positive characteristic, Zariski’s Cancellation Conjecture does not hold for the affine n-space Ank for any n ≥ 3. Proof. There exists non-trivial line in k[Z, T ] when ch k = p > 0. For instance, we may take 2 the Nagata’s line f (Z, T ) = Z p + T + T qp , where q is a prime other than p. The result now follows from Theorem 3.5 and Corollary 3.4. References [1] S. Abhyankar, P. Eakin and W. Heinzer, On the uniqueness of the coefficient ring in a polynomial ring, J. Algebra 23 (1972) 310–342. [2] T. Asanuma, Polynomial fibre rings of algebras over Noetherian rings, Inventiones Math. 87 (1987) 101–127. [3] H. Derksen, O. Hadas and L. Makar-Limanov, Newton polytopes of invariants of additive group actions, J. Pure and Applied Algebra 156 (2001) 187–197. [4] T. Fujita, On Zariski problem, Proc. Japan Acad. 55(A) (1979) 106–110. [5] Neena Gupta, On the Cancellation Problem for the Affine Space A3 in characteristic p, Inventiones Math. DOI 10.1007/s00222-013-0455-2, available online at http://link.springer.com/article/10.1007%2Fs00222-013-0455-2 [6] Neena Gupta, On the family of affine threefolds xm y = F (x, z, t), preprint. [7] M. Miyanishi and T. Sugie, Affine surfaces containing cylinderlike open sets, J. Math. Kyoto Univ. 20 (1980) 11–42. [8] P. Russell, On Affine-Ruled rational surfaces, Math. Annalen 255(3) (1981) 287–302. 7
0math.AC
Stability and performance analysis of linear positive systems with delays using input-output methods arXiv:1703.00405v1 [math.OC] 1 Mar 2017 Corentin Briat∗ Abstract It is known that input-output approaches based on scaled small-gain theorems with constant Dscalings and integral linear constraints are non-conservative for the analysis of some classes of linear positive systems interconnected with uncertain linear operators. This dramatically contrasts with the case of general linear systems with delays where input-output approaches provide, in general, sufficient conditions only. Using these results we provide simple alternative proofs for many of the existing results on the stability of linear positive systems with discrete/distributed/neutral time-invariant/-varying delays and linear difference equations. In particular, we give a simple proof for the characterization of diagonal Riccati stability for systems with discrete-delays and generalize this equation to other types of delay systems. The fact that all those results can be reproved in a very simple way demonstrates the importance and the efficiency of the input-output framework for the analysis of linear positive systems. The approach is also used to derive performance results evaluated in terms of the L1 -, L2 - and L∞ -gains. It is also flexible enough to be used for design purposes. 1 Introduction Positive systems [1] are a class of systems that are able to represent important processes arising, among others, in epidemiology, biology, biochemistry, ecology; see e.g. [1–7]. They also naturally arise in the design of interval observers, a class of observers whose error dynamics is purposely governed by a positive system and which allows to estimate upper- and lower-bounds on the state of the system; see e.g. [8–13]. Finally, they can be used as comparison systems for the analysis of more complex systems, notably, for the analysis of systems with delays; see e.g. [14, 15]. Besides these applicability properties, they have been shown to exhibit very interesting theoretical properties. For instance, structured state-feedback controllers and certain instances of the static output-feedback controllers can be designed in a non-conservative way by solving tractable linear programs [16–18]. The L1 -, L2 - and L∞ -gains of such systems can be also easily characterized in terms of linear [19, 18, 20, 21] or semidefinite programs [22]. The robust stability analysis of such systems subject to parametric uncertainties can be exactly performed using scaled small-gain results with constant D-scalings [18, 23] or integral linear constraints [19, 18, 24], the latter being the linear counterpart of the integral quadratic constraints [25, 26]. Finally, it also got recently proved that the scaled-small gain theorem in the L2 -framework states a necessary and sufficient condition for the stability of interconnections in the special case of positive systems [23], a fact that does not hold true for general linear systems affected by time-invariant parametric uncertainties; see e.g. [27]. A possible workaround to this problem is to consider instead the L∞ -framework [28, 29] where the scaled-small gain theorem with constant D-scalings states a necessary and sufficient condition for the robust stability of linear systems. The influence of delays on the dynamics of linear positive systems and certain classes of nonlinear monotone systems have been well studied and several necessary and sufficient conditions for the stability have been obtained using various approaches; see e.g. [30, 31, 18, 32–34]. We propose here to reprove many of the existing result pertaining on linear systems using a different approach, namely, using input-output approaches ∗ Swiss Federal Institute of Technology–Zürich, Department of Biosystems Science and Engineering, Basel, Switzerland. Email: [email protected],[email protected]; url: http://www.briat.info 1 and, more specifically, using scaled-small gain results with D-scalings specialized to linear positive systems [23, 19, 18] and integral linear constraints results [19, 18, 24]. Albeit popular (see e.g. [35–47, 33, 48, 49]), input/output methods do not seem to have been applied so far for the analysis of linear positive systems with delays. We notably show that the following statements are rather immediate consequences of scaled-small gain results and integral linear constraint results: (i) A linear positive system with discrete constant time-delay is stable if and only if the same system with the delay set to 0 is also stable [30, 18]. (ii) A linear positive system with bounded discrete time-varying delay is stable if and only if the same system with constant delay is also stable [31, 18]. This is generalized in [50] to the case of time-varying distributed delays and to the case of arbitrarily large discrete-delays in [34]. (iii) A linear positive system with constant discrete delay is stable if and only if the associated Riccati equation has diagonal solutions [32, 51]. (iv) A linear positive coupled differential-difference equation with a single time-varying discrete delay is stable if and only if the same system with the delay set to 0 is also stable [52]. (v) A linear positive system with discrete time-varying delays is stable if and only if two conditions (which will stated later), known to be only necessary for the stability of general time-delay systems, are satisfied [33]. (vi) A linear positive system with distributed time-varying delay is stable if and only if the sum of the matrix acting on the non-delayed state and the integral of the distributed-delay kernel is Hurwitz stable [50]. (vii) A linear positive neutral system is stable if and only if the system with zero delay is also stable and it is strongly stable [53, 54]. In particular, it is shown that the strong stability of the difference equation together with the stability of the retarded part is equivalent to the stability of the neutral delay equation. In this regard, the contribution of the paper is not only the development of some new stability results but also to provide a different, simple and flexible approach for the analysis of linear positive systems with delays. The approach can then be extended to cope with additional uncertainties (e.g. additional parametric uncertainties, sector-nonlinearities, etc.) and can be used for design purposes (e.g. for the design of interval observers [8–13]). Outline. The structure of the paper is as follows: definitions and preliminary results are given in Section 2. General stability results for uncertain linear positive systems are presented in Section 3 and are applied to linear positive systems with discrete delays in Section 4, to linear positive delay-difference equations in Section 5, to linear positive coupled differential-difference equations in Section 6, to linear positive systems with distributed delays in Section 7, to linear positive neutral systems in Section 8. Notations. The cone of positive and nonnegative vectors of dimension n are denoted by Rn>0 and Rn≥0 , respectively. The set of positive integers is given by Z>0 . For two real full matrices A, B having the same dimension, the inequalities A > (≥)B are componentwise while for two real symmetric matrices A, B having the same dimension, the relation A ≺ B means that A − B is negative definite. We denote the set of n × n positive definite diagonal matrices by Dn≻0 . We denote by ρ(A) the spectral radius of the square matrix A. The n-dimensional vector of ones is denoted by 1n . For a vector v ∈ Rn , ||v||p denotes the standard vector p-norm while for a matrix M ∈ Rn×m , ||M ||p := max||v||p =1 ||M v||p is the matrix induced p-norm.   For some matrices M1 , . . . , Mn of appropriate dimensions, we define rowN i=1 {Mi } := M1 . . . MN and   T T T . colN . . . MN i=1 {Mi } := M1 2 2 Preliminaries 2.1 System definition Let us consider the following linear system: ẋ(t) = z(t) = Ax(t) + Ew(t), x(0) = x0 Cx(t) + F w(t) (1) where x, x0 ∈ Rn , w ∈ Rq and z ∈ Rq are the state of the system, the initial condition, the input and the output, respectively. When x0 = 0, the above system defines a linear time-invariant convolution operator Σ : w 7→ z given by Z t z(t) = h(s)w(t − s)ds (2) 0 where h(t) = CeAt E + F δ(t) where δ(t) is the Dirac distribution and whose transfer function is given by b Σ(s) := C(sI − A)−1 E + F. (3) We then have the following proposition [1]: Proposition 1 The following statements are equivalent: (i) The system (1) is (internally) positive; i.e. for any x0 ≥ 0 and any w(t) ≥ 0, we have that x(t) ≥ 0 and z(t) ≥ 0 for all t ≥ 0. (ii) The matrix A is Metzler (i.e. all the off-diagonal elements are nonnegative) and the matrices E, C, F are nonnegative (i.e. all the entries are nonnegative). 2.2 Norms and gains Let us start with the definition of the Lp -norms for signals [55]: Definition 2 Let w : R≥0 → Rn , then its Lp -norm is given by  Z ∞ 1/p  p  ||w(t)||p dt when p ∈ Z>0 . ||w||Lp := 0   ess sup ||w(t)||∞ when p = ∞ (4) t≥0 We say that w ∈ Lp if ||w||Lp is finite. The Lp -gain of the convolution operator (2) (or equivalently of the linear system (1) with x0 = 0) defined as ||Σ||Lp −Lp := sup ||Σw||Lp , (5) ||w||Lp =1 is finite if and only if A is Hurwitz stable. In particular, when the system (1) is positive, then we have that b ||Σ||Lp −Lp = ||Σ(0)|| p (6) for any p ∈ {1, 2, ∞}. Note that it is often considered that inputs need to be nonnegative. However, it is immediate to see that for positive systems, the worst-case inputs are necessarily nonnegative since the impulse response is nonnegative as well. Therefore, imposing this restriction is not necessary when defining the Lp -gain of a positive system. Also, it is interesting to note that the same definition also holds for externally positive systems, those systems for which the impulse response h(t) is nonnegative at all times but which are not internally positive. We finally have the following result that is due to [56]: 3 q×q Proposition 3 Let M ∈ R≥0 . Then, for all p ∈ {1, 2, ∞}, we have that ρ(M ) = infq ||DM D−1 ||p (7) D∈D≻0 and the infimum is a minimum whenever M is irreducible. 3 Exact stability results for uncertain linear positive systems and interconnections of positive systems The aim of this section is to recall important results regarding the stability of uncertain linear positive systems and the stability of interconnections of linear positive systems. Both theoretical and computational results are provided, the latter being stated in terms of linear or semidefinite programs. 3.1 Stability conditions for uncertain systems in LFT form We are interested here in the stability of the following uncertain systems in linear fractional form ẋ(t) = Ax(t) + Ew(t) z(t) = Cx(t) + F w(t) p w(t) = ∆z(t), ∆ ∈ B∆ where p := B∆ with p ∈ {1, 2, ∞} and q = of constant D-scalings:  PN ∆ ∈ Cq×q i=1 qi . D∆ := (8)  ∆ = diag(∆1 , . . . , ∆N ), ||∆i ||p ≤ 1 ∆i ∈ Cqi ×qi , i = 1, . . . , N (9) Associated with this uncertainty structure, we define the following set  D ∈ Rq×q D = diag(d1 Iq1 , . . . , dN IqN ) di > 0, i = 1, . . . , N  . (10) The role of the scalings is to capture the structure of the uncertainty set through the property that ∆D = D∆ p for all ∆ ∈ B∆ and all D ∈ D∆ . Such scalings allow us to reduce the conservatism of the small-gain theorem and, in some certain cases, make the conservatism vanish completely. This latter effect will happen in the context of linear positive systems and will allow us to derive nonconservative stability results. 3.1.1 General theoretical result We have the following result: Proposition 4 Assume that (A, E, C, F ) is internally positive. Then, the following statements are equivalent: p (i) The uncertain system (8) is asymptotically stable for all ∆ ∈ B∆ . (ii) A is Hurwitz stable and −1 b inf ||DΣ(0)D ||p < 1. D∈D∆ (11) Moreover, in the repeated scalar uncertainties (i.e. ∆i = δi Iqi , δi ∈ R>0 , i = 1, . . . , N ), then the above statements are equivalent to (iii) A is Hurwitz stable and b ρ(Σ(0)) < 1. 4 (12) Proof : The equivalence (i) ⇔ (ii) has been proved in [23] in the case p = 2. The case p = ∞ has been proved, for instance, in [28, 29]. Finally, the case p = 1 is dual to the case p = ∞. The equivalence (ii) ⇔ (iii) follows from Proposition 3. ♦ Interestingly, in the case p = 2, the internal stability condition on the system can be relaxed into the condition of positive domination [57, 23]. When p = 1 or p = ∞, the internal positivity condition can be substituted by an external positivity condition together with an assumption on the initial condition in order to preserve the positivity of the output (i.e. x0 must be such that CeAt x0 ≥ 0 for all t ≥ 0). Finally, since eventually positive systems can be used to efficiently represent externally positive systems, some of the results for internally positive systems are expected to remain true for these systems as well; see e.g. [58, 59]. 3.1.2 L1 scaled small-gain theorem The following result can be seen as an extension of the L1 results in [19, 20, 18]: Theorem 5 Assume that (A, E, C, F ) is internally positive. Then, the following statements are equivalent: 1 (i) The uncertain system (8) is asymptotically stable for all ∆ ∈ B∆ . (ii) There exist a positive vector λ ∈ Rn>0 and a matrix D ∈ D∆ such that  λ D1q T  A C  E < 0. F − Iq (13) −1 b Proof : Following [18], we have that ||DΣ(0)D ||1 < 1 if and only if there here exists a positive vector n λ ∈ R>0 such that the inequalities T λ ED −1 λT A + 1Tq DC + 1 DF D−1 − 1Tq T < < 0 0 hold. Right-multiplying the second inequality by D ∈ Dn≻0 yields the result. 3.1.3 (14) ♦ L2 scaled small-gain theorem The following result, proved in [23], is the positive version of the well-known L2 scaled small-gain theorem [27, 60] and is based on the Kalman-Yakubovich-Popov (KYP) Lemma for positive systems [61, 22]: Theorem 6 Assume that (A, E, C, F ) is internally positive. Then, the following statements are equivalent: 2 (i) The uncertain system (8) is asymptotically stable for all ∆ ∈ B∆ . (ii) There exist matrices P ∈ Dn≻0 and D ∈ D∆ such that  T A P + PA PE  ⋆ −D ⋆ ⋆  CT D F T D  ≺ 0. −D (15) Alternative formulations can also be obtained on the basis of the linear KYP lemma for positive systems proved in [21]: Theorem 7 Assume that (A, E, C, F ) is internally positive. Then, the following statements are equivalent: 2 (i) The uncertain system (8) is asymptotically stable for all ∆ ∈ B∆ . 5 (ii) There exist λ, µ ∈ Rn>0 , ν ∈ Rq>0 and D ∈ D∆ such that Aλ + Eν < 0 and  T  T λ C DC ν F T DC hold.   C T DF + µT A F T DF − D  E <0 (16) −1/2 b Proof : Applying the linear version of the KYP Lemma from [21] on the scaled system D1/2 Σ(s)D −1/2 where D ∈ D∆ yields the conditions Aλ + ED ν̃ < 0 and      λ C T DC C T DF D−1/2 (17) + µT A ED−1/2 < 0 T −1/2 T −1/2 T −1/2 ν̃ D F DC D F DF D −I for some positive vectors λ, ν and µ. Note that these conditions are equivalent to saying that the LMI condition in Theorem 6 holds (possibly with a different matrix D). The final result is then obtained by letting ν = D−1/2 ν̃ and by multiplying the above inequality from the right by the matrix diag(I, D1/2 ). ♦ Unfortunately, the condition (16) is not convex because of the product between λ, ν and D. In this regard, this condition may not be very convenient to work with for establishing the stability of the uncertain system 2 (8) with ∆ ∈ B∆ . Finally, it is also interesting to mention the following novel result based on a result in [62]: Theorem 8 Assume that (A, E, C, F ) is internally positive. Then, the following statements are equivalent: 2 (i) The uncertain system (8) is asymptotically stable for all ∆ ∈ B∆ . n×q (ii) There exist ζ ∈ R>0 and D ∈ D∆ such that ζ T A + DC < 0 and   −D ζ T E + DF ≺0 ⋆ −D (18) hold. Proof : To prove this one, we use a result of [62] which exactly characterizes the L2 -gain of a linear positive −1/2 b system. By applying it to the scaled system D1/2 Σ(s)D , we get the conditions ζ̃ T A + D1/2 E < 0 and   −I ζ̃ T ED−1/2 + D1/2 F −1/2 ≺0 (19) ⋆ −I n×q . A congruence transformation with respect to the matrix diag(D1/2 , D1/2 ) and the change for some ζ̃ ∈ R>0 of variables ζ = ζ̃D1/2 yield the result. ♦ Note that unlike the condition in Theorem 7, the condition in Theorem 8 is still convex but not linear. Its complexity is also higher than the complexity of the condition in Theorem 6. 3.1.4 L∞ scaled small-gain theorem The following result is the “L∞ counterpart” of Theorem 6 which can also be seen as an extension of the results in [18] and a version of the scaled small-gain theorem in the L∞ -sense: Theorem 9 Assume that (A, E, C, F ) is internally positive. Then, the following statements are equivalent: ∞ (i) The uncertain system (8) is asymptotically stable for all ∆ ∈ B∆ . (ii) There exist a positive vector λ ∈ Rn>0 and a matrix D ∈ D∆ such that    λ A E < 0. C F − Iq D1q 6 (20) b Proof : Following [18], we have that ||D−1 Σ(0)D|| ∞ < 1 if and only if there here exists a positive vector n λ ∈ R>0 such that the inequalities Aλ + ED1q D−1 Cλ + D−1 F D1q − 1q < 0 < 0 hold. Left-multiplying the second inequality by D yields the result. 3.2 (21) ♦ Stability of interconnections using Integral Linear Constraints In the current setup, we are interested in the analysis of interconnections of the form u2 u1 = = G1 u1 + d2 G2 u2 + d1 (22) where G1 : L1 7→ L1 and G2 : L1 7→ L1 are bounded linear positive time-invariant operators with transfer b1 (s) and G b 2 (s). Note that since the operators are positive, then we have that G b1 (0) ≥ 0 and functions G b 2 (0) ≥ 0. The signals u1 , u2 are the loop signals and d1 , d2 are the exogenous signals which are all assumed to G have dimensions that are compatible with the operators G1 and G2 .The next result is a simplified, specialized and extended version of the ones in [24] where ILC/separation types results have been formulated. Note that the statement (iv) has also been reported in [20] whereas the statement (v) seems novel. Theorem 10 The following statements are equivalent: (i) The interconnection (22) is well-posed, positive and stable1 . b1 (0)G b 2 (0)) < 1. (ii) We have that ρ(G p (iii) There exist some vectors π1 ∈ Rm >0 and π2 ∈ R such that the conditions hold. T b 2 (0) ≥ 0 and π T G b π1T + π2T G 1 1 (0) + π2 < 0 (23) Moreover, when the internally positive systems G1 and G2 can be represented in terms of the rational transfer bi (s) = Ci (sI − Ai )−1 Ei + Fi with Ai ∈ Rni ×ni , Ai Metzler, Ci ∈ Rsi ×ni , Ei ∈ Rni ×ri and functions G ≥0 ≥0 si ×ri Fi ∈ R≥0 , i = 1, 2, s1 = r2 , s2 = r1 , then the above statements are also equivalent to 1 2 (iv) There exist some vectors λi ∈ Rni , µ1 ∈ Rs>0 and µ2 ∈ Rs>0 such that the conditions λT1 A1 + µT1 C1 + µT1 F1 − µT2 λT2 A2 + µT2 C2 T λ2 E2 + µT2 F2 − µT1 λT1 E1 < < < < 0 0 0 0 (24) hold. i i (v) There exist some matrices Pi ∈ Dn≻0 and Qi ∈ Ss≻0 , i = 1, 2 such that the conditions 1  T A1 P1 + P1 A1  ⋆ ⋆ P1 E1 −Q2 ⋆ For some additional details about these concepts see [24] 7  C1T Q1 F1T Q1  ≺ 0 −Q1 (25) and  T A2 P2 + P2 A2  ⋆ ⋆ hold. P2 E2 −Q1 ⋆  C2T Q2 F2T Q2  ≺ 0 −Q2 (26) Proof : The proof that (i) and (ii) are equivalent follows from [24]. The equivalence between (ii) and (iii) b1 (0)G b 2 (0)) < 1 if and only if there exists follows from standard algebraic manipulations and the fact that ρ(G T b b a positive vector λ of compatible dimensions such that λ (G1 (0)G2 (0) − I) < 0. The equivalence between (iii) and (iv) follows from standard algebraic manipulations together with the change of variables µ1 = π1 and µ2 = −π2 . This statement has also been proven in [20]. To prove the equivalence between (ii) and (v), first note that from [21], the LMIs are equivalent to saying that  and    b 1 (0) T Q1 G 0 I 0 −Q2   b2 (0) T Q2 G 0 I 0 −Q1   b 1 (0) G b 1 (0) − Q2 ≺ 0 b1 (0)T Q1 G =G I   b2 (0) G b2 (0) − Q1 ≺ 0. b2 (0)T Q2 G =G I (27) (28) b 2 (0)G b1 (0)− b1 (0)G b 2 (0)−Q1 ≺ 0 or G b1 (0)T G b 2 (0)T Q2 G b 2 (0)T G b 1 (0)T Q1 G These two inequalities together imply that G Q2 ≺ 0, which are equivalent to saying that (ii) holds. The converse can be proven by first noting that (ii) 1 b2 (0)T G b1 (0)T RG b 1 (0)G b2 (0) − R ≺ 0. is equivalent to saying that there exists a matrix R ∈ Rs≻0 such that G s1 T T b 2 (0) G b 1 (0) (R + S)G b1 (0)G b 2 (0) − R ≺ This implies the existence of a sufficiently small S ∈ S≻0 such that G T T b b b b 0. Letting now Q2 = G1 (0) (R + S)G1 (0) and R = Q1 , we get that G2 (0) Q2 G2 (0) − Q1 ≺ 0 and b 1 (0)−Q2 = −G b 1 (0)T S G b 1 (0)  0. In order to prove that opening the inequality sign is not restricb 1 (0)T Q1 G G b 1 (0) − Q2  0 then we can always b 2 (0) − Q1 ≺ 0 and G b1 (0)T Q1 G b2 (0)T Q2 G tive, it is enough to note that if G T b 1 (0) − Q2 ≺ 0. b b 1 (0)T Q1 G b positively perturb the value Q2 so that we have G2 (0) Q2 G2 (0) − Q1 ≺ 0 and G The proof is completed. ♦ Note that the difference with the results in [19, 19, 20, 23] is that the above result may deal with more general systems than LTI systems with state-space realization but can deal with any type of linear positive bounded operators such as bounded integral operators. This will be useful for dealing with systems with distributed delays. It is also interesting to mention that the above result is not a small-gain result but a separation result [63, 64, 20, 24]. Note, finally, that even though the matrices Q1 and Q2 are defined to be general symmetric matrices, one can be chosen to be diagonal without losing the necessity of the result. However, it is unclear whether they can be both chosen as diagonal without losing necessity. Remark 11 It is interesting to see that the two last inequalities in (24) can be substituted by µT2 G2 (0)−µT1 < 0 while the LMI (26) can be substituted by G2 (0)T Q2 G2 (0) − Q1 ≺ 0. This will be useful when analyzing systems with distributed delays in Section 7. 4 4.1 Stability and performance of linear positive systems with discretedelays Stability analysis – the constant delay case We start with the following result [38, 46]: 8 Proposition 12 Let p ∈ {1, 2, ∞}. Then, the time-varying delay operator Dh : Lp w(t) 7→ Lp , 7→ w(t − h), h ≥ 0 (29) has unitary L1 -, L2 - and L∞ -gains. Note that by virtue of the Riesz-Thorin interpolation theorem [65], we immediately get that all the Lp -gains, for p = 1, 2, . . . , ∞, of the above delay operator are equal to 1. Proposition 13 The linear time-delay system ẋ(t) = A0 x(t) + N X Ai x(t − hi ) (30) i=1 coincides with the uncertain system (8) where A = A0 , E = [A1 . . . AN ], C = 1N ⊗ In , F = 0 and   N −shi ∆ ∈ ∆d := diag(e In ) : h ≥ 0, ℜ(s) ≥ 0 . i=1 Proof : The proof follows from direct substitutions. ♦ It is known that the system (30) is positive if and only if A0 is Metzler and Ai is nonnegative for all i = 1, . . . , N ; see e.g. [30]. We can now state the main result that unifies the results in [30, 18, 51]: Theorem 14 Assume that the system (30) is positive. Then, the following statements are equivalent: (i) The system (30) is asymptotically stable. PN (ii) The matrix i=0 Ai is Hurwitz stable. (iii) There exists a vector v ∈ Rn>0 such that v T P N i=0  Ai < 0. (iv) There exist matrices P, Qi ∈ Dn≻0 , i = 1, . . . , N , such that the Riccati inequality AT0 P + P A0 + N X  T Qi + P Ai Q−1 i Ai P ≺ 0 i=1 (31) holds. P −1 (v) A0 is Hurwitz stable and −( N i=1 Ai )A0 is Schur stable. Proof : The equivalence between the two first statements follows from the application of Theorem 9 on the system (30). Indeed, by applying the linear programming conditions of Theorem 9 we get that the system n is asymptotically stable if and only there exist vectors λ ∈ Rn>0 and ν ∈ RN >0 such that A0 λ + Eν < 0 and PN 1N ⊗ λ − ν < 0. This is equivalent to say that we have A0 λ + E(1N ⊗ λ) = ( i=0 Ai )λ < 0, which is equivalent to the first statement of the result. The equivalence between the statements (ii) and (iii) follows from standard results on the stability of Metzler matrices whereas the equivalence between (i) and (iv) follows qi from Theorem 6 where we have set D = diagN i=1 (Qi ) where Qi ∈ D≻0 . Note that in this case, the uncertainty structure is diagonal and hence D∆ is the set of diagonal matrices with positive diagonal entries. Finally, statement (v) is obtained from Proposition 3. ♦ It is interesting to provide few remarks regarding the above result. First of all, we recover the property that the stability of a linear positive system with constant and discrete-delays does not depend on the delay values and hence stability is a delay-independent property. Secondly, the second statement of the above result provides an answer to a particular version of the problem stated in [66, Problem 1.11] by E. Verriest 9 on the Riccati stability of linear time-delay systems with a single discrete and constant delay. This problem is about finding conditions on the matrices A0 and A1 (i.e. in the case N = 1) for which there exist P, Q1 ∈ Sn≻0 such that (31) holds. The above result provides a solution to this problem for the particular cases of linear positive and positively dominated systems with delays. Note that the positive systems case has also been solved in [51, 32] using different approaches. These results have since been extended to some other classes of systems in [67]. The advantages of the proposed approach over the previously mentioned ones are its simplicity and its flexibility. Indeed, while the proofs of these results in the above works involve some very technical developments, the proposed approach allows to retrieve the same results through a very simple application of the scaled small-gain theorems. Moreover, the approach can be easily extended to other types of uncertainties, to performance analysis and to design purposes. Finally, the statement (iv) in the above result is also interestingly as it generalizes the frequency-sweeping results of [38, Section 2.3] where this condition is stated as necessary for a linear system with delay to be stable. For linear positive systems, this condition is also sufficient and this result can be interpreted as a consequence of the fact that the maximum value of the spectral radius is always attained at the zero frequency. 4.2 Performance analysis – the constant delay case Let us now consider the system ẋ(t) = A0 x(t) + y(t) = C0 x(t) + N X i=1 N X Ai x(t − hi ) + Eu u(t) (32) Ci x(t − hi ) + Fu u(t) i=1 where u ∈ Rnu and y ∈ Rny are the input and the output, respectively. It is known that the above system is positive if and only if A0 is Metzler and C, Eu , Fu , Ai , Ci are nonnegative for all i = 1, . . . , N . We then have the following result: Theorem 15 Assume that the system (32) is positive. Then, the following statements hold: (i) The system (32) is asymptotically stable and has an L1 -gain smaller than γ1 if and only if there exists a vector λ ∈ Rn>0 such that #   T T "PN 0 λ Ai Eu i=0 PN < . (33) γ1 1nu 1ny Fu i=0 Ci (ii) The system (32) is asymptotically stable and has an L2 -gain smaller than γ2 if and only if there exists a matrix P, Qi ∈ Dn≻0 , i = 1, . . . , N , such that   N X N row(P Ai ) P Eu C0T  Qi AT0 P + P A0 + i=1   i=1     N N T  ≺ 0. (34)  ⋆ − diag (Q ) 0 col (C ) i i   i=1 i=1    ⋆ ⋆ −γ2 I FuT  ⋆ ⋆ ⋆ −γ2 I (iii) The system (32) is asymptotically stable and has an L∞ -gain smaller than γ∞ if and only if there exists a vector λ ∈ Rn>0 such that # "P    N λ 0 Ai Eu i=0 PN < . (35) γ∞ 1ny Fu 1nu i=0 Ci 10 Proof : The proof of this result is based on the fact that we can also rewrite the performance characterization problem as a robust stability problem by setting u = M y where M ≥ 0 is a full-block matrix such that ||M ||p = γp−1 (or, equivalently, ||M ||p ≤ γp−1 ). Since for linear positive systems scaled-small gain results are non-conservative, then the stability of the interconnection is equivalent to the fact that the Lp -gain of the transfer u 7→ y is at most (or smaller than) γp . Note, however, that the interconnection result applies to square uncertainties, a condition that is violated when nu 6= ny (recall that the consideration of D scalings requires the uncertainty to be square). This issue can be easily resolved by suitably augmenting the vector y or the vector u and appropriately padding the associated matrices with zeros. We only prove this result in the L1 -gain case, the others are analogous, and we also assume, without loss of generality, that nu = ny . To this aim, let us consider the interconnection    ẋ z  y row(Ai )  =  1N ⊗ In C0 w u  Eu  x     0  w u F N A0 i=1 0 N row(Ci ) u i=1 = ∆z, ∆ ∈ ∆d = M y, ||M ||1 ≤ γ1−1 . (36) Applying now Theorem 5 on the above system with the extended uncertainty ∆e = diag(∆, M ) with extended n scaling De = diag(D, ǫInu ), D ∈ DN ≻0 , ǫ > 0, yields  T λ̃  µ̃  ǫ1Tny  A0  1N ⊗ In  C0 N row(Ai ) i=1 0 N row(Ci ) i=1  T  0   µ̃  . 0 < ǫγ1 1nu Fu Eu (37) Solving for µ̃ as in the proof of Theorem 14, dividing everything by ǫ and using the change of variables λ = λ̃/ǫ yield the result. ♦ 4.3 Stability analysis – the time-varying delay case We extend here the previous results to the case of time-varying discrete-delays. Interestingly, this class of delays includes, as a special case, scale-delays [68, 46]. A remark will be made in this regard. Note also that this case is different from the previous one as the gain of the delay operator will be different depending on the considered norm. This is formalized in the following result [38, 69, 46]: Proposition 16 Let p ∈ {1, 2, ∞}. Then, the time-varying delay operator Th : Lp w(t) 7→ Lp 7→ w(t − h(t)), h(t) ≥ 0 (38) has • an Lp -gain equal to (1 − η)−1/p where ḣ(t) ≤ η < 1, p ∈ Z>0 and • an L∞ -gain equal to 1. The above result clearly shows that, unlike for the constant delay-operator, the value of the gain of the timevarying delay operator depends on the considered norm. Note also that while the Lp -gains, p ∈ Z>0 , depend on the maximum rate of change of the delay, the L∞ -gain does not, a property that makes it appropriate for the consideration of fast-varying delays. This fact is not surprising since delay operators do not change the amplitude of the input signal but may change the value of its integral by appropriately distorting time; see e.g. [42]. Yet, it is possible to determine a finite L2 -gain when the rate of change of the delay may exceed 11 one (see [70]) and an analogous result for the L1 -gain seems to be still missing. Finally, it is interesting to note that the L∞ -gain is smaller than the others since 1 < (1 − η)−1/p for any p ∈ Z>0 and, in this regard, this gain may be more interesting to use than the other. This claim will be supported by the main results of the section but, before proving them, we need to state the following preliminary result: Proposition 17 The linear delay system ẋ(t) = A0 x(t) + N X Ai x(t − hi (t)) (39) i=1 coincides with the uncertain system (8) where A = A0 , E = [A1 . . . AN ], C = 1N ⊗ In , F = 0 and   N ∆ ∈ diag(In ⊗ Thi ) : hi : R≥0 → R≥0 , i = 1, . . . , N . i=1 We can now state the main result that unifies the results in [30, 31, 18, 34] Theorem 18 Assume that the system (39) is internally positive and that t − hi (t) → ∞ as t → ∞ for all i = 1, . . . , N . Then, the following statements are equivalent: (i) The system (39) is asymptotically stable. P (ii) The matrix N i=0 Ai is Hurwitz stable. (iii) There exist vectors λ, µi ∈ Rn>0 , i = 1, . . . , N such that  # " N λ row(Ai )  N A0  < 0. i=1 col(µi ) 1N ⊗ In −InN (40) i=1 Proof : First note that since the delays are time-varying, then the second statement is necessary for the stability of the system (39) and, hence, (i) implies (ii). Note also that (ii) and (iii) are equivalent from Theorem 14. Finally, using Theorem 9 and the fact that the L∞ -gain of the time-varying delay operator is equal to one, we can conclude that (iii) implies (i), which completes the proof. ♦ Interestingly, we can see that a necessary and sufficient condition for a linear positive time-delay system PN with constant or time-varying discrete-delays is that i=0 Ai be Hurwitz stable. As a consequence, the existence of diagonal solutions P, Qi ∈ Dn≻0 , i = 1, . . . , N to the Riccati inequality AT0 P + P A0 + N X i=1  T Qi + P Ai Q−1 i Ai P ≺ 0 (41) is also a necessary and sufficient condition for the stability of linear positive systems with time-varying delays. This result is, however, rather surprising if we take into account the fact that if we were applying the L2 -scaled small-gain result (i.e. Theorem 6) on the system (39), we would get the following Riccati inequality N X  T Qi + (1 − ηi )−1 P Ai Q−1 (42) AT0 P + P A0 + i Ai P ≺ 0 i=1 where the ηi ’s are such that ḣi (t) ≤ ηi < 1, i = 1, . . . , N , for all t ≥ 0. Therefore, if (42) is feasible, then so is (41), but the converse is not true in general. In this regard, we would not be able to predict that the stability of (30) is equivalent to the stability of (39) using Theorem 6, nor even Theorem 5. More generally, the stability condition for N = 1 obtained in the Lp , p ∈ {1, 2, ∞}, framework is equivalent to saying that ρ(−A0−1 A1 ) < (1 − η)1/p (43) 12 which indicates that the L1 -based result is more conservative than the L2 -based result which is, in turn, more conservative than the L∞ -based result. Even though this remark seems contradictory with the fact that scaled small-gain results are nonconservative, it is actually not since we are considering now with time-varying operators and also because stability in the Lp -sense is analyzed. Indeed, we have the set of nonnegative continuous functions converging to 0 with finite L1 -norm is strictly included in the set of nonnegative continuous functions converging to 0 with finite L2 -norm, which is itself strictly included in the set of nonnegative continuous functions converging to 0 with finite L∞ -norm. The fact that the L∞ -based result gives the weakest stability condition demonstrates its relevance. 4.4 Performance analysis – the time-varying delay case Let us now consider the system ẋ(t) y(t) = A0 x(t) + = C0 x(t) + N X i=1 N X Ai x(t − hi (t)) + Eu u(t) (44) Ci x(t − hi (t)) + Fu u(t) i=1 where u ∈ Rnu and y ∈ Rny are the input and the output, respectively. As for system (32), the above system is internally positive if and only if A0 is Metzler and C, Eu , Fu , Ai , Ci are nonnegative for all i = 1, . . . , N . We then have the following result: Theorem 19 Assume that the system (44) is positive. Then, the following statements hold: (i) Assume that the delays are differentiable and such that ḣi (t) ≤ ηi < 1, i = 1, . . . , N . Then, the system (44) is asymptotically stable and has an L1 -gain smaller than γ1 if there exists a vector λ ∈ Rn>0 such that #   T " T PN A0 + i=1 (1 − ηi )−1 Ai Eu λ 0 PN < . (45) 1ny γ1 1nu C0 + i=1 (1 − ηi )−1 Ci Fu (ii) Assume that the delays are differentiable and such that ḣi (t) ≤ ηi < 1, i = 1, . . . , N . Then, the system (44) is asymptotically stable and has an L2 -gain smaller than γ2 if there exist matrices P, Qi ∈ Dn≻0 , i = 1, . . . , N , such that   N X N T T row(P Ai ) P Eu C0  Qi A0 P + P A0 + i=1   i=1     N N T  ≺ 0. (46)  ⋆ − diag ((1 − η )Q ) 0 col (C ) i i i   i=1 i=1    ⋆ ⋆ −γ2 I FuT  ⋆ ⋆ ⋆ −γ2 I (iii) Assume that the delays are such that t − hi (t) → ∞ as t → ∞ for all i = 1, . . . , N . Then, the system (44) is asymptotically stable and has an L∞ -gain smaller than γ∞ if and only if there exists a vector λ ∈ Rn>0 such that # "    P λ A0 + N A E 0 i u i=1 PN < . (47) γ∞ 1ny C0 + i=1 Ci Fu 1nu Proof : The proof is similar to that of Theorem 15 and is thus omitted. ♦ Remark 20 It is worth mentioning that the condition in statement (i) is necessary and sufficient while it is unclear, at the moment, whether necessity holds for the conditions in the statements (ii) and (iii). 13 5 Stability and performance of linear positive delay-difference equations 5.1 Stability analysis We consider in this section, the case of delay-difference equations [71–75, 34] of the form x(t) = N X Ai x(t − hi ) (48) i=1 where the delays hi are such that hi > 0 for all i = 1, . . . , N . Clearly, the system is positive if and only if the matrices Ai are nonnegative for all i = 1, . . . , N . Note that this system can be rewritten as the interconnection x(t) = Ew(t) (49) z(t) = Cx(t)   where E = A1 . . . An , C = 1N ⊗ In and w = ∆z, ∆ ∈ ∆d . We then have the following result: Theorem 21 Assume that the system (48) is positive. Then, the following statements are equivalent: (i) The delay-difference equation is asymptotically stable (or strongly-stable). ! N X Ai e−jωi < 1 for all ωi ∈ R, i = 1, . . . , N . (ii) ρ i=1 (iii) ρ N X i=1 Ai ! < 1. (iv) There exists a µ ∈ RnN >0 such that   N µT −InN + (1N ⊗ In ) row(Ai ) < 0 (50) i=1 holds. (v) There exists a µ ∈ RnN >0 such that µ T N X Ai − In i=1 holds. ! <0 (51) (vi) There exist diagonal matrices Qi ∈ Dn≻0 such that the LMI   N − diag(Qi ) ⋆   i=1 ≺0  N   N N diag(Qi )(1N ⊗ In ) row(Ai ) − diag(Qi ) i=1 i=1 (52) i=1 holds. Proof : The equivalence between the two first statements has been proved in [71]. The equivalence between (iii), (iv) and (v) follows from simple algebraic manipulations and the theory of nonnegative matrices. The equivalence between (iii) and (iv) follows from the fact that (52) is equivalent to N N N N i=1 i=1 i=1 i=1 − diag(Qi ) + ((1N ⊗ In ) row(Ai ))T diag(Qi )(1N ⊗ In ) row(Ai ) ≺ 0 14 (53) which is, in turn, equivalently, that ρ[(1N ⊗ In ) rowN i=1 (Ai )] = ρ P N i=1  Ai < 1. The equivalence between (ii) and (iv) can be proved using a scaled-small gain argument on the system (49). ♦ Remark 22 When the delays are time-varying, the condition in (iv) remains valid as long as the delays satisfy the condition t − hi (t) → ∞ as t → ∞ for all i = 1, . . . , N . As a result, the stability of the delaydifference equation does not depend on the value of the delays nor on their time-varying nature as long a L∞ -gain result is considered but will depend on the rate of variation of the delays when L1 -and L2 -gain results are considered. See the discussion below Theorem 18 for additional details. 5.2 Performance analysis Let us consider here the following delay-difference equation x(t) = y(t) = N X i=1 N X Ai x(t − hi ) + Eu u(t) (54) Ci x(t − hi ) + Fu u(t) i=1 where the delays hi are such that hi > 0 for all i = 1, . . . , N . Clearly, the system is positive if and only if the matrices Ai , Eu , Ci , Fu are nonnegative for all i = 1, . . . , N . We then have the following result: Theorem 23 Assume that the system (54) is positive. Then, we have the following results: (i) The system (54) is asymptotically stable and has an L1 -gain smaller than γ1 if and only if there exists a µ ∈ RnN >0 such that the condition   N N  T  T (Ai ) col(Eu ) µ µ (1N ⊗ In ) row i=1 i=1 (55) <  N 1ny γ1 1nu row(C ) F i=1 i u holds. (ii) The system (54) is asymptotically stable and has an L2 -gain smaller than γ2 if and only if there exists matrices Qi ∈ Dn≻0 such that the condition   N − diag (Q ) ⋆ ⋆ ⋆ i   i=1    ⋆ ⋆  0 −γ2 Inu   N N (56) ≺0 N N   col(Qi ) row (A ) col (Q E ) − diag (Q ) ⋆ i i u i  i=1 i=1 i=1 i=1   N row(Ci ) Fu 0 −γ2 Iny i=1 holds. (iii) The system (54) is asymptotically stable and has an L∞ -gain smaller than γ∞ if and only if there exists a µ ∈ RnN >0 such that the condition   N N     (1 ⊗ I ) row (A ) col (E ) n i u  µ µ  N i=1 i=1 < (57)   N 1nu γ∞ 1ny row(Ci ) Fu i=1 holds. 15 Proof : The proof is based on reformulating the system (54) into an LTI system interconnected with some delay operators and applying scaled small-gain results. ♦ Remark 24 Interestingly, the L∞ result remains the same when the delays are time-varying and such that t − hi (t) → ∞ as t → ∞ for all i = 1, . . . , N . As for linear positive systems with discrete-delays, the conditions for the L1 - and the L2 -gains will be different (i.e. they will depend on the rate of variation of the delays and become sufficient only). 6 Stability and performance of linear positive coupled differentialdifference equations with delays We consider here linear positive coupled differential-difference equations with delays which can be seen as an extension of the systems (30) and (48). Such systems have been, for instance, studied in [76–81] and in the references therein. In particular, the case of linear positive coupled differential-difference equations with single time-varying delay has been studied in [52] where necessary and sufficient conditions for their positivity and stability were obtained. We prove here that these results can be retrieved and extended to the case of multiple delays and to performance analysis using very simple scaled-small gain arguments. 6.1 Stability analysis Let us start with the following preliminary result: Proposition 25 The linear coupled differential-difference system with constant discrete delays ẋ1 (t) = A0 x1 (t) + x2 (t) = C0 x1 (t) + N X i=1 N X Ai x2 (t − hi ) (58) Ci x2 (t − hi ) i=1 N N coincides with the uncertain system (8) where A = A0 , E = row(Ai ), C = 1N ⊗ C0 , F = 1N ⊗ row(Ci ) and i=1 ∆ ∈ ∆d :=  i=1  N diag(e−shi In ) : h ≥ 0, ℜ(s) ≥ 0 . i=1 Proof : The proof follows from direct substitutions. ♦ It was proven in [52] that the system (58) is positive if and only if A0 is Metzler and Ai , C0 , Ci are nonnegative for all i = 1, . . . , N . Note, moreover, that this result is obvious from the description (8) with the matrices defined in Proposition 25. We can now state the main result that extends the results in [52] with the difference that constant delays are considered. Note, however, that the result still holds in the case of time-varying delays in the same way as in Section 4.3. Theorem 26 Assume that the system (58) is positive. Then, the following statements are equivalent: (i) The system (58) is asymptotically stable. 16 (ii) The matrix  N row(Ai ) A0 M :=  1N ⊗ C0 is Hurwitz stable. n(N +1) (iii) There exists a vector v ∈ R>0 i=1 N 1N ⊗ row(Ci ) − InN i=1   (59) such that v T M < 0. n (iv) There exist some matrices P ∈ Dn≻0 and Q ∈ DN ≻0 such that the generalized Riccati inequality h N AT0 P +P A0 + P row(Ai ) i  −1   N N T (1TN ⊗ col(CiT ))Q col (A )P i=1 ≺0  i=1 i −Q 1N ⊗ C0 −Q  1TN ⊗ C0T  N Q(1N ⊗ row(Ci )) i=1 i=1 (60) holds. N (v) The matrices 1N ⊗ row(Ci ) − I and i=1 are Hurwitz stable.  A0 − A1 A2  N . . . AN (1N ⊗ row(Ci ) − I)−1 (1N ⊗ C0 ) i=1 (61) (vi) The matrices A0 and  N A1 1N ⊗ row(Ci ) − I − (1N ⊗ C0 )A−1 0 i=1 are Hurwitz stable. (vii) A0 is Hurwitz stable and PN −1 i=1 (−C0 A0 Ai A2 . . . AN  (62) + Ci ) is Schur stable. Proof : The equivalence between the three first statements follows from the application of Theorem 5 on the input-output formulation of the system (58). The equivalence with the statements (iv) and (vii) comes from Theorem 6 and the fact that, for two matrices A, B of appropriate dimensions, we have that ρ(AB) = ρ(BA). The equivalence between (ii), (v) and (vi) follows from Lemma 1 in [20] or Lemma 7.2 in [82]. ♦ As for linear systems with discrete-delays, the stability of linear positive coupled differential-difference equations with delays is equivalent to that one of the same system with all the delays set to 0. 6.2 Performance analysis Let us now consider the linear coupled differential-difference system with time-varying discrete delays ẋ1 (t) x2 (t) y(t) = A0 x1 (t) + = C0 x1 (t) + = Cy0 x(t) + N X i=1 N X i=1 N X Ai x2 (t − hi (t)) + E1 u(t) Ci x2 (t − hi (t)) + E2 u(t) (63) Cyi x2 (t − hi (t)) + Fu u(t) i=1 where u ∈ Rnu and y ∈ Rny are the input and the output, respectively. It is immediate to see that this system is internally positive if and only if A0 is Metzler and Ai , C0 , Ci , E1 , E2 , Cy0 , Cyi , Fu are nonnegative for all i = 1, . . . , N . We then have the following result: 17 Theorem 27 Assume that the system (63) is positive. Then, the following statements hold: (i) Assume that the delays are differentiable and such that ḣi (t) ≤ ηi < 1, i = 1, . . . , N . Then, the system n (63) has an L1 -gain smaller than γ1 if there exists some vectors λ ∈ Rn>0 and µ ∈ RN >0 such that   N row((1 − ηi )−1 Ai ) E1 A0  T  T  i=1  λ 0  N N N N  µ   col (C0 )  µ  . (64) col(In ) row((1 − ηi )−1 Ci ) col (E2 ) < i=1 i=1 i=1 i=1   1ny γ 1 1 n N u row((1 − ηi )−1 Ci ) Fu Cy0 i=1 (ii) Assume that the delays are differentiable and such that ḣi (t) ≤ ηi < 1, i = 1, . . . , N . Then, the system (63) has an L2 -gain smaller than γ2 if there exist matrices P, Qi ∈ Dn≻0 , i = 1, . . . , N , such that  T A0 P           + P A0 + N X N row(P Ai ) Qi ⋆ row(C0T )Q i=1 P Eu i=1 i=1 N N − diag((1 − ηi )Qi ) 0 i=1 N (1N ⊗ row(Ci ))T i=1 N ⋆ ⋆ −γ2 I row(E2T ) i=1 ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ −Q ⋆ T Cy0     N  T  col(Cyi ) i=1  ≺ 0.  T Fu    0 (65) −γ2 I (iii) Assume that the delays are such that t − hi (t) → ∞ as t → ∞, i = 1, . . . , N . Then, the system (63) n has an L∞ -gain smaller than γ∞ if and only if there exists some vectors λ ∈ Rn>0 and µ ∈ RN >0 such that   N A0 row(Ai ) E1      λ  i=1 0  N N N N  col (C )    µ . (66) col(In ) row(Ci ) col(E2 )  µ < i=1 0 i=1 i=1 i=1   1 γ 1 nu ∞ ny N row(Ci ) Fu Cy0 i=1 As for systems with time-varying discrete delays, the last statement states a necessary and sufficient condition whereas it is unclear whether the conditions in the two first ones are also necessary. Note also that in the L1 and L∞ cases, the vector µ can be eliminated from the conditions by explicitly solving it. However, the benefit of the current conditions is that they are linear in the matrices of the system, thereby allowing for immediate extensions to uncertain matrices and to design purposes. 7 7.1 Stability and performance of linear positive systems with distributeddelays Stability analysis – the constant kernel case We have the following result which be proven using standard manipulations: Proposition 28 The time-varying distributed-delay operator Uh : Lp w(t) 7→ Lp , p = 2, ∞ Z 1 t 7→ w(θ)dθ, h(t) ∈ [0, h̄] h̄ t−h(t) has unitary L1 -, L2 - and L∞ -gains. 18 (67) Proposition 29 The time-delay system ẋ(t) = A0 x(t) + N X Ai i=1 Z t x(s)ds (68) t−hi (t) coincides with the uncertain system (8) where A = A0 , E = [A1 . . . AN ], C = 1N ⊗ In , F = 0 and   N ∆ ∈ diag(In ⊗ Uhi ) : hi : R≥0 → [0, h̄i ], i = 1, . . . , N . i=1 Moreover, it is internally positive if and only if the matrix A0 is Metzler and the matrices Ai , i = 1, . . . , N , are nonnegative. We then have the following result: Theorem 30 Assume that the system (78) is internally positive. Then, the following statements are equivalent: (i) The system (78) is asymptotically stable. P (ii) A0 + N i=1 h̄i Ai is Hurwitz stable. P (iii) There exists a v ∈ Rn>0 such that v T (A + N i=1 h̄i Ai ) < 0. PN (iv) A is Hurwitz stable and −( i=1 h̄i Ai )A0−1 is Schur stable. (v) There exist matrices P, Qi ∈ Dn≻0 , i = 1, . . . , N , such that the Riccati inequality AT0 P + P A0 + N X T (Qi + h̄2i P Ai Q−1 i Ai P ) ≺ 0 (69) i=1 holds. Moreover, when N = 1, then the above statements are also equivalent to (vi) A0 is Hurwitz stable and h̄1 < 1 . ρ(A−1 0 A1 ) Proof : This result is proved exactly in the same way as Theorem 14. The last statement can be straightforwardly shown to be equivalent to (iv). ♦ 7.2 Performance analysis – the constant kernel case Let us now consider the system ẋ(t) = y(t) = A0 x(t) + C0 x(t) + N X i=1 N X i=1 Ai Ci Z Z t x(s)ds + Eu u(t) t−hi (t) (70) t x(s)ds + Fu u(t) t−hi (t) where u ∈ Rnu and y ∈ Rny are the input and the output, respectively. As for system (32), the above system is internally positive if and only if A0 is Metzler and C, Eu , Fu , Ai , Ci are nonnegative for all i = 1, . . . , N . We have the following result: 19 Theorem 31 Assume that the system (70) is internally positive. Then, the following statements hold: (i) The system (70) is asymptotically stable and has an L1 -gain smaller than γ1 if and only there exists a vector λ ∈ Rn>0 such that #   T T " PN Eu A0 + i=1 h̄i Ai 0 λ PN < . (71) γ1 1nu 1ny C0 + i=1 h̄i Ci Fu (ii) The system (70) is asymptotically stable and has an L2 -gain smaller than γ2 if and only if there exist matrices P, Qi ∈ Dn≻0 , i = 1, . . . , N , such that  AT0 P + P A0 +     ⋆    ⋆ ⋆ N X Qi i=1 N row(h̄i P Ai ) P Eu i=1 N − diag(Qi ) 0 ⋆ ⋆ −γ2 I ⋆ i=1 C0T      N ≺0 col (h̄i CiT )  i=1   FuT −γ2 I (72) (iii) The system (70) is asymptotically stable and has an L∞ -gain smaller than γ∞ if and only if there exists a vector λ ∈ Rn>0 such that # "    PN Eu A0 + i=1 h̄i Ai λ 0 PN < . (73) γ∞ 1ny C0 + i=1 h̄i Ci Fu 1nu Proof : The proof follows from the same lines as the proof of Theorem 15. 7.3 ♦ Stability analysis – the non-constant kernel case To prove this result, we need to consider the result based on integral linear constraints (Theorem 10) since results based on gains would be conservative. Let us first consider the following result: Proposition 32 The distributed-delay operator VB,h : Lp w(t) 7→ Lp Z 0 7 → B(θ)w(t + θ)dθ, 0 ≤ h ≤ h̄ (74) −h is nonnegative if and only if B(θ) ≥ 0 for all θ ∈ [−h̄, 0], h ∈ [0, h̄]. Moreover, its transfer function is given by Z Vd B,h (s) = 0 B(θ)esθ dθ (75) −h d and for any 0 ≤ h ≤ h̄, we have that Vd B,h (0) ≤ VB,h̄ (0). Proof : Let z(t) = VB,h (w)(t). To prove the nonnegativity property condition, assume that Bij (s) < 0 for some s ∈ [−h̄, 0]. Then, it is immediate to see that we can pick a w such that one of the component of the 20 output is negative. Hence, the result follows. The transfer function can be computed as follows Z ∞ zb(s) = z(t)e−st dt Z0 ∞ Z 0 = B(θ)w(t + θ)e−st dθdt 0 −h Z ∞  Z 0 = B(θ) w(t + θ)e−st dt dθ −h 0 Z  0 sθ = B(θ)e dθ w(s) b (76) −h = [ V b B,h (s)w(s). ♦ Remark 33 Note that the delay can be made infinite as in [83] as long as B(θ) is integrable on (−∞, 0]. Proposition 34 The linear system with time-varying distributed-delays ẋ(t) = A0 x(t) + N Z X i=1 0 Ai (θ)x(t + θ)dθ (77) −hi (t) with hi (t) ∈ [0, h̄i ], i = 1, . . . , N , is positive if and only if A0 is Metzler and Ai (θ) ≥ 0 for all θi ∈ [−h̄i , 0] and all i = 1, . . . , N . The following result demonstrates that the stability of linear positive systems with distributed delays does not depend on the nature of the delay (i.e. whether it is time-varying or time-invariant) and only depends on the delay upper-bound [50]: Theorem 35 Assume that the system (77) is positive. Then, the statements are equivalent: (i) The linear positive system (77) with time-varying distributed-delays is asymptotically stable for any hi : R≥0 7→ [0, h̄i ]. (ii) The linear positive system with constant distributed-delays Z 0 ˙ Ai (θ)x̄(t + θ)dθ x̄(t) = A0 x̄(t) + (78) −h̄i is asymptotically stable. Proof : The proof can be found in [50] and is thus omitted here. ♦ Proposition 36 The time-delay system (78) coincides with the interconnection (22) with b 1 (s) G where E = 1TN ⊗ In and C = 1N ⊗ In . b 2 (s) G = C(sI − A0 )−1 E N = diag(V[ Ai ,h (s)) i=1 We then have the following result: R0 Theorem 37 Define Āi := −h̄i Ai (θ)dθ. Then, the following statements are equivalent: 21 (79) (i) The system (78) is asymptotically stable. PN (ii) A0 + i=1 Āi is Hurwitz stable. PN (iii) There exists a v ∈ Rn>0 such that v T (A0 + i=1 Āi ) < 0. PN (iv) A0 is Hurwitz stable and −( i=1 Āi )A−1 0 is Schur stable. (v) There exist matrices P, Qi ∈ Dn≻0 , i = 1, . . . , N , such that the (diagonal) Riccati inequality AT0 P + P A0 + N X T (Qi + P Āi Q−1 i Āi P ) ≺ 0 (80) i=1 holds. Proof : Applying Theorem 10 yields that the interconnection is well-posed, positive and stable if and only b1 (0)G b 2 (0)) < 1 or, equivalently, if and only if ρ(G b 2 (0)G b1 (0)) < 1. Expanding the product yields if ρ(G  b2 (0)G b 1 (0) = −(1N ⊗ In )A−1 Ā1 G 0 . . . ĀN  (81) and hence the spectral radius condition is equivalent to saying that the above nonnegative matrix is Schur stable. Since ρ(AB) = ρ(BA) for any matrices A, B of compatible dimensions, then we get the result of statement (iv). By exploiting the similarity of the conditions with those of Theorem 14, the other statements directly follow. ♦ The last statement in the above result is the distributed-delay analogue of the Riccati inequality for discrete delays and does not seem to have been reported elsewhere in the literature. It is also interesting to point out that the results would have been completely different if scaled small-gain theorems would have been considered. Indeed, such results would have considered the Lp -gain of the operator (74) which are given by ||V[ Ai ,h (0)||p for p ∈ {1, 2, ∞}. It is clear that, in such a case, the obtained results would have been conservative. 7.4 Performance analysis – the non-constant kernel case Let us consider here is the following system with distributed delays ẋ(t) = y(t) = A0 x(t) + C0 x(t) + N Z X 0 Ai (θ)x(t + θ)dθ + Eu u(t) i=1 −h̄i N Z 0 X i=1 (82) Ci (θ)x(t + θ)dθ + Fu u(t) −h̄i where u ∈ Rnu and y ∈ Rny are the input and the output, respectively. As for system (77), the above system is internally positive if and only if A0 is Metzler, C, Eu , Fu are nonnegative for all i = 1, . . . , N and the functions Ai (·), Ci (·) are nonnegative on their domain. Theorem 38 Assume that the system (82) is internally positive and let us define the matrices Āi := Z 0 Ai (s)ds and C̄i := Z 0 −h̄i −h̄i Then, the following statements hold: 22 Ci (s)ds. (83) (i) The system (82) is asymptotically stable and has an L1 -gain smaller than γ1 if and only there exists a vector λ ∈ Rn>0 such that #  T  T " PN 0 A0 + i=1 Āi Eu λ PN < . (84) γ1 1nu 1ny Fu C0 + i=1 C̄i (ii) The system (82) is asymptotically stable and has an L2 -gain smaller than γ2 if and only if there exist ny matrices P, Qi ∈ Dn≻0 , Ri ∈ D≻0 , i = 1, . . . , N , such that   N N X X T T T T T 1N ⊗ P 0 P Eu C0 C̄i Ri C̄i Āi Qi Āi +  A0 P + P A0 +   i=1 i=1     N   ⋆ − diag(Qi ) 0 0 0   i=1  ≺ 0.    N  ⋆ ⋆ − diag(Ri ) 0 1N ⊗ Iny    i=1    FuT  ⋆ ⋆ ⋆ −γ2 Inu ⋆ ⋆ ⋆ ⋆ −γ2 Iny (85) (iii) The system (82) is asymptotically stable and has an L∞ -gain smaller than γ∞ if and only if there exists a vector λ ∈ Rn>0 such that # "    PN λ A0 + i=1 Āi Eu 0 P < . (86) γ∞ 1ny C0 + N Fu 1nu i=1 C̄i Proof : Proof of the statement (i). From the Theorem 10 and Remark 11, this is equivalent to saying N n+N ny that there exist λ ∈ Rn>0 , µ1 , µ2 ∈ R>0 such that     T T 1TN ⊗ In 0 Eu A0 λ 0   1N ⊗ In 0 0 0  <  µ2   µ1   (87) 1N ⊗ Iny 0 0 0 1ny γ 1 1 n u C0 0 1TN ⊗ Iny Fu   N  N  T T together with µ2 D − µ1 < 0 where D = diag diag Āi , diag C̄i . This is equivalent to the inequalities i=1  λT 1TN ⊗ In i=1  1N ⊗ In + 1Tny C0 λT A0 + µT1 1 ⊗ I N n y    0n×N ny + 1Tny 0ny ×N n 1TN ⊗ Iny − µT2 λT Eu + 1Tny Fu − γ1 1Tnu  < 0 < 0 < 0. Using the fact that µT2 D − µT1 < 0, we get that the following equivalent condition  N  col(Āi ) T λT A0 + µT2 i=1  + 1ny C0 < 0 N col (C̄i ) (88) (89) i=1 and using the second inequality we can eliminate µ2 to get the equivalent inequalities PN PN λT (A0 + i=1 Āi ) + 1Tny (C0 + i=1 C̄i ) < 0 λT Eu + 1Tny Fu − γ1 1Tnu < 0. 23 (90) The proof is completed. Proof of the statement (ii). From the Theorem 10 and Remark 11, this is equivalent   T A0 P + P A0 1TN ⊗ P 0 P Eu (1T2N ⊗ In )Z1 C0T   ⋆ −Z21 −Z22 0 0 0   3  ⋆ ⋆ −Z2 0 0 1N ⊗ Iny  ≺0   0 FuT  ⋆ ⋆ ⋆ −γ2 Inu     ⋆ ⋆ ⋆ ⋆ −Z1 0 ⋆ ⋆ ⋆ ⋆ ⋆ −γ2 Iny (91)   N  N  and DT Z2 D − Z1 ≺ 0 where D = diag diag Āi , diag C̄i . Performing a Schur complement and comi=1 i=1 bining these inequalities yields  T A0 P + P A0 + (1T2N ⊗ In )DT Z2 D(12N ⊗ In ) 1TN ⊗ P  ⋆ −Z21   ⋆ ⋆   ⋆ ⋆ ⋆ ⋆ 0 −Z22 −Z23 ⋆ ⋆ P Eu 0 0 −γ2 Inu ⋆  C0T  0  1N ⊗ Iny   ≺ 0. FuT  −γ2 Iny N N i=1 i=1 (92) Since the system is positive, then we can restrict ourselves to a diagonal Z2 = diag(diag(Qi ), diag(Ri )), Qi Ri , ∈ Dn≻0 , and hence  N X N X C̄iT Ri C̄i ĀTi Qi Āi + AT0 P + P A0 +  i=1 i=1    ⋆     ⋆    ⋆ ⋆ 1TN ⊗ P N − diag(Qi ) i=1 ⋆ 0 P Eu 0 0 N − diag(Ri ) 0 ⋆ ⋆ −γ2 Inu ⋆ i=1 ⋆ ⋆ C0T       0   ≺ 0.  1N ⊗ Iny    T  Fu −γ2 Iny Proof of the statement (iii). It is similar to the proof of the statement (i) and it is thus omitted. 8 8.1 (93) ♦ Stability and performance of neutral linear positive systems Stability analysis Neutral systems have been extensively studied as they arise, for instance, transmission lines, models of population dynamics, etc. [84, 85, 76, 36, 86, 87]. The special case of linear positive neutral systems has been considered in [53, 54] in the single constant delay case. We extend here these stability analysis results to the case of multiple delays, possibly time-varying, and to performance analysis. Let us start with the following result: Proposition 39 The time-delay system ẋ(t) = A0 x(t) + N X Ar,i x(t − hi ) + i=1 N X i=1 24 An,i ẋ(t − hi ) (94) N coincides with the uncertain system (8) where A = A0 , E = [In . . . In ], C = col (An,i A0 + Ar,i ) and i=1 F = N col(1TN i=1 ⊗ An,i ) and ∆ ∈ ∆d :=  N diag(e −shi i=1  In ) : h ≥ 0, ℜ(s) ≥ 0 . It has been proven in [53, 54] that the system (94) is positive if and only if A0 is Metzler and the matrices An,i A0 + Ar,i and An,i are nonnegative for all i = 1, . . . , N . We then have the following result: Theorem 40 Assume that the system (94) is positive. Then, the following statements are equivalent: (i) The system (94) is asymptotically stable. PN (ii) The nonnegative matrix i=1 An,i is Schur stable and the Metzler matrix In − N X An,i i=1 !−1 A0 + N X Ar,i i=1 ! (95) is Hurwitz stable. (iii) There exist matrices P, Qi ∈ Dn≻0 , i = 1, . . . , N , such that the LMI   AT0 P + P A0 ⋆ ⋆  N N    col(P ) − diag(Qi ) ⋆  ≺0 i=1 i=1   N N N  col (Qi (An,i A0 + Ar,i )) col(Qi (1TN ⊗ An,i )) − diag(Qi ) i=1 i=1 (96) i=1 holds. (iv) A0 is Hurwitz stable and the matrices N X An,i and − N X i=1 i=1 Ar,i ! A−1 0 (97) are Schur stable. Proof : Proof that (i) is equivalent to (ii). To prove the equivalence between (i) and (ii), first note that (i) is equivalent to saying that there exist vectors λ ∈ Rn>0 , µi ∈ Rn>0 , i = 1, . . . , N such that    A0 λ rowN i=1 (In ) <0 (98) T colN colN colN i=1 (An,i A0 + Ar,i ) i=1 (1N ⊗ An,i ) − IN n i=1 (µi ) N or, equivalently, that the above Metzler matrix is Hurwitz stable. Let M12 = rowN i=1 (In ), M21 = col (An,i A0 + i=1 T Ar,i ) and M22 = colN i=1 (1N ⊗ An,i ) − IN n . Then, the stability of the above matrix is equivalent to the −1 stability of the matrix M22 together with the stability of the matrix A0 − M12 M22 M21 . Clearly, the Metzler N T matrix M22 is Hurwitz stable if and only if the nonnegative matrix coli=1 (1N ⊗ An,i ) is Schur stable. Since T colN i=1 (An,i )(1N × In ) and for two matrices Z1 , Z2 , we have that ρ(Z1 Z2 ) = ρ(Z2 Z1 ), then we get that M22 PN is Hurwitz stable if and only if ρ( i=1 An,i ) < 1. This proves the first part. To prove the second part, we −1 need to evaluate A0 − M12 M22 M21 . Using the Sherman-Morrison formula, we get that   !−1 N X N N −1 row(In ) . An,i M22 = − IN n + col(An,i ) In − (99) i=1 i=1 25 i=1 −1 Hence, we have that A0 − M12 M22 M21 is equal to  !−1  N ! N N X X X  (An,i A0 + Ar,i ) An,i In − A0 + In + An,i which then simplifies to A0 + In − N X An,i i=1 and to In − N X An,i i=1 !−1 !−1 (100) i=1 i=1 i=1 N X (An,i A0 + Ar,i ) (101) i=1 A0 + N X Ar,i i=1 ! . (102) The proof of the equivalence is completed. Proof that (i) is equivalent to (iii). This follows from the bounded real lemma. Proof that (i) is equivalent to (iv). Using the fact that (i) is equivalent to saying that ρ(F ) < 1 and P ρ(−CA−1 E + F ) < 1, we get that (i) is equivalent to saying that A0 is Hurwitz stable, that ρ( N i=1 An,i ) < 1 and that   An,1 A0 + Ar,1 N    −1  .. I . . . I + col (1TN ⊗ An,i ) (103) − A  n n 0 . i=1 An,N A0 + Ar,N is Schur stable. Expanding it yields  Ar,1    In −  ...  A−1 0  . . . In Ar,N and the proof is completed.  (104) ♦ Interestingly, we can see that, once again, the magnitude of the delays does not affect the stability of the process and that the stability of the system can be inferred from the stability of the system with all the delays set to zero. Another interesting point is regarding the concept of strong stability of a difference equation (see Theorem 21 and [84, 85]). A difference equation of the form x(t) = N X Mi x(t − hi ) (105) i=1 is said to be strongly stable if and only if max ω∈[0,2π]N ρ N X Mk e k=1 −iωk ! < 1. (106) The notion of strong stability has been introduced in [84, 85] for the analysis of neutral delay systems as the strong stability of the delay-difference equation acting on the derivative of the state is a necessary condition for the stability of overall neutral delay system and the robustness with respect to arbitrarily small changes in the values of the delays. In the present case, we have that ! ! N N X X −iωk max ρ (107) An,k e =ρ An,k ω∈[0,2π]N k=1 k=1 26 since the matrices Ank are nonnegative and hence the maximum is attained at θk = 0. Hence, we can see that the condition of strong stability is encoded in the condition in terms of the well-posedness of the interconnection of system (8) with the matrices and operators described in Proposition 39. Finally, it seems interesting to mention that the conditions of the theorem remains true for the stability of neutral systems with time-varying delays provided that t − hi (t) → ∞ as t → ∞, i = 1, . . . , N . 8.2 Performance analysis Let us address now the performance analysis of neutral systems. Let us start with the following result: Proposition 41 The time-delay system ẋ(t) = z(t) = A0 x(t) + C0 x(t) + N X i=1 N X Ar,i x(t − hi ) + Cr,i x(t − hi ) + N X i=1 N X An,i ẋ(t − hi ) + Eu u(t) (108) Cn,i ẋ(t − hi ) + Fu u(t) i=1 i=1  coincides with the uncertain system (8) where A = A0 , E = 1TN ⊗ In  N N col (1T ⊗ An,i ) col (A A + A ) r,i  i=1 N i=1 n,i 0    C =N F =  N T  col(1N ⊗ Cn,i )  col (Cn,i A0 + Cr,i )  i=1 i=1 C0 0 0TN ⊗ In 0 0  Eu ,     0 0 1TN ⊗ In (109) Fu  ∆ ∈ ∆d := e−shi IN (n+nz ) : h ≥ 0, ℜ(s) ≥ 0 . Moreover, the system is positive if and only if A0 is Metzler and the matrices E, C and F are nonnegative. We then have the following result: Theorem 42 Assume that the system (94) is positive. Then, the following statements are equivalent: (i) The system (108) is asymptotically stable and has L1 -gain smaller than γ1 if and only if • the matrix N X An,i is Schur stable and i=1 • there exists a vector λ ∈ Rn>0 such that !  N X −1 Ar,i S A0 +  T   λ i=1!  ! N N N 1ny  X X X  −1 Ar,i Cn,i S Cr,i + C0 + i=1 i=1 where S := I − N X i=1 S Fu + −1 N X i=1 Eu ! Cn,i  S −1 Eu   T  0 <  γ1 1nu  (110) An,i . i=1 (ii) The system (108) is asymptotically stable and has L2 -gain smaller than γ2 if and only if there exists N ny diagonal matrices P ∈ Dn≻0 , Q ∈ DnN ≻0 and R ∈ D≻0 such that the LMI   T A0 P + P A0 P (1TN ⊗ In ) 0 P Eu  T    ⋆ −Q 0 0   + C T diag(Q, R, Iny ) C ≺ 0  (111)  F ⋆ ⋆ −R 0  F ⋆ ⋆ ⋆ −γ22 Inu where the matrices A, E, C, F are defined in Proposition 41. 27 (iii) The system (108) is asymptotically stable and has L∞ -gain smaller than γ∞ if and only if • the matrix N X An,i is Schur stable and i=1 • there exists a vector λ ∈ Rn>0 such that !  N X −1 Ar,i S A0 +   i=1  ! !  N N N X X X  −1 Ar,i Cn,i S Cr,i + C0 + where S := I − N X Fu + i=1 i=1 i=1 S −1 N X Eu ! Cn,i i=1  S −1 Eu      λ 0  <  1nu γ∞ 1ny  (112) An,i . i=1 Proof : The statement (ii) can be obtained using the scaled-small gain in the L2 -framework. We now prove the statement (iii), statement (i) can be proven in exactly the same way. First note that the system (108) is asymptotically stable and has L∞ -gain smaller than γ∞ if and only if there exist some vectors λ ∈ Rn>0 , u µ1i ∈ Rn>0 and µ2i ∈ Rn>0 , i = 1, . . . , N such that the following inequality     λ 0   1nu  γ1ny  rowN i=1 (Iny )     1 <   colN 0 0  i=1 (µi ) 2 0 colN −Iny N i=1 (µi ) (113) is satisfied. Let us denote for simplicity the above matrix by [Mij ]i,j=1,2 . Solving for the µ terms yields that the above condition is equivalent to saying that      λ 0 < (114) M11 − M12 M−1 M 21 22 1nu γ1ny A0 Eu  C Fu 0  N coli=1 (An,i A0 + Ar,i ) colN (A n,i Eu ) i=1 N colN (C A + C ) col (C n,i 0 r,i n,i Eu ) i=1 i=1 rowN i=1 (In ) 0 T colN (1 ⊗ An,i ) − IN n i=1 N T colN (1 i=1 N ⊗ Cn,i ) 0  together with M22 is Hurwitz stable.P It is immediate to see that, once again, the latter condition is equivalent N T to the Schur stability of the matrix N i=1 An,i . For compactness, let us denote now A := coli=1 (1N ⊗ An,i ) N T and C := coli=1 (1N ⊗ Cn,i ) and, using this notation, we get that  N T col (1 ⊗ A ) − I 0 n,i nN N   M22 = i=1 N (115)  −InN col (1TN ⊗ Cn,i ) i=1 and, hence, we have that M−1 22 =  (A − InN )−1 C(A − InN )−1 0 −IN n  together with −1 (A − InN ) Letting now S := I − PN i=1 N = IN n + col(An,i ) In − i=1 N X i=1 An,i (116) !−1 An,i , we then get that # ! " N X −1 Ar,i λ + Eu 1nu < 0 A0 + S i=1 28 N row(In ). i=1 (117) (118) and similar manipulation gives !# ! " N N N X X X λ+ Ar,i Cn,i S −1 Cr,i + C0 + i=1 i=1 i=1 The proof is now completed. Fu + N X i=1 Cn,i ! S −1 Eu ! 1nu < γ1ny . (119) ♦ As for the other systems, the L∞ condition remains the same in the case of time-varying delays provided that t − hi (t) → ∞ as t → ∞, i = 1, . . . , N . On the other hand, the other conditions need to be slightly changed to incorporate the rate of variation of the delays as in the other results. 9 Conclusion Several recent results regarding the robust stability analysis of uncertain linear positive systems have been unified in a single formulation using a generalization of the structured singular value. Using this generalization, several necessary and sufficient conditions have been obtained and expressed in terms of scaled small-gain theorems involving linear or semidefinite programs. These results have been considered for establishing several results for linear positive systems with constant and time-varying delays. It is notably recalled that the time-varying nature of the delay never deteriorates the asymptotic stability of linear positive systems but may deteriorate their Lp stability. Interesting extensions could be concerned with the robust stabilization problem using static/dynamic output-feedback or state-feedback controllers using ideas from [16, 18, 88, 62] or the extension of the results to hybrid systems [89]. The design of interval observers is also a potentially interesting follow-up to this work; see e.g. [9–11, 13, 90]. References [1] L. Farina and S. Rinaldi. Positive Linear Systems: Theory and Applications. John Wiley & Sons, 2000. [2] J. D. Murray. Mathematical Biology Part I. An Introduction. 3rd Edition. Springer-Verlag Berlin Heidelberg, 2002. [3] C. Briat and E. I. Verriest. A new delay-SIR model for pulse vaccination. Biomedical signal processing and control, 4(4):272–277, 2009. [4] C. Briat and M. Khammash. Computer control of gene expression: Robust setpoint tracking of protein mean and variance using integral feedback. In 51st IEEE Conference on Decision and Control, pages 3582–3588, Maui, Hawaii, USA, 2012. [5] A. Gupta, C. Briat, and M. Khammash. A scalable computational framework for establishing long-term behavior of stochastic reaction networks. PLOS Computational Biology, 10(6):e1003669, 2014. [6] C. Briat, A. Gupta, and M. Khammash. Antithetic integral feedback ensures robust perfect adaptation in noisy biomolecular networks. Cell Systems, 2:17–28, 2016. [7] C. Briat, C. Zechner, and M. Khammash. Design of a synthetic integral feedback circuit: dynamic analysis and DNA implementation. ACS Synthetic Biology, 5(10):1108–1116, 2016. [8] J. L. Gouzé, A. Rapaport, and M. Z. Hadj-Sadok. Interval observers for uncertain biological systems. Ecological modelling, 133:45–56, 2000. [9] F. Mazenc and O. Bernard. Interval observers for linear time-invariant systems with disturbances. Automatica, 47:140–147, 2011. 29 [10] C. Briat and M. Khammash. Interval peak-to-peak observers for continuous- and discrete-time systems with persistent inputs and delays. Automatica, 74:206–213, 2016. [11] D. Efimov, A. Polyakov, and J.-P. Richard. Interval observer design for estimation and control of time-delay descriptor systems. European Journal of Control, 23:26–35, 2015. [12] D. Efimov, E. Fridman, A. Polyakov, W. Perruquetti, and J.-P. Richard. On design of interval observers with sampled measurement. Systems & Control Letters, 96:158–164, 2016. [13] D. Efimov, E. Fridman, A. Polyakov, W. Perruquetti, and J.-P. Richard. Linear interval observers under delayed measurements and delay-dependent positivity. Automatica, 72:123–130, 2016. [14] P. H. A. Ngoc and H. Trinh. Novel criteria for exponential stability of linear neutral time-varying differential systems. IEEE Transactions on Automatic Control, 61(6):1590–1594, 2016. [15] F. Mazenc and M. Malisoff. Stability analysis for time-varying systems with delay using linear Lyapunov functionals and a positive systems approach. IEEE Transactions on Automatic Control, 61(3):771–776, 2016. [16] M. Ait Rami and F. Tadeo. Controller synthesis for positive linear systems with bounded controls. IEEE Transactions on Circuits and Systems – II. Express Briefs, 54(2):151–155, 2007. [17] M. Ait Rami. Solvability of static output-feedback stabilization for LTI positive systems. Systems & Control Letters, 60:704–708, 2011. [18] C. Briat. Robust stability and stabilization of uncertain linear positive systems via integral linear constraints - L1 - and L∞ -gains characterizations. International Journal of Robust and Nonlinear Control, 23(17):1932–1954, 2013. [19] C. Briat. Robust stability analysis of uncertain linear positive systems via integral linear constraints - L1 and L∞ -gains characterizations. In 50th IEEE Conference on Decision and Control, pages 3122–3129, Orlando, Florida, USA, 2011. [20] Y. Ebihara, D. Peaucelle, and D. Arzelier. L1 gain analysis of linear positive systems and its applications. In 50th Conference on Decision and Control, Orlando, Florida, USA, pages 4029–4034, 2011. [21] A. Rantzer. On the Kalman-Yakubovich-Popov lemma for positive systems. IEEE Transactions on Automatic Control, 61(5):1346–1349, 2016. [22] T. Tanaka and C. Langbort. KYP Lemma for internally positive systems and a tractable class of distributed H-infinity control problems. In American Control Conference, pages 6238–6243, Baltimore, Maryland, USA, 2010. [23] M. Colombino and R. S. Smith. A convex characterization of robust stability for positive and positively dominated linear systems. IEEE Transactions on Automatic Control, 61(7):1965–1971, 2016. [24] S. Z. Khong, C. Briat, and A. Rantzer. Positive systems analysis via integral linear constraints. In 54th IEEE Conference on Decision and Control, pages 6373–6378, Osaka, Japan, 2015. [25] A. Megretski and S. Treil. Power distribution in optimization and robustness of uncertain systems. Journal of Mathematical Systems, Estimation and Control, 3:301–319, 1993. [26] A. Megretski and A. Rantzer. System analysis via Integral Quadratic Constraints. IEEE Transactions on Automatic Control, 42(6):819–830, 1997. [27] A. Packard and J. C. Doyle. The complex structured singular value. Automatica, 29:71–109, 1993. 30 [28] M. A. Dahleh and I. J. Diaz Bobillo. Control of uncertain systems - A linear programming approach. Prentice-Hall, 1995. [29] M. H. Khammash. Necessary and sufficient conditions for the robustness of time-varying systems with applications to sampled-data systems. IEEE Transactions on Automatic Control, 38(1):49–57, 1993. [30] W. M. Haddad and V. Chellaboina. Stability theory for nonnegative and compartmental dynamical systems with time delay. Systems & Control Letters, 51(5):355–361, 2004. [31] M. Ait Rami. Stability analysis and synthesis for linear positive systems with time-varying delays. In Positive systems - Proceedings of the 3rd Multidisciplinary International Symposium on Positive Systems: Theory and Applications (POSTA 2009), pages 205–216. Springer-Verlag Berlin Heidelberg, 2009. [32] O. Mason. Diagonal Riccati stability and positive time-delay systems. Systems & Control Letters, 61: 6–10, 2012. [33] J. Zhu and J. Chen. Stability of systems with time-varying delays: An L1 small-gain perspective. Automatica, 52:260–265, 2015. [34] J. Shen and J. Lam. ℓ∞ /L∞ -gain analysis for positive linear systems with unbounded time-varying delays. IEEE Transactions on Automatic Control, 60(3):857–862, 2015. [35] J. Zhang, C. R. Knospe, and P. Tsiotras. Stability of time-delay systems: Equivalence between Lyapunov and scaled small-gain conditions. IEEE Transactions on Automatic Control, 46:482–486, 2001. [36] S. I. Niculescu. Delay effects on stability. A robust control approach, volume 269. Springer-Verlag: Heidelbeg, 2001. [37] C. R. Knospe and M. Roozbehani. Stability of linear systems with interval time-delay. In IEEE American Control Conference, pages 1458–1463, Denver, Colorado, 2003. [38] K. Gu, V. L. Kharitonov, and J. Chen. Stability of Time-Delay Systems. Birkhäuser, Boston, 2003. [39] F. Gouaisbaut and D. Peaucelle. Stability of time-delay systems with non-small delay. In Conference on Decision and Control, San Diego, California, USA, pages 840–845, 2006. [40] C. R. Knospe and M. Roozbehani. Stability of linear systems with interval time delays excluding zero. IEEE Transactions on Automatic Control, 51:1271–1288, 2006. [41] F. Gouaisbaut and D. Peaucelle. Delay dependent robust stability of time delay-systems. In 5th IFAC Symposium on Robust Control Design, Toulouse, France, 2006. [42] C. Y. Kao and A. Rantzer. Stability analysis of systems with uncertain time-varying delays. Automatica, 43:959–970, 2007. [43] Y. Ariba and F. Gouaisbaut. Input-output framework for robust stability of time-varying delay systems. In 48th Conference on Decision and Control, pages 274–279, Shanghai, China, 2009. [44] Y. Ariba, F. Gouaisbaut, and K. H. Johansson. Stability interval for time-varying delay systems. In 49th Conference on Decision and Control, pages 1017–1022, Atlanta, Georgia, USA, 2010. [45] F. Gouaisbaut and Y. Ariba. Delay range stability of a class of distributed time delay systems. Systems & Control Letters, 60:211–217, 2011. [46] C. Briat. Linear Parameter-Varying and Time-Delay Systems – Analysis, Observation, Filtering & Control, volume 3 of Advances on Delays and Dynamics. Springer-Verlag, Heidelberg, Germany, 2015. 31 [47] E. Fridman. Introduction to Time-Delay Systems. Switzerland, 2014. Birkhäuser, Springer International Publishing [48] J. Zhu, T. Qi, and J. Chen. Small-gain stability conditions for linear systems with time-varying delays. Systems & Control Letters, 81:42–48, 2015. [49] X. Li, H. Gao, and K. Gu. Delay-independent stability analysis of linear time-delay systems based on frequency discretization. Automatica, 70:288–294, 2016. [50] J. Shen and J. Lam. L∞ -gain analysis for positive systems with distributed delays. Automatica, 50: 175–179, 2014. [51] A. Aleksandrov and O. Mason. Diagonal Riccati stability and applications. Linear Algebra and its Applications, 492:38–51, 2016. [52] J. Shen and W. X. Zheng. Positivity and stability of coupled differentialdifference equations with time-varying delays. Automatica, 57:123–127, 2015. [53] Y. Ebihara, N. Nishio, and T. Hagiwara. Stability analysis of neutral type time-delay positive systems. In 5th International Symposium on Positive Systems, 2016. URL http://www.posta2016.org/slides/4.EbiharaR.pdf. [54] Y. Ebihara, N. Nishio, and T. Hagiwara. Stability analysis of neutral type time-delay positive systems. In F. Cacace, L. Farina, R. Setola, and A. Germani, editors, Positive Systems – Theory and Applications (POSTA 2016). Springer International Publishing, 2017. [55] C. A. Desoer and M. Vidyasagar. Feedback Systems : Input-Output Properties. Academic Press, New York, 1975. [56] J. Stoer and C. Witzgall. Transformations by diagonal matrices in a normed space. Numerische Mathematik, 4:158–171, 1962. [57] A. Rantzer. Optimizing positively dominated systems. In 51st IEEE Conference on Decision and Control, pages 271–277, Maui, Hawaii, USA, 2012. [58] A. Sootla and A. Mauroy. Properties of eventually positive linear input-output systems. ArXiv e-prints arXiv:1509.08392, 2015. [59] C. Altafini. Minimal eventually positive realizations of externally positive. Automatica, 68:140–148, 2016. [60] G. E. Dullerud and F. Paganini. A course in robust control theory. A convex approach. Springer, New York, USA, 2000. [61] R. Shorten, O. Mason, and C. King. An alternative proof of the Barker, Berman, Plemmons result on diagonal stability and extensions. Linear Algebra and Its Applications, 430:34–40, 2009. [62] M. Naghnaeian and P. G. Voulgaris. Performance optimization over positive l∞ cones. In American Control Conference, pages 5645–5650, Portland, USA, 2014. [63] M. G. Safonov and M. Athans. On stability theory. In 17th Conference on Decision and Control, pages 301–314, San Diego, California, USA, 1978. [64] T. Iwasaki and S. Hara. Well-posedness of feedback systems: insight into exact robustness analysis and approximate computations. IEEE Transactions on Automatic Control, 43:619–630, 1998. [65] L. Hörmander. The analysis of linear partial differential operators I. Springer Verlag, 1985. 32 [66] V. Blondel and A. Megretski. Unsolved Problems in Mathematical Systems and Control Theory. Princeton University Press, 2004. [67] A. Aleksandrov, O. Mason, and A. Vorob’eva. Diagonal Riccati stability and the Hadamard product. 2016. URL https://arxiv.org/abs/1612.06587v1. [68] E. I. Verriest. Robust stability, adjoints, and LQ control of scale-delay systems. In 38th IEEE Conference on decision and control, pages 209–214, Phoenix, Arizona, USA, 1999. [69] C. Briat. Robust stability analysis in the ∗-norm and Lyapunov-Razumikhin functions for the stability analysis and control of time-delay systems. In 50th IEEE Conference on Decision and Control, pages 6319–6324, Orlando, Florida, USA, 2011. [70] E. Shustin and E. Fridman. On delay-derivative-dependent stability of systems with fast-varying delays. Automatica, 43:1649–1655, 2007. [71] C. E. Avellar and J. K. Hale. On the zeros of exponential polynomials. Journal of Mathematical Analysis and Applications, 73:434–452, 1980. [72] S. Damak, M. Di Loreto, W. Lombardi, and V. Andrieu. Exponential L2 -stability for a class of linear systems governed by continuous-time difference equations. Automatica, 50:3299–3303, 2014. [73] S. Damak, M. Di Loreto, W. Lombardi, and V. Andrieu. Stability of linear continuous-time difference equations with distributed delay: Constructive exponential estimates. International Journal of Robust and Nonlinear Control, 25(17):3195–3209, 2015. [74] D. Melchor-Aguilar. A note on stability of functional difference equations. Systems & Control Letters, 67:211–215, 2016. [75] D. Melchor-Aguilar. Exponential stability of linear continuous time difference systems with multiple delays. Systems & Control Letters, 62:811–818, 2013. [76] J. K. Hale and P. M. Amores. Stability in neutral equations. Nonlinear Analysis: Theory, Methods & Applications, 1(1):161–172, 1977. [77] S.-I. Niculescu and V. Rasvan. Delay-independent stability in lossless propagation models with applications (i): A complex domain approach. In International Symposium on Mathematical Theory of Networks and Systems, 2000. [78] S.-I. Niculescu and V. Rasvan. Delay-independent stability in lossless propagation models with applications (ii): A lyapunov-based approach. In International Symposium on Mathematical Theory of Networks and Systems, 2000. [79] P. Pepe and E. I. Verriest. On the stability of coupled delay differential and continuous time difference equations. IEEE Transactions on Automatic Control, 48(8):1422–1427, 2003. [80] S.-I. Niculescu, P. Fu, and J. Chen. On the stability of linear delay-differential algebraic systems: Exact conditions via matrix pencil solutions. In 45th IEEE Conference on Decision & Control, pages 834–839, 2006. [81] E. I. Verriest and P. Pepe. Time optimal and optimal impulsive control for coupled differential difference point delay systems with an application in forestry. In Topics in Time Delay Systems, pages 255–265. Springer Berlin Heidelberg, 2009. [82] C. Briat. Sign properties of Metzler matrices with applications. Linear Algebra and its Applications, 515:53–86, 2017. 33 [83] O. Solomon and E. Fridman. New stability conditions for systems with distributed delays. Automatica, 49(11):3467–3475, 2013. [84] J. K. Hale and S. M. Verduyn Lunel. Introduction to Functional Differential Equations. Springer-Verlag, New York, USA, 1991. [85] J. K. Hale and S. M. Verdyun Lunel. Strong stabilization of neutral functional differential equations. IMA Journal of mathematical control and information, 19:5–23, 2002. [86] A. Bellen and N. Guglielmi. Methods for linear systems of circuit delay differential equations of neutral type. IEEE Transactions on Circuits and Systems I, 76(1):212–215, 1999. [87] E. I. Verriest and P. Pepe. Time optimal and optimal impulsive control for coupled differential difference point delay systems with an application in forestry. In IFAC Workshop on time-delay systems, Nantes, France, 2007. [88] Y. Ebihara, D. Peaucelle, and D. Arzelier. Optimal L1 -controller synthesis for positive systems and its robustness properties. In American Control Conference, pages 5992–5997, Montreal, Canada, 2012. [89] C. Briat. Dwell-time stability and stabilization conditions for linear positive impulsive and switched systems. Nonlinear Analysis: Hybrid Systems, 24:198–226, 2017. [90] C. Briat and M. Khammash. Simple interval observers for linear impulsive systems with applications to sampled-data and switched systems. In 20th IFAC World Congress (Accepted), Toulouse, France, 2017. 34
3cs.SY
arXiv:1803.01683v1 [cs.SE] 22 Feb 2018 Investigating the Evolvability of Web Page Load Time Brendan Cody-Kenny1 , Umberto Manganiello2 , John Farrelly2 , Adrian Ronayne2 , Eoghan Considine2 , Thomas McGuire2 , and Michael O’Neill1 1 Natural Computing Research and Applications Group (NCRA), Michael Smurfit Graduate Business School, University College Dublin, Ireland. 2 Fidelity Investments, Ireland. March 6, 2018 Abstract Client-side Javascript execution environments (browsers) allow anonymous functions and event-based programming concepts such as callbacks. We investigate whether a mutate-and-test approach can be used to optimise web page load time in these environments. First, we characterise a web page load issue in a benchmark web page and derive performance metrics from page load event traces. We parse Javascript source code to an AST and make changes to method calls which appear in a web page load event trace. We present an operator based solely on code deletion and evaluate an existing “community-contributed” performance optimising code transform. By exploring Javascript code changes and exploiting combinations of non-destructive changes, we can optimise page load time by 41% in our benchmark web page. Keywords: Javascript, Performance, Web Applications, Genetic Programming, SearchBased Software Engineering 1 Introduction Performance characteristics vary across browsers where improvements in one version may degrade performance in another [13]. Performance characteristics also change frequently as a Javascript engine is subject to re-design. As a result, performance tuning is a never-ending task. Javascript developers optimise code for Javascript engines while Javascript engine developers optimise for how the engine will likely be used. While a range of work has looked at mutation-based performance [9, 5] and energy improvement [3], no work we are aware of has inspected source code mutation for page load time in the browser. Related work has looked at web service component selection [4], though this targets components which are a higher level granularity of software unit. In this paper we investigate the base mechanisms needed for a Genetic Programming (GP) code improvement system: fitness measures and operators. We trace page load for a simple benchmark web app and calculate (i) time, (ii) number of events, and (iii) the largest depth of event chains found in the trace. We inspect two operators, one which deletes statements and expressions containing method names found in the trace, and another which transforms loops to more optimal versions. To validate these mechanisms, we apply each 1 operator iteratively to all source code locations where they are applicable using a greedy search loop. After applying an operator, if the web page appears as expected, we keep the source code mutation. Our code deletion operator was able to reduce (i) page load time by 41%, (ii) total events by 30% and (iii) event depth by 26%. While these results are encouraging they are relevant only to our benchmark application, which contains much redundancy by design. We cover related work in the following section, with Section 3 providing the experimental setup, the target web application is described in Section 4. We then outline the observations arising from the experiments in Section 5 before drawing conclusions and suggesting directions for future work (Section 6). 2 Related Work Previous work on performance improvement has focused on run-time [9, 5] and energy improvement [3]. Program performance improvements frequently result from code deletion [8], motivating us to initially investigate a deletion operator. Repeatedly applying deletion produces a sub-program similar to one which could be found using program slicing techniques [2, 15]. Designing operators for performance improvement is an open problem, though it has been proposed that new operators may be derived by mining existing code and code generated during GP runs [11]. Program transforms are also written and released by developers in the spirit of making useful transforms reusable [14], adding another potential source of operators. Exhaustive mutation has been used to find how robust program functionality is to source code change. Mutating small programs with fine-grained operators in a relatively statically typed language such as Java appears to result in relatively low mutational robustness of 30% [5], while larger programs in C++ appear to have high mutational robustness of up to 89% [10, 12] and 68% in more recent work [7]. As mutational robustness varies depending on the software under evolution, we currently have relatively few data points to draw comparisons. When using search algorithms on large programs it is important to focus operators to reduce search space size [6, 8]. More targeted mutation operators perform program transforms which are highly likely to impact performance while leaving functionality unchanged. For example, multiple different list implementations which have the same interface can be evaluated [1]. 3 Experimental Setup We gather performance measures based on (i) page load time, (ii) number of events during this time as well as (iii) the depth of event chains. We investigate two operators, one written by the authors which deletes code based on method names and one which has been made available as a community contribution. The search loop used simply keeps a code change if the page does not show any error. 2 3.1 Metrics for Web Page Load We are mainly interested in improving page load time for a web app. We gather traces of the web app loading via chrome browser’s devtools functionality1 (with caching disabled) using a client for NodeJS2 . Page load traces list events which can be used to build a call graph for the entire page load process. The elapsed time for all events to complete and the depth of call sequences can be calculated from a page trace. We take the time between the first and last event recorded in the browser to give load time. We sum browser events as a pseudo-measure of performance, which is subject to less variation than time-based measures. The number of events in total gives us an idea of how much work is being performed by the browser. We also take a measure of the most deeply nested sequence of event calls, which gives us a rough idea of how interdependent events are. Our intuition is that time can elapse while this call graph is traversed even though more computation could be performed during the same elapsed time if dependent method calls could be rearranged. We assume we are beginning with an “oracle” web app which is considered correct. During page load, we check what elements have been loaded onto the page, and the page is only considered fully loaded when a string appears as part of the Document Object Model (DOM) for the page. We sum the number of pixels by which screenshots differ and use this as our only measure of functional correctness3 (as this is the only functionality our benchmark provides). We compare two oracle screenshots to get a measure of acceptable variation while still considering the web app correct. We use a multiple of this acceptable pixel variability measure to get a threshold value, above which the page is considered incorrect, that is, too different to be considered the same as the original. Subsequent screenshots taken of web app variants are compared with the original oracle screenshot. A screenshot captures the final state of the page after it has been loaded. The screenshot does not capture anything about the underlying state of the web page or the structure of the web page Document Object Model (DOM). As a result, using screenshots to measure correctness relaxes the constraints on what is considered correct and frees the evolutionary search process to make changes which affect the underlying structure of the web page HTML. A screenshot only tells us if the page loaded as expected or not, and does not give us any gradient or measure of subsequent page functionality. A screenshot gives no way of telling apart a completely disfunctional page load from a partially functional version of the app. Some functionality is better than none, and Evolutionary algorithms rely on this gradient. In future work the HTML state could additionally be used to give partial functionality gradient. 3.2 Operators We investigate the use of two operators, one which was developed by the authors of this paper, and the other, which was developed and made freely available by open source contributors. Both operators build an Abstract Syntax Tree (AST) of Javascript source files which are searched, manipulated and written back to a file. 1 https://developer.chrome.com/devtools 2 https://github.com/cyrus-and/chrome-remote-interface 3 http://www.imagemagick.org/Usage/compare/#statistics 3 3.2.1 Deletion Operator The simplest way to reduce page load time is to reduce the amount of computation done. To inspect this, we delete portions of the web app source code. Deleting code gives us some indication of the mutational robustness of the software we are targeting. If any portion of the code can be deleted without affecting the correctness of the resulting web page, then we can say that there is some level of redundancy in the code. Claims of robustness can only be made within the context of the operators and test cases used. If the correctness tests (pixel differences between screenshots) do not capture important features or functionality of the web app, then deletion may find performance improvements which turn out to have an undesirable effect on functionality. A page load trace contains method calls but also which Javascript file the method calls were made from. We use this information to find where methods are called and defined within the Javascript source. We should also note that deletion is distinct from dead code removal. Only method names which appear in the page load trace are considered for deletion. As these methods appear in the trace, we know they have been executed and would not be removed by dead code removal. 3.2.2 Loop Optimiser The “loop optimiser” operator has made freely available4 as a “community” contribution to the Babel project5 . This source code transform is intended to improve the performance of loops. A potential issue with this type of operator is that it is not well tested6 . While community written program transforms can contain useful improvements, they are not written or tested with the same rigour that might be found in, for example, the transforms performed by a compiler. Similar community efforts to produce code transforms gives the Evolutionary Computation community a potential source of operators. Though an operator may perform a beneficial transform in most contexts, a developer will still need to test and validate the effect this transform has on their code. A potential impediment to the uptake of these transforms is that we do not have a high level of assurance that these transforms are rigorously semantics preserving. For languages that are dynamically typed, it is more difficult to ensure new transforms preserve semantics. If program transforms are to be crowd-sourced to some extent, we may end up with a scenario where the proliferation of transforms becomes an issue in itself for a developer as time is required to choose, apply and validate transforms. This motivates a Genetic Programming mutate-and-test approach to the application of community operators. 3.3 Search Loop The search loop iterates through a list of file names from the web app and applies an operator to each one. When applying deletion, the loop iterates through a list of method names and associated files. Method names and files are extracted from a page load trace and used to focus operators on statements and expressions which contain the method name. For each file, each mention of a method name in the AST is found. From each element in the AST which contains the method name, the parent statement or expression is deleted. The app is then loaded over HTTP via the chrome browser which captures a trace of the page load and a 4 https://github.com/vihanb/babel-plugin-loop-optimizer 5 https://babeljs.io/ 6 The version we used was specifically marked as experimental 4 screenshot. Tracing will timeout after twice the time the oracle page load takes (3 seconds). Runtime and event counts are extracted from the trace (used in post-analysis only) and the screenshot is compared with the oracle screenshot to give correctness values. If the page is considered correct, the mutation is kept, otherwise the mutation is discarded and the next operator application is made. To be clear, the performance metrics are not used to guide the search process. The only metric which determines whether a change is kept, is whether the page loads as expected. The performance metrics are not used directly as part of the search loop but are used for post-analysis. When all possible operator applications have been made, we compare the most recent patch, which contains the culmination of all code changes, to the original. By virtue of the operator we inspect, if the page loads correctly after many deletions, we can perform more in-depth performance bench-marking to quantify the performance improvement found. 4 Web Application In this paper we use an Angular2 web app which is written in typescript and is compiled to Javascript7 It is this generated Javascript that we target for optimisation. The app is designed to contain redundancy and as an exemplar app with performance issues. The functionality provided by the app is to load a paragraph on the screen and display page load time8 . Page load takes under two seconds even though the resulting page would be far more effectively delivered as static HTML, instead of being loaded via Angular2 functionality. Any optimisations found will show a clearly measurable improvement in runtime as well as being easy to understand and validate. In this scenario, Angular is far too heavyweight a solution for the resulting web page state. While this appears an easy optimisation target, it is however a challenging benchmark problem for an evolutionary approach and an excellent initial problem on which to validate our approach. The challenge lies in disentangling the extensive sequence of method calls which ultimately produce a static page of text. The oracle web application triggers over 5000 events to a depth of 242 nested method calls. Although Angular is designed to deliver more complex functionality, the increased level of abstraction nonetheless makes it difficult to understand interactions between many layers of sometimes anonymous and interleaved method calls for this simple app. Our hope is that an evolutionary algorithm utilising a range of operators which can reduce the dependencies and redundancies in this benchmark application will also be able to reduce other “real world” web applications in terms of load time. 5 Results Figure 1 shows 100 repeated measurements of page load time for the original web app and an optimised version of the web app which was derived by the exhaustive application of the deletion operator. Each sequence of traces shows roughly the same pattern, though they appear offset by roughly 500ms. We notice that there is a warm-up factor when traces are repeatedly gathered on the same page as initial page load time measures are high in the first couple of traces when compared to the relatively stable measures gathered subsequently. Figure 2 shows average values for time, number of events and largest event depth from 1000 samples taken after browser warm-up. On average, there is a 41% saving in page load 7 Full web app code: https://github.com/mlaval/optimize-angular-app https://mlaval.github.io/optimize-angular-app/dev 8 Demo: 5 1800 Original Optimised Milliseconds 1600 1400 1200 1000 800 600 0 10 20 30 40 50 60 Trace Number 70 80 90 100 6000 270 1400 5000 225 Event Depth 1600 4000 1200 Events Milliseconds Figure 1: Trace of Original and Optimised web app versions 1000 800 3000 2000 1000 600 (a) Time Opt 135 90 45 0 Orig 180 0 Orig Opt (b) Events Orig Opt (c) Event Depth Figure 2: Average Metrics (1000 samples) for Original (Orig) and Optimised (Opt) versions of the web app 6 time. 30% less events occurred and event depth was 26% lower. Variance in measures was roughly the same except for event depth which varied significantly in the optimised version of the app. This may indicate that there are reduced dependencies in this version of the app which leave the browser more freedom in when and how events are triggered. Although a saving of 500ms is a lot in terms of page load time, the mean page load time for the optimised version of the app was still 720ms. Given that the final rendered page is mostly static and the page is loading from the local machine we should be able to achieve far lower load times with additional operators and further refinements of our approach leaving us ample room for future improvement on this benchmark problem. 22% of deletions had no effect on functionality as measured and we can say that the benchmark app we used is relatively robust to deletions. This is an interesting result as we expected removing code which appears in the load trace to be more destructive. 8966 lines were deleted out of a total of 17022 (52%). Method names found in traces of the app appear 982 times in the app source code. For this particular benchmark app, as method calls were deleted, other method calls would appear in the trace. This is due to the redundancy contained in this benchmark application. We found one iteration of our search loop, which performs parsing, AST traversal, file writing, page load over HTTPS, trace call tree building, call tree traversal and source code diffing took between 7 and 13 seconds. We feel this is not prohibitive for evolution in the browser, especially given that it is likely to be reduced on further refinement of our approach. We used the Loop Optimiser transform in our search loop but unfortunately no performance improvements were found. During experimentation we also applied the loop optimiser to all Javascript files in the web app and found that it resulted in a page that did not load. The existence and availability of such experimental operators justify a search-based approach which can discover what operators are applicable where. For GI research, these results reiterate the question as to what is the best way to go about operator design. We could have a wide range of specific operators which are only applicable to certain code patterns (loop optimisation), or have a few very general operators (delete, clone, replace) which are unlikely to leave a program in a fully functional state and only rarely improve performance. 5.0.1 Limitations The main limitation of this work is that the benchmark app is very simple and contains a lot of redundancy by design. As a result, the findings give little indication as to how generalisable the approach is. When considering more real-world applications of this approach we feel it is unlikely that they will contain the same level of redundancy or be so cleanly structured that deleting lines of code will improve performance while leaving functionality similarly unaffected. Additionally, though comparing screenshots is enough to detect a “correct” page load for our benchmark app, a web app which provides user functionality would need extensive additional testing. 6 Conclusion We find that improvement of browser-based Javascript using iterative mutation and testing is possible. We reduce a benchmark app to only what code is necessary to provide the desired functionality, saving 41% in runtime. We may compare code changes against those derived through program slicing techniques [15] and investigate if they produce similar performance 7 improvements. Finding performance improvements further to a minimal code “slice” will likely require more inventive operators. What operators to use is a pertinent open question. We highlight that community contributed code transforms may make ideal candidate operators for search-based approaches. Our findings also give a good base for expanding the work toward more complex “real world” applications with more detailed measures of functionality (e.g. HTML diff or navigation testing) and performance (e.g. user interface jitter). Acknowledgements This research is based upon works supported by Science Foundation Ireland under grant 13/IA/1850 and 13/RC/2094 which is co-funded under the European Regional Development Fund through the Southern & Eastern Regional Operational Programme to Lero - the Irish Software Research Centre (www.lero.ie). References [1] Basios, M., Li, L., Wu, F., Kanthan, L., Barr, E.T.: Optimising Darwinian Data Structures on Google Guava. International Symposium on Search Based Software Engineering (SSBSE) (2017) [2] Binkley, D., Harman, M.: A Survey of Empirical Results on Program Slicing. Advances in Computers 62 (2004) [3] Bokhari, M.A., Bruce, B.R., Alexander, B., Wagner, M.: Deep Parameter Optimisation on Android Smartphones for Energy Minimisation. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion (GECCO). Berlin (2017) [4] Chang, W.C., Wu, C.S., Chang, C.: Optimizing Dynamic Web Service Component Composition by Using Evolutionary Algorithms. In: International Conference on Web Intelligence, WIC (2005) [5] Cody-Kenny, B., Galván-López, E., Barrett, S.: locoGP: Improving Performance by Genetic Programming Java Source Code. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion (GECCO) (2015) [6] Forrest, S., Nguyen, T., Weimer, W., Goues, C.L.: A Genetic Programming Approach to Automated Software Repair. In: Genetic and Evolutionary Computation Conference (GECCO) (2009) [7] Langdon, W.: Evolving better RNAfold C source code. bioRxiv (2017) [8] Langdon, W.B.: Which is Faster: Bowtie2 GP Bowtie> Bowtie2> BWA. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion (GECCO) (2013) [9] Langdon, W.B.: Performance of Genetic Programming Optimised Bowtie2 on Genome Comparison and Analytic Testing (GCAT) Benchmarks. BioData mining 8(1) (2015) [10] Langdon, W.B., Petke, J.: Software is Not Fragile. In: Complex Systems Digital Campus E-conference, (CS-DC). Proceedings in Complexity (2015) [11] Petke, J.: New Operators for Non-functional Genetic Improvement. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion (GECCO) (2017) [12] Schulte, E., Fry, Z.P., Fast, E., Weimer, W., Forrest, S.: Software Mutational Robustness. Genetic Programming and Evolvable Machines (GPEM) (2014) [13] Selakovic, M., Pradel, M.: Performance issues and optimizations in JavaScript: An empirical study. In: International Conference on Software Engineering (ICSE) (2016) [14] Various: jscodeshift. https://github.com/facebook/jscodeshift (2017) [15] Ye, J., Zhang, C., Ma, L., Yu, H., Zhao, J.: Efficient and Precise Dynamic Slicing for ClientSide JavaScript Programs. In: International Conference on Software Analysis, Evolution, and Reengineering (SANER). vol. 1 (2016) 8
9cs.NE
arXiv:1504.00273v3 [math.GR] 24 May 2017 On Alternating and Symmetric Groups Which Are Quasi OD-Characterizable Ali Reza Moghaddamfar Faculty of Mathematics, K. N. Toosi University of Technology, P. O. Box 16315-1618, Tehran, Iran. E-mails: [email protected] and [email protected] April 9, 2018 Abstract Let Γ(G) be the prime graph associated with a finite group G and D(G) be the degree pattern of G. A finite group G is said to be k-fold ODcharacterizable if there exist exactly k non-isomorphic groups H such that |H| = |G| and D(H) = D(G). The purpose of this article is twofold. First, it shows that the symmetric group S27 is 38-fold OD-charaterizable. Second, it shows that there exist many infinite families of alternating and symmetric groups, {An } and {Sn }, which are k-fold OD-characterizable with k > 3. Keywords: OD-characterization, alternating group, symmetric group, prime graph, spectrum, degree pattern, split extension, subdirect product. 1 Introduction Throughout the article, all the groups under consideration are finite and simple groups are nonabelian. For a natural number n, we denote by π(n) the set of all prime divisors of n and put π(G) = π(|G|). The spectrum ω(G) of a group G is the set of orders of elements in G. The set ω(G) determines the prime graph Γ(G) whose vertex set is π(G), and two vertices p and q are adjacent if and only if pq ∈ ω(G). For two vertices p and q we will write (p ∼ q)G to indicate that p is adjacent to q in Γ(G). Denote by s(G) the number of connected components of Γ(G) and by πi (G) (i = 1, 2, . . . , s(G)), the set of vertices of its ith connected component. If 2 ∈ π(G) then we assume that 2 ∈ π1 (G). We recall that the set of vertices of connected components of all finite simple groups are obtained in [5] and [14]. As usual, the degree deg(p) of a vertex p ∈ π(G) in Γ(G) is the number of edges incident on p. We denote the set of all vertices of the prime graph Γ(G) 2000 Mathematics Subject Classification: 20D05, 20D06, 20D08. 1 which are joined to all other vertices by Λ(G). If the prime divisors of |G| are p1 < p2 < · · · < pk , then we define D(G) := (deg(p1 ), deg(p2 ), . . . , deg(pk )), which is called the degree pattern of G. Given a group H, denote by hOD (H) the number of isomorphism classes of groups G such that |G| = |H| and D(G) = D(H). Clearly, there are only finitely many isomorphism types of groups of order n, because there are just finitely many ways that an n × n multiplication table can be filled in. Hence 1 6 hOD (H) < ∞ for any group H. In terms of function hOD , groups H are classified as follows: Definition 1.1 Any group H satisfying hOD (H) = k is said to be k-fold ODcharacterizable. Usually, a 1-fold OD-characterizable group is simply called an OD-characterizable group, and it is called quasi OD-characterizable if it is k-fold OD-characterizable for some k > 1. This article is a continuation of my investigations of the OD-characterizability of alternating and symmetric groups initiated in [4]. We keep the notation created and the conventions made therein. In a series of articles (see [4], [8], [9], [11] and [17]), it has been shown that many of the alternating and symmetric groups are n-fold OD-characterizable for n ∈ {1, 2, 3, 8}. These results are summarized in the following proposition. Proposition 1.2 The following statements hold: (a) The alternating groups Ap , Ap+1 , Ap+2 and the symmetric groups Sp and Sp+1 , where p is a prime number, are OD-characterizable. (b) The alternating group A10 is 2-fold OD-characterizable, while the symmetric group S10 is 8-fold OD-charaterizable. (c) The alternating groups Ap+3 , where p 6= 7 is a prime number less than 100, are OD-characterizable. (d) The symmetric groups Sp+3 , where p 6= 7 is a prime number less than 100, are OD-characterizable or 3-fold OD-characterizable. In addition, it was shown in [4, Corollary 1.5] that all alternating groups Am for which m 6 100, except A10 , are OD-characterizable. Proposition 1.3 All alternating groups Am , where m is a natural number less than 100, except A10 , are OD-characterizable. These observations convinced us to propose the following conjecture in [4]: Conjecture 1.4 All alternating groups Am , with m 6= 10, are OD-characterizable. On the other hand, in recent years we have not found any simple group S with hOD (S) > 3. Therefore, we asked in [4] the following question: Problem 1.5 Is there a simple group S with hOD (S) > 3? 2 Our recent investigations show that Conjecture 1.4 does not hold in general. Recently, the authors showed in [6] that the alternating group A125 satisfying hOD (A125 ) > 3 (see also [7]). Here, we will show that there exist infinite families of alternating groups Am which are k-fold OD-characterizable with k > 3. We notice that Problem 1.5 is also answered positively through these examples. Theorem 1.6 There are infinitely many alternating groups Am which satisfy hOD (Am ) > 1. In particular, there is no upper bound for hOD (Am ). It is also worth mentioning that a similar description as Proposition 1.3 is exhibited about OD-characterizability of symmetric groups Sm , where m is a natural number less than 100 (see [4, Theorem 1.7]). Nevertheless, in checking the list of such groups, we found out that it contains a mistake (in fact, Proposition 4.1 in [4] asserts erroneously that the symmetric group S27 is 3-fold OD-charaterizable). Therefore, another result of the present article can be stated as follows: Theorem 1.7 The symmetric group S27 is 38-fold OD-characterizable. Now, we give a revised list of symmetric groups in question. Corollary 1.8 All symmetric groups Sm , where m is a natural number less than 100, except m = 10, 27, are OD-characterizable or 3-fold OD-characterizable. Moreover, the symmetric group S10 is 8-fold OD-characterizable, while the symmetric group S27 is 38-fold OD-characterizable. The following conjecture involving symmetric groups is posed in [4]: Conjecture 1.9 All symmetric groups Sm , with m 6= 10, are OD-characterizable or 3-fold OD-characterizable. It turns out that a negative answer to this conjecture is provided by symmetric group S27 (see also [6, 7]). In addition, we will get many other examples of symmetric groups which are k-fold OD-characterizable with k > 3. Theorem 1.10 There are infinitely many symmetric groups Sm which satisfy hOD (Sm ) > 3. In particular, there is no upper bound for hOD (Sm ). We conclude the introduction with some further notation and definitions. Given a natural number m, we denote by lm the largest prime less than or equal to m and we let △(m) = m − lm . It is clear that lm = m (or equivalently △(m) = 0) if and only if m is a prime number. Note that if m > 2, then lm is always an odd prime, and so △(m) is even iff m is odd. In addition, from the definition, it is easy to see that lm = lm−1 = lm−2 = . . . = lm−△(m)+1 . We shall use the notation ν(m) (resp. νa (n)) to denote the number of types of groups (resp. abelian groups) of order m. Clearly, νa (m) 6 ν(m). We also denote the set of partitions of m by Par(m). It is known that for any prime p, νa (pm ) = |Par(m)|. Finally, we use Am and Sm to denote the alternating and symmetric group on m letters, respectively. In the case when p > 5 is a prime, we denote by Sp the set of all simple groups with prime divisors at most p. 3 2 Auxiliary results In this section we give several definitions and auxiliary results to be used later. The first of them is the following definition of subdirect products. Definition 2.1 Let n > 2. A subdirect product of the groups G1 , G2 , . . . , Gn is a subgroup G 6 G1 × G2 × · · · × Gn of the direct product such that the canonical projections G → Gi are surjective for all i. One way of obtaining a subdirect product of two groups is via the fibre product construction. This is illustrated here for two groups. Given some groups G1 and G2 with normal subgroups N1 and N2 such that G1 /N1 and G2 /N2 are isomorphic, we want to construct a group G having a normal subgroup N isomorphic to N1 × N2 such that G/N2 is isomorphic to G1 and G/N1 is isomorphic to G2 . Notice that we will usually identify N1 ×1 with N1 and 1×N2 with N2 . To carry out the construction, let π1 and π2 be homomorphisms from G1 and G2 onto some group Q. Now let G := {(g1 , g2 ) ∈ G1 × G2 | π1 (g1 ) = π2 (g2 )} . It is easy to check that G constitutes a subgroup of G1 × G2 , and the projection maps onto the coordinates map G onto G1 and G2 , respectively. We call G the fibre product associated with π1 and π2 (Remak [12] called it the meromorphic product of G1 and G2 with normal subgroups N1 and N2 .). Also, N1 × N2 is a normal subgroup of G and the map π on G defined by π((g1 , g2 )) = π1 (g1 ) maps G onto Q with kernel N1 × N2 , so G/(N1 × N2 ) is isomorphic to Q. In fact, we have G1 /N1 ∼ = G/(N1 × N2 ) ∼ = G2 /N2 . It is a basic observation that every subdirect product of G1 and G2 is a fibre product (or a meromorphic product) of these groups. Information on the adjacency of vertices in the prime graphs associated with alternating and symmetric groups can be found in [13, 16]. Consider the function S : NQ → N, defined asP follows: S(1) = 1 and for m > 1 with prime factorization αi i , S(m) = m = i pα i i pi . Then one has [16, Lemma 4 ]: Lemma 2.2 Let m and n be ntaural numbers. Then there hold: (1) An has an element of order m if and only if S(m) 6 n for odd m and S(m) 6 n − 2 for even m. (2) Sn has an element of order m if and only if S(m) 6 n. The next two corollaries are the adjacency criteria for two vertices of Γ(An ) and Γ(Sn ), respectively. Corollary 2.3 Let p, q ∈ π(An ) \ {2}. Then (p ∼ q)An if and only if p + q 6 n, while (p ∼ 2)An if and only if p + 2 6 n − 2. Corollary 2.4 Let p, q ∈ π(Sn ). Then (p ∼ q)Sn if and only if p + q 6 n. 4 The Goldbach conjecture says that every even natural number n greater than 4 can be written as the sum of two odd primes. In what follows, we will need a stronger conjecture: Strong Goldbach Conjecture. Every even natural number n greater than six can be written as the sum of two distinct odd primes. We can now state the connection between the strong Goldbach conjecture and the adjacency of vertices in the prime graph of a symmetric group: Theorem 2.5 [2, Theorem 3] The following statements are equivalent: (1) the strong Goldbach conjecture is true; (2) for each even n > 6, Γ(Sn−1 ) $ Γ(Sn ). Proof. It follows immediately from Lemma 2.2 (2).  The coincidence criterion for pairwise nonisomorphic symmetric groups (statement (1) of the Lemma 2.6) is obtained modulo strong Goldbach conjecture. Lemma 2.6 Let m and n be natural numbers with 2 6 m < n. The prime graphs of symmetric groups Sm and Sn are equal if and only if m = n − 1 and one of the following holds: (1) both n and n − 2 are non-prime odd numbers. (2) n = 4 or 6. Proof.∗ (=⇒) In the case when n 6 6, it is a straightforward verification. In fact, the equality of the prime graphs Γ(Sn ) and Γ(Sn−1 ), for n ∈ {4, 6}, can be obviously verified using Corollary 2.4. Assume now that n > 6. We first claim that m = n − 1. If not, then m < n − 1 and hence one of the numbers n and n − 1 is even. Since n > 7, it follows from strong Goldbach conjecture that there exist two distinct odd primes p and q with m 6 n − 2 < p + q 6 n. Hence p is adjacent to q in Γ(Sn ), while p is nonadjacent to q in Γ(Sm ), so these graphs are not equal. This contradiction shows m = n − 1 as claimed. By Theorem 2.5, we may assume that n is an odd number. Assume that Γ(Sn ) 6= Γ(Sn−1 ). The sets of vertices are distinct if and only if n is a prime. If n is a composite number, then the sets of vertices are equal, and so the sets of edges should be distinct. Hence there exist primes p, q ∈ π(Sn ) with n − 1 < p + q 6 n. Then obviously p + q = n, but n is odd. The only possible case is {p, q} = {2, n − 2}, and so n − 2 ∈ π(Sn ) and n − 2 is a prime. (⇐=) The conclusion follows immediately from Corollary 2.4.  We need the following lemma to find some infinite families of alternating and symmetric groups which are not OD-characterizable. Lemma 2.7 Let p be an odd prime number. There are infinitely many natural numbers n such that △(pn ) > 4. ∗ The idea of proof was borrowed from [18] 5 Proof. Take n to be an even natural number. Clearly, pn −4 is always composite in this case, and so we need only consider pn − 2. Let a = p2 and b = 2. We will now show that given any positive integers a, b, we can find an infinite number of values for N such that aN − b is composite. If aN − b is always composite, we are done. Otherwise, there exists a positive integer k such that ak − b = q > a is prime. Then for all positive integers m, we have ak+(q−1)m ≡ b (mod q), and certainly ak+(q−1)m −b > q for all m > 0, so ak+(q−1)m −b must be composite for all positive integers m.  A possible generalization of Lemma 2.7 is the following statement, which seems intuitive to be true. Let p be an odd prime. Then, there are infinitely many positive integers n such that pn − 2, pn − 4, pn − 6, . . . , pn − (p − 1), are composite. Alternatively, this problem can be formulated as follows. Problem 2.8 Let p be an odd prime. Do there exist infinitely many positive integers n such that ∆(pn ) > p. 3 The symmetric group S27 The aim of this section is to find the number of non-isomorphic groups with the same order and degree pattern as the symmetric group S27 . Indeed, we will show that there are 38 such groups. Proof of Theorem 1.7. Let G be a group satisfying the following conditions: (1) |G| = |S27 | = 223 · 313 · 56 · 73 · 112 · 132 · 17 · 19 · 23 and (2) D(G) = D(S27 ) = (8, 8, 7, 7, 5, 5, 4, 4, 2). Under these conditions, we conclude immediately that Γ(G) = Γ(S27 ) (see also [4, Lemma 2.15]). Letting R be the solvable radical of G, we break the proof into a number of separate lemmas. Lemma 3.1 R is a {2, 3, 5, 7, 11}-group. In particular, G is nonsolvable. Proof. First, we show that R is a 23′ -group. Assume the contrary. Let 23 ∈ π(R) and let x be an element of R of order 23. Put C = CG (x) and N = NG (hxi). By the structure of Γ(G), it follows that C is a {2, 3, 23}-group. Since N/C is embedded in Aut(hxi) ∼ = Z22 , N is a {2, 3, 11, 23}-group. Using Frattini argument we get G = RN , and so 19 ∈ π(R). Thus R contains a Hall {19, 23}subgroup L of order 19 · 23. Clearly, L is cyclic, and so (19 ∼ 23)G , which is a contradiction. Next, we show that R is a q ′ -group for q ∈ {13, 17, 19}. Let q ∈ π(R), Rq ∈ Sylq (R) and N = NG (Rq ). Again, by Frattini argument G = RN and 6 since R is a 23′ -group we deduce that 23 divides the order of N . Let L be a subgroup of N of order 23. Since L normalizes Rq , LRq is a subgroup of order 23 · |Rq |, which is abelian. But then (q ∼ 23)G , which is a contradiction. Finally, R is a {2, 3, 5, 7, 11}-group, and since R 6= G, it follows that G is nonsolvable. This completes the proof of lemma.  In what follows, we put G = G/R and S = Soc(G). Clearly, S is a direct product S = P1 × P2 × · · · × Pm , where the Pi are nonabelian simple groups, and we have S 6 G 6 Aut(S). We show now that S is a simple group, or equivalently m = 1. Lemma 3.2 m = 1. In particular, G is an almost simple group. Proof. By way of contradiction, let m > 2. In this case 23 does not divide |S|, for otherwise deg(23) > 3, which is a contradiction. Hence, for every i we have Pi ∈ S19 . Therefore 23 ∈ π(G) ⊆ π(Aut(S)), and so 23 divides the order of Out(S). But Out(S) = Out(Q1 ) × Out(Q2 ) × · · · × Out(Qr ), where Qi is a direct product of ni isomorphic copies of a simple group Pi such that S∼ = Q1 × Q2 × · · · × Qr . Therefore, for some j, 23 divides the order of the outer automorphism group of Qj of nj isomorphic simple groups Pj . Since Pj ∈ S19 , it follows that |Out(Pj )| is not divisible by 23 (see [3, 15]). Moreover, since Out(Qj ) = Out(Pj ) ≀ Snj , it follows that |Out(Qj )| = |Out(Pj )|nj · (nj )!. This forces nj > 23, and so 246 must divide the order of G, which is a contradiction. Therefore m = 1 and S = P1 .  Lemma 3.3 There are exactly 38 possibilities for the group G. Proof. By Lemma 3.2, we have S 6 G 6 Aut(S), where S is a nonabelian simple group in S23 , and so {13, 17, 19, 23} ∩ π(Out(S)) = ∅, (see [3, 15]). Now, it follows from Lemma 3.1 and condition (1) that |S| = 2a · 3b · 5c · 7d · 11e · 132 · 17 · 19 · 23, where 2 6 a 6 23, 0 6 b 6 13, 0 6 c 6 6, 0 6 d 6 3 and 0 6 e 6 2. Comparing this with the nonabelian simple groups in S23 , we obtain S ∼ = A26 or A27 . We refer to [15] for the list of nonabelian simple groups in S23 . In the sequel, we deal with two cases separately. 7 ∼ A27 or (1) S ∼ = A27 . In this case, we have A27 6 G/R 6 S27 . Thus G/R = G/R ∼ = S27 . If G/R ∼ = A27 , then |R| = 2. Clearly, R 6 Z(G) and G is a central extension of R ∼ = Z2 . If G splits over R, then G ∼ = Z2 × A27 , ∼ otherwise we have G = Z2 · A27 (non-split extension). Next, we assume G/R ∼ = S27 . Finally, in the case when = S27 . In this case R = 1 and so G ∼ ∼ S = A27 there are three possibilities for G. (2) S ∼ = A26 . In this case, we have A26 6 G/R 6 S26 , and so G/R ∼ = A26 or G/R ∼ = S26 . If G/R ∼ = A26 , then |R| = 54. We claim that the only possibilities for G are G = R × A26 , where R is an arbitrary group of order 54, and G = Q × (Z2 · A26 ) where Q is an arbitrary group of order 27. In the first case, since there are exactly 15 groups of order 54, there are 15 possibilities for G. In the second case, since there are just 5 groups of order 27, there are 5 possibilities for G. To prove our claim, we first observe that the automorphism group of R has order smaller than |A26 |. Now, let C = CG (R). Then G/C is isomorphic to a subgroup of Aut(R), and so |G/C| < |A26 |. It follows that C is not contained in R, so CR > R and CR is a normal subgroup of G. Since G/R is simple, it follows that CR = G. Let D = C ∩ R. Since D 6 R, we see that C centralizes D, and since D 6 C, we see that R centralizes D, and thus D 6 Z(G). Now C/D is isomorphic to A26 and D 6 Z(C). Since the Schur multiplier of A26 has order 2, the only possibilities are that C ′ ∩ D has order 1 or 2. If |C ′ ∩ D| = 1, then C ′ = A26 and C = D × A26 , and in this case, A26 is a direct factor of G. In the remaining case, C ′ = 2 · A26 , and in this case, since |D| is 2 times some power of 3, it follows that 2 · A26 is a direct factor of C and hence of G. If G/R ∼ = S26 , then |R| = 27. Actually, we want to find (up to isomorphism) all groups G having a normal subgroup R of order 27 such that G/R is isomorphic to S26 . Let M < G have index 2, where M/R is A26 . Note that M is unique. Let C be the centralizer of R in M . Then RC is normal in M , and since M/R is simple, there are only two possibilities: RC = R or RC = M . We want to show that RC = M . Suppose RC = R. Now M/C is embedded in Aut(R) and this group faithfully permutes the 26 non-identity elements of R. This action must be transitive or else M/C is embedded in a direct product of the form Sa × Sb where a + b = 26 and both a and b are positive. But |M/C| > |A26 | and |Sa × Sb | = (a!)(b!) < (26!)/2. This proves that the action is transitive, and it follows that R is elementary abelian. Now |Aut(R)| = |GL(3, 3)| < |A26 | 6 |M/C|. This is a contradiction, so RC = M . Let Z = Z(R) = R ∩ C. Then C/Z is isomorphic to M/R, which is A26 . The Schur multiplier of A26 has order 2, and it follows that C ′ ∩ Z 8 is trivial, and thus C ′ is a normal subgroup of M isomorphic to A26 . It follows that M is the direct product of R and C ′ . Let be write A = C ′ , so A is isomorphic to A26 . Note that A is characteristic in M , so A is normal in G. Now G/R ∼ = S26 and G/A has order 54, so G is a subdirect product of G1 = S26 and G2 = G/A. (Note that, every group of order 54 has a normal subgroup of index 2.) Actually, since each of these groups has a unique homomorphism onto the group of order 2, it follows that G can be constructed as follows: let π1 and π2 be the homomorphisms from G1 and G2 onto the group Z2 . Now, we consider the fibre product associated with π1 and π2 , that is G = {(a1 , a2 ) | π1 (a1 ) = π2 (a2 )}. Clearly, A26 × P , where P is a group of order 27, is a normal subgroup of G and the map π on G defined by π((a1 , a2 )) = π1 (a1 ), maps G onto Z2 with kernel A26 × P , so G/(A26 × P ) is isomorphic to Z2 . This gives 15 groups, including all direct products of S26 with groups of order 27. This completes the proof of lemma and Theorem 1.7.  4 Non OD-characterizable alternating groups We start this section with a result of M. A. Zvezdina [18, Theorem] which is concerning simple groups whose prime graphs coincide with the prime graph of an alternating simple group. More precisely, she proved: Lemma 4.1 [18, Theorem] Let G be an alternating group An , n > 5, and let S be a finite simple group. Then the prime graphs of G and S coincide if and only if one of the following holds: (a) G = A5 , S = A6 ; (b) G = A6 , S = A5 ; (c) G = A7 , S ∈ {L2 (49), U4 (3)}; (d) G = A9 , S ∈ {J2 , S6 (2), O8+ (2)}; (e) G = An , S = An−1 , n is odd, and the numbers n and n − 4 are composite. Although the groups in the statement (e) of this lemma have the same prime graph and so the same degree pattern, but they have different orders. In fact, we have |An | = |An−1 | × n. 9 Now, if we can choose the number n such that π(n) is contained in the set of vertices of the prime graph Γ(An ) which are joined to all other vertices, then the groups An and An−1 × H, where H is an arbitrary group of order n, have the same order and degree pattern. This will enable us to give a positive answer to problem 1.5. Let G be a finite group satisfying |G| = |Am | = m!/2 and D(G) = D(Am ). By [4, Lemma 2.15], the prime graph Γ(G) coincides with Γ(Am ). Simply, Γ(G) is a graph with vertex set π(G) = {2, 3, 5, . . . , lm } in which two distinct vertices r and s are joined by an edge iff r + s 6 m if r and s are odd primes and r + 2 6 m − 2 if s = 2. If △(m) 6 2 and p = lm , then we will deal with the alternating groups Ap , Ap+1 and Ap+2 , which are OD-charaterizable (see [10, Theorem 1.5]). Therefore, we may consider the alternating groups Am for which △(m) > 3. Referring to the already mentioned fact (Proposition 1.3) that all alternating groups Am , 10 6= m 6 100, are OD-characterizable, we restrict our attention to the alternating groups Am where m > 100. In what follows, we prove the following result, which shows that there is an infinite family {Am } of alternating groups such that hOD (Am ) > 3. Proposition 4.2 Let m be an odd number satisfying △(m) > 4 and π(m) ⊆ π(△(m)!). Then hOD (Am ) > 2. In particular, if △(3n ) > 4 (resp. △(5n ) > 4), then hOD (A3n ) > 16 (resp. hOD (A5n ) > 4). Proof. First of all, it follows by Lemma 2.17 in [4] that π(△(m)!) ⊆ Λ(Am ), this would mean that every vertex in π(△(m)!) and so in π(m) is adjacent to all other vertices in π(Am ). Furthermore, since m is an odd number with △(m) > 4, the prime graphs Γ(Am ) and Γ(Am−1 ) coincide by Lemma 4.1. Now, if H is an arbitrary group of order m, then the groups Am and Am−1 × H have the same order and degree pattern, and hence hOD (Am ) > 1 + ν(m) > 2. In the case when △(3n ) > 4, it is routine to check that n > 7, and so hOD (A3n ) > 1 + ν(3n ) > 1 + νa (3n ) = 1 + |Par(n)| > 1 + |Par(7)| = 16. Similarly, if △(5n ) > 4, then n > 3, and we obtain hOD (A5n ) > 1 + ν(5n ) > 1 + νa (5n ) = 1 + |Par(n)| > 1 + |Par(3)| = 4. The proof is complete.  Proof of Theorem 1.6. The result follows immediately from Lemma 2.7 and Proposition 4.2. Note that, the proof of Proposition 4.2 shows that there is no upper bound to hOD (Am ).  By Proposition 4.2, we can find many examples of alternating groups Am with hOD (Am ) > 3. We point out here some of them. 10 (4.a) Some alternating groups Am , m 6 1000, with hOD (Am ) > 3. In this case, we obtain the following simple groups amongst Am with hOD (Am ) > 3 (see Table 1): A125 , A147 , A189 , A539 , A625 , A875 , and for each of these groups, we have (see Table 1): (1) hOD (A125 ) > 1 + ν(125) = 6, (see also [6]), (2) hOD (A147 ) > 1 + ν(147) = 7, (3) hOD (A189 ) > 1 + ν(189) = 14, (4) hOD (A539 ) > 1 + ν(539) = 3, (5) hOD (A625 ) > 1 + ν(625) = 16, (6) hOD (A875 ) > 1 + ν(875) = 6. Table 1. m m−4 lm △(m) 125 = 53 121 = 112 113 147 = 3 · 72 143 = 11 · 13 189 = 3 · 7 539 = 72 · 11 3 625 = 5 4 875 = 53 · 7 π(△(m)!) ν(m) 12 2, 3, 5, 7, 11 5 139 8 2, 3, 5, 7 6 185 = 5 · 37 181 8 2, 3, 5, 7 13 535 = 5 · 107 523 16 2, 3, 5, 7, 11, 13 2 621 = 3 · 23 619 6 2, 3, 5 15 871 = 13 · 67 863 12 2, 3, 5, 7, 11 5 3 We shall use Lemma 2.7 to show that there are infinite families of alternating groups An , with hOD (An ) > 3. (4.b) An infinite family of alternating groups A3n , with hOD (A3n ) > 136. The existence of infinite number of values n for which △(3n ) > 4 is immediate from Lemma 2.7. Indeed, if we take n to be a natural number such that n ≡ 14 (mod 144), then it follows directly that {7, 17} ⊆ π(3n − 2) and similarly {5, 19} ⊆ π(3n − 4), so the numbers 3n − 2 and 3n − 4 are composite. This shows that △(3n ) > 8, for all n ≡ 14 (mod 144) (note that, this provides an alternate proof of Lemma 2.7 for p = 3). Reasoning as in the proof of preceding Proposition 4.2, we have hOD (A3n ) > 1 + ν(3n ) > 1 + νa (3n ) = 1 + |Par(n)| > 1 + |Par(14)| = 136, where Par(n) denotes the set of all partitions of n. In particular, we have hOD (A314 ) > 136. (4.c) An infinite family of alternating groups A5n , with hOD (A5n ) > 4. By Lemma 2.7 again, there exist infinitely many values of n for which △(5n ) > 4. Now for every such n, we have hOD (A5n ) > 4 by Proposition 4.2 (see also [7]). 11 5 On the symmetric groups Sm with hOD (Sm ) > 4 In this section we are looking for finite non-isomorphic groups having the same order and degree pattern as a symmetric group. Suppose that G is a finite group satisfying |G| = |Sm | = m! and D(G) = D(Sm ), for some natural number m. First of all, we conclude from [4, Lemma 2.15] that the prime graph Γ(G) coincides with Γ(Sm ). Actually, Γ(G) is a graph with vertex set π(G) = {2, 3, 5, . . . , lm } in which two distinct vertices r and s are joined by an edge iff r + s 6 m. In the case when △(m) 6 1, we deal with the symmetric groups Sp and Sp+1 , which are OD-charaterizable by [10, Theorem 1.5]. We now consider the symmetric groups Sm for which △(m) > 2, that is Sp+2 , Sp+3 , Sp+4 , . . . , Sp+△(m) , where p = lm . On the other hand, in view of [4, Theorem 1.7] and Theorem 1.7, it follows that all symmetric groups Sm , where 10, 27 6= m 6 100, are 3-fold OD-characterizable, and for this reason we now restrict our attention to the the symmetric groups Sm where m > 100. Here, we first prove the following general result: Proposition 5.1 Let m be an odd number satisfying △(m) > 4 and π(m) ⊆ π(△(m)!). Then hOD (Sm ) > 4. Proof. It follows by Lemma 2.17 in [4] that π(△(m)!) ⊆ Λ(Sm ), this would mean that every vertex in π(△(m)!) and so in π(m) is adjacent to all other vertices in π(Sm ). Moreover, since m is an odd number with △(m) > 4, the prime graphs Γ(Sm ), Γ(Sm−1 ), Γ(Am ) and Γ(Am−1 ) coincide by Corollary 2.4 and Lemma 4.1 (see also [4, Table 7]). Now, if H and K are two arbitrary groups of order m and 2m, respectively, then the groups Sm , Z2 × Am , Z2 · Am , Sm−1 × H, (Z2 × Am−1 ) × H, (Z2 · Am−1 ) × H and Am−1 × K, have the same order and degree pattern, and hence hOD (Sm ) > 4. The proof is complete.  Proof of Theorem 1.10. The result follows immediately from Lemma 2.7 and Proposition 5.1. Note that, the proof of Proposition 5.1 shows that there is no upper bound to hOD (Sm ).  Considering Proposition 5.1, we can now find many examples of symmetric groups Sm satisfying hOD (Sm ) > 4. We point out here some of them. (5.a) Some symmetric groups Sm , m 6 1000, with hOD (Sm ) > 4. As before in (4.a), we can obtain the following symmetric groups amongst Sm , which are k-fold OD-characterizable with k > 4 (see Table 1): S125 , S147 , S189 , S539 , S625 , S875 . The case S125 had already been studied in [6]. (5.b) There is an infinite family of symmetric groups Spn , with p ∈ {3, 5}, such that hOD (Spn ) > 4. 12 Actually, reasoning as before in (4.b) and (4,c), there are an infinite number of values n for which △(pn ) > 4, and the result is now immediate from Proposition 5.1 (see also [7]). We conclude this paper with some comments for future works: (1) Specify the exact value of hOD (An ) (resp. hOD (Sn )) for alternating (resp. symmetric)) groups of degree n for n ∈ {125, 147, 189, 539, 625, 875}. (2) It seems that it should be possible to prove that the value of hOD (An ) (resp. hOD (Sn )) is bounded by some function of n. Acknowledgments The author would like to express his sincere thanks to Prof. I. M. Isaacs for the very helpful comments and suggestions to improve the contents and presentation of the manuscript. The author also would like to thank Professor Andrei V. Zavarnitsine and Professor Robert Styer for their valuable comments and discussions. Finally, he also wishes to thank Dr. A. Mahmoudifar for pointing out references [6, 7] and for carefully reading the manuscript. References [1] M. Akbari and A. R. Moghaddamfar, Simple groups which are 2-fold ODcharacterizable, Bull. Malays. Math. Sci. Soc., 35 (1)(2012), 65–77. [2] J. Bamberg, G. Cairns and K. D. Kilminster, The crystallographic restriction, permutations, and Goldbach’s conjecture, Amer. Math. Monthly, 110(3) (2003), 202–209. [3] J. H. Conway, R. T. Curtis, S. P. Norton, R. A. Parker and R. A. Wilson, Atlas of Finite Groups. Oxford, Clarendon Press, 1985. [4] R. Kogani-Moghaddam and A. R. Moghaddamfar, Groups with the same order and degree pattern, Sci. China Math., 55(4)(2012), 701–720. [5] A. S. Kondratév, Prime graph components of finite simple groups. (Russian) Math. Sb., 180(6)(1989), 787–797. [6] A. Mahmoudifar and B. Khosravi, On characterization by order and prime graph for alternating groups, Siberian Math. J., 56(1)(2015), 125–131. [7] A. Mahmoudifar and B. Khosravi, The answers to a problem and two conjectures about OD-characterization of finite groups, arXiv: 1409.7903v1, 28 September 2015. [8] A. R. Moghaddamfar and S. Rahbariyan, More on the ODcharacterizability of a finite group, Algebra Colloq., 18(4)(2011), 663–674. 13 [9] A. R. Moghaddamfar and A. R. Zokayi, OD-Characterization of alternating and symmetric groups of degrees 16 and 22, Front. Math. China, 4(4)(2009), 669–680. [10] A. R. Moghaddamfar and A. R. Zokayi, Recognizing finite groups through order and degree pattern, Algebra Colloq., 15 (3)(2008), 449–456. [11] A. R. Moghaddamfar, A. R. Zokayi and M. R. Darafsheh, A characterization of finite simple groups by the degrees of vertices of their prime graphs, Algebra Colloq., 12(3)(2005), 431–442. [12] R. Remak, Über die Darstellung der endlichen Gruppen als Untergruppen direkter Produkte, J. Reine Angew. Math., Bd 163, Heft 1 (1930), 1–44. [13] A. V. Vasilév and E. P. Vdovin, An adjacency criterion in the prime graph of a finite simple group, Algebra and Logic, 44(6)(2005), 381–406. [14] J. S. Williams, Prime graph components of finite groups, J. Algebra, 69(2)(1981), 487–513. [15] A. V. Zavarnitsine, Finite simple groups with narrow prime spectrum, Sib. Elektron. Mat. Izv., 6 (2009), 1–12. [16] A. V. Zavarnitsin and V. D. Mazurov, Element orders in coverings of symmetric and alternating groups, Algebra and Logic, 38(3)(1999), 159–170. [17] L. C. Zhang, W. J. Shi, L. L. Wang and C. G. Shao, OD-Characterization of A16 , Journal of Suzhou University (Natural Science Edition), 24 (2008), 7–10. [18] M. A. Zvezdina, On nonabelian simple groups with the same prime graph as an alternating group, Sib. Math. J., 54(1) (2013), 47–55. 14
4math.GR
A Constructor-Based Reachability Logic for Rewrite Theories arXiv:1709.05045v1 [cs.PL] 15 Sep 2017 Stephen Skeirik, Andrei Stefanescu and José Meseguer University of Illinois at Urbana-Champaign, USA Abstract. Reachability logic has been applied to K rewrite-rule-based language definitions as a language-generic logic of programs. To be able to verify not just code but also distributed system designs, a new rewritetheory-generic reachability logic is presented and proved sound for a wide class of rewrite theories. The logic’s automation is increased by means of constructor-based semantic unification, matching, and satisfiability procedures. New methods for proving invariants of possibly never terminating distributed systems are developed, and experiments with a prototype implementation illustrating the new proof methods are presented. Keywords: program verification, rewriting logic, reachability logic 1 Introduction The main applications of reachability logic to date have been as a languagegeneric logic of programs [14,15]. In these applications, a K specification of a language’s operational semantics by means of rewrite rules is assumed as the language’s “golden semantic standard,” and a correct-by-construction reachability logic for a language so defined is automatically obtained [15]. This method has been effective in proving reachability properties for a wide range of programs. Although the foundations of reachability logic are very general [14,15], the existing theory does not provide straightforward answers to the following questions: (1) Could a reachability logic be developed to verify not just conventional programs, but also distributed system designs and algorithms formalized as rewrite theories in rewriting logic [8]? (2) If so, what would be the most natural way to conceive such a rewrite-theory-generic logic? A satisfactory answer to questions (1)–(2) would move the verification game from the level of verifying code to that of verifying both code and distributed system designs. Since the cost of design errors can be several orders of magnitude higher than that of coding errors, answering questions (1) and (2) is of practical software engineering interest. Although a first step towards a reachability logic for rewrite theories has been taken in [6], as explained in Section 7 and below, that first step still leaves several important questions open. The most burning one is how to prove invariants. Since they are the most basic safety properties, support for proving invariants is a sine qua non requirement. As explained below, a serious obstacle is what we call the invariant paradox : we cannot verify in this manner any invariants of a never-terminating system such as, for example, a mutual exclusion protocol. 2 A second open question is how to best take advantage of the wealth of equational reasoning techniques such as matching, unification, and narrowing modulo an equational theory (Σ, E), and of recent results on decidable satisfiability of quantifier-free formulas in initial algebras, e.g., [9] to automate as much as possible reachability logic deduction. In this regard, the very general foundations of reachability logic —which assume any Σ-algebra A with a first-order-definable transition relation— provide no help at all for automation. As shown in this work and its prototype implementation, if we assume instead that the model in question is the initial model TR of a rewrite theory R satisfying reasonable assumptions, large parts of the verification effort can be automated. A third important issue is simplicity. Reachability logic has eight inference rules [14,15]. Could a reachability logic for rewrite theories be simpler? This work tackles head on these three open questions to provide a general reachability logic and a prototype implementation suitable for reasoning about properties of both distributed systems and programs based on their rewriting logic semantics. Rewriting Logic in a Nutshell. A distributed system can be designed and modeled as a rewrite theory R = (Σ, E, R) [8] in the following way: (i) the distributed system’s states are modeled as elements of the initial algebra TΣ/E associated to the equational theory (Σ, E) with function symbols Σ and equations E; and (ii) the system’s concurrent transitions are modeled by rewrite rules R, which are applied modulo E. Let us consider the QLOCK [5] mutual exclusion protocol, explained in detail in Section 2. QLOCK allows an unbounded number of processes, which can be identified by numbers. Such processes can be in one of three states: “normal” (doing their own thing), “waiting” for a resource, and “critical,” i.e., using the resource. Waiting processes enqueue their identifier at the end of a waiting queue and can become critical when their name appears at the head of the queue. A QLOCK state can be represented as a tuple < n | w | c | q > where n, resp. w, resp. c, denotes the set of identifiers for normal, resp. waiting, resp. critical processes, and q is the waiting queue. QLOCK can be modeled as a rewrite theory R = (Σ, E, R), where E includes axioms such as associativity-commutativity of multiset union, list associativity, and identity axioms for ∅ and nil . QLOCK’s behavior is specified by five rewrite rules R. Rule w2c below specifies a waiting process i becoming critical w2c : < n | w i | c | i; q > → < n | w | c i | i; q > . Reachability Logic in a Nutshell. A reachability logic formula has the form A →⊛ B, with A and B state predicates (see Section 3). Assume for simplicity that vars(A) ∩ vars(B) = ∅. Such a formula is then interpreted in the initial model TR of a rewrite theory R = (Σ, E, R), whose states are E-equivalence classes [u] of ground Σ-terms, and where a state transition [u] →R [v] holds iff R ⊢ u → v according to the rewriting logic inference system [8] (computation = deduction). As a first approximation, A →⊛ B is a Hoare logic partial correctness assertion of the form {A}R{B}, but with the slight twist that B need not hold of a terminating state, but just somewhere along the way. To be fully precise, A →⊛ B holds in TR iff for each state [u0 ] satisfying A and each terminating 3 sequence [u0 ] →R [u1 ] . . . →R [un−1 ] →R [un ] there is a j, 0 ≤ j ≤ n such that [uj ] satisfies B. A key question is how to choose a good language of state predicates like A and B. Here is where the potential for increasing the logic’s automation resides. We call our proposed logic constructor-based, because our choice is to make A and B positive (only ∨ and ∧) combinations of what we call constructor patterns of the form u | ϕ, where u is a constructor term1 and ϕ a quantifier-free (QF) Σ-formula. The state predicate u | ϕ holds for a state [u′ ] iff there is a ground substitution ρ such that [u′ ] = [uρ] and E |= ϕρ. The Invariant Paradox. How can we prove invariants in such a reachability logic? For example, mutual exclusion for QLOCK? Paradoxically, we cannot! This is because QLOCK, like many other protocols, never terminates, that is, has no terminating sequences whatsoever. And this has the ludicrous trivial consequence that QLOCK’s initial model TR vacuously satisfies all reachability formulas A →⊛ B. This of course means that it is in fact impossible to prove any invariants using reachability logic in the initial model TR . But it does not mean that it is impossible using some other initial model. In Section 4.1 we give a systematic solution to this paradox by means of a simple theory transformation allowing us to prove any invariant in the original initial model TR by proving an equivalent reachability formula in the initial model of the transformed theory. Our Contributions. Section 2 gathers preliminaries. The main theoretical contributions of a simple semantics and inference system for a rewrite-theory-generic reachability logic with just two inference rules and its soundness are developed in Sections 4 and 5. A systematic methodology to prove invariants by means of reachability formulas is developed in Section 4.1. The goal of increasing the logic’s potential for automation by making it constructor-based is advanced in Sections 3–5. A proof of concept of the entire approach is given by means of a Maude-based prototype implementation and a suite of experiments verifying various properties of distributed system designs in Section 6. Related work and conclusions are discussed in Section 7. Proofs can be found in [13]. 2 Many-Sorted Algebra and Rewriting Logic We present some preliminaries on many-sorted algebra and rewriting logic. For a more general treatment using order-sorted algebra see [13]. Readers familiar with many-sorted logic may go directly to Def. 1. We assume familiarity with the following basic concepts and notation that are explained in full detail in, e.g., [10]: (i) many-sorted (MS) signature as a pair Σ = (S, Σ) with S a set of sorts and Σ an S ∗ × S-indexed family Σ = {Σw,s }(w,s)∈S ∗×S of function symbols, where f ∈ Σs1 ...sn ,s is displayed as f : s1 . . . sn → s; (ii) Σ-algebra A as a pair A = (A, A ) with A = {As }s∈S an S-indexed family of sets, and A a mapping interpreting each f : s1 . . . sn → s as a function in the set [As1 × . . .× Asn → As ]. (iii) Σ-homomorphism h : A → B as an S-indexed family of functions h = {hs : 1 That is, a term in a subsignature Ω ⊆ Σ such that each ground Σ-term is equal modulo E to a ground Ω-term. 4 As → Bs }s∈S preserving the operations in Σ; (iv) the term Σ-algebra TΣ and its initiality in the category MSAlgΣ of Σ-algebras when Σ is unambiguous. An S-sorted set X = {Xs }s∈S of variables, satisfies s 6= s′ ⇒ Xs ∩ Xs′ = ∅, and the variables in X are always assumed disjoint from all constants in Σ. The Σ-term algebra on variables X, TΣ (X), is the initial algebra for the signature Σ(X) obtained by adding to Σ the variables X as extra constants. Since a Σ(X)-algebra is just a pair (A, α), with A a Σ-algebra, and α an interpretation of the constants in X, i.e., an S-sorted function α ∈ [X →A], the Σ(X)-initiality of TΣ (X) means that for each A ∈ MSAlgΣ and α ∈ [X →A], there exists a unique Σ-homomorphism, α : TΣ (X) → A extending α, i.e., such that for each s ∈ S and x ∈ Xs we have xαs = αs (x). In particular, when A = TΣ (Y ), an interpretation of the constants in X, i.e., an S-sorted function σ ∈ [X →TΣ (Y )] is called a substitution, and its unique homomorphic extension σ : TΣ (X) → TΣ (Y ) is also S called a substitution. Define dom(σ) = {x ∈ X | x 6= xσ}, and ran(σ) = x∈dom(σ) vars(xσ). Given variables Z, the substitution σ|Z agrees with σ on Z and is the identity elsewhere. We also assume familiarity with many-sorted first-order logic including: (i) the first-order language of Σ-formulas for Σ a signature (in our case Σ has only function symbols and the = predicate); (ii) given a Σ-algebra A, a formula ϕ ∈ Form(Σ), and an assignment α ∈ [Y →A], with Y = fvars(ϕ) the free variables of ϕ, the satisfaction relation A, α |= ϕ (iii) the notions of a formula ϕ ∈ Form(Σ) being valid, denoted A |= ϕ, resp. satisfiable in a Σ-algebra A. For a subsignature Ω ⊆ Σ and A ∈ MSAlgΣ , the reduct A|Ω ∈ MSAlgΩ agrees with A in the interpretation of all sorts and operations in Ω and discards everything in Σ \ Ω. If ϕ ∈ Form(Ω) we have the equivalence A |= ϕ ⇔ A|Ω |= ϕ. An MS equational theory is a pair T = (Σ, E), with E a set of (possibly conditional) Σ-equations. MSAlg(Σ,E) denotes the full subcategory of MSAlgΣ with objects those A ∈ MSAlgΣ such that A |= E, called the (Σ, E)-algebras. MSAlg(Σ,E) has an initial algebra TΣ/E [10]. The inference system in [10] is sound and complete for MS equational deduction, i.e., for any MS equational theory (Σ, E), and Σ-equation u = v we have an equivalence E ⊢ u = v ⇔ E |= u = v. For the sake of simpler inference we assume non-empty sorts, i.e., ∀s ∈ S TΣ , s 6= ∅. Deducibility E ⊢ u = v is abbreviated as u =E v, called E-equality. An E-unifier of a system of Σ-equations, i.e., a conjunction φ = u1 = v1 ∧ . . . ∧ un = vn of Σ-equations is a substitution σ such that ui σ =E vi σ, 1 ≤ i ≤ n. An E-unification algorithm for (Σ, E) is an algorithm generating a complete set of E-unifiers Unif E (φ) for any system of Σ equations φ, where “complete” means that for any E-unifier σ of φ there is a τ ∈ Unif E (φ) and a substitution ρ such that σ =E (τ ρ)|dom (σ)∪dom(τ ) , where =E here means that for any variable x we have xσ =E x(τ ρ)|dom (σ)∪dom(τ ) . The algorithm is finitary if it always terminates with a finite set Unif E (φ) for any φ. We recall some basic concepts about rewriting logic. The survey in [8] gives a fuller account. A rewrite theory R axiomatizes a distributed system, so that concurrent computation is modeled as concurrent rewriting with the rules of R modulo the equations of R. Recall also the following notation from [3]: (i) 5 positions in a term viewed as a tree are marked by strings p ∈ N∗ specifying a path from the root, (ii) t|p denotes the subterm of term t at position p, and (iii) t[u]p denotes the result of replacing subterm t|p at position p by u. Definition 1. A rewrite theory is a 3-tuple R = (Σ, E ∪ B, R) with (Σ, E ∪ B) an MS equational theory and R a set of conditional Σ-rewrite rules l → r if φ, with l, r ∈ TΣ (X)s for some s ∈ S, and φ a quantifier-free Σ-formula. We further assume that: (1) Each equation u = v ∈ B is regular, i.e., vars(u) = vars(v), and linear, i.e., there are no repeated variables in either u or v. (2) The equations ~ = {u → v if ψ | u = v if ψ ∈ E, when oriented as conditional rewrite rules E E}, are convergent modulo B, i.e., strictly coherent, confluent, and operationally terminating as rewrite rules modulo B [7]. (3) The rules R are ground coherent with the equations E modulo B [4]. Conditions (1)–(2) ensure that the initial algebra TΣ/E∪B is isomorphic to the canonical term algebra CΣ/E,B , whose elements are B-equivalence classes ~ B-irreducible ground Σ-terms. Define the one-step R, B-rewrite relation of E, t →R,B t′ between ground terms as follows. For t, t′ ∈ TΣ,s , s ∈ S, t →R,B t′ holds iff there is a rewrite rule l → r if φ ∈ R, a ground substitution σ ∈ [Y →TΣ ] with Y the rule’s variables, and a term position p in t such that t|p =B lσ, t′ = t[rσ]p , and E ∪ B |= φσ. In the context of (1)–(2), condition (3) ensures ~ B-canonical forms before performing R, B-rewriting” is a that “computing E, complete strategy. That is, if t →R,B t′ and u = t!E,B , i.e., t →∗E,B u with u in ~ ~ E, B-canonical form (abbreviated in what follows to u = t!), then there exists a u′ such that u →R,B u′ and t′ ! =B u′ !. Note that vars(r) ⊆ vars(l) is nowhere assumed for rules l → r if φ ∈ R. This means that R can specify an open system, in the sense of [11], that interacts with an external, non-deterministic environment such as, for example, a thermostat. Conditions (1)–(3) allow a simple description of the initial reachability model TR [8] of R as the canonical reachability model CR whose states belong to the canonical term algebra CΣ/E,B , and the one-step transition relation [u] →R [v] holds iff u →R,B u′ and [u′ !] = [v]. Furthermore, if u →R,B u′ has been performed with a rewrite rule l → r if φ ∈ R and a ground substitution σ ∈ [Y →TΣ ], then, assuming B-equality is decidable, checking whether condition E ∪ B |= φσ holds ~ B-canonical form. is decidable by reducing the terms in φσ to E, A Running Example. Consider the following rewrite theory R = (Σ, E ∪B, R) modeling a dynamic version of the QLOCK mutual exclusion protocol [5], where (Σ, B) defines the protocol’s states, involving natural numbers, lists, and multisets over natural numbers. Σ has sorts S = {Nat, List , MSet, Conf , State, Pred } with subsorts2 Nat < List and Nat < MSet and operators F = {0 : → Nat , s : : MSet MSet → MSet , ; : Nat → Nat, ∅ : → MSet, nil : → List , List List → List , dupl : MSet → Pred , tt : → Pred , < > : Conf → State, | | | : 2 As pointed out at the beginning of Section 2, [13] treats the more general order-sorted case, where sorts form a poset (S, ≤) with s ≤ s′ interpreted as set containment As ⊆ As′ in a Σ-algebra A. 6 MSet MSet MSet List → Conf }, where underscores denote operator argument placement. The axioms B are the associativity-commutativity of the multiset with identity ∅, and the associativity of list concatenation ; with union identity nil . The only equation in E is dupl (s i i) = tt. It defines the dupl predicate by detecting a duplicated element i in the multiset s i i (s could be empty). States of QLOCK are B-equivalence classes of ground terms of sort State. QLOCK [5] is a mutual exclusion protocol where the number of processes is unbounded. Furthermore, in the dynamic version of QLOCK presented below, such a number can grow or shrink. Each process is identified by a number. The system configuration has three sets of processes (normal, waiting, and critical) plus a waiting queue. To ensure mutual exclusion, a normal process must first register its name at the end of the waiting queue. When its name appears at the front of the queue, it is allowed to enter the critical section. The first three rewrite rules in R below specify how a normal process i first transitions to a waiting process, then to a critical process, and back to normal. The last two rules in R specify how a process can dynamically join or exit the system. n2w w2c c2n join exit :<n i |w |c |q > → <n |w i |c |q ;i :<n |w i |c |i ;q > → <n |w |c i |i ;q :<n |w |c i |i ;q > → <n i |w |c |q :<n |w |c |q > → <n i |w |c |q :<n i |w |c |q > → <n |w |c |q > > > > if φ > where φ ≡ dupl (n i w c) 6= tt, i is a number, n, w , and c are, respectively, normal, waiting, and critical process identifier sets, and q is a queue of process identifiers. It is easy to check that R = (Σ, E ∪ B, R) satisfies requirements (1)–(3). Note that join makes QLOCK an open system in the sense explained above. 3 Constrained Constructor Pattern Predicates Given an MS equational theory (Σ, E ∪B), the atomic state predicates appearing in the constructor-based reachability logic formulas of Section 4 will be pairs u | ϕ, called constrained constructor patterns, with u a term in a subsignature Ω ⊆ Σ of constructors, and ϕ a quantifier-free Σ-formula. Intuitively, u | ϕ is a pattern describing the set of states that are EΩ ∪ BΩ -equal to ground terms of the form uρ for ρ a ground constructor substitution such that E ∪ B |= ϕρ. Therefore, u | ϕ can be used as a symbolic description of a, typically infinite, set of states in the canonical reachability model CR of a rewrite theory R. Often, the signature Σ on which TΣ/E∪B is defined has a natural decomposition as a disjoint union Σ = Ω ⊎ ∆, where the elements of the canonical term algebra CΣ/E,B are Ω-terms, whereas the function symbols f ∈ ∆ are viewed ~ B-simplification. Ω (with as defined functions which are evaluated away by E, same poset of sorts as Σ) is then called a constructor subsignature of Σ. ~ A decomposition of a MS equational theory (Σ, E ∪ B) is a triple (Σ, B, E) ~ are convergent modulo B. (Σ, B, E) ~ is called sufficiently such that the rules E complete with respect to the constructor subsignature Ω iff for each t ∈ TΣ 7 we have: (i) t!E,B ∈ TΩ , and (ii) if u ∈ TΩ and u =B v, then v ∈ TΩ . This ~ ensures that for each [u]B ∈ CΣ/E,B we have [u]B ⊆ TΩ . Sufficient completeness is closely related to the notion of a protecting inclusion of decompositions. Definition 2. Let (Σ0 , E0 ∪ B0 ) ⊆ (Σ, E ∪ B) be a theory inclusion such that ~ are respective decompositions of (Σ0 , E0 ∪ B0 ) and (Σ0 , B0 , E~0 ) and (Σ, B, E) ~ protects (Σ0 , B0 , E~0 ) (Σ, E ∪ B). We then say that the decomposition (Σ, B, E) ′ ′ iff (i) for all t, t ∈ TΣ0 (X) we have: (i) t =B0 t ⇔ t =B t′ , (ii) t = t!E~0 ,B0 ⇔ t = t!E,B ~ , and (iii) CΣ0 /E0 ,B0 = CΣ/E,B |Σ0 . ~ iff (i) (Σ, B, E) ~ (Ω, BΩ , E~Ω ) is a constructor decomposition of (Σ, B, E) ~ ~ protects (Ω, BΩ , EΩ ), and (ii) (Σ, B, E) is sufficiently complete with respect to the constructor subsignature Ω. Furthermore, Ω is called a subsignature of free constructors modulo BΩ iff EΩ = ∅, so that CΩ/EΩ ,BΩ = TΩ/,BΩ . We are now ready to define constrained constructor pattern predicates. ~ A Definition 3. Let (Ω, BΩ , E~Ω ) be a constructor decomposition of (Σ, B, E). constrained constructor pattern is an expression u | ϕ with u ∈ TΩ (X) and ϕ a QF Σ-formula. The set PatPred (Ω, Σ) of constrained constructor pattern predicates contains ⊥ and the set of constrained constructor patterns, and is closed under disjunction (∨) and conjunction (∧). Capital letters A, B, . . . , P, Q, . . . range over PatPred (Ω, Σ). The semantics of a constrained constructor pattern predicate A is a subset JAK ⊆ CΣ/E,B defined inductively as follows: 1. 2. 3. 4. J⊥K = ∅ Ju | ϕK = {[(uρ)!]BΩ ∈ CΣ/E,B | ρ ∈ [X →TΩ ] ∧ E ∪ B |= ϕρ}. JA ∨ BK = JAK ∪ JBK JA ∧ BK = JAK ∩ JBK. Note that for any constructor pattern predicate A, if σ is a (sort-preserving) bijective renaming of variables we always have JAK = JAσK. Given constructor patterns u | ϕ and v | ψ with vars(u | ϕ) ∩ vars(v | ψ) = ∅, we say that u | ϕ subsumes v | ψ iff there is a substitution α such that: (i) v =EΩ ∪BΩ uα, and (ii) TE∪B |= ψ ⇒ (ϕα). It then follows easily from the above definition W of Ju | ϕK that if u | ϕ subsumes v | ψ, then Jv | ψK ⊆ Ju | ϕK. Likewise, i∈I ui | ϕi subsumes v | ψ iff there is a k ∈ I such that uk | ϕk subsumes v | ψ. Pattern Predicate Example. Letting n, w , c be multisets of process identifiers and q be an associative list of process identifiers, recall that QLOCK states have the form < n | w | c | q >. From the five rewrite rules defining QLOCK, it is easy to prove that if < n | w | c | q > →∗ < n ′ | w ′ | c ′ | q ′ > and n w c is a set (has no repeated elements), then n′ w′ c′ is also a set. Of course, it seems very reasonable to assume that these process identifier multisets are, in fact, sets, since otherwise we could, for example, have a process i which is both waiting and critical at the same time. We can rule out such ambiguous states by means of the pattern predicate < n | w | c | q > | dupl (n w c) 6= tt. If EΩ ∪ BΩ has a finitary unification algorithm, any constrained constructor W pattern predicate A is semantically equivalent to a finite disjunction i ui | ϕi 8 of constrained constructor patterns. This is because: (i) by (3)–(4) in Def. 3 we may assume A in disjunctive normal form; and (ii) it is easy to check that S J(u | ϕ) ∧ (v | φ)K = α∈Unif E ∪B (u,v) Juα | (ϕ ∧ φ)αK, were we assume that Ω Ω vars(u | ϕ) ∩ vars(v | ψ) = ∅, and that all variables in ran(α) are fresh. Pattern intersection can also be defined when u | ϕ and v | φ share parameters Y = vars(u | ϕ) ∩ vars(v | φ) = vars(u) ∩ vars(v). [13] defines in detail the notions of parametric intersection Ju | ϕK ∩Y Jv | φK and of parametric subsumption v | φ ⊆Y u | ϕ of patterns. These notions are very useful to reason about parameterized invariants and co-invariants (see Section 4.1 and [13]). 4 Constructor-Based Reachability Logic The constructor-based reachability logic we define is a logic to reason about reachability properties of the canonical reachability model CR of a topmost rewrite theory R where “topmost” intuitively means all rewrites must occur at the top of the term.3 Many rewrite theories of interest, including those specifying distributed object-oriented systems or the semantics of (possibly concurrent) programming languages, can be easily made topmost by a theory transformation (see, e.g., [16]). Formally, we require R = (Σ, E ∪ B, R), besides satisfying the requirements in Definition 1, also satisfies: ~ and a constructor 1. (Σ, E ∪ B) has a sort State, a decomposition (Σ, B, E), ~ decomposition (Ω, BΩ , EΩ ) where: (i) ∀u ∈ TΩ (X)State , vars(u) = vars(u!); (ii) BΩ are linear and regular with a finitary EΩ ∪ BΩ -unification algorithm. 2. Rules in R have the form l → r if ϕ with l ∈ TΩ (X). Furthermore, they are topmost in the sense that: (i) for all such rules, l and r have sort State, and (ii) for any u ∈ TΩ (X)State and any non-empty position p in u, u|p 6∈ TΩ (X)State . Requirements (1)–(2) ensure that in the canonical reachability model CR if [u] →R [v] holds, then the R, B-rewrite u →R,B u′ such that [u′ !] = [v] happens at the top of u, i.e., uses a rewrite rule l → r if ϕ ∈ R and a ground substitution σ ∈ [Y →TΩ ], with Y the rule’s variables, such that u =BΩ lσ and u′ = rσ. We are now ready to define the formulas of our constructor-based reachability logic for R satisfying above requirements (1)–(2). Let PatPred (Ω, Σ)State denote the subset of PatPred (Ω, Σ) determined by those pattern predicates A such that, for all atomic constrained constructor predicates u | ϕ appearing in A, u has sort State. Reachability logic formulas then have the form: A →⊛ B, with A, B ∈ PatPred (Ω, Σ)State . The parameters Y of A →⊛ B are the variables in the set Y = vars(A)∩vars(B), and A →⊛ B is called unparameterized iff Y = ∅. The reachability logic in [14,15] is based on terminating sequences of state transitions; when there are no terminating states, all reachability formulas are vacuously true. Our purpose is to extend the logic in order to verify properties of general distributed systems specified as rewrite theories R which may never 3 Topmost theories have reachability completeness for narrowing [16]. Our inference system uses narrowing to symbolically compute successor states in CR . 9 terminate. For this, as explained in Section 4.1, we generalize the all-paths satisfaction relation in [15], which for a theory R we denote by R |=∀ A →⊛ B, to a relativized satisfaction relation R |=∀T A →⊛ B, where T is a constrained pattern predicate such that JT K is a set of terminating states. That is, let Term R = {[u] ∈ CR,State | (6 ∃[v]) [u] →R [v]}. We then require JT K ⊆ Term R . The standard relation R |=∀ A →⊛ B is then recovered as the special case where JT K = Term R . Call [u] →∗R [v] a T -terminating sequence iff [v] ∈ JT K. Definition 4. Given T with JT K ⊆ Term R , the all-paths satisfaction relaW tion R |=∀T u | ϕ →⊛ j∈J vj | φj asserts the satisfaction of the formula W u | ϕ →⊛ j∈J vj | φj in the canonical reachability model CR of a rewrite theory R satisfyingWtopmost requirements (1)–(2). It is defined as follows: W For u | ϕ →⊛ j∈J vj | φj unparameterized, R |=∀T u | ϕ →⊛ j∈J vj | φj holds iff for each T -terminating sequence [u0 ] →R [u1 ] . . . [un−1 ] →R [un ] with [u0 ] ∈ Ju |WϕK there exist k, 0 ≤ k ≤ n and j ∈ J such that W [uk ] ∈ Jvj | φj K. For u | ϕ →⊛ j∈J vj | φj with parameters Y , R |=∀T u | ϕ →⊛ j∈J vj | φj holds if W R |=∀T (u | ϕ)ρ →⊛ ( j∈J vj | φj )ρ holds for each ρ ∈ [Y →TΩ ]. Since a constrained pattern predicate is equivalent to a disjunction of atomic ones, we Wcan define satisfaction onVgeneral reachability logic formulas as follows: R |=∀T 1≤i≤n ui | ϕi →⊛ A iff 1≤i≤n R |=∀T ui | ϕi →⊛ A, assuming same parameters Yi = vars(ui | ϕi ) ∩ vars(A), i.e., Yi = Yi′ for 1 ≤ i < i′ ≤ n. R |=∀T A →⊛ B is a partial correctness assertion: If state [u] satisfies “precondition” A, then “postcondition” B is satisfied somewhere along each T -terminating sequences from [u], generalizing a Hoare formula {A}R{B} [13]. Recall that rewrite rules l → r if φ are assumed to have l ∈ TΩ (X). For symbolic reasoning purposes it will be very useful to also require that r ∈ TΩ (X). This can be achieved by a theory transformation R 7→ R̂. Stated formally, if R = (Σ, E ∪ B, R), then R̂ = (Σ, E ∪ B, R̂), where the rules R̂ are obtained from the rules R by transforming each l → r if φ in R into the rule l → r′ if φ∧ θ̂, where: (i) r′ is the Ω-abstraction of r obtained by replacing each length-minimal position p of r such that t|p 6∈ TΩ (X) by a fresh variable xp whose sort is the V least sort of t|p , (ii) θ̂ = p∈P xp = tp , where P is the set of all length-minimal positions in r such that t|p 6∈ TΩ (X). The key semantic property about this transformation is: Lemma 1. The canonical reachability models CR and CR̂ are identical. 4.1 Invariants, Co-Invariants, and Never-Terminating Systems The notion of an invariant applies to any transition system S = (S, →S ) with states S and transition relation →S ⊆ S×S. The set Reach(S0 ) of states reachable from S0 ⊆ S is defined as Reach(S0 ) = {s ∈ S | (∃s0 ∈ S0 ) s0 →∗S s}, where →∗S denotes the reflexive-transitive closure of →S . An invariant about S with initial states S0 can be specified in two ways: (i) by a “good” property P ⊆ S, the invariant, that always holds from S0 , i.e., such that Reach(S0 ) ⊆ P , or (ii) as 10 a “bad” property Q ⊆ S, the co-invariant, that never holds from S0 , i.e., such that Reach(S0 ) ∩ Q = ∅. Obviously, P is an invariant iff S \ P is a co-invariant. Suppose we have specified a distributed system by a topmost rewrite theory R, and constrained pattern predicates S0 and P , and we want to prove that JP K is an invariant of the system (CR,State , →R ) from JS0 K. Can we specify such invariant or co-invariant by means of reachability formulas and use the inference system of Section 5 to try to prove such formulas? The answer to the above question is not obvious. Suppose R specifies a neverterminating system, i.e., Term R = ∅. For example, QLOCK and other mutual exclusion protocols are never-terminating. Then, no reachability formula can characterize and invariant holding by means of the satisfaction relation R |=∀T A →⊛ B. The reason for this impossibility is that, since Term R = ∅, R |=∀T A →⊛ B holds vacuously for all reachability formulas A →⊛ B. Is then reachability logic useless to prove invariants? Definitely not. We need to first perform a simple theory transformation. Call an invariant specifiable by constrained pattern predicates S0 and P if JP K is an invariant of (CR,State , →R ) from JS0 K. To ease the exposition, we explain the transformation for the case where Ω has a single state constructor operator, say, h , . . . , i : s1 , . . . , sn → State. The extension to several such operators is straightforward. The theory transformation is of the form R 7→ Rstop , where Rstop is obtained from R by just adding: (1) a new state constructor operator [ , . . . , ] : s1 , . . . , sn → State to Ω, and (2) a new rewrite rule stop : hx1 :s1 , . . . , xn :sn i → [x1 :s1 , . . . , xn :sn ] to R. Also, let [ ] denote the pattern predicate [x1 :s1 , . . . , xn :sn ] | ⊤. Likewise, for any atomic constrained pattern predicate B = hu1 , . . . , un i | ϕ we define the pattern predicate [B] = [u1 , . . . , un ] | ϕ and extend this notation to any union Q of atomic predicates. Since h , . . . , i : s1 , . . . , sn → State is the only state constructor, we can assume without loss of generality that any atomic constrained pattern predicate in R is semantically equivalent to one of the form hu1 , . . . , un i | ϕ. Likewise, any pattern predicate will be semantically equivalent to a union of atomic predicates of such form, called in standard form. Theorem 1. For S0 , P ∈ PatPred (Ω, Σ) constrained pattern predicates in standard form with vars(S0 ) ∩ vars(P ) = ∅, JP K is an invariant of (CR,State , →R ) from JS0 K iff Rstop |=∀[ ] S0 →⊛ [P ]. The notion of a parametric invariant can be reduced to the unparameterized one: if Y = vars(S0 ) ∩ vars(P ), then JP K is an invariant of (CR,State , →R ) from JS0 K with parameters Y iff Rstop |=∀[ ] S0 →⊛ [P ]. That is, iff JP ρK is an (unparameterized) invariant of (CR,State , →R ) from JS0 ρK for each ρ ∈ [Y →TΩ ]. In this way, Theorem 1 extends to parametric invariants. Specifying Invariants for QLOCK. Consider the QLOCK specification from Sections 2 and 3. QLOCK nonterminating is never terminating. However, we can apply the theory transformation in Theorem 1 by adding an operator [ ] : Conf → State and a rule stop : < t > → [t ] for t : Conf . Define the set of initial states by the pattern predicate S0 = < n ′ | ∅ | ∅ | nil > | dupl (n′ ) 6= tt. Since QLOCK states have the form < n | w | c | q >, mutual exclusion means 11 |c| ≤ 1, which is expressible by the pattern predicate < n | w | i | i ; q > ∨ < n | w | ∅ | q >. But we need also to ensure our multisets are actually sets.  Thus, the pattern predicate P =  < n | w | i | i ; q > | dupl (n w i ) 6= tt ∨ < n | w | ∅ | q > | dupl (n w ) 6= tt specifies mutual exclusion. By Theorem 1, QLOCK ensures mutual exclusion from JS0 K iff Rstop |=∀[ ] S0 →⊛ [P ]. The following easy corollary can be very helpful in proving invariants. It can, for example, be applied to prove the mutual exclusion of QLOCK. Corollary 1. Let S0 , P ∈ PatPred (Ω, Σ) be constrained pattern predicates in standard form with vars(S0 )∩vars(P ) = ∅. JP K is an invariant of (CR,State , →R ) from JS0 K if: (i) S0 ⊆ P , and (ii) Rstop |=∀[ ] P →⊛ [P σ], where σ is a sortpreserving bijective renaming of variables such that vars(P ) ∩ vars(P σ) = ∅. Corollary 1 can be extended to parametric invariants (see [13]). The treatment of co-invariants is similar and can also be found in [13]. 5 A Sound Inference System We present our inference system for all-path reachability for any R satisfying topmost requirements (1)–(2), with rules R = {lj → rj if φj }j∈J such that lj , rj ∈ TΩ (X), j ∈ J. Variables of rules in R are always assumed disjoint from variables in reachability formulas; this can be ensured by renaming. The inference system has two proof rules. The Step∀ + Subsumption proof rule allows taking one step of (symbolic) rewriting along all paths according to the rules in R. The Axiom proof rule allows the use of a trusted reachability formula to summarize multiple rewrite steps, and thus to handle repetitive behavior. W These proof rules derive sequents of the form [A, C] ⊢T u | ϕ −→⊛ i vi | ψi , where A and C are finite sets of reachability formulas and T a pattern predicate defining a set of T -terminating ground states. Formulas in A are called axioms and those in C are called circularities. We furthermore assume that in all reachW ability formulas u | ϕ −→⊛ i vi | ψi we have vars(ψi ) ⊆ vars(vi ) ∪ vars(u | ϕ) for each i. According to the implicit quantification of the semantic relation |=∀T this means that any variable in ψi is either universally quantified and comes from the precondition u | ϕ, or is existentially quantified and comes from vi only. This property is an invariant preserved by the two inference rules. Proofs always begin with a set C of formulas that we want to simultaneously prove, so that the proof effort only succeeds if all formulas in C are eventually proved. C contains the main properties we want to prove as well as any auxiliary lemmas that may be needed to carry out the proof. The initial set of goals we want to prove is [∅,WC] ⊢T C, which is a W shorthand for the set of goals {[∅, C] ⊢T u | ϕ −→⊛ i vi | ψi (u | ϕ −→⊛ i vi | ψi ) ∈ C}. Thus, we start without any axioms A, but we shall be able to use the formulas in C as axioms in their own derivation after taking at least on step with the rewrite rules W in R. A very useful feature is that sequents [∅, C] ⊢T u | ϕ −→⊛ i vi | ψi , whose formulas C have been postulated (as the conjectures to be proved), are transformed by Step∀ + Subsumption into sequents of the form [C, ∅] ⊢T 12 W u′ | ϕ′ −→⊛ i vi′ | ψi′ , where now the formulas in C can be assumed valid, and can be used in derivations with the Axiom rule. Verifying QLOCK’s Mutual Exclusion. By Corollary 1, QLOCK’s mutual exclusion can be verified by: (i) using pattern subsumption to check the trivial inclusion JS0 K ⊆ JP K, and (ii) proving Rstop |=∀[ ] P σ →⊛ [P ], where σ is a sortpreserving bijective renaming of variables such that vars(P ) ∩ vars(P σ) = ∅. But, since for QLOCK, P is a disjunction, in our inference system this means proving from Rstop that [∅, C] ⊢[] C, where C are the conjectures: < n ′ | w ′ | i ′ | i ′ ; q ′ > | ϕ′ →⊛ [< n | w | i | i ; q > | ϕ ∨ < n | w | ∅ | q > | ψ] < n ′ | w ′ | ∅ | q ′ > | ψ ′ →⊛ [< n | w | i | i ; q > | ϕ ∨ < n | w | ∅ | q > | ψ]. where ϕ ≡ dupl (n w i) 6= tt, ψ ≡ dupl (n w ) 6= tt, and ϕ′ , ψ ′ are their obvious renamings. Before explaining the Step∀ + Subsumption proof rule we W introduce some notational conventions. Assume T is the pattern predicate T = j tj | χj , with vars(χj ) ⊆ vars(tj ), and let R = {lj → rj if φj }j∈J , we then define: match(u, {vi }i∈I ) ⊆ {(i, β) | β ∈ [vars (vi ) \ vars(u) → TΩ (X)] s.t. u =EΩ ∪BΩ vi β} a complete set of (parameter-preserving) EΩ ∪ BΩ -matches of u against the vi , unify(u | ϕ′ , R) ≡ {(j, α) | α ∈ UnifEΩ ∪BΩ (u, lj ) and (ϕ′ ∧φj )α satisfiable in TΣ/E∪B } a complete set of EΩ ∪ BΩ -unifiers of a pattern u | ϕ′ with the lefthand-sides of the rules in R with satisfiable associated constraints.4 Consider now the rule: Step∀ + Subsumption ^ [A ∪ C, ∅] ⊢T (rj | ϕ′ ∧ φj )α −→⊛ i (j,α)∈unify(u|ϕ′ , R) [A, C] ⊢T u | ϕ −→⊛ _ (vi | ψi )α _ vi | ψi i V where ϕ′ ≡ ϕ ∧ (i,β)∈match(u, {vi }) ¬(ψi β). This inference rule allows us to take one step with the rules in R. Intuitively, u | ϕ′ characterizes the states satisfying u | ϕ that are not subsumed by any vi | ψi ; that is, states in the lefthand side of the current goal that have not yet reached the righthand side. 4 In the current prototype implementation (see Section 6), variant satisfiability makes ~ convergent modconstraint checking decidable. Future versions will only assume E ulo B for the equational part E ∪ B of R, so that satisfiability of such constraints will in general be undecidable. Unifiers whose associated constraints cannot be proved unsatisfiable will then be included in unify(u | ϕ′ , R) as a safe overapproximation. The same approach will apply to the, in general undecidable, checking of satisfiability/validity for other constraints involved in the application of the Step∀ +Subsumption or Axiom rules below: they will be either over-approximated, or will become proof obligations to be discharged by an inductive theorem prover. 13 W Note that, according to Definition 4, u | ϕ −→⊛ i vi | ψi is semantically valid W iff u | ϕ′ −→⊛ i vi | ψi is valid. Thus, this inference rule only unifies u | ϕ′ with the lefthand W sides of rules in R. We impose on this inference rule a side condition that j,γ∈UnifE ∪B (u,tj ) (ϕ′ ∧ χj )γ is unsatisfiable in TΣ/E∪B , where Ω Ω W T = j tj | χj is the pattern predicate characterizing the chosen T -terminating states. This condition ensures that any state in u | ϕ′ has an R-successor. Thus, W a state in u | ϕ′ reaches on all T -terminating paths a state in i vi | ψi if all its successors do so. Each R-successor is covered by one of (rj | ϕ′ ∧ φj )α. As an optimization, we check that (ϕ′ ∧ φj )α is satisfiable and we Wdrop the ones which are not. Finally, we also W assume that vars((u | ϕ)α)∩vars(( i vi | ψi )α) = vars((rj | ϕ′ ∧ φj )α)∩vars (( i vi | ψi )α). This parameter preservation condition ensures correct implicit quantification. Note that formulas in C are added to A, so that from now on they can be used by Axiom. By using EΩ ∪ BΩ -unification, this inference rule performs narrowing of u | ϕ′ with rules R [16]. Axiom ^ j [{u′ | ϕ′ −→⊛ _ vj′ | ψj′ } ∪ A, ∅] ⊢T vj′ α | ϕ ∧ ψj′ α −→⊛ vi | ψi i j [{u′ | ϕ′ −→⊛ _ _ j vj′ | ψj′ } ∪ A, ∅] ⊢T u | ϕ −→⊛ _ vi | ψi i if ∃α such that u =EΩ ∪BΩ u′ α and TΣ/E∪B |= ϕ ⇒ ϕ′ α. This inference rule allows us to use a trusted formula in A to summarize multiple transition steps. This is similar to how several transition steps would apply to a ground term, except that for ground terms we would check that ϕ′ α is valid, whereas here we check that the condition ϕ implies ϕ′ α. Since ϕ is stronger ϕ′ α, we add ϕ W ′ than ′ ′ ′ ′ ′ ⊛ to (vj | ψj )α (the result of using axiom u | ϕ −→ j vj | ψj ). We assume that W W u | ϕ −→⊛ i vi | ψi and u′ | ϕ′ −→⊛ j vj′ | ψj′ do not share variables, which can always be guaranteed by renaming. For correct implicit quantification, as in Step∀ + Subsumption, W we assume for each j the parameter preservation W condition vars(u | ϕ)∩vars ( i vi | ψi ) = vars(vj′ α | ϕ ∧ ψj′ α)∩vars ( i vi | ψi ). On a practical note, in order to be able to find the α, our implementation requires that vars(ϕ′ ) ⊆ vars(u′ ), so that all the variables in vars(ϕ′ ) are matched. The soundness of Step∀ + Subsumption plus Axiom is now the theorem: Theorem 2. (Soundness) Let R be a rewrite theory, and C a finite set of reachability formulas. If R proves [∅, C] ⊢T C then R |=∀T C. Investigating completeness of the logic is left as future work. 6 Prototype Implementation and Experiments We have implemented the reachability logic proof system in Maude [1]. Our prototype takes as input (i) a rewrite theory R = (Σ, E ∪ B, R, φ) and (ii) a set of reachability formulas C = {Ai →⊛ Bi }i∈I to be simultaneously proved. To mechanize the two proof rules we use a finitary B-unification algorithm as well as an SMT solver to discharge E ∪ B constraints. For SMT solving we 14 use variant satisfiability [9,12], which allows us to handle any rewrite theory R = (Σ, E ∪ B, R) satisfying topmost requirements (1)–(2) and such that the equational theory (Σ, E ∪ B) has a convergent decomposition satisfying the finite variant property [2] and protects a constructor subtheory which we assume consists only of commutative and/or AC and/or identity axioms BΩ . Thus, both validity and satisfiability of QF formulas in the initial algebra TΣ/E∪B are decidable [9]. Future implementations will support more general rewrite theories, add other decision procedures, and use an inductive theorem prover backend. We have verified properties for a suite of examples of rewrite theories specifying distributed systems such as communication or mutual exclusion protocols and real-time systems. Table 1 summarizes these experiments. For further details plus runnable code see http://maude.cs.illinois.edu/tools/rltool/. Table 1. Examples Verified in the Prototype Implementation Example Description of the System/Property Choice Nondeterministically throws away elements from a multiset/eventually only one element left Comm. Protocol 1 Simple communication protocol/received data is always a prefix of the data to be sent Comm. Protocol 2 Fault-tolerant communication protocol/all data is eventually received in-order Dijkstra Dijkstra’s mutual exclusion alg./mutual exclusion Fixed-Size Token Ring 2-Token ring mutual exclusion alg./mutual exclusion QLOCK QLOCK mutual exclusion alg./mutual exclusion Readers/Writers Readers-writers mutual exclusion alg./mutual exclusion Lamport’s Bakery Unbounded Lamport’s bakery/mutual exclusion Thermostat Open system that dynamically responds to temperature/temperature remains in preset bounds To illustrate how the tool works in practice, Fig. 1 shows a partial derivation of a sequent. Recall that for QLOCK we had to prove [∅, C] ⊢[] C, where C was two already-discussed reachability formulas Gi ≡ Pi′ → [P1 ] ∨ [P2 ] for i ∈ {1, 2} with respective preconditions the renamed disjuncts Pi′ , 1 ≤ i ≤ 2 in invariant P1 ∨P2 , and postcondition [P1 ] ∨ [P2 ], where P1 ≡ < n | w | i | i ; q > | dupl(n w i) 6= tt and P2 ≡ < n | w | ∅ | q > | dupl(n w) 6= tt. Now, consider [∅, C] ⊢[] P2′ →⊛ [P ]. In the proof fragement below, the initial sequent must apply the step rule. The result of step(n2w, θ) is the goal resulting from unifying the head of the sequent with the lefthand side of the rule n2w using the unifier θ = {n 7→ n′′ p, w 7→ w′ , c 7→ ∅, q 7→ q ′ }. The next inference axiom(G2 , α) applies axiom G2 using the substitution α ⊇ {n 7→ n3 , w 7→ w3 , i 7→ i3 , q 7→ q 3 }. Since G2 has two constrained patterns in its succedent, we derive two new goals, represented by proof trees T1 and T2 . In either case, we can immediately subsume by noting 15 T1 ≡ ( [C, ∅] ⊢[] [n3 | w3 | ∅ | q 3 ] | dupl (n ′′ w ′ p) 6= tt ∧ dupl (n 3 w 3 ) 6= tt →⊛ [P1 ] ∨ [P2 ] T2 ≡ ( [C, ∅] ⊢[] [n3 | w3 | i3 | i3 ; q 3 ] | dupl (n ′′ w ′ p) 6= tt ∧ dupl(n 3 w 3 i 3 ) 6= tt →⊛ [P1 ] ∨ [P2 ] T1 ′′ ··· T2 ′ ′ [C, ∅] ⊢[] < n | w p | ∅ | q > | dupl (n ′′ w ′ p) 6= tt ··· →⊛ [P1 ] ∨ [P2 ] [∅, C] ⊢[] < n ′ | w ′ | ∅ | q ′ > | dupl(n ′ w ′ ) 6= tt →⊛ [P1 ] ∨ [P2 ] sub(P1 , α) sub(P2 , α) axiom(G2 , α) step(n2w, θ) Fig. 1. Partial Proof Tree for QLOCK that our reachability formula’s antecedent is an instance of either [P1 ] or [P2 ] using substitution α, thus terminating the proof. 7 Related Work and Conclusions This work extends reachability logic [14,15] to a rewrite-theory-generic logic to reason about both distributed system designs and programs. This extension is non-trivial. It requires: (i) relativizing terminating sequences to a chosen subset JT K of terminating states; (ii) solving the “invariant paradox,” to reason about invariants and co-invariants and characterizing them by reachability formulas through a theory transformation; and (iii) making it possible to achieve higher levels of automation by systematically basing the state predicates on positive Boolean combination of patterns of the form u | ϕ with u a constructor term. In contrast, standard reachability logic [14,15] uses matching logic, which assumes a first-order model M and its satisfaction relation M |= ϕ in its reachability logic proof system. As discusses in Section 3, we choose TΣ/E∪B as the model and →R for transitions, rather than some general M and systematically exploit the isomorphism TΣ/E∪B |Ω ∼ = TΩ/EΩ ∪BΩ , allowing us to use unification, matching, narrowing, and satisfiability procedures based on the typically much simpler initial algebra of constructors TΩ/EΩ ∪BΩ . This has the advantage that we can explicitly give the complete details of our inference rules (e.g. how Step∀ + Subsumption checks the subsumption, or ensures that states have at least a successor), instead of relying on a general satisfaction relation |= on some M. The result is a simpler logic with only two rules (versus eight in [14,15]). We agree with the work in [6] on the common goal of making reachability logic rewrite-theory-generic, but differ on the methods used. Main differences include: (1) [6] does not give an inference system but a verification algorithm. (2) the theories used in [6] assume restrictions like those in [11] for “rewriting modulo SMT,” which limit the class of equational theories. (3) Matching is used in [6] 16 instead of unification. Thus, unless a formula has been sufficiently instantiated, no matching rule may exist, whereas unification with some rule is always possible in our case. (4) No method for proving invariants is given in [6]. In conclusion, the goal of making reachability logic a rewrite-theory-generic verification logic has been advanced. Feasibility has been validated with a prototype and a suite of examples. Building a robust and highly effective reachability logic tool for rewrite theories is a more ambitious future goal. Acknowledgements. Partially supported by NSF Grant CNS 14-09416. References 1. M. Clavel, F. Durán, S. Eker, J. Meseguer, P. Lincoln, N. Martı́-Oliet, and C. Talcott. All About Maude – A High-Performance Logical Framework. Springer LNCS Vol. 4350, 2007. 2. H. Comon-Lundh and S. Delaune. The finite variant property: how to get rid of some algebraic properties. In Proc RTA’05, Springer LNCS 3467, 294–307, 2005. 3. N. Dershowitz and J.-P. Jouannaud. Rewrite systems. In Handbook of Theoretical Computer Science, Vol. B, pages 243–320. North-Holland, 1990. 4. F. Durán and J. Meseguer. On the Church-Rosser and coherence properties of conditional order-sorted rewrite theories. J. Log. Algebr. Program., 81(7-8):816– 850, 2012. 5. K. Futatsugi. Fostering proof scores in CafeOBJ. In Proc. ICFEM 2010, volume 6447, pages 1–20. Springer LNCS, 2010. 6. D. Lucanu, V. Rusu, A. Arusoaie, and D. Nowak. Verifying reachability-logic properties on rewriting-logic specifications. In Logic, Rewriting, and Concurrency, volume 9200, pages 451–474. Springer LNCS, 2015. 7. S. Lucas and J. Meseguer. Normal forms and normal theories in conditional rewriting. J. Log. Algebr. Meth. Program., 85(1):67–97, 2016. 8. J. Meseguer. Twenty years of rewriting logic. J. Algebraic and Logic Programming, 81:721–781, 2012. 9. J. Meseguer. Variant-based satisfiability in initial algebras. In C. Artho and P. Ölveczky, editors, Proc. FTSCS 2015, pages 1–32. Springer CCIS 596, 2016. 10. J. Meseguer and J. Goguen. Initiality, induction and computability. In Algebraic Methods in Semantics, pages 459–541. Cambridge UP, 1985. 11. C. Rocha, J. Meseguer, and C. Muñoz. Rewriting modulo SMT and open system analysis. J. Logic and Algebraic Methods in Programming, 86:269–297, 2017. 12. S. Skeirik and J. Meseguer. Metalevel algorithms for variant-based satisfiability. In Proc. WRLA 2016, volume 9942, pages 167–184. Springer LNCS, 2016. 13. S. Skeirik, A. Stefanescu, and J. Meseguer. A constructor-based reachability logic for rewrite theories. Technical report. http://hdl.handle.net/2142/95770. 14. A. Stefanescu, Ş. Ciobâcă, R. Mereuta, B. M. Moore, T. Serbanuta, and G. Rosu. All-path reachability logic. In Proc. RTA-TLCA 2014, volume 8560, pages 425–440. Springer LNCS, 2014. 15. A. Stefanescu, D. Park, S. Yuwen, Y. Li, and G. Rosu. Semantics-based program verifiers for all languages. In Proc. OOPSLA 2016, pages 74–91. ACM, 2016. 16. P. Thati and J. Meseguer. Symbolic reachability analysis using narrowing and its application to the verification of cryptographic protocols. J. Higher-Order and Symbolic Computation, 20(1–2):123–160, 2007.
6cs.PL
Inferring protein-protein interaction and protein-DNA interaction directions based on cause–effect pairs in undirected and mixed networks1 Mehdy Roayaei2 and MohammadReza Razzazi3 Department of Computer Engineering and Information Technology, AmirKabir University of Technology, Tehran, Iran Abstract We consider the following problem: Given an undirected (mixed) network and a set of ordered source-target, or cause-effect pairs, direct all edges so as to maximize the number of pairs that admit a directed source-target path. This is called maximum graph orientation problem, and has applications in understanding interactions in protein-protein interaction networks and proteinDNA interaction networks. We have studied the problem on both undirected and mixed networks. In the undirected case, we determine the parameterized complexity of the problem (for non-fixed and fixed paths) with respect to the number of satisfied pairs, which has been an open problem. Also, we present an exact algorithm which outperforms the previous algorithms on trees with bounded number of leaves. In addition, we present a parameterized-approximation algorithm with respect to a parameter named the number of backbones of a tree. In the mixed case, we present polynomial-time algorithms for the problem on paths and cycles, and an FPTalgorithm based on the combined parameter the number of arcs and the number of pairs on general graphs. Keywords: protein-protein interaction, protein-DNA interaction, cause–effect pairs, fixedparameter tractable, W[1]-hardness 1 This research was in part supported by a grant from I.P.M. Corresponding author ([email protected]). Tel: +982164542732, P.O. Box 15875-4413, #424 Hafez Avenue, AmirKabir University of Technology, Tehran, Iran 3 [email protected] 2 1 1 Introduction Protein-protein interactions (PPIs) form the skeleton of signal transduction in the cell. These interactions carry directed signaling information. However, current technologies [8], [11] cannot decide the direction in which the signal flows. Inferring the directions of these interactions is fundamental to our understanding of how these networks work. Perturbation experiments [16] provide additional information for possible direction of information in these networks. In this experiment, a gene is perturbed (cause) and as a result other genes change their expression levels (effects), to guide the orientation inference. It is assumed that there must be a directed path in the network from the causal gene (source) to the affected gene (target). The resulting combinatorial problem, which is called the maximum graph orientation, is to orient the edges of the network such that a maximum number of cause-effect pairs admit a directed path from the causal to the affected gene. When studying a PPI network in isolation, the input network is undirected. However, the more biologically relevant variant considers also protein-DNA interactions as these are necessary to explain the expression changes. Moreover, the directionality of some PPIs is known in advance [6]. Therefore, generally, the input network is considered as a mixed graph containing both directed and undirected edges. In this paper, we consider the maximum graph orientation on both undirected and mixed graphs. The maximum graph orientation problem on undirected graphs and mixed graphs is defined as follows: Definition 1 (Maximum undirected graph orientation problem- MUGO). An undirected graph 𝐺 = (𝑉, 𝐸), and a set 𝑃 = {(𝑠𝑖 , 𝑡𝑖 ): 1 ≤ 𝑖 ≤ 𝑝} of ordered source-target pairs are given, where 𝐸 is the set of edges. Direct all edges so as to maximize the number of pairs that admit a directed source-target path. Definition 2 (Maximum mixed graph orientation problem- MMGO). A mixed graph 𝐺 = (𝑉, 𝐸, 𝐴), and a set 𝑃 = {(𝑠𝑖 , 𝑡𝑖 ): 1 ≤ 𝑖 ≤ 𝑝} of ordered source-target pairs are given, where 𝐸 is the set of edges and 𝐴 is the set of arcs. Direct all edges so as to maximize the number of pairs that admit a directed source-target path. In the remainder of the paper, let P be the set of input pairs, |𝑃| = 𝑝, V the set of vertices of a tree or a graph, and |𝑉| = 𝑛. By edge, we mean an undirected edge, and by arc, we mean a directed edge. A pair is satisfied, if it admits a directed source-target path. It is shown than an MUGO problem can be converted to an equivalent problem on a tree, which is obtained by contracting cycles of the input graph [12]. Thus, the interesting case is when the input graph is a tree. This problem is called maximum tree orientation (MTO). MTO is NP-hard, even on stars, caterpillars, and binary trees [12], but it is polynomial-solvable on paths. The best approximation ratio obtained for MTO is Ω( log log 𝑛 log 𝑛 2 ) [10]. It is NP-hard to approximate MTO within a factor of 11 . 12 Also, MTO has been studied from the parameterized complexity point of view. It is shown that this problem is fixed-parameter tractable with respect to the parameters the maximum number of pairs passing through a vertex, and the maximum number of cross pairs passing through a vertex (the cross pair is defined as a source-target pair whose corresponding path is directed either towards the root or towards the leaves, but do not change its direction.) [4]. However, it is not fixed-parameter tractable w.r.t. the maximum number of pairs passing through an edge. MMGO is also NP-hard. Furthermore, although MTO, the feasibility version of MMGO, the problem of deciding whether a mixed graph G can be oriented so that the resulting directed graph contains a directed source-target path for all input pairs, is NP-complete [1]. The best approximation ratio obtained for MMGO is Ω( within a factor of 7 8 1 (𝑛|𝑃|)1/3 ) [9]. It is NP-hard to approximate MMGO [6]. To our knowledge, there has been no significant results on the parameterized complexity of MMGO problem. An orientation of a graph is an assignment of a direction to each edge. We say that the pair (𝑠𝑗 , 𝑡𝑗 ) conflicts with the pair (𝑠𝑖 , 𝑡𝑖 ) if there exist no orientation of the input graph for which both (𝑠𝑗 , 𝑡𝑗 ) and (𝑠𝑖 , 𝑡𝑖 ) are satisfied. We call an tree with exactly one vertex of degree more than two, a star-like tree. Split vertex is a vertex of degree two, whose incident arcs have different directions. After orienting an undirected path between the vertices v and w, the nearest split vertex to the vertex v on that path, is denoted by 𝑠𝑝𝑙𝑖𝑡(𝑣, 𝑤). A path between two vertices a and b is denoted by a-to-b or [a-to-b]. If this path does not contain the vertex a (b) and its incident edge, it is denoted by (a-to-b] ([a-to-b)). A path between a vertex v of degree more than two and a vertex of degree one, is called a branch incident to the vertex v. A vertex v is far-adjacent to a vertex w, if by ignoring the vertices of degree two, the vertex v is adjacent to the vertex w. Let T1 and T2 be two subtrees of the tree T. The graph resulting from the merging of these two subtrees is denoted by T1 + T2. A graph is called K4-free, if it does not contain any clique of size 4. Parameterized computation is a new approach dealing with NP-hard problem [2], [17], and [3]. A fixed-parameter tractable algorithm (FPT-algorithm) is an algorithm that solves a problem of input size n and a parameter k in 𝑓(𝑘). 𝑛𝑂(1) time, in which 𝑓 is a computable function depending only on the parameter k [13]. If a problem is W[1]-hard with respect to a parameter k, then it means there is no FPT-algorithm for it (unless FPT = 𝑊[1]). The remainder of the paper is organized as follows. In section 2, the MUGO problem on undirected graphs is studied. We determine the parameterized complexity of the problem (for 3 non-fixed and fixed paths) w.r.t. the number of satisfied pairs, which has been an open problem. Also, we present an exact algorithm which outperforms the previous algorithms on trees with a limited number of leaves. In addition, we present a parameterized-approximation algorithm w.r.t. a parameter named the number of backbones of a tree. In section 3, the MMGO on mixed graphs problem is studied. We present polynomial-time algorithms for paths and cycles, and an FPTalgorithm based on the combined parameter the number of arcs and the number of pairs for general graphs. We conclude our paper in section 4 by introducing some open problems. 2 Undirected Networks In this section, we study the complexity of the MUGO problem w.r.t. the number of satisfied pairs, the number of leaves of the input tree, and a parameter named the number of backbones of the input tree. 2.1 Number of satisfied pairs The parameterized complexity of MUGO problem w.r.t. the number of satisfied pairs has been an open problem [4]. In this subsection, we determine the parameterized complexity of this problem for fixed and non-fixed paths. The fixed-path variant of MUGO is identical to MUGO with the exception that each pair (𝑠𝑗 , 𝑡𝑗 ) ∈ 𝑃 is associated with a fixed path 𝑝𝑗 from 𝑠𝑗 to 𝑡𝑗 in the graph. Hence, a pair (𝑠𝑗 , 𝑡𝑗 ) is satisfied only if the edges of the path 𝑝𝑗 is oriented from the vertex 𝑠𝑗 towards the vertex 𝑡𝑗 . First, we study the problem for non-fixed paths. Since paths are non-fixed, we can assume that the input graph is a tree. Each instance of the MTO problem can be modeled as an instance of the Maximum Independent Set (MIS) problem. An independent set is a set of vertices in a graph, no two of which are adjacent. A maximum independent set is an independent set of largest possible size for a given graph. Each pair (𝑠𝑗 , 𝑡𝑗 ) of MTO instance is considered as a vertex 𝑣𝑗 in the MIS instance. There is an edge between two vertices of MIS instance, if and only if the corresponding pairs conflict with each other. We call the resulting graph a conflict graph. It is clear that finding the optimal solution of the MIS problem on the conflict graph is equivalent to finding the optimal solution of the corresponding MTO instance. Lemma 2.1.1 [4]. The resulting conflict graph of an MTO instance is K4-free. Now, we model the MIS problem as the Party problem [15]: find the minimum number of guests that must be invited so that at least 𝛼 guests will know each other (a clique of size 𝛼) or at least 𝛽 guests will not know each other (an independent set of size 𝛽). The solution of the problem is known as the ramsey number 𝑅(𝛼, 𝛽). Thus, if we consider each vertex of the conflict graph as a 4 guest, and each edge between two vertices as the corresponding guests knowing each other, the rumsey number 𝑛 = 𝑅(𝛼, 𝛽) returns the minimum number of vertices such that a graph with at least n vertices contains a clique of size 𝛼 or an independent set of size 𝛽. Ramsey's theorem states that such a number exists for all 𝛼 and 𝛽. 𝛼+𝛽−2 Lemma 2.1.2 [7]. 𝑅(𝛼, 𝛽) ≤ ( 𝛽−1 ). According to the lemma 2.1.1, the conflict graph whose the number of vertices is equal to or more than 𝑅(4, 𝛽), has an independent set of size at least 𝛽. According to lemma 2.1.2, 𝑅(4, 𝛽) ≤ (𝛽+2)(𝛽+1)(𝛽) (𝛽+2)(𝛽+1)(𝛽) 6 6 . Hence, a conflict graph for which 𝑛 ≥ , has an independent set of size at least 𝛽. Theorem 2.1.1. The MTO problem is fixed-parameter tractable with respect to the maximum number of satisfied pairs. Proof. Let 𝛽 be the maximum number of satisfied pairs. First, create the conflict graph 𝑇𝑐 of the MTO problem. If 𝑝 > (𝛽+2)(𝛽+1)(𝛽) (𝛽+2)(𝛽+1)(𝛽) 6 6 , we can remove arbitrary 𝑝 − vertices from 𝑇𝑐 . According to Ramsey's theorem, 𝑇𝑐 has still an independent set of size at least 𝛽. Thus, regardless of the size of 𝑇𝑐 , it can be reduced to a kernel of size at most (𝛽+2)(𝛽+1)(𝛽) 6 such that there is an independent set of size 𝛽 in the kernel, if and only if there is an independent set of size 𝛽 in 𝑇𝑐 . Since we have reduced the input instance to a polynomial-size kernel w.r.t. to the parameter 𝛽, MTO is fixed-parameter tractable w.r.t. the maximum number of satisfied pairs. □ We show that, despite the non-fixed version, the MUGO problem with fixed paths is W[1]-hard w.r.t. the number of satisfied pairs. We reduce from the K-clique problem: Given an undirected graph 𝐺𝑐 = (𝑉𝑐 , 𝐸𝑐 ), and a parameter K, is there a clique (a set of vertices that are pairwise adjacent) of size K in 𝐺𝑐 ? The K-clique problem is W[1]-hard w.r.t. the parameter K [5]. Given an instance 𝐺𝑐 = (𝑉𝑐 , 𝐸𝑐 ) of K-clique problem, we construct an instance 𝐺 = (𝑉, 𝐸) of MUGO as follows. For each vertex 𝑣𝑖 ∈ 𝑉𝑐 , we create two vertices 𝑠𝑖 and 𝑡𝑖 such that the pair (𝑠𝑖 , 𝑡𝑖 ) is connected by a fixed path 𝑝𝑖 . If there is no edge between the two vertices 𝑣𝑖 , 𝑣𝑗 ∈ 𝑉𝑐 , intersect the corresponding two paths 𝑝𝑖 and 𝑝𝑗 as shown in Figure 1 (a). In this case, the path 𝑝𝑖 contains the edge 𝑢𝑖𝑗 -𝑣𝑖𝑗 , and the path 𝑝𝑗 contains the subpath 𝑢𝑗𝑖 -𝑣𝑖𝑗 -𝑢𝑖𝑗 -𝑣𝑗𝑖 . Otherwise, if there is an edge between two vertices 𝑣𝑖 , 𝑣𝑗 ∈ 𝑉𝑐 , pass one of them above the other, as shown in Figure 1 (b). In this case, the path 𝑝𝑖 contains the edge 𝑢𝑖𝑗 -𝑣𝑖𝑗 , and the path 𝑝𝑗 contains the edge 𝑢𝑗𝑖 -𝑣𝑗𝑖 . 5 ( ) ( ) Figure 1. Intersection of two paths in an MUGO instance In Figure 2, a graph of size five, which contains a 3-clique, and its corresponding MUGO instance is depicted. One can see that the three vertices 𝑣2 , 𝑣3 , and 𝑣5 of the 3-clique in K-clique instance are one-to-one corresponding to the three paths 𝑝2 , 𝑝3 , and 𝑝5 that can be satisfied at the same time in the MUGO instance. The following theorem is the conclusion of the discussion above. Theorem 2.1.2. The maximum graph orientation problem with fixed paths is W[1]-hard w.r.t. the number of satisfied pairs. Proof. According to the discussion above, we reduce from the K-clique problem. Since the Kclique problem is W[1]-hard w.r.t. the parameter K, and the number of satisfied pairs in the MUGO instance is equal to the size of a clique in the K-clique instance, the MUGO problem with fixed paths is W[1]-hard w.r.t. the number of satisfied pairs. □ 6 1 12 5 2 1 21 21 12 3 2 23 13 3 31 31 23 1 2 1 1 32 32 13 1 3 2 2 3 3 2 15 3 5 35 25 5 5 51 51 15 52 52 25 53 53 5 35 1 2 3 5 5 Figure 2. An instance of clique problem and its corresponding MUGO instance 2.2 Number of leaves In [4], the parameterized complexity of MTO was studied w.r.t. to the maximum signal flow over vertices or edges. They defined the notion of cross pair as a source-target pair whose corresponding path is directed either towards the root or towards the leaves, but do not change its direction. They showed that MTO is fixed-parameter tractable with respect to the maximum number of cross pairs passing through a vertex, denoted by 𝑞𝑣 , and presented an 𝑂(2𝑞𝑣 𝑞𝑣 𝑛2 ) time algorithm to solve it. In this subsection, we present an exact algorithm which outperforms the mentioned algorithm on the trees with bounded number of leaves. In fact, We show that the MTO problem is tractable for a constant number of leaves. We use the following straightforward lemmas in this subsection. 7 Lemma 2.2.1. Maximum tree orientation can be solved on paths in 𝑂(𝑛2 ) time [4]. Lemma 2.2.2. The number of vertices of degree more than two in a tree is at most the number of leaves minus two. Consider the star-like tree in Figure 3 (a), which has three leaves. Figure 3. star-like trees with three leaves Without loss of generality, assume that 𝑛 = 3𝑖 + 1, for some even integer i; and there are 𝑖 vertices on each branch of the tree. Regardless of the vertex selected as the root, the maximum number of cross pairs passing through a vertex is 𝑂(𝑛). Hence, using the FPT-algorithm based on the parameter 𝑞𝑣 , this instance is solved in 𝑂(2𝑛 ) time. We present another algorithm that solves this instance in 𝑂(𝑛5 ). We illustrate the core idea of our algorithm in Figure 3 (b). Consider the path between the vertex r and the leaf 𝑣1 . In an arbitrary orientation of the tree, when we walk away from the vertex r to the vertex 𝑣1 , all arcs are in the same direction until we reach to an arc with the different direction (that is, until a split vertex appears). If there is not a split vertex in the path r-to-𝑣1 , it means that all arcs on this path have the same direction. Now, as in Figure 3 (b), assume that the first split vertex on the path (from r-to-𝑣1 ) is the vertex a. One can see that there cannot be a satisfied pair (𝑠𝑗 , 𝑡𝑗 ) such that 𝑠𝑗 ∈ path (a-to-𝑣1 ] and 𝑡𝑗 ∉ path [a-to-𝑣1 ] or vice versa (that is, 𝑡𝑗 ∈ path (a-to-𝑣1 ] and 𝑠𝑗 ∉ path [a-to-𝑣1 ]). Hence, we can process the subpath a-to-𝑣1 independently. 8 This approach can be applied on all branches of the tree. For each branch, there are at most 𝑂(𝑛) possible choices for choosing the first split vertex on that branch. If there is no split vertex on a branch, the leaf of the branch is considered as its first split vertex. Hence, there are at most 𝑂(𝑛3 ) possible combinations for choosing the first split vertices of the branches of the tree. For each combination, the tree is decomposed into three independent paths (a-to-𝑣1 , b-to-𝑣2 , and cto-𝑣3 ), called separated paths, and a star-like tree with the leaves a, b, and c, where all edges of each branch have the same direction. The branches r-to-𝑎, r-to-𝑏, and r-to-𝑐 are called new branches of the tree. According to lemma 2.2.1, the separated paths can be processed simultaneously in 𝑂(𝑛2 ) time. Also, the newly generated star-like tree can be processed in polynomial time. Therefore, the MTO problem on a tree with three leaves can be solved in 𝑂(𝑛5 ) time. This algorithm can be easily generalized for all star-like trees with k leaves, in 𝑂(𝑛𝑘+2 . 2𝑘 . 𝑘) time. We show how our algorithm can be generalized for all trees. Consider the situation, where there is more than one vertex of degree more than two, as in Figure 4(a). First, consider the vertex 𝑟1. Assume that the vertices a, b, and c are the split vertices of the branches incident to 𝑟1. As in the previous case, we decompose the tree at these vertices, and orient each of the new branches (𝑟1 − 𝑎, 𝑟1 − 𝑏, and 𝑟1 − 𝑐). Note that for each separated path, the set of input pairs contains the pairs for which both endpoints are on that path. Also, the remaining subtree can be processed independently. However, the set of input pairs P must be updated for this subtree. For each pair (𝑠𝑗 , 𝑡𝑗 ) ∈ 𝑃, one of the following cases occurs:      Pairs such as (𝑠𝑗 , 𝑡𝑗 ), for which 𝑠𝑗 and 𝑡𝑗 are on one of the separated subpaths. Such pairs must be deleted from the set P. Pairs such as (𝑠𝑗 , 𝑡𝑗 ), for which 𝑠𝑗 (or 𝑡𝑗 ) belongs to one of the separated subpaths (as (𝑠1 , 𝑡1 ) in Figure 4 (a)). Such pairs cannot be satisfied, thus, are removed form P. Pairs such as (𝑠𝑗 , 𝑡𝑗 ), for which 𝑠𝑗 (or 𝑡𝑗 ) belongs to one of the new branches, but cannot be satisfied according to the current orientation (as (𝑠2 , 𝑡2 ) in Figure 4(a)). Such pairs are also removed from P. Pairs such as (𝑠𝑗 , 𝑡𝑗 ), for which 𝑠𝑗 (or 𝑡𝑗 ) belongs to one of the new branches, and may be satisfied according to the current orientation. (as (𝑠3 , 𝑡3 ) in Figure 4 (a)). In this case, 𝑠𝑗 (or 𝑡𝑗 ) is transformed to the corresponding vertex of degree more than two (as 𝑠3 is transformed to 𝑟1 in Figure 4 (b)). In this case, the pair (𝑠𝑗 , 𝑡𝑗 ) in P is replaced by the new pair. Other pairs, which are remained in P. After updating the set P of source-target pairs for each combination of split vertices and new branches orientation, the new branches are removed from the subtree obtained from the decomposition of the tree, as in Figure 4 (b). 9 Thus, after selecting the split vertices of the branches of 𝑟1, decomposing the tree at the split vertices, and then orienting its new branches, the remaining subtree, which has one fewer vertex of degree more than two, can be processed independently. Note that there is always a vertex of degree more than two, which is far-adjacent to exactly one vertex of degree more than two. We start the processing of the tree by choosing such vertex (as 𝑟1 in Figure 4 (a)). Then, this process is iteratively performed until the whole tree is processed. 1 1 2 3 3 5 2 1 2 3 1 6 (a) 2 2 3 5 2 1 3 1 (b) 6 Figure 4. Illustration of the algorithm on general graphs Theorem 2.2.1. Maximum tree orientation can be solved on trees in 𝑂((2𝑛)2𝑘 ) time, where k is the number of leaves of the tree. Proof. As described above, in each iteration of the algorithm, we choose a vertex of degree more than two that is far-incident to exactly one vertex of degree more than two. We determine the split vertices on its branches, decompose the tree at these vertices, orient the new branches, update the source-target pairs, and remove the new branches. This process continues until the whole tree is processed. The number of split vertices that are selected for branches of the tree during the algorithm, are corresponding to the number vertices of degree one or degree more than two. According to lemma 2.2.2, the total number of these split vertices is at most 2𝑘 − 2. Thus, there are 𝑂(𝑛2𝑘−2 ) 10 combinations for selecting the split vertices. Also, there are two possible orientations for each new branch which is obtained after the decomposition of the tree at a split vertex. Therefore, there are 𝑂(22𝑘−2 ) combinations for selecting the orientations of new branches. Altogether, the algorithm runs in 𝑂(𝑛2𝑘 . 22𝑘−2 ) time. Note that we have omitted some polynomial factors from the time complexity of the algorithm to simplify it. This algorithm is depicted in Figure 5. □ 11 Figure 5. The algorithm based on the number of leaves 12 2.3 Number of backbones As stated before, the best approximation ratio obtained for MTO is Ω( log log 𝑛 log 𝑛 ) [10], and there has been no constant-ratio approximation algorithm for it. In this section, we introduce the notion of the backbone in a tree, and present a parameterized-approximation algorithm with respect to the number of backbone of a tree, which provides a constant ratio for trees with bounded number of backbones. A caterpillar is a tree in which all vertices are within distance one of a central path. We define a caterpillar-like tree as a tree in which all vertices of degree more than two are on the same path. We call this central path, a backbone. Consider the star-like tree and the caterpillar-like tree in Figure 6.(a). In the star-like tree, orient each branch randomly. Since each pair passes through at most two branches, thus, each pair is satisfied with a probability of at least 1/4. In the caterpillar-like tree, orient the central path (the backbone) 𝑣1 -to-𝑣2 and each of the branches incident to it randomly. Analogously, each pair is satisfied with a probability of at least 1/8. 1 2 (a) 3 1 2 (b) Figure 6. (a) a star-like and a caterpillar-like tree (b) a tree with two backbones 13 In general trees, vertices of degree more than two may be on more than one path (backbones). Note that these backbones must be edge-disjoint so that we can orient each of them randomly. For example, consider the tree in Figure 6 (b), in which, the vertices of degree more than two are at least on the two backbones 𝑣1 -to-𝑣2 and 𝑣3 -to-𝑣 . Assume that the vertices of degree more than two of a tree reside on b edge-disjoint backbones. Then, by a random orientation of backbones and branches incident to the backbones, each pair is satisfied with a probability of at 1 least 2𝑏+2 . Now, we must find the minimum number of edge-disjoint backbones that cover all vertices of degree more than two. The first step is to contract all edges that are incident to a vertex of degree one or two. The resulting tree, which we call the backbone tree 𝑇𝑏 , shows the far-adjacency of the vertices of degree more than two. It is obvious that a decomposition of 𝑇𝑏 into b edge-disjoint paths provides b edge-disjoint backbones that cover all vertices of degree more than two in T. So, it is sufficient to decompose 𝑇𝑏 into the minimum number of edge-disjoint paths. Lemma 2.3.1. Let T be a tree with 2𝑏, 𝑏 > 0, vertices of odd degree. Then, T can be decomposed into b edge-disjoint paths. Also, any decomposition of T into edge-disjoint paths contains at least b paths. Proof. The proof is by induction on b. If 𝑏 = 0, T has no edge. Assume that a tree with 2𝑏 − 2 vertices of odd degree can be decomposed into 𝑏 − 1 paths. Let a tree T be a tree with 2𝑏 vertices of odd degree. T has at least two vertices of degree one, namely 𝑣1 and 𝑣2 . Deleting the edges of the path 𝑣1 -to-𝑣2 , does not change the parity of the vertices except 𝑣1 and 𝑣2 . Let the resulting tree be 𝑇𝑏−1 . 𝑇𝑏−1 is a tree with 2𝑏 − 2 vertices of odd degree, which can be decomposed into 𝑏 − 1 paths. Thus, using the path 𝑣1 -to-𝑣2 , T can be decomposed into b edgesdisjoint paths. Since adding an edge-disjoint path to a tree will increase the number of vertices of odd degree at most by 2, any decomposition contains at least b edge-disjoint paths; otherwise, the resulting tree has less than 2𝑏 vertices of odd degree. □ The algorithm is illustrated in Figure 7. 14 Figure 7. The algorithm based on the number of backbones It is easy to use the method of conditional expectations to obtain a deterministic algorithm from the algorithm in Figure 7 that produces an orientation for a graph with b backbones that satisfies 1 at least 2𝑏+2 of the pairs. Theorem 2.3.1. There is an approximation algorithm with the approximation ratio 1 2𝑏+2 for the MTO problem, where b is the minimum number of edge-disjoint backbones (paths) that cover all vertices of degree more than two. 3 Mixed Networks Unlike the MTO problem, there may be more than one path between the source and the target of a pair of P in an MMGO instance. Thus, there has been no efficient algorithm for determining conflicts between the pairs in P. Therefore, we state the following conjecture: Conjecture 3.1. MMGO is not fixed-parameter tractable w.r.t. the number of pairs. When the input is restricted to trees, because each pair corresponds to a path, MMGO is fixedparameter tractable w.r.t. the number of pairs. Proposition 3.1. MMGO on trees is fixed-parameter tractable w.r.t. the number of pairs. 3.1 Paths Assume that a path is considered from left to right, and the vertices are numbered from 1 to n. For all 𝑣, 𝑤 ∈ 𝑉, where 𝑣 ≤ 𝑤, 𝑆(𝑣, 𝑤) is the maximum number of pairs with both endpoints on the path 𝑣-to-𝑛 that can be satisfied on the path 𝑣-to-𝑛 such that the subpath 𝑣-to-𝑤 is oriented from 𝑣 to 𝑤. Analogously, 𝑆(𝑤, 𝑣) is the maximum number of pairs with both endpoints on the path 𝑣-to-𝑛 that can be satisfied on the path 𝑣-to-𝑛 such that the subpath 𝑣-to-𝑤 is oriented from 𝑤 to 𝑣. Also, 𝐴(𝑣, 𝑤) is the number of pairs with both endpoints on the path 𝑣-to-𝑤 that are satisfied when orienting the path from 𝑣 to 𝑤. 15 When there is an arc on the path 𝑣-to-𝑤 whose direction is toward 𝑣, then 𝐴(𝑣, 𝑤) = 𝑆(𝑣, 𝑤) = 0. Analogously, when there is an arc on the path 𝑣-to-𝑤 whose direction is toward 𝑤, then 𝐴(𝑤, 𝑣) = 𝑆(𝑤, 𝑣) = 0. Also, 𝐴(𝑣, 𝑣) = 0 for all 𝑣. Then, 𝑆(𝑣, 𝑤) and 𝑆(𝑤, 𝑣) can be calculated as follows: 𝑆(𝑣, 𝑤) = 𝐴(𝑣, 𝑤) + max{𝑆(𝑢, 𝑤), 𝑆(𝑣, 𝑢) − 𝐴(𝑣, 𝑤)} (3.1.1), 𝑆(𝑤, 𝑣) = 𝐴(𝑤, 𝑣) + max{𝑆(𝑤, 𝑢), 𝑆(𝑢, 𝑣) − 𝐴(𝑤, 𝑣)} (3.1.2), where u is the right-hand side vertex of w, that is 𝑢 = 𝑤 + 1. Note than when 𝑤 = 𝑛, then 𝑆(𝑣, 𝑤) = 𝐴(𝑣, 𝑤), and 𝑆(𝑤, 𝑣) = 𝐴(𝑤, 𝑣). The main idea behind the recurrence relations (3.1.1) and (3.1.2) is that when a split vertex appears on a path, the path can be decomposed at that vertex and the two resulting subpaths can be processed independently. The following theorem is straightforward. Theorem 3.1.1. MMGO on paths can be solved in 𝑂(𝑛2 ) time. Proof. In the first step, initialization, as stated above, is done in 𝑂(𝑛2 ) time. The matrix A can be easily computed in 𝑂(𝑛2 ) time. Also, the matrix S is computed in 𝑂(𝑛2 ) time. 𝑆(1,1) returns the value of the optimal solution of the MMGO problem on the input path. □ 3.2 Cycles If a cycle has no arc, or has one arc, or all of its arcs have the same direction, it can be oriented such that all pairs are satisfied. In this case, it is sufficient to orient all edges such that all edges (and all arcs) have the same direction. Consider the cycle in Figure 8, in which there are two arcs with opposite directions. Because of these two arcs, there must be at least two split vertices in any optimal orientation. There are 𝑂(𝑛2 ) combinations for choosing these two split vertices. Assume that a and b are those two split vertices. We can decompose the cycle at the split vertices into two subpaths between a and b. The two subpaths are independent of each other except for the pair (𝑎, 𝑏). The pair (𝑎, 𝑏) is satisfied if and only if the path is oriented from 𝑎 to 𝑏. { |𝑎𝑏1 + | + |𝑎𝑏2 + | − 𝛼(𝑎,𝑏) , |𝑎𝑏1 + | + |𝑎𝑏2 |𝑃−(𝑎,𝑏) , |𝑎𝑏| = max (3.2.1), |𝑎𝑏2 + | + |𝑎𝑏1 |𝑃−(𝑎,𝑏) , |𝑎𝑏1 |𝑃−(𝑎,𝑏) + |𝑎𝑏2 |𝑃−(𝑎,𝑏) } where |𝑎𝑏1 |𝑃−(𝑎,𝑏) (|𝑎𝑏2 |𝑃−(𝑎,𝑏) ) is the value of the optimal solution of the MMGO on the path 𝑎𝑏1 (𝑎𝑏2 ) with input pairs 𝑃 − (𝑎, 𝑏). Also, 𝛼(𝑎,𝑏) = 1, if the pair (𝑎, 𝑏) ∈ 𝑃, otherwise 𝛼(𝑎,𝑏) = 0. 16 2 1 3 Figure 8. Two arcs with opposite directions in a cycle This approach can be easily generalized for all cycles. Theorem 3.2.1. Given a cycle 𝐶 = (𝑉, 𝐸, 𝐴), and a set 𝑃 = {(𝑠𝑖 , 𝑡𝑖 ): 1 ≤ 𝑖 ≤ 𝑝} of source-target pairs. The MMGO problem can be solved on C in 𝑂(𝑛 ) time. Proof. The algorithm is depicted in Figure 9. The algorithm is similar to the example showed above. The only difference is that a path 𝑎𝑏𝑗 (𝑗 = 1,2) may have an arc with the direction opposite to the direction from a to b. In this case, we assign |𝑎𝑏𝑗 + | = 0. There are 𝑂(𝑛2 ) combinations for choosing the two split vertices. Since the two subpaths are independent of each other, for each combination, the solution can be calculated in 𝑂(𝑛2 ) time. Thus, the MMGO problem on cycles can be solved in 𝑂(𝑛 ) time. □ 17 Figure 9. The algorithm for mixed cycles 3.3 Number of arcs and pairs According to conjecture 3.1, the MMGO is probably not fixed-parameter tractable w.r.t. the number of pairs. On the other hand, it is clear that MMGO is not fixed-parameter tractable w.r.t. the number of arcs, |𝐴|, otherwise, MTO could be solved in polynomial time. We show that MMGO is fixed-parameter tractable w.r.t. the combined parameter the number of pairs and the number of arcs. In the remainder of this section, let |𝐴| = 𝑘. Without loss of generality, we assume that the input graph G is a mixed-acyclic graph [14]. One can see that the graph G can be considered as a set of undirected trees which are connected using the arcs in A. We call each undirected tree an undirected component. For an illustration, consider the mixed graph in Figure 10, where the arcs are shown as dashed arrows. 18 1 2 1 3 2 1 2 5 6 Figure 10. Illustration of a mixed graph as connections of some undirected components The pairs in P can be divided into two types 𝑃𝑈 and 𝑃𝐷 . A pair (𝑠, 𝑡) ∈ 𝑃𝑈 if both 𝑠, 𝑡 are in the same undirected component. Other pairs belong to 𝑃𝐷 . Satisfying each type of pair can be handled as follows:   Pair (𝑠, 𝑡) ∈ 𝑃𝑈 : in this case, there is only one path corresponding to the pair. Thus, this path must be oriented from 𝑠 to 𝑡 to satisfy the pair (such as (𝑠2 , 𝑡2 ) in Figure 10). Pair (𝑠, 𝑡) ∈ 𝑃𝐷 : in this case, there may be more than one path corresponding to the pair. Thus, it is sufficient to orient one of them from 𝑠 to 𝑡 to satisfy the pair (such as (𝑠1 , 𝑡1 ) in Figure 10). Each path may pass through one or more undirected components. If for each of this component, we determine the vertex through which a path enters the undirected component (the input vertex), and the vertex from which a path exits the undirected component (the output vertex), in fact, we have determined the path from 𝑠 to 𝑡, because in each undirected component there is only one path between the input vertex and the output vertex. Also, the remainder of the path is constituted by arcs. Note that the input and output vertices are endpoints of the arcs that belong to an undirected component, thus, there are at most 2𝑘 of them. A vertex of an undirected component that is the head (tail) of an arc, is an input (output) vertex. For each vertex of an undirected component which is the endpoint of an arc, we must determine that the paths of which pairs pass through it. For example, the path corresponding to the pair (𝑠1 , 𝑡1 ) may pass through the vertices 𝑣1 , 𝑣2 , 𝑣3 , 𝑣 , 𝑣5 , 𝑣6 . Note that the vertex 𝑠𝑖 is considered as the input vertex through which the pair (𝑠𝑖 , 𝑡𝑖 ) enters to the component containing 𝑠𝑖 . Analogously, the vertex 𝑡𝑖 is considered as the output vertex from which the pair (𝑠𝑖 , 𝑡𝑖 ) exits the component containing 𝑡𝑖 . For each consistent assignment of the pairs to the input and output vertices, some of the pairs in 𝑃𝐷 are satisfied. An assignment is consistent if for all components, the path from the input vertex to the output vertex, for all pairs that pass through that component, can be oriented. After 19 orienting a consistent assignment, each undirected component has been converted to a mixed component. Since the pairs of 𝑃𝑈 in a component are independent of the pairs of 𝑃𝑈 in other components, the mixed components can be processed independently. According to proposition 3.1, the maximum number of pairs of 𝑃𝑈 that can be satisfied in each mixed component can be computed in 𝑂(2|𝑃𝑈 | ) time. The maximum number of total satisfied pairs among all consistent assignments of the pairs to the input and output vertices is the optimal solution to the problem. The algorithm is depicted in Figure 11. Figure 11. The algorithm for mixed graphs based on the number of pairs and arcs Theorem 3.3.1. Given a mixed graph 𝐺 = (𝑉, 𝐸, 𝐴) and a set 𝑃 = {(𝑠𝑖 , 𝑡𝑖 ): 1 ≤ 𝑖 ≤ 𝑝} of sourcetarget pairs, where |𝐴| = 𝑘. The MMGO problem is fixed-parameter tractable w.r.t. the combined parameter (𝑝, 𝑘). Proof. There are 𝑂(22𝑝𝑘 ) assignments of the pairs to the input and output vertices. Consistency checking of each assignment can be done in polynomial time. According to proposition 3.1, the MMGO problem can be solved on each mixed component in 𝑂(2𝑝 ) time. Thus, the problem can be solved in 𝑂(2(2𝑘+1).𝑝 ) time. Note that we have omitted some polynomial factors from the time complexity of the algorithm to simplify it. □ 20 4 Conclusion In this paper, we studied the maximum graph orientation problem on undirected and mixed graphs. In the undirected case, we determined the parameterized complexity of the problem (for non-fixed and fixed paths) w.r.t. the number of satisfied pairs, which was an open problem. Also, we presented an exact algorithm based on the number of leaves of a tree. In addition, we presented a parameterized-approximation algorithm w.r.t. a parameter named number of backbones of a tree. In the mixed case, we presented polynomial-time algorithms for paths and cycles, and an FPT-algorithm based on the combined parameter the number of arcs and the number of pairs for general graphs. There are still some open problems for future investigations, some of which are:    5 What is the parameterized complexity of the MMGO problem w.r.t. the parameter “number of pairs”? What is the parameterized complexity of the MTO problem w.r.t. the parameter “number of all pairs minus the number of input pairs”? Are there constant-ratio approximation algorithms for MTO and MMGO problems? References [1] E. Arkin and R. Hassin, “A note on orientations of mixed graphs,” Discret. Appl. Math., pp. 1–10, 2002. [2] J.E. Chen, “Parameterized computation and complexity: a new approach dealing with NPhardness,” J. Comput. Sci. Technol., vol. 20, no. 1, pp. 18–37, 2005. [3] J. Chen and Q.L. Feng, “On Unknown Small Subsets and Implicit Measures: New Techniques for Parameterized Algorithms,” J. Comput. Sci. Technol., vol. 29, no. 5, pp. 870– 878, 2014. [4] B. Dorn, F. Hüffner, D. Krüger, R. Niedermeier, and J. Uhlmann, “Exploiting bounded signal flow for graph orientation based on cause – effect pairs,” Algorithms Mol. Biol., vol. 6, no. 1, p. 21, Jan. 2011. [5] R. G. Downey and M. R. Fellows, Fundamentals of parameterized complexity, vol. 4. Springer, 2013. [6] M. Elberfeld and D. Segev, “Approximation algorithms for orienting mixed graphs,” Theor. Comput. Sci., vol. 483, pp. 96–103, Apr. 2011. [7] P. Erdös and G. Szekeres, “A combinatorial problem in geometry,” Compos. Math., vol. 2, pp. 463–470, 1935. 21 [8] S. Fields, “High-throughput two-hybrid analysis,” FEBS J., vol. 272, no. 21, pp. 5391–5399, 2005. [9] Gamzu and M. Medina, “Improved approximation for orienting mixed graphs,” Struct. Inf. Commun. Complex., vol. 7355, pp. 243–253, 2012. [10] Gamzu, D. Segev, and R. Sharan, “Improved orientations of physical networks,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6293 LNBI, pp. 215–225, 2010. [11] A.C. Gavin, M. Bösche, R. Krause, P. Grandi, M. Marzioch, A. Bauer, J. Schultz, J. M. Rick, A.-M. Michon, C.-M. Cruciat, and others, “Functional organization of the yeast proteome by systematic analysis of protein complexes,” Nature, vol. 415, no. 6868, pp. 141–147, 2002. [12] Medvedovsky, V. Bafna, U. Zwick, and R. Sharan, An algorithm for orienting graphs based on cause-effect pairs and its applications to orienting protein networks. Springer Berlin Heidelberg, 2008. [13] R. Niedermeier, Invitation to Fixed Parameter Algorithms. Oxford University Press, 2006. [14] D. Silverbush, “Optimally orienting physical networks,” J. Comput. Biol., vol. 18, no. 11, pp. 1437–48, Nov. 2011. [15] D. B. West and others, Introduction to graph theory, vol. 2. Prentice hall Upper Saddle River, 2001. [16] C.H. Yeang, T. Ideker, and T. Jaakkola, “Physical network models,” J. Comput. Biol., vol. 11, no. 2–3, pp. 243–262, 2004. [17] X. Zhao and D. Ding, “Fixed-parameter tractability of disjunction-free default reasoning,” J. Comput. Sci. Technol., vol. 18, no. 1, pp. 118–124, 2003. 22
8cs.DS
Programming the Interactions of Collective Adaptive Systems by Relying on Attribute-based Communication arXiv:1711.06092v3 [cs.PL] 29 Nov 2017 YEHIA ABD ALRAHMAN, IMT School for Advanced Studies, Lucca, Italy ROCCO DE NICOLA, IMT School for Advanced Studies, Lucca, Italy MICHELE LORETI, Università di Camerino, Camerino, Italy Collective adaptive systems are new emerging computational systems consisting of a large number of interacting components and featuring complex behaviour. These systems are usually distributed, heterogeneous, decentralised and interdependent, and are operating in dynamic and possibly unpredictable environments. Finding ways to understand and design these systems and, most of all, to model the interactions of their components, is a difficult but important endeavour. In this article we propose a language-based approach for programming the interactions of collective-adaptive systems by relying on attribute-based communication; a paradigm that permits a group of partners to communicate by considering their run-time properties and capabilities. We introduce AbC, a foundational calculus for attribute-based communication and show how its linguistic primitives can be used to program a complex and sophisticated variant of the well-known problem of Stable Allocation in Content Delivery Networks. Also other interesting case studies, from the realm of collective-adaptive systems, are considered. We also illustrate the expressive power of attribute-based communication by showing the natural encoding of other existing communication paradigms into AbC. CCS Concepts: • Computing methodologies → Distributed programming languages; • Theory of computation → Distributed computing models; Operational semantics; Process calculi; Additional Key Words and Phrases: Collective-adaptive systems, Attribute-based communication, distributed programming ACM Reference format: Yehia Abd Alrahman, Rocco De Nicola, and Michele Loreti. 0. Programming the Interactions of Collective Adaptive Systems by Relying on Attribute-based Communication. ACM Trans. Softw. Eng. Methodol. 0, 0, Article 32 ( 0), 36 pages. https://doi.org/0000000.0000000 1 INTRODUCTION The ever increasing complexity of modern software systems has changed the perspective of software designers who now have to consider a broad range of new classes of systems, consisting of a large number of interacting components and featuring complex interaction mechanisms, e.g. Software-Intensive Systems [Broy 2006], IoT Systems [Kopetz 2011], and Collective Adaptive Systems (CAS) [Anderson et al. 2013; Ferscha 2015]. These systems are usually distributed, heterogeneous, decentralised and interdependent, and are operating more and more in dynamic and often unpredictable This research has been partially supported by the European projects IP 257414 ASCENS and STReP 600708 QUANTICOL, and by the Italian project PRIN 2010LHT4KM CINA. Author’s addresses: Y.A. Alrahman and R. De Nicola, IMT School for Advanced Studies, Lucca, Italy; M. Loreti, Università di Camerino, Camerino, Italy; Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. © 0 Copyright held by the owner/author(s). Publication rights licensed to Association for Computing Machinery. Manuscript submitted to ACM Manuscript submitted to ACM 1 2 Y. Abd Alrahman et al. environments. There exist different kinds of complexity in the development of software systems. Historically, as software systems grew larger, the focus shifted from the complexity of developing algorithms to the complexity of structuring large systems, and to the inevitable complexities of building distributed and concurrent systems [Wirsing and Holzl 2006]. We are now facing another level of complexity arising from the fact that systems have to operate in large, open and non-deterministic environments where the complexity of interaction is increased. Most of the current communication models and programming frameworks still handle the interaction between distributed components by relying on their identities, like in the Actor model [Agha 1986], or by relying on the communication channels on which they are listening, like in point-to-point channel-based communication [Sangiorgi and Walker 2003], multicast with explicit addressing [Holbrook and Cheriton 1999], and broadcast communication [Prasad 1991]. These models and frameworks use names or addresses, that are totally independent from the run-time properties and capabilities of the interacting components, as first-class citizens to model the interaction. This makes it hard to program complex behaviours and coordination actions (reconfiguration, adaptation, opportunistic interactions, . . . ) that depend on the components’ status rather than on their identities or addresses. The complexity of these models arises because they are communication centric; the behaviour mainly consists of a process implementing a specific communication protocol and the programmer has to manage the channels or the addresses on which components interact. In our view, to deal with CAS, it is important to consider more data centric interaction primitives that abstract from the underlying communication infrastructure (i.e., infrastructure-agnostic) and relies on anonymous one-to-many interactions to send messages to potential receivers. In this article we study the impact of a new paradigm that permits a group of partners to interact by considering their properties and capabilities at run-time. The findings we report in this article have been triggered by our interest in CAS, and by the recent attempts to define appropriate linguistic primitives to deal with such systems, see e.g. Intelligent Ensembles [Krijt et al. 2017], FORMS [Weyns et al. 2012], Rainbow [Garlan et al. 2004], SOA-based [Calinescu 2008], Swarm of Cognitive Agents [Park and Tran 2012], UNDERSEA [Gerasimou et al. 2017], TOTA [Mamei and Zambonelli 2004], SCEL [De Nicola et al. 2014] and the calculi presented in [Alrahman et al. 2015] and [Viroli et al. 2013]. Collective-Adaptive Systems (CAS) CAS [Anderson et al. 2013] consist of a large number of interacting components which combine their behaviours, by forming collectives, to achieve specific goals depending on their attributes, objectives, and functionalities. Decisionmaking in these systems is complex and components interaction may lead to unexpected behaviours. CAS are inherently scalable [Sanderson et al. 2015] and the boundaries between different CAS are fluid in the sense that components may enter or leave the collective at any time and may have different (potentially conflicting) objectives; so they need to dynamically adapt to their environmental conditions and contextual data. The need of engineering techniques to address the challenges of developing, integrating, and deploying CAS is advocated in [Sommerville et al. 2012]. Also the development of theoretical foundation for CAS is very important to understand their distinctive features [Cheng et al. 2009]. Clearly, the existing communication models do not scale with the high level of dynamicity of CAS, and, in our opinion, a change of perspective, that takes into account run-time properties, status, and capabilities of communicating systems, is on demand. The key concepts of CAS should be the basis for guiding the development of the new communication modalities. Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 3 In the following, we summarise the main concepts of CAS as reported in [Anderson et al. 2013; Cheng et al. 2009; Ferscha 2015; Sanderson et al. 2015]: Distribution: components are distributed on a shared environment and evolve independently, without any centralised control. Awareness: components are aware of their run-time status, characteristics, capabilities, and have some (partial) view of their surroundings. Adaptivity: components adapt their behaviours and their interaction policies in response to the changes in their contextual conditions and to the collected awareness data. Interdependence: any change in the shared environment might influence the behaviour of components. Collaboration: components collaborate and combine their behaviours to achieve system-level goals in response to changes in the environment or because of their predefined roles. Anonymity: components are able to communicate and exchange data without previously knowing the existence of each other; for example, the identity of a service provider is not relevant, only its features and its ability to provide the service are important. Scalability and Open-endedness: components may join or leave a system without disturbing the overall system behaviour; senders emit messages without being aware of the presence of receivers and receivers do not rely on specific senders. Attribute-based Communication In order to capture the above mentioned concepts, we have developed attribute-based communication, a communication paradigm that permits a group of partners to communicate by considering the predicates over the attributes they expose. Communication takes place anonymously in an implicit multicast fashion without a prior agreement between the communicating partners. Anonymity of interaction allows programmers to secure scalability, dynamicity, and open-endedness more easily. Sending operations are non-blocking while receiving operations are blocking. This breaks synchronisation dependencies between interacting partners, and permits modelling systems where communicating partners can enter or leave a group at any time without endangering the overall behaviour. Moreover, attributes make it easy to model awareness by locally reading the values of the attributes that may represent either the component status (e.g., the battery level of a robot) or the external environment (e.g., the external humidity). Groups are dynamically formed at the time of interaction by considering the interested receiving components that satisfy sender’s predicates, and any run-time changes of attribute values allow opportunistic interactions between components. By parameterising the interaction predicates with local attributes, groups can be implicitly changed and adaptation is naturally captured. Security mechanisms can be placed on top of the attribute-based framework following standard approaches. Modeling opportunistic interaction in classical communication paradigms like channel-based communication, e.g., π -calculus [Milner et al. 1992], is definitely more challenging because components have to agree on specific names or channels to interact. Channels have no connection with the component attributes or characteristics; they are specified as addresses where the exchange should happen. Names and channels are static and changing them locally at run-time requires explicit communication and intensive use of scoping mechanisms which do affect readability and compositionality of programs. It is also worth mentioning that Multi-Agent System (MAS) [Wooldridge 2000] is usually used for modeling distributed and adaptive systems, e.g., [Leitão et al. 2012; Lepuschitz et al. 2013]. Since MAS originates as a sub-field of distributed Manuscript submitted to ACM 4 Y. Abd Alrahman et al. artificial intelligence where logic is the reference formal framework, MAS models provide little support to formally validate an implementation against its specifications [Viroli and Omicini 2005]. Logics, however, provide powerful tools to declaratively model the features of complex systems as MAS [Wooldridge 2000]. In our approach we provide an operational model that precisely describes the step-by-step admissible evolutions of the system. Operational models ensure more straightforwardly that implementations are correct with respect to their specifications and based on the evolution rules, system properties can be verified [Viroli and Omicini 2005]. Different attempts have been carried out to bridge the gap between MAS and process algebra approaches, see [Bergenti et al. 2003; de Boer et al. 2005; Kinny 2005], however this is out the scope of this article. We would also like to stress that an attribute-based system is more than just the result of the parallel composition of its interacting components; it also takes into account the environment where components are executed. Indeed, the environment has a great impact on components behaviours and allows modelling interdependence, i.e., a situation where components influence each other unintentionally. For example, in an ant foraging system [Jackson and Ratnieks 2006], when an ant disposes pheromone in the shared space to keep track of its way back home, it influences other ants behaviour as they are programmed to follow traces of pheromone with higher concentration. In this way, the ant unintentionally influences the behaviour of the other ants by only modifying the environment. In this article we introduce AbC, a calculus comprising a minimal set of primitives that permits attribute-based communication and is the outcome of different attempts towards modeling the interaction of CAS scenarios. From our experience, we learnt that any attribute-based paradigm, tailored for modeling the interaction of CAS systems, should at least provide support for the following notions, that are the key ingredients of AbC: • Attribute Environment: to provide a collection of attributes whose values represent the status of a component. These values can be used to influence the behaviour of a component at run-time. • Attribute-based send and receive operations: to establish the communication links between different components based on the satisfaction of predicates over components attributes. • Attribute update operation: to change attribute values based on contextual conditions and adapt the behaviour of a component accordingly. • Awareness construct: to collect awareness data and take decisions based on the changes in the attribute environment. In this article, we focus on a language-based approach to program the interactions of CAS and concentrate on the linguistic constructs of the AbC calculus and on their use. Other more theoretical aspects, concerned with modeling, with primitives for abstraction, with behavioural theories, and with equational laws, can be found in [Alrahman et al. 2016a, 2017a]. An AbC system is rendered as a set of parallel components, each equipped with a set of attributes whose values can be modified by internal actions. Communication actions (both send and receive) are decorated with predicates over attributes that partners have to satisfy to make the interaction possible. Thus, communication takes place in an implicit multicast fashion, and communication partners are selected by relying on predicates over the attributes in their interfaces. Unlike IP multicast [Holbrook and Cheriton 1999] where the reference address of the group is explicitly included in the message, AbC components are unaware of the existence of each other and they receive messages only if they mutually satisfy the requirements of each other, otherwise messages are discarded. Our main goal is to permit the construction of high-level and formally verifiable communication APIs for CAS based on the AbC calculus. These APIs can then be used to reason and verify properties about the interactions of the actual Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 5 deployed systems by relying on the operational semantics of AbC. For example, we developed APIs for Java [Alrahman et al. 2016b], for Go [Alrahman et al. 2017b], and for Erlang [De Nicola et al. 2017]. The actual implementations of these APIs fully rely on the formal semantics of AbC. We also provided a one-to-one correspondence between the AbC primitives and the programming constructs of the above mentioned APIs. The direct correspondence permits exploiting the AbC linguistic primitives to program the interaction of CAS applications in different host languages as required by the application domain. At the same time, it enhances the confidence on the behaviour of programs, written by using these APIs, after they have been analysed via formal methods, which is made possible by relying on the operational semantics of the AbC calculus. Contributions. The main contribution of this article is the introduction of a language-based approach for programming the interactions of collective-adaptive systems. In Section 2, we introduce the AbC calculus. To capture the reader’s intuition, we present the main features of AbC in a step-by-step fashion by using a distributed variant of the Graph Colouring Problem [Jensen and Toft 1995] as a running example. In Section 2.3, we illustrate the expressive power of attribute-based communication by showing the natural encoding of other communication paradigms. In the rest of the article, we exploit the interaction primitives of the AbC calculus to show how complex and interesting case studies, from the realm of collective-adaptive systems, can be programmed in an intuitive way. More specifically, in Section 3, we show how to program a more complex and sophisticated variant of the well-known problem of Stable Allocation in Content Delivery Networks [Maggs and Sitaraman 2015]. This variant is designed to cover most of CAS features in a single case study with a well-understood system-level goal. Additional case studies are presented in the appendices A.1 and A.2. In A.1, we show how to program a crowd steering scenario while in Section A.2, we show how to program swarm of robotics, performing a rescuing mission in a disaster arena. 2 THE ABC CALCULUS In this section we first present the syntax of AbC, we discuss its formal operational semantics, and then we provide an evidence of its expressive power. 2.1 Syntax of the AbC Calculus The syntax of AbC is reported in Table 1. The top-level entities of the calculus are components (C). A component, Γ :I P, is a process P associated with an attribute environment Γ, and an interface I . An attribute environment Γ : A → 7 V is a partial map from attribute identifiers1 a ∈ A to values v ∈ V where A ∩ V = ∅. A value could be a number, a name (string), a tuple, etc. An interface I ⊆ A consists of a set of attributes that are exposed by a component to control the interactions with other components. We will refer to the attributes in I as public attributes, and to those in dom(Γ) − I as private attributes. Complex components are built by using parallel operator C 1 ∥C 2 . Example 2.1 (Distributed Graph Colouring Scenario). We model a distributed variant of the well known Graph Colouring Problem [Jensen and Toft 1995] using AbC constructs. We render the problem as a typical CAS scenario where a collective of agents, executing the same code, collaborate to achieve a system-level goal without any centralised control. The problem consists of colouring the vertices of a graph in such a way that no two vertices sharing an edge have the same colour. Formally, we have a set of n vertices, each of which is identified by an id (an integer in our model). A 1 In the rest of this article, we shall occasionally use the term “attribute” instead of “attribute identifier”. Manuscript submitted to ACM 6 Y. Abd Alrahman et al. (Components) (Processes) (Updates) (Predicates) (Expressions) C ::= Γ :I P | C 1 ∥C 2 P ::= 0 | Π(x̃).U | (Ẽ)@Π.U | ⟨Π⟩P | P1 + P2 | P 1 |P2 | K U ::= [a := E]U | P Π ::= tt | ff | p(Ẽ) | Π 1 ∧ Π 2 | Π 1 ∨ Π2 | ¬Π E ::= v | x | a | this.a | op(Ẽ) Table 1. The syntax of the AbC calculus set of neighbours Ni is also associated with each vertex i, where j ∈ Ni if and only if i ∈ N j . Our goal is to assign to each vertex i a colour c i such that for each j ∈ Ni , c j , c i . Each vertex is modelled in AbC as a component of the form Ci = Γi : {id,N} PC . Public attributes id and N are used to represent the vertex id and the set of neighbours N , respectively. The overall system is defined as the parallel composition of existing components (i.e., C 1 ∥C 2 ∥, . . . , ∥Cn ). □ A process can be the inactive process 0, an action-prefixed process, act .U , where act is a communication action and U is a process possibly preceded by an attribute update, a context aware ⟨Π⟩P process, a nodeterministic choice between two processes P1 + P2 , a parallel composition of two processes P1 |P 2 , or a process call with a unique identifier K used in process definition K ≜ P. All of these operators will now be described below. We start by explaining what we mean by expressions and predicates, then we continue by describing the actual operations on processes. An expression E is built from constant values v ∈ V, variables x, attribute identifiers a, a reference to the value of a (this.a) in the component that is executing the code, or through a standard operators op(Ẽ)2 . The evaluation of expression E under Γ is denoted by JEKΓ . The definition of J·KΓ is standard, the only interesting cases are JaKΓ = Jthis.aKΓ = Γ(a). A predicate Π is built from boolean constants, tt and ff, and from an atomic predicate p(Ẽ) by using standard boolean operators (¬, ∧ and ∨). The precise set of atomic predicates is not detailed here; we only assume that it contains basic binary relations like >, <, ≤, ≥, =, and the predicates ∈ and <. In what follows, we shall use the notation {Π}Γ to indicate the closure of a predicate Π under the attribute environment Γ. The closure is also a predicate Π ′ obtained from Π by replacing the occurrences of the expression this.a with its value Γ(a). The attribute-based output (Ẽ)@Π is used to send the evaluation of the sequence of expressions Ẽ to the components whose attributes satisfy the predicate Π. The attribute-based input Π(x̃) is used to receive messages from a component satisfying predicate Π; the sequence x̃ acts as a placeholder for received values. The action Π(x̃) acts as a binder for names, e.g., x̃ in Π(x̃).U . We will say that a name x is bound when it occurs under the scope of an input action while it is free when it is not bound. We use bn(P) and f n(P) to denote the set of bound and free names of P, respectively. We use f v(P) to denote the set of free process variables of P. We use x, y, . . . to range over names while X , Y , . . . to range over process variables. Notice that names are used as placeholders for values while process variables are used as placeholders for processes. Our processes are closed, i.e. without free process variables (f v(P) = ∅) because AbC components can only exchange values, but not code. 2 For the sake of simplicity, we omit the specific syntax of operators used to build expressions and use Ẽ to denote sequences of expressions. Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 7 Predicates, used in communication actions, can also refer to variable names in x̃ and the received values can be used to check whether specific conditions are satisfied. For instance, the action ((x = “try”) ∧ (this.id > id) ∧ (this.round = z))(x, y, z) can be used to receive a message of the form (“try”, c, r ) where the value received on z is equal to this.round and the value of the interface attribute id of the sending component is less than this.id. Thus, the predicate can be used to check either the received values or the values of the sending component interface. A predicate can also refer to local attributes of components. Thus, an action like (“try”, c, r )@(this.id ∈ N) can be used to send the message (“try”, c, r ) to all components whose attribute N contains this.id. An attribute update, [a := E], is used to assign the result of the evaluation of E to the attribute identifier a. The syntax is devised in such a way that sequences of updates are only possible after communication actions. Actually, updates can be viewed as side effects of interactions. It should be noted that the execution of a communication action and the following update(s) is atomic. This possibility allows components to modify their attribute values and thus triggering new behaviours in response to collected contextual data. The awareness construct, ⟨Π⟩P, is used to trigger new behaviours (i.e., P) when the status of a component is changed (i.e., Π |= Γ). It blocks the execution of P until predicate Π satisfies the attribute environment. The parallel operator, P |Q, models the interleaving between co-located processes, i.e., processes residing within the same component. The choice operator, P + Q, indicates a nondeterministic choice among P and Q. Other process operators can be defined as macros in AbC. Indeed, we will use the following derived operators: if Π then P1 else P 2 ≜ ⟨Π⟩P 1 + ⟨¬Π⟩P 2 (1) let x = E in P ≜ P[E/x] (2) set(a, E)P ≜ ()@ff.[a := E]P (3) [a 1 := E 1 , a 2 := E 2 , . . . , an := En ]P ≜ [a 1 := E 1 ][a 2 := E 2 ] . . . [an := En ]P (4) Example 2.2. In Example 2.1 we introduced the structure of the components modelling the vertices in the considered scenario. Here, we show how the behaviour of our components can be programmed to assign a colour (an integer) to each of them while avoiding that two neighbours get the same colour. The proposed algorithm consists of a sequence of rounds for colour selection that goes on until the specified goal is reached. At the end of each round at least one component is assigned a colour. Components use messages of the form (“try”, c, r ) to inform their neighbours that at round r they want to select colour c and messages of the form (“done”, c, r ) to communicate that colour c has been definitely chosen at the end of round r . At the beginning of a round, each component i selects a colour and sends a try-message to all components in Ni . Component i also collects try-messages from its neighbours. The selected colour is assigned to a component only if it has the greatest id among those that have selected the same colour in that round. After the assignment, a done-message (associated with the current round) is sent to neighbours. A new round starts when a message, associated with a round r such that this.round < r , is received. Manuscript submitted to ACM 8 Y. Abd Alrahman et al. This algorithm can be implemented in AbC by using four processes, F for forwarding try-messages to neighbours, T for handling try-messages, D for handling done-messages, and A for assigning a final colour. Process PC of Example 2.1 is now defined as the parallel composition of these four processes: PC = F | T | D | A. The following private attributes, local to each component, are used to control the progress of our algorithm: round, done, assigned, used, counter, send and constraints. The attribute “round" stores the current round while “constraints" and “used" are sets, registering the colours used by neighbours. The attribute “counter" counts the number of messages collected by a component while “send" is used to enable/disable forwarding of messages to neighbours. The private attributes of each component are all initialised with the following values: round = done = 0, constraints = used = ∅, send = tt, and assigned = ff. In process F reported below, when the value of attribute send becomes tt, a new colour is selected, and a message containing this colour and the current round is sent to all the components having this.id as neighbour. The new colour is the smallest colour that has not yet been selected by neighbours, that is min{i < this.used }. The guard ¬assigned is used to make sure that components with assigned colours do not take part in the selection anymore. F ≜ ⟨send ∧ ¬assigned⟩ set(colour, min{i < this.used }) (“try”, this.colour, this.round)@(this.id ∈ N).[send := ff]F Process T , reported below, receives messages of the form (“try”, c, r ). If r = this.round, as in the first two branches, then the received message has been originated by another component performing the same round of the algorithm. The first branch is executed when this.id > id, i.e., the sender has an id smaller than the id of the receiver. In this case, the message is ignored (there is no conflict), simply the counter of received messages (this.counter) is incremented. In the second branch, this.id < id, the received colour is recorded to check the presence of conflicts. The value of y is added to this.constraints and this.counter is incremented by 1. If r > this.round, as in the last two branches, then the received message has been originated by a component executing a successive round and two possible alternatives are considered, this.id < id or this.id > id. In both cases, round is set to r , send and counter are updated accordingly, and this.constraints is set to the value of y if this.id < id. T ≜ ((x = “try”) ∧ (this.id > id) ∧ (this.round = z))(x, y, z). [counter := counter + 1]T + ((x = “try”) ∧ (this.id < id) ∧ (this.round = z))(x, y, z). [counter := counter + 1, constraints := constraints ∪ {y}]T + ((x = “try”) ∧ (this.id > id) ∧ (this.round < z))(x, y, z). [round := z, send := tt, counter := 1, constraints := ∅]T + ((x = “try”) ∧ (this.id < id) ∧ (this.round < z))(x, y, z). [round := z, send := tt, counter := 1, constraints := {y}]T Process D, reported below, is used to receive messages of the form (“done”, c, r ). These are sent by components that have reached a final decision about their colour. When (“done”, c, r ) is received, we have that either this.round ≥ r or this.round < r . In the first case, the used colour is registered and the counter this.done is incremented. In the second Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 9 case, private attributes are updated to indicate the startup of a new round. D ((x = “done”) ∧ (this.round ≥ z))(x, y, z). ≜ [done := done + 1, used := used ∪ {y}]D + ((x = “done”) ∧ (this.round < z))(x, y, z). [round := z, done := done + 1, constraints := ∅, send := tt, counter := 0, used := used ∪ {y}]D Process A, reported below, is used to manage the definitive selection of a colour and can only be executed when messages from all “pending” neighbours have been received (this.counter = |this.N| − this.done) and no conflict has been found (this.colour < this.used ∪ this.constraints). When the above conditions are satisfied, message (“done”, this.colour, this.round + 1) is sent to neighbours, the assigned attribute is set to true, and the process terminates. A ≜ ⟨(this.counter = |this.N| − this.done) ∧ (this.colour < this.constraints ∪ this.used)⟩ (“done”, this.colour, this.round + 1)@(this.id ∈ N).[assigned := tt]0 □ Remark. Example 2.2 shows the main advantages of the attribute-based interaction. In essence, components are infrastructure-agnostic, i.e., they abstract from the underlying communication infrastructure and rely on anonymous one-to-many interaction pattern to communicate; this simplifies the design of component behaviours, because there is no need to manage the communication channels or the addresses on which components interact. The use of communication predicates, to derive the interaction between different components, permits programming data centric applications by taking into account the run-time features of the interacting components. 2.2 AbC Operational Semantics In this section, we provide an overview of the operational semantics of AbC and use fragments of the Distributed Graph Colouring example to show how the semantics rules work. The operational semantics of AbC is based on two relations. The transition relation 7− → that describes the behavior of single components and the transition relation − → that relies on 7− → and describes system behaviours. 2.2.1 Operational semantics of components. We use the transition relation 7− → ⊆ Comp × CLAB × Comp to define the local behavior of a component where Comp denotes the set of components and CLAB is the set of transition labels α generated by the following grammar: α ::= λ | ß ▷ Π(ṽ) λ ::= Γ ▷ Π(ṽ) | Γ ▷ Π(ṽ) The λ-labels are used to denote AbC output (Γ ▷ Π(ṽ)) and input (Γ ▷ Π(ṽ)) actions. The former contains the sender’s predicate Π, that specifies the expected communication partners, the transmitted values ṽ and the portion of the sender attribute environment Γ that can be perceived by receivers. The latter is just the complementary label selected among all the possible ones that the receiver may accept. The α-labels include an additional label ß ▷ Π(ṽ) to model the case where a component is not able to receive a message. As it will be seen later, this kind of negative labels is crucial to appropriately handle dynamic operators like choice and awareness. Manuscript submitted to ACM 10 Y. Abd Alrahman et al. Γ Γ Γ Γ Γ Γ |= tt for all Γ ̸ |= ff for all Γ |= p(Ẽ) iff JẼKΓ ∈ JpKΓ |= Π1 ∧ Π 2 iff Γ |= Π1 and Γ |= Π 2 |= Π1 ∨ Π 2 iff Γ |= Π1 or Γ |= Π2 |= ¬Π iff not Γ |= Π Table 2. The predicate satisfaction JẼKΓ = ṽ {Π 1 }Γ = Π Brd Γ↓I ▷Π(ṽ) Γ ′ |= {Π 1 [ṽ/x̃]}Γ1 Γ :I (Ẽ)@Π.P 7−−−−−−−→Γ :I (Ẽ)@Π.P Γ1 ↓ I |= Π Γ′ ▷Π(ṽ) Γ1 :I Π1 (x̃).U 7−−−−−−−→⦃Γ1 :I U [ṽ/x̃]⦄ Γ |= Π Γ ′ ̸ |= {Π[ṽ/x̃]}Γ ∨ Γ1 ↓ I ̸ |= Π ′ Rcv ′ ▷Π′ (ṽ) ß λ Γ :I ⟨Π⟩P 7− → Γ ′ :I P ′ Γ |= Π Γ ̸ |= Π Aware FRcv Γ1 :I Π(ṽ).U 7−−−−−−−→Γ1 :I Π(ṽ).U λ Γ :I P 7− → Γ ′ :I P ′ FBrd ′ ▷Π′ (ṽ) ß Γ :I (Ẽ)@Π1 .U 7−−−−−−−−→⦃Γ :I U ⦄ ′ ▷Π′ (ṽ) ß FAware1 Γ :I ⟨Π⟩P 7−−−−−−−→Γ :I ⟨Π⟩P ′ ▷Π′ (ṽ) ß Γ :I P 7−−−−−−−→Γ :I P ′ ▷Π′ (ṽ) ß FAware2 Γ :I ⟨Π⟩P 7−−−−−−−→Γ :I ⟨Π⟩P Table 3. Operational Semantics of Components (Part 1) The transition relation 7− → is defined in Table 3 and Table 4 inductively on the syntax of Table 1. For each process operator we have two types of rules: one describing the actions a term can perform, the other showing how a component discards undesired input messages. The behaviour of an attribute-based output is defined by rule Brd in Table 3. This rule states that when an output is executed, the sequence of expressions Ẽ is evaluated, say to ṽ, and the closure Π of predicate Π1 under Γ is computed. Hence, these values are sent to other components together with Γ ↓ I . This represents the portion of the attribute environment that can be perceived by the context and it is obtained from the local Γ by limiting its domain to the attributes in the interface I : (Γ ↓ I )(a) = ( Γ(a) ⊥ a∈I otherwise Afterwards, possible updates U , following the action, are applied. This is expressed in terms of a recursive function ⦃C⦄ defined below: ⦃C⦄ = ( ⦃ Γ[a 7→ JEKΓ ] :I U ⦄ Γ :I P C ≡ Γ :I [a := E]U C ≡ Γ :I P where Γ[a 7→ v] denotes an attribute update such that Γ[a 7→ v](a ′ ) = Γ(a ′ ) if a , a ′ and v otherwise. Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems λ 11 λ Γ :I P1 7− → Γ ′ :I P1′ Γ :I P2 7− → Γ ′ :I P2′ SumL λ Γ :I P1 + P 2 7− → Γ ′ :I P1′ ′ ▷Π′ (ṽ) ß Γ :I P1 7−−−−−−−→Γ :I P 1 λ Γ :I P1 + P2 7− → Γ ′ :I P2′ ′ ▷Π′ (ṽ) ß Γ :I P 2 7−−−−−−−→Γ :I P2 ′ ▷Π′ (ṽ) ß SumR FSum Γ :I P1 + P2 7−−−−−−−→Γ :I P1 + P 2 λ Γ :I P 1 7− → Γ ′ :I P ′ λ λ Γ :I P1 | P2 7− → Γ ′ :I P ′ | P 2 ′ ▷Π′ (ṽ) ß Γ :I P2 7− → Γ ′ :I P ′ IntL Γ :I P1 7−−−−−−−→Γ :I P 1 λ Γ :I P1 | P2 7− → Γ ′ :I P 1 | P ′ ′ ▷Π′ (ṽ) ß Γ :I P 2 7−−−−−−−→Γ :I P2 ′ ▷Π′ (ṽ) ß IntR FInt Γ :I P 1 | P2 7−−−−−−−→Γ :I P1 | P2 λ Γ :I P 7− → Γ ′ :I P ′ λ K ≜P Γ :I K 7− → Γ ′ :I P ′ Rec ′ ▷Π′ (ṽ) ß Γ :I P 7−−−−−−−→Γ :I P ′ ▷Π′ (ṽ) ß ′ ▷Π′ (ṽ) ß K ≜P FRec Γ :I K 7−−−−−−−→Γ :I K FZero Γ :I 0 7−−−−−−−→Γ :I 0 Table 4. Operational Semantics of Components (Part 2) Example 2.3. In Example 2.2, an attribute-based output is used by components to communicate their colour. If we take component C 1 = Γ1 : {id,N} F 1 , with Γ1 = {id = 0, N = {1, 2}, colour = 0, round = 0, . . .} and F 1 = (“try”, this.colour, this.round)@(this.id ∈ N).[this.send := f alse]F , it is easy to see that, by using rule Brd, the following transition can be derived: {id=0,N={1,2} }▷0∈N(“t ry”,0,0) C 1 7−−−−−−−−−−−−−−−−−−−−−−−−−−−→ Γ1 [send 7→ ff] : {id,N} F Rule Brd is not sufficient to fully describe the behaviour of an output action; we need another rule (FBrd) to model the fact that all inputs are discarded in case only output actions are possible. Rule Rcv governs the execution of input actions. It states that a message can be received when two communication constraints are satisfied: the local attribute environment restricted to interface I (Γ1 ↓ I ) satisfies Π, the predicate used by the sender to identify potential receivers; the sender environment Γ ′ satisfies the receiving predicate {Π1 [ṽ/x̃]}Γ1 . When these two constraints are satisfied the input action is performed and the update U is applied under the substitution [ṽ/x̃]. The predicate satisfaction relation, |=, is reported in Table 2. Rule FRcv states that an input is discarded when the local attribute environment does not satisfy the sender’s predicate, or the receiving predicate is not satisfied by the sender’s environment. Manuscript submitted to ACM 12 Y. Abd Alrahman et al. Example 2.4. Let us consider the component C 2 = Γ1 : {id,N} T ′ where Γ1 (id) = 2, Γ1 (round) = 2, Γ1 (counter) = 0 and T ′ = ((x = “try”) ∧ (this.id > id) ∧ (this.round = z))(x, y, z).[counter := counter + 1]T The following transition can be derived by using rules Rcv: {id=1, ... }▷id∈ {0,2}(“t r y”,1,2) C 2 7−−−−−−−−−−−−−−−−−−−−−−−−−−→ Γ1 [counter 7→ 1] : {id,N} T Instead, the following two negative transitions can be derived by using FRcv: Ÿ {id=3, ... }▷id∈ {0,2}(“t r y”,1,2) C 2 7−−−−−−−−−−−−−−−−−−−−−−−−−−→ C 2 Ÿ {id=1, ... }▷id∈ {0,3}(“t r y”,1,3) C 2 7−−−−−−−−−−−−−−−−−−−−−−−−−−→ C 2 In the first transition the message is discarded because sender’s id = 3 and predicate this.id > id is not satisfied. While in the second one message is discarded because sender predicate id ∈ {0, 3} is not satisfied by Γ1 ↓ {id, N}. The behaviour of a component Γ :I ⟨Π⟩P is the same as of Γ :I P only when Γ |= Π, while the component is inactive when Γ ̸ |= Π. This is rendered by rules Aware, FAware1 and FAware2. Rules SumL, SumR, and FSum describe behaviour of Γ :I P1 + P2 . Rules SumL and SumR are standard and just say that Γ :I P 1 + P2 behaves nondeterministically either like Γ :I P1 or like Γ :I P2 . A message is discarded by Γ :I P1 + P2 if and only if both P1 and P 2 are not able to receive it. We can observe here that the presence of discarding rules is fundamental to prevent processes that cannot receive messages from evolving without performing actions. Thus dynamic operators, that are the ones disappearing after a transition like awareness and choice, persist after a message refusal. The behaviour of the interleaving operator is described by rules IntL, IntR and FInt. The first two are standard process algebraic rules for parallel composition while the discarding rule FInt has a similar interpretation as of rule FSum: a message can be discarded only if both the parallel processes can discard it. Finally, rules Rec, FRec and FZero are the standard rules for handling process definition and the inactive process. The latter states that process 0 always discards messages. 2.2.2 Operational semantics of systems. The behaviour of an AbC system is described by means of the transition relation − → ⊆ Comp × SLAB × Comp, where Comp denotes the set of components and SLAB is the set of transition labels λ which are generated by the following grammar: λ ::= Γ ▷ Π(ṽ) | Γ ▷ Π(ṽ) The definition of the transition relation − → is provided in Table 5 and relies on the rules Comp, FComp, Sync, ComL and ComR. Rules Comp and FComp depends on relation 7− → and are used to lift the effect of local behaviour to the system level. The former states that the relations 7− → and − → coincide when performing either an input or an output actions, while rule FComp states that a component Γ :I P can discard a message and remain unchanged. However, we would like to stress that the system level label of FComp coincides with that of Comp in case of input actions, which means that externally it cannot be percieved whether a message has been accepted or discarded. Rule Sync states that two parallel components C 1 and C 2 can receive the same message. Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems ′ ▷Π′ (ṽ) ß λ Γ :I P 7− → Γ ′ :I P ′ Comp λ Γ :I P − → Γ ′ :I P ′ 13 Γ :I P 7−−−−−−−→Γ :I P Γ′ ▷Π′ (ṽ) Γ :I P −−−−−−−→ Γ :I P Γ▷Π(ṽ) FComp Γ▷Π(ṽ) C 1 −−−−−−→ C 1′ C 2 −−−−−−→ C 2′ Γ▷Π(ṽ) Sync C 1 ∥ C 2 −−−−−−→ C 1′ ∥ C 2′ Γ▷Π(ṽ) Γ▷Π(ṽ) C 1 −−−−−−→ C 1′ C 2 −−−−−−→ C 2′ Γ▷Π(ṽ) C 1 ∥ C 2 −−−−−−→ C 1′ ∥ C 2′ Γ▷Π(ṽ) ComL Γ▷Π(ṽ) C 1 −−−−−−→ C 1′ C 2 −−−−−−→ C 2′ Γ▷Π(ṽ) ComR C 1 ∥ C 2 −−−−−−→ C 1′ ∥ C 2′ Table 5. Operational Semantics of Systems Finally, rule ComL (and its symmetric variant ComR) governs communication among two parallel components C 1 and C 2 : If C 1 sends a message then (C 2 can receive it by applying rule Comp). However, C 2 has also the possibility of discarding the message by applying rule FComp. 2.3 Expressiveness of AbC Calculus In this section, we would like to provide some evidences of the expressive power of the AbC calculus by showing how different communication models and interaction patterns can be easily modelled in AbC. Indeed, we think that attribute-based communication can be used as a unifying framework to encompass a number of communication models. Further details regarding the actual implementation of the material, presented in this section, can be found in the a Webpage of Ab CuS3 : a Java API for the AbC calculus. Encoding channel-based interaction. We show how one-to-many channel-based interaction can be encoded in the AbC calculus. It may seem tempting to model a channel name as an attribute in AbC, however it turns out not to be the case. The reason is that in channel-based communication, a channel, where the exchange happens, is instantly enabled at the time of interaction and is disabled afterwards. This feature is not present in AbC since attributes are persistent in the attribute environment and cannot be disabled at any time (i.e., attribute values are always available to be checked against sender predicates). However, this is not a problem because we can exploit the fact that the receiving predicates in AbC can check the values in the received message. The key idea is to use structured messages to select communication partners where the name of the channel is rendered as the first element in the message; receivers only accept messages with attached channels that match their receiving channels. Actually, attributes do not play any role in such interaction so we assume components with empty environments and interfaces i.e., ∅ : ∅ P. In what follows, we use [P] to denote ∅ : ∅ P. Thus a pair of processes, one willing to receive on channel a and the other willing to send on the same channel, can be modeled as follows: [(x = a)(x, y).P] ∥ [(a, msд)@(tt).Q] 3 http://lazkany.github.io/AbC/ Manuscript submitted to ACM 14 Y. Abd Alrahman et al. To show the feasibility of encoding broadcast channel-based calculi into AbC, we have encoded the bπ -calculus [Ene and Muntean 2001] into AbC. The bπ -calculus has been chosen because it uses broadcast instead of binary communication as a basic primitive for interaction which makes it a sort of variant of value-passing CBS [Prasad 1991]. Furthermore, channels in bπ -calculus can be communicated like in the point-to-point π -calculus [Milner et al. 1992] which is considered as one of the richest paradigms introduced for concurrency so far. Based on a separation result presented in [Ene and Muntean 1999], it has been proven that bπ -calculus and π -calculus are incomparable in the sense that there does not exist any uniform, parallel-preserving translation from bπ -calculus into π -calculus up to any “reasonable” equivalence. On the other hand, in π -calculus a process can non-deterministically choose the communication partner while in bπ -calculus it cannot. Proving the existence of a uniform and parallelpreserving encoding of bπ -calculus into AbC up to some reasonable equivalence ensures at least the same separation results between AbC and π -calculus. The full encoding, the formal definition which specifies what properties are preserved by this encoding, and a proof for its correctness up to a specific behavioural equivalence can be found in [Alrahman et al. 2017a]. Encoding interaction patterns. Also group-based [Agha and Callsen 1993; Chockler et al. 2001; Holbrook and Cheriton 1999] and publish/subscribe-based [Bass and Nguyen 2002; Eugster et al. 2003] interaction patterns can be naturally rendered in AbC. In the group-based model, when an agent wants to send a message to all elements of a group, it attaches the name or a reference to the group in the message and the message is propagated using this reference. In the publish/subscribe model, there are two types of agents: publishers and subscribers and there is an exchange server that mediates their interactions. For instance, in topic-based publish/subscribe models [Eugster et al. 2003], publishers produce messages tagged with topics and send them to the exchange server which is responsible for filtering and forwarding these messages to interested subscribers. Subscribers simply register their interests to the exchange server and receive messages according to their interests. Since these interaction patterns do not have formal descriptions, we proceed by relying on examples. We start with group-based interaction patterns and show that when using a group name as an attribute in AbC, the constructs for joining or leaving a group can be modelled as attribute updates, like in the following example, where we assume that initially we have Γ1 (дroup) = b, Γ2 (дroup) = a, and Γ7 (дroup) = c: Γ1 : {дr oup } (msд)@(дroup = a).0 ∥ Γ2 : {дr oup } (дroup = b)(x).0 | set(this.дroup, c)0 ∥ . . . ∥ Γ7 : {дr oup } (дroup = b)(x) | set(this.дroup, a)0 Component 1 wants to send the message “msд” to group “a”. Only Component 2 is allowed to receive it as it is the only member of group “a”. Component 2 can leave group “a” and join “c” by performing an attribute update as reported on the right hand side of the interleaving operator | . On the other hand, if Component 7 joined group “a” before “msд” is emitted then both of Component 2 and Component 7 will receive the message. It is worth mentioning that a possible encoding of group communication into bπ -calculus has been introduced in [Ene and Muntean 2001]. The encoding is relatively complicated and does not guarantee the causal order of message reception. “Locality” is neither a first class construct in bπ -calculus nor in AbC. However, “locality” (the group name, in this case) can be naturally modeled as an attribute in AbC; in bπ -calculus, more effort is needed. Publish/subscribe interaction patterns can be considered as special cases of the attribute-based ones. For instance, a natural modeling of the topic-based publish/subscribe model [Eugster et al. 2003] into AbC can be obtained by allowing Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 15 publishers to broadcast messages with true predicates (i.e., satisfied by all subscribers) and requiring subscribers to check compatibility of the exposed publishers attributes with their subscriptions, like in the example below: Γ1 : {topic } (msд)@(tt).0 ∥ Γ2 : {subscr ipt ion } (topic = this.subscription)(x).P ∥ . . . ∥ Γn : {subscr ipt ion } (topic = this.subscription)(x).Q The publisher broadcasts the message “msд” tagged with a specific topic for all subscribers (predicate “tt" is satisfied by all); subscribers receive the message if the topic matches their subscription. In the next section, we present a case study inspired by an industrial application of CAS. We focus on the role of the communication primitives and of the external environment in determining the communication between interacting components. Moreover, we use the case study to motivate the new communication primitives of AbC and to show that attribute-based communication is appropriate for handling interactions in CAS. 3 STABLE ALLOCATION IN CONTENT DELIVERY NETWORKS This case study is based on the distributed stable allocation algorithm adopted by Akamai’s Content Delivery Network (CDN) [Maggs and Sitaraman 2015]. Akamai’s CDN is one of the largest distributed systems in the world. It has currently over 170,000 servers located in over 1300 networks in 102 countries and serves 15-30 % of all Web traffic. To avoid dealing with billions of clients individually, Akamai divides the clients of the global internet into groups, called map units each having a specific demand, based on their locations and traffic types. Also content servers are grouped into clusters, and each cluster is rated according to its capacity, latency, etc. Map units prefer highly rated clusters while clusters prefer low demand map units. The goal of global load balancing is to assign map units to clusters such that preferences are accounted for and constraints are met. The allocation algorithm in [Maggs and Sitaraman 2015] is a slight variant of the original Stable Marriage Problem (SMP), reported in [Gale and Shapley 1962]. The goal of the original algorithm is to find a stable matching between two equally sized sets of elements given an ordering of preferences of each element of the two sets. Each element in one set has to be paired to an element in the opposite set in such a way that there are no two elements of different pairs which both would rather have each other than their current partners. When there are no such pairs of elements, the set of pairs is deemed stable. A natural and straightforward AbC implementation of the original stable marriage problem can be found in [Alrahman et al. 2016b]. The variant considered in [Maggs and Sitaraman 2015] allows (1) more map units to be assigned to a single cluster and (2) map units to rank only the top dozen, or so, clusters that are likely to provide good performance. The first feature is a typical generalisation [Iwama and Miyazaki 2008] of the original SMP, while the second is a mere simplification of the problem. Implementing these features in AbC does not pose any challenge, but it would make the example more verbose. Actually, our implementation of the original problem in [Alrahman et al. 2016b] needs only to be extended to consider an extra attribute, named capacity, necessary for determining when a cluster should stop engaging with more map units. Moreover, the map units assigned to a cluster should be ordered according to their demands, so that a dissolve message goes first to the most demanding map units when necessary. Furthermore, these features do not add much to the original SMP; they still require map units and clusters to have predefined lists of preferences such that only ranked elements can participate in the algorithm. Obviously, this implies that one cannot take advantage of dynamic creation of new clusters. Manuscript submitted to ACM 16 Y. Abd Alrahman et al. In this article, we consider a more interesting variant of SMP [Gale and Shapley 1962] that is better suited for the dynamicity of CDN. In this variant, the arrival of new clusters is considered, it is not required that elements know each other, and no predefined preference list is assumed. Notice that, in these settings, point-to-point interaction is not possible because elements are not aware of each other and the choice of implicit multicast is crucial. Indeed, in our variant, elements express their interests in potential partners by relying on their attributes rather than on their identities. In essence, an element of one set communicates with elements of the opposite set using predicates. Two parties that agree on some predicates form a pair, otherwise they keep looking for better partners. A pair splits only if one of its elements can find a better partner willing to accept its offer. In this way, preferences are represented as predicates over the values of some attributes of the interacting partners. In this scenario, we consider the values of attributes demand, for a map unit, and ratinд, for a cluster, as a means to derive the interaction. For simplicity, these attributes can take two different values: high (H ) and low (L). An element in the system can be either a Unit or a Cluster. Units start the protocol by communicating with clusters in the quest of finding an element that satisfies their highest expectations. If no cluster accepts the offer, a unit lowers its expectations and proposes again until a partner is found. Clusters are always willing to accept proposals from any unit that enhances their levels of satisfaction. In case of a new arrival, some pairs of elements might dissolve if the new arrival enhances their levels of satisfaction. This means that not all pairs in the system are required to split on new arrivals; only those interested will do so. The system level goal (the emergent behaviour) is to construct a set of stable pairs from elements of different types by combining the behaviour of individual elements in the system through message passing. Mathematically speaking, the problem consists of computing a function at the system level by combining individual element behaviours, without relying on a centralised control. Notice that since map units initiate the interaction, the solution is a “map-unit-optimal", as proved in [Gale and Shapley 1962], which is a property that fits with the CDN’s goal of maximising performance for clients. Allowing new arrivals is crucial to guarantee scalability and open-endedness while communicating based on predicates rather than on identities or ranks is crucial to deal with anonymity. The actual implementation of this algorithm alongside with experiment results can be found in the Webpage of GoAt4 : a Go API for the AbC calculus. There we also provide a short tutorial to provide some intuition about how to use this API for programming. The system in our attribute-based scenario can be modelled in AbC as the parallel composition of existing units and clusters (i.e., U niti ∥ . . . ∥ U nitn ∥ Cluster i ∥ . . . ∥ Cluster n ). Notice that units and clusters interact in a distributed setting without any centralised control. Each element is represented as an AbC component. A unit, U niti , has the form Γi :I P where Γi represents its attribute environment, I represents its interface where I = {demand, idi }, and the process P represents its behaviour. A cluster, Cluster i , has the form Γr :I ′ Q where Γr represents its attribute environment, I ′ represents its interface where I ′ = {ratinд, idr }, and the process Q represents its behaviour. In addition to the attributes demand and ratinд, mentioned above, the attribute environments of units and clusters contain the following attributes: partner: current partner’s identity; in case they are not engaged, the value is −1; exPartner: previous partner; idi and idr : the identity of units and clusters, respectively; ref: current preference, 0 for high rating and 1 for low rating, initially re f = 0; 4 https://github.com/giulio-garbi/goat Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 17 success: a boolean attribute which is set to true when an accept message from a cluster is received, initially success = ff; arrival: a boolean attribute which is set to true when an arrival message is received, initially arrival = ff; ack: a boolean attribute which is set to false when a negative acknowledgment message is received, initially ack = tt; dissolve: a boolean attribute which is set to true when a dissolve message is received, initially dissolve = ff; rank: an integer flag used to rank the current partner: 0 for high and 1 for low, initially rank = 2; bof: an integer flag used to rank the new arrival: 0 for high and 1 for low. Initially bo f = 2; lock: an integer flag used to implement a lock within a single component, initially lock = 0; timer: a counter implementing a timer of a single component. Initially timer > time_out where time_out is a constant number representing the number of steps a process can take before specific event can occur. The behaviour of a unit component is specified by the process P which is the parallel composition of the processes I, T , M, and N . Process I defines a proposal process, process T defines a timer process, process M defines a message handler process, and process N defines a negative acknowledgment process. The behaviour of the proposal process, I , is defined below: I ≜ ⟨re f = 0⟩(“propose”, this.demand, this.idi , 0)@Πh .[timer := 0, dissolve := ff]I ′ + ⟨re f = 1⟩(“propose”, this.demand, this.idi , 1)@Πl .[timer := 0, dissolve := ff]I ′ Process I sends a proposal message to all components that either satisfy predicate Πh or predicate Πl , depending on the current value of the re f attribute. The predicate Πh represents high expectations where Πh = (ratinд = “H ”) while the predicate Πl represents low expectations where Πl = (ratinд = “L”). Notice that the branches of process I encode the preferences of a unit and the selection of any of them depends on the run-time value of re f . These branches can be thought of as context-dependent behavioural variations in Context-Oriented Programming [Hirschfeld et al. 2008]. Since the initial value of re f is 0, the process proceeds with the first branch. The proposal message contains a proposal label, “propose”, the values of attributes demand, idi , and re f of the unit respectively. The sent value of re f will be used later to decide if an accept message from a cluster is stale (i.e., the received value of re f is different from the current value of re f ). By sending a proposal message, the timer and the dissolve attributes are reset. After this step, process I evolves to I ′ which is a proposal handler process. Reseting the timer attribute will decide how long process I should wait before proposing again. The timer process is reported below: T ≜ ⟨timer < time_out⟩()@ff.[timer := timer + 1]T + ⟨timer = time_out⟩()@ff.[timer := timer + 1, re f := (re f + 1)%2, success := ff]T T keeps increasing the value of the timer autonomously with silent moves (i.e., ()@ff) as long as its value is less than the constant time_out. By assuming fairness and a reasonably large value of time_out, we can guarantee that an accept message from a cluster, that satisfies the sent proposal message (if there is any), is received before a timeout. If a timeout is reached, the timer process lowers the preference of the unit and resets the value of the success attribute to false. As we have seen so far, the code of processes is infrastructure-agnostic, i.e., it does not contain addresses or channel names. It is completely data-centric and relies on the run-time characteristics of the interacting partners. Manuscript submitted to ACM 18 Y. Abd Alrahman et al. In the proposal handler process, reported below, we can understand the role of the awareness construct ⟨Π⟩ as an environmental parameter used to influence the behaviour of a unit at run-time. I ′ ≜ ⟨lock = 0 ∧ ¬success ∧ timer > time_out⟩I + ⟨lock = 0 ∧ dissolve⟩I + ⟨lock = 0 ∧ arrival ∧ (bo f ≤ rank − 1)⟩ (“dissolve”)@(idr = this.partner ). [arrival := ff, success := ff, re f := bo f , bo f := 2, rank := 2, exPartner := partner, partner := −1]I The process blocks executing until one of three events occurs. If no lock is acquired (lock = 0), no accept message from a cluster is received (¬success), and a timeout occurs (timer > time_out), process I ′ calls the proposal process I again by considering the new value of re f modified by the timer process. If no lock is acquired and a dissolve message from the current partner is received (dissolve = true), process I ′ calls the proposal process I again. Finally, if no lock is acquired and an arrival message is received (arrival = true), and the rank of the new arrival is better than the rank of the current partner (bo f ≤ rank − 1), the process sends a dissolve message that contains a dissolve label to its partner, sets the value of attribute exPartner to the value of attribute partner and the value of attribute re f to the value of attribute bo f , and resets the values of attributes arrival, success, bo f , rank, and partner to their initial values. Process I ′ calls the proposal process I again. The negative acknowledgment process is reported below: N ≜ (x = “accept”∧((z , re f ) ∨ success))(x, y, z). (“ack”, −1)@(idr = y).0 | N N ensures that after a successful reception of a first accept message from a cluster (i.e., success = tt) all other accept messages to this unit are discarded (i.e., it sends an acknowledgement message with id=-1 which is interpreted by a cluster as a negative acknowledgement). Notice that the process replicates itself every time an accept message is received to be always able to catch all accept messages; the condition (z , re f ) is crucial to discard stale messages. The message handler process is reported below: M ≜ ⟨¬success⟩(x = “accept”∧ z = re f )(x, y, z). [lock := 1, success := tt, rank := re f , exPartner := partner, timer := time_out + 1] (“ack”, y)@tt.[lock := 0, parnter := y]M + (x = “dissolve” ∧ idi = partner )(x). [dissolve := tt, success := ff, re f := 0, rank := 2, partner := −1]M + ⟨partner , −1⟩(x = “arrived” ∧ ratinд = “H ”)(x).[arrival := tt, bo f := 0]M Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 19 + ⟨bo f , 0∧ partner , −1⟩(x = “arrived” ∧ ratinд = “L”)(x).[arrival := tt, bo f := 1]M M can respond to one of three events: if no accept message is received yet (i.e., ¬success) and a new one arrives, the process receives the accept message only if the message is not stale (z = re f ), acquires a lock (lock := 1), sets the value of attribute success to true, the value of attribute rank to the value of attribute re f , the value of attribute exPartner to the value of attribute partner and turns off the timer. The process proceeds by sending an acknowledgement message to the cluster, releasing the lock, setting the value of attribute partner to the received cluster identity, and then the process continues as M. Notice that the lock is important to ensure that the handler process I ′ does not proceed before all required attributes are assigned the right values. In this case, the first branch of process M is executed atomically with respect to the co-located processes in the unit component. If a dissolve message from the current partner is received, the process sets the value of attribute dissolve to true, resets the values of attributes success, re f , rank, and partner to their initial values and continues as M. If an arrival message is received, the arrival attribute is set to true and the value of attribute bo f is set to 0 if the attached attribute value is high ratinд = “H ” otherwise the value of attribute bo f is set to 1 and the process continues as M. Notice that arrivals with low value of attribute ratinд cannot override the ones with high values. This is guaranteed by the condition bo f , 0 on the last branch. Also an arrival message can have an effect on the behavior of a unit only if the unit is already engaged otherwise the arrival message is just discarded which is ensured by the condition partner , −1 in the last two branches of process M. The coordination among processes running in a single unit is made possible by relying on shared attributes, awareness constructs, and attribute updates to implement proper lock mechanisms. The behaviour of a cluster component is specified by the process Q which is the parallel composition of the processes A, R, and D. Process A defines an arrival process, process R defines a proposal reception process, and process D defines a dissolve handler process. The arrival process, A, is defined below: A ≜ (“arrived”)@tt.0 This is the first process that takes a step when a cluster component wants to be involved in the allocation procedure. It simply sends an arrival message to all components in the system and then terminates. The arrival message contains an arrival label, “arrived”. The proposal reception handler is reported below: R ≜ (x = “propose”)(x, y, z, n).R ′ | R The process simply receives a proposal message and evolves to the reception handler process R ′ . Notice that process R replicates itself every time a message is received to ensure that no proposal is lost. The reception handler process, R ′ reported below, checks if no lock is acquired and the rank of the communicated value of attribute demand of the unit is less than the rank of the current partner (rank(y) < rank), the process sends an accept message to the unit where the proposal message came from, addressing it by its identity and acquires a lock, otherwise the process R ′ terminates. The function rank(y) takes the value of demand as a parameter and returns 1 if y = “H ” and 0 otherwise. The accept message contains an acceptance label, “accept”, the identity of the current cluster, and the reference of the proposal message. The process then waits to receive either acknowledgement message or a negative one from the unit. If an acknowledgement is received, the value of attribute partner is set to the received identity of the unit, the rank is set to Manuscript submitted to ACM 20 Y. Abd Alrahman et al. the value returned by rank(y), the lock is released and process R ′ terminates. Notice that a dissolve message is sent to the current partner before releasing the lock in case a cluster is already engaged. If a negative acknowledgement is received then the lock is released. The lock is needed to ensure that concurrent proposals are handled sequentially which is important to guarantee a consistent state of the attribute environment. R ′ ≜ ⟨lock = 0⟩( if (rank(y) < rank) then { (“accept”, idr , n)@(idi = z).[lock := 1]( if (partner , −1) then { (e = “ack” ∧ f = idr ∧ idi = z)(e, f ). [exPartner := partner, partner := z, rank := rank(y)] (“dissolve”)@(idi = this.exPartner ).[lock := 0]0 } else { (e = “ack” ∧ f = idr ∧ idi = z)(e, f ). } [partner := z, rank := rank(y), lock := 0]0 + (e = “ack” ∧ f , idr ∧ idi = z)(e, f ).[lock := 0]0) } else 0) The dissolve handler process is reported below: D ≜ (x = “dissolve” ∧ idi = partner )(x). [rank := 2, exPartner := partner, partner := −1]D When a dissolve message from a cluster’s partner is received, the value of attribute exPartner is set to the value of attribute partner, the values of attributes rank and partner are reset to their initial values, and the process calls itself. Remark 3.1. In [Gale and Shapley 1962], the authors showed that their algorithm terminates with a matching that is stable after no more than n2 proposals, where n is the number of proposing elements, i.e., the algorithm has O(n 2 ) worst-case complexity. In our variant, it should be clear that the worst case complexity is also O(n 2 ) even after relaxing the assumptions of the original algorithm, i.e., no predefined preference lists and components are not aware of the existence of each other, so point-to-point communication is not possible. Interestingly, the complexity is still quadratic even if we consider a blind broadcast mechanism where proposals are sent to all components in the system except for the sender unit. In this way, for n-units, n-clusters, and a constant L related to the preferences of a unit where L is computed based on the number of branches in the proposal process I , we have that each unit can send at most L ∗ (2n − 1) proposals. Below we first provide a simple interaction fragment to show how the semantics rules are applied in our stable allocation (Example 3.1). We then show a possible and complete execution of the protocol by considering two pairs of components (Example 3.2). Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 21 Example 3.1 (Interaction fragment). A unit, say I 1 with re f = 1, demand = “H ”, and idi = 1, can send a proposal and generate the following transition by applying rule Comp: Γi : {demand,idi } I | T | M | N {demand=“H ”, id i =1}▷Πl (“pr opose”, “H ”, 1, 1) −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−→ Γi [timer 7→ 0, dissolve 7→ ff] : {demand,idi } I ′ | T | M | N Any cluster, say r 1 , can receive the message by applying rule Comp and generate this transition: Γr : {r at inд,idr } R | A | D {demand =“H ”, id i =1}▷Πl (“pr opose”, “H ”, 1, 1) −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−→ Γr : {r at inд,idr } R ′ [“propose”/x, “H ”/y, 1/z, 1/n] | R | A | D Now the overall system evolves by applying rule ComL as follows: {demand=“H ”, id i =1}▷Πl (“pr opose”, “H ”, 1, 1) S −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−→ Γi [timer 7→ 0, dissolve 7→ ff] : {demand,idi } I ′ | T | M | N ∥ . . . ∥ Γr : {r at inд,idr } R ′ [“propose”/x, “H ”/y, 1/z, 1/n] | R | A | D □ Example 3.2. Let us consider two map units M 0 and M 1 and two clusters C 0 and C 1 with attribute environments defined as follows: Γm0 = {demand = “H ”, idi = m 0 }, Γm1 = {demand = “L”, idi = m 1 }, Γc 0 = {ratinд = “H ”, idr = c 0 }, and Γc 1 = {ratinд = “L”, idr = c 1 }. Below we show the execution of the stable allocation protocol, presented above, until a stable matching is reached. • C 0 broadcasts an arrival message through process A by applying Comp. • C 1 broadcasts an arrival message through process A by applying Comp. Because no unit is engaged yet, all arrival messages are discarded. • M 0 proposes for a cluster with a high rating by applying Comp and waits for a response. • C 0 receives the proposal because its rating is high by applying Comp. • M 1 proposes for a cluster with a high rating by applying Comp and waits for a response. • C 0 receives the proposal because its rating is high by applying Comp. • C 0 handles the first proposal by process R ′ . It acquires a lock and sends an accept message to M 0 by applying rule Comp. Notice that the second proposal cannot be handled before the lock is released. • M 0 receives the message by process M, acquires a lock and sets the attributes success, rank and exPartner appropriately by rule Comp. • M 0 sends an acknowledgement message to all possible components and includes the identity of C 0 in the message. It sets its partner to C 0 and releases the lock. • Clearly, all components are potential receivers for this message, however, only C 0 receives it because it is the only component waiting an acknowledgement that contains its identity. By doing so, C 0 sets its partner to M 0 , its rank to 1 (because rank(“H ”) = 1) and releases the lock. • C 0 handles the second proposal by process R ′ again. It acquires a lock and sends an accept message to M 1 because rank(“L”) = 0 < 1, by applying rule Comp and waits for an acknowledgement. • M 1 is the only component that can receive the accept message because it satisfies the sending predicate by applying rule Comp. It receives the message by process M, acquires a lock and sets the attributes success, rank and exPartner appropriately by rule Comp. Manuscript submitted to ACM 22 Y. Abd Alrahman et al. • M 1 sends an acknowledgement message to all possible components and includes the identity of C 0 in the message. It sets its partner to C 0 and releases the lock. • C 0 receives the acknowledgement, sets its exPartner to current partner, its partner to M 1 and its rank to 0 by rule Comp. • C 0 sends a dissolve message to its exPartner (i.e., M 0 ) and releases the lock by rule Comp. • M 0 receives the dissolve message by the second branch of process M which sets the dissolve attribute to true and resets the attributes success, re f , rank, and partner to their initial values. By doing so, the second branch of process I ′ will be enabled and M 0 is ready to propose again. • M 0 proposes again for a cluster with a high rating by applying Comp and waits for a response. • C 0 receives the proposal because its rating is high by applying Comp. • C 0 drops the proposal by the last branch of process R ′ , because it is satisfied with its current partner, i.e., its rank<1. • No component can actually respond to the proposal. M 0 keeps waiting until a timeout occurs, i.e., the second branch of process T is enabled. The timer is turned off, the ref attribute value is set to 1 and the success attribute is turned off. M 0 can now propose for a cluster with a low rating. In this case, only C 1 accepts the proposal in a similar way as described before. Notice that (M 0 , C 1 ) and (M 1 , C 0 ) are actually stable pairs. 4 DISCUSSION In this section, we first explain how AbC has helped us in dealing with the collective adaptive features that were evident in the previous case studies, finally we comment on other features of AbC code, namely Compositionality and Code Extensibility. Distribution is naturally obtained because an AbC system has no centralised control; and it is represented as the parallel composition of independent components that can mutually influence each other only through message-exchange. For instance in Section 3, the overall system is defined as the parallel composition of existing units and clusters. Awareness is supported by the attribute environment that plays a crucial role in orchestrating the behaviour of AbC components. It makes components aware of their own status and provides partial views of the surrounding environment. Components behave differently under different environmental contexts. This is possible because the behaviour of AbC processes is parametric with respect to the run-time attribute values of the component in which they are executed. The awareness construct, ⟨Π⟩, is used as an environmental parameter to influence the behaviour of AbC components at run-time. For instance, in Section 3, the behaviour of the proposal handler process, I ′ , is totally dependent on the values of the attributes lock, success, timer , dissolve, arrival, bo f , and rank. In case the value of just one of these attributes changes, the process will change its behaviour accordingly. Adaptivity is obtained by means of the interaction predicates (both for sending and receiving) of AbC components that can be parametrised with their local attribute values; any run-time changes of these values might influence/change the possible set of interaction partners. Notice that the target of the dissolve message, in the third branch of the proposal handler process I ′ in Section 3, depends on the identity of the current partner (this.partner ). Interdependence among co-located processes can be obtained by modifying, with the attribute update construct, the attribute environment shared among processes within a single component. A branch of process I ′ , in Section 3, is mainly selected depending on the attribute updates performed by the timer T and the message handler M. Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 23 Collaboration is obtained by combining individual component behaviours, through message exchange, to achieve a global goal for which a single component would not be sufficient. For instance, in Section 3, the goal was to construct a set of stable pairs without any centralised control. The goal was achieved by allowing different components to collaborate through message passing; each component contributed, and the combined behaviour of all components was necessary, to reach the overall system goal. Anonymity is obtained by allowing the interaction primitives (both send and receive) to rely on predicates over the run-time attribute values of the interacting partners rather than on specific names or addresses. Thus the qualification needed to receive a message no longer depends on available channels or addresses, but on the values of dynamic attributes. For instance, in Section 3, the process I sends a proposal to a group of clusters whose attributes satisfy a specific predicate (i.e., Πh or Πl ). There is no prior agreement between the units and the other clusters and the set of candidate receivers is specified at the time of interaction in the sense that any change in the value of attribute re f changes the set of targeted components. Scalability and Open-endedness are guaranteed by the adoption of multiparty communication instead of the binary one. Actually AbC supports an implicit multicast communication in the sense that the multicast group is not specified in advance, but rather it is specified at the time of interaction by means of the available set of receivers with attributes satisfying the sender predicate. The non-blocking nature of the AbC multicast, alongside with anonymity of interaction, breaks the synchronisation dependencies between senders and receivers and components can join or leave a system without disrupting its overall behaviour. For instance, new clusters, as defined by process A, Section 3, can join the allocation procedure at run-time without causing any disruption to the overall system behaviour. Actually, the third branch of process I ′ of a unit is used as an adaptation mechanism to handle new arrival of clusters. Notice that the condition bo f ≤ rank − 1 of that branch ensures that a unit responds only to new clusters that enhance its satisfaction. This means that new arrivals affect only specific components in the system. It is worth mentioning that the initial behaviour of all components with the same type (e.g., Unit or Cluster in Section 3) is exactly the same. However, since this behaviour is parametrised with respect to the run-time attribute values of each component, components might exhibit different behaviours. This means that the context where a component is executing has a great impact on its behaviour, in the sense that it can disable or enable specific behaviours depending on the environmental changes. In some sense, the behaviour of a component evolves based on contextual conditions. Components do not need to have complex behaviour to achieve adaptation at system level. Complex behaviour can be achieved by combining the local behaviour of individual components. We would also like to stress that AbC code naturally supports compositionality and extensibility. Compositionality: a component is the basic building block of AbC programs and any program can be broken down into a set of individual components which can only interact by exchanging messages. This simplifies verification because components can be analysed individually and their external behaviour can be assessed by their observable communication capabilities. Actually, we can abstract from the internal behaviour of an AbC component and only consider its observable behaviour when it interacts with other components. Thus, a component can be treated as a blackbox that acts and reacts to its environment. We refer interested readers to our theoretical results in [Alrahman et al. 2016a, 2017a]. Code Extensibility: we would like to stress that AbC code can be easily extended in the sense that new alternative behaviours can be added and removed by modifying the attribute environments and the interfaces of components. Also component behaviours can be adapted without changing the internal structure of their running processes. For Manuscript submitted to ACM 24 Y. Abd Alrahman et al. instance in Section 3, a unit can reverse the order of its preferences by directly modifying the required value of attribute re f in the awareness constructs and the following output actions of process I . Also if we add a public attribute to a cluster, say location, the code of a unit can be easily adapted to consider new possible preferences. One way is to add another alternative/branch to process I that consider the location of a cluster. Of course some attribute values have to be adjusted accordingly. As mentioned before, these branches can be thought of as context-dependent behavioural variations in Context-Oriented Programming [Hirschfeld et al. 2008]. 5 RELATED WORK In this section, we touch on related works concerning languages and calculi with primitives that model either collective interaction, or multiparty interaction. We also report on other approaches to interaction in distributed systems and show how they relate to AbC. Some of the well-known approaches include: channel-based models [Hoare 1978; Milner 1980; Milner et al. 1992], group-based models [Agha and Callsen 1993; Chockler et al. 2001; Holbrook and Cheriton 1999], and publish/subscribe models [Bass and Nguyen 2002; Eugster et al. 2003]. Below we briefly report the main features and limitations of such approaches. Channel-based models rely on explicit naming for establishing communication links in the sense that communicating partners have to agree on channels or names to exchange messages. This implies that communicating partners are not anonymous to each other. Actually, communicating partners have static interfaces that determine the target of communication e.g., binary communication CCS [Milner 1980], multiway synchronisation CSP [Hoare 1978], and broadcast communication CBS [Prasad 1995]. In AbC the interacting partners are anonymous to each other; they do not need to agree on channels or names to interact, but rather to rely on the satisfaction of predicates over the attributes they expose. This makes our calculus more suitable for modeling scalable distributed systems as anonymity is a key factor for scalability. The π -calculus [Milner et al. 1992] was developed as a way to mitigate this problem by allowing the exchange of channel names and thus providing dynamic interfaces and additional flexibility. However, the dynamicity of interfaces is still limited because even if generic input or output actions are allowed, they are disabled until they are instantiated with specific channel names. This means that a process can engage in a communication only when its actions are enabled. The broadcast bπ -calculus [Ene and Muntean 1999, 2001] is based on CBS and the π -calculus in that it extends the former with a channel-passing mechanism. Furthermore, π -calculus and most process calculi rely on synchronous communication that creates dependencies between senders and receivers and affects the overall scalability of the system. AbC actions are always enabled with respect to the current attribute values of the component where they are executing. When these values change, the interaction predicates change seamlessly and become available for other communication partners. In group-based models, like the one used for IP multicast [Holbrook and Cheriton 1999], the group is specified in advance in the sense that the reference address of the group is explicitly included in the message. Groups or spaces in the ActorSpace model [Agha and Callsen 1993] are regarded as passive containers of processes (actors) and may be created and deleted with explicit constructs. Spaces may be nested or even overlap and can be created dynamically at run-time. Actually, the notion of space is a first class entity in the ActorSpace model. AbC extends the ActorSpace pattern-matching mechanism to select partners by predicates on both sides of the communication where not only the sender can select its partner but also the receiver can decide to either receive or discard the message. The notion of spaces/collectives in AbC is more abstract and is only specified at run-time. Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 25 In the publish/subscribe model, like the one used in NASA Goddard Mission Services Evolution Center (GMSEC)5 , each component can take the role of a publisher or a subscriber. Publishers produce messages and subscribers consume them. The subscribers are indirectly addressed by the contents of sent messages. That is, a subscriber expresses its interest independently from the publisher that produces the messages, and then it is asynchronously notified when a message that matches its interest arrives. The propagation of messages from publishers to subscribers is obtained by introducing an exchange server that mediates the interaction. The exchange server stores the subscriptions of subscribers, receives messages from publishers, and forwards the messages to the correct subscribers. The result is that publishers and subscribers are unaware of the existence of each other. Though the anonymity of interaction is an effective solution to achieve scalability by allowing participants to enter or leave the system at anytime, scalability issues are moved to the implementation of the exchange server. In fact, since the exchange server is responsible for subscriptions and message filtering, it should be able to face a large number of participants with evolving subscriptions while maintaining an acceptable level of performance. As discussed before, the publish/subscribe model can be considered as a special case of AbC where publishers can attach attributes to messages and send them with empty predicates (i.e., satisfied by all). Only subscribers can check the compatibility of the attached publishers attributes with their subscriptions. The Actor communication model, originally introduced in [Hewitt 1977; Hewitt et al. 1973], has been used to support the development of object-based concurrent computation. Actors embody the spirit of objects and extends their advantages to concurrent computations. As with objects where data and behavior are encapsulated to separate what an object can do from how it does it, the actors separate the control (where and when) from the logic of a computation. The early proposals of the Actor model in [Hewitt 1977; Hewitt et al. 1973] were rather informal. However, the definition of actors that is commonly used today follows Agha’s definition [Agha 1986] that provides an abstract representation of actor systems in terms of what is called Asynchronous Computation Trees, building on notions borrowed from Milner’s work [Milner 1989]. An actor system, also called a configuration, consists of autonomous objects, called actors, and of a collection of messages in transit. Computations in an actor system are carried out in response to received messages. Each message contains the destination identity and the actual content of the message. As opposed to AbC components, actors adopt binary communication which does not scale well in large systems. To interact, actors rely on identities; messages can only be sent to those actors whose identity is known. Thus actors can only interact if they know each other. Programming collective and/or adaptive behavior has been studied in different research communities like those interested in Context-Oriented Programming (COP) [Hirschfeld et al. 2008] and in the Component-Based approach [Bruneton et al. 2004]. In Context-Oriented Programming (COP), a set of linguistic constructs is used to define context-dependent behavioural variations. These variations are expressed as partial definitions of modules that can be overridden at run-time to adapt to contextual information. They can be grouped via layers to be activated or deactivated together dynamically. These layers can be also composed according to some scoping constructs. Our approach is different in that components adapt their behaviour by considering the run-time changes of the values of their attributes which might be triggered by either contextual conditions or by local interaction. Another approach that considers behavioural variations is adopted in the Helena framework [Klarl 2015]. The component-based approach, represented by FRACTAL [Bruneton et al. 2004] and its Java implementation, JULIA [Bruneton et al. 2006], is an architecture-based approach that achieves adaptation by defining systems that 5 http://opensource.gsfc.nasa.gov/projects/GMSEC_API_30/index.php Manuscript submitted to ACM 26 Y. Abd Alrahman et al. are able to adapt their configurations to the contextual conditions. System components are allowed to manipulate their internal structure by adding, removing, or modifying connectors. However, in this approach interaction is still based on explicit connectors. In our approach predefined connections simply do not exist: we do not assume a specific architecture or containment relations between components. The connectivity is always subject to change at any time by means of attribute updates. In our view, AbC is definitely more adequate when highly dynamic environments have to be considered. Finally, the attribute-based interaction has been exploited in the Carma specification language [Bortolussi et al. 2015; Loreti and Hillston 2016] which was designed based on the linguistic primitives of the AbC calculus to support quantitive analysis of collective-adaptive systems. Send and receive operations in Carma are associated with execution rates that can be dynamically adjusted based on environmental conditions. A Carma model can be automatically translated into a Continuous-Time Markov process that can be simulated and thus its dynamics can be studied quantitatively. AbC models are non-deterministic and they abstract from timing constraints. They are concerned with qualitative properties of the system being modelled. Clearly, AbC and Carma have been designed to serve different objectives in the sense that AbC is designed as a programming framework for CAS interactions while Carma is designed to quantitatively assess CAS models in terms of their performance. AbC combines the lessons learnt from the above mentioned languages and calculi, in that it strives for expressiveness while aiming to preserve minimality and simplicity. The dynamic settings of attributes and the possibility of inspecting/modifying the environment gives AbC greater flexibility and expressiveness while keeping models as natural as possible. 6 CONCLUDING REMARKS We have proposed a language-based approach for programming the interaction of collective-adaptive systems by relying on attribute-based communication. We have introduced the programming constructs of the AbC calculus and we exploited them to show how complex and interesting case studies, from the realm of collective-adaptive systems, can be programmed in an intuitive way. We illustrated the expressive power of attribute-based communication by showing the natural encoding of other existing communication paradigms. We argued that the general concept of attribute-based communication can be exploited to provide a unifying framework to encompass different communication models and interaction patterns. Since the focus of this article was to show the expressive power of attribute-based communication and their applicability in the context of CAS systems, we refrained from presenting theoretical results. However, full details about behavioural theory, equational laws, and a formal proof of encoding can be found in [Alrahman et al. 2016a, 2017a]. We also provided AbC APIs to enable attribute-based interaction in well-known programming languages, e.g., in Java [Alrahman et al. 2016b], in Go [Alrahman et al. 2017b], and in Erlang [De Nicola et al. 2017]. In [Alrahman 2017], we have also laid the basis for an efficient distributed implementation of the attribute-based interaction; we proposed three different communication infrastructures, proved their correctness, modelled them as stochastic processes, and finally evaluated their performance. For future work, we want to investigate anonymity of interaction at the level of attribute identifiers. Indeed in our model, components are anonymous, but the “name-dependency” challenge arises at another level, that is, the attribute environments. In other words, the sender’s predicate should be aware of the identifiers of receiver’s attributes in order to explicitly use them. For instance, the sending predicate loc = (1, 4) targets the components at location (1, 4), however, different components might use different identifiers to denote their locations; this means that there should be Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 27 an agreement about the attribute identifiers among components. For this reason, appropriate mechanisms for handling attribute directories together with identifiers matching/correspondence will be considered. These mechanisms will be particularly useful when integrating heterogeneous applications. We plan to develop formal tools based on AbC semantics to analyse the code generated by our AbC APIs for ensuring safety and liveness properties. We want to study the possibility of using static analysis to discipline the interaction in AbC and thus producing a correct by construction programs and we will also consider the more challenging problem of specifying and verifying collective properties of AbC programs. Acknowledgments. The authors would like to thank Francesco Tiezzi, Mirco Tribastone and Catia Trubiani for their valuable comments and suggestions to improve the quality of this article. We would also like to thank Giulio Garbi for debugging and implementing the case studies in GoAT. REFERENCES Gul Agha. 1986. Actors: A Model of Concurrent Computation in Distributed Systems. MIT Press, Cambridge, MA, USA. Gul Agha and Christian J Callsen. 1993. ActorSpace: an open distributed programming paradigm. Vol. 28. ACM. Yehia Abd Alrahman. 2017. A Foundational Theory for Attribute-based Communication. (2017). http://e-theses.imtlucca.it/id/eprint/214 PhD Thesis, IMT school for Advanced Studies Lucca. Yehia Abd Alrahman, Rocco De Nicola, Giulio Garbi, and Michele Loreti. 2017b. Attribute-based Interaction in Google Go. https://github.com/giulio-garbi/ goat. (2017). Yehia Abd Alrahman, Rocco De Nicola, and Michele Loreti. 2016a. On the Power of Attribute-Based Communication. In Formal Techniques for Distributed Objects, Components, and Systems - 36th IFIP WG 6.1 International Conference, FORTE 2016, Held as Part of the 11th International Federated Conference on Distributed Computing Techniques, DisCoTec 2016, Heraklion, Crete, Greece, June 6-9, 2016, Proceedings. 1–18. https://doi.org/10.1007/978-3-319-39570-8_1 Yehia Abd Alrahman, Rocco De Nicola, and Michele Loreti. 2016b. Programming of CAS Systems by Relying on Attribute-Based Communication. In Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part I. Springer, 539–553. https://doi.org/10.1007/978-3-319-47166-2_38 Yehia Abd Alrahman, Rocco De Nicola, and Michele Loreti. 2017a. A Behavioural Theory for Interactions in Collective-Adaptive Systems. ArXiv e-prints (Nov. 2017). https://arxiv.org/abs/1711.09762 Yehia Abd Alrahman, Rocco De Nicola, Michele Loreti, Francesco Tiezzi, and Roberto Vigo. 2015. A Calculus for Attribute-based Communication. In Proceedings of the 30th Annual ACM Symposium on Applied Computing (SAC ’15). ACM, 1840–1845. https://doi.org/10.1145/2695664.2695668 S Anderson, N Bredeche, AE Eiben, G Kampis, and M van Steen. 2013. Adaptive collective systems: herding black sheep. BookSprints for ICT Research (2013). Michael A Bass and Frank T Nguyen. 2002. Unified publish and subscribe paradigm for local and remote publishing destinations. (June 11 2002). US Patent 6,405,266. Federico Bergenti, Giovanni Rimassa, and Mirko Viroli. 2003. Operational semantics for agents by iterated refinement. In International Workshop on Declarative Agent Languages and Technologies. Springer, 37–53. Luca Bortolussi, Rocco De Nicola, Vashti Galpin, Stephen Gilmore, Jane Hillston, Diego Latella, Michele Loreti, and Mieke Massink. 2015. CARMA: Collective Adaptive Resource-sharing Markovian Agents. Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL 2015 (2015), 16–31. Manfred Broy. 2006. The’grand challenge’in informatics: engineering software-intensive systems. Computer 39, 10 (2006), 72–80. Eric Bruneton, Thierry Coupaye, Matthieu Leclercq, Vivien Quéma, and Jean-Bernard Stefani. 2006. The fractal component model and its support in Java. Software: Practice and Experience 36, 11-12 (2006), 1257–1284. Eric Bruneton, Thierry Coupaye, and Jean-Bernard Stefani. 2004. The FRACTAL component model. Draft of specification, version 2, 3 (2004). R. Calinescu. 2008. Implementation of a Generic Autonomic Framework. In Fourth International Conference on Autonomic and Autonomous Systems (ICAS’08). 124–129. https://doi.org/10.1109/ICAS.2008.21 Betty HC Cheng, Rogerio De Lemos, Holger Giese, Paola Inverardi, Jeff Magee, Jesper Andersson, Basil Becker, Nelly Bencomo, Yuriy Brun, Bojan Cukic, et al. 2009. Software engineering for self-adaptive systems: A research roadmap. In Software engineering for self-adaptive systems. Springer, 1–26. Gregory V Chockler, Idit Keidar, and Roman Vitenberg. 2001. Group communication specifications: a comprehensive study. ACM Computing Survey (CSUR) 33, 4 (2001), 427–469. Frank S de Boer, Wieke de Vries, John-Jules Ch Meyer, Rogier M van Eijk, and Wiebe van der Hoek. 2005. Process algebra and constraint programming for modeling interactions in MAS. Applicable Algebra in Engineering, Communication and Computing 16, 2-3 (2005), 113–150. Manuscript submitted to ACM 28 Y. Abd Alrahman et al. Rocco De Nicola, Tan Duong, Omar Inverso, and Catia Trubiani. 2017. AErlang: Empowering Erlang with Attribute-Based Communication. In Coordination Models and Languages - 19th IFIP WG 6.1 International Conference, COORDINATION 2017, Held as Part of the 12th International Federated Conference on Distributed Computing Techniques, DisCoTec 2017, Neuchâtel, Switzerland, June 19-22, 2017, Proceedings. 21–39. https://doi.org/10.1007/ 978-3-319-59746-1_2 Rocco De Nicola, Michele Loreti, Rosario Pugliese, and Francesco Tiezzi. 2014. A formal approach to autonomic systems programming: the SCEL Language. ACM Transactions on Autonomous and Adaptive Systems (2014), 1–29. Cristian Ene and Traian Muntean. 1999. Expressiveness of point-to-point versus broadcast communications. In Fundamentals of Computation Theory. Springer, 258–268. Christian Ene and Traian Muntean. 2001. A broadcast-based calculus for communicating systems. In Parallel and Distributed Processing Symposium, International, Vol. 3. IEEE Computer Society, 30149b–30149b. M. F. Ercan, L. Partawijaya, and Y. F. Fung. 2006. Collective Search and Exploration with a Robot Swarm. In TENCON 2006 - 2006 IEEE Region 10 Conference. 1–4. https://doi.org/10.1109/TENCON.2006.344078 Patrick Th. Eugster, Pascal A. Felber, Rachid Guerraoui, and Anne-Marie Kermarrec. 2003. The Many Faces of Publish/Subscribe. ACM Comput. Surv. 35, 2 (June 2003), 114–131. https://doi.org/10.1145/857076.857078 Alois Ferscha. 2015. Collective adaptive systems. In Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. ACM, 893–895. David Gale and Lloyd S Shapley. 1962. College admissions and the stability of marriage. The American Mathematical Monthly 69, 1 (1962), 9–15. D. Garlan, S. W. Cheng, A. C. Huang, B. Schmerl, and P. Steenkiste. 2004. Rainbow: architecture-based self-adaptation with reusable infrastructure. Computer 37, 10 (Oct 2004), 46–54. https://doi.org/10.1109/MC.2004.175 Simos Gerasimou, Radu Calinescu, Stepan Shevtsov, and Danny Weyns. 2017. UNDERSEA: an exemplar for engineering self-adaptive unmanned underwater vehicles. In Proceedings of the 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. IEEE Press, 83–89. Carl Hewitt. 1977. Viewing control structures as patterns of passing messages. Artificial intelligence 8, 3 (1977), 323–364. Carl Hewitt, Peter Bishop, and Richard Steiger. 1973. A universal modular actor formalism for artificial intelligence. In Proceedings of the 3rd international joint conference on Artificial intelligence. Morgan Kaufmann Publishers Inc., 235–245. Robert Hirschfeld, Pascal Costanza, and Oscar Nierstrasz. 2008. Context-oriented programming. Journal of Object Technology 7, 3 (2008). Charles Antony Richard Hoare. 1978. Communicating sequential processes. Commun. ACM 21, 8 (1978), 666–677. Hugh W Holbrook and David R Cheriton. 1999. IP multicast channels: EXPRESS support for large-scale single-source applications. In ACM SIGCOMM Computer Communication Review, Vol. 29. ACM, 65–78. Kazuo Iwama and Shuichi Miyazaki. 2008. A Survey of the Stable Marriage Problem and Its Variants. In Proceedings of the International Conference on Informatics Education and Research for Knowledge-Circulating Society (Icks 2008) (ICKS ’08). IEEE Computer Society, 131–136. https://doi.org/10.1109/ ICKS.2008.7 Duncan E Jackson and Francis LW Ratnieks. 2006. Communication in ants. Current biology 16, 15 (2006), R570–R574. Tommy R Jensen and Bjarne Toft. 1995. Graph coloring problems. Vol. 39. John Wiley & Sons. David Kinny. 2005. Algebraic specification of agent computation. Applicable Algebra in Engineering, Communication and Computing 16, 2 (2005), 77–111. Annabelle Klarl. 2015. Engineering Self-Adaptive Systems with the Role-Based Architecture of Helena. In Infrastructure for Collaborative Enterprises, WETICE 2015, Larnaca, Cyprus, June 15-17, 2015. 3–8. https://doi.org/10.1109/WETICE.2015.32 Hermann Kopetz. 2011. Internet of things. In Real-time systems. Springer, 307–323. Filip Krijt, Zbynek Jiracek, Tomas Bures, Petr Hnetynka, and Ilias Gerostathopoulos. 2017. Intelligent Ensembles: A Declarative Group Description Language and Java Framework. In Proceedings of the 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS ’17). IEEE Press, Piscataway, NJ, USA, 116–122. https://doi.org/10.1109/SEAMS.2017.17 Paulo Leitão, José Barbosa, and Damien Trentesaux. 2012. Bio-inspired multi-agent systems for reconfigurable manufacturing systems. Engineering Applications of Artificial Intelligence 25, 5 (2012), 934–944. Wilfried Lepuschitz, Benjamin Groessing, Munir Merdan, and Georg Schitter. 2013. Evaluation of a multi-agent approach for a real transportation system. In Industrial Technology (ICIT), 2013 IEEE International Conference on. IEEE, 1273–1278. Michele Loreti and Jane Hillston. 2016. Modelling and Analysis of Collective Adaptive Systems with CARMA and its Tools. In Formal Methods for the Quantitative Evaluation of Collective Adaptive Systems - 16th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2016, Bertinoro, Italy, June 20-24, 2016, Advanced Lectures (Lecture Notes in Computer Science), Marco Bernardo, Rocco De Nicola, and Jane Hillston (Eds.), Vol. 9700. Springer, 83–119. https://doi.org/10.1007/978-3-319-34096-8_4 Bruce M. Maggs and Ramesh K. Sitaraman. 2015. Algorithmic Nuggets in Content Delivery. SIGCOMM Comput. Commun. Rev. 45, 3 (July 2015), 52–66. https://doi.org/10.1145/2805789.2805800 Marco Mamei and Franco Zambonelli. 2004. Programming pervasive and mobile computing applications with the TOTA middleware. In Pervasive Computing and Communications, 2004. PerCom 2004. Proceedings of the Second IEEE Annual Conference on. IEEE, 263–273. Robin Milner. 1980. A calculus of communicating systems. (1980). Robin Milner. 1989. Communication and concurrency. Prentice-Hall, Inc. Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 29 Robin Milner, Joachim Parrow, and David Walker. 1992. A calculus of mobile processes, II. Information and computation 100, 1 (1992), 41–77. Hong-Seok Park and Ngoc-Hien Tran. 2012. An autonomous manufacturing system based on swarm of cognitive agents. Journal of Manufacturing Systems 31, 3 (2012), 337 – 348. https://doi.org/10.1016/j.jmsy.2012.05.002 KVS Prasad. 1991. A calculus of broadcasting systems. In TAPSOFT’91. Springer, 338–358. Kuchi VS Prasad. 1995. A calculus of broadcasting systems. Science of Computer Programming 25, 2 (1995), 285–327. D. Sanderson, N. Antzoulatos, J. C. Chaplin, D. Busquets, J. Pitt, C. German, A. Norbury, E. Kelly, and S. Ratchev. 2015. Advanced Manufacturing: An Industrial Application for Collective Adaptive Systems. In 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops. 61–67. https://doi.org/10.1109/SASOW.2015.15 Davide Sangiorgi and David Walker. 2003. The pi-calculus: a Theory of Mobile Processes. Cambridge university press. A. Sassi, C. Borean, R. Giannantonio, M. Mamei, D. Mana, and F. Zambonelli. 2015. Crowd Steering in Public Spaces: Approaches and Strategies. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. 2098–2105. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.312 Ian Sommerville, Dave Cliff, Radu Calinescu, Justin Keen, Tim Kelly, Marta Kwiatkowska, John Mcdermid, and Richard Paige. 2012. Large-scale complex IT systems. Commun. ACM 55, 7 (2012), 71–77. Mirko Viroli, Ferruccio Damiani, and Jacob Beal. 2013. A calculus of computational fields. In Advances in Service-Oriented and Cloud Computing. Springer, 114–128. Mirko Viroli and Andrea Omicini. 2005. Process-algebraic approaches for multi-agent systems: an overview. Applicable Algebra in Engineering, Communication and Computing 16, 2-3 (2005), 69–75. Danny Weyns, Sam Malek, and Jesper Andersson. 2012. FORMS: Unifying Reference Model for Formal Specification of Distributed Self-adaptive Systems. ACM Trans. Auton. Adapt. Syst. 7, 1, Article 8 (May 2012), 61 pages. https://doi.org/10.1145/2168260.2168268 Martin Wirsing and Matthias Holzl. 2006. Software intensive systems. Draft Report on ERCIM Beyond the Horizon Thematic Group 6 (2006). Michael J Wooldridge. 2000. Reasoning about rational agents. MIT press. Manuscript submitted to ACM 30 A Y. Abd Alrahman et al. APPENDIX To provide further evidences of the expressive power of AbC and of its ability to naturally model the interaction in CAS, below we present two additional case studies from different application domains, namely crowd steering and swarm robotics. A.1 A Smart Conference System This case study is inspired by work on crowd steering in public spaces during big events [Sassi et al. 2015]. The idea is to exploit the mobile devices of conference participants to guide them to the presentations they are interested in. Each participant expresses her topic of interest and the conference venue is responsible for guiding her to the location where the presentations that match her interest take place. The conference venue is composed of a set of rooms where the conference sessions are planned. We assume that the name of each room identifies its location, e.g., “1st Floor, Room.101" and that each participant has a unique id. The conference program and session relocation can be dynamically adjusted at anytime to handle specific situations, i.e., a crowded session can be moved to a larger room and this should be done seamlessly without any disruption to the whole conference program. When relocation happens, the updates should be communicated to the interested participants. The smart conference system can be modelled in AbC as the parallel composition of the conference venue and the set of available participants. The conference venue is represented as a set of parallel AbC components, each of them representing a room (Room 1 ∥ . . . ∥Roomn ) and each Roomi has the following structure Γi :I R where Γi represents the attribute environment of a room, I = {role, session} represents its interface and R represents its behaviour. A Participanti instead has the following structure Γp :I ′ P where Γp represents its attribute environment, I ′ = {id, interest } represents its interface, and P represents its behaviour. The overall system is defined as follows: Room 1 ∥ . . . ∥Roomn ∥ Participant 1 ∥ . . . ∥ Participantm The attribute environments for participants and rooms contain the following attributes: id: the identity of a participant; interest: the current topic of interest of a participant; name: the name of a room, e.g., “1st Floor, Room.101"; dest: to store the name of the room where the topic of interest for a participant is presented; role: the role of a component, each room has a Provider role; session: the current scheduled session for a room; prevSession: the session that was supposed to be held previously in a room if any; newSession: the new session assigned to a room; relocate: a boolean attribute, that indicates if a room has to start the relocation process. The behaviour of process P, specifying the behaviour of a participant is defined as follows: let v = (initialTopic) in P ≜ set(interest, v) (“request”, this.id)@(role = “Provider ”). (session = this.interest ∧ x = “interestRply”)(x, y).[dest := y]U pd U pd ≜ (x = “update” ∧ z = this.interest)(x, y, z, l).[dest := l]U pd Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 31 A participant starts by updating the value of her attribute interest with an initial topic. This will allow the participant to communicate her topic of interest to the conference venue by sending a session-request to nearby providers; in our case, this is a room. Notice that a participant does not know room names in advance, and only sends messages to components with a provider role. The communicated values include a label “request” and the identity of the participant. Once the message is emitted, the process blocks until a reply notification that matches her interest arrives. The notification contains an interestRply label, and the name of the room where the session is to be held. The participant is eligible to receive the message only if its attributes satisfy the sending predicate. Moreover, the participant receives only from a room with a session that matches her topic of interest (i.e., session = this.interest). By receiving this notification, the process updates its destination and waits for new possible updates through process U pd. This process is blocked until it receives an update notification about a session that matches the participant interest. The notification message contains an update label, the session that was supposed to be held previously in this room, the current session of the room, and the name of the room where the session of interest has been moved. Once a notification message is received, the process updates the destination to the new location and waits for future updates. The behaviour of a room component is obtained as the parallel composition of three different processes: R ≜ Service | Relocation | U pdatinд The Service process is responsible for providing a normal service for a room. When a room receives a session-request, the process Service replies back to the requester with the room location whenever the current session of the room matches the topic of interest of the requester. The Relocation and the U pdatinд processes are responsible for handling sessions and participants relocation from one room to another. The process Service, reported below, shows how the room normally handles participant requests. The Service process is busy-waiting for session-requests from the available participants. Once a message with a possible session-request is received, and its attached interest value matches the current room session, the process sends an interest-reply message to the requester and gets ready to handle new session-requests by replicating itself. The interest-reply message contains an interestRply label and the name of the room. Notice that, since the predicate of the interestRply message addresses the requester with its identity, there is only one possible receiver for this message which is the requester herself. Service ≜ (x = “request” ∧ interest = this.session)(x, y).(“interestRply”, name)@(id = y).0 | Service The process Relocation handles unexpected changes of the schedule for a room. The idea is to handle these run-time changes in a way such that interested participants in the new session and also other rooms where a swap of schedule should happen are notified. The behaviour of Relocation is triggered by changes in the environmental attributes N ewSession and relocate. In general, environmental attributes are controlled either by the environment itself or by other components; these may be humans or sensors that intervene to adapt the system behaviour to guarantee the expected functioning. A possible scenario is that the session is becoming too crowded and needs to be relocated to another larger room with possibly few attendees. Another component that plays a portal role and keeps information about the capacity and the run-time utilisation of all rooms can propose a new session that best fits with the capacity of this room. Note that the portal component only proposes suitable sessions for rooms based on their capacities and their run-time utilisation, but has no control on their behaviours. The decision of relocation is made by the room itself depending on the readings from sensors which set the value of the attribute relocate to true if the level of overcrowding exceeded a certain Manuscript submitted to ACM 32 Y. Abd Alrahman et al. threshold. To achieve relocation we have to steer the crowd from one room to another and vice versa. Actually, three different parties have to be notified about the changes of the schedule. The participants who are interested in the new proposed session, the room that is currently assigned the new proposed session and should swap its session with the crowded room, and the participants who are interested in the crowded session. The Relocation process is responsible for notifying the room where a swap of schedule should happen and the participants who are interested in the new proposed session. The U pdatinд process communicates the new location of the crowded session to the interested participants. An awareness operator is needed to allow the Relocation process to keep track of environmental changes; it is used to collect run-time data from the attribute environment of the component where the process Relocation is executed. These data are used to decide future behaviours. Process Relocation, reported below, is blocked until the value of attribute relocate becomes true; it sends a session/interest update to the participants interested in the new assigned session and also to the room where a swap of schedule should happen as shown in the “∨" predicate of the send action. The interest update message contains an interest update label, the current session, the new session, and the name of the room. By sending this message, the process updates the room’s previous session to the current one and the current session to the new session provided by the portal component through the value of the attribute newSession. The flag relocate is set to false. Relocation ≜ ⟨relocate = tt⟩(“update”, this.session, this.newSession, name) @(interest = this.newSession ∨ session = this.newSession). [prevSession := session, session := newSession, relocate := ff]Relocation To relocate the sessions and steer participants correctly both the involved rooms do collaborate and propagate the changes in their schedules to the interested participants. The global goal is to make both groups of participants, interested in one of the two room sessions, aware of the new location of their interest. As seen before, process Relocation is partly responsible for propagating the changes to the group of participants interested in the newly assigned session. The same message is used to ask for collaboration to the other room, where a swap of schedule should happen. The other room has to update its session and propagate the changes to all participants interested in the crowded session. This task is performed by process U pdatinд: U pdatinд ≜ (x = “update” ∧ z = this.session)(x, y, z, l). [prevSession := session, session := y] (“update”, this.prevSession, this.session, this.name) @(interest = this.session ∨ session = this.session).0 | U pdatinд When a room receives a session-update message regarding its own session, the attribute prevSession gets the value of session and this is assigned the value of the session name communicated by the other room. Once the changes have been applied, the process sends a session/interest-update message and again the process U pdatinд is made available to handle session-update messages. The session-update message is sent to the other group of participants so that they relocate to the new destination. It should be noted that the structure of this message is exactly the same as the one sent by Relocation. The only difference is that the sent values depend on the current attribute values of the room where the process U pdatinд is executed. Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 33 Example A.1 (Interaction fragment). Let us assume that a participant, say p1 with id = 1 and with “Theory” as her initial topic of interest, sent a session-request for nearby providers. The participant p1 applies rule Comp twice. The first application of Comp, reported below, updates the interest attribute of the participant6 . Γp :I ′ P {id=1, int er est =⊥}▷ff() −−−−−−−−−−−−−−−−−−−−−→ Γp [interest 7→ “Theory”] :I ′ P ′ The second application of Comp is used to send the request to nearby providers: Γp′ :I ′ P ′ {id=1, int er est =“T heor y”}▷(r ol e=“P r ovider ”)(”r equest ”,1) −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−→ Γp′ :I ′ P ′′ If a room, say r 1 scheduled for the session “Theory”, receives this message, it applies rule (Comp) and performs the following transition: Γ1 :I Service | Relocation | U pdatinд {id=1, int er est =“T heor y”}▷(r ol e=“P r ovider ”)(”r equest ”,1) −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−→ Γ1 :I Service ′ [“request”/x, 1/y] | Service | Relocation | U pdatinд All other rooms will just discard the request and apply rule FComp and the overall system, by applying rule ComR, will evolve as follows: S {id=1, int er est =“T heor y”}▷(r ol e=“P r ovider ”)(”r equest ”,1) −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−→ (Γ1 :I Service ′ [“request”/x, 1/y] | Service | Relocation | U pdatinд) ∥ Γp′ :I ′ P ′′ ∥ Γ2 :I R 2 ∥ . . . ∥ Γn :I Rn The components Γ2 :I R 2 , . . . , Γn :I Rn represent the other rooms in the conference venue. A.2 □ A swarm robotics scenario in AbC We consider a scenario where a swarm of robots spreads throughout a given disaster area with the goal of locating and rescuing possible victims. Similar case studies have been considered in [Ercan et al. 2006]. All robots execute the same code that defines their functional behaviour, and rely on a set of adaptation mechanisms that regulates the interactions with other robots and with the environment. Initially, all robots play the explorer role to search for victims in the environment. Once a robot finds a victim, its role changes to “rescuer” and it sends information about the victim to nearby explorers. The collective (the swarm) starts forming in preparation of the rescuing procedure. As soon as another robot receives information about the victim, it changes its role to “helper” and joins the rescuers-collective. The rescuing procedure starts only when the collective formation is complete. During exploration, in case of a critical battery level, a robot enters a power saving mode until it is recharged. This model exploits the fact that a process running on a robot can either read the values of attributes provided by its sensors or read and update other attributes in its environment. Reading the values of the attributes controlled by sensors provides information about the environment or about the current status of the robot. Thus, the model captures both self-awareness and context-awareness. For instance, when reading the value of the collision attribute, if Γ(collision) = tt, the robot becomes aware that a collision with a wall in the arena is imminent and this triggers an adaptation mechanism 6 Please remember that we have set(int er est, I nit ialT opic) ≡ ()@ff.[int er est := init ialT opic] Manuscript submitted to ACM 34 Y. Abd Alrahman et al. to change its direction. On the other hand, if Γ(batteryLevel) = 15%, the robot becomes aware that its power is limited (e.g., < 20%) and starts an adaptation program to take the robot into the power saving mode. We assume that each robot has a unique identity (id) and since the robot acquires information about its environment or its own status by reading the values provided by sensors, no additional assumption about its initial state is needed. It is worth mentioning that sensors and actuators are not modelled by AbC because they represent the robot internal infrastructure while the AbC model represents the programmable behaviour of the robot (i.e., its running code). The robotics scenario is modelled as a set of parallel AbC components, each of which represents a robot (Robot 1 ∥ . . . ∥Robotn ) and each robot has the following form (Γi :I P R ) where I = {id, role}. The attribute environment for a robot contains the following attributes: id: the unique identity of a robot; role: the current role of a robot; victimPerceived: to indicate if a victim is found; state: its value triggers an actuation signal to either move or stop the movement; vPostion: to indicate a victim position; count: to indicate the required number of robots needed to rescue a victim; target: its value triggers the actuators to move to a specific location; direction: its value triggers the actuators to follow a specific direction; collision: to indicate if a collision is detected; batteryLevel: to indicate the battery level of the robot 7 . The behaviour of a single robot is modelled by: PR ≜ (Rescuer + Explorer )| RandW alk | IsMovinд The robot follows a random walk in exploring the disaster arena. The robot can either become a “rescuer” when he becomes aware of the presence of a victim by locally reading the value of an attribute controlled by its sensors or remain as “explorer” and keep sending queries for information about the victim from nearby robots whose role is either “rescuer ” or “helper ”. The definition of process Rescuer is reported below. Please notice that the actual values of x 1 , x 2 and x 3 are provided by external sensors. Rescuer ≜ ⟨this.victimPerceived = tt⟩()@ff.[this.state := stop, this.vPosition := < x 1 , x 2 >, this.count := x 3 , this.role := rescuer ] (x = “qry” ∧ role = “explorer ”)(x, y). (“ack”, this.vPosition, this.count)@(id = y).0 If sensors recognise the presence of a victim (“victim-Perceived” becomes “tt”), the robot updates its “state” to “stop” (which triggers an actuation signal to halt the actuators and stop movement), computes the position of the victim and the number of robots necessary to rescue the victim and stores them in “vPosition” and “count”, then it changes its role 7 Notice that the values of attributes victimPerceived, vPosition, count, collision, and batteryLevel are provided by sensors while the values of attributes state, target, and direction send actuation signals to the actuators of the robot. Manuscript submitted to ACM Programming the Interactions of Collective Adaptive Systems 35 to “rescuer ” and waits for queries from nearby explorers. Once a message from an explorer is received, the robot sends back the information about the victim to the requesting robot addressing it with its identity “id”. Alternatively, the robot plays the explorer role and continuously sends queries for information about the victim to nearby robots whose role is either “rescuer” or “helper ”. The query message contains a label “qry” to indicate the request type and the identity of the robot “this.id”. When it receives an acknowledgement with victim’s information, the robot changes its role to “helper ” and starts the helping procedure. Notice that if an acknowledgment message is not received, the robot can again behave as rescuer or explorer as described above. Explorer ≜ (“qry”, this.id)@(role = “rescuer ” ∨ role = “helper ”). (((role = “rescuer ” ∨ role = “helper ”) ∧ x = “ack”)(x, vpos, c).[this.role := helper ]Helper + Rescuer + Explorer ) The “Helper ” process is reported below: Helper ≜ ()@ff.[this.vPosition := vpos, this.tarдet := vpos] ( ⟨this.position = this.tarдet⟩set(this.role, rescuer )0 | ⟨c > 1⟩(x = “qry” ∧ role = “explorer ”)(x, y). (“ack”, this.vPosition, c − 1)@(id = y).0 ) The helping robot stores the victim position in the attribute “vPosition” and updates its target to be the victim position to tell the actuators to move to the specified location. While moving towards a victim, the robot is ready to respond to other robots queries, in case more than one robot (c > 1) is needed for the rescuing procedure. Once it reaches the victim (i.e., its position coincides with the victim position), the robot changes its role to “rescuer ” and joins the rescuer-collective. The “RandW alk” process is defined below, it determines the random direction to be followed by the robot. When a collision is detected by a proximity sensor, a new random direction is computed. RandW alk ≜ set(this.direction, 2πrand())⟨this.collision = tt⟩RandW alk Finally, process “IsMovinд” captures the status of the battery level in a robot at any time. Once the battery level drops into a critical level (≤ 20%), the robot changes its status to “stop” which results in halting the actuators and the robot enters the power saving mode. The robot stays in this mode until it is recharged (≥ 90%), then it starts moving again. IsMovinд ≜ ⟨this.state = move ∧ (this.batteryLevel ≤ 20%)⟩ set(this.state, stop)⟨this.batteryLevel ≥ 90%⟩ set(this.state, move)IsMovinд For simplifying the presentation, in this scenario we are not modelling the charging task and assume that this task is accomplished according to some predefined procedure. Manuscript submitted to ACM 36 Y. Abd Alrahman et al. Example A.2 (Interaction fragment). Let us assume that the role of Robot 1 is “rescuer ” and Robot 2 is “explorer ”. Robot 2 can send a query to nearby rescuing or helping robots (i.e., Robot 1 ) by using rule Comp and generate this transition: Robot 2 {id=2,r ol e=“explor er ”}▷(r ol e=“r escuer ”∨r ol e=“helpinд”)(“qr y”, 2) −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−→ Γ2 :I (Explorer ′ | P 3 ) where P3 ≡ RandW alk | IsMovinд On the other hand, Robot 1 can receive this query by using rule Comp and generate this transition: {id=2,r ol e=“explor er ”}▷(r ol e=“r escuer ”∨r ol e=“helpinд”)(“qr y”, 2) Robot 1 −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−→ Γ1′ :I (Rescuer ′ [“qry”/x, 2/y]|P 3 ) where P 3 ≡ RandW alk | IsMovinд Other robots which are not addressed by communication discard the message by applying rule FComp. Now the overall system evolves by applying rule ComR as follows: {id=2,r ol e=“explor er ”}▷(r ol e=“r escuer ”∨r ol e=“helpinд”)(“qr y”, 2) S −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−→ Γ1′ :I (Rescuer ′ [“qry”/x, 2/y]|P3 )∥ Γ2 :I (Explorer ′ | P3 )∥ Γ3 :I P R 3 ∥ . . . ∥ Γn :I P Rn Manuscript submitted to ACM □
6cs.PL
Hard Capacitated Set Cover and Uncapacitated Geometric Set Cover Rahil Sharma Department of Computer Science, The University of Iowa, Iowa City, IA 52242 arXiv:1612.03097v1 [cs.DS] 30 Nov 2016 [email protected] 1 Introduction In the optimization problem, minimum set cover, we are given a set system (X, S), where X is a ground set of n elements and S is a set of subsets of X. Each set S ∈ S has a cost w(S) > 0 associated with it. Let R be a subset of S. We say that R is a set cover of X, if each element in X belongs to at least one set in R. The objective is to find a set cover R that minimize the sum of the cost of all sets in R. The minimum set cover problem is a classic NP-hard problem [10]. In the example below, X = {1, 2, 3, 4, 5, 6} and S = {S1 , S2 , S3 , S4 }, where S1 = {1, 2}, S2 = {2, 3, 4}, S3 = {4, 5, 6}, S4 = {5, 6}. The costs of the four sets are 1, 2, 5, 3 respectively. w(S1) = 1 S1 w(S2) = 2 w(S3) = 5 w(S4) = 3 S4 S2 S3 1 2 3 4 X 5 6 Figure 1: R = {S2 , S4 } is not a set cover of X, since element 1 ∈ X is not contained in any of the sets in R. There are 2 possible set covers for this example, R = {S1 , S2 , S3 } and R = {S1 , S2 , S4 } of cost 8 and 6 respectively. Hence R = {S1 , S2 , S4 } is the minimum set cover here. We are interested in the capacitated version of minimum set cover problem, in which each set S ∈ S has a capacity k(S) associated with it, such that for each set S ∈ S, at most k(S) elements can be contained in S. The capacitated covering problems are of 2 types. First, sets with soft capacities where each set has unbounded number of copies that can be used to cover and the second, sets with hard capacities where each set has a bound on the number of available copies. Formally, in a capacitated set cover problem with hard capacities we are given a ground set of elements X and a collection of its subset S. Each S ∈ S has a positive integral capacity k(S) and a non-negative cost w(S) associated with it. Let R be a set of subsets of S. Let f : X → R be an assignment of elements in X to a set in R such that for any x ∈ X, if (a) f (x) = S then x ∈ S (b) |{x | f (x) = S}| ≤ k(S) for all S ∈ R. We call R a valid set cover if such f exists. Cost of the Psolution R is the sum of the cost of all sets in R. The goal is to find a set cover R of minimum cost i.e. S∈R w(S). The best known result for this problem was given by Wolsey’s algorithm [9]. It gave a set cover of cost O(log n) of the optimal solution. In the first of the two parts of this report, we show the same result using Wolsey’s algorithm, but with a different and simpler analysis given in [5]. We also make a key observation in the analysis given in [5] which allows us to apply the weighted set cover greedy algorithm’s analysis [6] to hard capacitated set cover problem. One of the motivating applications is [4]; i.e. GMID (Glyco-molecule ID) which is a chip-based technology that is used to generate fingerprints which uniquely identify glycomolecules. Each run of the experiment answers the question: For a given building block A, and for each member B in a set S of building blocks, does the solution contain a molecule which contains both building blocks A and B? The size of the set S is restricted, because of the specific technology. Here the information is presented as a graph where the building blocks are its vertices, and an edge exists between two vertices if the question regarding their connectivity is required. The device is able to answer |S| = k questions at once if they share a common vertex. The problem of minimizing the number of GMID experiments needed to cover the required information graph, is precisely a capacitated vertex cover with hard capacities which is a special case of the set cover, with each element belongs to two sets [7]. It is easy to see the generalization of this special case to our problem where the information is provided in a multi-graph. Another interesting application this problem has is in the area of cellular network coverage. We are given n users and a set S = {S1 , S2 , ..., Sm } of m antennas. Each antenna has a capacity k(Si ) and a positive cost of installation and maintenance c(Si ), for all i where, 1 ≤ i ≤ m; associated with it. The capacity determines the upper-bound on the number of users it can serve at a time, no matter how many users it covers. This is a real-life bandwidth issue, that needs to be resolved while setting up the network. The problem here is to find a minimum cost subset of antennas from S, that serves all the n-users, without violating the capacity constraint. Provided that a feasible solution for the problem exists. Here the coverage area of the antenna can be viewed as geometric objects like a disk centered at the antenna or a sector originating from an antenna. This drives our motivation behind exploring geometric set cover problems where the covering objects/sets are geometric bodies. base station (a) (b) Figure 2: (a) Antenna located at the center of the circle, which represents the coverage area (b) A single base station with 3 directional antennas on it and the coverage area resembles a sector In the geometric set cover problem, we are given a ground set X of n points in <2 and a set of objects S whose union contains all the points in X. The objects are geometric bodies like fat triangles, discs, rectangles, etc. The goal is to find the minimum cardinality subset R ⊆ S such that every point in X is contained in at least one object in R. It is important to note that, there is another class of problems called as hitting set problem. In the related hitting set problem; the goal will be to select a minimum cardinality subfamily X 0 ⊆ X, such that every object in S contains at least one point in X 0 . We can reduce the above two problems to the general set cover problem. The geometric set cover problem is reduced to the general set cover problem (see Figure 3(a)), by viewing the points in the plane as elements to be covered and objects as sets to cover them. The hitting set problem is reduced to general set cover problem (see Figure 3(b)), by viewing each point in the plane as a set and each object as an element to be covered. The geometric set cover problem is the dual problem for the geometric hitting set problem. This is an unweighted version of the general set cover problem, where each object in S has no cost/weight associated with it or they have uniform weight. (a) (b) Figure 3: (a) Geometric set cover instance to general set cover (b) Hitting set instance to general set cover Let us define  -net since it is the central theme used for improving bounds on geometric set cover problems. Let X be a set of n points in the plane and S be the set of axis parallel rectangles whose union covers X. For  ∈ (0, 1), the  -net of X is a set Y of points in a plane, such that any rectangle S ∈ S that contains at least |X| points from X, contains a point from Y . One can even think of  -nets as a cover for heavily covered points. The connection between the size of  -nets and size of the hitting set is shown by Bronnimann and Goodrich [3], i.e. if for any point set  -net of size O(1/ h(1/)) is computed in polynomial time, then the corresponding geometric hitting set problem has a polynomial time O(h(OP T )) approximation, where OP T is the size of the optimal cover. Haussler and Welzl [8] showed the existence of such nets of size O(1/ log (1/)) for general geometric objects. Thus using the Bronnimann and Goodrich result, for general geometric objects we can achieve a hitting set of size O(log OP T ) of the optimal solution. In this report, the second problem that we will be discussing is a geometric hitting set problem where, X is a ground set of points in the plane and S is a set of axis parallel rectangles [2]. Here we shall show the existence of  -nets of size O(1/ log log 1/). Then applying Bronnimann and Goodrich result [3] we get the hitting set of size O(log log OP T ) of the optimal solution. This can be extended to axis-parallel boxes as ranges in 3-dimension, leading to the same result as in 2-dimension. In this report we shall just focus on the 2 dimensional result. 2 Hard Capacitated Set Cover Recalling the problem statement; we are given a set system (X, S), where X = {x1 , x2 , ..., xn } is the ground set of n elements and S is the set of subsets of X. Each set S ∈ S has a cost w(S) > 0 and a positive integral capacity k(S) > 0 associated with it. Let R be a subset of S. Let f : X → R be an assignment of elements in X to a set in R such that for any x ∈ X, if (a) f (x) = S then x ∈ S (b) |{x | f (x) = S}| ≤ k(S) for all S ∈ R. We call R a valid set cover if such f exists. Cost of the solution R is the sum of the cost of all sets in R. The goal is to find a set cover R of minimum cost. Give an instance (X, S) of this problem, we first need to check whether there exists a valid set cover. So in this section, firstly we will set up a directed flow network for our instance of hard capacitated set cover problem. Using maximum-flow, we will check in polynomial time, whether there exists a valid set cover for the given problem instance. Secondly, we will describe Wolsey’s algorithm and finally, we will proceed with our analysis to give a set cover of cost O(log n) of the optimal solution. 2.1 Setting up directed flow network Flow networks have played an important role in design of algorithms and in other areas of computer science like network design, computer vision, etc. Many of the covering problems are visualized as flow network problems [4], since there is a rich literature of network flow problems available. In capacitated set cover problem with hard capacities there is a ground set X = {1, .., n} of elements and a collection of its subset S. Each S ∈ S has a capacity k(S) and a non-negative cost w(S) associated with it. Let P be a subset of sets of S. Denote C ⊆ P ×X as a partial cover iff for each (S, e) ∈ C, e ∈ S. We say e ∈ X is covered by S in C if (S, e) ∈ C. Let us give an example, P = {a, b, c}, where a = {1, 3, 4}, b = {2, 5, 6}, c = {3, 8, 9, 5} and X = {1, 2, 4, 8}. If C = {(a, 1), (a, 8), (c, 8)} then it is not a valid partial cover, since (a, 8) ∈ C but 8 ∈ / a. Where as C = {(a, 1), (a, 4), (c, 8)} is a valid partial cover. Assume without loss of generality that each element e ∈ X is covered at most once in C, as we can view covering as assigning element e ∈ X to set (S, e) ∈ C. Partial cover C is feasible if all sets maintain their capacity constraints. Let value of C be the number of elements it covers, denoted by |C|. Let f (P) denote the maximal value of the partial cover C over all the feasible partial covers C. We show that a feasible partial cover C ⊆ P ×X of value f (P), can be computed in polynomial time. Lemma 2.1. Given an instance of hard capacitated set cover problem and a subset P of sets of S, a cover C of value f (P ) can be computed in polynomial time i.e. we can establish in polynomial time, whether P is a valid set cover. Proof. Let us construct a directed network/graph G = (L, R, E) of P and X. Each set Si ∈ P, for all 1 ≤ i ≤ |S|, represents a vertex in L and each element ej ∈ X, for all 1 ≤ j ≤ n represents a vertex in R. There is an edge (Si , ej ) ∈ E of capacity 1 iff ej ∈ Si . Add a source vertex S and an edge (S, Si ) of capacity k(Si ), for all i. Add a target vertex T and an edge (ej , T ) of capacity 1, for all j (see Figure 4). Here an edge (Si , ej ) implies ej ∈ Si . So a flow in the network is a feasible partial cover. Since we are using all the edges between Si and ej , the value of maximum flow is at least f (P). In fact, value of the maximum flow in the network is exactly equal to f (P), since the value of the flow is integral. So P is a feasible solution to the set cover problem iff f (P) = |X|. Since maximum flow value can be computed in polynomial time, so can f (P). This completes our proof. Figure 4: Directed network G = (L, R, E) where; L: Si ∈ P, R: ej ∈ X and E: set of all edges 2.2 Wolsey’s Algorithm and Analysis Let R ⊆ S be a family of sets. The value of f (R) can be computed in polynomial time from Lemma 1. Let fR (S) = f (R ∪{S}) − f (R), i.e. the increase in the number of elements covered when set S is added to subset R. It is important to note that Wolsey’s greedy algorithm is quite similar to the weighted set cover greedy algorithm. In greedy algorithm for weighted uncapacitated set cover (see Algorithm 2), we pick the set Algorithm 1 : Wolsey’s greedy algorithm Require: Feasible capacitated set cover denoted by P Initially, P = φ. while P is not a feasible capacitated set cover do Let S = arg minS: fP (S)>0 (w(S)/fP (S)) Add S to P end while return P in the cover C to be the one that makes most progress i.e. cover the most uncovered elements per unit weight. If X is the set of elements that are not covered yet, we add set Si to the cover C, if it minimizes the quantity wi /(Si ∩ X). In this paper [5], we make a key observation that allows us to use the same analysis as that of the weighted set cover greedy algorithm [6], for hard capacitated set cover. In the Section 2.3 we have showed this alternative analysis. Algorithm 2 : Greedy algorithm for weighted set cover Require: minimum set cover C Initially, let ground set of elements be X = n elements, weight wi associated with each Si ∈ S and cover C = φ; X → Y while Y 6= φ do wi Let Si be the set that minimizes |Si ∩ Y | C = C ∪ {Si } Y = Y \ Si end while return C Let C ⊆ R ×X be a feasible partial cover. For R0 ⊆ R, let fC (R0 ) denote the number of elements covered by sets of R0 in cover C. Lemma 2.2. Let R be a valid set cover for an instance of capacitated set cover problem with hard capacities and R1 R2 be its partition into 2 disjoint subsets. There exists a feasible cover C ⊆ R ×X such that: 1. all elements of X are covered in C. 2. fC (R1 ) = f (R1 ) Proof. For a feasible cover C ⊆ R × X, where each element e ∈ X is covered by some set S ∈ R; let us assume that fC (R1 ) < f (R1 ). Now, consider any feasible partial cover C 0 ⊆ R1 × X satisfying the condition fC 0 (R1 ) = f (R1 ). Since all the elements are not covered by cover C 0 , we shall use a subroutine which will gradually change the cover C by replacing some of its set assignments, with the assignment in C 0 to achieve the desired cover C, while maintaining feasibility. When the subroutine is executed, the Algorithm 3 : Subroutine Require: Cover C such that fC (R1 ) = f (R1 ). while fC (R1 ) < f (R1 ) do There exists at least one set S ∈ R1 that covers more elements in C 0 than in C. If e ∈ X is one of that additional element covered by S in C 0 but by some other set S 0 in C; remove (S 0 , e) and add (S, e) to C. end while return C pair (S, e) is added to C, only if S covers more elements in C 0 than in C, so the capacity constraint is maintained. Hence this procedure is carried out without violating the feasibility of cover C. It is easy to see that, once an assignment is made in the subroutine, it remains there till the subroutine has completed execution. The maximum number of iterations taken by the subroutine before terminating, is bounded above by |C 0 | and after termination we get the desired cover C. 7 8 1 2 5 4 6 3 5 elements assigned to S in C e (S ′, e) ∈ C 7 6 5 1 2 4 8 3 e 6 elements assigned to S in C’ (S, e) ∈ C ′ Figure 5: S covers more elements (e ∈ E) in C 0 than in C; remove assignment (S 0 , e) and add (S, e) to C Analysis of Wolsey’s Greedy Algorithm: Let P = {S1 , S2 , ..., Sm } be the solution returned by the algorithm in the above order. The solution returned by the algorithm in the ith iteration, where 0 ≤ i ≤ m, is Pi = {S1 , S2 , ..., Si }. Now we re-run the algorithm. Initially, P0 = φ i.e. no set is added to the solution by the greedy algorithm. Now we apply Lemma 2 in this iteration, which computes a feasible cover C ⊆ (P0 ∪ OP T ) × X such that each element in X is assigned to exactly one set in OPT. For each set S ∈ OP T , we define a0 (S) as the number of elements covered by S in OP T . In the ith iteration Si is added to the solution by the greedy algorithm i.e. Pi = {S1 , S2 , .., Si }. Now we apply Lemma 2 in this iteration, which computes a feasible cover C ⊆ (Pi ∪OP T )×X. For each S ∈ OP T \Pi , we define ai (S) to be the number of elements assigned to a set S in C where, each set S has capacity of at most the number of elements assigned to that set in C ⊆ (Pi−1 ∪ OP T ) × X i.e. ai−1 (S). For the rest of the analysis the following statement remains constant and we show this inductively: all the elements can be covered by the sets in OP T ∪ Pi , even when the sets S ∈ OP T \ Pi has a capacity constraint, of at most ai (S). Here base case holds for P0 and a0 . Assume that, all the elements can be covered by the sets in OP T ∪ Pi−1 , even when the sets S ∈ OP T \ Pi−1 has a capacity constraint of at most ai−1 (S). Since OP T \ Pi ⊆ OP T \ Pi−1 , it is safe to say that OP T ∪ Pi is a feasible cover, even when the sets S ∈ OP T \ Pi has a capacity constraint of at most ai−1 (S). From Lemma 2, there exists a feasible cover C ⊆ (OP T ∪ Pi ) × X, where fC (Pi ) = f (Pi ) and each S ∈ OP T \ Pi covers at most ai−1 (S) elements. Since a set S covers same or more number of elements in OP T \Pi−1 than in OP T \Pi , so it can cover same or more number of elements in C when S ∈ OP T \ Pi−1 as to when S ∈ OP T \ Pi . Hence ai−1 (S) ≥ ai (S). Charging: Let Si be the set added to the solution by the greedy algorithm in the ith iteration. If the added set Si ∈ OP T , then we don’t charge any set in OP T , since OP T pays for the same as well. If Si ∈ / OP T , let the maximum possible increase in the number of elements that can be covered in C, when Si is added to P after the (i − 1)th iteration be denoted by fPi−1 (Si ) = ni . Summing over all S ∈ OP T \ Pi , the difference between maximum capacity of a set S i.e. ai−1 (S) and the number of elements actually covered by S in C i.e. ai (S), gives the maximum possible increase in C on adding Si i.e. ni . Mathematically; X [ai−1 (S) − ai (S)] = ni (1) S∈OP T \Pi We charge a cost of (w(Si )/ni ) × [ai−1 (S) − ai (S)] to each S ∈ OP T \ Pi . Using equation 1, we can see that in ith iteration the total cost charged to Si ∈ OP T is precisely w(Si ). Bounding the cost charged to each set in OP T : If the set S ∈ OP T is added to the solution P by the greedy algorithm, let (j + 1) be the iteration at which this addition occurs. If the set S ∈ OP T is not included in P, let (j + 1) be the first iteration at which aj (S) = 0. For each of the iterations i < j, the maximum possible increase in the number of elements covered in C at the beginning of the ith iteration is more than the maximum capacity of S i.e. fPi−1 (S) ≥ ai−1 (S), otherwise i would have been the last iteration and not j. Since S ∈ / P, i.e. not selected by the greedy algorithm in this iteration, hence w(Si ) w(S) w(S) ≤ ≤ . Here the first inequality follows from the condition in the greedy algorithm ni fPi−1 (S) ai−1 (S) and the second follows from above. Total cost charged to S is j X i=1 ∀ i, 1 ≤ i ≤ j; add j X ai−1 (S) − ai (S) w(Si ) [ai−1 (S) − ai (S)] ≤ w(S) ni ai−1 (S) (2) i=1 1 1 1 for [ai−1 (S) − ai (S)] times and l ≤ ai−1 (S) implies ≥ ai−1 (S) l ai−1 (S) ai−1 (S) X l=ai (S)+1 1 ≤ ai−1 (S) ai−1 (S) X l=ai (S)+1 1 . l (3) Substituting (3) in (2) we see that, the value charged to S is bounded above by w(S)H(S). Hence, total cost of the solution is [OP T + OP T.ln(maxs |S|)]. Theorem 2.3. There exists a greedy algorithm for set cover problem with hard capacities, that gives a solution of cost O(log n) of that of the optimal solution. 2.3 Alternative Analysis for Wolsey’s Greedy Algorithm In this paper [5], we make a key observation in their analysis of Wolsey’s algorithm for hard capacitated set cover problem, that in each iteration of the algorithm there exist an ordering in which the elements of the ground set X are covered. This observation allows us to apply the same analysis as the weighted set cover greedy algorithm [6] to hard capacitated set cover. The observation is stated in the following lemma. Lemma 2.4. Consider an instance of the set cover problem with hard capacities and let P be a valid set cover and C ⊆ R × X be a feasible cover for this instance. There exists an ordering {x1 , x2 , ..., xn } in which the greedy algorithm covers elements in the ground set X, such that for all i > 0, (a) the union of the sets in Pi covers fC (Pi ) = f (Pi ) elements and (b) they are indexed based on the order they are covered i.e. {x1 , x2 , .., xfPi }. Proof. Let P = {S1 , S2 , ..., Sm } be the solution returned by the algorithm in the above order. The solution returned by the algorithm in the ith iteration, where 0 ≤ i ≤ m, is Pi = {S1 , S2 , ..., Si }. Let C ⊆ P × X be a feasible cover where each element is covered by some set S ∈ P. Without loss of generality assume that no element is covered by more than one set in P. Now we shall prove the lemma using an inductive argument. In the first iteration of the greedy algorithm when the set S1 is added to the solution, denoted by P1 , it covers fC (P1 ) = f (P1 ) elements and they are indexed based on the order they are covered i.e. {x1 , x2 , .., xfP1 }. Assume that in the ith iteration of the greedy algorithm, when the set Si is added to the solution denoted by Pi , it covers fC (Pi ) = f (Pi ) elements and they are indexed based on the order they are , xfP , ..., xfPi }. Now let us prove the induction hypothesis covered i.e. {x1 , x2 , ..., xfPi−1 , xfP +1 +2 (i−1) (i−1) that, in the (i + 1)th iteration of the greedy algorithm, when the set Si+1 is added to the solution, denoted by Pi+1 , it covers fC (Pi+1 ) = f (Pi+1 ) elements and they are indexed based on the order they are covered i.e. {x1 , x2 , .., xfPi , .., xfPi+1 } elements. For proving this, assume that fC (Pi+1 ) < f (Pi+1 ). Let C 0 ⊆ P ×X be a feasible partial cover, such that fC 0 (Pi+1 ) = f (Pi+1 ). Some elements may not be covered by C 0 , since it is a partial cover. While maintaining the feasibility, we will gradually change the cover C using the subroutine given below, until the lemma is satisfied. In the above sub-routine we can see that, for all i > 0, any element that is already covered by assigning it to a set in the ith iteration, remains covered in the (i + 1)th iteration as well. Only its assignment to a particular set may change. The union of the sets in Pi+1 cover at least the elements covered by union of the sets in Pi i.e. f (Pi ) elements. Any element e ∈ X that is covered by the union of the sets in Pi+1 is (a) Algorithm 4 : Subroutine Require: Cover C such that fC (Pi+1 ) = f (Pi+1 ). while fC (Pi+1 ) < f (Pi+1 ) do There exists at least one set S ∈ Pi+1 that covers more elements in C 0 than in C. If e ∈ X is one of that additional element covered by S in C 0 but by some other set S 0 in C; remove (S 0 , e) and add (S, e) to C. If e ∈ X is not assigned to any set in C but assigned to some set S 00 ∈ C 0 ; add (S 00 , e) end while return C either covered in the previous iteration i.e. by union of the sets in Pi , in which case, from the inductive step we can say that, it has already been indexed within {x1 , x2 , .., xfPi } (b) or the element e is newly covered in (i + 1)th iteration and it is indexed based on the order it is covered i.e. {xf(Pi ) +1 , xf(Pi ) +2 , ..., xf(Pi+1 ) }. This completes the inductive argument. Once an assignment is made in the subroutine, it remains there till the subroutine has completed execution. The maximum number of iterations taken by the subroutine before terminating, is bounded above by |C 0 | and after termination we get Pi , for all i > 0 that satisfies the lemma. Alternative Analysis of Wolsey’s Greedy Algorithm: Let every element in X be covered by exactly one set in optimal set cover denoted by OPT. When the greedy algorithm chooses a set Si in the ith iteration, let it charge the price per element for that iteration, to each of the newly covered elements i.e.f (Pi ) − f (Pi−1 ). Total weight of the sets chosen by the algorithm equals the total amount charged. Each element is charged once. Consider a set S 0 ∈ OP T having k < n elements from X, assigned to it in the optimal cover. Let the greedy algorithm cover the elements of S 0 in the order: yk , yk−1 , .., y1 . At the beginning of an iteration in which the algorithm covers element yi of S 0 , at least i − 1 elements of S 0 remains uncovered. If the greedy algorithm chooses the set S 0 to be added to the solution in this iteration, it would pay a cost per element of at most wS 0 /i − 1. Thus in this iteration greedy algorithm pays at most wS 0 /i − 1 per element covered. Hence element yi pays at most wS 0 /i − 1 to be covered. P Now, summing over all the elements in S 0 , the total amount charged to the elements in S 0 is at most ki=1 wS 0 /i − 1 i.e. w(S 0 )Hk−1 . Now we sum over all the sets S 0 ∈ OP T and noting the fact P that every element in X is in some set in OPT, the total amount charged to elements overall is at most S 0 ∈OP T wS0 Hk−1 = Hn .OP T Theorem 2.5. For hard capacitated set cover problem, the Wolsey’s greedy algorithm returns a set cover of cost at most Hn times of that of the optimal set cover. 3 Geometric Set Cover: Axis-Parallel Rectangles In this section, we explore a geometric hitting set problem where, X is a ground set of points in a plane and S is a set of axis-parallel rectangles and the goal is to select a minimum cardinality subfamily X 0 ⊆ X, such that every axis-parallel rectangle in S contains one point from X 0 . We will firstly show the existence of small size  -nets of size O(1/ log log 1/) for axis-parallel rectangles. We shall show this in two sub parts (1) Constructing  -nets (2) Estimating the size of the  -nets. Then we will use the Bronnimann and Goodrich result to show that, if the existence of the above sized net can be shown in polynomial time, then solution of size O(log log OP T ) of the optimal solution, for the corresponding hitting set problem can be computed in polynomial time. We conclude this section by giving the lower bound example and a key observation, that motivated our technique. 3.1 Constructing  -nets Let us start by constructing a balanced binary tree (BBT) T , over set P of n points in the plane. We build the tree based on the x-order of these n points and we terminate the construction when every leaf node of the tree reaches to a size between the range [n/r, n/2r], where r = 2/. By size here we mean the number of points under each leaf node. Since its a BBT, the number of nodes at some level i will be n/2i and due to the termination condition we can say that, the maximum level imax of the tree is n/2r = n/2imax i.e. (1 + log r) levels. n/2 n/4 (1 + log r) levels n/8 n/2i =[n/r, n/2r] Figure 6: Balanced binary tree, decomposing the point set P We randomly select a set R ⊆ P , which will be included in the  -net we construct, such that each point in P that is included in R is selected independently with probability π = s/n, thus E[|R|] = s. Set s = cr log log r. In figure (7a), for each node v, let Pv be the subset of the points in the sub-tree rooted at v. Let lv be the vertical line that divides Pv into two subsets Pv1 and Pv2 , which contains points in the sub-tree rooted at v1 and v2 respectively. Let the two half planes corresponding to Pv1 and Pv2 be denoted as σv1 and σv2 . Let the plane which contains all the points in the sub-tree rooted at the root node v, be denoted as σroot . Our sampling of set R is unbiased, since Pv is set before selecting R. In figure (7b), σv is the right (resp. left) portion of σu bounded by lu on the left hand side (resp. right). Hence we define lu as the left entry side (resp. right entry side) of σv . Let Q be an axis-parallel rectangle that contains at least n points of P . Let u be the highest node in the T such that, the vertical line assigned to it cuts Q into 2 parts. Let Q be one of the 2 parts, which has at least n/2 = n/r points from P . There has to exist one such partition. Let v be the child of u that contains Q ⊂ σv , hence Q is said to be anchored at left entry side lu of σv . For the rest of the section, without loss of generality we will assume that the entry side lu of σv is the left side. lu v v1 Q v2 Q Pv 2 lv σ v1 σ v2 left entry side of σv σroot = σu σu (a) σv (b) Figure 7: (a) lv splits Pv into 2 subsets Pv1 and Pv2 in half plane σv1 and σv2 respectively (b) Half rectangle Q anchored at left entry side lu of strip σv We want to stab all the heavy rectangles i.e. we want to construct a subset from P , that intersects every rectangle Q such that |Q| ≥ n. Since Q ⊂ Q, if any point from our first random sample R ⊆ P is contained in Q we have stabbed Q successfully and we are done. Let us assume that Q does not contain a point from R, and hence we will say Q is R-empty or Rv -empty. We define a set Mv for each node v ∈ T , that contains all the maximal anchored Rv -empty axis-parallel rectangles in σv . We shall then bound the size of Mv . Note that for any v ∈ T , Rv is the set of points from our random subset R that is contained in Mv . lu lu M (a) lu lu lu M M (b) (c) M M (d) (e) Figure 8: (a) Rectangle M ∈ Mv is defined by 3 points from Rv , one point on each of the 3 unanchored sides, Mv also contain degenerate rectangles with some or all of these 3 points missing, (b) and (c) M with 2 points on the two unanchored sides each (its easy to see the missing case similar to case (b)), (d) M with just one point on the unanchored side (either top-most or bottom-most), (e) M with no points from Rv , in this case you just have the entire strip as one maximal Rv -empty rectangle. Lemma 3.1. For each node v ∈ T , the number of rectangles in the set Mv is equal to (2rv + 1), where rv = |Rv |. Proof. We shall cover all of the following, possible cases to show the required bound (see Figure 9). In case (a), when q ∈ Rv lies on the right unanchored side of any rectangle M ∈ Mv then, no other rectangle in Mv can have q on its right unanchored side. Let us argue this by contradiction. Assume that some other rectangle M 0 ∈ Mv also has q on its right unanchored side, this will lead to M 0 ⊂ M , hence it is not a maximal rectangle which contradicts the definition of Mv else, M 0 contains a point that belongs to Rv which contradicts our assumption that Q does not contain any point from R. Hence maximum number of such rectangles is rv . In case (b), the points q1 , q2 ∈ Rv are on the top and bottom unanchored sides of rectangle M , then these points are consecutive in Rv in y-coordinate, if they are not then M will to contain the points which lies between these two points in Rv based on y-order, which is a contradiction. There are rv − 1 such pairs. Finally, we are left with case (c), where there are 2 semi-unbounded rectangles, one bounded from above and one from below by their highest and lowest points respectively. Thus from the above 3 cases we get our required bound of |Mv | = (2rv + 1). It is also easy to see that, the bound holds when rv = 0 where, M is the entire strip and rv = 1 where, we get M as the entire plane and 2 semi-unbounded rectangles. We are left to show that, Q belongs to at least one rectangle in Mv . Since we have assumed that the entry side of σv is the left side, we expand Q by pushing its right unanchored side till it touches a point of Rv or reaches the boundary of σv . Then we extend it vertically in both the directions till it reaches a point in Rv or we let it extend till ±∞. Thus, the rectangle we get after expansion contains Q and also belongs to Mv . This completes the proof. lu lu lu lu q1 M′ M M q q M M q lu q2 (a) (b) M q (c) Figure 9: Contradicting cases for (a) q ∈ Rv lies on the right unanchored side of exactly one M ∈ Mv (b) q1 , q2 ∈ Rv are on the top and bottom unanchored sides of M ∈ Mv , then these points are consecutive in Rv in y-coordinate, and (c) 2 semi-unbounded rectangles M For all nodes v ∈ T , overall number of rectangles M ∈ Mv at a fixed level is O(|R| + r0 ), where r0 is the total number of nodes at a fixed level and over all the levels of T is O(|R|log r + r0 log r) i.e. O(|R|log r + r). For each v ∈ T and each M ∈ Mv , let tM be the weight factor of M and it is defined as s|M ∩ P |/n. The rectangles M with tM < s/r = c log log r i.e. s|M ∩ P |/n < s/r i.e. |M ∩ P | < n/r and these rectangles can be ignored since they have no anchored rectangles Q contained in them. This is because |Q| ≥ n/2 = n/r points of P. We will just consider rectangles with tM ≥ c log log r. Using Haussler and Welzl result [8], for each M ∈ Mv having tM ≥ c log log r, there exists NM ⊆ M ∩ Pv of size k tM log tM , that forms (1/tM ) -net for M ∩ Pv , where k is a constant. We are done with the construction phase of  -nets. So the final  -net is union of set R that we picked in the first level of sampling, with the sets NM , ∀ v ∈ T and ∀ M ∈ Mv with tM ≥ c log log r, in the second level of sampling. P P Lemma 3.2. The constructed net N = R ∪ v∈T M ∈Mv NM is an  -net. Proof. Since our final  -net N contains all the points in R, it is enough for us to show that for any R − empty rectangle Q containing at least n/r points of P , for any M ∈ Mv containing Q; Q ∩ NM 6= φ. |Q ∩ P | c log log r 1 n/r s = ≥ ≥ = |M ∩ P | ntM /s rtM tM tM (4) The first inequality above comes from the definition of weight factor. The above equation says that, rectangle Q contains at least (1/tM ) fraction of points in P contained in M . The result we got from the Haussler and Welzl paper, that NM is (1/tM ) -net of size k tM log tM for M ∩ P , which means if we pick any (1/tM ) points from M ∩ P , it will surely contain a point from set NM and |Q ∩ P | is at least (1/tM ) of |M ∩ P |. Thus it follows that Q ∩ NM 6= φ. This completes the proof. 3.2 Estimating the size of N The expected size of N is E[|R| + k X X v M ∈Mv tM ≥c log log r = cr log log r + k tM log tM ] X X v M ∈Mv tM ≥c log log r (5) tM log tM ] We shall now fix a level i in the tree T for the rest of the analysis. Since T is a balanced binary tree, for each node v at level i, |Pv | = n/2i . Let the union of the collections of all rectangles M ∈ Mv , for all the nodes v at level i be denoted by CT (R). Let CTt (R) ⊆ CT (R) be rectangles with tM ≥ t where, t > 0. Let R0 be another random sample from P , such that each point from P is chosen in R0 independently with probability π 0 = π/t. Let C be a set of those rectangles M , anchored at the entry side of σv for all the nodes at level i and has one point of P on each of its 3 unanchored sides. Note that, all the degenerate rectangles can be handled in analogous manner. For a rectangle M ∈ C, we denote its defining set D(M ) by the 3 points on its unanchored sides and its killing set K(M ) by the points that lie in the interior of M and belong to P . We shall now define an axiom, which trivially holds true by our construction and assumption that, no point of R is contained in Q and thus not contained in Mv . Axiom 3.3. Every rectangle M ∈ C belongs to the set CT (R) iff D(M ) ⊆ R and (K(M ) ∩ R) = φ. We need the following exponential decay lemma [1],[2] for our analysis. Lemma 3.4. E[|CTt (R)|] = O(2−t E[|CT (R0 )|]) Proof. Let Z be a collection of all axis-parallel rectangles anchored at the entry side of σv , at a fixed level i. Each unanchored sides of these rectangles has one point of Pv (degenerate cases can be handled the same way). Let Zt ⊆ Z, contain all the rectangles with tM ≥ t. Since CTt (R) ⊆ CT (R) and since we are summing over all the M ∈ (Zt ⊆ Z) we can write, X E[|CTt (R)|] = P r{M ∈ CT (R)} (6) M ∈Zt E[|CT (R0 )|] = X M ∈Z P r{M ∈ CT (R0 )} ≥ X M ∈Zt P r{M ∈ CT (R0 )} (7) The above inequality comes from the fact that, Zt ⊆ Z. We are done, if we show that for each M ∈ Zt ; P r{M ∈ CT (R)} = O(2−t ) P r{M ∈ CT (R0 )} Let A be the event that, D(M ) ⊆ R and K(M ) ∩ R = φ and A0 be the event that, D(M ) ⊆ R0 and K(M ) ∩ R0 = φ. From axiom 1 and the fact that all the rectangles of M ∈ C, we can say A is the event that M ∈ CT (R) and A0 is the event that M ∈ CT (R0 ). Let us now denote ρ = |D(M )| ≤ 3 and w = |K(M )|. A point from point set P is included in R with probability π and in R0 with probability π 0 . Hence P r{A} = π ρ (1 − π)w and P r{A0 } = π 0ρ (1 − π 0 )w . π = s/n, π 0 = π/t and w ≥ n/r = tn/s. Hence,  w P r{M ∈ CT (R)} P r{A} π ρ (1 − π)w ρ 1−π = O(2−t ) = t = = P r{M ∈ CT (R0 )} P r{A0 } π 0ρ (1 − π 0 )w 1 − π0 This concludes the proof. We shall now apply Lemma 6, by substituting t = c log log r. For all v, the collection of all the maximal Rv0 − empty rectangles anchored on their entry side, in their corresponding strips σv , at a fixed level i, is denoted by CT (R0 ). Applying Lemma 4, on all the nodes of level i we get, X (2rv0 + 1) (8) E[|CT (R0 )|] = v Rv0 R0 rv0 |Rv0 |. where, = ∩ σv and = Since all the nodes at a particular level of a balanced binary tree are disjoint follows, sets Rv0 at level i are also disjoint. So we get, X rv0 = |R0 | (9) v Since we terminate the construction of the balanced binary tree when the size of every leaf node ranges between [n/r, n/2r], we can say that the maximum number of nodes at level imax (imax is the level which has the maximum nodes) is at most n n (10) = =⇒ 2imax = 2r 2imax 2r Substituting equation (9) and (10) in (8) we get X X E[|CT (R0 )|] = (2rv0 + 1) ≤ 2|R0 | + 1 = 2|R0 | + 2r = O(r) (11) Substituting the value of v 0 E[|CT (R )|] v in lemma 4, we get E[|CTt (R)|] = O(2−t E[|CT (R0 )|]) = O(2−c log log r r) = O  r  log c r (12) Making it general for any j ≥ t, we can say E[|CTj (R)|] = O(r/2j ). Now we will calculate the number of nodes from a fixed level i, that contributes to the size of the net N . Let us calculate the second part of equation (5). X X tM log tM ] (13) E[ v at level i M ∈Mv tM ≥t = E[ X X j log j] j≥t M ∈CT (R) tM =j = E[ X j≥t j log j(|CTj (R)| − |CTj+1 (R)|)] = E[(t log t)|CTt (R)| + X (j log j − (j − 1)log(j − 1))|CTj (R)|] j>t  X r r =O (t log t) + logj log c r 2j j>t  rt log t  =O log c r  r log log r log log log r  =O log c r  Since this is just for a fixed level i, so we repeat this analysis for all the (1 + log r) levels, =O  r log log r log log log r  log c−1 r Using the above result in equation (5) we get  r log log r log log log r  E[|N |] = cr log log r + = O(r log log r) log c−1 r (14) 1 1 Theorem 3.5. For axis-parallel rectangles, there exists an  -net ( > 0) of size O( log log ), for any   point set P of n-points in a plane. Now using the result by Bronnimann and Goodrich [3], we come up with the following theorem, Theorem 3.6. For the hitting set problem of axis parallel rectangles, there exists a polynomial time algorithm which achieves a solution of size O(log log OP T ) of the optimal solution. 3.3 Key idea It is important to see that, if we make a bad choice of sample R in the first level of sampling, the maximum number of R − empty rectangles can be θ(s2 ). It can be seen in the quadratic lower bound example in Figure (10a). Here each point of the lower staircase is matched with its corresponding point in upper staircase. Hence we use the tree decomposition technique over the balanced binary tree we constructed, to prune most of those rectangles, such that we are left with O(s log r). In Figure (10b), consider the points to the left of lu , we show that the number of maximal R − empty rectangles anchored at lu is linear in |R ∩ σv |, for all v ∈ T . lu (a) (b) Figure 10: (a) Quadratic lower bound example (b) Decomposition of the point set into canonical subsets 4 Conclusion The first part of this report describes the following result that, logarithmic approximation factor for hard capacitated set cover can be achieved from Wolsey’s work [9], using a simpler and more intuitive analysis. We further show in our work, that O(log n) approximation factor can be achieved for the same problem by applying analysis of general set cover to analyze Wolsey’s algorithm. This work is based on the key observation that we make in Lemma 3. The second part of the report describes the geometric hitting set problem, where X is a ground set of points in a plane and S is a set of axis parallel rectangles. It is shown that -nets of size O(1/ loglog 1/) can be computed in polynomial time. Applying Bronnimann and Goodrich result [3] gives the hitting set of size O(loglog OP T ) for this problem. One open problem is to consider the dual version of the geometric hitting set problem, described in this report. Namely, given a collection S of n axis parallel rectangles and each rectangle in the subset S contains some point in the plane. We want to show the existence of a small size -net i.e S 0 ⊆ S whose union contains all the points contained in n rectangles of S. It is not known whether the same method [2] can also be extended to the dual version. One of the future directions that I am pursuing, is to apply the notion of hard capacities of combinatorial set cover, to the geometric set cover problem. References [1] Pankaj K. Agarwal, Jiří Matoušek, and Otfried Schwarzkopf. Computing Many Faces in Arrangements of Lines and Segments. In Proceedings of the Tenth Annual Symposium on Computational Geometry, SCG ’94, pages 76–84, New York, NY, USA, 1994. ACM. [2] Boris Aronov, Esther Ezra, and Micha Sharir. Small-Size \eps-Nets for Axis-Parallel Rectangles and Boxes. SIAM Journal on Computing, 39(7):3248–3282, 2010. [3] Hervé Brönnimann and Michael T Goodrich. Almost optimal set covers in finite VC-dimension. Discrete & Computational Geometry, 14(1):463–479, 1995. [4] Jessica Chang and Samir Khuller. A Min-Edge Cost Flow Framework for Capacitated Covering Problems. In ALENEX, pages 14–25. SIAM, 2013. [5] Julia Chuzhoy and Joseph Naor. Covering problems with hard capacities. In Foundations of Computer Science, 2002. Proceedings. The 43rd Annual IEEE Symposium on, pages 481–489. IEEE, 2002. [6] Vasek Chvatal. A greedy heuristic for the set-covering problem. Mathematics of operations research, 4(3):233–235, 1979. [7] Sudipto Guha, Refael Hassin, Samir Khuller, and Einat Or. Capacitated vertex covering with applications. In Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms, pages 858–865. Society for Industrial and Applied Mathematics, 2002. [8] David Haussler and Emo Welzl. Epsilon-nets and simplex range queries. Discrete and Computational Geometry, 2:127?151, 1987. [9] Laurence A Wolsey. An analysis of the greedy algorithm for the submodular set covering problem. Combinatorica, 2(4):385–393, 1982. [10] David Zuckerman. NP-complete problems have a version that’s hard to approximate. In Structure in Complexity Theory Conference, 1993., Proceedings of the Eighth Annual, pages 305–312. IEEE, 1993.
8cs.DS
arXiv:1801.04889v1 [math.GR] 15 Jan 2018 On non-amenable embeddable spaces in relation with free products Kévin BOUCHER January 16, 2018 Abstract In this paper we give sufficient conditions for a free product of residually finite groups to admit an embeddable box space. This generalizes the constructions of Arzhantseva, Guentner and Spakula in [2] and gives a new class of non-amenable metric spaces with bounded geometry which coarsely embeds into Hilbert space. 1 Introduction The concept of coarse embedding of a metric space into another was inspired by Gromov’s work [12] in relation with the Novikov conjecture on the homotopy invariance of higher signatures for closed manifolds : Definition 1. Let (X, dX ) and (Y, dY ) be two metric spaces. We say that X coarsely embeds into Y if, there exist a map F : X → Y and two proper functions ρ± : R+ → R+ such that: ρ− (dX (x, y)) ≤ dY (F (x), F (x′ )) ≤ ρ+ (dX (x, x′ )) for all x, x′ ∈ X. This tells us that two points are far from each other in X if and only if they are far in F (X). This geometric notion was related by Yu [21] to the coarse Baum-Connes conjecture and in the case of Cayley graphs of groups to the Novikov conjecture. In that remarkable paper the author introduced a notion of amenability for metric spaces, called property (A), which implies coarse embedding into Hilbert spaces: Definition 2. A discrete metric space (X, d) with bounded geometry has property (A) if and only if for every R > 0 and ε > 0, there exist S > 0 and a function φ : X → ℓ2 (X) with kφ(x)k = 1 for any x ∈ X such that: (1) for any x1 , x2 ∈ X with d(x1 , x2 ) ≤ R, |1 − hφ(x1 ), φ(x2 )i| ≤ ε, and 1 (2) for any x ∈ X, {φ(x) 6= 0} ⊂ BS (x). Note that this definition of property (A) is not the original but an equivalent one for metric spaces with bounded geometry. Definition 2 can be compared to the following notion of amenability for discrete countable groups: Definition 3. A discrete group G with a proper length function ℓ is amenable if and only if for every R > 0 and ε > 0, there exists a function ξ ∈ ℓ2 (G) with kξk = 1 such that for all g ∈ B(e, R), kλ(g)ξ − ξk ≤ ε where λ : G → ℓ2 (G) is the left regular representation. Indeed, for given ε > 0 and R > 0, the map φ(g) = λ(g)ξ verifies the conditions of Definition 2 and so property (A) can be thought as a non-equivariant notion of amenability. Actually property (A) can be characterized by the amenability of a certain groupoı̈d associated to the given metric space, called translation groupoı̈d (cf. [19]). Numbers of coarse properties imply property (A) and make it, in some situations, easier to check than coarse embeddability. For example: any metric space of finite asymptotic dimension [10], as hyperbolic spaces [17], has property (A). In the same way, coarse embeddability of a metric space into a Hilbert space can also be identified to a weaker notion of amenability, called a-T-menability. Indeed, a metric space coarsely embeds into Hilbert space if and only if its translation groupoı̈d is a-T-menable [19]. Let us recall the definition of a-T-menability in the group setting for the sake of simplicity: Definition 4. A discrete countable group G is a-T-menable if it acts properly on a Hilbert space by isometries. In group theory it is well known that the free group of rank 2 is an example of finitely generated non-amenable but a-T-menable group. In the case of metric spaces with bounded geometry, find a metric space without (A) but still embeddable into a Hilbert space was a crucial question answered in [2]. In that paper the authors exhibited a box space (cf. below) associated to the rank 2 free group which embeds and use a girth criterion to justify that it does not have property (A) [20]. Before we introduce box spaces we must talk about coarse disjoint union of metric spaces. Let N be the set of integers that we endow with a far away distance df.a given by the formula df.a(n, m) = |2n − 2m |. The important aspect of df.a is that in the neighborhoods of the infinity the points of N are arbitrarily far away from each other. Indeed df.a (n, m) ≥ 2max(n,m)−1 for all n, m ∈ N with n 6= m and so df.a (n, m) → ∞ when n + m → ∞ with n 6= m. Definition 5. Let ((Xn , dn ))n be a sequence of metric spaces. The coarse disjoint union (⊔n Xn , d) is the unique metric space (X, d) up to coarse equivalence such that: 2 (1) there exist a map p : X → N and a proper function ρ : R+ → R+ such that p−1 (n) is isometric to Xn for all n and df.a (p(x), p(y)) ≤ ρ(d(x, y)) for all x, y ∈ X. (2) For all R > 0, Un,m = {x ∈ Xn | d(x, Xm ) ≤ R} is a bounded set of Xn for all n, m. As it is explained in Section 3 there is a correspondence between sequence of metric spaces with their arrows (cf. Definition 10) and coarse disjoint union (X, d, p, ρ) with classical coarse arrows that commute with the map p. Let G be a discrete residually finite group endowed with a proper length ℓ and N = (Nn )n a sequence of finite index normal subgroups with trivial intersection. Definition 6. The box space of G with respect to N , denoted by N G, is the coarse disjoint union ⊔n G/Nn , where each finite quotient Q/Nn is endowed with the quotient length induced by ℓ (cf. Section 3). Box spaces are defined up to coarse equivalence and by Proposition 4 and Corollary 1 they do not depend on the choice of ℓ. One of the key points in box space theory is that geometric properties on a group box space translate to analytic/harmonic properties on this group: G is amenable ⇐⇒ N G has property A, G is a-T-menable ⇐= N G is coarsely embeddable into a Hilbert space, G has property (T) =⇒ N G is an expander. (1) (2) (3) The Proofs of the first two facts can be found in [16] and the third in [15]. Recall that property (T) is a strong negation of a-T-menability in the following sense: Definition 7. A discret countable group G has property (T) if any isometric action of G on a Hilbert space has a fixed point. Analogously to the relation between property (T) and a-T-menability, the notion of expansion, mentioned in the correspondance (3) and explained in Section 5, is an obstruction to coarse embeddability of a given metric space into Hilbert space (cf. [13] and [15] for more about expansion). Let us mention that in some sense the converse of the correspondence (2) exists. A generalized notion of coarse embedding called fibered coarse embedding was introduced in [7]. Since certain expander sequences can admit such kind of embedding, it appears to be strictly weaker than the original notion of coarse embedding. The strength of this generalization is that it can be associated to any geometric action of a residually finite group on a metric space. Moreover, in the context of Lp spaces, there is an equivalence between the existence of a proper action on a Lp space and existence of a fibered coarse embedding of its box space into it [1]. 3 In this paper we investigate finite quotients of free products. Let’s consider A and B two discrete residually finite groups that we suppose to be finitely generated. Let G = A ⋆ B be their free product (which is residually finite cf. [4]) and ℓ a proper length on G. The main result of this paper is: Theorem 1. If A and B are amenable, then G admits a box space which coarsely embeds into Hilbert space. In other words, as we use this terminology in the rest, G has a faithful sequence of finite quotients which coarsely embeds into Hilbert space (cf. Lemma 2). Definition 8. Let G be a residually finite group. A infinite sequence of (right) quotient (Qn )n of G is called faithful if any element of G acts non-trivially by left translation on all but a finite number of these quotients. Since G is non-amenable when |A|, |B| ≥ 3, Theorem 1 and the box space correspondence (1) described before gives us a new class of non-amenable metric spaces with bounded geometry which coarsely embeds into Hilbert space. Moreover, correspondence (2) combined with our result give another proof with a different flavor of the well known result: Theorem. Let A and B be two discrete countable amenable groups. Then their free product G = A ⋆ B is a-T-menable [8]. We are also interested by what can be done beyond the free product of amenable groups case. Given a free product G = A ⋆ B, a necessary condition for it to admit an embeddable box space is that its factors A and B admit such box spaces (cf Proposition 6). So a natural question is: does the free product of discrete residually finite groups which have an embeddable box space have itself such an embeddable box space? It is not clear if our method can be adapted to treat this situation. As it is explained in the Outline, a part of our approach uses an amenable extension type result adapted to spaces obtained as coarse disjoint union. But even in the context of classical metric spaces we cannot expect, in full generality, that an extension of embeddable spaces to be itself embeddable (cf. [3]). However we have the following partial answer: Let A, B and G as above. We assume that A and B are both finitely generated and we fix a finite generating set S ⊂ G of G. Proposition 1. If A and B have an embeddable box space then G has a faithful sequence of irreducible symmetric representations (σn : G → Sym(Xn ))n such that the coarse disjoint union of Schreier graphs ⊔n SchS (Xn ) coarsely embeds into Hilbert space. As explained in Section 5 such symmetric representations are nothing but quotients induced by non-necessary normal subgroups. 4 Even if sequences of symmetric representations still preserve the direct arrow of correspondence (1) and the implication (3). We have to keep in Definition 6 of a box space the assumption that the sequence of subgroups we consider are normal to preserve some part of the correspondences described before. Indeed the following result, proven in Section 5, shows that considering symmetric representations instead of finite quotients breaks the correspondence (1): Proposition 2. Let F2 be the free group of rank 2. There exists a faithful sequence of symmetric representations (σn : F2 → Sym(Xn ))n of F2 such that the sequence of Schreier graphs ⊔n Sch(Xn ) has property (A). Our investigation on free products was motived by the following observation: Consider a free product G = A ⋆ B. G acts without bounded orbits on a tree (cf. [18] and Section 4) and so does not have property (T) [5]. This finds an analogue at finite scale in box space theory: Proposition 3. Let A, B be two residually finite groups and G = A ⋆ B their free product. Then G has a non-expander box space. In other words, we cannot expect a free product with property (τ ) [13] even if both of its factors has property (T). The proof, given in Section 5, uses only elementary considerations but as far as we know has never been written. We finish this introduction by a question. It deserves to be noted that all known examples of non-amenable embeddable metric spaces come from groups which admit (or contain a large subgroup who does) an action without bounded orbits on a tree. Can we find an example of embeddable non-amenable box space coming from a group with property (FA) [5]? Recall that a group has property (FA) if all of its actions on a tree have a fixed point. 2 Outline Here we explain the idea behind the proof of Theorem 1 and detail the structure of this paper. Let us start with the classic case of discrete metric spaces. We consider the free product of two amenable groups G = A ⋆ B endowed with a proper length function ℓ. The group G can be described as an extension of the direct product A × B by a free subgroup D (cf. Lemma 3): 1→D →G→A×B →1 At first look this exact sequence is only algebraic and apriori does not give any information on the geometry of (G, ℓ). Now if we endow D with the restricted length ℓ|D and A × B with the quotient length ℓ induced by ℓ. Some aspects of the coarse geometry of (G, ℓ) as uniform embeddability can be understood through the geometry 5 of (D, ℓ|D ) and (A × B, ℓ). Indeed, if A, B and so A × B are amenable, they have property (A) as metric groups with respect to any proper length and by a theorem of [9] the coarse embedding of (G, ℓ), can be reduced to the coarse embedding of (D, ℓ|D ). Moreover since proper length functions on a given group are unique up to coarse equivalence. The length function ℓ|D on D can be replaced by any other proper length function. So a trick to prove the uniform embedding of D ≃ F∞ endowed with ℓ|D is to realize it as a subgroup of the rank 2 free group F2 endowed with a word metric on a basis for which it is known that an uniform embedding exists (cf. [6]) and then use the uniqueness up to coarse equivalence of proper lengths on F∞ to conclude. Note that as soon as G is non-trivial and A or B has infinite cardinality, D has infinite rank (cf. Proposition 7) and so the class of proper length on D are not the natural one. In particular ℓ|D cannot be replaced by a word length on a generating of D, since the latter distance is not proper on the infinite rank free group. Our approach, under the assumption that A and B are residually finite, is to do something similar at finite scale. Let A and B be two finite quotients of respectively A and B. We denote G = A ⋆ B the free product of these two groups. Then the following commutative diagram holds: 1 1 // D // D′  1 A×B // A×B   // // G // // 1  G  // 1  1 1 where the free subgroup D ′ has, this time, finite rank (cf. Lemma 3). Our prototype of finite quotients has the form G/H where H E D ′ is a finite index normal subgroup of D ′ . In particular G/H appears as an extension of A × B by a large girth subgroup D ′ /H. This process, which is detailed in Section 4, gives faithful sequence under reasonable assumptions on the choice of the A, B and H. Now, let (Gn )n be a faithful sequence of finite quotients of G built as described before. We endow each Gn with the quotient length induced by ℓ that we denote the same way. Here we assume that Gn is an extension of a direct product An × Bn of finite quotients of A and B by a subgroup of large girth Dn . As in the classic case, our approach is to reduce the coarse geometry of the metric space ⊔n (Gn , ℓ) to the geometry of ⊔n (Dn , ℓ|Dn ) and ⊔n (An × Bn , ℓ). The first step is to reduce the proof of Theorem 1 to the uniform embedding of the sequence ⊔n (Dn , ℓ|Dn ) (cf. Theorem 2) under the assumption that A and B are amenable. This is done in Subsection 4.1 where we develop gluing techniques inspired by [10] for metric spaces obtained as coarse disjoint union. The second step of the proof which concerns the uniform embedding of the space 6 ⊔n (Dn , ℓ|Dn ) is a bit more delicate. Indeed if we refer to the preceding notations, we have to do a suitable choice of the H’s inside of the D ′ ’s to ensure the uniform embedding of ⊔n (Dn , ℓ|Dn ). The difficulty here is that the proper lengths on the Dn ’s do not correspond to the natural class of length we would like to consider on them as soon as G is non-trivial and A or B has infinite cardinality, if we refer to our remark on the classic case. To solve this part we compare the sequence ((Dn , ℓ|Dn ))n to the one obtained by taking of each Dn the quotient length induced by D endowed with a word length on a suitable basis (cf. Proposition 7). We call this new sequence the combinatorial sequence. Note that, this procedure is not free. Indeed, the compression function ρn,− of (Dn , ℓ|Dn ) → (Dn , ℓComb ) (cf. Section 3) can be estimated at every stage n and verifies |An | + |Bn | ≤ ρn,− (1). This inequality tells us, as suspected, that these two sequences of metric spaces are non-equivalent to each other if G is non-trivial and A or B has infinite cardinality. In spite of this, some local comparison is possible and this is enough to conclude. Let us explain it in the classic case: Let F(S) be the free on an infinite countable set S endowed with a proper length ℓ and Fk = F(Sk ) where Sk ⊂ S is a finite subset of S with Sk ⊂ Sk+1 and S = ∪k Sk . Since ℓ is proper, for all R ≥ 0, there exists K0 such that Bℓ (e, R) ⊂ Fk for all k ≥ K0 . Since Fk embeds uniformly a direct limit argument can be applied to prove that F(S) uniformly embeds too (cf. [9]). An investigation of the geometry of D allows us to build a sequence (Xk )k inside of ⊔n Dn which plays a role similar to Fk in the classic case. The fundamental point is that each Xk can be compared, with controlled compression and dilatation function, to its combinatorial version on all fibers of ⊔n Dn except a finite number of them, in other words the two metric structures on Xk match at infinity (cf. Corollary 4). As a consequence it appears that the uniform embedding of ⊔n (Dn , ℓ|Dn ) is implied by the uniform embedding of its combinatorial version. This is explained in Subsection 4.2 where we introduce a direct limit formalism and establish a stability result for coarse disjoint unions of groups (cf. Proposition 11). So to conclude Theorem 1 proof it is enough to treat the combinatorial case. But the uniform embedding problem in this case can be solved by a slight modification of [2] arguments (cf. Proposition 12). This paper is organized as follows: we start with Section 3 where we introduce general results and terminologies that we need in the rest. Section 4 is devoted to the proof of Theorem 1. We finish with Section 5 where we prove the Proposition 1, 2 and 3. 3 Basics In this section we expose generalities on metric groups and spaces. First, let us briefly recall terminologies and constructions about length functions. Here G is a discrete countable group. Definition 9. A length function ℓ : G → R+ on G is a function which satisfies: 7 (1) for any g, h ∈ G, ℓ(g.h) ≤ ℓ(g) + ℓ(h). (2) for any g ∈ G, ℓ(g) = ℓ(g −1 ). (3) ℓ(g) = 0 if and only if g = e. We say that ℓ is proper if for any R > 0, ℓ−1 ([0, R]) ⊂ G is a finite set of G, in other words, each ball of G is finite. Given a length ℓ on G, we associate a left-invariant metric d by the formula d(g, h) = ℓ(g −1h). Moreover, starting with the left-invariant metric d, ℓ(g) = d(g, e) is a length function on G. In the rest we pass to one to the other without distinction. Let H E G be a normal subgroup of G and ℓ a proper length function on G. The quotient length on Q = G/H induced by ℓ is defined by the formula: ℓQ (g) = inf h∈H ℓ(gh) where g ∈ Q is the class of an element g ∈ G. Since H is normal it is routine to prove that conditions (1) and (2) of Definition 9 are verified. Note that there is no natural way to build a distance on a G-homogeneous space in full generality. Since ℓ is proper, for all ε > 0, the set of h ∈ H such that ℓ(gh) ≤ ℓQ (g) + ε is finite. This ensures that we can find h0 such that ℓQ (g) = ℓ(gh0) and so for any g ∈ Q, ℓQ (g) = 0 implies that g ∈ H. Condition (3) is verified. Another consequence is that for any R ≥ 0, π(BG (g, R)) = BQ (g, R) where π is the quotient map. This set equality ensures that ℓQ is proper. Given a symmetric generating set S ⊂ G, the word length on G, ℓ : G → R+ , associated to S is defined by: ℓ(a) = inf{n | a = a1 . . . an , with ai ∈ S} for a 6= 0 and ℓ(e) = 0. It appears that when S is finite, the length ℓ is proper. In the case of free groups we assume this generating set to be a basis [14]. Note that, concerning the coarse geometry of a locally finite metric group the choice of the proper length is not matter as the following proposition shows. Proposition 4. Let G be a discrete countable group. Suppose ℓ1 and ℓ2 are two proper length functions on G. Then (G, ℓ1 ) is coarsely equivalent to (G, ℓ2 ). Proof. Let’s define ρ− (t) = inf {g|ℓ1 (g)≥t} ℓ2 (g) and ρ+ (t) = sup{g|ℓ1 (g)≤t} ℓ2 (g) which are well defined because of the properness assumption on ℓ1 . These two increasing functions are called respectively compression and dilatation. They verify the following inequalities: ρ− (d1 (g, h)) ≤ d2 (g, h) ≤ ρ+ (d1 (g, h)) for any g, h ∈ G. Moreover, they are respectively the largest and smalest control function such that the above inequalities hold. Actually, coarse embeddability of a 8 space into another is equivalent to the existence and properness of ρ± . Using their definitions, in order to verify that ρ− (respectively, ρ+ ) is proper, it is enough to prove that, for all R > 0, there exists R′ > 0 such that ℓ2 (g) ≤ R (respectively, ℓ1 (g) ≤ R) implies ℓ1 (g) ≤ R′ (respectively, ℓ2 (g) ≤ R). But since ℓ2 (respectively, ℓ1 ) is proper and G is discrete, the set {g | ℓ2 (g) ≤ R} (respectively, {g | ℓ1 (g) ≤ R}) is finite and thus any bound of ℓ1 (respectively, ℓ2 ) on this set do the job. Let’s introduce some terminologies and results about sequences of metric spaces. Definition 10. Let X = ((Xn , dXn ))n and Y = ((Yn , dYn ))n be two metric space sequences. We say X coarsely embeds in Y if there exists a sequence of maps F = (Fn : Xn → Yn )n and two proper functions ρ± : R+ → R+ such that ρ− (dXn (x, y)) ≤ dYn (Fn (x), Fn (x′ )) ≤ ρ+ (dXn (x, x′ )) for any n and x, x′ ∈ Xn . If moreover (Fn (Xn ))n is uniform coarsely dense in Y, i.e if there exists R > 0 such that Yn is contain in the R-neighborhood of Fn (Xn ) for any n, we say that F is a coarse equivalence or X and Y are coarsely equivalent. In this paper we consider principally embeddings of sequences of metric spaces into Hilbert space, when there no confusion we just say that the sequence coarsely embeds. Lemma 1. Let Hn be a sequence of Hilbert spaces. The space ⊔n Hn coarsely embeds into Hilbert space. Proof. Let’s denote X = ⊔n Hn the coarse disjoint union of (Hn )n and ρ, p are as in Definition 5. L We consider H = n Hn ⊕ C and define the map F : X → H given by the formula: F (vn , n) = (vn ) ⊕ 2n . We have that:  kvn − v ′ k if n = m ′ (4) kF (vn ) − F (vm )k = p n m m 2 2 ′ 2 |2 − 2 | + kvn k + kvm k otherwise Now, let’s consider ρ− (t) = inf ′ kF (vn ) − F (vm )k sup ′ kF (vn ) − F (vm )k ′ )∈X ×2 |t≤d (v ,v ′ )} {(vn ,vm X n m and ρ+ (t) = ′ )∈X ×2 |d (v ,v ′ )≤t} {(vn ,vm X n m , respectively, the compression and dilatation functions. By considering separately the case n = m and n 6= m, the formula (4) implies that, ′ for all R ≥ 0, there exists R′ ≥ 0 such that kF (vn ) − F (vm )k ≤ R implies that 9 ′ dX (vn , vm ) ≤ R′ . In other words ρ− is proper. ′ ′ ′ In the other hand, since dX (vn , vm ) ≥ ρ(df.a (p(vn ), p(vm ))) for all vn , vm ∈ X, there exists Nt such that dX (Hn , Hm ) ≥ t + 1 for all n, m ≥ Nt with m = 6 n. It follows that: ′ )k ρ+ (t) = sup kF (vn ) − F (vm At ∪Bt ′ ′ ) ≤ t} and Bt = {(vn , vn′ ) ∈ with At = {(vn , vm ) ∈ (∪n≤Nt Hn )×2 | dX (vn , vm (∪n Hn )×2 | dX (vn , vn′ ) ≤ t}. Using part (2) of the Definition 5, there exists Rt ≥ 0 ′ such that dX (vn , vm ) ≤ t implies that vn ∈ Bn (0, Rt ) ⊂ Hn and vm ∈ Bm (0, Rt ) ⊂ Hm for all n 6= m with n, m ≤ Nt . p As a consequence ρ+ (t) ≤ max (t, 22Nt +2 + 2Rt2 ), in particular ρ+ is well defined. The following inequalities imply the properness of ρ+ : sup kF (vn ) − F (vn′ )k = sup kvn − vn′ k Bt Bt = t ≤ ρ+ (t). The following lemma allows us to pass to a language to another concerning embeddings of sequences of metric spaces. Lemma 2. Let X = (Xn )n be a sequence of metric spaces. The following are equivalent: (1) ⊔n Xn coarsely embeds into Hilbert space. (2) There exist a sequence of maps F = (Fn : Xn → Hn )n where Hn denote a Hilbert space and two proper functions ρ± : R+ → R+ , such that: ρ− (dXn (x, y)) ≤ kFn (x) − Fn (x′ )k ≤ ρ+ (dXn (x, x′ )) for all n and x, x′ ∈ Xn . In other words, X coarsely embeds into Hilbert spaces. (3) For all R > 0 and ε > 0, there exists a sequence (ϕn )n of maps ϕn : Xn → Hn with Hn a Hilbert space, such that kϕn (x)k = 1 and: (i) for all n ≥ 1 and x, y ∈ Xn with dXn (x, y) ≤ R, kϕn (x) − ϕn (y)k ≤ ε. (ii) for all ε′ > 0, there exists M > 0, |hϕn (x)|ϕn (y)i| ≤ ε′ whenever dXn (x, y) ≥ M. Proof. (1) implies (2): This is because Xn embeds isometrically into ⊔n Xn . (2) implies (1): Let F , ρ± be as in (2) and dX the metric on X = ⊔n Xn . Let F : (X, dX , ρX , pX ) → (H = ⊔n Hn , dH , ρH , pH ) be the map induced by F given by the formula F (xn ) = Fn (xn ). Let’s fix x0,n ∈ Xn for all n. We may assume that ρX = ρH = ρ (otherwise we take 10 the infimum). We have the following inequalities hold: ρ(df.a (pX (xn ), pX (xm ))) = ρ(df.a (pH ◦ Fn (xn ), pH ◦ Fm (xm ))) ≤ dH (Fn (xn ), Fm (xm )) (5) ρ− (dX (xn , x′n )) ≤ dH (Fn (xn ), Fn (x′n )) ≤ ρ+ (dX (xn , x′n )) (6) and for all xn , x′n ∈ Hn and xm ∈ Hm . Let’s prove the properness of the dilatation function (the proof for the compression follows the same scheme). If dX (xn , xm ) ≤ R, in the case n = m by inequalities (6) we have dH (Fn (xn ), Fm (xm )) ≤ R′ = ρ(R). Otherwise n 6= m so by inequalities (5) n, m ≤ N where N depends on R and the part (2) of Definition 5 ensures that d(x0,n , xn ), d(x0,m , xm ) ≤ M. Using inequalities (6) once again we have d(Fn (x0,n ), Fn (xn )), d(Fm (x0,m ), Fm (xm )) ≤ M ′ . In other words the dilatation function is proper. We use the Lemma 1 to conclude. P ⊗k (2) implies (3): Take a vector ξ in a Hilbert space H, then exp(ξ) = k≥0 ξn! ∈ L ′ ⊗k has a sense and hexp(ξ)| exp(ξ ′ )i = ehξ|ξ i for any ξ, ξ ′ ∈ H. k≥0 H √ 2 Now let’s consider F and ρ± as in (2) and define ϕtn (x) = e−tkFn (x)k exp( 2t.Fn (x)) 2 with t > 0 which verifies: hϕtn (x)|ϕtn (y)i = e−tkFn (x)−Fn (y)k . This relation implies, for any t > 0, kϕtn (x)k = 1 and : e−tρ+ (dXn (x,y)) ≤ |hϕtn (x)|ϕtn (y)i| ≤ e−tρ− (dXn (x,y)) for any x, y ∈ Xn . Since ρ+ is proper, given ε > 0 we can find t0 > 0 such that e−t0 ρ+ (r) ≥ 1 − 2ε , for any r ≤ R. For such choice of parameter t, part (i) of (3) holds with ϕtn0 . Furthermore because of the properness of ρ− , condition (ii) of (3) is verified for any parameter t fixed. So the implication is proven. √ (3) implies (2): Let’s take εl = 1/l and Rl = l. Let (ϕln )n with ϕln : Xn → Hnl as in (3) for the constants εl and Rl . Let (Ml )l such that kϕln (x) − ϕln (x′ )k ≥ 1 whenever dXn (x, x′ ) ≥ Ml that we can assume to be an increasing sequence L which goes to infinity. We fix a point x0n ∈ Xn for any n and define Fn : Xn → l Hnl by Fn (xn ) = 21 ((ϕ1n (xn ) − ϕ1n (x0n )) ⊕ (ϕ2n (xn ) − ϕ2n (x0n )) ⊕ . . . ), then: ρ− (dXn (x, x′ )) ≤ kFn (x) − Fn (x′ )k ≤ dXn (x, x′ ) + 1 √ P for any n and x, x′ ∈ Xn with ρ− = 21 k≥1 k − 1χ[Mk−1 ,Mk ) where χ[Mk−1 ,Mk ) is the characteristic function of the interval √ [Mk−1 , Mk ). √ Indeed let x, x′ ∈ Xn and l such that l − 1 ≤ dXn (x, x′ ) ≤ l. We have: 1X k 1 X kϕkn (x) − ϕkn (x′ )k2 + kϕ (x) − ϕkn (x′ )k2 4 k≤l−1 4 k≥l n 1X 1 ≤ (l − 1) + ≤ d(x, x′ )2 + 1 2 4 k≥l k kFn (x) − Fn (x′ )k2 = 11 Similarly if we take l such that Ml−1 ≤ d(x, x′ ) ≤ Ml , then kFn (x) − Fn (x′ )k2 ≥ 1 X l−1 kϕkn (x) − ϕkn (x′ )k2 ≥ = ρ− (dXn (x, x′ ))2 . 4 k≤l−1 4 The next proposition can be view as coarse analogue of the fundamental theorem of geometric group theory [11] for box spaces. It finds, in others, applications in the proof of Theorem 3 (cf Section 5) which is the cornerstone of Proposition 1 and 2 but also in Corollary 5 which is an important part of Theorem 1 proof. Proposition 5. Let G be a discrete countable group with a proper left-invariant distance d. Let X be a proper metric on which G acts freely and geometrically (i.e. properly discontinuously by isometries) and f : G → X a G-equivariant coarse embedding. If N = (Nn )n is a sequence of normal subgroups of G with trivial intersection, then the sequence of metric groups (G/Nn )n coarsely embeds into the sequence X = (X/Nn )n . If moreover f is a coarse equivalence, then (G/Nn )n and X are coarsely equivalent. Proof. Let G, X, d, f and N be as in the statement. Let ρ± be the two proper functions, that we may assume increasing, such that: ρ− (d(g, h)) ≤ dX (f (g), f (h)) ≤ ρ+ (d(g, h)) for any g, h ∈ G. Since f is G-equivariant, for any g ∈ G, f (g) = g.x0 with x0 = f (e). Moreover f induces a sequence of maps fn : G/Nn → Xn (since Nn E G is normal, gNn = Nn g for any g ∈ Nn ) which is nothing but the well defined map fn (x) = f (x). The distance dX,n on X/Nn is given by the formula dX,n (x, y) = inf h,h′∈Nn dX (h.x, h′ .y). Let’s define ℓx0 ,n : G/Nn → R+ by the formula ℓx0 ,n (g) = inf h∈Nn dX (gh.x0 , x0 ) = dX,n (g.x0 , x0 ) and denote ℓn the quotient length induced by d on G/Nn . Since G acts isometrically it is enough for our purpose to prove the existence of two proper functions ρ′± such that: ρ′− (ℓn (g)) ≤ ℓx0 ,n (g) ≤ ρ′+ (ℓn (g)). (7) for any n and g ∈ G/Nn . Let’s prove the left side of the inequality (7). Because ρ− is proper and does not depend on n, for any R > 0, g ∈ G with ℓx0 ,n (g) ≤ R and ε > 0, there exists R′ independent of n such that: any h ∈ Nn with ρ− (ℓ(gh)) ≤ dX (gh.x0 , x0 ) ≤ ℓx0 ,n (g) + ε ≤ R + ε is contained in a ball with center g −1 and radius R′ which is a finite set since ℓ is proper. In particular for such h ∈ Nn , ℓn (g) ≤ ℓ(gh) ≤ R′ . In other words, for any R > 0, there exists R′ > 0 such that for any n, ℓx0 ,n (g) ≤ R implies ℓn (g) ≤ R′ . 12 For the right side of inequality (7) we do something similar. Since ℓ is proper, there exists h0 ∈ Nn such that, ℓn (g) = ℓ(gh0) and so ℓx0 ,n (g) ≤ dX (gh0 .x0 , x0 ) ≤ ρ+ (ℓ(gh0)) = ρ+ (ℓn (g)) The second part of the proposition is because the R-density of f (G) ⊂ X is preserved by taking quotient. Here are some consequences of Proposition 5. Corollary 1. Let G be a discrete residually finite group and ℓi , i = 1, 2, be two proper lengths on G. Let N = (Nn )n be a sequence of finite index normal subgroups of G with trivial intersection, then N ,1 G and N ,2 G are coarsely equivalent with dilation and compression functions which depend only on ℓ1 and ℓ2 . By N ,i G we mean the box space obtained by taking the quotient metric associated to ℓi , i = 1, 2, on each G/Nn . Proof. We apply proposition 5 to the identity map Id : (G, ℓ1 ) → (G, ℓ2 ) which is a G-equivariant coarse equivalence by Proposition 4. Corollary 2. Let G be a discrete residually finite group and H ≤ G a finite index subgroup of G. Suppose there exists N ′ = (Nn′ )n a sequence of finite index normal subgroups of H with trivial intersection such that N ′ H embeds into a Hilbert space (or any other metric space). Then G also admits such a sequence. Proof. Let’s fix a proper length ℓ on G. The inclusion map Id|H : (H, ℓ|H ) → (G, ℓ) is a H-equivariant isometry so Proposition 5 can apply (remember that, ℓ|H is equivalent to any other proper length on H by Proposition 4). As in the classical case, we have heredity on the uniform embedding of box spaces. Proposition 6. Let G be a discrete residually finite group and H ≤ G a subgroup of G. Suppose there exists N = (Nn )n a sequence of finite index normal subgroups of G with trivial intersection such that N G embeds into a Hilbert space (or any other metric space), then H also admits such a sequence. Proof. N ∩ H = (H ∩ Nn )n defines a sequence of finite index normal subgroups of H with trivial intersection. If we endow H with the restriction of a given proper length ℓ on G then N ∩H H embeds isometrically into N G. 4 Finite quotients of a free product This section, devoted to the proof of Theorem 1, is organized as follows: We start by a succinct introduction to Bass-Serre theory [18] that we need in the rest and which allows us to formulate and prove the Proposition 7. After that we present a process to obtain faithful sequences of finite quotients of a given free product of residually finite groups with an interesting decomposition 13 property. As mentioned in the outline, this construction and the sequences that it produces are in the heart of the proof of Theorem 1. In Subsection 4.1 we introduce gluing techniques and give a reduction of Theorem 1 to the uniform embedding of a certain sequence of large girth subgroups endowed with particular metrics. This is Theorem 2. We finish Theorem 1 proof in Subsection 4.2 which is dedicated to the study of this large girth sequence. In this subsection we introduce direct limit formalism for sequence of groups and approximate our sequence (cf. Proposition 11) with another natural metric structure on which we have a better grasp. Let A, B be two discrete countable groups and G = A ⋆ B their free product. We can associate to G a tree, called Bass-Serre tree [18], T given by: V (T ) = G/A ∪ G/B E(T ) = G with the endpoint maps, the projections G → G/A and G → G/B. The action of G on its cosets is combinatorial with respect to T (i.e it respects the adjacency) and defines an isometric action on T which has two orbits and stabilizers equal to a conjugate of A or B depending on the family of cosets we consider. We can deduce from this a simple criterion to characterize normal subgroups of G which act freely on the Bass-Serre tree T : a normal subgroup H E G acts freely on T if and only if H has trivial intersection with A and B. The following lemma is a normal form type result on quotients of a free product: Lemma 3. Let A and B be two discrete countable groups and G = A ⋆ B their free product. Given a quotient Q of G, A (respectively, B) factorizes through a quotient, denoted A (respectively, B), such that A and B are subgroups of Q and : Q ≃ A ⋆ B/F where F E A ⋆ B is a free normal subgroup. Furthermore if Q is finite then A, B and rk(F ) are finite. Proof. Let π : G → Q be the canonical projection. If we choose A = A/ker(π|B ) and B = B/ker(π|B ), π factor through the following diagram: G  π // Q ②<< ② π ②②② ② ② ② A⋆B Moreover, since π|A (respectively, π|B ) has trivial kernel by construction, A and B are subgroups of Q. In particular, if Q is finite then A and B are finite. The normal subgroup F = ker(π) of G = A ⋆ B does not intersect A and B. So F 14 acts freely on the Bass-Serre tree T of G and this implies that F is a free group [18]. Moreover if Q is finite the action of F on T is cocompact. Since T has bounded geometry (the geometry of T is controlled by the cardinality of A and B which are finite), these two facts imply that F has finite rank [18]. Let Y be a graph. It is well known that any maximal tree subgraph of Y contains every vertices of Y . Given a group G which acts simplicialy on X, a tree representation of X/G is a connected subgraph X ∗ of X which is mapped isomorphically by the projection to a maximal tree subgraph of X/G. Note that such a representation always exists. Proposition 7. Let A and B be two discrete countable groups and G = A ⋆ B their free product. Let D be the kernel of the morphism π : G → A × B. Then D has basis B = {[a, b] | a ∈ A, b ∈ B; a, b 6= 1} and there exist constants C, λ > 0 independent of A and B such that (D, B) is (C, λ)-quasi-isometric to the Bass-Serre tree associated to G. Proof. An orientation on the Bass-Serre tree T of G which is preserved by the action corresponds to a choice of an orientation of the quotient G\T . In our case there is only two choices and we assume here that oriented edges on T goes from B-cosets to A-cosets. The subgroup D is normal and does not intersect A and B, it follows that D acts freely on the tree T and so is a free group [18]. Let T ′ = D\T be the quotient T by the action of D, then T ′ is a complete bipartite graph given by: V (T ′ ) = (A × B)/A ⊔ (A × B)/B E(T ′ ) = A × B with endpoint maps given by the quotient maps on, respectively, A and B. In particular a tree representation of T ′ is given by the subtree Tr of T with: V (Tr ) = {aB; a ∈ A} ⊔ {bA; b ∈ B} ⊂ V (T ) E(Tr ) = A ∪ B ⊂ G = E(T ) Let ∂V Tr+ be the set of vertices of T \ Tr which are target of a edge with source a vertices of Tr . Then the set B = {g ′ 6= 1 | g ′ ∈ D, g ′.Tr ∩ ∂V Tr+ 6= ∅} which is, by direct computation, equal to {[a, b]; a ∈ A, b ∈ B} forms a basis of the free group D (this geometric criterion can be found Section 3 [18]). It appears that the rank of D is finite when A and B are finite. Since G acts isometrically, to prove the last part of the proposition it is enough to prove the following inequalities: 1 .dT (g.A, A) ≤ ℓ(g) ≤ dT (g.A, A) + 1 4 15 (8) with g ∈ D. These will imply that f : D → T with f (g) = g.A is a (4, 1)-quasiembedding but T ′ has diameter equal to 2, in other words, f (G) is 2-dense and by consequence defines a (4, 1)-quasi-isometry. Since dT (s.A, A) = 4 for any s ∈ S = B ∪ B−1 , given g = s0 . . . sn ∈ D a reduced word with si ∈ S and n ≥ 1, we have : d(g.A, A) ≤ n−1 X d(s0 . . . si .A, s0 . . . si+1 .A) = i=0 n−1 X d(A, si+1 .A) = 4.ℓ(g) i=0 This prove the left side of the inequalities (8). For the right side, let g ∈ D and x0 = A, . . . , xn = g.A a sequence of vertices which describes the geodesic path in T between A and gA. Since D.Tr = T , we can find g0 = e, g1 , . . . , gn = g such that xi ∈ gi .Tr for any i = 0, . . . , n. If we denote s0 = g1 and si = gi−1 gi+1 for 1 ≤ i ≤ n − 1, then g = s0 . . . . .sn−1 and: dT (si Tr , Tr ) = dT (gi+1 .Tr , gi .Tr ) ≤ d(xi+1 , xi ) = 1 so si ∈ S for any i. Indeed, if we denote ∂V Tr− the analogue of ∂V Tr+ for the opposite orientation on T . An element g ′ ∈ D belongs to S if and only if g ′.Tr ∩∂V Tr+ 6= ∅ or g ′ .Tr ∩∂V Tr− 6= ∅. A consequence is that d(g ′Tr , Tr ) ≥ 2 whenever g ′ ∈ D \ S. It follows that ℓ(g) ≤ n. Let us consider A, B two discrete countable groups as above and A, B two quotients of respectively A and B. Let G = A ⋆ B (respectively, G = A ⋆ B) their free product. We have the following commutative diagram: 1 1 // D  // D  1 ′ // A×B G //  // // 1  G  // A×B // 1  1 1 Note that, the basis B of D described in Proposition 7 is sent to the basis B′ of D ′ defined analogously by the quotient map. In the rest of the text we will talk about commutator subgroups to designate kernel’s of type D (·) . Let Γ be a residually finite group. Recall that a sequence of finite quotients of Γ is called faithful if any non-trivial element g ∈ Γ acts non-trivially by left translation on all but a finite number of these quotients. Now, if we assume A and B residually finite, it is well know that their free product G = A ⋆ B is residually finite [4] (the construction described in that paper is recall and used in the next section). Here we propose another construction. Let (An )n and (B n )n be two faithful sequence of finite quotients of respectively A and B. We denote Gn = An ⋆ B n and Dn the 16 commutator subgroup of Gn which has finite rank since An and B n are finite as explained above. Let (M(n,k) )k be a sequence of finite index characteristic subgroups of Dn , i.e M(n,k) is normalized by each automorphism of Dn . Moreover we assume that the subgroups (M(n,k) )k have trivial intersection and that M(n,k+1) is a proper characteristic subgroup of M(n,k) . For example we can take M(n,k+1) = h{w s | w ∈ M(n,k) } ∪ {[w, w ′] | w, w ′ ∈ M(n,k) }i with s ≥ 2 fixed integer. Since Dn has finite rank it is not hard to see that M(n,k) has finite index in Dn and Proposition 3.3 of [14] ensures that the intersection is trivial. Proposition 8. The sequence of finite quotients (Gn /M(n,k) )n,k≥n of G is faithful. Proof. Let E be a finite symmetric set of G with e ∈ E. Let E ′ = E (2) = {x.y | x, y ∈ E} ⊂ G and EA ⊂ A (respectively, EB ⊂ B) be the set of letters in A (respectively, B) which appears in the normal form of the elements of E ′ . Since E is supposed to be finite, E ′ , EA and EB are finite. In the other hand A and B are supposed to be residually finite so there exists N0 such that EA (respectively, EB ) is sent bijectively into An (respectively, B n ) for any n ≥ N0 , in particular E ′ is sent bijectively into Gn for n ≥ N0 . If we denote D the commutator subgroup of G then D ∩ E ′ 6= 1 implies Dn ∩ E ′ 6= 1 (where E ′ = πn (E) and πn : G → Gn is the quotient map) for any n ≥ N0 . Moreover, dB (e, D ∩ E ′ ) ≥ dBn (e, Dn ∩ E ′ ) where B (respectively, Bn ) denote the basis of Proposition 7 and d(∗) the word distance associated. Since the sequence (M(n,k) )k is such that M(n,k+1) is proper and characteristic inside of M(n,k) Proposition 3.2 of [14] ensures that dBn (M(n,k) , e) ≥ k in Dn . So we have that for any k ≥ n ≥ max{N0 , dB (e, D ∩ E ′ ) + 1} each elements of E ′ are sent non-trivially into the finite quotients Gn /M(n,k) . Assume there exist x, y ∈ E, x 6= y with same image into Gn /M(n,k) , then x.y −1 ∈ E ′ with x.y −1 6= e is sent trivially into Gn /M(n,k) which is a contradiction. So E is sent bijectively into Gn /M(n,k) for any k ≥ n ≥ max{N0 , dB (e, D ∩ E ′ ) + 1}. In order to prove Theorem 1 with a sequence of the above type it seems that we must find suitable (An )n , (B n )n and (M(n,k) )k ’s. As it is explained in the next subsection, if we assume A and B amenable the choice of (An )n and (B n )n is not matter. 4.1 Geometry of metric spaces and gluing techniques In this subsection we develop gluing techniques that allow us, under the assumption that A and B are amenable, to reduce the uniform embedding of the sequence (Gn /M(n,k) )n,k≥n introduced above to that of the large girth sequence of subgroups (Dn /M(n,k) )n,k≥n endowed with the restricted metric structure. Let us first introduce a variant of property (A) that fits better with our purpose: Definition 11. A sequence X = (Xn )n of metric spaces is equi-exact or uniformly exact if for any R > 0, ε > 0 and n ≥ 0, there exists a partition of unity (ϕ(n,i) )i∈In of Xn subordinated to a cover Un = (U(n,i) )i∈In , i.e. {ϕ(n,i) 6= 0} ⊂ U(n,i) , such that: 17 (1) for any n ≥ 1 and x, y ∈ Xn , dXn (x, y) ≤ R implies ε. P i∈In |ϕ(n,i) (x) −ϕ(n,i) (y)| ≤ (2) the cover U = {Un }n of X is uniformly bounded, i.e there exists C > 0 such that diam(U(n,i) ) ≤ C for any n ≥ 0 and i ∈ In . Lemma 4. Let G be a discrete residually finite group, ℓ a proper length on G and N = (Nn )n a sequence of finite index normal subgroups with trivial intersection. If G is amenable, then the sequence of metric spaces X = (Xn )n , where Xn = G/Nn is endowed with the quotient metric induced by ℓ, forms a equi-exact sequence. Proof. Since G is amenable by proposition 11.39 [16] N G has property (A). Let R > 0, ε > 0 be given. Let ξ = (ξi )i∈I : N G → ℓ2 (I) with M > 0 as in Definition 2. Define ϕ(n,i) : Xn → R+ by ϕ(n,i) = (ξi |Xn )2 and U(n,i) = {ϕ(n,i) 6= 0}. Since supp(ξ(x)) ⊂ B(x, M), U(n,i) ⊂ B(x, P M) and then {{U(n,i) }i∈In }n forms an uniformly bounded cover of X . Moreover i∈In ϕ(n,i) (x) = kξ(x)k2 = 1 and for any x, y ∈ Xn such that dXn (x, y) = dN G (x, y) ≤ R: X |ϕ(n,i) (x) − ϕ(n,i) (y)| ≤ kξ(x) − ξ(y)k ≤ ε. i∈In Proposition 9. Let X = (Xn )n be a sequence of metric spaces. Assume that for any R > 0, ε > 0 and n ≥ 1, there exists a partition of unity (ϕ(n,i) )i∈In of Xn such that: P (1) for any x, y ∈ Xn , dXn (x, y) ≤ R implies i∈In |ϕ(n,i) (x) − ϕ(n,i) (y)| ≤ ε. (2) the cover U = {U(n,i) }n,i∈In with U(n,i) = {ϕ(n,i) 6= 0} of X is uniformly embeddable into a Hilbert space. Then X is uniformly embeddable. Proof. We prove that X verifies the criterion (3) of Lemma 2. Let’s fix R > 0, ε > 0 and consider (ϕ(n,i) )i∈In as above. Since U is uniformly embeddable, U(R) = {U(n,i) (R)}n,i∈In is also embeddable (these two families are uniformly quasi-isometric). So we can find ξ(n,i) : U(n,i) (R) → H(n,i) as in Lemma 2 characterization (3) for L the constants R > 0 and ε > 0. Let’s define ϕn : Xn → i∈In H(n,i) by the formula ϕn (x) = (ϕ(n,i) (x)1/2 ξ(n,i) (x))i∈In . It is immediate from the construction that kϕn (x)k = 1 for any x ∈ Xn . Let x, y ∈ Xn with dXn (x, y) ≤ R, there exists i ∈ In such that x ∈ Uin and so x, y ∈ U(n,i) (R). In particular kξin (x) − ξin (y)k ≤ ε. It follows: X kϕ(n,i) (x)1/2 (ξ(n,i) (x) − ξ(n,i) (y))+ kϕn (x) − ϕn (y)k = [ i∈In − ϕ(n,i) (y)1/2 )ξ(n,i) (y)k2]1/2 ≤ X X |ϕ(n,i) (x)1/2 − ϕ(n,i) (y)1/2 |2 kξ(n,i) (y)k2]1/2 ≤ ϕ(n,i) (x).kξ(n,i) (x) − ξ(n,i) (y)k2]1/2 + [ [ (ϕ(n,i) (x) 1/2 i∈In i∈In X X |ϕ(n,i) (x) − ϕ(n,i) (y)|]1/2 ≤ ε + ε1/2 . |ϕ(n,i) (x)1/2 − ϕ(n,i) (y)1/2 |2 ]1/2 ≤ ε + [ ε+[ i∈In i∈In 18 In other words, for any x, y ∈ Xn , dXn (x, y) ≤ R implies kϕn (x) − ϕn (y)k ≤ ε′ = ε+ε1/2 . The second part to verify is a simple consequence of the following inequalities: X ϕni (x)1/2 ϕni (y)1/2 |hξin (x)|ξin (y)i| ≤ |hϕn (x)|ϕn (y)i| ≤ sup n,i∈In i∈In n sup{|hξi (x)|ξin (y)i|} | d(x, y) ≥ M, x, y ∈ Xn } Proposition 10. Let X = (Xn )n be a sequence of metric spaces. Suppose for any R > 0, ε > 0 and n ∈ N, there exists a partition of the unity (ϕ(n,i) )i∈In of Xn such that: P (1) for any x, y ∈ Xn , dXn (x, y) ≤ R implies i∈In |ϕ(n,i) (x) − ϕ(n,i) (y)| ≤ ε. (2) the family U = {U(n,i) }n,i∈In with U(n,i) = {ϕ(n,i) 6= 0} is equi-exact. Then X is equi-exact. Proof. Let R > 0, ε > 0 be given. Let (ϕ(n,i) )n,i∈In be the maps subordinated to U = {U(n,i) }n,i∈In as in the statement. Since U is equi-exact so is U(R) = {U(n,i) (R)}n,i∈In . In particular we can find ψ(n,i,j) : Xn → R+ subordinated to V(n,i,j) ⊂PU(n,i) (R) with j ∈ J(n,i) such that for any x, y ∈ U(n,i) (R) with dXn (x, y) ≤ R, j∈J(n,i) |ψ(n,i,j)(x) − ψ(n,i,j) (y)| ≤ ε and V = {V(n,i,j) }n,i∈In,j∈J(n,i) is uniformly bounded. Let’s define the partition of the unity of Xn , η(n,i,j) = ϕ(n,i) ψ(n,i,j) subordinated to V. Moreover, X X X |ψ(n,i,j)(x) − ψ(n,i,j) (y)| ϕ(n,i) (x) |η(n,i,j)(x) − η(n,i,j) (y)| ≤ i∈In ,j∈J(n,i) + ≤ X i∈In X i∈In ϕ(n,i) (x) X i∈In |ϕ(n,i) (x) − ϕ(n,i) (y)| j∈J(n,i) j∈J(n,i) X ψ(n,i,j) (x) j∈J(n,i) |ψ(n,i,j)(x) − ψ(n,i,j)(y)| + X i∈In |ϕ(n,i) (x) − ϕ(n,i) (y)| Since ϕ(n,i) (x) P 6= 0 implies that x ∈ U(n,i) and then y ∈ U(n,i) (R), by definition of (ψ(n,i,j) )j∈J(n,i) , j∈J(n,i) |ψ(n,i,j)(x) − ψ(n,i,j) (y)| ≤ ε. P that: Moreover for any x, y ∈ Xn with dXn (x, y) ≤ R we know P i∈In |ϕ(n,i) (x) − ϕ(n,i) (y)| ≤ ε. Combining these two estimations we have: i∈In ,j∈J(n,i) |η(n,i,j) (x) − η(n,i,j) (y)| ≤ 2ε as desired. Corollary 3. Let X = (Xn )n and Y = (Yn )n be two sequences of metric spaces and F = (Fn : Xn → Yn )n a sequence of contractive maps. Assume that Y is equi-exact and for any uniformly bounded cover U = {{U(n,i) }i∈In }n of Y, i.e {U(n,i) }i∈In is a partition of Yn and supn,i∈In diam(U(n,i) ) < +∞, the cover F −1 (U) = {{Fn−1 (U(n,i) )}i }n of X is uniformly embeddable (respectively, equi-exact). Then the family X is uniformly embeddable (respectively, equi-exact). 19 Proof. Let R > 0, ε > 0 be two positive constants. Since Y is an equi-exact sequence, we can find an uniformly bounded cover U of Y and a subordinated partition of unity {(ϕ(n,i) )i∈In }n which satisfies Definition 11 with respect to the constants R and ε. Then {(ϕni ◦ Fn )i∈In }n is a partition of unity on the sequence X subordinated to F −1(U) which is uniformly embeddable (respectively, equi-exact) by assumption. Proposition 9 (respectively, Proposition 10) can be applied. Corollary 4. Let X = (Xn )n and Y = (Yn )n be two sequences of metric spaces, G a group which acts by isometries on each Xn and Yn for any n and F = (Fn : Xn → Yn )n a sequence of G-equivariant contractions. Assume that Y is equi-exact and the actions on Y are uniformly cobounded, i.e there exists C > 0 such that diam(Yn /G) ≤ C for any n. If for any n, there exists yn ∈ Yn such that for any R ≥ 0 the sequence of inverse images (Fn−1 (B(yn , R)))n ⊂ X is uniformly embeddable (respectively, equi-exact) then X is uniformly embeddable (respectively, equi-exact). Proof. Let R > 0, ε > 0 be two positive constants. Since Y is an equi-exact sequence, we can find an uniformly bounded cover U of Y and a subordinated partition of unity {(ϕ(n,i) )i∈In }n which satisfies Definition 11 with respect to the constants R and ε. Let yn ∈ Xn as in the statement. Since the actions of G are uniformly cobounded, we can find a sequence of subspaces Bn ⊂ Yn such that yn ∈ Bn , every orbit of the G-action on Yn intersects Bn and (Bn )n is a uniformly bounded sequence of metric spaces. Let R0 = supi,n diam(Uin ) + supn diam(Bn ) < +∞, we claim that for any n ∈ N and i ∈ In , there exists gin such that gin Uin ⊂ B(yn , R0 ). Indeed, let gin ∈ G be such that gin Uin intersects Bn and z ∈ sni Uin ∩ Bn , then for any y ∈ Uin we have : d(gin y, yn) ≤ d(gin y, z) + d(z, yn ) ≤ d(y, (gin)−1 z) + d(z, yn ) ≤ R0 . It follows gin Fn−1 (Uin ) = Fn−1 (gin Uin ) ⊂ Fn−1 (B(yn , R0 )) which is uniformly embeddable in n (respectively, equi-exact). So Corollary 3 can be applied Now we can formulate our reduction result discussed at the beginning of this subsection: Let A, B be two discrete residually finite groups and (An )n , (B n )n two faithful sequence of finite quotients of respectively A and B. Let’s denote G = A ⋆ B, Gn = An ⋆ B n their free products and D E G, Dn E Gn the free commutator subgroups associated. Let (M(n,k) )k be sequence of finite index characteristic subgroups of Dn with trivial intersection (we need a bit less assumptions here because we do not require faithfulness of the sequence of quotients). Assume A and B are amenable and fix a proper length function ℓ on G. Theorem 2. If the sequence of metric spaces (Dn /M(n,k) )n,k≥n , where each Dn /M(n,k) is endowed with the restriction of the quotient length on Gn /M(n,k) induced by ℓ, embeds uniformly into a Hilbert space, then (Gn /M(n,k) )n,k≥n embeds uniformly. 20 Proof. Any free product Γ = Γ1 ⋆ Γ2 is a subgroup of (Γ1 × Γ2 ) ⋆ Z/2. Indeed, let u be the generator of Z/2, then the homomorphism f : Γ → (Γ1 × Γ2 ) ⋆ Z/2 which sends g1 ∈ Γ1 7→ g1 and g2 ∈ Γ2 7→ u.g2 .u is a realization. Moreover, if we assume Γ1 and Γ2 amenable, stability of amenability by direct product ensures that Γ1 × Γ2 is amenable [6] and heredity on box space uniform embedding (cf Proposition 6) allows us to assume B = Z/2. Let Y = (Yn )n with Yn = Gn /Dn = An × Z/2. We have the following exact sequence: 1 → Dn /M(n,k) → Gn /M(n,k) → An × Z/2 → 1. G acts on both Xn and Yn transitively which ensures the action to be uniformly cobounded and the projections πn : Xn → Yn are G-equivariant contractions. Since A×Z/2 is amenable, Lemma 4 ensures that the sequence Y is equi-exact with respect to any proper length function on A × Z/2. Moreover Dn /M(n,k) is R-dense in πn−1 (BYn (e, R)), so the uniform embeddability of U(R) = (πn−1 (B(e, R)))n follows by our assumption on (Dn /M(n,k) )n,k≥n . Corollary 4 can apply. 4.2 Coarse metric approximation and free product The purpose of this subsection is the conditions under which the sequence of metric groups (Dn /M(n,k) )n,k≥n, discussed previously, endowed with a free product metric (cf. Theorem 2 statement) embeds uniformly into a Hilbert space. It appears that even if the sequences X = ((Dn /M(n,k) , ℓ))n,k≥n , where ℓ is the quotient metric induces by a fixed length on G, and XComb = ((Dn /M(n,k) , ℓComb,B )n,k≥n , where ℓComb,B is the quotient metric induced by the word metric on B of D, are not coarsely equivalent (cf. remark 1). We can locally approximate X by XComb , in a particular sense, and be able to conclude on the uniform embedding of X from the uniform embedding of XComb . We first need an analogue of the stability by direct limit of the uniform embedding of box spaces. Let (G, ℓ) be a discrete group endowed with a proper length ℓ. Recall that a sequence of subgroups (Hτ )τ of G converges to (G, ℓ) if for all R > 0, there exists T > 0 such that B(e, R) ⊂ Hτ for all τ ≥ T . Given a sequence of normal subgroups N = (Nn )n on (G, ℓ), we can associate to (Hτ )τ a sequence of metric subspaces of X = ⊔N ∈N G/N by considering Xτ = ⊔N ∈N πN (Hτ ) ⊂ X where πN : G → G/N is the quotient map. This sequence play a role analogue as in the group setting. In particular uniform embedding is stable by direct limit through these type of sequences as the following proposition shows. Proposition 11. Assume (G, ℓ) has a sequence of normal subgroups N = (Nn )n such that for all τ , the metric space Xτ = ⊔N ∈N πN (Hτ ) uniformly embeds into Hilbert space. Then the metric space X = ⊔N ∈N G/N coarsely embeds into Hilbert space. 21 Proof. Since Xτ embeds uniformly into Hilbert space, for all ε > 0 we can find ϕτn : Hnτ → Hnτ , with Hnτ a Hilbert space, such that kϕn (x)k = 1 and: (i) for all n ≥ 1 and x, y ∈ Hnτ with dn (x, y) ≤ R, kϕτn (x) − ϕτn (y)k ≤ ε. (ii) for all ε′ > 0, there exists M > 0 such that |hϕτn (x)|ϕτn (y)i| ≤ ε′ whenever dn (x, y) ≥ M. with dn the left-invariant distance associated to ℓn . Let’s fix σnτ : Qτn → Gn , with Qτn = Gn /Hnτ , a section for all n and τ . Let R > 0 be a positive constant and T such that Bn (e, R) ⊂ Hnτ for all n and τ ≥ T . First, observe that, for all x, y ∈ Γn , x ∼ y if and only if σnτ (x) = σnτ (y) and in such case: dn (x, y) = dn (σnτ (x)x′ , σnτ (y)y ′) = dn (x′ , y ′ ) with x′ = σnτ (x)−1 x ∈ Hnτ (respectively, y ′ = σnτ (y)−1 y ∈ Hnτ ). cτn : Γn → Hnτ ⊗ ℓ2 (Qτn ) by the formula ϕ cτn (x) = Now, we define the induced maps ϕ ϕτn (x′ ) ⊗ δx with x′ as above. A direct computation shows that these maps verify :  τ ′ τ ′ τ τ cn (x) − ϕ cn (y)k = kϕn (x ) − ϕn (y )k if x ∼ y kϕ 2 otherwise for x, y ∈ Gn . But if dn (x, y) ≤ R, by our assumption this imply x−1 y ∈ Bn (e, R) ⊂ Hnτ and consequently x ∼ y. So according to the above observation dn (x, y) = dn (x′ , y ′) ≤ R cτn (x) − ϕ cτn (y)k = kϕτn (x′ ) − ϕτn (y ′ )k ≤ ε. and then we have: kϕ In a similar way:  τ ′ τ ′ cτn (x)|ϕ cτn (y)i| = |hϕn (x )|ϕn (y )i| if x ∼ y |hϕ (9) 0 otherwise Let ε′ > 0 be a positive constant and M > 0 such that, |hϕτn (xτ )|ϕτn (yτ )i| ≤ ε′ whenever dn (xτ , yτ ) ≥ M with xτ , yτ ∈ Hnτ . According to the formula (9), cτn (x)|ϕ cτn (y)i| ≤ ε′ whenever dn (x, y) ≥ M. Indeed, if x ≁ y there is nothing |hϕ to do, otherwise, using the observation we have that dn (x′ , y ′) = dn (x, y) ≥ M and cτn (x)|ϕ cτn (y)i| = |hϕτn (x′ )|ϕτn (y ′)i| ≤ ε′ . |hϕ This result combined with Lemma 2 prove the Proposition 11. Let’s get back to free product. As usual A and B are two discrete finitely generated groups, G = A ⋆ B denote their free product and D E G is the commutator subgroup of G. Given two sequences of quotients of A and B denoted respectively (An )n and (B n )n , as before, we define a quotient sequence of G by taking Gn = An ⋆ B n and denote πn : G → Gn the quotient maps associated. We define Dτ , with τ > 0, the free subgroup of D with basis Bτ = {[a, b] | ℓ(a), ℓ(b) ≤ τ ; a, b 6= 1} ⊂ D (cf. Proposition 7). Hτ acts isometrically by left translation on (πn (Hτ ), ℓ) where ℓ is the quotient length associated to a proper length ℓ on G. 22 Lemma 5. Let ℓ be a proper length function on G. We endow Dτ with the word metric, ℓComb,Bτ , associated to the basis Bτ . For all τ > 0, there exist a rank N ≥ 0 and a pair of constants (C, λ) which depends only on τ such that the quotient maps πn : (Hτ , ℓComb,Bτ ) → (πn (Hτ ), ℓ) define G-equivariant (C, λ)-quasi-isometries for all n ≥ N. Proof. Any proper metric on a discrete countable group are equivalent, we may assume ℓ is a word metric associated to the union of two finite generating sets of respectively A and B. Since the sequence of quotients (Gn )n is faithful, there exists a rank N ≥ 0 such that (2) Bτ = {x.y −1 | x, y ∈ Bτ } is sent bijectively inside of Dn for n ≥ N. Because of the freeness of the set πn (B) ⊂ Gn we have that ℓComb,πn (B) (g) = ℓComb,Bτ (g) for all g ∈ Dτ and n ≥ N where ℓComb,πn (B) is the word distance associated to πn (B) ⊂ Gn and g = πn (g). Let Tn be the Bass-Serre tree of Gn and dn its graph metric. Then dn (g.An , An ) ≤ ℓ(g) for all g ∈ Gn and by the inequality (8) of Proposition 7 we have: ℓComb,πn(B) (g) = ℓComb,Bτ (g) ≤ dn (g.An , An ) + 1 ≤ ℓ(g) + 1 for all g ∈ Dτ . Now, let g ∈ Dτ , then g can be written g = si1 . . . sin with sik = [aik , bik ] ∈ Bτ and n = ℓComb,Bτ (g) in an unique way, so : ℓ(g) ≤ n X k=1 ℓ(sik ) ≤ n X k=1 2ℓ(aik ) + 2ℓ(bik ) ≤ 4τ n = 4τ ℓComb,Bτ (g). We just proved that: ℓComb,Bτ (g) − 1 ≤ ℓ(g) ≤ 4τ ℓComb,Bτ (g) for any g ∈ Dτ , with quasi-isometry constants which depend only on τ . Remark 1. It is interesting to note that the dilatation on all D, ρ+ (t) = supℓComb(g)≤t ℓ(g), depends on A and B. Indeed, a simple computation shows that diam(A) + diam(B) ≤ ρ+ (1). This justifies what we discussed at the beginning of this subsection and our approach. Corollary 5. Let Xτ be the coarse disjoint union of the sequence of metric spaces ((πn (Dτ )/M(n,k) , ℓ))n,k≥n where ℓ is the quotient metric induces by a fixed proper length ℓ on G. Then Xτ is quasi-isometric to coarse disjoint union Xτ,Comb of the sequence ((πn (Dτ )/M(n,k) , ℓComb,Bτ ))n,k≥n where ℓComb,Bτ is the quotient length associated to the word distance on Bτ . In particular the uniform embedding of Xτ reduces to the uniform embedding of Xτ,Comb . Proof. This is a direct consequence of Lemma 5 and Proposition 5. 23 Since the commutator subgroups Dn E Gn = An ⋆ B n are finite rank free groups and , for n large enough, the restriction of the quotient length associated to the word distance on B of D, ℓComb,B , to Dτ is nothing but the word distance on the basis Bτ . The following proposition ensures the existence of a suitable sequence of finite index normal subgroups (M(n,k) )(n,k) such that the Xτ,Comb uniformly embed. This concludes the proof of Theorem 1. Proposition 12. For all free group Fω of finite rank ω ∈ N endowed with a word metric on a basis, there exists a sequence of finite index characteristic subgroups of Fω with trivial intersection Nω = (N(ω,k) )k with N(ω,k+1) characteristic into N(ω,k) such that the sequence (Fω /N(ω,k) )ω,k≥ω embeds uniformly into Hilbert space. Indeed, for all n, there exists Nn = (Nn,k )k such that XComb = ⊔n,k≥n Dn /Nn,k embeds into Hilbert space. Since Xτ,Comb ⊂ XComb for all τ > 0, the Proposition 11 concludes the proof of Theorem 1. Let us prove the Proposition 12: Proof. Let us recall that a characteristic subgroup N of a group G is a normal subgroup stable by all automorphisms of G. Let Fω be a free group of finite rank ω ∈ N, following [2] idea on the existence of a free group box space which coarsely embeds, we consider the sequence of characteristic subgroups (Nk )k of Fω , define recursively by the formula N1 = h{w 2; w ∈ Fω }i, Nk+1 = h{w 2; w ∈ Nk+1 }i E Nk . Since Nk+1 is a finite index subgroup of Nk as far as the rank of Nk is finite, by induction we deduce that these groups has finite index in Fω . Moreover Levi theorem (cf [14]) justifies that this sequence has trivial intersection. The AGS [2] embedding result rests on a construction of a pseudo-metric dW,k on Xkω = Fω /Nk associated to a wall structure which agrees with the combinatorial metric dωk at the scale of girth(Xkω ). Note that such a pseudo-metric always corresponds to a Hilbert metric [16]. In details, on any finite quotient Xkω , dωW,k ≤ dω and : dω (x, y) ≤ girth(Xkω ) if and only if dωW,k (x, y) ≤ girth(Xkω ) for any x, y ∈ Xkω . Furthermore, if one of the above inequalities hold, then dω (x, y) = dωW,k (x, y) [2]. So to prove our proposition a sufficient condition is to prove that girth(Xkω ) grows uniformly on the rank ω, i.e there exists a proper function f : N → N such that girth(Xkω ) ≥ f (k) for all ω ≥ 1 and k ≥ ω. Indeed, take in account the relations between dωW and dω described above, we just need to prove the existence of a proper function ρ− : R+ → R+ such that: ρ− (dω (x, y)) ≤ dωW (x, y) (10) for any ω, k ≥ ω and x, y ∈ Xkω . We must prove that ρ(t) = inf {(x,y);dω (x,y)≥t} dωW,k (x, y) is proper, i.e for any R > 0, 24 there exists R′ > 0 such that for any ω, dωW,k (x, y) ≤ R implies dω (x, y) ≤ R′ . If such a function f exists. Let K0 such that f (k) > R for any k ≥ K0 and R′ ≥ maxω≤K0 diam(⊔K0 ≥k≥ω Xkω ) + R. We have that for any x, y ∈ Xkω with k ≥ ω, if k ≤ K0 by construction d(x, y) ≤ maxω≤K0 diam(⊔K0 ≥k≥ω Xkω ) ≤ R′ otherwise k ≥ K0 and girth(Xkω ) ≥ f (k) ≥ R so dW (x, y) = d(x, y) ≤ R ≤ R′ as required. Now the existence of f follows from the fact that the sequence (N(ω,k) )k is characteristic and N(ω,k+1) contains no basis element of N(ω,k) . Indeed, automorphisms act transitively on basis, so by contradiction this will implies that N(ω,k+1) = N(ω,k) which is absurd because the sequence is defined recursively and has trivial intersection. Proposition 3.2 [14] ensures that relatively to any basis of Fω , ℓComb,ω (g) ≥ k for any g ∈ Nkω and so Girth(Xkω ) ≥ k. 5 Further on finite quotients of free products In this section the groups A and B we consider are supposed to be finitely generated. We start this section by presenting another construction of finite quotients of a free product due to Baumslag [4] that is extensively use here. First, assume A and B are two finite groups and G = A ⋆ B their free product. Let U(k) ⊂ G be the set of words with normal form: gl . . . g1 with l ≤ k. For k ≥ 2, U(k) decomposes as follows: U(k) = U(k − 1) ∪ (V (k) ∩ A.U(k − 1)) ∪ (V (k) ∩ B.U(k − 1)) with V (k) = U(k) \ U(k − 1) the set of words with normal form: gk . . . g1 . The action by left multiplication of A on G stabilizes U(k − 1) ∪ (V (k) ∩ A.U(k − 1)) and can be extend to all U(k) by assuming that A acts trivially on V (k) ∩ B.U(k − 1). Something similar can be achieved with B by replacing V (k) ∩ A.U(k − 1) by V (k) ∩ B.U(k − 1). This gives two symmetric representations σA (k) : A → Sym(U(k)) and σB (k) : B → Sym(U(k)) and by the universal property of free product we obtain: σ(k) = σA (k) ⋆ σB (k) : G → Sym(U(k)). Because A and B are finite U(k) is also finite, in particular Nk = ker(σ(k)) has finite index in G. Remark 2. The sequence of finite index normal subgroups (Nk )k has trivial intersection. Indeed, let g = gn0 . . . g1 be the reduced form of g ∈ G with g 6= e. Then σ(k)(g)(e) = g 6= e for any n ≥ n0 . Now assume A and B are both residually finite groups. Let (An )n and (B n )n be two faithful sequence of finite quotients of respectively A and B. Let’s denote Gn = An ⋆ B n and σn (k) : Gn → Sym(Un (k)) the representation built previously applied to the free product of finite groups Gn . Then the subgroups N(n,k) = ker(σn (k) ◦ πn ) of G where πn : G → Gn is the quotient map, form a sequence of finite index normal subgroups with trivial intersection. 25 5.1 Free product box spaces and expansion property Here we study expansion property of the sequence (G/N(n,k) )n,k≥n. Let X = (V, E) be a finite graph and A ⊂ V a subset of vertices. The edge boundary ∂A ⊂ E of A is the set of edges which relate an element A to one of V \ A. Definition 12. Given a finite graph X = (V, E), the Cheeger constant h(X) is defined as minA⊂V ||A|≤ |V | |∂A| . |A| 2 A sequence of finite graphs (Xn )n is called expander if there exists c > 0 such that h(Xn ) ≥ c for any n. Let G be a group which acts on a set Z and S a generating set of G. We call Schreir graph and denote it XS (Z) the graph defined by: V (XS (Z)) = Z and (z, z ′ ) ∈ E(XS (Z)) if z ′ = s.z with s ∈ S. Given a sequence of finite quotients (Qn )n of G, we construct a sequence of Schreir graphs XS (Qn ). Expansion of (XS (Qn ))n does not depends on S and we say that (Qn )n is expander if such a S exists. Proposition 3 is a consequence of the following: Proposition 13. Let A and B be two residually finite groups and G = A ⋆ B their free product. The faithful sequence of finite quotients (Gn /Nn,k )(n,k≥n) of G is nonexpander. In particular we cannot expect a free product with property (τ ) (cf [13]). In order to prove Proposition we need a intermediate result. Lemma 6. Let G be a finite group, S a symmetric generating set of G and H ≤ G a subgroup of G. Then h(G, S) ≤ h(G/H, S). Proof. Let X ⊂ G be a subset. Then |X.H| = |X|.|H| if and only if the multiplication map X × H → G is bijective and this is equivalent to say that (X −1 .X) ∩ H = {e}. Now let Y ⊂ G/H, there exists X ⊂ G which is sent bijectively to Y by the projection π : G → G/H such that X −1 .X ∩ H = {e}. Indeed, let’s define Y (2) = {a−1 a′ | a, a′ ∈ Ỹ } with Ỹ ⊂ G a arbitrary set of representative of Y , there exists X0 ⊂ G which is sent bijectively to Y (2) . In particular X0 .H ∩ X0 = {e} and the representative of Y ⊂ A′ (2) in X0 do the job. It’s enough to prove that for any Y ⊂ G/H with |Y | ≤ |G/H| and a set of represen2 tative X ⊂ G as above: |∂Y | |∂X.H| ≤ . (11) |X.H| |Y | .|H| = |G| . Indeed, |X.H| = |X|.|H| ≤ |G/H| 2 2 Observe that for a edge e = {xh, sxh} ∈ E(X.H, G \ (X.H)) between a element of X.H and G \ (X.H), the edges e.h′ = {xhh′ , sxhh′ } with h′ ∈ H are distincts and 26 still belong to E(X.H, G \ (X.H)). Furthermore they represent the fiber of the edge e = {x, s.x} ∈ E(Y, (G/H) \ Y ). It follows that |∂X.H| = |∂Y |.|H|. Finally the equality |X.H| = |X|.|H| implies inequality 11. Lemma 6 reduces Proposition to the study of the expansion property of Schreir graphs (XS (Un (k)))n,k≥n. Indeed, Un (k) ≃ G/N(n,k) /St(e) where St(e) is the stabilizer of e ∈ Un (k) . Proposition 14. The sequence of finite homogenous graphs (XS (Un (k)))n,k≥n is nonexpander. Proof. We take the Schreir graph structure associated to the finite generating S = SA ∪ SB of G with SA and SB two finite generating sets of respectively A and B. Let’s consider PnA (k) ⊂ Un (k) (respectively, PnB (k) ⊂ Un (k)) the set of words with reduced form gk . . . g1 with k ≤ n and g1 ∈ An (respectively, g1 ∈ B n ). Given A w ∈ Un (k) with w 6= e, w belongs to PnA (k) or PnB (k). Assume w ∈ Un,k , if we denote A its set of neighbors by V (w) = {s.w | s ∈ S}, then V (w) ⊂ Un,k . In particular ∂PnA (k) ⊂ V (e) and it follows that |∂PnA (k)| ≤ |S|. Furthermore we have |PnA (k)| ≥ (|An | − 1)⌊n/2⌋ (|B n | − 1)⌊n/2⌋ which implies: |∂PnA (k)| |S| ≤ →0 A ⌊n/2⌋ |Pn (k)| (|An | − 1) (|B n | − 1)⌊n/2⌋ when n or k goes to infinity and similar holds for PnB (k). Since the sets PnA (k) and PnB (k) verify |PnA (k)| + |PnB (k)| = |Un (k)| + 1, one of them has cardinality lower or equal then |Un2(k)| , so h(Un (k)) → 0 whenever k or n go to infinity. 5.2 Free product symmetric representations and uniform embedding. Let G be a group, we call irreducible symmetric representation of G an action of type: G y G/N with N ≤ G a finite index subgroup of G. This denomination comes from the fact that these actions give symmetric representations: G → Sym(G/N) and any transitive action on a finite set are obtained this way. A sequence of irreducible symmetric representations will be for us a sequence of finite index subgroups, non-necessarily normal, in G. Moreover, we say that it is faithful if these subgroups has trivial intersection. Given such a representation N ≤ G and a generating set S of G. We denote the Schreir graph XS (G/N) associated to N and S simply by XS (N). Proposition 1. Let A and B be two finitely generated residually finite groups, G = A ⋆ B their free product and S ⊂ G a finite generating set of G. Assume A and B admit respectively an embeddable box space. Then there exists a faithful sequence of irreducible symmetric representation (Nn )n of G such that ⊔n (XS (Nn ))n embeds into a Hilbert space. 27 By using irreducible symmetric representation we relaxed the assumption that the subgroups we consider are normal but these notion still keep track of certain properties as properties (τ ) [13] and (A). More precisely we can still prove that property (T) (respectively, amenability) implies property (τ ) (respectively, property (A)). In a other hand we lose on the approximation properties correspondance: Proposition 2. There exists a faithful sequence of irreducible symmetric representation (Nn )n of F2 , such that ⊔n F2 /Nn has property (A). These two Proposition’s are actually consequences of the following theorem: Let A and B be two discrete finitely generated residually finite groups. Let’s denote (An )n and (B n )n two faithful sequences of finite quotients of respectively A and B and Gn = An ⋆ B n their free products. Theorem 3. If ⊔n An and ⊔n B n embed into Hilbert space (respectively, has property (A)), then ⊔n Gn embeds into a Hilbert space (respectively, has property (A)). Let S = SA ∪ SB ⊂ G be a finite generating set of G built by the union of a generating set of A and B. By considering Baumslag construction, then Un (k) ≃ G/St(e), with the Schreir graph structure induced by S, embeds isometrically in (Gn , S) and is our needed sequence of symmetric representation. Proposition 15. Let T = {(T, dT )}T be the family of bounded geometry trees endowed with their graph metric. Then T forms an equi-exact family of metric spaces. Proof. Let’s fix xT ∈ T on any T ∈ T and denote (x|y)T = 21 [|x|T + |y|T − d(x, y)] with |x|T = dT (x, xT ) with x, y ∈ T . Recall that trees are 0-hyperbolic space and so satisfy the following hyperbolic condition: (x|z)T ≥ min{(x|y)T , (y|z)T } for any x, y, z ∈ T . In particular given any positive constant L ≥ 0, the relation x ∼ y if (x|y)T ≥ L is an equivalence relation on T≥L = {x ∈ T | |x|T ≥ L}. Let L > 0 be a positive constant and AT,L,k = {x ∈ T | kL ≤ |x|T ≤ k(L + 1)} an annulus of T≥L . The relation on AT,L,k ⊂ T≥L : x ∼ y if (x|y)T ≥ L(k − 1/2) is an equivalence relation on AT,L,k . Moreover, x ∼ y implies dT (x, y) ≤ 3L and x ≁ y implies dT (x, y) ≥ L. This induces a partition AT,L,k = ∪i∈IT,L,k CT,L,k,i such that dT (CT,L,k,i, CT,K,k′,i ) ≥ L whenever k 6= k ′ and diam(CT,K,k,i) ≤ 3L. Using that decomposition we construct the covering U = U1 ∪U2 with U1 = {CT,L,2k,i | k ≥ 0, i ∈ IT,L,2k } and U2 = {CT,L,2k+1,i | k ≥ 0, i ∈ IT,L,2k+1} of T with the property that Ui forms a L-separated, i.e for any C, C ′ ∈ Ui , d(C, C ′) ≥ L, 3L-uniformly bounded family with i = 1, 2. Let W = W1 ∪ W2 with Wi = Ui (L/2) = {C(L/2) | C ∈ Ui } which is the covering obtained by taking the L/2-neighborhood of each element of U. Since at most two elements of U intersect a ball of radius L/2, at most two elements of W contain a given point. Moreover any ball of radius L/2 are contained in an element of W. This 28 fact will be use later for estimation. Let’s define φT,L : T → ℓ1 (∪k∈N IT,L,k ) by the formula dT (x, T \ WT,L,k,i ) k ′ ∈N,j∈IT,L,k dT (x, T \ WT,L,k ′ ,j ) φT,L (x)(i) = P for any x ∈ T and i ∈ IT,L,k . Then for k ∈ N and i ∈ IT,L,k , φT,L (.)(i) is supported in WT,L,k,i which has diameter lower or equal to 4L and so forms a uniformly bounded supported partition of the unity. Moreover: d(x, y) k ′ ∈N,j∈IT,L,k dT (x, T \ WT,L,k ′ ,j ) |φT,L (x)(i) − φT,L (y)(i)| ≤ P 1 1 −P ′ ′ k ′ ∈N,j∈IT,L,k dT (x, T \ WT,L,k ,j ) k ′ ∈N,j∈IT,L,k dT (y, T \ WT,L,k ,j )   X 2d(x, y) 2 ≤ + |dT (x, T \ WT,L,k′,j ) − dT (y, T \ WT,L,k′,j )| L L ′ +dT (y, T \ WT,L,k,i) P k ∈N,j∈IT,L,k ≤ 10 d(x, y) L It follows that: kφT,L (x) − φT,L (y)k1 ≤ X k∈N,i∈IT,L,k ≤ |φT,L (x)(i) − φT,L (y)(i)| 40 d(x, y). L This does not depend on the tree T we consider. By taking L > 0 large enough we can check the Definition 11. Proposition 16. Let (Xn )n be a sequence of metric spaces with an uniformly embeddable (respectively, equi-exact) cover U = {Un }n . Assume for any L > 0 and n ≥ 1, there exists Zn ⊂ Xn a subspace of Xn such that (Zn )n is an embeddable sequence and {U \ Zn | U ∈ Un } is L-separated in Xn for any n. Then (Xn )n is uniformly embeddable (respectively, equi-exact). Proof. Let L > 0 be a positive constant and Zn ⊂ Xn as in the statement. Then W = W1 ∪ W2 with W1 = {Zn (L/2)} and W2 = {(U \ Zn )(L/2) | U ∈ Un } is a cover such that at most two elements of W contain a same element of Xn and any ball of radius L/2 is contained in a element of W. As in the proof of Proposition 15 we can build a O(L−1 )-lipschitz partition of unity subordinated to W and apply Proposition 9 (respectively, Proposition 10) to conclude. We present a brief introduction to tree of metric spaces formalism (cf. [9]) that we use to prove Theorem 3. Let T = (V, E) be an oriented (this is for relieve on notations) connected tree. 29 A tree of metric spaces on T is given by a family of metric spaces X = {(Xv , dv )}v∈V and a map f : E → ∪v,v′ |(v,v′ )∈E Xv × Xv′ such that f (e) ∈ Xs(e) × Xt(e) . The total space X associated to (X , f ) is a metric space defined by X = ⊔v∈V Xv and a metric dX obtained as follows: Let’s consider the subset D = (∪v∈V Xv ×Xv )∪f (E) of X ×X. Then D defines a ample domain, i.e for any pair of elements x, y ∈ X, there exists a path x1 = x, . . . , xn = y such that (xi , xi+1 ) ∈ D for any 1 ≤ i ≤ n − 1. The metric dX is defined as the unique enveloping metric of the partial metric db : D → R+ given by the formulas b Xv ×Xv = dv and db ◦ f (e) = 1 for any e ∈ E (cf [9]). d| Now, given a free product G = A ⋆ B endowed with a proper left invariant metric d and its Bass-Serre tree T = (G/A ∪ G/B, G). We associate a tree of metric spaces by taking XgA = (gA, d|gA) and XgB = (gB, d|gB ) and f : G → G/A × G/B with f (g) = (gA, gB). G acts on the total spaces X(G,d) by the formula g ′.(ga) = gg ′a ∈ Xg′ gA with g ′ ∈ G and ga ∈ XgA and similarly on G/B. Moreover this action is isometric, free and has two orbits. The formula for the distance on X(G,d) given in Proposition (5.5) of [9] implies the existence of a pair of positive constants (C, λ) such that any free product (G, d) of finitely generated groups endowed with a proper left invariant metric d is (C, λ)-quasi-isometric to X(G,d) . In other words it is equivalent to prove Theorem 2 for (Gn )n or (X(Gn ,dn ) )n (cf. Proposition 5). We can prove Theorem 3. Proof. Let Gn as in the statement, Tn its Bass-Serre tree and Xn its tree of metric spaces. The sequence (Gn )n are uniformly quasi-isometric to X = (Xn )n , so the proof reduce to show that X embeds uniformly (respectively, has (A)) if (An )n and (B n )n embed (respectively, has (A)). The actions of Gn on Tn are uniformly cobounded and Proposition 15 ensures that T = (Tn )n forms an equi-exact sequence. Moreover pn : Xn → Tn is a sequence of Gn -equivariant contractions (this is justified by Proposition 5.5 of [9]). To apply Corollary 4, we must prove that p−1 n (B(An , r)) ⊂ Xn (here An ∈ V (Tn )) embeds uniformly into a Hilbert space (respectively, has (A)) for any r ≥ 0. Let’s do this by induction on r. For r = 0, p−1 n (An ) = XAn which is isometric to An for any n and is an embeddable sequence (respectively, equi-exact sequence) by assumption. Assume now r ≥ 1, if we denote Cn (r) = p−1 n (B(An , r)), we have the following decomposition: [ Cn (r) = Cn (r − 1) ∪ Xv . v∈Tn |dTn (An ,v)=r Let L > 0 be positive constant and Yv ⊂ Xv be the subspace of Xv forms by elements at distance at most L/2 from Cn (r − 1) for v ∈ Tn . Then Cn′ (r − 1) = Cn (r − 1) ∪ S v∈Tn |dTn (An ,v)=r Yv is quasi-isometric to Cn (r − 1) and by induction hypothesis forms an embeddable (respectively, equi-exact) sequence. S In the other hand Cn (r) \ Cn′ (r − 1) = v∈Tn |dTn (An ,v)=r Xv \ Yv is L-separated in Cn (r) and Proposition 16 implies that (Cn (r))n embeds uniformly (respectively, is 30 equi-exact). We can apply Corollary 4 to conclude. References [1] S. Arnt. Fibred coarse embeddability of box spaces and proper isometric affine actions on Lp spaces. Bull. Belg. Math. Soc. Simon Stevin, 23(1):21–32, 2016. [2] Goulnara Arzhantseva, Erik Guentner, and Ján Spakula. Coarse non-amenability and coarse embeddings. Geom. Funct. Anal., 22(1):22–36, 2012. [3] Goulnara Arzhantseva and Romain Tessera. Admitting a coarse embedding is not preserved under group extensions. 05 2016. [4] Benjamin Baumslag and Marvin Tretkoff. Residually finite HNN extensions. Comm. Algebra, 6(2):179–194, 1978. [5] Bachir Bekka, Pierre de la Harpe, and Alain Valette. Kazhdan’s property (T), volume 11 of New Mathematical Monographs. Cambridge University Press, Cambridge, 2008. [6] Nathanial P. Brown and Narutaka Ozawa. C ∗ -algebras and finite-dimensional approximations, volume 88 of Graduate Studies in Mathematics. American Mathematical Society, Providence, RI, 2008. [7] Xiaoman Chen, Qin Wang, and Xianjin Wang. Characterization of the Haagerup property by fibred coarse embedding into Hilbert space. Bull. Lond. Math. Soc., 45(5):1091–1099, 2013. [8] Pierre-Alain Cherix, Michael Cowling, Paul Jolissaint, Pierre Julg, and Alain Valette. Groups with the Haagerup property, volume 197 of Progress in Mathematics. Birkhäuser Verlag, Basel, 2001. Gromov’s a-T-menability. [9] Marius Dadarlat and Erik Guentner. Constructions preserving Hilbert space uniform embeddability of discrete groups. Trans. Amer. Math. Soc., 355(8):3253– 3275, 2003. [10] Marius Dadarlat and Erik Guentner. Uniform embeddability of relatively hyperbolic groups. J. Reine Angew. Math., 612:1–15, 2007. [11] Benson Farb and Dan Margalit. A primer on mapping class groups, volume 49 of Princeton Mathematical Series. Princeton University Press, Princeton, NJ, 2012. [12] M. Gromov. Asymptotic invariants of infinite groups. In Geometric group theory, Vol. 2 (Sussex, 1991), volume 182 of London Math. Soc. Lecture Note Ser., pages 1–295. Cambridge Univ. Press, Cambridge, 1993. 31 [13] Alex Lubotzky. What is. . . property (τ )? Notices Amer. Math. Soc., 52(6):626– 627, 2005. [14] Roger C. Lyndon and Paul E. Schupp. Combinatorial group theory. Classics in Mathematics. Springer-Verlag, Berlin, 2001. Reprint of the 1977 edition. [15] G. A. Margulis. Explicit constructions of expanders. Problemy Peredači Informacii, 9(4):71–80, 1973. [16] John Roe. Lectures on coarse geometry, volume 31 of University Lecture Series. American Mathematical Society, Providence, RI, 2003. [17] John Roe. Hyperbolic groups have finite asymptotic dimension. Proc. Amer. Math. Soc., 133(9):2489–2490, 2005. [18] Jean-Pierre Serre. Trees. Springer-Verlag, Berlin-New York, 1980. Translated from the French by John Stillwell. [19] G. Skandalis, J. L. Tu, and G. Yu. The coarse Baum-Connes conjecture and groupoids. Topology, 41(4):807–834, 2002. [20] Rufus Willett and Guoliang Yu. Higher index theory for certain expanders and Gromov monster groups, I. Adv. Math., 229(3):1380–1416, 2012. [21] Guoliang Yu. The coarse Baum-Connes conjecture for spaces which admit a uniform embedding into Hilbert space. Invent. Math., 139(1):201–240, 2000. 32
4math.GR
Robust Estimators in High Dimensions without the Computational Intractability arXiv:1604.06443v1 [cs.DS] 21 Apr 2016 Ilias Diakonikolas∗ CS, USC [email protected] Jerry Li § EECS, MIT [email protected] Gautam Kamath† EECS, MIT [email protected] Ankur Moitra¶ Math & CSAIL, MIT [email protected] Daniel Kane‡ CSE & Math, UCSD [email protected] Alistair Stewartk CS, USC [email protected] April 22, 2016 Abstract We study high-dimensional distribution learning in an agnostic setting where an adversary is allowed to arbitrarily corrupt an ε-fraction of the samples. Such questions have a rich history spanning statistics, machine learning and theoretical computer science. Even in the most basic settings, the only known approaches are either computationally inefficient or lose dimension-dependent factors in their error guarantees. This raises the following question: Is high-dimensional agnostic distribution learning even possible, algorithmically? In this work, we obtain the first computationally efficient algorithms with dimension-independent error guarantees for agnostically learning several fundamental classes of high-dimensional distributions: (1) a single Gaussian, (2) a product distribution on the hypercube, (3) mixtures of two product distributions (under a natural balancedness condition), and (4) mixtures of spherical Gaussians. Our algorithms achieve error that is independent of the dimension, and in many cases scales nearly-linearly with the fraction of adversarially corrupted samples. Moreover, we develop a general recipe for detecting and correcting corruptions in high-dimensions, that may be applicable to many other problems. ∗ Part of this work was performed while the author was at the University of Edinburgh. Research supported in part by EPSRC grant EP/L021749/1, a Marie Curie Career Integration Grant, and a SICSA grant. † Supported by NSF Award CCF-0953960 (CAREER) and ONR grant N00014-12-1-0999. This work was done in part while the author was an intern at Microsoft Research Cambridge and visiting the Simons Institute for the Theory of Computing. ‡ Part of this work was performed while visiting the University of Edinburgh. § Supposed by NSF CAREER Award CCF-1453261, a Google Faculty Research Award, and an NSF Fellowship. This work was done in part while the author was an intern at Microsoft Research Cambridge. ¶ Supported by NSF CAREER Award CCF-1453261, a grant from the MIT NEC Corporation, and a Google Faculty Research Award. k Part of this work was performed while the author was at the University of Edinburgh. Research supported in part by EPSRC grant EP/L021749/1. Contents 1 Introduction 1.1 Background . . . . . . . . . 1.2 Our Techniques . . . . . . . 1.3 Our Results . . . . . . . . . 1.4 Discussion and Related Work 1.5 Organization . . . . . . . . . 1 1 2 3 5 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Preliminaries 2.1 Types of Adversaries . . . . . 2.2 Basic Notation . . . . . . . . 2.3 Distributions of Interest . . . . 2.4 Agnostic Hypothesis Selection 2.5 Bounds on TV Distance . . . . 2.6 Miscellaneous Lemmata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 . 6 . 7 . 8 . 8 . 9 . 11 3 Some Natural Approaches, and Why They Fail 11 4 Agnostically Learning a Gaussian, via Convex Programming 4.1 The Set SN,ε . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 Concentration Inequalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2.1 Empirical Estimates of First and Second Moments . . . . . . . . . . . . . . . . . 4.2.2 Estimation Error in the Frobenius Norm . . . . . . . . . . . . . . . . . . . . . . . 4.2.3 Understanding the Fourth Moment Tensor . . . . . . . . . . . . . . . . . . . . . . 4.2.4 Concentration of the Fourth Moment Tensor . . . . . . . . . . . . . . . . . . . . . 4.3 Finding the Mean, Using a Separation Oracle . . . . . . . . . . . . . . . . . . . . . . . . 4.3.1 Naive Pruning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3.2 The Separation Oracle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3.3 The Full Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4 Finding the Covariance, Using a Separation Oracle . . . . . . . . . . . . . . . . . . . . . 4.4.1 The Full Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5 Learning an Arbitrary Gaussian Agnostically . . . . . . . . . . . . . . . . . . . . . . . . 4.5.1 From Unknown Mean, Unknown Covariance, to Zero Mean, Unknown Covariance 4.5.2 From Unknown Mean, Approximate Covariance, to Approximate Recovery . . . . . . . . . . . . . . . . . . . 13 14 14 14 15 16 17 18 18 19 22 23 29 30 31 31 . . . . . . . . . . . 32 33 33 34 35 36 36 37 38 39 39 40 5 Agnostically Learning a Mixture of Spherical Gaussians, via Convex Programming 5.1 Notation and Norms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 Concentration Inequalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3 Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4 Naive Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.5 Estimating the Covariance Using Convex Programming . . . . . . . . . . . . . . . 5.5.1 Properties of Our Convex Set . . . . . . . . . . . . . . . . . . . . . . . . 5.5.2 Separation Oracle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.6 Spectral Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.7 Exhaustive Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.8 Applying the Tournament Lemma . . . . . . . . . . . . . . . . . . . . . . . . . . 5.8.1 Guessing the Mixing Weights and Variance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.9 5.8.2 Pruning Our Hypotheses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Handling Unequal Variances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 6 Agnostically Learning Binary Product Distributions, via Filters 6.1 The Balanced Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.1 Algorithm F ILTER -BALANCED -P RODUCT: Proof of Proposition 6.8 . 6.1.2 Setup and Basic Structural Lemmas . . . . . . . . . . . . . . . . . . 6.1.3 The Case of Small Spectral Norm . . . . . . . . . . . . . . . . . . . 6.1.4 The Case of Large Spectral Norm . . . . . . . . . . . . . . . . . . . 6.2 Agnostically Learning Arbitrary Binary Product Distributions . . . . . . . . 6.2.1 Algorithm F ILTER -P RODUCT: Proof of Proposition 6.24 . . . . . . . 6.2.2 Chi-Squared Distance and Basic Reductions . . . . . . . . . . . . . . 6.2.3 Setup and Basic Structural Lemmas . . . . . . . . . . . . . . . . . . 6.2.4 The Case of Small Spectral Norm . . . . . . . . . . . . . . . . . . . 6.2.5 The Case of Large Spectral Norm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 43 45 46 48 49 51 52 53 55 58 60 7 Agnostically Learning Mixtures of Two Balanced Binary Products, via Filters 62 7.1 The Full Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 7.2 Mixtures of Products Whose Means Differ Significantly in One Coordinate . . . . . . . . . 63 7.3 Mixtures of Products Whose Means Are Close in Every Coordinate . . . . . . . . . . . . . 71 8 Agnostically Learning a Gaussian, via Filters 8.1 Learning a Gaussian With Unknown Mean . . . . . . . . . . . . . . . . . . . . . . 8.1.1 Algorithm F ILTER -G AUSSIAN -U NKOWN -M EAN: Proof of Proposition 8.5 8.1.2 Proof of Correctness of F ILTER -G AUSSIAN -U NKOWN -M EAN . . . . . . . 8.2 Learning a Gaussian With Unknown Covariance . . . . . . . . . . . . . . . . . . . 8.2.1 Analysis of Filter-based Algorithm: Proof of Proposition 8.17 . . . . . . . A Deferred Proofs from Section 2 . . . . . . . . . . . . . . . . . . . . . . . . . 81 81 83 83 86 88 99 B Deferred Proofs from Section 4 100 B.1 Proof of Theorem 4.17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 C Deferred Proofs from Section 5 106 C.1 Proof of Theorem 5.12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 D Deferred Proofs from Section 6 111 E Deferred Proofs from Section 7 112 F Deferred Proofs from Section 8 113 1 Introduction 1.1 Background A central goal of machine learning is to design efficient algorithms for fitting a model to a collection of observations. In recent years, there has been considerable progress on a variety of problems in this domain, including algorithms with provable guarantees for learning mixture models [FOS05, KMV10, MV10, BS10, HK13], phylogenetic trees [CGG02, MR05], HMMs [AHK12], topic models [AGM12, AGHK13], and independent component analysis [AGMS15]. These algorithms crucially rely on the assumption that the observations were actually generated by a model in the family. However, this simplifying assumption is not meant to be exactly true, and it is an important direction to explore what happens when it holds only in an approximate sense. In this work, we study the following family of questions: Question 1.1. Let D be a family of distributions on Rd . Suppose we are given samples generated from the following process: First, m samples are drawn from some unknown distribution P in D. Then, an adversary is allowed to arbitrarily corrupt an ε-fraction of the samples. Can we efficiently find a distribution P ′ in D that is f (ε, d)-close, in total variation distance, to P ? This is a natural formalization of the problem of designing robust and efficient algorithms for distribution estimation. We refer to it as (proper) agnostic distribution learning and we refer to the samples as being ε-corrupted. This family of problems has its roots in many fields, including statistics, machine learning, and theoretical computer science. Within computational learning theory, it is related to the agnostic learning model of Haussler [Hau92] and Kearns et al. [KSS94], where the goal is to learn a labeling function whose agreement with some underlying target function is close to the best possible, among all functions in some given class. In the even more challenging malicious noise model [Val85, KL93], an adversary is allowed to corrupt both the labels and the samples. A major difference with our setting is that these models apply to supervised learning problems, while here we will work in an unsupervised setting. Within statistics and machine learning, inference problems like Question 1.1 are often termed “estimation under model misspecification”. The usual prescription is to use the maximum likelihood estimator [Hub67, Whi82], which is unfortunately hard to compute in general. Even ignoring computational considerations, the maximum likelihood estimator is only guaranteed to converge to the distribution P ′ in D that is closest (in Kullback-Leibler divergence) to the distribution from which the observations are generated. This is problematic because such a distribution is not necessarily close to P at all. A branch of statistics – called robust statistics [HR09, HRRS86] – aims to tackle questions like the one above. The usual formalization is in terms of breakdown point, which (informally) is the fraction of observations that an adversary would need to control to be able to completely corrupt an estimator. In lowdimensions, this leads to the prescription that one should use the empirical median instead of the empirical mean to robustly estimate the mean of a distribution, and interquartile range for robust estimates of the variance. In high-dimensions, the Tukey depth [Tuk75] is a high-dimensional analogue of the median that, although provably robust, is hard to compute [JP78]. Similar hardness results have been shown [Ber06, HM13] for essentially all known estimators in robust statistics. Is high-dimensional agnostic distribution learning even possible, algorithmically? The difficulty is that corruptions are often hard to detect in high dimensions, and could bias the natural estimator by dimensiondependent factors. In this work, we study agnostic distribution learning for a number of fundamental classes of distributions: (1) a single Gaussian, (2) a product distribution on the hypercube, (3) mixtures of two product distributions (under a natural balancedness condition), and (4) mixtures of k Gaussians with spherical covariances. Prior to our work, all known efficient algorithms (e.g. [LT15, BD15]) for these classes required the error guarantee, f (ε, d), to depend polynomially in the dimension d. Hence, previous efficient estimators could only tolerate at most a 1/ poly(d) fraction of errors. In this work, we obtain the first efficient algorithms for the aforementioned problems, where f (ε, d) is completely independent of d and depends 1 polynomially (often, nearly linearly) in the fraction ε of corrupted samples. Our work is just a first step in this direction, and there are many exciting questions left to explore. 1.2 Our Techniques All of our algorithms are based on a common recipe. The first question to address is the following: Even if we were given a candidate hypothesis P ′ , how could we test if it is ε-close in total variation distance to P ? The usual way to certify closeness is to exhibit a coupling between P and P ′ that marginally samples from both distributions, where the samples produced from each agree with probability 1 − ε. However, we have no control over the process by which samples are generated from P , in order to produce such a coupling. And even then, the way that an adversary decides to corrupt samples can introduce complex statistical dependencies. We circumvent this issue by working with an appropriate notion of parameter distance, which we use as a proxy for the total variation distance between two distributions in the class D. Various notions of parameter distance underly several efficient algorithms for distribution learning in the following sense. If θ and θ ′ are two sets of parameters that define distributions Pθ and Pθ′ in a given class D, a learning algorithm often relies on establishing the following type of relation1 between dTV (Pθ , Pθ′ ) and the parameter distance dp (θ, θ ′ ): (1) poly(dp (θ, θ ′ ), 1/d) ≤ dTV (Pθ , Pθ′ ) ≤ poly(dp (θ, θ ′ ), d) . Unfortunately, in our agnostic setting, we cannot afford for (1) to depend on the dimension d at all. Any such dependence would appear in the error guarantee of our algorithm. Instead, the starting point of our algorithms is a notion of parameter distance that satisfies poly(dp (θ, θ ′ )) ≤ dTV (Pθ , Pθ′ ) ≤ poly(dp (θ, θ ′ )) (2) which allows us to reformulate our goal of designing robust estimators, with distribution-independent error guarantees, as the goal of robustly estimating θ according to dp . In several settings, the choice of the parameter distance is rather straightforward. It is often the case that some variant of the ℓ2 -distance between the parameters works2 . Given our notion of parameter distance satisfying (2), our main ingredient is an efficient method for robustly estimating the parameters. We provide two algorithmic approaches which are based on similar principles. Our first approach is faster, requiring only approximate eigenvalue computations. Our second approach relies on convex programming and achieves much better sample complexity, in some cases matching the information-theoretic limit. Notably, either approach can be used to give all of our concrete learning applications with nearly identical error guarantees. In what follows, we specialize to the problem of robustly learning the mean µ of a Gaussian whose covariance is promised to be the identity, which we will use to illustrate how both approaches operate. We emphasize that what is needed to learn the parameters in more general settings requires many additional ideas. Our first algorithmic approach is an iterative greedy method that, in each iteration, filters out some of the corrupted samples. Given a set of samples S ′ that contains a set S of uncorrupted samples, an iteration of our algorithm either returns the sample mean of S ′ or finds a filterPthat allows us to efficiently compute a set S ′′ ⊂ S ′ that is much closer to S. Note the sample mean µ b= N i=1 (1/N )Xi (even after we remove 1 For example, the work of Kalai et al. [KMV10] can be reformulated as showing that for any pair of mixtures of two Gaussians (with suitably bounded parameters), the following quantities are polynomially related: (1) discrepancy in their low-order moments, (2) their parameter distance, and (3) their total variation distance. This ensures that any candidate set of parameters that produce almost identical moments must itself result in a distribution that is close in total variation distance. 2 This discussion already points to why it may be challenging to design agnostic algorithms for mixtures of arbitrary Gaussians or arbitrary product distributions: It is not clear what notion of parameter distance is polynomially related to the total variation distance between two such mixtures, without any dependence on d. 2 √ points that are obviously outliers) can be Ω(ε d)-far from the true mean in ℓ2 -distance. The filter approach shows that either the sample mean is already a good estimate for µ or else there is an elementary spectral test that rejects some of the corrupted points and almost none of the uncorrupted ones. The crucial observation is that if a small number of corrupted points are responsible for a large change in the sample mean, it must be the case that many of the error points are very far from the mean in some particular direction. Thus, we obtain our filter by computing the top absolute eigenvalue of a modified sample covariance matrix. Our second algorithmic approach relies on convex programming. Here, instead of rejecting corrupted samples, PNwe compute appropriate weights wi for the samples Xi , so that the weighted empirical average µ bw = i=1 wi Xi is close to µ. We work with the convex set: Cδ =  wi | 0 ≤ wi ≤ 1/((1 − ε)N ), N P wi = 1, i=1 N P i=1 T wi (Xi − µ)(Xi − µ) − I 2 ≤δ  . P We prove that any set of weights in Cδ yields a good estimate µ bw = N i=1 wi Xi in the obvious way. The catch is that the set Cδ is defined based on µ, which is unknown. Nevertheless, it turns out that we can use the same types of spectral arguments that underly the filtering approach to design an approximate separation oracle for Cδ . Combined with standard results in convex optimization, this yields an algorithm for robustly estimating µ. The third and final ingredient is some new concentration bounds. In both of the approaches above, at best we are hoping that we can remove all of the corrupted points and be left with only the uncorrupted ones, and then use standard estimators (e.g., the empirical average) on them. However, an adversary could have removed an ε-fraction of the samples in a way that biases the empirical average of the remaining uncorrupted samples. What we need are concentration bounds that show for sufficiently large N , for samples X1 , X2 , . . . , XN from a Gaussian with mean µ and identity covariance, that every (1 − ε)N set of samples produces a good estimate for µ. In some cases, we can derive such concentration bounds by appealing to known concentration inequalities and taking a union bound. However, in other cases (e.g., concentration bounds for degree two polynomials of Gaussian random variables) the existing concentration bounds are not strong enough, and we need other arguments to prove that every set of (1 − ε)N samples produces a good estimate. 1.3 Our Results We give the first efficient algorithms for agnostically learning several important distribution classes with dimension-independent error guarantees. Our first main result is for a single arbitrary Gaussian with mean µ and covariance Σ, which we denote by N (µ, Σ). In the previous subsection, we described our convex programming approach for learning the mean vector when the covariance is promised to be the identity. A technically more involved version of the technique can handle the case of zero mean and unknown covariance. More specifically, consider the following convex set, where Σ is the unknown covariance matrix:  N   N P −1/2 P T −1/2 Cδ = wi | 0 ≤ wi ≤ 1/((1 − ε)N ), wi = 1, Σ wi Xi Xi Σ −I ≤δ . i=1 i=1 F We design an approximate separation oracle for this unknown convex set, by analyzing the spectral properties of the fourth moment tensor of a Gaussian. Combining these two intermediate results, we obtain our first e (d, ε, τ )) when remain result (below). Throughout this paper, we will abuse notation and write N ≥ Ω(f ferring to our sample complexity, to signify that our algorithm works if N ≥ Cf (d, ε, τ )polylog(f (d, ε, τ )) for a large enough universal constant C. 3 Theorem 1.2. Let µ, Σ be arbitrary and unknown, and let ε, τ > 0. There is a polynomial  3 2 time  algorithm d log 1/τ e which given ε, τ, and an ε-corrupted set of N samples from N (µ, Σ) with N ≥ Ω , produces µ b ε2 b so that with probability 1 − τ we have dTV (N (µ, Σ), N (b b ≤ O(ε log 3/2 (1/ε)). and Σ µ, Σ)) We can alternatively establish Theorem 1.2 with a slightly worse sample complexity via our filtering technique. See Section 8. Our second agnostic learning result is for a product distribution on the hypercube – arguably the most fundamental discrete high-dimensional distribution. We solve this problem using our filter technique, though our convex programming approach would also yield similar results. We start by analyzing the balanced case, when no coordinate is very close to being deterministic. This special case is interesting in its own right and captures the essential ideas of our more involved analysis for the general case. The reason is that, for two balanced product distributions, the ℓ2 -distance between their means is equivalent to their total variation distance (up to a constant factor). This leads to a clean and elegant presentation of our spectral arguments. For an arbitrary product distribution, we handle the coordinates that are essentially deterministic separately. Moreover, we use the χ2 -distance between the means as the parameter distance and, as a consequence, we need to apply the appropriate corrections to the covariance matrix. Formally, we prove: Theorem 1.3. Let Π be an unknown binary product distribution, and let ε, τ > 0. There time   6is a polynomial d log(1/τ ) , produces algorithm which given ε, τ, and an ε-corrupted set of N samples from Π with N ≥ Ω ε3 p e so that with probability 1 − τ , we have dTV (Π, Π) e ≤ O( ε log 1/ε). a binary product distribution Π For the sake of simplicity in the presentation, we did not make an effort to optimize the sample complexity of our robust estimators. We also p remark that for the case of balanced binary product distributions, our algorithm achieves an error of O(ε log(1/ε)). Interestingly enough, the above two distribution classes are trivial to learn in the noiseless case, but in the agnostic setting the learning problem turns out to be surprisingly challenging. Using additional ideas, we are able to generalize our agnostic learning algorithms to mixtures of the above classes under some natural conditions. We note that learning mixtures of the above families is rather non-trivial even in the noiseless case. First, we study 2-mixtures of c-balanced products, which stipulates that the coordinates of the mean vector of each component are in the range (c, 1 − c). We prove: Theorem 1.4 (informal). Let Π be an unknown mixture of two c-balanced binary product distribution, and let ε, τ > 0. There is a polynomial  time algorithm which given ε, τ, and an ε-corrupted set of N samples d4 log 1/τ e so that with from Π with N ≥ Ω , produces a mixture of two binary product distributions Π ε13/6 e ≤ Oc (ε1/6 ). probability 1 − τ , we have dTV (Π, Π) This generalizes the algorithm of Freund and Mansour [FM99] to the agnostic setting. An interesting open question is to improve the ε-dependence in the above bound to (nearly) linear, or to remove the assumption of balancedness and obtain an agnostic algorithm for mixtures of two arbitrary product distributions. Finally, we give an agnostic learning algorithm for mixtures of spherical Gaussians. Theorem 1.5. Let M be a mixture of k Gaussians with spherical covariances, and let ε, τ > 0 and k be a constant. There is a polynomial time (for constant k) algorithm which given ε, τ , and an ε-corrupted set of N samples from M with N ≥ poly(k, d, 1/ε, log(1/τ )), outputs an M′ so that with probability 1 − τ , we √ have dTV (M, M′ ) ≤ Õ(poly(k) · ε). Our agnostic algorithms for (mixtures of) balanced product distributions and for (mixtures of) spherical Gaussians are conceptually related, since in both cases the goal is to robustly learn the means of each component with respect to ℓ2 -distance. 4 In total, these results give new robust and computationally efficient estimators for several well-studied distribution learning problems that can tolerate a constant fraction of errors independent of the dimension. This points to an interesting new direction of making robust statistics algorithmic. The general recipe we have developed here gives us reason to be optimistic about many other problems in this domain. 1.4 Discussion and Related Work Our results fit in the framework of density estimation and parameter learning which are both classical problems in statistics with a rich history (see e.g., [BBBB72, DG85, Sil86, Sco92, DL01]). While these problems have been studied for several decades by different communities, the computational complexity of learning is still not well understood, even for some surprisingly simple distribution families. Most textbook estimators are hard to compute in general, especially in high-dimensional settings. In the past few decades, a rich body of work within theoretical computer science has focused on designing computationally efficient distribution learning algorithms. In a seminal work, Kearns et al. [KMR+ 94] initiated a systematic investigation of the computational complexity of distribution learning. Since then, efficient learning algorithms have been developed for a wide range of distributions in both low and high-dimensions [Das99, FM99, AK01, VW02, CGG02, MR05, BV08, KMV10, MV10, BS10, DDS12a, DDS12b, CDSS13, DDO+ 13, CDSS14a, CDSS14b, HP15, ADLS15, DDS15b, DDKT16, DKS15, DKS16]. We will be particularly interested in efficient learning algorithms for mixtures of high-dimensional Gaussians and mixtures of product distributions, as this is the focus of our algorithmic results in the agnostic setting. In a pioneering work, Dasgupta [Das99] introduced the problem of parameter estimation of a Gaussian mixture to theoretical computer science, and gave the first provably efficient algorithms under the assumption that the components are suitably well-separated. Subsequently, a number of works improved these separation conditions [AK01, VW02, BV08] and ultimately removing them entirely [KMV10, MV10, BS10]. In another line of work, Freund and Mansour [FM99] gave the first polynomial time algorithm for properly learning mixtures of two binary product distributions. This algorithm was substantially generalized to phylogenetic trees [CGG02] and to mixtures of any constant number of discrete product distributions [FOS05]. Given the vast body of work on high-dimensional distribution learning, there is a plethora of problems where one could hope to reconcile robustness and computational efficiency. Thus far, the only setting where robust and efficient algorithms are known is on one-dimensional distribution families, where brute-force search or some form of polynomial regression often works. In contrast, essentially nothing is known about efficient agnostic distribution learning in the high-dimensional setting that we study here. Question 1.1 also resembles learning in the presence of malicious errors [Val85, KL93]. There, an algorithm is given samples from a distribution along with their labels according to an unknown target function. The adversary is allowed to corrupt an ε-fraction of both the samples and their labels. A sequence of works studied this problem for the class of halfspaces [Ser01, Ser03, KLS09] in the setting where the underlying distribution is a Gaussian, culminating in the work of Awasthi et al. [ABL14], who gave an efficient algorithm that finds a halfspace with agreement O(ε). Our work and theirs are not directly comparable, since we work in an unsupervised setting. Moreover, their algorithms need to assume that the underlying Gaussian distribution is in isotropic position. In fact, our results are complementary to theirs: One could use our algorithms (on the unlabeled examples) to learn an affine transformation that puts the underlying Gaussian distribution in approximately isotropic position, even in the presence of malicious errors, so that one can then directly apply the [ABL14] algorithm. Another connection is to the work on robust principal component analysis (PCA). PCA is a transformation that (among other things) is often justified as being able to find the affine transformation Y = Σ−1/2 (X − µ) that would place a collection of Gaussian random variables in isotropic position. One can think of our results on agnostically learning a Gaussian as a type of robust PCA that tolerates gross corruptions, where entire samples are corrupted. This is different than other variants of the problem where random 5 sets of coordinates of the points are corrupted [CLMW11], or where the uncorrupted points were assumed to lie in a low-dimensional subspace to begin with [ZL14, LMTZ12]. Finally, Brubaker [Bru09] studied the problem of clustering samples from a well-separated mixture of Gaussians in the presence of adversarial noise. The goal of [Bru09] was to separate the Gaussian components from each other, while the adversarial points are allowed to end up in any of clusters. Our work is orthogonal to [Bru09], since even if such a clustering is given, the problem still remains to estimate the parameters of each component. 1.5 Organization The structure of this paper is as follows: In Section 2, we introduce basic notation and a number of useful facts that will be required throughout the paper, as well as the formal definition of our adversary model. In Section 3, we discuss several natural approaches to high-dimensional agnostic learning, all of which lose polynomial factors that depend on the dimension, in terms of their error guarantee. The main body of the paper is in Sections 4–8. Sections 4 and 5 illustrate our convex programming framework, while Sections 6–8 illustrate our filter framework. More specifically, in Section 4 we apply our convex programming framework to a single Gaussian with unknown mean and unknown covariance. In Section 5, we generalize these techniques to obtain an agnostic algorithm for mixtures of spherical Gaussians with unknown means. In Section 6, we apply our filter techniques to a binary product distribution. In Section 7 we generalize the techniques of Section 6 to obtain an agnostic learning algorithm for a mixture of two balanced binary product distributions. Finally, in Section 8 we apply our filter technique to obtain an alternate agnostic learning algorithm for a single Gaussian with unknown mean and unknown covariance. We note that for some of the more advanced applications of our frameworks, the technical details can get in the way of the fundamental ideas. For the reader who is interested in seeing the details of our most basic application of the convex programming framework, we recommend reading the case a Gaussian with unknown mean, in Section 4.3. Similarly, for the filter framework, we suggest either the balanced product distribution in Section 6.1 or the Gaussian with unknown mean in Section 8.1. 2 Preliminaries 2.1 Types of Adversaries In this paper, we will consider a powerful model for agnostic distribution learning that generalizes many other existing models. The standard setup involves an oblivious adversary who chooses a distribution that is close in total variation distance to an unknown distribution in some class D. Definition 2.1. Given ε > 0 and a class of distributions D, the oblivious adversary chooses a distribution P so that there is an unknown distribution D ∈ D with dTV (P, D) ≤ ε. An algorithm is then given m independent samples X1 , X2 , . . . , Xm from P . b in D, where dTV (D, D) b is small. The goal of the algorithm is to return the parameters of a distribution D We refer to the above adversary as oblivious because it fixes the model for noise before seeing any of the samples. In contrast, a more powerful adversary is allowed to inspect the samples before corrupting them, both by adding corrupted points and deleting uncorrupted points. We refer to this as the full adversary: Definition 2.2. Given ε > 0, and a class of distributions D, the full adversary operates as follows: The algorithm specifies some number of samples m. The adversary generates m samples X1 , X2 , . . . , Xm from some (unknown) distribution D ∈ D. It then draws m′ from an appropriate distribution. This distribution is allowed to depend on X1 , X2 , . . . , Xm , but when marginalized over the m samples satisfies m′ ∼ Bin(ε, m). 6 The adversary is allowed to inspect the samples, and removes m′ of them, and replaces them with arbitrary points. The set of m points is given (in any order) to the algorithm. We remark that there are no computational restrictions on the adversary. As before, the goal is to return b in D, where dTV (D, D) b is small. The reason we allow the draw m′ to the parameters of a distribution D depend on the samples X1 , X2 , . . . , Xm is because our algorithms will tolerate this extra generality, and it will allow us to show that the full adversary is at least as strong as the oblivious adversary (this would not necessarily be true if m′ were sampled independently from Bin(ε, m)). We rely on the following well-known fact: Fact 2.3. Let P, D be two distributions so that dTV (P, D) = ε. Then there are distributions N1 and N2 so that (1 − ε1 )P + ε1 N1 = (1 − ε2 )D + ε2 N2 , where ε1 + ε2 = ε. Now we can describe how the full adversary can corrupt samples from D to get samples distributed according to P . Claim 2.4. The full adversary can simulate any oblivious adversary. Proof. We draw m samples X1 , X2 , . . . , Xm from D. We delete each sample Xi independently with probability ε2 and replace it with an independent sample from N2 . This gives a set of samples Y1 , Y2 , . . . , Ym that are independently sampled from (1 − ε2 )D + ε2 N2 . Since the distributions (1 − ε1 )P + ε1 N1 and 1 − ε2 )D + ε2 N2 are identical, we can couple them to independent samples Z1 , Z2 , . . . , Zm from (1 − ε1 )P + ε1 N1 . Now each sample Zi that came from N1 , we can delete and replace with an independent sample from P . The result is a set of samples that are independently sampled from P where we have made m′ edits and marginally m′ ∼ Bin(ε1 + ε2 , m), although m′ has and needs to have some dependence on the original samples from D. The challenge in working with the full adversary is that even the samples that came from D can have biases. The adversary can now choose how to remove uncorrupted points in a careful way so as to compensate for certain other biases that he introduces using the corrupted points. Throughout this paper, we will make use of the following notation and terminology: Definition 2.5. We say a a set of samples X1 , X2 , . . . , Xm is an ε-corrupted set of samples generated by the oblivious (resp. full) adversary if it is generated by the process described above in the definition of the oblivious (resp. full) adversary. If it was generated by the full adversary, we let G ⊆ [m] denote the indices of the uncorrupted samples, and we let E ⊆ [m] denote the indices of the corrupted samples. In this paper, we will give a number of algorithms for agnostic distribution learning that work in the full adversary model. In our analysis, we will identify a set of events that ensure the algorithm succeeds and will bound the probability that any of these events does not occur when m is suitably large. We will often explicitly invoke the assumption that |E| ≤ 2εm. We can do this even though the number  that are  of points log 1/τ , we know corrupted is itself a random variable, because by the Chernoff bound, as long as m ≥ O ε that |E| ≤ 2εm holds with probability at least 1 − O(τ ). Thus, making the assumption that |E| ≤ 2εm costs us an additional additive O(τ ) term in our union bound, when bounding the failure probability of our algorithms. 2.2 Basic Notation Throughout this paper, if v is a vector, we will let kvk2 denote its Euclidean norm. If M is a matrix, we will let kM k2 denote its spectral norm, and kM kF denote its Frobenius norm. For a discrete distribution P , we will denote by P (x) the probability mass at point x. For a continuous distribution, let it denote the probability density function at x. Let S be a multiset over {0, 1}d . We will write X ∈u S to denote that X is drawn from the empirical distribution defined by S. 7 2.3 Distributions of Interest One object of study in this paper is the Gaussian (or Normal) distribution. Definition 2.6. A Gaussian distribution N (µ, Σ) with mean µ and covariance Σ is the distribution with probability density function   1 T −1 −d/2 1/2 f (x) = (2π) |Σ| exp − (x − µ) Σ (x − µ) . 2 We will also be interested in binary product distributions. Definition 2.7. A (binary) product distribution is a probability distribution over {0, 1}d whose coordinate random variables are independent. Note that a binary product distribution is completely determined by its mean vector. We will also be interested in mixtures of such distributions. Definition 2.8. A mixture P of distributions P1 , . . . , Pk with mixing weights α1 , . . . , αk is the distribution defined by X P (x) = αj Pk (x), where αj ≥ 0 for all j and P j∈[k] j∈[k] αj = 1. 2.4 Agnostic Hypothesis Selection Several of our algorithms will return a polynomial-sized list of hypotheses at least one of which is guaranteed to be close to the target distribution. Usually (e.g. in a non-agnostic setting), one could use a polynomial number of additional samples to run a tournament to identify the candidate hypothesis that is (roughly) the closest to the target distribution. In the discussion that follows, we will refer to these additional samples as test samples. Such hypothesis selection algorithms have been extensively studied [Yat85, DL96, DL97, DL01, DK14, AJOS14, SOAJ14, DDS15a, DDS15b]. Unfortunately, against a strong adversary we run into a serious technical complication: the training samples and test samples are not necessarily independent. Moreover even if we randomly partition our samples in training and test, a priori there are an unbounded set of possible hypotheses that the training phase could output, and when we analyze the tournament we cannot condition on the list of hypotheses and assume that the test samples are sampled anew. Our approach is to require our original algorithm to return only hypotheses from some finite set of possibilities, and as we will see this mitigates the problem. Lemma 2.9. Let C be a class of probability distributions. Suppose that for some N, ε, τ > 0 there exists a polynomial time algorithm that given N independent samples from some Π ∈ C, of which up to a 2ε-fraction have been arbitrarily corrupted, returns a list of M distributions whose probability density functions are explicitly computable and which can be effectively sampled from so that with 1 − τ /2 probability there exists a Π′ ∈ M with dTV (Π′ , Π) < δ. Suppose furthermore that the distributions returned by this algorithm are all in some fixed set M. Then there exists another polynomial time algorithm, which given O(N + (log(|M|) + log(1/τ ))/ε2 ) samples from Π, an ε-fraction of which have been arbitrarily corrupted, returns a single distribution Π′ so that with 1 − τ probability dTV (Π′ , Π) < O(δ + ε). Proof. Firstly, we randomly choose a subset of N of our samples and a disjoint subset of C(log(|M|) + log(1/τ ))/ε2 of our samples for some sufficiently large C. Note that with high probability over our randomization, at most a 2ε-fraction of samples from each subset are corrupted. Thus, we may instead consider the stronger adversary who sees a set S1 of N independent samples from Π and another set, S2 , of 8 C(log(|M|) + log(1/τ ))/ε2 samples from Π and can arbitrary corrupt a 2ε-fraction of each, giving sets S1′ ,S2′ . With probability at least 1 − τ /2 over S1 , the original algorithm run on S1′ returns a set M satisfying the desired properties. For two distributions P and Q in M we let AP Q be the set of inputs x where PrP (x) > PrQ (x). We note that we can test membership in AP Q as, by assumption, the probability density functions are computable. We also note that dTV (P, Q) = PrP (AP Q ) − PrQ (AP Q ). Our tournament will depend on the fact that if P is close to the target and Q is far away, that many samples will necessarily lie in AP Q . We claim that with probability at least 1 − τ /2 over the choice of S2 , we have that for any P, Q ∈ M that Pr (x ∈ AP Q ) = Pr (x ∈ AP Q ) + O(ε). x∈u S2 x∼Π This follows by Chernoff bounds and a union bound over the |M|2 possibilities for P and Q. Since the total variational distance between the uniform distributions over S2 and S2′ is at most 2ε, we also have for S2′ that Pr (x ∈ AP Q ) = Pr (x ∈ AP Q ) + O(ε). x∈u S2′ x∼Π Suppose that dTV (P, Π) < δ and dTV (Q, Π) > 5δ + Cε. We then have that Pr (x ∈ AP Q ) = Pr (x ∈ AP Q ) + O(ε) ≥ Pr (x ∈ AP Q ) + O(ε) − δ ≥ Pr (x ∈ AP Q ) + δ + Cε/5. x∈u S2′ x∼Π x∼P x∼Q On the other hand, if dTV (Π, Q) < δ then Pr (x ∈ AP Q ) = Pr (x ∈ AP Q ) + O(ε) < Pr (x ∈ AP Q ) + δ + Cε/5. x∈u S2′ x∼Π x∼Q Therefore, if we throw away any Q in our list for which there is a P in our list so that Pr (x ∈ AP Q ) ≥ Pr (x ∈ AP Q ) + δ + Cε/5, x∈u S2′ x∼Q we have thrown away all the Q with dTV (Q, Π) > 5δ + Cε, but none of the Q with dTV (Q, Π) < δ. Therefore, there will be a Q remaining, and returning it will yield an appropriate Π′ . 2.5 Bounds on TV Distance The Kullbeck-Liebler divergence (also known as relative entropy, information gain, or information divergence) is a well-known measure of distance between two distributions. Definition 2.10. Let P, Q be two probability distributions on Rd . Then the KL divergence between P and Q, denoted dKL (P kQ), is defined as Z dP log dKL (P kQ) = dP . dQ d R The primary interest we have in this quantity is the fact that (1) the KL divergence between two Gaussians has a closed form expression, and (2) it can be related (often with little loss) to the total variation distance between the Gaussians. The first statement is expressed in the fact below: Fact 2.11. Let N (µ1 , Σ1 ) and N (µ2 , Σ2 ) be two Gaussians so that det(Σ1 ), det(Σ2 ) 6= 0. Then    det(Σ1 ) 1 −1 T −1 tr(Σ2 Σ1 ) + (µ2 − µ1 ) Σ2 (µ2 − µ1 ) − d − ln . dKL (N (µ1 , Σ1 )||N (µ2 , Σ2 )) = 2 det(Σ2 ) (3) 9 The second statement is encapsulated in the well-known Pinsker’s inequality: Theorem 2.12 (Pinsker’s inequality). Let P, Q be two probability distributions over Rd . Then, r 1 dTV (P, Q) ≤ dKL (P, Q) . 2 With this, we can show the following two useful lemmas, which allow us to relate parameter distance between two Gaussians to their total variation distance. The first bounds the total variation distance between two Gaussians with identity covariance in terms of the Euclidean distance between the means: Corollary 2.13. Let µ1 , µ2 ∈ Rd be arbitrary. Then dTV (N (µ1 , I), N (µ2 , I)) ≤ 21 kµ2 − µ1 k2 . Proof. In the case where Σ1 = Σ2 = I, (3) simplifies to 1 dKL (N (µ1 , I), N (µ2 , I)) = kµ2 − µ1 k22 . 2 Pinsker’s inequality (Theorem 2.12) then implies that r 1 1 dKL (N (µ1 , I), N (µ2 , I)) = kµ2 − µ1 k2 , dTV (N (µ1 , I), N (µ2 , I)) ≤ 2 2 as desired. The second bounds the total variation distance between two mean zero Gaussians in terms of the Frobenius norm of the difference between their covariance matrices: −1/2 Corollary 2.14. Let δ > 0 be sufficiently small. Let Σ1 , Σ2 so that kI − Σ2 −1/2 Σ1 Σ2 kF = δ. Then, dTV (N (0, Σ1 ), N (0, Σ2 )) ≤ O(δ) . −1/2 Proof. Let M = Σ2 −1/2 Σ1 Σ2 . Then (3) simplifies to dKL (N (µ1 , Σ1 )||N (µ2 , Σ2 )) = 1 (tr(M ) − d − ln det(M )) . 2 Since both terms in the last line are rotationally invariant, we may assume without loss of generality that M is diagonal. Let M between the two distributions is P= diag(1 + λ1 , . . . , 1 + λd ). Thus, the KL divergenceP given exactly by di=1 λi − log(1 + λi ), where we are guaranteed that ( di=1 λ2i )1/2 = δ. By the linear approximation to ln(1 + x), for x small, we have that for δ sufficiently small, ! d d X X λ2i = Θ(δ2 ) . λi − log(1 + λi ) = Θ i=1 i=1 Thus, we have shown that for δ sufficiently small, dKL (N (µ1 , Σ1 )||N (µ2 , Σ2 )) ≤ O(δ2 ). The result now follows by an application of Pinsker’s inequality (Theorem 2.12). Our algorithm for agnostically learning an arbitrary Gaussian will be based on solving two intermediate problems: (1) We are given samples from N (µ, I) and our goal is to learn µ, and (2) We are given samples from N (0, Σ) and our goal is to learn Σ. The above bounds on total variation distance will allow us to conclude that our estimate is close in total variation distance to the unknown Gaussian distribution in each of the two settings. We will also need the following lemma, bounding the total variation distance between two product distributions by the chi-squared distance between the corresponding mean vectors. 10 Lemma 2.15. Let P, Q be binary product distributions with mean vectors p, q ∈ (0, 1)d . We have that d2TV (P, Q) ≤ 2 d X i=1 (pi − qi )2 . (pi + qi )(2 − pi − qi ) The proof is deferred to Section A. 2.6 Miscellaneous Lemmata We will frequently use the following version of the Chernoff bound: Theorem 2.16. Let Z1 , . . . , Zn be independent random variables with Zi supported on [ai , bi ]. Let Z = P d i=1 Zi . Then for any T > 0, ! −2T 2 Pr(|Z − E[Z]| > T ) ≤ 2 exp Pd . 2 i=1 (bi − ai ) 3 Some Natural Approaches, and Why They Fail Many of the agnostic distribution learning problems that we study are so natural that one would immediately wonder why simpler approaches do not work. Here we detail some other plausible approaches, and what causes them to lose dimension-dependent factors (if they have any guarantees at all!). For the discussion that follows, we note that by Fact 2.13 in order to achieve an estimate that is O(ε)-close in total variation distance (for a Gaussian when µ is unknown and Σ = I) it is necessary and sufficient that kµ̂ − µk2 = O(ε). Learn Each Coordinate Separately One plausible approach for agnostic learning in high dimensions is to agnostically learn along each coordainate separately. For instance, if our goal is to agnostically learn the mean of a Gaussian with known covariance I, we could try to learn each coordinate of the mean separately. But since a ε-fraction √ of the samples are corrupted, our estimate can be off by ε in each coordinate and would be off by ε d in high dimensions. Maximum Likelihood Given a set of samples X1 , . . . , XN , and a classQof distributions D, the maximum likelihood estimator (MLE) is the distribution F ∈ D that maximizes m i=1 F (Xi ). Equivalently, F minimizes the negative log likelihood (NLL), which is given by NLL(F, X1 , . . . , XN ) = − N X log F (Xi ) . i=1 d In particular, if D = {N (µ, I) : µ ∈ R } is the set of Gaussians with unknown mean and identity covariance, we see that for any µ ∈ Rd , the NLL of the set of samples is given by   N X 1 −kXi −µk22 /2 log √ e NLL(N (µ, I), X1 , . . . , XN ) = − 2π i=1 = N log N √ 1X kXi − µk22 , 2π + 2 i=1 11 and so the µ which minimizes NLL(N (µ, I), X1 , . . . , XN ) is the mean of the samples X Pi ,Nsince for any set of vectors v1 , . . . , vN , the average of the vi ’s is the minimizer of the function h(x) = i=1 kvi − xk22 . Hence if an adversary places an ε-fraction of the points at some very large distance, then the estimate for the mean would need to move considerably in that direction. By placing the corruptions further and further away, the MLE can be an arbitrarily bad estimate. Hence even though it is well known [Hub67, Whi82] that the MLE converges to the distribution F ∈ D that is closest in KL-divergence to the distribution from which our samples were generated (i.e. after the adversary has added corruptions), F is not necessarily close to the uncorrupted distribution. Geometric Median In one dimension, it is well-known that the median provides a provably robust estimate for the mean in aPnumber of settings. The mean of a set of points a1 , . . . , aN is the minimizer of thePfunction f (x) = N N 2 i=1 (ai − x) , and in contrast the median is the minimizer of the function f (x) = i=1 |ai − x|. In higher dimensions, there are many natural definitions for the median that generalize the one-dimensional case. The Tukey median is one such notion, but as we discussed it is hard to compute [JP78] and the best known algorithms run in time exponential in d. Motivated by this, the geometric median is another highdimensional notion of a median. It often achieves better robustness than the mean, and can be computed quickly [CLM+ 16]. The formal definition is: X med(S) , min kx − vk2 . v x∈S Next, we show that the geometric median also does not give dimension independent error guarantees for learning the mean of a Gaussian with known covariance. Suppose we have a set S1 of (1 − ε)N samples from N (0, I) and a set S2 of εN samples ∈ {0, 1}d . Each element x ∈ S2 is generated independently by choosing a random set Qx ⊂ [d] of cardinality d/2 and setting xi = 1 if i ∈ Qx , and 0 otherwise. Call this distribution D. P Let f (v) = x∈S1 ∪S2 kxj − vk2 , and let v ∗ be the value which minimizes this function, which is also the geometric median of this set of points. We know that the gradient is 0 at this point, and thus, for all i, √ (∇f (v ∗ ))i = 0. Assume that kv ∗ k2 ≤ ε, where we set ε ≥ Ω(1/ d). We will show to be a contradiction. Writing the expression for the gradient, we have (∇f (v))i = 1 X vi − x i 1 X vi − xi + . 2 kx − vk2 2 kx − vk2 x∈S1 x∈S2 We will bound each term of this in turn at v = v ∗ , assuming kv ∗ k ≤ ε. First, observe that   X 1 vi∗ 1 ∗ − vi E →0 (1 − ε)N kx − v ∗ k2 kx − v ∗ k2 x∈S1 as N → ∞ by a Chernoff bound, and by basic concentration, we have that E 12 h 1 kx−v∗ k2 i √ = Θ(1/ d), if kv ∗ k ≤ O(1). We also have X X 1 1 xi xi qP qP − d ∗ 2 (1 − ε)N (1 − ε)N ∗ 2 x∈S1 x∈S1 j6=i (xj − vj ) j=1 (xj − vj ) qP qP d ∗ 2 ∗ )2 − (x − v X j j=1 (xj − vj ) j6=i j 1 ≤ |xi | · r  P  Pd (1 − ε)N ∗ 2 ∗ 2 x∈S1 j=1 (xj − vj ) j6=i (xj − vj )   X e (1) 1 O 1 e |xi | ≤O , ≤ e (1 − ε)N d Ω(d) x∈S1 from basic Gaussian concentration. Moreover, we have X 1 qP (1 − ε)N x∈S1 xi ∗ 2 j6=i (xj − vj ) →0 as N → ∞, by another Chernoff bound. Putting these terms together, we have that     X v ∗ − xi 1 1 ∗ i e 1 + o(1) . ≤O − vi E ∗ (1 − ε)N kx − vk2 d x∼N (0,I) kx − v k2 x∈S1 Similarly, we also have that since Ex∼D [xi ] = 1/2,     1 X vi∗ − xi 1 1 ∗ e − (vi + 1/2) E ≤O + o(1) , ∗ x∼D kx − v k2 εN kx − vk2 d x∈S2  √  = Θ 1/ d . Thus, altogether we have that       1 1 1 1 ∗ ∗ ∗ 0= ∇f (v )i = vi · Θ √ + o(1) , + ε(vi + 1/2) · Θ √ +O (1 − ε)N d d d √ which we see is impossible for our choice of ε ≥ Ω(1/ d) unless |vi∗ | = Ω(ε). In particular, this means that √ ∗ each coordinate of the geometric median must be at least Ω(ε), and so kv k2 ≥ Ω(ε d), which contradicts our original assumption. This finishes the analysis. and moreover, Ex∼D h 1 kx−v∗ k2 i 4 Agnostically Learning a Gaussian, via Convex Programming e In this section we give a polynomial time algorithm to agnostically learn a single Gaussian up to error O(ε). Our approach is based on the following ingredients: First, in Section 4.1, we define the set SN,ε , which will be a key algorithmic object in our framework. In Section 4.2 we give key, new concentration bounds on certain statistics of Gaussians. We will make crucial use of these concentration bounds throughout this section. In Section 4.3 we give an algorithm to agnostically learn a Gaussian with unknown mean and whose covariance is promised to be the identity via convex programming. This will be an important subroutine in our overall algorithm, and it also helps to illustrate our algorithmic approach without many of the additional complications that arise in our later applications. In Section 4.4 we show how to robustly learn a Gaussian with mean zero and unknown covariance again via convex programming. Finally, in Section 4.5 we show how to combine these two intermediate results to get our overall algorithm. 13 4.1 The Set SN,ε An important algorithmic object for us will be the following set: Definition 4.1. For any 21 > ε > 0 and any integer N , let  X Sm,ε = (w1 , . . . , wN ) : wi = 1, and 0 ≤ wi ≤  1 , ∀i . (1 − 2ε)N Next, we motivate this definition. For any J ⊆ [N ], let wJ ∈ RN be the vector which is given by 1 for i ∈ J and wiJ = 0 otherwise. Then, observe that wiJ = |J|  SN,ε = conv wJ : |J| = (1 − 2ε)N ) , and so we see that this set is designed to capture the notion of selecting a set of (1 − 2ε)N samples from N samples. Given w ∈ SN,ε we will use the following notation X X wg = wi and wb = wi i∈G i∈E to denote the total weight on good and bad points respectively. The following facts are immediate from |E| ≤ 2εN and the properties of SN,ε . 2ε . Moreover, the renormalized weights w′ on good Fact 4.2. If w ∈ SN,ε and |E| ≤ 2εN , then wb ≤ 1−2ε wi ′ ′ points given by wi = wg for all i ∈ G, and wi = 0 otherwise, satisfy w′ ∈ SN,4ε . 4.2 Concentration Inequalities Throughout this section and in Section 5 we will make use of various concentration bounds on low moments of Gaussian random variables. Some are well-known, and others are new but follow from known bounds and appropriate union bound arguments. 4.2.1 Empirical Estimates of First and Second Moments Here we will give rates of convergence for various statistics for Gaussians with covariance matrix I that we will make use of later. First, we will require the following well-known tail bounds: Lemma4.3 ([Ver10],  Theorem 5.50). Let Yi ∼ N (0, I) be independent, for i = 1, . . . , N , where we set d+log(1/τ ) N =Ω . We have that with probability 1 − τ , δ2 N X 1 Yi YiT − I m i=1 2 ≤δ. Lemma 4.4 (folklore). With the same setup as above, with probability 1 − τ , N 1 X Yi N i=1 2 14 ≤δ. The above bounds have the property that as we take more samples, we can take δ to be arbitrarily small. We will also be interested in how well various statistics concentrate around their expectation, when we take the worst-case set of weights in SN,ε . This is more subtle because as we take more samples, any fixed statistic (e.g. taking the uniform distribution over the samples) concentrates better but the size of SN,ε (e.g. the number of sets of (1 − 2ε)N samples) grows too. We defer the proof to Section B. p Lemma 4.5. Fix ε ≤ 1/2 and τ ≤1. There is a δ1 = O(ε log 1/ε) so that if Y1 , . . . , YN are independent ) , then samples from N (0, I) and N = Ω d+log(1/τ δ12 # " m X T (4) Pr ∃w ∈ Sm,ε : wi Yi Yi − I ≥ δ1 ≤ τ . i=1 2 A nearly identical argument (Use Hoeffding instead of Bernstein in the proof of Theorem 5.50 in [Ver10]) yields: p Lemma 4.6. Fix ε and τ as above. There is aδ2 = O(ε log 1/ε) so that if Y1 , . . . , YN are independent ) , then samples from N (0, I) and N = Ω d+log(1/τ δ22 # " N X wi Yi ≥ δ2 ≤ τ . (5) Pr ∃w ∈ SN,ε : i=1 2 Note that by Cauchy-Schwarz, this implies: p Corollary 4.7. Fix ε and τ as above. There is a δ = O(ε log 1/ε) so that if Y1 , . . . , YN are independent 2   d+log(1/τ ) , then samples from N (0, I) and N ≥ Ω δ22 ! # " m X T d wi Yi v (6) ≥ δ2 kvk2 ≤ τ . Pr ∃v ∈ R , ∃w ∈ SN,ε : i=1 2 We will also require the following, well-known concentration, which says that no sample from a Gaussian deviates too far from its mean in distance. Fact p4.8. Fix τ > 0. Let X1 , . . . , XN ∼ N (0, I). Then, with probability 1 − τ , we have that kXi k2 ≤ O d log(N/τ ) for all i = 1, . . . , N . 4.2.2 Estimation Error in the Frobenius Norm Let X1 , ...XN be N i.i.d. samples from N (0, I). In this section we demonstrate a tight bound on how b denote the many samples are necessary so that the sample covariance is close to I in Frobenius norm. Let Σ empirical covariance, defined to be N X b= 1 Σ Xi XiT . N i=1 By self-duality of the Frobenius norm, we know that D E b − IkF = max b − I, U kΣ Σ kU kF =1 = max kU kF =1 m 1 X tr(Xi XiT U ) − tr(U ) . m i=1 We first state the following lemma, whose proof is deferred to Section B: 15 2 +log 1/τ ′ Lemma 4.9. Let U  0 with kU kF = 1. Then, for any τ ′ ≥ 0 and any δ ≥ 0, if N = Ω( d with probability 1 − τ ′ . δ2 ) then N 1 X tr(Xi XiT U ) − tr(U ) ≤ δ N i=1 2 Since there is a 1/4-net over all PSD matrices with Frobenius norm 1 of size 9d , the Vershynin-type union bound argument immediately gives us the following: Corollary 4.10. For any δ, τ > 0, if N =Ω  d2 + log 1/τ δ2  , b − IkF ≤ δ with probability 1 − τ . then kΣ By the same union bound technique as used in the proof of Lemma 4.5, we obtain: p Corollary 4.11. Fix ε, τ > 0. There is a δ1 = O(ε log 1/ε) so that if X1 , . . . , XN are independent samples from N (0, I), with  2  d + log 1/τ N =Ω , δ12 then " Pr ∃w ∈ SN,ε : N X i=1 wi Xi XiT − I F # ≥ δ1 ≤ τ . In fact, the proof technique there can be used to show something slightly stronger, which we will require later. The technique actually shows that if we take any set of size at most εm, and take the uniform weights over that set, then the empirical covariance is not too far away from the truth. More formally: p Corollary 4.12. Fix ε, τ > 0. There is a δ2 = O(ε log 1/ε) so that if X1 , . . . , XN are independent samples from N (0, I), with  2  d + log 1/τ N =Ω , δ22 then " X 1 Xi XiT − I Pr ∃T ⊆ [N ] : |T | ≤ εN and |T | 4.2.3 i∈T F  # N ≥ O δ2 ≤τ . |T | Understanding the Fourth Moment Tensor Our algorithms will be based on understanding the behavior of the fourth moment tensor of a Gaussian when restricted to various subspaces. Let ⊗ denote the Kronecker product on matrices. We will make crucial use of the following definition: 2 Definition 4.13. For any matrix M ∈ Rd×d , let M ♭ ∈ Rd denote its canonical flattening into a vector in 2 2 Rd , and for any vector v ∈ Rd , let v ♯ denote the unique matrix M ∈ Rd×d so that M ♭ = v. 16 We will also require the following definitions: 2 Definition 4.14. Let Ssym = {M ♭ ∈ Rd : M is symmetric}, and let S ⊆ Ssym be the subspace given by S = {v ∈ Ssym : tr(v ♯ ) = 0} , and let ΠS and ΠS ⊥ denote the projection operators onto S and S ⊥ respectively. Finally let kvkS = kΠS vk2 and kvkS ⊥ = kΠS ⊥ vk2 . 2 ×d2 Moreover, for any M ∈ Rd , let kM kS = vT M v . v∈S −{0} kvk2 sup In fact, the projection of v = A♭ onto S where A is symmetric can be written out explicitly. Namely, it is given by   tr(M ) tr(M ) M= M− I + I. d d By construction the flattening of the first term is in S and the flattening of the second term is in S ⊥ . The )| √ expression above immediately implies that kvkS ⊥ = |tr(M . d The key result in this section is the following: Theorem 4.15. Let X ∼ N (0, Σ). Let M be the d2 × d2 matrix given by M = E[(X ⊗ X)(X ⊗ X)T ]. Then, as an operator on Ssym , we have    T . M = 2Σ⊗2 + Σ♭ Σ♭ It is important to note that the two terms above are not the same; the first term is high rank, but the second term is rank one. The proof of this theorem will require Isserlis’s theorem, and is deferred to Section B. Theorem 4.16 (Isserlis’s theorem). Let a1 , . . . , ak ∈ Rd be fixed vectors. Then if X ∼ N (0, I), we have # " k Y XY hai , Xi = hai , aj i , E where the 4.2.4 PQ i=1 is over all matchings of {1, . . . , k}. Concentration of the Fourth Moment Tensor We also need to show that the fourth moment tensor concentrates: Theorem 4.17. Fix ε, τ > 0. Let Yi ∼ N (0, I) be independent, for i = 1, . . . , m, where we set   2 d + log 1/τ e , N =Ω δ32 Let Zi = Yi⊗2 . Let M4 = E[Zi ZiT ] be the canonical flattening of the true fourth moment tensor. There is a δ3 = O(ε log2 1/ε) so that if Y1 , . . . , YN , and Z1 , . . . , Zm be as above, then we have # " N X wi Zi ZiT − M4 ≥ δ3 ≤ τ . Pr ∃w ∈ Sm,ε : i=1 S 17 To do so will require somewhat more sophisticated techniques than the ones used so far to bound spectral deviations. At a high level, this is because fourth moments of Gaussians have a sufficiently larger variance that the union bound techniques used so far are insufficient. However, we will show that the tails of degree four polynomials of Gaussians still sufficiently concentrate so that removing points cannot change the mean by too much. The proof appears in Section B.1. 4.3 Finding the Mean, Using a Separation Oracle In this section, we consider the problem of approximating µ given N samples from N (µ, I) in the full adversary model. Our algorithm will be based on working with the following convex set: ) ( N X wi (Xi − µ)(Xi − µ)T − I ≤ δ . Cδ = w ∈ SN,ε : i=1 2 It is not hard to show that Cδ is non-empty for reasonable values of δ (and we will show this later). Moreover we will show that for any set of weights w in Cδ , the empirical average µ b= N X wi Xi i=1 will be a good estimate for µ. The challenge is that since µ itself is unknown, there is not an obvious way to design a separation oracle for Cδ even though it is convex. Our algorithm will run in two √ basic steps. First, it will run a very naive outlier detection to remove any points which are more than O( d) away from the good points. These points are sufficiently far away that a very basic test can detect them. Then, with the remaining points, it will use the approximate separation oracle given below to approximately optimize with respect to Cδ . It will then take the outputted set of weights and output the empirical mean with these weights. We will explain these steps in detail below. Our results will hold under the following deterministic conditions:  p d log(N/τ ) , ∀i ∈ G , (7) kXi − µk2 ≤ O X i∈G wi (Xi − µ)(Xi − µ)T − wg I X i∈G wi (Xi − µ) 2 2 ≤ δ1 ∀w ∈ SN,4ε , and (8) ≤ δ2 ∀w ∈ SN,4ε . (9) The concentration bounds we gave earlier were exactly bounds on the failure probability of either of these conditions, albeit for Sm,ε instead of Sm,4ε . 4.3.1 Naive Pruning The√first step of our algorithm will be to remove points which have distance which is much larger than O( d) from the mean. Our algorithm is very naive: it computes √ all pairwise distances between points, and throws away all points which have distance more than O( d) from more than an 2ε-fraction of the remaining points. Then we have the following fact: Fact 4.18. Suppose that (7) holds. Then NAIVE P RUNE removes points, and moreover, if Xi  p no uncorrupted d log(N/τ ) . is not removed by NAIVE P RUNE, we have kXi − µk2 ≤ O 18 Algorithm 1 Naive Pruning 1: function NAIVE P RUNE(X1 , . . . , XN ) 2: For i, j = 1, . . . , N , define δi,j = kXi − Xj k2 . 3: for i = 1, . . . , j do p 4: Let Ai = {j ∈ [N ] : δi,j > Ω( d log(N/τ ))} 5: if |Ai | > 2εN then 6: Remove Xi from the set. 7: return the pruned set of samples. Proof. That no uncorrupted point follows directly from (7) and the fact that there can be at most 2εm corrupted points. Similarly, if Xp i is not removed by NAIVE P RUNE, that means there must be an uncorrupted Xj so that kXi − Xj k2 ≤ O( d log(N/τ )). Then the desired property follows from (7) and a triangle inequality. Henceforth, for simplicity we shall assume p that no point was removed by NAIVE P RUNE, and that for all i = 1, . . . , m, we have kXi − µk2 < O( d log(m/τ )). Otherwise, we can simply work with the pruned set, and it is evident that nothing changes. 4.3.2 The Separation Oracle Our main result in this section is an approximate separation oracle for Cδ . Our first step is to show that any set of weights that does not yield a good estimate for µ cannot be in the set Cδ : P Lemma 4.19. Suppose that (8)-(9) holds. Let δ = max(δ1 , δ2 ). Let w ∈ SN,ε and set µ b= N i=1 wi Xi and ∆=µ−µ b. Further, suppose that k∆k ≥ Ω(δ). Then N X i=1 wi (Xi − µ)(Xi − µ)T − I Proof. By Fact 4.2 and (9) we have k X i∈E wi (Xi − µ) 2 P wi i∈G wg Xi 2 ≥Ω  k∆k22 ε  . − µk2 ≤ δ2 . Now by the triangle inequality we have X ≥ k∆k2 − i∈G wi (Xi − µ) − wg µ 2 ≥ Ω(k∆k2 ) Using the fact that variance is nonnegative we have X wi (Xi − µ)(Xi − µ)T  wb i∈E ! !T X wi X wi , (Xi − µ) (Xi − µ) wb wb i∈E i∈E and therefore X i∈E T wi (Xi − µ)(Xi − µ) N ≥Ω  k∆k22 wb  ≥Ω  k∆k22 ε  . On the other hand, X i∈G wi (Xi − µ)(Xi − µ)T − I 2 ≤ X i∈G wi (Xi − µ)(Xi − µ)T − wg I 19 2 + wb ≤ δ1 + wb . where in the last inequality we have used Fact 4.2 and (8). Hence altogether this implies that m X i=1 T wi (Xi − µ)(Xi − µ) − I 2 ≥Ω  k∆k22 ε  − wb − δ1 ≥ Ω  k∆k22 ε  , as claimed. As a corollary, we find that any set of weights in Cδ immediately yields a good estimate for µ: Corollary 4.20. Suppose that (8) and (9) hold. Let w ∈ Cδ for δ = O(ε log 1/ε). Then p k∆k2 ≤ O(ε log 1/ε) Our main result in this section is an approximate separation oracle for Cδ with δ = O(ε log 1/ε). Theorem 4.21. Fix ε > 0, and let δ = O(ε log 1/ε). Suppose that (8) and (9) hold. Let w∗ denote the weights which are uniform on the uncorrupted points. Then there is a constant c and an algorithm so that: 1. (Completeness) If w = w∗ , then it outputs “YES”. 2. (Soundness) If w 6∈ Ccδ , the algorithm outputs a hyperplane ℓ : Rm → R so that ℓ(w) ≥ 0 but ℓ(w∗ ) < 0. Moreover, if the algorithm ever outputs a hyperplane ℓ, then ℓ(w∗ ) < 0. These two facts imply that the ellipsoid method with this separation oracle will terminate in poly(d, 1/ε) p ′ ′ steps, and moreover with high probability output a w so that kw − w k < ε/(m d log(m/τ )), for some w ∈ Ccδ . Moreover, it will do so in polynomially many iterations. Remark 4.22. The conditions that the separation oracle given here satisfy are slightly weaker than the traditional guarantees, given, for instance, in [GLS88]. However, the correctness of the ellipsoid algorithm with this separation oracle follows because outside Ccδ , the separation oracle acts exactly as a separation oracle for w∗ . Thus, as long as the algorithm continues to query points outside of Ccδ , the action of the algorithm is equivalent to one with a separation oracle for w∗ . If The separation oracle is given in Algorithm 2. Algorithm 2 Separation oracle sub-procedure for agnostically learning the mean. 1: function S EPARATION O RACLE U NKNOWN M EAN (w, X1 , . . . , XN ) P 2: Let µ b= N i=1 wi Xi . 3: For i = 1, . . . , m, define Yi = Xi − µ b. P T 4: Let λ be the eigenvalue of largest magnitude of M = N i=1 wi Yi Yi − I 5: Let v be its associated eigenvector. 6: if |λ| < 2c δ then 7: return “YES”. 8: else if λ > 2c δ then P  N 2 − 1 − λ. 9: return the hyperplane ℓ(w) = w hY , vi i=1 i i 10: else P  N 2−1 . 11: return the hyperplane ℓ(w) = λ − w hY , vi i i i=1 Next, we prove correctness for our approximate separation oracle: 20 Proof of Theorem 4.21. Again, let ∆ = µ − µ b. By expanding out the formula for M , we get: N X wi Yi YiT i=1 −I = = N X i=1 N X i=1 = N X i=1 wi (Xi − µ + ∆)(Xi − µ + ∆)T − I wi (Xi − µ)(Xi − µ)T − I + N X i=1 wi (Xi − µ)∆T + ∆ N X i=1 wi (Xi − µ)T + ∆∆T wi (Xi − µ)(Xi − µ)T − I − ∆∆T . Let us now prove completeness. Claim 4.23. Suppose w = w∗ . Then kM k2 < 2c δ. Proof. Recall that w∗ are the weights that are uniform on the uncorrupted points. Because |E| ≤ 2εN we have that w∗ p ∈ SN,ε . We can now use (8) to conclude that w∗ ∈ Cδ1 . Now by Corollary 4.20 we have that k∆k2 ≤ O(ε log 1/ε). Thus N X i=1 wi∗ (Xi − µ)(Xi − µ)T − I − ∆∆T 2 N X ≤ i=1 wi∗ (Xi − µ)(Xi − µ)T − I 2 + k∆∆T k2 cδ . ≤ δ1 + O(ε log 1/ε) < 2 2 We now turn our attention to soundness. Claim 4.24. Suppose that w 6∈ Ccδ . Then |λ| > 2c δ. Proof. By the triangle inequality, we have N X i=1 wi (Xi − µ)(Xi − µ)T − I − ∆∆T p 2 N X ≥ i=1 wi (Xi − µ)(Xi − µ)T − I 2 − ∆∆T 2 . Let us now split into two cases. If k∆k2 ≤ cδ/10, then the firstpterm above is at least cδ by definition and we can conclude that |λ| > cδ/2. On the other hand, if k∆k2 ≥ cδ/10, by Lemma 4.19, we have that     N X k∆k22 k∆k22 2 T T − k∆k2 = Ω . (10) wi (Xi − µ)(Xi − µ) − I − ∆∆ ≥Ω ε ε i=1 2 which for sufficiently small ε also yields |λ| > cδ/2. Now by construction ℓ(w) ≥ 0. All that remains is to show that ℓ(w∗ ) < 0 always holds. We will only consider the case where the top eigenvalue λ of M is positive. The other case (when λ < − 2c δ) is symmetric. We will split the analysis into two parts. 1 X (Xi − µ b)(Xi − µ b)T − I |G| i∈G = 2 1 X (Xi − µ + ∆)(Xi − µ + ∆)T − I |G| i∈G 2 1 X 1 X (Xi − µ)(Xi − µ)T − I + 2k∆k2 (Xi − µ) +k∆k22 ≤ |G| |G| i∈G i∈G 2 {z } | {z }2 | ≤δ1 ≤2δ2 k∆k2 21 (11) Suppose k∆k2 ≤ p cδ/10. By (11) we immediately have: ℓ(w∗ ) ≤ δ1 + 2δ2 k∆k2 + k∆k22 − λ ≤ since λ > cδ/2. On the other hand, if k∆k2 ≥ together we have: ℓ(w∗ ) ≤ p cδ −λ<0, 5 cδ/10 then by (10) we have λ = Ω  k∆k22 ε  . Putting it all 1 X (Xi − µ b)(Xi − µ b)T − I −λ , |G| i∈G 2 {z } | ≤δ1 +2δ2 k∆k2 +k∆k22 where in the last line we used the fact that λ > Ω the proof. 4.3.3  k∆k22 ε  , and k∆k22 ≥ Ω(ε2 log 1/ε). This now completes The Full Algorithm This separation oracle, along with the classical theory of convex optimization, implies that we have shown the following: p Corollary 4.25. Fix ε, τ > 0, and let δ = O(ε log 1/ε). Let X1 , . . . , XN be a ε-corrupted set of points satisfying (8)-(9), for δ1 , δ2 ≤ δ. Let c be a sufficiently large constant. Then, there is an algorithm L EARNA PPROX M EAN (ε, τ, X1 , . . . , XN ) which runs in time poly(N, d, 1/ε, p log 1/τ ), and outputs a set of weights w′ ∈ SN,ε so that there is a w ∈ Ccδ so that kw − w′ k∞ ≤ ε/(N d log(N/τ )). This algorithm, while an extremely powerful primitive, is technically not sufficient. However, given this, the full algorithm is not too difficult to state: simply run NAIVE P RUNE, then optimize P over Ccδ using this separation oracle, and get some w which is approximately in Ccδ . Then, output N i=1 wi Xi . For completeness, the pseudocode for the algorithm is given below. In the pseudocode, we assume that E LLIPSOID (S EPARATION O RACLE U NKNOWN M EAN , ε′ ) is a convex optimization routine, which given the S EPARATION O RACLE U NKNOWN M EAN separation oracle and a target error ε′ , outputs a w′ so that kw − w′ k∞ ≤ ε′ . From the classical theory of optimization, we know such a routine exists and runs in polynomial time. Algorithm 3 Convex programming algorithm for agnostically learning the mean. 1: function L EARN M EAN (ε, τ, X1 , . . . , XN ) 2: Run NAIVE P RUNE (X1 , . . . , XN ). Let {Xi }i∈I be the pruned set of samples. 3: For simplicity assume I = [N ]. 4: Let w′ ← L EARNA PPROX M EAN (ε, τ, X1 , . . . , XN ). PN 5: return i=1 wi′ Xi . We have: p Theorem 4.26. Fix ε, τ > 0, and let δ = O(ε log 1/ε). Let X1 , . . . , XN be an ε-corrupted set of samples, where   d + log 1/τ N =Ω . δ2 Let µ b be the output of L EARN M EAN (X1 , . . . , XN ). Then, we have kb µ − µk2 ≤ δ. 22 Proof. By Fact 4.8, Lemma 4.5, and Lemma 4.6, we know that (7)-(9) hold with probability 1 − τ , with δ1 , δ2 ≤ δ. Condition on the event that this event holds. After NAIVE P RUNE, byp Fact 4.18 we may assume that no uncorrupted points are removed, and all points satisfy kXi − µk2 ≤ p O( d log(N/τ )). Let w′ be the output of the algorithm, and let w ∈ Ccδ be so that kw − w′ k∞ < ε/(N d log(N/τ )). By Corollary P 4.20, we know that k N i=1 wi Xi − µk2 ≤ O(δ). Hence, we have N X i=1 wi′ Xi − µ 2 ≤ N X i=1 wi Xi − µ + N X i=1 2 |wi − wi′ | · kXi − µk2 ≤ O(δ) + ε , so the entire error is at most O(δ), as claimed. 4.4 Finding the Covariance, Using a Separation Oracle In this section, we consider the problem of approximating µ given m samples from N (0, Σ) in the full adversary model. Let Ui = Σ−1/2 Xi so that if Xi ∼ N (0, Σ) then Ui ∼ N (0, I). Moreover let Zi = Ui⊗2 . Our approach will parallel the one given earlier in Section 4.3. Again, we will work with a convex set ! ) ( m X ≤δ . wi Xi XiT Σ−1/2 − I Cδ = w ∈ SN,ε : Σ−1/2 i=1 F and our goal is to design an approximate separation oracle. Our results in this section will rely on the following deterministic conditions: X i∈G kUi k22 ≤ O (d log(N/τ )) , ∀i ∈ G wi Ui UiT − wg I X 1 Ui UiT − I |T | i∈T X i∈G wi Zi ZiT − wg M4 F F S ≤ δ1 ,  N ≤ O δ2 |T | ≤ δ3 , (12) (13)  , and (14) (15) for all w ∈ SN,ε , and all sets T ⊆ G of size |T | ≤ 2εN . As before, by Fact 4.2, the renormalized weights over the uncorrupted points are in SN,4ε . Hence, we can appeal to Fact 4.8, Corollary 4.11, Corollary 4.12, and Theorem 4.17 with SN,4ε instead of SN,ε to bound the probability that this event does p not hold. Let ∗ w be the set of weights which are uniform over the uncorrupted points; by (13) for δ ≥ Ω(ε log 1/ε) we have that w∗ ∈ Cδ . Theorem 4.27. Let δ = O(ε log 1/ε). Suppose that (13), (14), and 15 hold for δ1 , δ2 ≤ O(δ) and δ3 ≤ O(δ log 1/ε). Then, there is a constant c and an algorithm so that, given any input w ∈ SN,ε we have: 1. (Completeness) If w = w∗ , the algorithm outputs “YES”. 2. (Soundness) If w 6∈ Ccδ , the algorithm outputs a hyperplane ℓ : Rm → R so that ℓ(w) ≥ 0 but we have ℓ(w∗ ) < 0. Moreover, if the algorithm ever outputs a hyperplane ℓ, then ℓ(w∗ ) < 0. By the classical theory of convex optimization this implies that we will find a point w so that kw − w′ k∞ ≤ ε ′ poly(N ) for some w ∈ Ccδ , using polynomially many calls to this oracle. 23 The pseudocode for the separation oracle is given in Algorithm 4. Observe briefly that this algorithm does indeed run in polynomial time. Lines 2-7 require only taking top eigenvalues and eigenvectors, and so  can be done in polynomial time. For any ξ ∈ {−1, +1}, line 8 can be run by sorting the samples by √  kYi k2 wi √d − d and seeing if there is a subset of the top 2εN samples satisfying the desired condition, and line 9 can be executed similarly. Algorithm 4 Convex programming algorithm for agnostically learning the covariance. 1: function S EPARATION O RACLE U NKNOWN C OVARIANCE (w) b = PN wi Xi X T . 2: Let Σ i i=1 b −1/2 Xi and let Zi = (Yi )⊗2 . 3: For i = 1, . . . , N , let Yi = Σ P T 4: Let v be the top eigenvector of M = N i=1 wi Zi Zi − 2I restricted to S, and let λ be its associated eigenvalue. 5: if |λ| > Ω(ε log2 1/ε) then 6: Let ξ = sgn(λ). 7: return the hyperplane ! N X 2 wi hv, Zi i − 2 − λ . ℓ(w) = ξ i=1 8: 9: else if there exists a sign ξ ∈ {−1, 1} and a set T of samples of size at most 2εN so that X  kYi k2 √  (1 − ε)αδ √ 2− d > , α=ξ wi 2 d i∈T then return the hyperplane ℓ(w) = ξ X i∈T 10: wi   kYi k22 √ √ − d −α, d return “YES”. We now turn our attention to proving the correctness of this separation oracle. We require the following technical lemmata. Lemma 4.28. Fix δ < 1 and suppose that M is symmetric. If kM − IkF ≥ δ then kM −1 − IkF ≥ 2δ . Proof. We will prove this lemma in the contrapositive, by showing that if kM −1 − IkF < 2δ then kM − IkF < δ. Since the Frobenius normP is rotationally invariant, we may assume that M −1 = diag(1 + ν1 , . . . , 1 + νd ), where by assumption νi2 < δ2 /4. By our assumption that δ < 1, we have |νi | ≤ 1/2. Thus d  X i=1 where we have used the inequality |1 − proof. 1 1− 1 + νi 1 1+x | 2 ≤ d X 4νi2 < δ , i=1 ≤ |2x| which holds for all |x| ≤ 1/2. This completes the 24 Lemma 4.29. Let M, N ∈ Rd×d be arbitrary matrices. Then kM N kF ≤ kM k2 kN kF . Proof. Let N1 , . . . , Nd be the columns of N . Then kM N k2F = d X i=1 kM N k22 ≤ kM k22 d X i=1 kNi k22 = kM k22 kN k2F , so the desired result follows by taking square roots of both sides. Lemma 4.30. Let wi for i = 1, . . . , N be a set of non-negative weights so that be arbitrary. Then !2 N N X X . ai wi2 ≥ ai wi i=1 PN i=1 wi = 1, and let ai ∈ R i=1 PN Proof. Let P be the distribution where ai is chosen with probability wi . Then EX∼P [X] = i=1 ai wi PN 2 2 2 2 and EX∼P [X ] = i=1 ai wi . Since VarX∼P [X] = EX∼P [X ] − EX∼P [X] is always a non-negative quantity, by rearranging the desired conclusion follows.  T ≤ kM − Ik2F . Lemma 4.31. Let M ∈ Rd×d . Then, M ♭ M ♭ S Proof. By the definition of k · kS , we have  T    T    T M ♭ M ♭ A♭ = sup hA, M i2 . M♭ M♭ = sup A♭ S A∈S kAkF =1 A♭ ∈S kAkF =1 By self duality of the Frobenius norm, we know that hA, M i = hA, M − Ii ≤ kM − IkF , since I ♭ ∈ S ⊥ . The result now follows. Proof of Theorem 4.27. Let us first prove completeness. Observe that by Theorem 4.15, we know that restricted to S, we have that M4 = 2I. Therefore, by (15) we will not output a hyperplane in line 7. Moreover, by (14), we will not output a hyperplane in line 8. This proves completeness. Thus it suffices to show soundness. Suppose that w 6∈ Ccδ . We will make use of the following elementary fact: b −1/2 and B = Σ b −1/2 ΣΣ b −1/2 . Then Fact 4.32. Let A = Σ−1/2 ΣΣ kA−1 − IkF = kB − IkF b −1 Σ1/2 . Using this expression and the fact that all the matrices involved Proof. In particular A−1 = Σ1/2 Σ are symmetric, we can write  kA−1 − Ik2F = tr (A−1 − I)T (A−1 − I)   b −1 ΣΣ b −1 Σ1/2 − 2Σ1/2 Σ b −1 Σ1/2 − I = tr Σ1/2 Σ   b −1/2 ΣΣ b −1 ΣΣ b −1/2 − 2Σ b −1/2 ΣΣ b −1/2 − I = tr Σ  = tr (B − I)T (B − I) = kB − Ik2F where in the third line we have used the fact that the trace of a product of matrices is preserved under cyclic shifts. 25 This allows us to show: Claim 4.33. Assume (13)–(15) hold with δ1 , δ2 ≤ O(δ) and δ3 ≤ O(δ log 1/ε), and assume furthermore that kA − IkF ≥ cδ. Then, if we let δ′ = (1−ε)c 2 δ = Θ(δ), we have X i∈E wi Zi − wb I ♭ + S X i∈E wi Zi − wb I ♭ S ⊥ ≥ δ′ . (16) Proof. Combining Lemma 4.28 and Fact 4.32 we have kA − IkF ≥ cδ ⇒ kB − IkF ≥ cδ . 2 (17) P We can rewrite (13) as the expression i∈G wi Xi XiT = wg Σ1/2 (I + R)Σ1/2 where R is symmetric and P b we have that N wi Yi Y T = I, and so satisfies kRkF ≤ δ1 . By the definition of Σ i i=1 X i∈E wi Yi YiT − wb I = F X i∈G wi Yi YiT − wg I b −1/2 Σ1/2 (I + R)Σ1/2 Σ b −1/2 − I = wg Σ F Furthermore we have b −1/2 Σ1/2 RΣ1/2 Σ b −1/2 Σ F b −1/2 ΣΣ b −1/2 ≤ δ1 Σ 2 F , by applying Lemma 4.29. And putting it all together we have X i∈E wi Yi YiT − wb I F ≥ wg  b −1/2 ΣΣ b −1/2 − I Σ F b −1/2 ΣΣ b −1/2 − δ1 Σ 2  b −1/2 ΣΣ b −1/2 − IkF ≥ cδ, then It is easily verified that for c > 10, we have that for all δ, if kΣ Hence all this implies that b −1/2 ΣΣ b −1/2 − IkF ≥ 2δkΣ b −1/2 ΣΣ b −1/2 k2 . kΣ X i∈E where δ′ = c(1−ε) 2 δ wi Yi YiT − wb I F ≥ δ′ , = Θ(δ). The desired result then follows from Pythagorean theorem. Claim 4.33 tells us that if w 6∈ Ccδ , we know that one of the terms in (17) must be at least 12 δ′ . We first show that if the first term is large, then the algorithm outputs a separating hyperplane: Claim 4.34. Assume that (13-(15) hold with δ1 , δ2 ≤ O(δ) and δ3 ≤ O(δ log 1/ε). Moreover, suppose that X i∈E wi Zi − wb I ♭ S 1 ≥ δ′ . 2 Then the algorithm outputs a hyperplane in line 7, and moreover, it is a separating hyperplane. 26 Proof. Let us first show that given these conditions, P then the algorithm indeed outputs a hyperplane in♭ line ♭ ⊥ 7. Since I ∈ S , the first term is just equal to i∈E wi Zi S . But this implies that there is some M ∈ S ♭ so that kM k2 = kM kF = 1 and so that X i∈E wi hM ♭ , Zi i ≥ 1 ′ δ , 2 which implies that X wi 1 δ′ hM ♭ , Zi i ≥ . wb 2 wb i∈E The wi /wb are a set of weights satisfying the conditions of Lemma 4.30 and so this implies that ! X δ′ 2 ♭ 2 wi hM , Zi i ≥ O wb i∈E ! δ′ 2 ≥O ε (18) e =Σ b −1 Σ. By Theorem 4.15 and (15), we have that Let Σ      ⊗2  ⊗2  X T T ♭ ♭ ⊗2 1/2 1/2 e e e + Σ e e wi Zi Zi = wg Σ Σ + 2Σ R Σ , i∈G where kRk2 ≤ δ3 . Hence, X i∈G wi Zi ZiT − 2I = wg S  e♭ Σ  e♭ Σ T    ⊗2  ⊗2 e ⊗2 − I + (1 − wg )I + Σ e 1/2 e 1/2 +2 Σ R Σ e − Ik2 + (1 − wg ) + kRkkΣk e 2 e − Ik2 + 2kΣ ≤ kΣ F e − Ik2F + δkΣk e 2 + O(ε) . ≤ 3kΣ   2 ≤ O δ′ + δ′ , S (19) e 2 ≤ O(kΣ e − IkF ) as long as kΣ e − IkF ≥ Ω(δ), which it is by (17). since it is easily verified that δkΣk Equations 18 and 19 then together imply that N X i=1 ♭ T wi (M ) Zi ZiT (M ♭ ) ♭ T ♭ − (M ) IM ≥ O  δ2 ε  , and so the top eigenvalue of M is greater in magnitude than λ, and so the algorithm will output a hyperplane in line 7. Letting ℓ denote the hyperplane output by the algorithm, by the same calculation as for (19), we must have ℓ(w∗ ) < 0, so this is indeed a separating hyperplane. Hence in this case, the algorithm correctly operates. Now let us assume that the first term on the LHS is less than 21 δ′ , so that the algorithm does not necessarily output a hyperplane in line 7. Thus, the second term on the LHS of Equation 16 is at least 21 δ′ . We now show that this implies that this implies that the algorithm will output a separating hyperplane in line 9. 27 Claim 4.35. Assume that (13-(15) hold. Moreover, suppose that X i∈E wi Zi − wb I ♭ S⊥ 1 ≥ δ′ . 2 Then the algorithm outputs a hyperplane in line 9, and moreover, it is a separating hyperplane. Proof. By the definition of S ⊥ , the assumption implies that √ tr(Z ♯ ) 1 wi √ i − Mb d ≥ δ′ , 2 d i∈E X which is equivalent to the condition that ξ X i∈E wi   kYi k22 √ (1 − ε)δ′ √ − d ≥ , 2 d for some ξ ∈ {−1, 1}. In particular, the algorithm will output a hyperplane X  kYi k2 √  √ 2 − d −λ ℓ(w) = ξ wi d i∈S in Step 9, where S is some set of size at most εN , and λ = O(δ′ ). Since it will not affect anything, for without loss of generality let us assume that ξ = 1. The other case is symmetrical. It now suffices to show that ℓ(w∗ ) < 0. Let T = S ∩ G. By (14), we know that X 1 e 1/2 (I + A) Σ e 1/2 − I , Yi YiT − I = Σ |T | i∈T   N where kAkF = O δ |T | . Hence, X i∈T |T | 1 Yi YiT − I (1 − ε)N (1 − ε)N |T | e 1/2 (I + A) Σ e 1/2 − I Σ (1 − ε)N F   |T | e − IkF + kAkF kΣk e 2 ≤ kΣ (1 − ε)N |T | e − IkF + O(δ)kΣk e 2 kΣ ≤ (1 − ε)N ≤ O(δδ′ + δ) , = F as long as δ′ ≥ O(δ). By self-duality of the Frobenius norm, using the test matrix X i∈T  √  1 kYi k2 − d ≤ O(δδ′ + δ) < α (1 − ε)N and hence ℓ(w∗ ) < 0, as claimed. These two claims in conjunction directly imply the correctness of the theorem. 28 √1 I, d this implies that 4.4.1 The Full Algorithm As before, this separation oracle and the classical theory of convex optimization shows that we have demonstrated an algorithm F INDA PPROX C OVARIANCE with the following properties: Theorem 4.36. Fix ε, τ > 0, and let δ = O(ε log 1/ε). Let c > 0 be a universal constant which is sufficiently large. Let X1 , . . . , XN be an ε-corrupted set of points satisfying (13-(15), for δ1 , δ2 ≤ O(δ) and δ3 ≤ O(δ log 1/ε). Then F INDA PPROX C OVARIANCE (ε, τ, X1 , . . . , XN ) runs in time poly(N, d, 1/ε, log 1/τ ), and outputs a u so that there is some w ∈ Ccδ so that kw − uk∞ ≤ ε/(N d log(N/τ )). As before,P this is not quite sufficient to actually recover the covariance robustly. Naively, we would just T −1/2 X k like to output N i 2 i=1 ui Xi Xi . However, this can run into issues if there are points Xi so that kΣ is extremely large. We show here that we can postprocess the u so that we can weed out these points. First, observe that we have the following lemma: Lemma 4.37. Assume X1 , . . . , XN satisfy (13). Let w ∈ SN,ε . Then N X i=1 wi Xi XiT  (1 − O(δ1 ))Σ . P Proof. This follows since P by (13), we have that i∈G wi Xi XiT  wg (1 − δ1 )Σ  (1 − O(δ1 ))Σ. The lemma then follows since i∈E wi Xi XiT  0 always. Now, for any set of weights w ∈ SN,ε , let w e− ∈ RN be the vector given by w ei− = max(0, wi − ε/(N d log(N/τ ))), and let w− be the set of weights given by renormalizing w e− . It is a straightforward − calculation that for any w ∈ SN,ε , we have w ∈ SN,2ε . In particular, this implies: P − T Lemma 4.38. Let u be so that there is w ∈ Ccδ so that ku−wk∞ ≤ ε/(N d log(N/τ )). Then, N i=1 ui Xi Xi  (1 + O(δ))Σ. P Proof. By the definition of Ccδ , we must have that N Xi XiT  (1 + cδ)Σ. Moreover, we must i=1 wiP − T have u e ≤ wi for every index i ∈ [N ]. Thus we have that N e− i Xi Xi  (1 + cδ)Σ, and hence i=1 u i wP PN i − P N N − T T T e− i=1 ui wi Xi Xi  (1 + cδ)Σ, since i=1 ui wi Xi Xi  (1 + O(ε)) i=1 u i wi Xi Xi . We now give the full algorithm. The algorithm proceeds as follows: first run F INDA PPROX C OVARI to get some set of weights u which is close to some element of Ccδ . We then compute the empirical P −1/2 T covariance Σ1 = N Xi k22 which i=1 ui Xi Xi with the weights u, and remove any points which have kΣ1 are too large. We shall show that this removes no good points, and removes all corrupted points which have kΣ−1/2 Xi k22 which are absurdly large. We then rerun F INDA PPROX C OVARIANCE with this pruned set of points, and output the empirical covariance with the output of this second run. Formally, we give the pseudocode for the algorithm in Algorithm 5. We now show that this algorithm is correct. ANCE Theorem 4.39. Let 1/2 ≥ ε > 0, and τ > 0. Let δ = O(ε log 1/ε). Let X1 , . . . , XN be a ε-corrupted set of samples from N (0, Σ) where   3 d log2 1/τ e . N =Ω ε2 b be the output of L EARN C OVARIANCE (ε, τ, X1 , . . . , XN ). Then with probability 1−τ , kΣ−1/2 ΣΣ b −1/2 − Let Σ IkF ≤ O(δ). 29 Algorithm 5 Full algorithm for learning the covariance agnostically 1: function L EARN C OVARIANCE(ε, τ, X1 , . . . , XN ) 2: Let u ← FP INDA PPROX C OVARIANCE (ε, τ, X1 , . . . , XN ). − T 3: Let Σ1 = N i=1 ui Xi Xi . 4: for i = 1, . . . , N do −1/2 5: if kΣ1 Xi k22 ≥ Ω(d log N/τ ) then 6: Remove Xi from the set of samples 7: Let I be the set of pruned samples. 8: Let u′ ← INDA PPROX C OVARIANCE (ε, τ, {Xi }i∈I ). PF N 9: return i=1 u′i Xi XiT . Proof. We first condition on the event that we satisfy (12)-(15) with δ1 , δ2 ≤ O(δ) and δ3 ≤ O(δ log 1/ε). By our choice of N , Fact 4.8, Corollary 4.10, Corollary 4.12, and Theorem 4.17, and a union bound, we know that this event happens with probability 1 − τ . By Theorem 4.36, Lemma 4.37, and Lemma 4.38, we have that since ε is sufficiently small, 1 Σ  Σ1  2Σ . 2 In particular, this implies that for every vector Xi , we have 1 −1/2 −1/2 kΣ Xi k22 ≤ kΣ1 Xi k22 ≤ 2kΣ−1/2 Xi k22 . 2 Therefore, by (12), we know that in line 6, we never throw out any uncorrupted points, and moreover, if Xi is corrupted with kΣ−1/2 Xi k22 ≥ Ω(d log N/τ ), then it is thrown out. Thus, let I be the set of pruned points. Because no uncorrupted point is thrown out, we have that |I| ≥ (1 − 2ε)N , and moreover, this set of points still satisfies (13)-(15)3 and moreover, for ever i ∈ I, we have kΣ−1/2 Xi k22 ≤ O(d log N/τ ). Therefore, by Theorem 4.36, we have that there is some u′′ ∈ Cc|I| so that ku′ − u′′ k∞ < ε/(N d log(N/τ )). But now if ′ T b=P Σ i∈|I| ui Xi Xi , we have b −1/2 − IkF ≤ kΣ−1/2 ΣΣ X i∈I u′′i Σ−1/2 Xi XiT Σ−1/2 − I ≤ cδ + O(ε) ≤ O(δ) , + F X i∈I |u′i − u′i |kΣ−1/2 Xi k22 which completes the proof. 4.5 Learning an Arbitrary Gaussian Agnostically We have shown how to agnostically learn the mean of a Gaussian with known covariance, and we have shown how to agnostically learn the covariance of a mean zero Gaussian. In this section, we show how to use these two in conjunction to agnostically learn an arbitrary Gaussian. Throughout, let X1 , . . . , XN be an ε-corrupted set of samples from N (µ, Σ), where both µ and Σ are unknown. We will set  3  d log2 1/τ e N =Ω . ε2 3 Technically, the samples satisfy a slightly different set of conditions since we may have thrown out some corrupted points, and so in particular the number of samples may have changed, but the meaning should be clear. 30 4.5.1 From Unknown Mean, Unknown Covariance, to Zero Mean, Unknown Covariance We first show a simple trick which, at the price of doubling the amount of error, allows us to assume that the mean is zero, without √ changing the covariance. We do so as follows: for each i = 1, . . . , N/2, let Xi′ = (Xi − XN/2+i )/ 2. Observe that if both Xi and XN/2+i are uncorrupted, then Xi′ ∼ N (0, Σ). Moreover, observe that Xi′ is corrupted only if either Xi or XN/2+i is corrupted. Then we see that if ′ X1 , . . . , XN is ε-corrupted, then the X1′ , . . . , XN/2 is a N/2-sized set of samples which is 2ε-corrupted. b so that Thus, by using the results from Section 4.4, with probability 1 − τ , we can recover a Σ b −1/2 − IkF ≤ O(ε log 1/ε) , kΣ−1/2 ΣΣ (20) b N (0, Σ)) ≤ O(ε log 1/ε) . dTV (N (0, Σ), (21) which in particular by Corollary 2.14, implies that 4.5.2 From Unknown Mean, Approximate Covariance, to Approximate Recovery b −1/2 Xi . Then, for Xi which is not corrupted, we have that X ′′ ∼ N (0, Σ1 ), where For each Xi , let Xi′′ = Σ i −1/2 −1/2 b e Σ1 = Σ ΣΣ . By Corollary 2.14 and Lemma 4.28, if (20) holds, then we have b −1/2 µ, Σ1 ), N (Σ b −1/2 µ, I)) ≤ O(ε log 1/ε) . dTV (N (Σ By Claim 2.4, this means that if (20) holds, the uncorrupted set of Xi′′ can be treated as an O(ε log 1/ε)b −1/2 µ, I). Thus, if (20) holds, the entire set of samples X ′′ , . . . , X ′′ is corrupted set of samples from N (Σ m 1 b −1/2 µ, I). Then, by using results from Section 4.3, with a O(ε log 1/ε)-corrupted set of samples from N (Σ b −1/2 µk2 ≤ O(ε log3/2 (1/ε)). probability 1 − τ , assuming that 20 holds, we can recover a µ b so that kb µ−Σ Thus, by Corollary 2.13, this implies that or equivalently, b −1/2 µ, I)) ≤ O(ε log 3/2 (1/ε)) , dTV (N (b µ, I), N (Σ b 1/2 µ b N (µ, Σ)) b ≤ O(ε log3/2 (1/ε)) , dTV (N (Σ b, Σ), which in conjunction with (21), implies that b 1/2 µ b N (µ, Σ)) ≤ O(ε log3/2 (1/ε)) , dTV (N (Σ b, Σ), and thus by following this procedure, whose formal pseudocode is given in Algorithm 6, we have shown the following: Algorithm 6 Algorithm for learning an arbitrary Gaussian robustly 1: function R ECOVER ROBUST G UASSIAN (ε, τ, X1 , . . . , XN ) √ 2: For i = 1, . . . , N/2, let Xi′ = (Xi − XN/2+i )/ 2. b ← L EARN C OVARIANCE (ε, τ, X ′ , . . . , X ′ ). 3: Let Σ 1 N/2 b −1/2 Xi . 4: For i = 1, . . . , N , let Xi′′ = Σ ′′ ). 5: Let µ b ← L EARN M EAN (ε, τ, X1′′ , . . . , XN −1/2 b b 6: return the Gaussian with mean Σ µ b, and covariance Σ. 31 Theorem 4.40. Fix ε, τ > 0. Let X1 , . . . , XN be an ε-corrupted set of samples from N (µ, Σ), where µ, Σ are both unknown, and  3  d log2 1/τ e N =Ω . ε2 There is a polynomial-time algorithm R ECOVER ROBUST G AUSSIAN (ε, τ, X1 , . . . , XN ) which with probab µ bility 1 − τ , outputs a Σ, b so that b 1/2 µ b N (µ, Σ)) ≤ O(ε log3/2 (1/ε)) . dTV (N (Σ b, Σ), 5 Agnostically Learning a Mixture of Spherical Gaussians, via Convex Programming In this section, we give an algorithm to agnostically learn a P mixture of k Gaussians with identical spherical √ e covariance matrices up to error O(poly(k) · ε). Let M = j∈[k] αj N (µj , σ 2 I) be the unknown k-GMM each of whose components are spherical. For X ∼ M, we write X ∼j M if X was drawn from the jth component of M. Our main result of this section is the following theorem: Theorem P 5.1. Fix ε, τ > 0, and k ∈ N. Let X1 , . . . , XN be an ε-corrupted set of samples from a k-GMM M = j∈[k] αj N (µj , σj2 I), where all αj , µj , and σj2 are unknown, and e (poly (d, k, 1/ε, log(1/τ ))) . N =Ω There is an algorithm which with probability 1 − τ , outputs a distribution M′ such that √ e dTV (M, M′ ) ≤ O(poly(k) · ε) . 2 The running time of the algorithm is poly(d, 1/ε, log(1/τ ))k . Our overall approach will be a combination of our method for agnostically learning a single Gaussian and recent work on properly learning mixtures of multivariate spherical Gaussians [SOAJ14, LS15]. At a high level, this recent work relies upon the empirical covariance matrix giving an accurate estimate of the overall covariance matrix in order to locate the subspace in which the component mean lie. However, as we have observed already, the empirical moments do not necessarily give good approximations of the true moments in the agnostic setting. Therefore, we will use our separation oracle framework to approximate the covariance matrix, and the rest of the arguments follow similarly as previous methods. The organization of this section will be as follows. We define some of the notation we will be using and the Schatten top-k norm in Section 5.1. Section 5.2 states the various concentration inequalites we require. In Section 5.3, we go over our overall algorithm in more detail. Section 5.4 describes a first naive clustering step, which deals with components which are very well separated. Section 5.5 contains details on our separation oracle approach, allowing us to approximate the true covariance. Section 5.6 describes our spectral clustering approach to cluster components with means separated more than Ωk (log 1/ε). In Section 5.7, we describe how to exhaustively search over a particular subspace to obtain a good estimate for the component means. In Section 5.8, we go over how to limit the set of hypotheses in order to satisfy the conditions of Lemma 2.9. For clarity of exposition, all of the above describe the algorithm assuming all σj2 are equal. In Section 5.9, we discuss the changes to algorithm which are required to handle unequal variances. For clarity of presentation, many of the proofs are deferred to Section C. 32 5.1 Notation and Norms Recall the definitionPof SN,ε from Section 4.1, which we will use extensively in this section. We will use the notation µ = j∈[k] αj µj to denote the mean of the unknown GMM. Also, we define parameters 2 γj = αj kµj − µk2 and let γ = maxj γj . And for ease of notation, let f (k, γ, ε) = k1/2 ε + kγ 1/2 ε + kε2 and h(k, γ, ε) = k1/2 ε + kγ 1/2 ε + kγε + kε2 = f (k, γ, ε) + kγε. Finally, we use the notation Q= X j∈[k] αj (µj − µ)(µj − µ)T . (22) to denote the covariance of the unknown GMM. Our algorithm for learning spherical k-GMMs will rely heavily on the following, non-standard norm: Definition 5.2. For any symmetric matrix M ∈ Rd×d with singular values σ1 ≥ σ2 ≥ . . . σd , let the Schatten top-k norm be defined as k X σi , kM kTk = i=1 i.e., it is the sum of the top-k singular values of M . It is easy to see that the Schatten top-k norm is indeed a norm, as its name suggests: Fact 5.3. kM kTk is a norm on symmetric matrices. Proof. The only property that is not immediate, that we need to verify, is that it satisfies the triangle inequality. Indeed, we can lower bound kM kTk in terms of its dual characterization √ kM kTk = max Tr(X T M T M X) , X∈Rd×k where the maxima is taken over all X with orthonormal columns. And now the fact that the triangle inequality holds is immediate. 5.2 Concentration Inequalities In this section, we will establish some concentration inequalities that we will need for our algorithm for agnostically learning mixtures of spherical Gaussians. Recall the notation as described in Section 5.1. The following two concentration lemmas follow from the same proofs as for Lemmas 42 and 44 in [LS15]. P Lemma 5.4. Fix ε, δ > 0. If Y1 , . . . , YN are independent samples from the GMM with PDF j∈[k] αj N (µj , Σj )   where αj ≥ Ω(ε) for all j, and N = Ω d+logε2(k/δ) then with probability at least 1 − O(δ), N 1 X (Yi − µ)(Yi − µ)T − I − Q N i=1 2 ≤ O (f (k, γ, ε)) , where Q is defined as in equation (22). P Lemma 5.5. Fix ε, δ > 0. If Y1 , . . . , YN are independent samples from the GMM with PDF j∈[k] αj N (µj , Σj )   where αj ≥ Ω(ε) for all j, and N = Ω d+logε2(k/δ) then with probability at least 1 − O(δ), N 1 X Yi − µ N i=1 2 33   ≤ O k1/2 ε . From the same techniques as before, we get the same sort of union bounds as usual over the weight vectors: p Lemma 5.6. Fix ε ≤ 1/2 and τ ≤ 1. There P is a δ = O(ε log 1/ε) so that if Y1 , . . . , YN are independent samples from the GMM with PDF j∈[k] αj N (µj , Σj ) where αj ≥ Ω(ε) for all j, and N =   Ω d+logδ2(k/τ ) , then 1 " Pr ∃w ∈ SN,ε : N X i=1 T wi (Yi − µ)(Yi − µ) − I − Q 2 # ≥ f (k, γ, δ1 ) ≤ τ , (23) where Q is defined as in equation (22). p Lemma 5.7. Fix ε ≤ 1/2 and τ ≤ 1. There P is a δ = O(ε log 1/ε) so that if Y1 , . . . , YN are independent samples from the GMM with PDF j∈[k] αj N (µj , Σj ) where αj ≥ Ω(ε) for all j, and N =   Ω d+logδ2(k/τ ) , then 2 # " N X 1/2 (24) Pr ∃w ∈ SN,ε : wi Yi − µ ≥ k δ2 ≤ τ. i=1 2 5.3 Algorithm Our approach is based on a tournament, as used in several recent works [DK14, SOAJ14, DDS15a, DDS15b, DKT15, DDKT16]. We will generate a list S of candidate hypotheses (i.e. of k-GMMs) of size |S| = 2 poly(d, 1/ε, log(1/τ ))k with the guarantee that there is some M∗ ∈ S such that dTV (M, M∗ ) ≤ Õ(poly(k)· √ ε). We then find (roughly) the best candidate hypothesis on the list. It is most natural to describe the algorithm as performing several layers of guessing. We will focus our discussion on the main steps in our analysis, and defer a discussion of guessing the mixing weights, the variance σ 2 and performing naive clustering until later. For reasons we justify in Section 5.8, we may assume that the mixing weights and the variance are known exactly, and that the variance σ 2 = 1. Our algorithm is based on the following deterministic conditions: |{Xi ∈ G, Xi ∼j M : kXi − µj k22 ≥ Ω(d log k/ε)}| ≤ ε/k , ∀j = 1, . . . , N |{Xi ∈ G, Xi ∼j M}| X wi (Xi − µ)(Xi − µ)T − wg I − wg Q ≤ f (k, γ, δ1 ) ∀w ∈ SN,4ε , and i∈G (25) (26) 2 X i∈G wi (Xi − µ) 2 ≤ k1/2 δ2 ∀w ∈ SN,4ε . (27) (25) follows from basic Gaussian concentration, and (26) and (27) follow from the results in Section 5.2 for N sufficiently large. Note that these trivially imply similar conditions for the Schatten top-k norm, at the cost of an additional factor of k on the right-hand side of the inequalities. For the rest of this section, let δ = max(δ1 , δ2 ). At this point, we are ready to apply our separation oracle framework. In particular, we will find a weight vector w over the points such that N X i=1 wi (Xi − µ)(Xi − µ)T − I − X j∈[k] 34 αj (µj − µ)(µj − µ)T ≤ η, 2 for some choice of η. The set of such weights is convex, and concentration implies that the true weight vector will have this property. Furthermore, we can describe a separation oracle given any weight vector not contained in this set (as long as η is not too small). At this point, we use classical convex programming methods to find a vector which satisfies these conditions. Further details are provided in Section 5.5. After this procedure, Lemma 5.13 shows that the weighted empirical covariance is spectrally close to the true covariance matrix. We are now in the same regime as [SOAJ14], which obtains their results as a consequence of the empirical covariance concentrating about the true covariance matrix. Thus, we will appeal to their analysis, highlighting the differences between our approach and theirs. We note that [LS15] also follows a similar approach and the interested reader may also adapt their arguments instead. First, if γ is sufficiently large (i.e., Ωk (log(1/ε))), this implies a separation condition between some component mean and the mixture’s mean. This allows us to cluster the points further, using a spectral method. We take the top eigenvector of the weighted empirical covariance matrix and project in this direction, using the sign of the result as a classifier. In contrast to previous work, which requires that no points are misclassified, we can tolerate poly(ε/k) misclassifications, since our algorithms are agnostic. This crucially allows us to avoid a dependence on d in our overall agnostic learning guarantee. Further details are provided in Section 5.6. Finally, if γ is sufficiently small, we may perform an exhaustive search. The span of the means is the top k − 1 eigenvectors of the true covariance matrix, which we can approximate with our weighted empirical covariance matrix. Since γ is small, by trying all points within a sufficiently tight mesh, we can guess a set of candidate means which are sufficiently close to the true means. Combining the approximations to the means with Corollary 2.13 and the triangle inequality, we can guarantee that at least one of our guesses is sufficiently close to the true distribution. Additional details are provided in Section 5.7. To conclude our algorithm, we can apply Lemma 2.9. We note that this hypothesis selection problem has been studied before (see, i.e. [DL01, DK14]), but we must adapt it for our agnostic setting. This allows us to select a hypothesis which is sufficiently close to the true distribution, thus concluding the proof. We note that the statement of Lemma 2.9 requires the hypotheses to come from some fixed finite set, while there are an infinite number of Gaussian mixture models. In Section 5.8, we discuss how to limit the number of hypotheses based on the set of uncorrupted samples in order to satisfy the conditions of Lemma 2.9. 5.4 Naive Clustering We give a very naive clustering algorithm, the generalization of NAIVE P RUNE , which recursively allows us to cluster components if they are extremely far away. The algorithm is very simple: for each Xi , add all points within distance O(d log(k/ε)) to a cluster Si . Let C be the set of clusters which contain at least 4εN points, and let the final clustering be C1 , . . . , Ck′ be formed by merging clusters in C if they overlap, and stopping if no clusters overlap. We give the formal pseudocode in Algorithm 7. Algorithm 7 Naive clustering algorithm for spherical GMMs. 1: function NAIVE C LUSTER GMM(X1 , . . . , Xn ) 2: for i = 1, . . . , N do 3: Let Si = {i′ : kXi − Xi′ k22 ≤ Θ(dk log 1/ε)}. Let C = {Si : |Si | ≥ 4εN }. 4: while ∃C, C ′ ∈ C so that C 6= C ′ and C ∪ C ′ 6= ∅ do 5: Remove C, C ′ from C 6: Add C ∪ C ′ to C 7: return the set of clusters C We prove here that this process (which may throw away points) throws away only at most a ε fraction of 35 good points, and moreover, the resulting clustering only misclassifies at most an O(ε)-fraction of the good points, assuming (25). Theorem 5.8. Let X1 , . . . , Xm be a set of samples satisfying (25). Let C1 , . . . , Ck′ be the set of clusters returned. For each component j, let ℓ(j) be the ℓ so that Cℓ contains the most points from j. Then: 1. Then, for each ℓ, there is some j so that ℓ(j) = ℓ. 2. For all j, we have |{Xi ∈ G, Xi ∼j M}| − |{Xi ∈ G, Xi ∼j M, Xi ∈ Cℓ(j) }| ≤ O ε k  |{Xi ∈ G, Xi ∼j M}| . 3. For all j, j ′ , we have that if ℓ(j) = ℓ(j ′ ), then kµj − µj ′ k22 ≤ O(dk log k/ε) 4. If Xi , Xj ∈ Cℓ , then kXi − Xj k22 ≤ dk log 1/ε. Thus, we have that by applying this algorithm, given an ε-corrupted set of samples from M, we may cluster them in a way which misclassifies at most an ε/k fraction of the samples from any component, and so that within each cluster, the means of the associated components differ by at most dk log k/ε. Thus, each separate cluster is simply a ε-corrupted set of samples from the mixture restricted to the components within that cluster; moreover, the number of components in each cluster must be strictly smaller than k. Therefore, we may simply recursively apply our algorithm on these clusters to agnostically learn the mixture for each cluster, since if k = 1, this is a single Gaussian, which we know how to learn agnostically. Thus, for the remainder of this section, let us assume that for all j, j ′ , we have kµj −µ′j k22 ≤ O(dk log 1/ε). Moreover, we may assume that there are no points j, j ′ (corrupted or uncorrupted), so that kXj − Xj ′ k22 ≥ Ω(dk log 1/ε). 5.5 Estimating the Covariance Using Convex Programming In this section, we will apply our separation oracle framework to estimate the covariance matrix. While in the non-agnostic case, the empirical covariance will approximate the actual covariance, this is not necessarily true in our case. As such, we will focus on determining a weight vector over the samples such that the weighted empirical covariance is a good estimate for the true covariance. We first define the convex set for which we want an interior point:   N   X X Cη = w ∈ SN,ε : wi (Xi − µ)(Xi − µ)T − I − αj (µj − µ)(µj − µ)T ≤ η .   i=1 j∈[k] 2 In Section 5.5.1, we prove lemmas indicating important properties of this set. In Section 5.5.2, we give a separation oracle for this convex set. We conclude with Lemma 5.13, which shows that we have obtained an accurate estimate of the true covariance. 5.5.1 Properties of Our Convex Set We start by proving the following lemma, which states that for any weight vector which is not in our set, the weighted empirical covariance matrix is noticeably larger than it should be (in Schatten top-k norm). Lemma 5.9. Suppose that (26) holds, and w 6∈ Cckh(k,γ,δ). Then N X i=1 wi (Xi − µ)(Xi − µ)T − I 36 Tk ≥ X j∈[k] γj + 3ckh(k, γ, δ) . 4 We also require the following lemma, which shows that if a set of weights poorly approximates µ, then it is not in our convex set. P Lemma 5.10. Suppose that (26) and (27) hold. Let w ∈ Sm,ε and set µ b= m b. i=1 wi Xi and ∆ = µ − µ Furthermore, suppose that k∆k2 ≥ Ω(h(k, γ, δ)). Then N X i=1 T wi (Xi − µ)(Xi − µ) − I − X j∈[k] T ≥Ω αj (µj − µ)(µj − µ) 2  k∆k22 ε  . By contraposition, if a set of weights is in our set, then it provides a good approximation for µ: Corollary 5.11. Suppose that (26) and (27) hold. Let w ∈ Ch(k,γ,δ) for δ = Ω(ε log 1/ε). Then 5.5.2 Separation Oracle p k∆k2 ≤ O(ε log 1/ε). In this section, we provide a separation oracle for Cη . In particular, we have the following theorem: Theorem 5.12. Fix ε > 0, and let δ = Ω(ε log 1/ε). Suppose that (26) and (27) hold. Let w∗ denote the weights which are uniform on the uncorrupted points. Then there is a constant c and an algorithm so that: 1. (Completeness) If w = w∗ , then it outputs “YES”. 2. (Soundness) If w 6∈ Cckh(k,γ,δ), the algorithm outputs a hyperplane ℓ : Rm → R so that ℓ(w) ≥ 0 but ℓ(w∗ ) < 0. These two facts imply that the ellipsoid method with this separation oracle will terminate in poly(d, 1/ε) steps, and moreover, will with high probability output a w′ so that kw − w′ k∞ ≤ ε/(N dk log 1/ε) for some w ∈ Cckh(k,γ,δ). Moreover, it will do so in polynomially many iterations. The proof is deferred to Section C.1. Algorithm 8 Separation oracle sub-procedure for agnostically learning the span of the means of a GMM. 1: function S EPARATION O RACLE GMM(w) P 2: Let µ b= N i=1 wi Xi . 3: For i = 1,P . . . , N , define Yi = Xi − µ b. N T 4: Let M = i=1 wi Yi Yi − I. P 5: if kM kTk < j∈[k] γj + ckh(k,γ,δ) then 2 6: return “YES”. 7: else 8: Let Λ = kM kTk . 9: Let U be a d × k matrix with orthonormal the top k eigenvectors of M . Pcolumns which span    N T T 10: return the hyperplane ℓ(w) = Tr U i=1 wi Yi Yi − I U − Λ > 0 After running this procedure, we technically do not have a set of weights in Cckh(k,γ,δ) . But by the same argument as in Section 4.3, because the maximum distance between two points within any cluster is 37 bounded, and we have the guarantee that kXi − Xj k2 ≤ O(dk log 1/ε) for all i, j, we may assume we have a set of weights satisfying N X i=1 wi (Xi − µ)(Xi − µ)T − I − X j∈[k] αj (µj − µ)(µj − µ)T ≤ 2ckh(k, γ, δ). 2 We require the following lemma, describing the accuracy of the empirical covariance matrix with the obtained weights. P Lemma 5.13. Let µ b= N i=1 wi Xi . After running the algorithm above, we have a vector w such that N X i=1 wi (Xi − µ b)(Xi − µ b)T − I − X j∈[k] αj (µj − µ)(µj − µ)T ≤ 3ckh(k, γ, δ). 2 Proof. By triangle inequality and Corollary 5.11, N X i=1 ≤ wi (Xi − µ b)(Xi − µ b)T − I − N X i=1 X j∈[k] wi (Xi − µ)(Xi − µ)T − I − αj (µj − µ)(µj − µ)T X j∈[k] 2 + k∆k22 αj (µj − µ)(µj − µ)T 2 ≤ 2ckh(k, γ, δ) + O(δ) ≤ 3ckh(k, γ, δ) 5.6 Spectral Clustering Now that we have a good estimate of the true covariance matrix, we will perform spectral clustering while γ is sufficiently large. We will adapt Lemma 6 from [SOAJ14], giving the following lemma: Lemma 5.14. Given a weight vector w as output by Algorithm 8, if γ ≥ Ω(poly(k) · log 1/ε), there exists an algorithm which produces a unit vector v with the following guarantees: • There exists a non-trival partition of [k] into S0 and S1 such that v T µj > 0 for all j ∈ S0 and v T µj < 0 for all j ∈ S1 ; • The probability of a sample being misclassified is at most O(poly(ε/k)), where a misclassification is defined as a sample X generated from a component in S0 having v T X < 0, or a sample generated from a component in S1 having v T X > 0. The algorithm will be as follows. Let v be the top eigenvector of N X i=1 wi (Xi − µ b)(Xi − µ b)T − I. For a sample X, cluster it based on the sign of v T X. After performing this clustering, recursively perform our algorithm from the start on the two clusters. The proof is very similar to that of Lemma 6 in [SOAJ14]. Their main concentration lemma is Lemma 30, which states that they obtain a good estimate of the true covariance matrix, akin to our Lemma 5.13. 38 Lemma 31 argues that the largest eigenvector of this estimate is highly correlated with the top eigenvector of the true covariance matrix. Since γ is large, this implies there is a large margin between the mean and the hyperplane. However, by standard Gaussian tail bounds, the probability of a sample landing on the opposite side of this hyperplane is small. We highlight the main difference between our approach and theirs. For their clustering step, they require that no sample is misclustered with high probability. As such, they may perform spectral clustering while γ = Ω (poly(k) · log(d/ε)). We note that, in the next step of our algorithm, we will perform an exhaustive search. This will result in an approximation which depends on the value of γ at the start of the step, and as such, using the same approach as them would result in an overall approximation which depends logarithmically on the dimension. We may avoid paying this cost by noting that our algorithm is agnostic. They require that no sample is misclustered with high probability, while our algorithm tolerates that a poly(ε/k)-fraction of points are misclustered. As such, we can continue spectral clustering until γ = O (poly(k) · log(1/ε)). 5.7 Exhaustive Search The final stage of the algorithm is when we know that all γi ’s are sufficiently small. We can directly apply Lemma 7 of [SOAJ14], which states the following: Lemma 5.15. Given a weight vector w as output by Algorithm 8, then the projection of space orthogonal to the span of the top k − 1 eigenvectors of N X i=1 has magnitude at most wi (Xi − µ b)(Xi − µ b)T − I µj −µ kµj −µk2 onto the 2 ! √   p ε log(1/ε) 1/2 O poly(k) · h(k, γ, δ)/γi . = O poly(k) · 1/2 γi At this point, our algorithm is identical to the exhaustive search of [SOAJ14]. We find the span of the top k − 1 eigenvectors by considering the (k − 1)-cube with side length 2γ centered at µ b. By taking an η-mesh over the points in this cube (for η = poly(ε/dk) sufficiently small), we obtain a set of points M̃ . Via identical arguments as in the proof of Theorem 8 of [SOAJ14], for each j ∈ [k], there exists some point µ̃j ∈ M̃ such that   √ ε log(1/ε) . kµ̃j − µj k2 ≤ O poly(k) · √ αi By taking a k-wise Cartesian product of this set, we are guaranteed to obtain a vector which has this guarantee simultaneously for all µj . 5.8 Applying the Tournament Lemma In this section, we discuss details about how to apply our hypothesis selection algorithm. First, in Section 5.8.1, we describe how to guess the mixing weights and the variance of the components. Then in Section 5.8.2, we discuss how to ensure our hypotheses come from some fixed finite set, in order to deal with technicalities which arise when performing hypothesis selection with our adversary model. 39 5.8.1 Guessing the Mixing Weights and Variance The majority of our algorithm is focused on generating guesses for the means of the Gaussians. In this section, we guess the remaining parameters: the mixing weights and the variance. While most of these guessing arguments are standard, we emphasize that we reap an additional benefit because our algorithm is agnostic. In particular, most algorithms must deal with error incurred due to misspecification of the parameters. Since our algorithm is agnostic, we can pretend the misspecified parameter is the true one, at the cost of increasing the value of the agnostic parameter ε. If our misspecified parameters are accurate enough, the agnostic learning guarantee remains unchanged. Guessing the mixing weights is fairly straightforward. For some ν = poly(ε/k) sufficiently small, our algorithm generates a set of at most (1/ν)k = poly(k/ε)k possible mixing weights by guessing the values {0, ε, ε + ν, ε + 2ν, . . . , 1 − ν, 1} for each αj . Note that we may assume each weight is at least ε, since components with weights less than this can be specified arbitrarily at a total cost of O(kε) in total variation distance. Next, we need to guess the variance σ 2 of the components. To accomplish this, we will take k + 1 samples (hoping to find only uncorrupted ones) and compute the minimum distance between any pair of them. Since we assume k << 1/ε, we can repeatedly draw k + 1 samples until we have the guarantee that at least one set is uncorrupted. If none of the k+1 samples are corrupted, then at least two of them came from the same component, and in our high-dimensional setting the distance between any pair of samples from √ the same component concentrates around 2dσ. After rescaling this distance, we can then multiplicatively enumerate around this value with granularity poly(ε/dk) to get an estimate for σ 2 that is sufficiently good for our purposes. Applying Corollary 2.14 bounds the cost of this misspecification by O(ε). By rescaling the points, we may assume that σ 2 = 1. 5.8.2 Pruning Our Hypotheses In this section, we describe how to prune our set of hypotheses in order to apply Lemma 2.9. Recall that this lemma requires our hypotheses to come from some fixed finite set, rather than the potentially infinite set of GMM hypotheses. We describe how to prune and discretize the set of hypotheses obtained during the rest of the algorithm to satisfy this condition. For the purposes of this section, a hypothesis will be a k-tuple of d-dimensional points, corresponding only to the means of the components. While the candidate mixing weights already come from a fixed finite set (so no further work is needed), the unknown variance must be handled similarly to the means. The details for handling the variance are similar to (and simpler than) those for handling the means, and are omitted. More precisely, this section will describe a procedure to generate a set of hypotheses M, which is exponentially large in k and d, efficiently searchable, and comes from a finite set of hypotheses which are fixed with respect to the true distribution. Then, given our set of hypotheses generated by the main algorithm (which is exponentially large in k but polynomial in d), we iterate over this set, either replacing each hypothesis with a “close” hypothesis from M (i.e., one which is within O(ε) total variation distance), or discarding the hypothesis if none exists. Finally, we run the tournament procedure of Lemma 2.9 on the resulting set of hypotheses. At a high level, the approach will be as follows. We will take a small set of samples, and remove any samples from this set which are clear outliers (due to having too few nearby neighbors). This will give us a set of points, each of which are within a reasonable distance from some component mean. Taking a union of balls around these samples will give us a space that is a subset of a union of (larger) balls centered at the component centers. We take a discrete mesh over this space to obtain a fixed finite set of possible means, and round each hypothesis so that its means are within this set. We start by taking N = O(k log(1/τ )/ε2 ) samples, which is sufficient to ensure that the number of 40 (uncorrupted) samples from component j will be (wj ± Θ(ε))N for all j ∈ [k] with probability 1 − O(τ ). Recall that we are assuming that wj = Ω(ε) for all j, as all other components may be defined arbitrarily at the cost of O(kε) in total variation distance. This implies that even after corruption, each component has generated at least εN uncorrupted samples. By standard Gaussian concentration bounds, we know that if N samples are taken from p a Gaussian, the maximum distance between a sample and the Gaussian’s mean will be at most ζ = O( d log(N/τ )) with probability 1−τ . Assume this condition holds, and thus each component’s mean will have at least εN points within distance ζ. We prune our set of samples by removing any point with fewer than εN other points at distance less than 2ζ. This will not remove any uncorrupted points, by the above assumption, and triangle inequality. However, this will remove any corrupted points at distance at least 3ζ from all component means, due to the fact that the adversary may only move an ε-fraction of the points, and reverse triangle inequality. Now, we consider the union of the balls of radius 3ζ centered at each of the remaining points. This set contains all of the component means, and is also a subset of the union of the balls of radius 6ζ centered at the ε component means. We discretize this set by taking its intersection with a lattice of side-length √ . We note k d that any two points in this discretization are at distance at most ε/k. By a volume argument, the number of  √ d points in the intersection is at most k 12ζkε d . Each hypothesis will be described by the k-wise Cartesian  √ kd product of these points, giving us a set M of at most kk 12ζkε d hypotheses. Given a set of hypotheses H from the main algorithm, we prune it using M as a reference. For each h ∈ H, we see if there exists some h′ ∈ M such that the means in h are at distance at most ε/k from the corresponding means in h′4 . If such an h′ exists, we replace h with h′ – otherwise, h is simply removed. By Corollary 2.13 and the triangle inequality, this replacement incurs a cost of O(ε) in total variation distance. At this point, the conditions of Lemma 2.9 are satisfied and we may run this procedure to select a sufficiently accurate hypothesis. 5.9 Handling Unequal Variances In this section, we describe the changes required to allow the algorithm to handle different variances for the Gaussians. The main idea is to find the minimum variance of any component and perform clustering so we only have uncorrupted samples from Gaussians with variances within some known, polynomiallywide interval. This allows us to grid within this interval in order to guess the variances, and the rest of the algorithm proceeds with minor changes. The first step is to locate the minimum variance of any component. Again using standard Gaussian concentration, in sufficiently high dimensions, if N samples are taken√ from a Gaussian with variance σ 2 I, the distance between any two samples will be concentrated around σ( 2d − Θ(d1/4 )). With this in hand, we use the following procedure to estimate the minimum variance. For each sample i, record the√distance to the (εN + 1)st closest sample. We take the (εN + 1)st smallest of these values, rescale it by 1/ 2d, and similar to before, guess around it using a multiplicative (1+poly(ε/kd)) grid, which will give us an estimate 2 σ̂min for the smallest variance. We note that discarding the smallest εN fraction of the points prevents this 2 statistic from being grossly corrupted by the adversary. For the remainder of this section, assume that σmin is known exactly. At this point, we partition the points into those that come from components with small variance, and those with large variance. We will rely upon the following concentration inequality from [SOAJ14], which gives us the distance between samples from different components: 4 We observe that the complexity of this step is polynomial in d and k, not exponential, if one searches for the nearest lattice point in the sphere surrounding each unpruned sample, rather than performing a naive linear scan over the entire list. 41 Lemma 5.16 (Lemma 34 from [SOAJ14]). Given N samples from a collection of Gaussian distributions, with probability 1 − O(τ ), the following holds for every pair of samples X, Y : s   2 N  log τ , kX − Y k22 ∈ d(σ12 + σ22 ) + kµ1 − µ2 k22 1 ± 4 d where X ∼ N (µ1 , σ12 I) and Y ∼ N (µ2 , σ22 I). Assume the event that this condition holds. Now, let the set of all points with at least εN points r Hℓ be ! 2 ℓ−1 2 log Nτ σmin 1 + 4 at squared-distance at most 2 1 + k1 , for ℓ ∈ [k]. Note that Hℓ ⊆ Hℓ+1 . Let d ℓ∗ be the minimum ℓ such that Hℓ = Hℓ+1 , or k if no such ℓ exists, and partition the set of samples into Hℓ∗ and H ℓ∗ . This partition will contain all samples from components with variance at most some threshold 2 t, where t ≤ eσmin in Hℓ∗ . All samples from components with variance at least t will fall into H ℓ∗ . We continue running the algorithm with Hℓ∗ , and begin the algorithm recursively on H ℓ∗ 5 This procedure works due to the following argument. When we compute H1 , we are guaranteed that it 2 , by the upper bound in Lemma 5.16. However, will contain all samples from components with variance σmin 2 , for it may also contain samples from other components – in particular, those with variance at most γσmin s s      2 2 log Nτ log Nτ  1 − 4  ≤ 1 + 1, γ ≤ 1 + 16 d d k where the second inequality follows for d sufficiently large. Therefore, we compute H2 , which contains all samples from such components. This is repeated up to at most Hk , since if a set Hℓ+1 is distinct from Hℓ , it k must have added at least one component, and we have only k components. Note that 1 + k1 ≤ e, giving the upper bound on variances in Hℓ∗ . After this clustering step, the algorithm follows similarly to before. The main difference is in the convex programming steps and concentration bounds. For instance, before, we considered the set   N   X X Cη = w ∈ SN,ε : wi (Xi − µ)(Xi − µ)T − σ 2 I − αj (µj − µ)(µj − µ)T ≤ η .   i=1 j∈[k] 2 P Now, to reflect the different expression for the covariance of the GMM, we replace σ 2 I with j∈[k] αj σj2 I; for example:   N   X X X Cη = w ∈ SN,ε : wi (Xi − µ)(Xi − µ)T − αj σj2 I − αj (µj − µ)(µj − µ)T ≤ η .   i=1 j∈[k] j∈[k] 2 We note that since all variances in each cluster are off by a factor of at most e, this will only affect our concentration and agnostic guarantees by a constant factor. 6 Agnostically Learning Binary Product Distributions, via Filters In this section, we study the problem of agnostically learning a binary product distribution. Such a distribution is entirely determined by its coordinate-wise mean, which we denote by the vector p, and our first 5 We require an additional guess of “k1 and k2 ”: the split into how many components are within Hℓ∗ and H ℓ∗ respectively. 42 e goal is to estimate p within ℓ2 -distance O(ε). Recall that the approach for robustly learning the mean of an identity covariance Gaussian, sketched in the introduction, was to compute the top absolute eigenvalue of a modified empirical covariance matrix. Our modification was crucially based on the promise that the covariance of the Gaussian is the identity. Here, it turns out that what we should do to modify the empirical covariance matrix is subtract off a diagonal matrix whose entries are p2i . These values seem challenging to directly estimate. Instead, we directly zero out the diagonal entries of the empirical covariance matrix. e Then the filtering approach proceeds as before, and allows us to estimate p within ℓ2 -distance O(ε), as we wanted. In the case when p has no coordinates that are too biased towards either zero or one, our estimate e is already O(ε) close in total variation distance. We give an agnostic learning algorithm for this so-called balanced case (see Definition 6.2) in Section 6.1. However, when p has some very biased coordinates, this need not be the case. Each coordinate that is biased needs to be learned multiplicatively correctly. Nevertheless, we can use our estimate for p that is close in ℓ2 -distance as a starting point for handling binary product distributions that have imbalanced coordinates. Instead, we control the total variation distance via the χ2 -distance between the mean vectors. Let P and Q be two product distributions whose means are p and q respectively. From Lemma 2.15, it follows that dTV (P, Q)2 ≤ 4 P (pi − qi )2 . i qi (1 − qi ) So, if our estimate q is already close in ℓ2 -distance to p, we can interpret the right hand side above as giving a renormalization of how we should measure the distance between p and q so that being close (in χ2 -distance) implies that our estimate is close in total variation distance. PWe can then set up a corrected eigenvalue problem using our initial estimate q as follows. Let χ2 (v)q = i vi2 qi (1 − qi ). Then, we compute max v T Σv , χ2 (v)q =1 e √ε) where Σ is the modified empirical covariance. Ultimately, we show that this yields an estimate that is O( close in total variation distance. See Section 6.2 for further details. 6.1 The Balanced Case The main result of this section is the following theorem: Theorem 6.1. Let P be a binary product distribution in d dimensions and ε, τ > 0. Let S be a multiset of Θ(d4 log(1/τ )/ε2 ) independent samples from P and S ′ be a multiset obtained by arbitrarily changing an ε-fraction of the points in S. There exists a polynomial time algorithm P′ p that returns a product distribution ′ ′ so that, with probability at least 1 − τ , we have kp − p k2 = O(ε log(1/ε)), where p and p are the mean vectors of P and P ′ respectively. Note that Theorem 6.1 applies to all binary product distributions, and its performance guarantee relates the ℓ2 -distance between the mean vectors of the hypothesis P ′ and the target product distribution P . If P is balanced, i.e., it does not have coordinates that are too biased towards 0 or 1, this ℓ2 -guarantee implies a similar total variation guarantee. Formally, we have: Definition 6.2. For 0 < c < 1/2, we say that a binary product distribution is c-balanced if the expectation of each coordinate is in [c, 1 − c]. For c-balanced binary product distributions, we have the following corollary of Lemma 2.15: Fact 6.3. Let P and Q be c-balanced binary product distributions with mean vectors p and q. Then, we have  −1/2 that dTV (P, Q) = O c · kp − qk2 . 43 That is, for two c-balanced binary product distributions, where c is a fixed constant, the ℓ2 -distance between their mean vectors is a good proxy for their total variation distance. Using Fact 6.3, we obtain the following corollary of Theorem 6.1: Corollary 6.4. Let P be a c-balanced binary product distribution in d dimensions, where c > 0 is a fixed constant, and ε, τ > 0. Let S be a multiset of Θ(d4 log(1/τ )/ε2 ) independent samples from P and S ′ be a multiset obtained by arbitrarily changing an ε-fraction of the points in S. There exists a polynomial timep algorithm that returns a product distribution P ′ so that with probability at least 1 − τ , dTV (P ′ , P ) = √ O(ε log(1/ε)/ c). We start by defining a condition on the uncorrupted set of samples S, under which our algorithm will succeed. Definition 6.5 (good set of samples). Let P be an arbitrary distribution on {0, 1}d and ε > 0. We say that a multiset S of elements in {0, 1}d is ε-good with respect to P if for every affine function L : {0, 1}d → R we have | PrX∈u S (L(X) ≥ 0) − PrX∼P (L(X) ≥ 0)| ≤ ε/d. The following simple lemma shows that a sufficiently large set of independent samples from P is ε-good (with respect to P ) with high probability. Lemma 6.6. Let P be an arbitrary distribution on {0, 1}d and ε, τ > 0. If the multiset S is obtained by taking Ω((d4 +d2 log(1/τ ))/ε2 ) independent samples from P, it is ε-good with respect to P with probability at least 1 − τ. Proof. For a fixed affine function L : {0, 1}d → R, an application of the Chernoff bound yields that after drawing N samples from P, we have that | PrX∈u S (L(X) ≥ 0) − PrX∼P (L(X) ≥ 0)| > ε/d 2 with probability at most 2 exp(−N ε2 /d2 ). Since there are at most 2d distinct linear threshold functions on {0, 1}d , by the union bound, the probability that there exists an L satisfying the condition | PrX∈u S (L(X) ≥ 2 0) − PrX∼P (L(X) ≥ 0)| > ε/d is at most 2d +1 exp(−N ε2 /d2 ), which is at most τ for N = Ω((d4 + d2 log(1/τ ))/ε2 ). The following definition quantifies the extent to which a multiset has been corrupted. Definition 6.7. Given finite multisets S and S ′ we let ∆(S, S ′ ) be the size of the symmetric difference of S and S ′ divided by the cardinality of S. Note that the definition of ∆(S, S ′ ) is not symmetric in its two arguments. Our agnostic learning algorithm establishing Theorem 6.1 is obtained by repeated application of the efficient procedure whose performance guarantee is given in the following proposition: Proposition 6.8. Let P be a binary product distribution with mean vector p and ε > 0 be sufficiently small. Let S be ε-good with respect to P , and S ′ be any multiset with ∆(S, S ′ ) ≤ 2ε. There exists a polynomial time algorithm F ILTER -BALANCED -P RODUCT that, given S ′ and ε > 0, returns one of the following: p (i) A mean vector p′ such that kp − p′ k2 = O(ε log(1/ε)). (ii) A multiset S ′′ ⊆ S ′ such that ∆(S, S ′′ ) ≤ ∆(S, S ′ ) − 2ε/d. We start by showing how Theorem 6.1 follows easily from Proposition 6.8. 44 Proof of Theorem 6.1. By the definition of ∆(S, S ′ ), since S ′ has been obtained from S by corrupting an ε-fraction of the points in S, we have that ∆(S, S ′ ) ≤ 2ε. By Lemma 6.6, the set S of uncorrupted samples is ε-good with respect to P with probability at least 1 − τ. We henceforth condition on this event. Our algorithm iteratively applies the F ILTER -BALANCED -P RODUCT procedure of Proposition 6.8 until p it terminates returning a mean vector p′ with kp − p′ k2 = O(ε log(1/ε)). We claim that we need at most d + 1 iterations for this to happen. Indeed, the sequence of iterations results in a sequence of sets S0 = S ′ , S1′ , . . . , so that ∆(S, Si′ ) ≤ ∆(S, S ′ ) − i · (2ε/d). Thus, if the algorithm does not terminate in the first d iterations, we have Sd′ = S, and in the next iteration we output the sample mean of S. 6.1.1 Algorithm F ILTER -BALANCED -P RODUCT: Proof of Proposition 6.8 In this section, we describe the efficient procedure establishing Proposition 6.8 followed by its proof of correctness. Our algorithm F ILTER -BALANCED -P RODUCT is very simple: We consider the empirical dis′ tribution defined by the (corrupted) sample multiset S ′ . We calculate its mean vector µS and covariance ′ matrix M . If the matrix M has no large eigenvalues, we return µS . Otherwise, we use the eigenvector v ∗ ′ corresponding to the maximum magnitude eigenvalue λ∗ of M and the mean vector µS to define a filter. We zero out the diagonal elements of the covariance matrix for the following reason: The diagonal elements could contribute up to Ω(1) to the spectral norm, even without noise. This would prevent us from obtaining e the desired error of O(ε). Our efficient filtering procedure is presented in detailed pseudocode below. Algorithm 9 Filter algorithm for a balanced binary product distribution 1: procedure F ILTER -BALANCED -P RODUCT (ε, S ′ ) input: A multiset S ′ such that there exists an ε-good S with ∆(S, S ′ ) ≤ 2ε output: Multiset S ′′ or mean vector p′ satisfying Proposition 6.8 ′ 2: Compute the sample mean µS = EX∈u S ′ [X] and the sample covariance M with zeroed diagonal, ′ ′ 3: i.e., M = (Mi,j )1≤i,j≤d with Mi,j = EX∈u S ′ [(Xi − µSi )(Xj − µSj )], i 6= j, and Mi,i = 0. 4: Compute approximations for the largest absolute eigenvalue of M , λ∗ := kM k2 , and the associated unit eigenvector v ∗ . ′ 5: if kM k2 ≤ O(ε log(1/ε)), then return µS . p 6: Let δ := 3 εkM k2 . Find T > 0 such that ′ Pr (|v ∗ · (X − µS )| > T + δ) > 8 exp(−T 2 /2) + 8ε/d. X∈u S ′ 7: ′ return the multiset S ′′ = {x ∈ S ′ : |v ∗ · (x − µS )| ≤ T + δ}. Tightness of our Analysis.pWe remark that the analysis of our filter-based algorithm is tight, and more generally our bound of O(ε log(1/ε)) is a bottleneck for filter-based approaches. More specifically, we note that our algorithm will never successfully add points back to S after they have been removed by the adversary. Therefore, if an ε-fraction of the points in S are changed, our algorithm may be able to remove these outliers from S ′ , but will not be able top replace them with their original values. These changed values can alter the sample mean by as much as Ω(ε log(1/ε)). To see this, consider the following example. Let P be the product distribution with mean p, where pi = 1/2 for all i. Set ε = 2−(d−1) . We draw a Θ(d4 log(1/τ )/ε2 ) size multiset S which we assume is ε-good. The fraction of times the all-zero vector appears in S is less than 2−(d−1) . So, the adversary is allowed to corrupt all such zero-vectors. More specifically, the adversary replaces each occurrence of the all-zero vector with fresh samples from P, repeating if any all-zero vector is drawn. In effect, this 45 procedure generates samples from the distribution Pe, defined as P conditioned on not being the all-zero vector. Indeed, with high probability, the set S ′ is ε-good for Pe. So, with high probability, the mean of S ′ in each √ coordinate is at least 1/2 + 2−(d+2) . Thus, the ℓ2 -distance between the mean vectors of P and Pe is p at least d2−(d+2) = Θ(ε log(1/ε)). Note that for any affine function L, we have that PrX∈u S ′ (L(X) ≥ 0) ≤ PrX∈u S (L(X) ≥ 0)/(1 − ε) + 2ε/d, which means that no such function can effectively distinguish between S ′ \ S and S, as would be required by a useful filter. The rest of this section is devoted to the proof of correctness of algorithm F ILTER -BALANCED -P RODUCT. 6.1.2 Setup and Basic Structural Lemmas By definition, there exist disjoint multisets L, E, of points in {0, 1}d , where L ⊂ S, such that S ′ = (S \ ′ L) ∪ E. With this notation, we can write ∆(S, S ′ ) = |L|+|E| |S| . Our assumption ∆(S, S ) ≤ 2ε is equivalent ′ to |L| + |E| ≤ 2ε · |S|, and the definition of S directly implies that (1 − 2ε)|S| ≤ |S ′ | ≤ (1 + 2ε)|S|. Throughout the proof, we assume that ε is a sufficiently small constant. Our analysis will make essential use of the following matrices: ′ ′ • MP denotes the matrix with (i, j)-entry EX∼P [(Xi − µSi )(Xj − µSj )], but 0 on the diagonal. ′ ′ • MS denotes the matrix with (i, j)-entry EX∈u S [(Xi − µSi )(Xj − µSj )], but 0 on the diagonal. ′ ′ • ME denotes the matrix with (i, j)-entry EX∈u E [(Xi − µSi )(Xj − µSj )]. ′ ′ • ML denotes the matrix with (i, j)-entry EX∈u L [(Xi − µSi )(Xj − µSj )]. Our first claim follows from the Chernoff bound and the definition of a good set: Claim 6.9. Let w ∈ Rd be any unit vector, then for any T > 0, ′ ′ Pr (|w · (X − µS )| > T + kµS − pk2 ) ≤ 2 exp(−T 2 /2) + ε/d. X∈u S and ′ ′ Pr (|w · (X − µS )| > T + kµS − pk2 ) ≤ 2 exp(−T 2 /2). X∼P Proof. Since S is ε-good, the first inequality follows from the second one. To prove the second inequality, it ′ ′ suffices to bound the probability that |w · (X − µS ) − E[w · (X − µS )]| > T , X ∼ P , since the expectation ′ ′ in question is w · (p − µS ), whose absolute value is at most kµS − pk2 , by Cauchy-Schwarz. Note that ′ ′ w · (X − µS ) is a sum of independent random variables wi (Xi − µSi ), each supported on an interval of length 2|wi |. An application of the Chernoff bound completes the proof. The following sequence of lemmas bound from above the spectral norms of the associated matrices. Our first simple lemma says that the (diagonally reduced) empirical covariance matrix MS , where S is the set of uncorrupted samples drawn from the binary product distribution P, is a good approximation to the matrix MP , in spectral norm. Lemma 6.10. If S is ε-good, kMP − MS k2 ≤ O(ε). Proof. It suffices to show that |(MP )i,j − (MS )i,j | ≤ O(ε/d) for all i 6= j. Then, we have that kMP − MS k2 ≤ kMP − MS kF ≤ O(ε). 46 Let ei denote the standard basis vector in the i-th direction in Rd . For i 6= j we have: ′ ′ (MP )i,j = E [(Xi − µSi )(Xj − µSj )] X∼P = E [Xi Xj ] − µSi X∼P ′ E [Xj ] − µSj ′ X∼P = Pr ((ei + ej ) · X ≥ 2) X∼P ′ − µSi ′ E [Xi ] + µSj µSi ′ X∼P ′ ′ ′ Pr (ej · X ≥ 1) − µSj Pr (ei · X ≥ 1) + µSj µSi . X∼P X∼P A similar expression holds for MS except with probabilities for X ∈u S. Since S is ε-good with respect to ′ ′ P , we have |(MP )i,j − (MS )i,j | ≤ ε/d + µSi ε/d + µSj ε/d ≤ 3ε/d. This completes the proof. As a simple consequence of the above lemma, we obtain the following: Claim 6.11. If S is ε-good, kM − (1/|S ′ |)(|S|MP + |E|ME − |L|ML )k2 = O(ε). Proof. First note that we can write |S ′ |M = |S|MS + |E|ME0 − |L|ML0 , where ME0 and ML0 are obtained from ME and ML by zeroing out the diagonal. Observe that |E| + |L| = O(ε)|S ′ |. This follows from the assumption that ∆(S, S ′ ) ≤ 2ε and the definition of S ′ . Now note that the matrices ME − ME0 and ML − ML0 are diagonal with entries at most 1, and thus have spectral norm at most 1. The claim now follows from Lemma 6.10. ′ Recall that if µS = p, MP would equal the (diagonally reduced) covariance matrix of the product distribution P, i.e., the identically zero matrix. The following simple lemma bounds from above the spectral norm of MP by the ℓ22 -norm between the corresponding mean vectors: ′ Lemma 6.12. We have that kMP k2 ≤ kµS − pk22 . ′ ′ Proof. Note that (MP )i,j = (µSi − pi )(µSj − pj ) for i 6= j and 0 otherwise. Therefore, MP is the difference ′ ′ ′ of (µS − p)(µS − p)T and the diagonal matrix with entries (µSi − pi )2 . This in turn implies that ′ ′ ′ (µS − p)(µS − p)T  MP  Diag(−(µSi − pi )2 ) . ′ Note that both bounding matrices have spectral norm at most kµS − pk22 , hence so does MP . The following lemma, bounding from above the spectral norm of ML , is the main structural result of this section. This is the core result needed to establish that the subtractive error cannot change the sample mean by much: ′ Lemma 6.13. We have that kML k2 = O(log(|S|/|L|) + kµS − pk22 + ε · |S|/|L|), hence ′ (|L|/|S ′ |) · kML k2 = O(ε log(1/ε) + εkµS − pk22 ). Proof. Since L ⊆ S, for any x ∈ {0, 1}d , we have that |S| · Pr (X = x) ≥ |L| · Pr (X = x) . X∈u S X∈u L (28) Since ML is a symmetric matrix, we have kML k2 = maxkvk2 =1 |v T ML v|. So, to bound kML k2 it suffices to bound |v T ML v| for unit vectors v. By definition of ML , for any v ∈ Rd we have that |v T ML v| = ′ E [|v · (X − µS )|2 ]. X∈u L 47 The RHS is in turn bounded from above as follows: S′ 2 E [|v · (X − µ )| ] = 2 X∈u L ≤2 ≪ Z Z √ d Pr 0 0 √ X∈u L d   ′ |v · (X − µS )| > T · T dT    S′ min 1, |S|/|L| · Pr |v · (X − µ )| > T T dT X∈u S Z 4√log(|S|/|L|)+kµS ′ −pk2 0 + (|S|/|L|) Z √ d √ 4 T dT log(|S|/|L|)+kµS ′ −pk2 ′  exp(−(T − kµ S′ ≪ log(|S|/|L|) + kµS − pk22 + ε · |S|/|L| ,  − pk2 ) /2)T + εT /d dT 2 where the second line follows from (28) and the third line follows from Claim 6.9. This establishes the first part of the lemma. ′ The bound (|L|/|S|)kML k2 = O(ε log(1/ε) + εkµS − pk22 ) follows from the previously established bound using the monotonicity of the function x ln(1/x), and the fact that |L|/|S| ≤ 2ε. The observation |S|/|S ′ | ≤ 1 + 2ε ≤ 2 completes the proof of the second part of the lemma. Claim 6.11 combined with Lemmas 6.12 and 6.13 and the triangle inequality yield the following: ′ Corollary 6.14. We have that kM − (|E|/|S ′ |)ME k2 = O(ε log(1/ε) + kµS − pk22 ). We are now ready to analyze the two cases of the algorithm F ILTER -BALANCED -P RODUCT. 6.1.3 The Case of Small Spectral Norm ′ We start by analyzing the case where the mean vector µS is returned. This corresponds to the case that the spectral norm of M is appropriately small, namely kM k2 ≤ O(ε log(1/ε)). We start with the following simple claim: ′ Claim 6.15. Let µE , µL be the mean vectors of E and L respectively. Then, kµE − µS k22 ≤ kME k2 and ′ kµL − µS k22 ≤ kML k2 . Proof. We prove the first inequality, the proof of the second being identical. Note that ME is a symmetric matrix, so kME k2 = maxkvk2 =1 |v T ME v|. Moreover, for any vector v we have that v T ME v = ′ ′ E [|v · (X − µS )|2 ] ≥ |v · (µE − µS )|2 . X∈u E ′ Let w = µE − µS and take v = w/kwk2 . We conclude that kME k2 ≥ kwk22 , as desired. ′ The following crucial lemma, bounding from above the distance kµS − pk2 as a function of ε and kM k2 , will be important for both this and the following subsections. p p ′ Lemma 6.16. We have that kµS − pk2 ≤ 2 εkM k2 + O(ε log(1/ε)). Proof. First we observe that the mean vector µS of the uncorrupted sample set S is close to p. Since S is ε-good, this follows from the fact that for any i ∈ [d], we have |µSi − pi | = | Pr [ei · X ≥ 1] − Pr [ei · X ≥ 1]| ≤ ε/d. X∈u S X∼P 48 √ Therefore, we get that kµS − pk2 ≤ ε/ d. Consider µE and µL , the mean vectors of E and L, respectively. By definition, we have that ′ |S ′ |µS = |S|µS + |E|µE − |L|µL , and thus by the triangle inequality we obtain √ ′ kµS − pk2 ≤ k(|E|/|S ′ |)(µE − p) − (|L|/|S ′ |)(µL − p)k2 + ε/ d . Therefore, we have the following sequence of inequalities: √ ′ ′ ′ ′ kµS − pk2 ≤ (|E|/|S ′ |) · kµE − µS k2 + (|L|/|S ′ |) · kµL − µS k2 + O(ε) · kµS − pk2 + ε/ d p p √ ′ ≤ (|E|/|S ′ |) · kME k2 + (|L|/|S ′ |) · kML k2 + O(ε) · kµS − pk2 )) + ε/ d p p √ ′ ≤ O(ε log(1/ε)) + (3/2) εkM k2 + O( ε) · kµS − pk2 p p ′ ≤ O(ε log(1/ε))) + (3/2) εkM k2 + kµS − pk2 /4 , where the first line follows from the triangle inequality, the second uses Claim 6.15, while the third uses Lemma 6.13 and Corollary 6.14. Finally, the last couple of lines assume that ε is sufficiently small. The proof of Lemma 6.16 is now complete. We can now deduce the correctness of Step 5 of the algorithm F ILTER -BALANCED -P RODUCT, since p ′ for kM k2 ≤ O(ε log(1/ε)), Lemma 6.16 directly implies that kµS − pk2 = O(ε log(1/ε)). 6.1.4 The Case of Large Spectral Norm We next show the correctness of the algorithm F ILTER -BALANCED -P RODUCT if it returns a filter (rejecting an appropriate subset of S ′ ) in Step 6. This corresponds to the case that kM k2 ≥ Cε log(1/ε), for a sufficiently large universal constant C > 0. We will show that the multiset S ′′ ⊂ S ′ computed in Step 6 satisfies ∆(S, S ′′ ) ≤ ∆(S, S ′ ) − 2ε/d. We start by noting that, as a consequence of Lemma 6.16, we have the following: p ′ Claim 6.17. We have that kµS − pk2 ≤ δ := 3 εkM k2 . p ′ Proof. By Lemma 6.16, we have that kµS − pk2 ≤ 2δ/3 p + O(ε log(1/ε)). Recalling that kM k2 ≥ Cε log(1/ε), if C > 0 is sufficiently large, the term O(ε log(1/ε)) is at most δ/3. By construction, v ∗ is the unit eigenvector corresponding to the maximum magnitude eigenvalue of M. Thus, we have (v ∗ )T M v ∗ = kM k2 = δ2 /(9ε). We thus obtain that ′ E [|v ∗ · (X − µS )|2 ] = (v ∗ )T ME v ∗ ≥ X∈u E δ2 |S ′ | , 20ε|E| (29) where the equality holds by definition, and the inequality follows from Corollary 6.14 and Claim 6.17 using the fact that ε is sufficiently small and the constant C is sufficiently large (noting that the constant in the RHS of Corollary 6.14 does not depend on C). We show that (29) implies the existence of a T > 0 with the properties specified in Step 6 of the algorithm F ILTER -BALANCED -P RODUCT. More specifically, we have the following crucial lemma: Lemma 6.18. If kM k2 ≥ Cε log(1/ε), for a sufficiently large constant C > 0, there exists a T > 0 satisfying the property in Step 6 of the algorithm F ILTER -BALANCED -P RODUCT, i.e., such that ′ Pr (|v ∗ · (X − µS )| > T + δ) > 8 exp(−T 2 /2) + 8ε/d . X∈u S ′ 49 Proof. Assume for the sake of contradiction that this is not the case, i.e., that for all T > 0 we have that ′ Pr (|v ∗ · (X − µS )| ≥ T + δ) ≤ 8 exp(−T 2 /2) + 8ε/d . (30) X∈u S ′ Since E ⊆ S ′ , for all x ∈ {0, 1}d , we have that |S ′ | PrX∈u S ′ [X = x] ≥ |E| PrY ∈u E [Y = x]. This fact combined with (30) implies that for all T > 0 ′ Pr (|v ∗ · (Y − µS )| ≥ T + δ) ≪ (|S ′ |/|E|)(exp(−T 2 /2) + ε/d) . (31) Y ∈u E Using (29) and (31), we have the following sequence of inequalities: ′ δ2 |S ′ |/(ε|E|) ≪ E [|v ∗ · (Y − µS )|2 ] Y ∈u E Z ∞   ′ Pr |v ∗ · (Y − µS )| ≥ T · T dT =2 0 ′ Y ∈u E Z ≪ (|S |/|E|) Z √ ′ 4 ≪ √ O( d) 0 log(|S |/|E|)+δ  min |E|/|S ′ |, exp(−(T − δ)2 /2) + ε/d T dT T dt + Z ∞ √ 4 0 ≪ log(|S ′ |/|E|) + δ2 + ε|S ′ | |E| log(|S ′ |/|E|)+δ (|S ′ |/|E|) exp(−(T − δ)2 /2)T dT + Z √ O( d) 0 . This yields the desired contradiction recalling that the assumption kM k2 ≥ Cε log(1/ε) and the definition p of δ imply that δ ≥ C ′ ε log(1/ε) for an appropriately large C ′ > 0. The following simple claim completes the proof of Proposition 6.8: Claim 6.19. We have that ∆(S, S ′′ ) ≤ ∆(S, S ′ ) − 2ε/d . Proof. Recall that S ′ = (S \ L) ∪ E, with E and L disjoint multisets such that L ⊂ S. We can similarly write S ′′ = (S \ L′ ) ∪ E ′ , with L′ ⊇ L and E ′ ⊂ E. Since ∆(S, S ′ ) − ∆(S, S ′′ ) = |E \ E ′ | − |L′ \ L| , |S| it suffices to show that |E \ E ′ | ≥ |L′ \ L| + 2ε|S|/d. Note that |L′ \ L| is the number of points rejected by the filter that lie in S ∩ S ′ . By Claim 6.9 and Claim 6.17, it follows that the fraction of elements x ∈ S that are removed to produce S ′′ (i.e., satisfy |v ∗ · (x − µS ′ )| > T + δ) is at most 2 exp(−T 2 /2) + ε/d. Hence, it holds that |L′ \ L| ≤ (2 exp(−T 2 /2) + ε/d)|S|. On the other hand, Step 6 of the algorithm ensures that the fraction of elements of S ′ that are rejected by the filter is at least 8 exp(−T 2 /2) + 8ε/d. Note that |E \ E ′ | is the number of points rejected by the filter that lie in S ′ \ S. Therefore, we can write: |E \ E ′ | ≥ (8 exp(−T 2 /2) + 8ε/d)|S ′ | − (2 exp(−T 2 /2) + ε/d)|S| ≥ (8 exp(−T 2 /2) + 8ε/d)|S|/2 − (2 exp(−T 2 /2) + ε/d)|S| ≥ (2 exp(−T 2 /2) + 3ε/d)|S| ≥ |L′ \ L| + 2ε|S|/d , where the second line uses the fact that |S ′ | ≥ |S|/2 and the last line uses the fact that |L′ \ L|/|S| ≤ (2 exp(−T 2 /2) + ε/d). This completes the proof of the claim. 50 ε|S ′ | T dT d|E| 6.2 Agnostically Learning Arbitrary Binary Product Distributions In this subsection, we build on the approach of the previous subsection to show the following: Theorem 6.20. Let P be a binary product distribution in d dimensions and ε, τ > 0. There is a polynomial time algorithm that, given ε and a set of Θ(d6 log(1/τ )/ε3 ) independent samples from P, an ε fraction of e which have been arbitrarily corrupted, outputs (the p mean vector of) a binary product distribution P so that, with probability at least 1 − τ , dTV (P, Pe) ≤ O( ε log(1/ε)). By Lemma 2.15, the total variation distance between two binary product distributions can be bounded from above by the square root by the χ2 -distance between the corresponding means. For the case of balanced product distributions, the χ2 -distance and the ℓ2 -distance are within a constant factor of each other. Unfortunately, this does not hold in general, hence the guarantee of our previous algorithm is not sufficient to get a bound on the total variation distance. Note, however that the χ2 -distance and the ℓ2 -distance can be related by rescaling each coordinate by the standard deviation of the corresponding marginal. When we rescale the covariance matrix in this way, we can use the top eigenvalue and eigenvector as before, except that we obtain bounds that involve the χ2 in place of ℓ2 -distance. The concentration bounds we obtain with this rescaling are somewhat weaker, and as a result, our quantitative guarantees for the general case are somewhat weaker than in the balanced case. Similarly to the case of balanced product distributions, we will require a notion of a “good” set for our distribution. For technical reasons, the definition in this setting turns out to be more complicated. Roughly speaking, this is to allow us to ignore coordinates for which the small fraction of errors is sufficient to drastically change the sample mean. Definition 6.21 (good set of samples). Let P be a binary product distribution and ε, η > 0. We say that a multiset S of elements in {0, 1}d is (ε, η)-good with respect to P if for every affine function L : {0, 1}d → R P and every subset of coordinates T ⊆ [d] satisfying i∈T pi (1 − pi ) < η the following holds: Letting ST be the subset of points in S that have their ith coordinate equal to the most common value under P for all i ∈ T, and letting PT be the conditional distribution of P under this condition, then | Pr (L(X) ≥ 0) − Pr (L(X) ≥ 0)| ≤ ε3/2 /d2 . X∈u ST X∼PT We note that a sufficiently large set of samples from P will satisfy the above properties with high probability: Lemma 6.22. If S is obtained by taking Ω(d6 log(1/τ )/ε3 ) independent samples from P, it is (ε, 1/5)-good with respect to P with probability at least 9/10. The proof of this lemma is deferred to Section D. We will also require a notion of the number of coordinates on which S non-trivially depends: Definition 6.23. For S a multiset of elements in {0, 1}d , let supp(S) be the subset of [d] consisting of indices i so that the ith coordinate of elements of S is not constant. Similarly to the balanced case, our algorithm is obtained by repeated application of an efficient filter procedure, whose precise guarantee is described below. Proposition 6.24. Let P be a binary product distribution in d dimensions and ε > 0. Suppose that S is an (ε, η)-good multiset with respect to P with η > 10ε and S ′ be any multiset with ∆(S, S ′ ) ≤ 2ε. There exists a polynomial time algorithm which, given ε and S ′ , returns one of the following: p (i) The mean vector of a product distribution P ′ with dTV (P, P ′ ) = O( ε ln(1/ε)). 51 (ii) A multiset S ′′ of elements of {0, 1}d so that there exists a product distribution Pe with mean pe and a multiset Se that is (ε, η − kp − pek1 )-good with respect to Pe such that e S ′′ ) + ε|supp(S ′′ )|/d + kp − pek1 /6 < ∆(S, S ′ ) + ε|supp(S ′ )|/d . ∆(S, Our agnostic learning algorithm is then obtained by iterating this procedure. Indeed, the proof of Theorem 6.20 given Proposition 6.24 is quite simple. Proof of Theorem 6.20. We draw Θ(d6 log(1/τ )/ε3 )) samples forming a set S, which is (ε, 1/5) good with probability 1 − τ by Lemma 6.22. We condition on this event. The adversary corrupts an ε-fraction of S producing a set S ′ with ∆(S, S ′ ) ≤ 2ε. The iterations of the algorithm produce a sequence of sets S0 = S, S1 , . . . , Sk , where Si is (ε, ηi )-good for some binary product distribution Pi and some sets Si′ . We note that ∆(Si , Si′ ) + ε|supp(Si′ )|/d is monotonically decreasing and never more than 3ε. Since |µPi − µPi+1 | ≤ th dTV (P Pi , Pi+1 ), in the i iteration, the aforementioned quantity decreases by at least dTV (Pi , Pi+1 ), and′ thus i dTV (Pi , Pi+1 ) ≤ p3ε. Therefore, dTV (P, Pk ) ≤ 3ε. Our algorithm outputs a product distribution P with dTV (Pk , P ′ ) = O( ε ln(1/ε)). The triangle inequality completes the proof. 6.2.1 Algorithm F ILTER -P RODUCT: Proof of Proposition 6.24 In this section, we describe and analyze the efficient routine establishing Proposition 6.24. Our efficient filtering procedure is presented in detailed pseudocode below. Algorithm 10 Filter algorithm for an arbitrary binary product distribution 1: procedure F ILTER -P RODUCT(ε, S ′ ) input: ε > 0 and multiset S ′ such that there exists an ε-good S with ∆(S, S ′ ) ≤ 2ε output: Multiset S ′′ or mean vector p′ satisfying Proposition 6.24 ′ 2: Compute the sample mean µS = EX∈u S ′ [X] and the sample covariance matrix M ′ ′ 3: i.e., M = (Mi,j )1≤i,j≤d with Mi,j = EX∈S ′ [(Xi − µSi )(Xj − µSj )]. ′ ′ 4: if there exists i ∈ [d] with 0 < µSi < ε/d or 0 < 1 − µSi < ε/d, then 5: let S ′′ be the subset of elements of S ′ in which those coordinates take their most common value. 6: return S ′′ . /* For the later steps, we ignore any coordinates not in supp(S ′ ). */ 7: Compute approximations for the largest magnitude eigenvalue λ′ of DM D, λ′ := kDM Dk2 , where q D = Diag(1/ 8: 9: ′ ′ µSi (1 − µSi )), and the associated unit eigenvector v ′ . ′ if kDM Dk2 < O(log(1/ε)), then return µS (re-inserting all coordinates affected by Step 6). p Let δ := 3 εkDM Dk2 . Find T > 0 such that ′ Pr (|v ∗ · (X − µS )| > T + δ) > 20/T 2 + 4ε3/2 /d2 , X∈u S ′ where v ∗ := Dv ′ . ′ 10: return the multiset S ′′ = {x ∈ S ′ : |v ∗ · (x − µS )| ≤ T + δ} . This completes the description of the algorithm. We now proceed to prove correctness. 52 6.2.2 Chi-Squared Distance and Basic Reductions As previously mentioned, our algorithm will use the chi-squared distance between the mean vectors as a proxy for the total variation distance between two binary product distributions. Since the mean vector of the target distribution is not known to us, we will not be able to use the symmetric definition of the chi-squared distance used in Lemma 2.15 We will instead require the following asymmetric version of the chi-squared distance: 2 def P i −yi ) . Definition 6.25. The χ2 -distance of x, y ∈ Rd is defined by χ2 (x, y) = di=1 x(xi (1−x i) The following fact follows directly from Lemma 2.15. Fact p6.26. Let P, Q be binary product distributions with mean vectors p, q respectively. Then, dTV (P, Q) = O( χ2 (p, q)). There are two problems with using the chi-squared distance between the mean vectors as a proxy for the total variation distance. The first is that the chi-squared distance between the means is a very loose approximation of the total variational distance when the means are close to 0 or 1 in some coordinate. To circumvent this obstacle, we remove such coordinates via an appropriate pre-processing in Step 6. The second is that the above asymmetric notion of the χ2 -distance may be quite far from the symmetric definition. To overcome this issue, it suffices to have that qi = O(pi ) and 1 − qi = O(1 − pi ). To ensure this condition is satisfied, we appropriately modify the target product distribution (that we aim to be close to). Next, we will show how we deal with these problems in detail. Before we embark on a proof of the correctness of algorithm F ILTER -P RODUCT, we will make a few reductions that we will apply throughout. First, we note that if some coordinate in Step 6 exists, then removing the uncommon values of that coordinate increases ∆(S, S ′ ) by at most ε/d but decreases |supp(S ′ )| by at least 1. We also note that, if N is the set of coordinates outside of the support of S ′ , the probability that an element in S ′ has a coordinate in N that does not take its constant value is 0. Note that this is at most O(ε)P away from the probability that an element taken from P has this property, and thus we can assume that i∈N min{pi , 1 − pi } = O(ε). Therefore, after Step 6, we can assume that all coordinates i have ε/d ≤ pi ≤ 1 − ε/d. The next reduction will be slightly more complicated and depends on the following idea: Suppose that there is a new product distribution Pe with mean pe and an (ε, η − kp − pek1 )-good multiset Se for Pe so that e S ′ ) + kp − pek1 /5 ≤ ∆(S, S ′ ). ∆(S, Then, it suffices to show that our algorithm works for Pe and Se instead of P and S (note that the input to the algorithm, S ′ and ε in the same in either case). This is because the conditions imposed by the output in this ′ case would be strictly stronger. In particular, we may assume that µSi ≥ pi /3 for all i: ′ ′ Lemma 6.27. There is a product distribution Pe whose mean vector pe satisfies µSi ≥ pei /3 and 1 − µSi ≥ (1 − pei /3) for all i, and a set Se ⊆ S that is (ε, η − kp − pek1 )-good for Pe and satisfies e S ′ ) + kp − pek1 /5 ≤ ∆(S, S ′ ). ∆(S, ′ ′ Proof. If all coordinates i have µSi ≥ pi /3 and 1 − µSi ≥ (1 − pi /3), then we can take Pe = P and Se = S. ′ Suppose that the ith coordinate has µSi < pi /3. Let Pe be the product whose mean vector pe has pei = 0 and pej = pj for j 6= i. Let Se be obtained by removing from S all of the entries with 1 in the ith -coordinate. e S ′ ) + pi /5 ≤ ∆(S, S ′ ). Note that here we Then, we claim that Se is (ε, η − pi )-good for Pe and has ∆(S, have kp − pek1 = pi . 53 e e P First, we show that S is (ε, η − pi )-good for P . For any affine function L(x) and set T ⊆ [d] with ej (1 − pej ) ≤ η − pi , we need to show that j∈T p | Pr (L(X) > 0) − Pr (L(X) > 0)| ≤ ε3/2 /d2 . eT X∈u S X∼PeT Let Te = T ∪ {i}. We may or may not have i ∈ T but, from the definition of pe, X X X pej (1 − pej ) = pej (1 − pej ) = pj (1 − pj ). j∈T Thus, X j∈Te j∈T \{i} pj (1 − pj ) = pi (1 − pi ) + Since S is good for P , we have that j∈T \{i} X j∈T pej (1 − pej ) ≤ η − pi + pi (1 − pi ) ≤ η. | Pr (L(X) ≥ 0) − Pr (L(X) ≥ 0)| ≤ ε3/2 /d2 . X∈u STe X∼PTe Moreover, note that STe = SeT and PTe = PeT . Thus, Se is (ε, η − pi )-good for Pe. e S ′ ) + pi /5 ≤ ∆(S, S ′ ). We write S = Se \ L e ∪ E. e We write S1 , L1 , S ′ for Next, we show that ∆(S, 1 the subset of S, L, S ′ respectively, where the ith coordinate is 1. Since S is (ε, η)-good for P, we have that |µSi − pi | ≤ ε3/2 /d2 . Recall that we are already assuming that pei ≥ ε/d. Thus, µSi ≥ 29pi /30. Therefore, we have that |S1 | ≥ 29pi |S|/30. On the other hand, we have that |S1′ | ≤ pi |S ′ |/3 ≤ 11pi |S|/30. Thus, e S ′ )) = O(ε). However, E e = E ∪ S ′ and |L1 | = |S1 \ S1′ | ≥ 18pi |S|/30. This means that pi = O(∆(S, 1 e = L \ L1 . This gives L e S′) = ∆(S, ≤ e + |L| e |E| |E| + |S1′ | + |L| − |L1 | ≤ e e |S| |S| |E| + |L| − 7pi |S|/30 |E| + |L| − 7pi /30 = e |S|(1 − µSi ) |S| ∆(S, S ′ ) − 7pi /30 = ∆(S, S ′ ) − 7pi /30 + O(εpi ) 1 − 31pi /30 ≤ ∆(S, S ′ ) − pi /5 . ≤ ′ Similarly, suppose that instead the ith -coordinate has 1 − µSi < (1 − pi )/3. Let Pe be the product whose mean vector pe has pei = 1 and pej = pj for j 6= i. Let Se be obtained by removing from S all of the entries with 0 in the ith -coordinate. Then, by a similar proof we have that Se is (ε, η − (1 − pi ))-good for Pe and has e S ′ ) + (1 − pi )/5 ≤ ∆(S, S ′ ). Note that here we have kp − pek1 = 1 − pi . ∆(S, ′ ′ By an easy induction, we can set all coordinates i with µSi ≥ pei /3 and 1 − µSi ≥ (1 − pei /3) to 0 or 1 respectively, giving an Se and Pe such that Se is (ε, η − kp − pek1 )-good for Pe and e S ′ ) + kp − pek1 /5 ≤ ∆(S, S ′ ) , ∆(S, as desired. In conclusion, throughout the rest of the proof we may and will assume that for all i, ′ • ε/d ≤ µSi ≤ 1 − ε/d. ′ ′ • µSi ≥ pi /3 and 1 − µiS ≥ (1 − pi )/3. 54 6.2.3 Setup and Basic Structural Lemmas As in the balanced case, we can write S ′ = (S \ L) ∪ E for disjoint multisets L and E. Similarly, we define the following matrices: ′ ′ • MP to be the matrix with (i, j)-entry EX∼P [(Xi − µSi )(Xj − µSj )], ′ ′ • MS to be the matrix with (i, j)-entry EX∈u S [(Xi − µSi )(Xj − µSj )], ′ ′ • ME to be the matrix with (i, j)-entry EX∈u E [(Xi − µSi )(Xj − µSj )], and ′ ′ • ML to be the matrix with (i, j)-entry EX∈u L [(Xi − µSi )(Xj − µSj )]. Note that we no longer zero-out the diagonals of MP and MS . We start with the following simple claim: P ′ ′ Claim 6.28. For any v ∈ Rd satisfying di=1 vi2 µSi (1 − µSi ) ≤ 1, the following statements hold: p ′ (i) VarX∼P [v · X] ≤ 9 and |v · (p − µS )| ≤ χ2 (µS ′ , p), and   p ′ (ii) PrX∼P |v · X − µS | ≥ T + χ2 (µS ′ , p) ≤ 9/T 2 . Proof. Recall that p denotes the mean vector of the binary product P. To show (i), we use the fact that Xi ∼ Ber(pi ) and the Xi ’s are independent. This implies that # " d d d d X X X X ′ ′ 2 2 vi2 µSi (1 − µSi ) ≤ 9 , vi pi (1 − pi ) ≤ 9 vi Var[Xi ] = Var vi Xi = X∼P i=1 i=1 ′ i=1 i=1 ′ where we used that pi ≤ 3µSi , (1 − pi ) ≤ 3(1 − µSi ) and the assumption in the claim statement. For the second part of (i), note that v u d d q q q S′ uX X p − µ ′ ′ ′ ′ i S′ i S S ≤t vi2 µSi (1 − µSi )· χ2 (µS ′ , p) ≤ χ2 (µS ′ , p) , vi µi (1 − µi ) · q |v·(p−µ )| = ′ ′ µSi (1 − µSi ) i=1 i=1 where the firstP inequality is Cauchy-Schwarz, and the second follows from the assumption in the claim ′ ′ statement that di=1 vi2 µSi (1 − µSi ) ≤ 1. This proves (i). To prove (ii), we note that Chebyshev’s inequality gives Pr (|v · (X − p)| ≥ T ) ≤ Var [v · X]/T 2 ≤ 9/T 2 , X∼P X∼P where the second inequality follows from (i). To complete the proof note the inequality q ′ |v · (X − µS )| ≥ T + χ2 (µS ′ , p) implies that ′ ′ |v · (X − p)| ≥ |v · (X − µS )| − |v · (p − µS )| ≥ T , where we used the triangle inequality and the second part of (i). Let Cov[S] denote the sample covariance matrix with respect to S, and Cov[P ] denote the covariance matrix of P. We will need the following lemma: Lemma 6.29. We have the following: 55 (i) p p χ2 (µS ′ , µS ) − χ2 (µS ′ , p) ≤ O(ε/d), and √ (ii) kD (Cov[S] − Cov[P ]) Dk2 ≤ O( ε) . Proof. For (i): Since S is good, for any i ∈ [d], we have |µSi − pi | = Pr (ei · X ≥ 1) − Pr (ei · X ≥ 1) ≤ ε3/2 /d2 . X∈u S X∼P Therefore, by the triangle inequality we get v s u d q q S − p )2 u X (µ d · (ε3 /d4 ) i i ≤ ≤ O(ε/d) , χ2 (µS ′ , µS ) − χ2 (µS ′ , p) ≤ t ′ ′ S S ε/(2d) µ (1 − µ ) i i i=1 ′ ′ where the second inequality uses the fact that µSi (1 − µSi ) ≥ ε/(2d). For (ii): Since S is good, for any i, j ∈ [d], we have E [Xi Xj − pi pj ] = X∈u S Pr [(ei + ej ) · X ≥ 1] − Pr [(ei + ej ) · X ≥ 1] ≤ ε3/2 /d2 . X∈u S X∼P Combined with the bound |µSi − pi | ≤ ε3/2 /d2 above, this gives |Cov[S]i,j − Cov[P ]i,j | ≤ O(ε3/2 /d2 ) . We thus obtain kCov[S] − Cov[P ]k2 ≤ k(Cov[S] − Cov[P ])kF ≤ O(ε3/2 /d) .   q p ′ ′ S S Note that kDk2 = maxi 1/ µi (1 − µi ) ≤ 2d/ε. Therefore, √ kD (Cov[S] − Cov[P ]) Dk2 ≤ O( ε) . Combining Claim 6.28 and Lemma 6.29 we obtain: P ′ ′ Corollary 6.30. For any v ∈ Rd with di=1 vi2 µSi (1 − µSi ) ≤ 1, we have: p ′ (i) VarX∈u S [v · X] ≤ 10 and |v · (µS − µS )| ≤ χ2 (µS ′ , p) + O(ε/d), and   p ′ (ii) PrX∈u S |v · X − µS | ≥ T + χ2 (µS ′ , p) ≤ 9/T 2 + ε3/2 /d2 . Proof. We have that | Var [v · X] − Var [v · Y ]| = v T (Cov[S] − Cov[P ]) v X∈u S Y ∼P ≤ kD −1 vk22 · kD (Cov[S] − Cov[P ]) Dk2 √ ≤ O( ε) ≤1, P ′ ′ where the second line uses Lemma 6.29 (ii), and the assumption kD −1 vk22 = di=1 vi2 µSi (1 − µSi ) ≤ 1, and the third line holds for small enough ε. Thus, using Claim 6.28 (i), we get that Var [v · X] ≤ Var [v · Y ] + 1 ≤ 10 . X∈u S Y ∼P 56 By the Cauchy-Schwarz inequality and Lemma 6.29, we get q q ′ S S′ 2 S S |v · (µ − µ )| ≤ χ (µ , µ ) ≤ χ2 (µS ′ , p) + O(ε/d) . This proves (i). Part (ii) follows directly from Claim 6.28 (ii) and the assumption that S is good for P. Lemma 6.31. For all i, j ∈ [d], we have that |(MS )i,j − (MP )i,j | ≤ O(ε3/2 /d2 ) and therefore |S ′ |M − |S|MP + |E|ME − |L|ML 2 = O(|S ′ |ε3/2 /d) . Proof. The bound |(MS )i,j − (MP )i,j | ≤ O(ε3/2 /d2 ) comes from expanding the LHS in terms of the differences of linear threshold functions on S and P in the same way as the proof of Lemma 6.29. The lemma then follows from the fact that that |S ′ |M = |S|MS + |E|ME − |L|ML and the observation |S| ≤ |S ′ |/(1 − 2ε) ≤ 2|S ′ |. Combining the above we obtain: Corollary 6.32. We have that kD(|S ′ |M − |S|MP − |E|ME + |L|ML )Dk2 = O(|S ′ | ·  q  p ′ ′ Proof. Note that kDk2 = maxi 1/ µSi (1 − µSi ) ≤ 2d/ε, and therefore D(|S ′ |M − |S|MP − |E|ME + |L|ML )D 2 √ ε) . ≤ kDk22 · |S ′ |M − |S|MP − |E|ME + |L|ML ′ 3/2 ≤ (2d/ε) · O(|S |ε √ = O(|S ′ | · ε) . 2 /d) We have the following lemma: ′ Lemma 6.33. We have that kDMP Dk2 ≤ 9 + χ2 (µS , p). ′ ′ T ′ ′ S S Proof. Note that M P = (µ − p)(µ − p) + Diag(pi (1 − pi )). For any v with kv2 k ≤ 1, the vector P ′ ′ d v = Dv ′ satisfies i=1 vi2 µSi (1 − µSi ) ≤ 1. Therefore, we can write ′ v ′T DMP Dv ′ = v T MP v = (v · (µS − p))2 + v T Diag(pi (1 − pi ))v . Using Claim 6.28 (i), we get ′ ′ (v.(µS − p))2 ≤ χ2 (µS , p) and |v T Diag(pi (1 − pi ))v| = | Var (v · (X − p))| ≤ 9 . X∼P This completes the proof. The following crucial lemma bounds from above the contribution of the subtractive error: ′ Lemma 6.34. The spectral norm kDML Dk2 = O(|S ′ |/|L| + χ2 (µS , p)). 57 Proof. Similarly, we need to bound from above the quantity |v ′T DML Dv ′ | for all v ′ ∈ Rd with kv ′ k2 ≤ 1. ′ Note |v ′T DML Dv ′ | = |v T ML v| = EX∈u L [|v · (X − µS )|2 ], where the vector v = Dv ′ satisfies Pd that S′ 2 S′ i=1 vi µi (1 − µi ) ≤ 1. The latter expectation is bounded from above as follows: ′ ′ E [(v · (X − µS ))2 ] ≤ 2 E [(v · (X − p))2 ] + 2(v · (µS − p))2 X∈u L X∈u L ′ ≤ 2 E [(v · (X − p))2 ] + 2χ2 (µS , p) X∈u L ′ ≤ (2|S|/|L|) · E [(v · (X − p))2 ] + 2χ2 (µS , p) X∈u S ′ ≤ 20|S|/|L| + 2χ2 (µS , p) ′ ≤ 21|S ′ |/|L| + 2χ2 (µS , p) , where the first line uses the triangle inequality, the second line uses Claim 6.28 (i), the third line follows from the fact that L ⊆ S, the fourth line uses Corollary 6.30 (i), and the last line uses the fact that ε is small enough. The above lemmas and the triangle inequality yield the following: ′ Corollary 6.35. We have that kD (M − (|E|/|S ′ |)ME ) Dk2 = O(1 + χ2 (µS , p)) . We are now ready to analyze the two cases of the algorithm F ILTER -P RODUCT. 6.2.4 The Case of Small Spectral Norm ′ We start by considering the case where the vector µS is returned. It suffices to show that in this case p ′ dTV (P, P ) = O( ε log(1/ε)). Let N be the set of coordinates not in supp(S ′ ). We note that only an ε fraction of the points in S could have that any coordinate in N does not have its most common value. Therefore, at most a 2ε fraction of samples from P have this property. Hence, the contribution to the variation distance coming from these coordinates is O(ε). So, it suffices to consider only the coordinates not in N and show that dTV (PN , PN′ ) = p O( ε log(1/ε)). Thus, we may assume for the sake the analysis below that N = ∅. We begin by bounding various χ2 -distances by the spectral norm of appropriate matrices. ′ Lemma 6.36. Let µE , µL be the mean vector of E and L, respectively. Then, χ2 (µS , µE ) ≤ kDME Dk2 ′ and χ2 (µS , µL ) ≤ kDML Dk2 . Proof. We prove the first inequality, the proof of the second being very similar. ′ ′ Note that for any vector v, v T ME v = EX∈u E [|v · (X − µS )|2 ] ≥ |v · (µE − µS )|2 . Let v ∈ Rd be the vector defined by S′ µE i − µi p vi = . ′ ′ µSi (1 − µSi ) χ2 (µS ′ , µE ) We have that kD −1 vk22 = d X i=1 ′ ′ vi2 µSi (1 − µSi ) = d S′ 2 X (µE i − µi ) = 1. ′ S ′ (1 − µS ′ ) χ2 (µS , µE ) µ i i i=1 Therefore, 1 ′ ′ kDME Dk2 ≥ v T ME v ≥ |v · (µE − µS )|2 = χ2 (µS , µE ) . 58 We can now prove that the output in Step 8 has the desired guarantee: p p √ Lemma 6.37. We have that χ2 (µS ′ , p) ≤ 2 εkDM Dk2 + O( ε). ′ Proof. Since S ′ = (S \ L) ∪ E, we have that |S ′ |µS = |S|µS + |E|µE − |L|µL . Recalling that L, E are disjoint, the latter implies that q q q (|S|/|S ′ |) χ2 (µS ′ , µS ) ≤ (|E|/|S ′ |) χ2 (µS ′ , µE ) + (|L|/|S ′ |) χ2 (µS ′ , µL ) . (32) p p ′ ′ First note that, by Lemma 6.29, | χ2 (µS , µS ) − χ2 (µS , p)| ≤ O(ε/d). Lemma 6.36 and Corollary 6.35 give that ′ ′ (|E|/|S ′ |)2 χ2 (µS , µE ) ≤ (|E|/|S ′ |)2 kDME Dk2 + O(ε) ≤ (|E|/|S ′ |)kDM Dk2 + O(ε(1 + χ2 (µS , p))) . Thus, q q p √ ′ 2 S E ′ (|E|/|S |) χ (µ , µ ) ≤ (|E|/|S |)kDM Dk2 + ε · O(1 + χ2 (µS ′ , p)) . ′ Lemmas 6.34 and 6.36 give that ′ ′ (|L|/|S ′ |)2 χ2 (µS , µL ) ≤ (|L|/|S ′ |)2 kDML Dk2 ≤ O((|L|/|S ′ |)2 χ2 (µS , p) + ε) . Thus, q q √ ′ ′ 2 S L (|L|/|S |) χ (µ , µ ) ≤ O((|L|/|S |) χ2 (µS ′ , p)) + O( ε) . ′ Substituting these into (32), yields    q q p √ ′ ′ ′ 2 S ′ 2 S (|S|/|S |) χ (µ , p) ≤ (|E|/|S |)kDM Dk2 + O ε 1 + χ (µ , p) . For ε sufficiently small, we have that the p χ2 (µS ′ , p) terms satisfy √ √ 1 (|S|/|S ′ |) − O( ε) ≥ 1 − 2ε − O( ε) ≥ √ . 2 Recalling that |E|/|S ′ | ≤ ∆(S, S ′ )|S|/|S ′ | ≤ (5/2)ε, we now have: q p √ χ2 (µS ′ , p) ≤ (5/2) εkDM Dk2 + O( ε) , as required. p p p Corollary 6.38. Forp some universal constant C, if δ ≤ C ε ln(1/ε), then χ2 (µS ′ , p) ≤ O( ε log(1/ε)). Otherwise, we have χ2 (µS ′ , p) ≤ δ. p p Proof. From the algorithm we have δ := 3 ε|λ| = 3 εkDM Dk2 . By Lemma 6.37, we have that q √ 5 χ2 (µS ′ , p) ≤ δ + O( ε) . 6 p p √ If C is sufficiently large, when δ > C ε ln(1/ε), this O( ε) is at most C ε ln(1/ε)/6. p Claim 6.39. If the algorithm terminates at Step 8, then we have dTV (P, P ′ ) ≤ O( ε ln(1/ε), where P ′ is ′ the product distribution with mean vector µS . p p ′ Proof. By Corollary 6.38, we have that χ2 (µS , p) ≤ O( ε log(1/ε)). Thus, p by Corollary 6.26, the total ′ variation distance between the product distributions with means p and µS is O( ε log(1/ε)). 59 6.2.5 The Case of Large Spectral Norm We next need to show the correctness of the algorithm if it returns a filter, If we reach thisp step, then we have kDM Dk2 = Ω(1), indeed |v ′ DM Dv ′T | = Ω(1), and by Corollary 6.38, it follows that χ2 (µS ′ , p) ≤ δ. P P ′ ′ ′2 Since kv ′ k2 = 1, Dv ′ satisfies di=1 (Dv ′ )2i µSi (1 − µSi ) = m i=1 vi = 1. Thus, we can apply Corollary 6.30 to it. ′ We will show that PrX∈u E (|v ∗ · (X − µS )| > T + δ) is larger than this quantity for some T > 0. Corollary 6.40. If we do not terminate at Step 8, then v ∗T ME v ∗ ≥ δ2 |S ′ |/(2ε|E|). Proof. By Corollary 6.35, we have that ′ kD(M − (|E|/|S ′ |)ME )Dk2 = O(1 + χ2 (µS , p)) . Since kD −1 vk2 ≤ 1, we have that ′ v ∗T (M − (|E|/|S ′ |)ME )v ∗ = O(1 + χ2 (µS , p)) = O(1 + δ) . Recall that we can assume that δ2 /ε ln(1/ε) is a sufficiently large constant. So, (|E|/|S ′ |)v ∗T ME v ∗ ≥ v ′T DM Dv ′ − O(1 + δ) = δ2 /ε − O(1 + δ) ≥ δ2 /2ε . Lemma 6.41. If kDM Dk2 = Ω(1), there exists a T > 0 satisfying the property in Step 9 of the algorithm, ′ i.e., PrX∈u S ′ [v ∗ · (X − µS )| > T + δ] ≥ 20/T 2 + 4ε3/2 /d2 . Proof. Assume for the sake of contradiction that this is not the case, i.e., that for all T > 0 we have that ′ Pr ′ (|v ∗ · (X − µS )| ≥ T + δ) < 20/T 2 + 4ε3/2 /d2 . X∈u S This implies that for all T > 0 ′ |E| Pr (|v ∗ · (Y − µS )| > T + δ) ≪ |S ′ |(1/T 2 + ε3/2 /d2 ). Y ∈u E Since for all i, we have p p ′ |vi (Yi − µSi )| ≤ 1/ pi (1 − pi ) ≤ 2 d/ε √ ′ Pr [|v ∗ · (Y − µS )|) > 2d3/2 / ε] = 0 . Y ∈u E 60 Therefore, we have that δ2 /ε ≪ (|E|/|S ′ |)(v ∗ )T ME v ∗ ′ = (|E|/|S ′ |) E [|v ∗ · (Y − µS )|2 ] Y ∈u E Z ∞ ′ Pr (|v ∗ · (Y − µS )| > T )T dT = 2(|E|/|S ′ |) ≪ ≤ ≪ Z Z √ 2d3/2 / 0 ε 0 √ 2d3/2 / ε 0 Z √1/ε+δ 0 Y ∈u E min{(|E|/|S ′ |), 1/(T − δ)2 + (ε/d)2 }T dT min{(5/2)ε, 1/(T − δ)2 + (ε/d)2 }T dT Z ∞ εT dt + √ 2 1/ε+δ T /(T − δ) dT + √ ≪ (1 + δ ε) + (log(1/ε) + δ ε) + ε/ d √ ≪ log(1/ε) + δ ε + δ2 ε . 2 √ This yields the desired contradiction recalling that δ ≥ C Z √ 2d3/2 / ε ε3/2 /d2 T dT 0 p ε log(1/ε) for an appropriately large C > 0. The following simple claim completes the proof of Proposition 6.24, and thus proves Theorem 6.20. Claim 6.42. If we return an S ′′ it will satisfy ∆(S, S ′′ ) ≤ ∆(S, S ′ ) − ε3/2 /d2 . Proof. We can write S ′′ = (S \ L′′ ) ∪ E ′′ for disjoint multisets L′′ and E ′′ . Note that S ′′ is produced from ′ S ′ by removing points with |v · X − µS | ≥ T + δ. Thus, E ′′ ⊂ E and L′′ ⊇ L. ′ By our choice of T , the fraction of x ∈ S ′ with |v · X − µS | ≥ T + δ is at least 20/T 2 + 4ε3/2 /d2 . Thus, |E \ E ′′ | + |L′′ \ L| ≥ (20/T 2 + 4ε3/2 /d2 ) · |S ′ | ≥ (18/T 2 + 3ε3/2 /d2 )|S| . On the other hand, the fraction of x ∈ S with the desired property is ′ Pr [|v ∗ · X − µS | ≥ T + δ] ≤ 9/T 2 + ε3/2 /d2 , X∈u S by Corollary 6.30 (ii). Thus, |L′′ \ L| ≤ (9/T 2 + ε3/2 /d2 )|S| , and therefore |E \ E ′′ | ≥ (9/T 2 + 2ε3/2 /d2 )|S|. In summary, we have that ∆(S, S ′ ) − ∆(S, S ′′ ) = |E| + |L| − |E ′′ | − |L′′ | ≥ ε3/2 /d2 . |S| 61 7 Agnostically Learning Mixtures of Two Balanced Binary Products, via Filters In this section, we study the problem of agnostically learning a mixture of two balanced binary product distributions. Let p and q be the coordinate-wise means of the two product distributions. Let u = p2 − 2q . Then, when there is no noise, the empirical covariance matrix is Σ = uuT + D, where D is a diagonal (pi −qi )2 i matrix whose entries are pi +q . Thus, it can already have a large eigenvalue. Now in the presence 2 − 4 of corruptions it turns out that we can construct a filter when the second absolute eigenvalue is also large. But even if only the top absolute eigenvalue is large, we know that both p and q are close to the line µ + cv, where µ is the empirical mean and v is the top eigenvector. And by performing a grid search over c, we will find a good candidate hypothesis. Unfortunately, bounds on the top absolute eigenvalue do not translate as well into bounds on the total variation distance of our estimate to the true distribution, as they did in all previous cases (e.g., if the top absolute eigenvalue is small in the case of learning the mean of a Gaussian with identity covariance, √ we can just use the empirical mean, etc). In fact, an eigenvalue λ could just mean that p and q differ by λ along the direction v. However, we can proceed by zeroing out the diagonals. If uuT has any large value along the diagonal, this operation can itself produce large eigenvalues. So, this strategy only works when kuk∞ is appropriately bounded. Moreover, there is a strategy to deal with large entries in u by guessing a coordinate whose value is large and conditioning on it, and once again setting up a modified eigenvalue problem. Our overall algorithm then follows from balancing all of these different cases, and we describe the technical components in more detail in the next subsection. 7.1 The Full Algorithm This section is devoted to the proof of the following theorem: Theorem 7.1. Let Π be a mixture of two c-balanced binary product distributions in d dimensions. Given ε > 0 and poly(d, 1/ε) log(1/τ ) independent samples from Π, an ε-fraction of which have been arbitrarily corrupted, there is a polynomial time algorithm that, with probability at least 1 − τ , outputs a mixture of √ two binary product distributions Π′ such that dTV (Π, Π′ ) = O(ε1/6 / c). Recall that our overall approach is based on two strategies that succeed under different assumptions. Our first algorithm (Section 7.2) assumes that there exists a coordinate in which the means of the two component product distributions differ by a substantial amount. Under this assumption, we can use the empirical mean vectors conditioned on this coordinate being 0 and 1. We show that the difference between these conditional mean vectors is almost parallel to the difference between the mean vectors of the product distributions. Considering eigenvectors perpendicular to this difference will prove a critical part of the analysis of this case. Our second algorithm (Section 7.3) succeeds under the assumption that the mean vectors of the two product distributions are close in all coordinates. This assumption allows us to zero out the diagonal of the covariance matrix without introducing too much error. Both these algorithms give an iterative procedure that produces filters which improve the sample set until they produce an output. We note that these algorithms essentially only produce a line in Rd so that both mean vectors of the target product distributions are guaranteed to be close to this line in ℓ2 -distance. The assumption that our product distributions are balanced implies that Π is close in variation distance to some mixture of two products whose mean vectors lie exactly on the given line. Given this line, we can exhaustively compare Π to a polynomial number of such mixtures and run a tournament to find one that is sufficiently close. We note that together these algorithms will cover all possible cases. Our final algorithm runs all of these procedures in parallel, obtaining a polynomial number of candidate hypothesis distributions, so that at 62 least one is sufficiently close to Π. We then run the tournament described by Lemma 2.9 in order to find a particular candidate that is sufficiently close to the target. To ensure that all the distributions returned are in some finite set M, we round each of the probabilities of each of the products to the nearest multiple of ε/d, and similarly round the mixing weight to the nearest multiple of ε. This introduces at most O(ε) additional error. Algorithm 11 Filter algorithm for agnostically learning a mixture of two balanced products 1: procedure L EARN P RODUCT M IXTURE(ε, τ, S ′ ) input: a set of poly(d, 1/ε) log(1/τ ) samples of which an ε-fraction have been corrupted. output: a mixture of two balanced binary products that is O(ε1/6 )-close to the target 2: Run the procedure F ILTER -BALANCED -P RODUCT(2ε1/6 , S1′ ) for up to d + 1 iterations on a set S1′ of corrupted samples of size Θ(d4 log(1/τ )/ε1/3 ). 3: for each 1 ≤ i∗ ≤ d do ′ ) for up to d+1 iterations 4: Run the procedure F ILTER -P RODUCT-M IXTURE -A NCHOR(i∗ , ε, S2,i ∗ 4 13/6 ′ ). on a set S2,i∗ of corrupted samples of size Θ(d log(1/τ )/ε Run the procedure F ILTER -P RODUCT-M IXTURE -C LOSE(ε, S3′ , δ := ε1/6 ) for up to d + 1 iterations on a set S3′ of corrupted samples of size Θ(d4 log(1/τ )/ε13/6 ). 6: Run a tournament among all mixtures output by any of the previous steps. Output the winner. 5: 7.2 Mixtures of Products Whose Means Differ Significantly in One Coordinate We will use the following notation. Let Π be a mixture of two c-balanced binary product distributions. We will write Π as αP + (1 − α)Q, where P, Q are binary product distributions with mean vectors p, q, and α ∈ [0, 1]. In this subsection, we prove the following theorem: Theorem 7.2. Let Π = αP + (1 − α)Q be a mixture of two c-balanced binary product distributions in d dimensions, with ε1/6 ≤ α ≤ 1 − ε1/6 , such that there exists 1 ≤ i∗ ≤ d with pi∗ ≥ qi∗ + ε1/6 . There is an algorithm that, given i∗ , ε > 0 and Θ(d4 log(1/τ )/ε3 ) independent samples from Π, an ε-fraction of which have been arbitrarily corrupted, runs in polynomial time and, with probability at least 1 − τ , outputs a set √ R of candidate hypotheses such that there exists Π′ ∈ R satisfying dTV (Π, Π′ ) = O(ε1/6 / c). For simplicity of the analysis, we will assume without loss of generality that i∗ = d, unless otherwise specified. First, we determine some conditions under which our sample set will be sufficient. We start by recalling our condition of a good set for a balanced binary product distribution: Definition 7.3. Let P be a binary product distribution in d dimensions and let ε > 0. We say that a multiset S of elements of {0, 1}d is ε-good with respect to P if for every affine function L : Rd → R it holds | Pr (L(X) > 0) − Pr (L(X) > 0)| ≤ ε/d. X∈u S X∼P We will also need this to hold after conditioning on the last coordinate. Definition 7.4. Let P be a binary product distribution in d dimensions and let ε > 0. We say that a multiset S of elements of {0, 1}d is (ε, i)-good with respect to P if S is ε-good with respect to P , and def S j = {x ∈ S : xi = j} is ε-good for the restriction of P to xi = j, for j ∈ {0, 1}. Finally, we define the notion of a good set for a mixture of two balanced products. 63 Definition 7.5. Let Π = αP + (1 − α)Q be a mixture of two binary product distributions. We say that a multiset S of elements of {0, 1}d is (ε, i)-good with respect to Π if we can write S = SP ∪ SQ , where SP is P| (ε, i)-good with respect to P , SQ is (ε, i)-good with respect to Q, and | |S|S| − α| ≤ ε/d2 . We now show that taking random samples from Π produces such a set with high probability. Lemma 7.6. Let Π = αP + (1 − α)Q be a mixture of binary product distributions, where P, Q are binary product distributions with mean vectors p, q. Let S be a set obtained by taking Ω(d4 log(1/τ )/ε13/6 ) independent samples from Π. Then, with probability at least 1 − τ , S is (ε, i)-good with respect to Π for all i ∈ [d]. The proof of this lemma is deferred to Section E. We claim that given a good set with an ε-fraction of its entries corrupted, we can still determine Π from it. In particular, this is achieved by iterating the following proposition. Proposition 7.7. Let Π = αP + (1 − α)Q be a mixture of two c-balanced binary products, with pd ≥ qd + ε1/6 and ε1/6 < α < 1 − ε1/6 . Let S be an (ε, d)-good multiset for Π, and let S ′ be any multiset with ∆(S, S ′ ) ≤ 2ε. There exists an algorithm which, given S ′ and ε > 0, runs in polynomial time and returns either a multiset S ′′ with ∆(S, S ′′ ) ≤ ∆(S, S ′ ) − 2ε/d, or returns a list of mixtures of two binary products √ S so that there exists a Π′ ∈ S with dTV (Π, Π′ ) = O(ε1/6 / c). We note that iteratively applying this algorithm until it outputs a set R of mixtures gives Theorem 7.2. Notation. All vectors in this section should be assumed to be over the first d − 1 coordinates only. We will write p−d and q−d for the first d − 1 coordinates of p and q, but for other vectors we will use the similar notation to that used elsewhere to denote (d − 1)-dimensional vectors. The algorithm, written in terms of i∗ instead of d for generality, is as follows: Algorithm 12 Filter algorithm for a mixture of two binary products whose means differ significantly in some coordinate 1: procedure F ILTER -P RODUCT-M IXTURE -A NCHOR (i∗ , ε, S ′ ) 2: Let µ be the sample mean of S ′ without the i∗ coordinate. Let Σ be the sample covariance matrix of S ′ without the i∗ row and column. 3: Let S0′ and S1′ be the subsets of S ′ with a 0 or 1 in their i∗ coordinates, respectively. 4: Let µ(j) be the sample mean of Sj′ without the i∗ coordinate. 5: Let u = µ(1) − µ(0) . Compute the unit vector v ∗ ∈ Rd−1 with v ∗ · u = 0 that maximizes v T Σv and let λ = v ∗T Σv ∗ . /* Note that v ∗ is the unit vector maximizing the quadratic form v T Σv over the subspace u · v = 0, and thus can be approximated using standard eigenvalue computations.*/ 6: if λ ≤ O(1) then 7: Let√L be the set of points µ + i(ε1/6 /kuk2 )u truncated to be in [c, 1 − c]d for i ∈ Z with |i| ≤ 1 + d/ε1/6 . 8: return the set of distributions Π′ = α′ P ′ + (1 − α′ )Q′ with the means of P ′ and Q′ , p′ , q ′ with ′ 1/6 . ′ ′ ′ p′−i∗ , q−i ∗ ∈ L and pi∗ , qi∗ ∈ [c, 1 − c], α ∈ [0, 1], multiples of ε √ 9: Let δ = C(ε1/6 λ + ε2/3 log(1/ε)) for a sufficiently large constant C. 10: Find a real number T > 0 such that Pr (|v ∗ · (X−i∗ − µ)| > T + δ) > 8 exp(−T 2 /2) + 8ε/d . X∈u S ′ 11: return the set S ′′ = {x ∈ S ′ : |v · (x−i∗ − µ)| ≤ T + δ}. 64 We now proceed to prove correctness. We note that given S = SP ∪ SQ , we can write ′ S ′ = SP′ ∪ SQ ∪ E. ′ ⊆ S and E is disjoint from S \ S ′ and S \ S ′ . Thus, we have where SP′ ⊆ SP , SQ Q P Q P Q ∆(S, S ′ ) = ′ | + |E| |SP \ SP′ | + |SQ \ SQ |S| . ′ We use the notation µSP , µSP , µE ∈ Rd−1 etc., for the means of SP , SP′ , E, etc., excluding the last coordinate. We next need some basic lemmata relating the means of some of these distributions. Lemma 7.8. Let P be a binary product distribution with mean vector p. Let S be an ε-good multiset for P in the sense of Definition 7.3. Let S̃ be a subset of S with |S| − |S̃| = O(ε|S|). Let µS̃ be the mean of S̃. p Then, kp − µS̃ k2 ≤ O(ε log(1/ε)). √ Proof. Since S is ε-good, kµS − pk2 ≤ ε/ d. Let L = S \ S̃. We can apply appropriate lemmata from ′ Section 6.1. Note that Lemma 6.13 and Claim 6.15, only depend on µS as far as it appears in the definition ′ of ML , and we may treat it as a parameter that we will set to p. By Lemma 6.13 with µS := p, we have ′ k EX∈u L [(X − p)(X − p)T ]k2 ≤ O (log(|S|/|L|) + ε|S|/|L|). By Claim 6.15 again with µS := p, it p follows that (|L|/|S|)kµL − pk2 ≤ O(ε log(1/ε)). Since |S|µS = |S̃|µS̃ + |L|µL , we have µS − µS̃ = −(|L|/|S̃|)(µL − µS ) and so √ p kµS − µS̃ k2 ≤ (|L|/|S̃|)kµL − µS k2 ≤ O(ε2 / d) + O(1 + ε)(|L|/|S|)kµL − pk2 ≤ O(ε log(1/ε)). p p √ By the triangle inequality, kp − µS̃ k2 ≤ ε/ d + O(ε log(1/ε)) = O(ε log(1/ε)). We next show that µ(1) − µ(0) is approximately parallel to p−d − q−d . Note that if we had S = S ′ and µSP = p−d , µSQ = q−d , then µ(1) − µ(0) would be a multiple of p−d − q−d . Since S is ε-good, we can bound the error introduced by µSP − p, µSQ − q−d and Lemma 7.8 allow us to bound the error in taking ′ ′ µSP , µSQ instead of p−d , q−d . However, we still have terms in the conditional means of E: Lemma 7.9. For some scalars a = O(ε), b0 = O(|E 0 |/|S ′ |), b1 = O(|E 1 |/|S ′ |), we have 0 1 k(1 − µd )µd u − (α(1 − α)(pd − qd ) + a)(p−d − q−d ) − b0 (µE − µ) − b1 (µE − µ)k2 ≤ O(ε log(1/ε)) , j where E j is the subset of E with last entry j, µE is the mean of E j with dth coordinate removed. ′j Proof. Let SP′j , SQ , E j , S ′j denote the subset of the appropriate set in which the last coordinate is j. Let ′ j ′ j ′j , and E j with the last entry truncated, respectively. µSP , µSQ , µE denote the means of SP′j , SQ We note that ′ S ′j = SP′ ∪ SQ ∪ Ej . j Taking the means of the subsets of S ′j , we find that ′ j ′ j j ′j SQ |µ + |E j |µE . |S ′j |µ(j) = |SP̃ j |µSP + |SQ Therefore, using this and Lemma 7.8, we have that j ′j |S ′j |µ(j) = |SP′j |p−d + |SQ |q−d + |E j |µE + O(ε log(1/ε)|S j |), 65 where O(ε) denotes a vector of ℓ2 -norm O(ε). Thus, we have |S ′0 ||S ′1 |(µ(1) − µ(0) ) = (|S ′0 ||SP′1 | − |S ′1 ||SP′0 |)p−d ′1 ′0 + (|S ′0 ||SQ | − |S ′1 ||SQ |)q−d 1 0 + |E 1 ||S ′0 |µE − |E 0 ||S ′1 |µE + O(ε log(1/ε)(|S 1 ||S ′0 | + |S 0 ||S ′1 |)) . (33) ′j | + |E j |, we have: Since |S ′j | = |SP′j | + |SQ 0 = |S ′0 ||S ′1 | − |S ′1 ||S ′0 | = (|S ′0 ||SP′1 | − |S ′1 ||SP′0 |) ′1 ′0 + (|S ′0 ||SQ | − |S ′1 ||SQ |) + |E 1 ||S ′0 | − |E 0 ||S ′1 | . Thus, the sum of the coefficients of the p−d and q−d terms in Equation (33) is |E 0 ||S ′1 | − |E 1 ||S ′0 |, which is bounded in absolute value by |E||S ′ | ≤ O(ε|S|2 ). Meanwhile, the p−d coefficient of Equation (33) has: |S ′0 ||SP′1 | − |S ′1 ||SP′0 | = |S ′0 ||SP1 | − |S ′1 ||SP0 | + O(ε|S ′ |2 ) = |S ′0 ||S|αpd − |S ′1 ||S|α(1 − pd ) + O(ε|S ′ |2 ) = |S 0 ||S|αpd − |S 1 ||S|α(1 − pd ) + O(ε|S ′ |2 ) = ((α(1 − pd ) + (1 − α)(1 − qd ))αpd − (αpd + (1 − α)qd )α(1 − pd ) + O(ε))|S ′ |2 = (α(1 − α)(1 − qd )pd − α(1 − α)qd (1 − pd ) + O(ε))|S ′ |2 = (α(1 − α)(pd − qd ) + O(ε))|S ′ |2 . Noting that (|E 1 ||S ′0 | − |E 0 ||S ′1 |)α = O(ε|S ′ |2 ) and (|E 1 ||S ′0 | − |E 0 ||S ′1 |)(1 − α) = O(ε|S ′ |2 ), we can write Equation (33) as: |S ′0 ||S ′1 |(µ(1) − µ(0) ) = (α(1 − α)(pd − qd ) + O(ε))|S ′ |2 (p−d − q−d ) + (|E 1 ||S ′0 | − |E 0 ||S ′1 |)(αp−d + (1 − α)q−d ) 1 0 + |E 1 ||S ′0 |µE − |E 0 ||S ′1 |µE + O(ε log(1/ε)|S ′ |2 ) . We write µΠ = αp−d + (1 − α)q−d and so, dividing by |S ′ |2 and recalling that |E|/|S ′ | ≤ O(ε), we get 1 µd (1 − µd )(µ(1) − µ(0) ) = (α(1 − α)(pd − qd ) + O(ε))(p−d − q−d ) + O(|E 1 |/|S ′ |)(µE − µΠ ) 0 + O(|E 0 |/|S ′ |)(µE − µΠ ) + O(ε log(1/ε)) . (34) If µΠ = µ, then we would be done. So, we must bound the error introduced by making this substitution. We can express µ as ′ ′ ′ |µSQ + |E|µE |S ′ |µ = |SP′ |µSP + |SQ 1 0 = |S|µΠ + O(ε|S|)(p−d − q−d ) + O(ε log(1/ε)|S ′ |) + |E 1 |µE + |E 0 |µE , and so 1 0 |S|(µΠ − µ) = O(ε|S|)(p−d − q−d ) + O(ε log(1/ε)|S|) + |E 1 |(µE − µ) + |E 0 |(µE − µ) . Thus, we have 1 0 µΠ = µ + O(ε)(p−d − q−d ) + O(ε log(1/ε)) + O(|E 1 |/|S ′ |)(µE − µ) + O(|E 0 |/|S ′ |)(µE − µ) . Substituting this into Equation (34), gives the lemma. 66 We now show that, for any vector v perpendicular to u, if the variance of S ′ in the v-direction is small, then v · p−d and v · q−d are both approximately v · µ. Lemma 7.10. For any v with kvk2 = 1, v · u = 0, we have that |v · (p−d − µ)| ≤ δ and |v · (q−d − µ)| ≤ δ for δ := C(ε1/6 kΣk2 + ε2/3 log(1/ε)) for a sufficiently large constant C as defined in the algorithm. Proof. We begin by noting that v T Σv = Var ′ (v · X) = X∈u S j ≥ (|E |/|S ′ |) E [|v · (X − µ)|2 ] X∈u S ′ E [|v · (X − µ)|2 ] X∈u E j j ≥ (|E j |/|S ′ |)|v · (µE − µ)|2 . Next, since v · u = 0, we have by Lemma 7.9 that |v · (p−d − q−d )| ≤   1 1 0 ≤ · O(|E 0 |/|S ′ |)v · (µE − µ) + O(|E 1 |/|S ′ |)v · (µE − µ) + O(ε log(1/ε))kvk2 α(1 − α)(pd − qd )   q  1 =O ε(v T Σv) + ε log(1/ε) . α(1 − α)(pd − qd ) ′ ′ ′ |µSq + |E|µE + |S ′ |O(ε log(1/ε)), and so However, we have that |S ′ |µ = |SP′ |µSp + |SQ ′ ′ ′ ′ (|S ′ | − |E|)(µ − µSp ) = |SQ |(µSQ − µSP ) + |E|(µE − µ) + |S ′ |O(ε log(1/ε)) . Now, we have: µ − p−d = (1 − α + O(ε))(q−d − p−d ) + O(|E|/|S ′ |)(µE − µ) + O(ε log(1/ε)) . Thus, |v · (p−d − µ)| = O(v · (p−d − q−d )) + O(|E|/|S ′ |)(v · (µE − µ) − v · (µ − p−d )) + O(ε log(1/ε)). Therefore, |v · (p−d − µ)| = O  1 α(1 − α)(pd − qd )  q ε(v T Σv)  + ε log(1/ε) . Inserting our assumptions that α(1 − α) ≥ ε1/6 /2, and pd − qd ≥ ε1/6 gives p |v · (p−d − µ)| = O(ε1/6 kΣk2 + ε2/3 log(1/ε)) ≤ δ , when C is sufficiently large. The other claim follows symmetrically. We can now show that if we return R, some distribution returned is close to Π. First, we show that there are points on L close to p−d and q−d . Lemma 7.11. There are c, d ∈ R such that p̃ = µ + cu and q̃ = µ + du have kp̃ − p−d k2 , kq̃ − q−d k2 ≤ δ. Proof. If we take the c that minimizes kp̃ − p−d k2 , then u · (p̃ − p−d ) = 0. Thus, we can apply Lemma 7.10, giving that |(p̃ − p−d ) · (p−d − µ)| ≤ kp̃ − p−d k2 δ. However, p̃ − µ = cu so we have (p̃ − p−d ) · (p̃ − µ) = 0 and thus kp̃ − pk22 = |(p̃ − p−d ) · (p−d − µ)| ≤ kp̃ − p−d k2 δ. Therefore, kp̃ − p−d k2 ≤ δ. 67 It is clear that even discretizing c and d, we can still find such a pair that satisfies this condition. Lemma 7.12. There are p′ , q ′ ∈ L such that kp−d − p′ k2 , kq−d − q ′ k2 ≤ δ + O(ε1/6 ) . Proof. By Lemma 7.11, there exist points p̃ = µ + (a/kuk2 )u and q̃ = µ + (b/kuk2 )u with a, b ∈ R that have kp̃ − p−d k2 , kq̃ − q−d k2 ≤ δ. Letting iε1/6 be the nearest integer multiple of ε1/6 to a, we have that p′ := µ + i(ε1/6 /kuk2 )u has kp−d − p′ k2 ≤ kp̃−d − pk2 + kp′ − p̃k2 ≤ δ + ε1/6 . √ √ √ Note that we√have kp−d − p̃k2 ≤ kp−d − µk2 ≤ dkp−d − µk∞ ≤ d, which implies that a ≤ d. Thus, |i| ≤ 1 + d/ε1/6 . If p′ ∈ / [c, 1 − c], then replacing any coordinates less than c with c and more than 1 − c with 1 − c can only decrease the distance to p since p ∈ [c, 1 − c]d . Thus, there is a point p′ ∈ L with kp−d − p′ k2 ≤ δ + O(ε1/6 ). Similarly, we show that there is a q ′ ∈ L such that kq − q ′ k2 ≤ δ + O(ε1/6 ). Corollary 7.13. If the algorithm terminates at Step 8, then there is a Π′ ∈ R with with dTV (Π′ , Π) = √ O(ε1/6 / c). Proof. By Lemma 7.12, there exists p̃, q̃ ∈ L such that kp−d − p̃k2 , kq−d − q̃k2 ≤ δ+O(ε1/6 ). But now there is a distribution Π′ ∈ R, where Π′ = α′ P ′ + (1 − α′ )Q′ for binary products P ′ and Q′ , whose mean vectors ′ −q k ≤ O(ε1/6 ) and |p′ −p |, |q ′ −q | = O(ε1/6 ). are p′ , q ′ and with |α′ −α| ≤ ε1/6 , kp′−d −p−d k2 , kq−d d d −d 2 d d Note that this implies that kp′ − pk2 , kq ′ − qk2 = O(ε1/6 ). √ √ Since P and Q are c-balanced, we have dTV (P, P ′ ) ≤ O(kp − p′ k2 / c) ≤ O(ε1/6 / c) and √ √ dTV (Q, Q′ ) ≤ O(kq − q ′ k2 / c) ≤ O(ε1/6 / c). √ √ Thus, dTV (Π′ , Π) ≤ δ + O(ε1/6 / c). Since we terminated in Step 8, λ ≤ O(1), and so δ = C(ε1/6 λ + ε2/3 log(1/ε)) = O(ε1/6 ). Now, we are ready to analyze the second part of our algorithm. The basic idea will be to show that if λ is large, then a large fraction of the variance in the v-direction is due to points in E. Lemma 7.14. If λ ≥ Ω(1), then Var ′ [v ∗ · X] ≪ X∈u S |E| EY ∈u E [|v ∗ · (Y − µ)|2 ] . |S ′ |(α(1 − α)(pd − qd ))2 Proof. We have that |S| Var ′ [v ∗ · X] = |SP′ | X∈u S ′ + |SQ |  ′ Var ′ [v ∗ · X] + |v ∗ · (µSP − µ)|2 X∈u SP Var [v ∗ · X] + |v ∗ · (µ ′ X∈u SQ + |E| E [|v ∗ · (X − µ)|2 ]] . X∈u E 68 ′ SQ − µ)|2  ! Since SP and SQ are ε-good, we have that Var ′ [v ∗ · X] = X∈u SP ′ E ′ X∈u SP [(v · X − v ∗ · µSP )2 ] ≤ (|SP |/|SP′ |) = (|SP |/|SP′ |)   ′ [(v ∗ · X − v ∗ · µSP )2 ] ∗ ∗ Var [v · X] + (v · (µ X∈u SP SP −µ ′ SP 2 ))  p ′ Var [v ∗ · X] + (v ∗ · (p−d − µSP ) + O(ε log(1/ε)))2 X∼P p ≤ (1 + O(ε/α)) · (O(1) + O(ε log(1/ε))2 ) ≤ O(1) , ≤ (|SP |/|SP′ |) and similarly, E X∈u SP  Var [v ∗ · X] = O(1) . ′ X∈u SQ Thus, we have: |S ′ | Var ′ [v ∗ · X] ≤ |E| E [|v ∗ · (X − µ)|2 ] + O(1 + |v ∗ · (p−d − µ)|2 + |v ∗ · (q−d − µ)|2 )|S ′ | . X∈u E X∈u S By Lemma 7.9, we have |v · (p−d − µ)|, |v ∗ · (q−d − µ)| ≤ O(1/(α(1 − α)(pd − qd ))) 0 1 · (O(|E0 |/|S ′ |)|v ∗ · (µE − µ)| + O(|E 1 |/|S ′ |)|v ∗ · (µE − µ)| + O(ε log(1/ε))) r ≤ (|E|/|S ′ |) E [|v ∗ · (Y − µ)|2 ] + O(ε log(1/ε)) . Y ∈u E However, λ = Var ′ [v ∗ · X] ≪ X∈u S |E| EY ∈u E [|v ∗ · (Y − µ)|2 ] + O(1) . |S|(α(1 − α)(pd − qd ))2 Since λ is larger than a sufficiently large constant, this completes the proof. We next show that the threshold T > 0 required by our algorithm exists. Lemma 7.15. If λ ≥ Ω(1), there exists a T > 0 such that Pr (|v ∗ · (X − µ)| > T + δ) > 8 exp(−T 2 /2) + 8ε/d . X∈u S ′ Proof. Assume for the sake of contradiction that this is not the case, i.e., that for all T > 0 we have that Pr (|v ∗ · (X − µ)| ≥ T + δ) ≤ 8 exp(−T 2 /2) + 8ε/d . X∈u S ′ Using the fact that E ⊂ S ′ , this implies that for all T > 0 |E| Pr (|v ∗ · (Y − µ)| > T + δ) ≪ |S ′ |(exp(−T 2 /2) + ε/d) . Y ∈u E 69 Therefore, we have that E [|v ∗ · (Y − µ)|2 ] ≪ δ2 + E [min(0, |v ∗ · (Y − µ)| − δ)2 ] Y ∈u E ≪ δ2 + Y ∈u E √ d Z 0 Z √ d Pr (|v ∗ · (Y − µ)| > T + δ)T dT Z √ ′ Y ∈u E 2 log(|S |/|E|) ≪ δ2 + (ε/d)T dT + T dT 0 0 Z ∞ + √ (|S ′ |/|E|) exp(−T 2 /2)T dT 2 log(|S ′ |/|E|) ≪ δ2 + ε + log(|S ′ |/|E|) . On the other hand, we know that E [|v ∗ · (Y − µ)|2 ] ≫ (α(1 − α)(pd − qd ))2 λ|S ′ |/|E| ≫ log(|S ′ |/|E|) . Y ∈u E Combining with the above we find that δ2 = O(ε1/3 λ) ≫ (α(1 − α)(pd − qd ))2 λ|S ′ |/|E| . Or in other words, ε4/3 ≥ ε1/3 |E|/|S ′ | ≫ (α(1 − α)(pd − qd ))2 ≥ ε2/3 , which provides a contradiction. Finally, we show that S ′′ is closer to S than S ′ was. Claim 7.16. If the algorithm returns S ′′ then ∆(S, S ′′ ) ≤ ∆(S, S ′ ) − 2ε/d. ′′ ∪ E ′′ for S ′′ ⊆ S ′ , S ′′ ⊆ S and E ′′ ⊂ E, where E ′′ Proof. Since S ′′ ⊂ S, we can write S ′′ = SP′′ ∪ SQ Q P P Q ′′ \ S . Thus, we need to show that has disjoint support from SP′′ \ SP and SQ Q ′ ′′ |E ′′ \ E| ≥ 2ε|S|/d + |SP′ \ SP′′ | + |SQ \ SQ |. We have that |S ′ \ S ′′ | = Pr ′ (|v · (X − µ)| ≥ T + δ)|S ′ | X∈u S ≥ (8 exp(−T 2 /2) + 8ε/d)|S ′ | ≥ (4 exp(−T 2 /2) + 4ε/d)|S| . By Hoeffding’s inequality, we have that Pr (|v ∗ · (X − p−d )| ≥ T ) ≤ 2 exp(−T 2 /2) . X∼P By Lemma 7.10, we have that |v ∗ · (µ − p−d )| ≤ δ and so Pr (|v ∗ · (X − µ)| ≥ T + δ) ≤ 2 exp(−T 2 /2) . X∼P Since S is (ε, d)-good, we have Pr (|v ∗ · (X − µ)| ≥ T + δ) ≤ 2 exp(−T 2 /2) + ε/d . X∈u SP 70 We get the same bound for X ∈u SQ , and so Pr (|v ∗ · (X − µ)| ≥ T + δ) X∈u S = (|SP |/|S|) Pr (|v ∗ · (X − µ)| ≥ T + δ) + (|SQ |/|S|) Pr (|v ∗ · (X − µ)| ≥ T + δ) X∈u SP X∈u SQ 2 ≤ 2 exp(−T /2) + ε/d . ′ \ S ′′ ) has v ∗ · (x − µ) ≥ T + δ, we have that Since L′′P ∪ L′′Q ⊆ S but any x ∈ (SP′ \ SP′′ ) ∪ (SQ Q ′ ′′ |SP′ \ SP′′ | + |SQ \ SQ | ≤ Pr (|v ∗ · (X − µ)| ≥ T + δ)|S| X∈u S ≤ (2 exp(−T 2 /2) + ε/d)|S| . Finally, we have that: ′ ′′ |E \ E ′ | = |S ′ \ S ′′ | − |SP′ \ SP′′ | − |SQ \ SQ | ≥ (4 exp(−T 2 /2) + 4ε/d)|S| − (2 exp(−T 2 /2) + ε/d)|S| ≥ (2 exp(−T 2 /2) + 3ε/d)|S| ′ ′′ ≥ |SP′ \ SP′′ | + |SQ \ SQ | + 2ε|S|/d , which completes the proof. 7.3 Mixtures of Products Whose Means Are Close in Every Coordinate In this section, we prove the following theorem: Theorem 7.17. Let ε, τ > 0 and let Π = αP + (1 − α)Q be a d-dimensional mixture p of two c-balanced product distributions P and Q whose means p and q satisfy kp − qk∞ ≤ δ, for δ ≥ ε log(1/ε), and c ≤ pi , qi ≤ 1 − c for i ∈ [d]. Let S be a multiset of Ω(d4 log(1/τ )/(ε2 δ)) independent samples from Π. Let S ′ be obtained by adversarially changing an ε-fraction of the points in S. There exists an algorithm that runs in polynomial time and, with probability at least 1 − τ , returns set of distributions R such that some √ Π′ ∈ R has dTV (Π, Π′ ) ≤ O(δ/ c). We will assume without loss of generality that α ≤ 1/2. We may also assume that α > 10δ ≥ 10ε since otherwise, we can make use of our algorithm for learning a single product distribution. In this context, we require the following slightly different definition of a good set: Definition 7.18. Let S be a multiset in {0, 1}d . We say that S is ε-good for the mixture Π if there exists a P| − α ≤ ε and that SP and SQ are ε/6-good for the component product partition S = SP ∪ SQ so that |S|S| distributions P and Q, respectively. Lemma 7.19. If Π has mixing weights δ ≤ α ≤ 1 − δ, with probability at least 1 − τ , a set S of Ω(d4 log 1/τ /(ε2 δ)) samples drawn from Π is good for Π. The proof of this lemma is in Section E. Our theorem will follow from the following proposition: Proposition 7.20. Let Π be as above and S be a good multiset for Π. Let S ′ be any multiset with ∆(S, S ′ ) ≤ 2ε. There exists a polynomial time algorithm that, given S ′ , ε > 0 and δ, returns either a multiset S ′′ with ∆(S, S ′′ ) ≤ ∆(S, S ′ ) − 2ε/d or a set of parameters of binary product distributions of size O(d/(εδ2 )) √ which contains the parameters of a Π′ with dTV (Π, Π′ ) ≤ O(δ/ c). 71 Algorithm 13 Filter algorithm for mixture of two binary products whose means are close in every coordinate 1: procedure F ILTER -P RODUCT-M IXTURE -C LOSE (ε, S ′ , δ) 2: Compute µ, the sample mean of S ′ , and Cov0 (S ′ ). Let C be a sufficiently large constant. 3: if Cov0 (S ′ ) has at most one eigenvector with absolute eigenvalue more than Cδ2 then 4: Let v ∗ be the unit eigenvector of Cov0 (S ′ ) with largest absolute eigenvalue. √ 5: Let L be the set of points µ + iδv ∗ truncated to be in [c, 1 − c]d , for i ∈ Z with |i| ≤ 1 + d/δ. 6: return the set of distributions of the form Π′ = α′ P ′ + (1 − α′ )Q′ with the means of P ′ and Q′ in L and α′ is a multiple of ε in [10ε, 1/2]. 7: Let v ∗ and u∗ be orthogonalpeigenvectors with eigenvalues more than Cδ2 . 8: Find a number t ≥ 1 + 2 ln(1/ε) and θ a multiple of δ2 /d so that r = (cos θ)u∗ + (sin θ)v ∗ satisfies   Pr ′ Pr ′ (|r · (X − Y )| < t) < 2ε > 12 exp(−t2 /4) + 3ε/d . X∈u S Y ∈u S return the set S ′′ = {x ∈ S ′ | PrY ∈u S ′ (|r · (x − Y )| < t) ≥ 2ε} . 9: Before we present the algorithm, we give one final piece of notation. For S a set of points, we let Cov(S) be the sample covariance matrix of S and Cov0 (S) be the sample covariance matrix with zeroed out diagonal. Our algorithm is presented in detailed pseudocode below. To analyze this algorithm, we begin with a few preliminaries. Firstly, we recall that S = SP ∪ SQ . We ′ ∪ E, where S ′ ⊂ S , S ′ ⊂ S , and can write S ′ = SP′ ∪ SQ P Q P Q ′ |S|∆(S, S ′ ) = |SP \ SP′ | + |SQ \ SQ | + |E| . ′ ′ ′ , respectively. Let µSP and µSQ be the sample means of SP′ and SQ p ′ ′ Lemma 7.21. We have that αkp − µSP k2 , (1 − α)kq − µSQ k2 = O(ε log(1/ε)) . Proof. This follows from Lemma 7.8. A key part in our analysis involves showing that the matrix Cov0 (S ′ ) is close to being PSD: ′ Lemma 7.22. Let T be the multiset obtained from S ′ by replacing all points of SP′ with copies of µSP and ′ ′ with copies of µSQ all points of SQ . Then, kCov0 (S ′ ) − Cov(T )k2 = O(δ2 ) . Proof. Noting that the mean of T is µ and |T | = |S ′ |, we have: |S ′ |Cov(S ′ ) = |SP′ | E ′ X∈u SP ′ [(X − µ)(X − µ)T ] + |SQ | E ′ X∈u SQ [(X − µ)(X − µ)T ] + |E| E [(X − µ)(X − µ)T ] X∈u E     ′ ′ ′ ′ ′ | Cov(SP′ ) + (µSQ − µ)(µSQ − µ)T = |SP′ | Cov(SP′ ) + (µSP − µ)(µSP − µ)T + |SQ + |E| E [(X − µ)(X − µ)T ] = X∈u E ′ |SP |Cov(SP′ ) ′ ′ ) + |S ′ |Cov(T ) . + |SQ |Cov(SQ (35) ′ ) can have large diagonal elements but small Since P and Q are product distributions, Cov(SP′ ) and Cov(SQ off-diagonal ones. On the other hand, we bound the elements on the diagonal of Cov(T ), but kCov(T )k2 may still be large due to off-diagonal elements. 72 By the triangle inequality, and Equation (35) with zeroed diagonal, we have: kCov0 (S ′ ) − Cov(T )k2 ≤ kCov0 (S ′ ) − Cov0 (T )k2 + kCov0 (T ) − Cov(T )k2 !  ′  ′ | |S |SP | Q ′ ≤ kCov0 (SQ )k2 + kCov0 (T ) − Cov(T )k2 . kCov0 (SP′ )k2 + |S ′ | |S ′ | (36) We will bound each of these terms separately. Note that Cov0 (T ) − Cov(T ) is a diagonal matrix and its non-zero entries are (Cov0 (T ) − Cov(T ))i,i = Var [Xi ]. X∈u T Since the mean of T is µ, for all i, we have that VarX∈u T [Xi ] ≤ EX∈u T [kX − µk2∞ ]. We seek to bound the RHS from above. ′ ′ ′ |µSQ ′ |, we + |E|µE . Since |S ′ | − |E| = |SP′ | + |SQ Note that µ satisfies |S ′ |µ = |SP′ |µSP + |SQ ′ ′ ′ ′ |(µSQ − µSP ) + |E|(µE − µ). Using that |S ′ | − |E| = (1 + O(ε))|S|, have (|S ′ | − |E|)(µ − µSP ) = |SQ ′ | = (1 − α)|S| − O(ε), |E| ≤ O(ε)|S|, we have |SQ ′ ′ ′ kµ − µSP k∞ ≤ (1 − α + O(ε))kµSQ − µSP k∞ + O(ε) . Similarly, ′ ′ ′ kµ − µSQ k∞ ≤ (α + O(ε))kµSQ − µSP k∞ + O(ε) . Since S is ε-good for Π, it follows that kµSP − pk∞ ≤ ε/d and kµSQ − qk∞ ≤ ε/d. Also, ′ k|SP |µSP − |SP′ |µSP k∞ ≤ |SP | − |SP′ | ≤ O(ε)|S| . Thus, ′ ′ kµSP − µSP k∞ ≤ kµSP − (|SP′ |/|SP |)µSP k∞ + (|SP | − |SP′ |)/|SP | ≤ O(ε)|S|/|SP | ≤ O(αε) . Similarly, we show that ′ kµSQ − µSQ k∞ ≤ O((1 − α)ε). Finally, kp − qk∞ ≤ δ. Thus, by the triangle inequality, we get ′ ′ kµSQ − µSP k∞ ≤ O(αε) + ε/d + δ + ε/d + O((1 − α)ε) ≤ δ + O(ε) . We have the following sequence of inequalities: |S ′ | Var [Xi ] ≤ |S ′ | E [kX − µk2∞ ] X∈u T X∈u T = |SP′ |kµ ′ ′ ′ |kµ − µSQ k2∞ − µSP k2∞ + |SQ + |E| E [kX − µk2∞ ] X∈u T ≤ (|SP′ | 2 ′ ′ ′ + |SQ |)(kµSQ − µSP k∞ + O(ε))2 + |E| ≤ (δ + O(ε))|S ′ | . Thus, kCov0 (T ) − Cov(T )k2 = max(Cov0 (T ) − Cov(T ))i,i = max Var(Ti ) ≤ O(δ2 + ε). i i 73  ′   |S ′ |  |S | ′ )k terms in (36). To analyze the first of It remains to bound the |SP′ | kCov0 (SP′ )k2 + |SQ′ | kCov0 (SQ 2 these terms, note that Cov0 (P ) = 0. We have that kCov0 (SP′ )k2 = kCov0 (SP′ ) − Cov(P ) + Diag( Var (Xi ))k2 X∼P ≤ kCov(SP′ ) − Cov(P )k2 + max(| Var ′ (Xi ) − Var (Xi )|) . i X∈u SP X∼P Noting that | Var ′ (Xi ) − Var (Xi )| = eTi (Cov(SP′ ) − Cov(P ))ei , X∈u SP X∼P we have that max(| Var ′ (Xi ) − Var (Xi )|) ≤ kCov(SP′ ) − Cov(P )k2 , i X∼P X∈u SP and so kCov0 (SP′ )k2 ≤ 2kCov(SP′ ) − Cov(P )k2 . By the triangle inequality, kCov(SP′ ) − Cov(P )k2 ≤ kCov(SP′ ) − Cov(SP )k2 + kCov(SP ) − Cov(P )k2 . Note that since S is good, the (i, j)-th entry of Cov(SP ) − Cov(P ) has absolute value at most ε/d. Thus, kCov(SP ) − Cov(P )k2 ≤ kCov(SP ) − Cov(P )kF ≤ ε , which gives kCov0 (SP′ )k2 ≤ 2kCov(SP′ ) − Cov(SP )k2 + O(ε). We have kCov(SP′ ) − Cov(SP )k2 = sup |v|2 =1   | Var ′ (v · X) − Var (v · X)| . X∈u SP X∈u SP Since SP′ ⊆ SP , |SP′ | Var ′ (v · X) ≤ |SP | X∈u SP E X∈u SP ′ [(v · X − µSP ] ′ ≤ |SP |( Var (v · X) + kµSP − µSP k22 ) X∈u SP ≤ (1 + O(ε/α))|SP′ | · ( Var (v · X) + O(ε2 log(1/ε)/α2 )) . X∈u SP Thus, | Var ′ (v · X) − Var (v · X)| ≤ O(ε/α) Var (v · X) + O(ε2 log(1/ε)/α2 )) X∈u SP X∈u SP X∈u SP ≤ O(ε/α) Var (v · X) + O(ε2 log(1/ε)/α2 )) X∼P 2 (since kCov(SP ) − Cov(P )k2 ≤ ε) ≤ O(ε/α) + O(ε log(1/ε)/α2 )) ≤ O(ε log(1/ε)/α) . (since kCov(P )k2 ≤ 1) Thus, we have that kCov0 (SP′ )k2 ≤ 2 · O(ε log(1/ε)/α) + O(ε) ≤ O(ε log(1/ε)/α). 74 (since α ≥ ε) Therefore, combining the above we have that  ′  |SP | kCov0 (SP′ )k2 = (α + O(ε))kCov0 (SP′ )k2 = O(ε log(1/ε)) . |S ′ | A similar argument shows ′ | |SQ |S ′ | ! ′ kCov0 (SQ )k2 = O(ε log(1/ε)). Combining this with the above gives that kCov0 (S ′ ) − Cov(T )k2 = O(δ2 + ε log(1/ε)). By the assumption on δ in Theorem 7.17, δ2 = Ω(ε log(1/ε)), and the proof is complete. We are now prepared to show that the first return condition outputs a correct answer. We begin by ′ ′ showing that vectors u with large inner products with µSP − µ or µSQ − µ correspond to large eigenvectors of Cov0 (S ′ ). Lemma 7.23. For u ∈ Rd , we have ′ ′ α(u · (µSP − µ))2 + (1 − α)(u · (µSP − µ))2 ≤ 2uT Cov0 (S ′ )u + O(δ2 )kuk22 . Proof. Using Lemma 7.22, we have uT Cov0 (S ′ )u = VarX∈u T (u · X) + O(δ2 )kuk22 . From the definition of T it follows that !  ′  ′ | |SQ ′ |SP | |E| ′ SP 2 (u · (µSQ − µ))2 + ′ Var (u · X) (u · (µ − µ)) + Var (u · X) ≥ ′ ′ X∈u T |S | |S | |S | X∈u E ′ ′ ≥ (α − 2ε)(u · (µSP − µ))2 + (1 − α − 2ε)(u · (µSQ − µ))2 ′ ′ ≥ α/2 · (u · (µSP − µ))2 + (1 − α)/2 · (u · (µSQ − µ))2 . (since α, 1 − α ≥ 4ε) Next, we show that, if there is only one large eigenvalue of Cov0 (S ′ ), the means in question are both close to a given line. √ √ Lemma 7.24. There are p̃, q̃ ∈ L such that kp − p̃k2 ≤ O(δ/ α) and kq − q̃k2 ≤ O(δ/ 1 − α). Proof. Let p′ = µ + av ∗ , q ′ = µ + bv ∗ with a, b ∈ R be the closest points to p and q on the line µ + cv ∗ , for c ∈ R. Then, v ∗ · (p′ − p) = 0 and since v ∗ is the only eigenvector of the symmetric matrix Cov0 (S ′ ) with eigenvalue more than C(δ2 + ε log(1/ε)), we have that p (p′ − p)T Cov0 (S ′ )(p′ − p) ≤ C(δ2 + ε log(1/ε))kp′ − pk22 . We thus obtain: kp′ − pk42 = (p′ − p) · (p − µ)2 ≤ 2(p′ − p) · (p − µSP )2 + 2(p′ − p) · (p − µSP )2 ≤ O(ε2 log(1/ε)/α2 )kp′ − pk22 + (4/α) · (p′ − p)T Cov0 (S ′ )(p′ − p)T + O(δ2 /α)kp′ − pk22 ≤ O((δ2 + ε log(1/ε))/α)kp′ − pk22 (since α ≥ ε) ≤ O(δ2 /α)kp′ − pk22 , 75 √ where the second line uses Lemmas 7.21 and 7.23. We thus have that kp′ − pk2 ≤ O(δ/ α). Letting iδ be the nearest integer multiple to a, we have that p̃ := µ + iδv ∗ has √ kp − p̃k2 ≤ kp′ − pk2 + kp′ − p̃k2 ≤ O(δ/ α). √ √ √ √ Note that we have kp − p′ k2 ≤ kp − µk2 ≤ dkp − µk∞ ≤ d. So, a ≤ d/δ. Thus, |i| ≤ 1 + d/δ. If p̃ ∈ / [c, 1 − c], then replacing any coordinates less than c with c and more than 1 − c with 1 − c can only decrease the distance to p, since p ∈ [c, 1 − c]d . √ Similarly, we show that there is a q̃ ∈ L such that kq − q̃k2 ≤ O(δ/ 1 − α), which completes the proof. Corollary 7.25. If the algorithm outputs a set of distributions in Step 6, then one of those distributions has √ dTV (Π′ , Π) ≤ O(δ/ c). Proof. There is a distribution in the set Π = α′ P ′ + (1 − α′ )Q′ , where |α − α′ | ≤ ε and the means of √ √ P ′ and Q′ are p̃ and q̃ as in Lemmap 7.24. Then, we have dTV (P, P ′ ) ≤ kp − p̃k/ c ≤ O(δ/ αc) and √ dTV (Q, Q′ ) ≤ kp − p̃k/ c ≤ O(δ/ (1 − α)c). Thus, we have √ √ √ √ dTV (Π′ , Π) ≤ O(ε)+αdTV (P, P ′ )+(1−α)dTV (Q, Q′ ) ≤ O(ε)+O(( α+ 1 − α)δ/ c) ≤ O(δ/ c) . Next, we analyze the second case of the algorithm. We must show that Step 8 will find an r and t. First, ′ ′ we claim that there is a θ which makes r nearly perpendicular to µSp − µSQ . Lemma 7.26. There exists a r = (cos θ)u∗ + (sin θ)v ∗ , with θ a multiple of δ2 /d, that has √ ′ ′ |r · (µSP − µSQ )| ≤ δ2 / d. ′ ′ ∗ Proof. Let z = (µSP − µSQ ). If u∗ · z = 0, then θ = 0 suffices. Otherwise, we take θ ′ = cot−1 ( uv ∗·z ·z ). 2 /d to θ ′ . Note that | cos θ − cos θ ′ |, | sin θ − sin θ ′ | ≤ |θ − θ ′ | and Then, let θ be the p nearest multiple of δ √ |u∗ · z|, |v ∗ · z| ≤ kzk2 ≤ d. Then, we have |r · z| = |(cos θ)(u∗ · z) + (sin θ)(v ∗ · z)| √ ≤ |(cos θ ′ )(u∗ · z) + (sin θ ′ )(v ∗ · z)| + |θ − θ ′ | d √ = | sin θ ′ ||u∗ · z + (cot θ ′ )(v ∗ · z)| + |θ − θ ′ | d √ ≤ 0 + δ2 / d . ′ ′ We now need to show that for this r, Step 8 will find a t. For this r, r · µSP and r · µSQ are close. We need to show that E contains many elements x whose r · x is far from these. We can express this in terms of T : √ ′ ′ Lemma 7.27. Let r be a unit vector in r ∈ hu∗ , v ∗ i with |r · (µSP − µSQ )| ≤ δ2 / d. Then, there is a t > 1 such that ′ Pr (r · (X − µSP ) > 2t) > 12 exp(−(t − 1)2 /4) + 3ε/d . X∈u T 76 ′ Proof. First, we wish to show that EX∈u E [(r · (X − µSP ))2 ] is large. Since r ∈ span(u∗ , v ∗ ), |r T Cov0 (S ′ )r| ≥ Cδ2 . By Lemma 7.22, we have that Var (r · X) = r T Cov(T )r ≥ r T Cov0 (S ′ )r − O(δ2 ) ≥ (C − O(1))δ2 ≥ (C/2)δ2 , X∈u T for sufficiently large C and we also have that r T Cov0 (S ′ )r is positive. We note that r T Cov(T )r = Var(r · T ) ′ ′ = (|E|/|S ′ |) Var (r · X) + O(α)(r · (µ − µSP ))2 + O(1 − α)(r · (µ − µSQ ))2 X∈u E ′ + (|E|/|S |)(r · (µ − µE ))2   ′ E 2 = (|E|/|S |) Var (r · X) + (r · (µ − µ )) + O(δ2 ) . X∈u E Now, (37) ′ ′ E [(r · (X − µSP ))2 ] = Var (r · X) + (r · (µSP − µE ))2 . X∈u E X∈u E We also have that ′ ′ ′ ′ |(r · (µSP − µSQ )) + |E|(r · µE ) |S ′ |(r · µ) = (|S ′ | − |E|)(r · µSP ) + |SQ ′ = (|S ′ | − |E|)(r · µSP ) + |E|(r · µE ) + |S ′ |O(δ2 ) . Thus, ′ (|S ′ | − |E|)(r · (µ − µE )) = (|S ′ | − |E|)(r · (µSP − µE )) + |S ′ |O(δ2 ) , or ′ (r · (µ − µE )) = (r · (µSP − µE )) + O(δ2 ) . This implies that ′ (r · (µSP − µE ))2 ≥ (r · (µ − µE ))2 /2 − O(δ4 ) . Substituting into (37), we have ′ ′ (|E|/|S ′ |) E [(r · (X − µSP ))2 ] = (|E|/|S ′ |)[ Var [r · X] + (r · (µSP − µE ))2 ] − O(δ4 ) ≫ C/2δ2 . X∈u E X∈u E Thus, for C sufficiently large, ′ E [(r · (X − µSP ))2 ] ≫ δ2 /ε. X∈u E Suppose for a contradiction that this lemma does not hold. Then, since E ⊂ T , we have   ′ Pr r · (X − µSP ) > 2t) ≤ (|S ′ |/|E|)12 exp(−t2 /2) + 3ε/d . X∈u E Thus, we have ′ Pr (r · (X − µSP ) > t)) ≤ (|S ′ |/|E|)12 exp(−(t − 1)2 /4) + 3ε/d , X∈u E 77 and we can write |S ′ |δ2 ≪ |E| E [(r.X − r.µSP )2 ] X∈u E √ d = |E| Z ≪ |E| 0 Z 1+ 0 ′ Pr (r · (X − µSP ) > t))tdt X∈u E √ Z ′ ln(|S |/|E|)/2 ′ tdt + |S | ∞ 1+ √ ln(|S ′ |/|E|)/2 2 exp(−(t − 1) /4)tdt + ≪ |E| ln(|S ′ |/|E|) + |E| + |S ′ |(|E|/|S|) + ε Z √ n ε/dtdt 0 ≤ |S ′ | · O(ε log(1/ε)) . Since we assumed that δ2 ≥ Ω(ε log(1/ε), this is a contradiction. ′ are suitably concentrated about their To get a similar result for S ′ , we first need to show that SP′ and SQ means: Lemma 7.28. If t ≥ 1, (1 − |E|/|S ′ |) If t ≥ 1 + Proof. p Pr′ ′ X∈u SP ∪SQ   ′ r · (X − µSP ) > t ≤ (5/4) exp(−(t − 1)2 /2) + ε/5d. 2 ln 6/ε, this is strictly less than 2ε/3. ′ ′ Pr ′ (r · (X − µSP ) ≤ t) ≤ (|SP |/|SP′ |) Pr (r · (X − µSP ) ≤ t) X∈u SP X∈u SP   ′ SP ≤ (1 + O(ε)/α) · Pr (r · (X − µ ) ≤ t) + ε/(12d) X∼P     ′ SP = (1 + O(ε)/α) · Pr r · (X − p) ≤ t − (r · (µ − p)) + ε/(6d) X∼P  ≤ (1 + O(ε)/α) · 2 exp(−(t − 1/2)2 /2) + ε/6d . (using Lemma 7.21 and Hoeffding’s inequality) Similarly, ′ Pr ′ (r · (X − µSQ ) ≤ t) ≤ (1 + O(ε)/(1 − α)) · (2 exp(−(t − 1/2)2 /2) + ε/6d). X∼SQ √ Since |r · (µSQ − µSP )| ≤ δ2 / d ≤ 1/2, we have    ′ Pr ′ r · (X − µSQ ) ≤ t ≤ (1 + O(ε)/(1 − α)) · 2 exp(−(t − 1)2 /2) + ε/6d . X∼SQ 78 ′ |)/|S ′ | = |E|/|S ′ | ≥ 4ε/3, we have Noting that 1 − (|SP′ | + |SQ (1 − |E|/|S ′ |) Pr′ ′ X∈u SP ∪SQ = (|SP′ |/|S ′ |) Pr ′ X∼SP   ′ r · (X − µSP ) > t     ′ ′ ′ |/|S ′ |) Pr ′ r · (X − µSP ) > t r · (X − µSP ) > t + (|SQ X∼SQ  = ((α + O(ε)) (1 + O(ε)/α) + (1 − α + O(ε)) (1 + O(ε)/(1 − α)) · 2 exp(−(t − 1)2 /2) + ε/6d  ≤ (1 + O(ε)) · 2 exp(−(t − 1)2 /2) + ε/6d ≤ (5/2) exp(−(t − 1)2 /2) + ε/5d . If t ≥ 1 + p 2 ln 6/ε, this expression is (5/2)(ε/6) + ε/5d ≤ 2ε/3. Now we can finally show that a t exists for this r, so Step 8 will succeed: p Lemma 7.29. There is a t ≥ 1 + 2 ln(9/ε) such that   Pr ′ Pr ′ (r · (X − Y ) > t) < 2ε > 12 exp(−(t − 1)2 /4) + 3ε/d. X∈u S Y ∈u S Proof. By Lemma 7.27, there exists a t ≥ 1 such that   ′ Pr r · (X − µSP ) > 2t) > 12 exp(−(t − 1)2 /4) + 3ε/d. X∈u T ′ ′ Using the definition of T , the points when x = µSP or x = µSQ do not contribute to this probability so all ′ points in T that satisfy r · (x − µSP ) > 2t come from E. Since E ⊂ S ′ and |S ′ | = |T |, we have     ′ ′ (38) Pr ′ r · (X − µSP ) > 2t ≥ Pr r · (X − µSP ) > 2t > 12 exp(−(t − 1)2 /4) + 3ε/d. X∈u T X∈u S ′ 2 S Noting that |E|/|S ′ | ≤ 4ε/3, all except a 4ε/3 fraction p of points x ∈ T have r · (x − µ P ) = O(δ ). So, 2 4ε/3 ≥ 12 exp(−(t − 1) /4). Therefore, t ≥ 1 + 2 ln(9/ε).   ′ Thus, by Lemma 7.28, we have (1 − |E|/|S ′ |) PrX∈u SP′ ∪SQ′ r · (X − µSP ) > t < 2ε/3. Again, using that |E|/|S ′ | ≤ 4ε/3, we have that Pr X∈u S ′   ′ r · (X − µSP ) > t < 2ε . ′ Consequently, if x satisfies r ·(x−µSP ) > 2t, then it satisfies PrY ∈u S ′ (r · (x − Y ) ≤ t) < 2ε. Substituting this condition into Equation (38) gives the lemma. Again we need to show that any filter does not remove too many points of S. We need to show this for ′ ′ an arbitrary r, not just one nearly parallel to µSP − µSQ . p Lemma 7.30. For any unit vector r ′ and t ≥ 2 ln(1/ε), we have    ′ ′ (1 − |E|/|S |) Pr′ ′ Pr ′ r · (X − Y ) ≤ t < 2ε ≤ 3 exp(−t2 /4) + ε/4d . X∈u SP ∪SQ Y ∈u S 79 Proof. Using Hoeffding’s inequality, we have  |SP′ | Pr ′ (r · (p − X) > t/2) ≤ |SP | Pr |r ′ · (X − p)| > t/2 X∈u SP X∈u SP   ≤ |SP | Pr (|r ′ · (X − p)| > t/2) + ε/6d X∼P  ≤ |SP | 2 exp(−t2 /4) + ε/6d . (39) Every point x with |r ′ · (x − p)| ≤ t/2 has |r ′ · (x − y) ≤ t| for all y with |r ′ · (y − p)| ≤ t/2. Thus, for x with |r ′ · (x − p)| ≤ t/2, we have Pr (r ′ · (x − Y ) ≤ t) ≥ (|SP |/|S ′ |) − (|SP |/|S ′ |)(2 exp(−t2 /4) + ε/6d) . Y ∈u S ′ p When t ≥ 2 ln(1/ε), (|SP /|S ′ |)(2 exp(−t2 /4)+ε/6d) ≤ (1+2ε)·(2ε+ε/6d) ≤ 3ε. Also, (|SP |/|S ′ |) ≤ ((α − ε/6)|S|)/(|S|(1 − 2ε)) ≤ α − 3ε ≤ 7ε. Thus, we have PrY ∈u S ′ (r · (x − Y ) ≤ t) ≥ 4ε > 2ε. But inequality (39) gives a bound on the number of x in SP that do not satisfy this condition. That is,     ′ ′ |SP | Pr ′ Pr ′ r · (X − Y ) ≤ t < 2ε ≤ |SP | 2 exp(−t2 /4) + ε/6d . X∈u SP Y ∈u S Similarly, every point x with |r ′ · (x − q)| ≤ t/2 has Pr (r ′ · (x − y) ≤ t) > 2ε y∈u S ′ ′ | Pr ′ 2 ′ (r · (X − p) > t/2) ≤ (2 exp(−t /4) + ε/6d). Thus, and |SQ X∈u SQ ′ |SQ | Pr ′ X∈u SQ    Pr ′ (r · (X − Y ) ≤ t) < 2ε ≤ |SQ | 2 exp(−t2 /4) + ε/6d . ′ Y ∈u S Summing these gives (|SP′ | ′ + |SQ |) Pr ′ ∪S ′ X∈u SP Q    Pr ′ (r · (X − Y ) ≤ t) < 2ε ≤ |S| 2 exp(−t2 /4) + ε/6d . ′ Y ∈u S Dividing by |S ′ | and noting that |S| ≤ (1 + 2ε)|S ′ | ≤ (3/2)|S ′ | completes the proof. Now, we can show that the filter improves ∆(S, S ′′ ), and so that the algorithm is correct in the filter case. Claim 7.31. If we reach Step 9 and return S ′′ , then ∆(S, S ′′ ) ≤ ∆(S, S ′ ) − 2ε/d. ′′ ∪ E ′′ , where E ′′ has disjoint support from S \ S ′′ and S \ S ′′ . Note Proof. We can write S ′′ = SP′′ ∪ SQ P Q P Q ′′ ⊆ S ′ and E ′′ ⊆ E. We assume that, since we have S ′′ ⊂ S ′ , we can define these sets so that SP′′ ⊆ SP′ , SQ Q that we do. Now we have that ∆(S, S ′ ) − ∆(S, S ′′ ) = Therefore, ′ ′′ ∆(S, S ) − ∆(S, S ) = ′′ \ S ′ | |E ′′ \ E ′ | − |SP′′ \ SP′ | − |SQ Q |S| . ′′ \ S ′ |) |S ′′ \ S ′ | − 2(|SP′′ \ SP′ | + |SQ Q |S| 80 . p In Step 8, we found a vector r and t ≥ 1 + 2 ln(1/ε) such that   Pr ′ Pr ′ (|r · (X − Y )| < t) < 2ε > 12 exp(−(t − 1)2 /4) + 3ε/d . X∈u S Y ∈u S Then in Step 9, we remove at least a 12 exp(−t2 /4) + 3ε/d fraction of points. That is, |S ′′ \ S ′ | ≥ (12 exp(−t2 /4) + 3ε/d)|S ′ | . p The fact that t ≥ 1 + 2 ln(1/ε) allows us to use Lemma 7.30, with r ′ = r, yielding that:   ′ (1 − |E|/|S |) Pr′ ′ Pr ′ (r · (X − Y ) ≤ t − 1) < 2ε ≤ 3 exp(−(t − 1)2 /4) + ε/(4d) . Y ∈u S X∈u SP ∪SQ This implies that ′ (1 − |E|/|S |) Pr ′ ∪S ′ X∈u SP Q   Pr ′ (r · (X − Y ) < t) < 2ε ≤ 3 exp(−(t − 1)2 /4) + ε/(4d) . Y ∈u S Thus, ′′ ′ |SP′′ \ SP′ | + |SQ \ SQ | ≤ (3 exp(−(t − 1)2 /4) + ε/4d)|S ′ | , and we have ∆(S, S ′ ) − ∆(S, S ′′ ) ≥  12 exp(−(t − 1)2 /4) + 3ε/d − 2 3 exp(−(t − 1)2 /4) + ε/4d |S ′ |/|S| ≥ 2ε/d , since |S ′ | ≥ |S|(1 − ∆(S, S ′ )) ≥ (1 − 2ε)|S| ≥ 5|S|/6. 8 Agnostically Learning a Gaussian, via Filters 8.1 Learning a Gaussian With Unknown Mean In this section, we use our filter technique to give an agnostic learning algorithm for an unknown mean Gaussian with known covariance matrix. More specifically, we prove: Theorem 8.1. Let G be a Gaussian with identity covariance matrix and ε, τ > 0. Let S be a multiset of Ω(d3 log(d/ετ ))4 /ε2 ) independent samples from G and S ′ be a multiset obtained by arbitrarily changing ′ an ε-fraction of the points in S. There exists a polynomial time p algorithm that returns a Gaussian G so that ′ with probability at least 1 − τ we have dTV (G, G ) = O(ε log(1/ε)). ′ Our output hypothesis will be a Gaussian G′ Let µG , µG denote the mean vectors of G, G′ respectively. p ′ G G with identity covariance matrix, such that kµ − µ k2 = O(ε log(1/ε)). The desired bound on the total variation distance follows from Corollary 2.13. 1 P 1 P G G T Notation. We will denote by µS = |S| X∈S X and Cov[S] = |S| X∈S (X − µ )(X − µ ) the sample mean and sample covariance matrix of the set S. We start by defining a condition on the uncorrupted set of samples S, under which our algorithm will succeed. Definition 8.2. Let G be a Gaussian in d dimensions with identity covariance and ε, τ > 0. We say that a multiset S of elements in Rd is (ε, τ )-good with respect to G if the following conditions are satisfied: 81 p (i) For all x ∈ S we have kx − µG k2 ≤ O( d log(|S|/τ )). (ii) For every affine function L : Rd → R we have | PrX∈u S (L(X) ≥ 0) − PrX∼G (L(X) ≥ 0)| ≤ ε/(d log(d/ετ )) . (iii) We have that kµS − µG k2 ≤ ε. (iv) We have that kCov[S] − Ik2 ≤ ε/d. Next, we show that a sufficiently large set of independent samples from G is (ε, τ )-good (with respect to G) with high probability. The proof of the following lemma is deferred to Section F. Lemma 8.3. Let G be a Gaussian with identity covariance and ε, τ > 0. If the multiset S is obtained by taking Ω(d3 log(d/ετ )/ε2 ) independent samples from G, it is (ε, τ )-good with respect to G with probability at least 1 − τ. We recall our definition of ∆(S, S ′ ) that quantifies the extent to which a multiset has been corrupted. Definition 8.4. Given finite multisets S and S ′ we let ∆(S, S ′ ) be the size of the symmetric difference of S and S ′ divided by the cardinality of S. As in the convex program case, we will first use NAIVE P RUNE to remove points which are far from the mean. Then, we iterate the algorithm whose performance guarantee is given by the following: Proposition 8.5. Let G be a Gaussian with identity covariance, ε > 0 be sufficiently small and τ > 0. Let ′ ′ ′ S be an (ε, τ )-good p set with respect to G. Let S be any multiset with ∆(S, S ) ≤ 2ε and for any x, y ∈ S , kx − yk2 ≤ O( d log(dε/τ )). There exists a polynomial time algorithm F ILTER -G AUSSIAN -U NKNOWN M EAN that, given S ′ and ε > 0, returns one of the following: p (i) A mean vector µ such that dTV (N (µ, I), G) = O(ε log(1/ε)). (ii) A multiset S ′′ ⊆ S ′ such that ∆(S, S ′′ ) ≤ ∆(S, S ′ ) − ε/(d log(d/ετ )). We start by showing how Theorem 8.1 follows easily from Proposition 8.5. Proof of Theorem 8.1. By the definition of ∆(S, S ′ ), since S ′ has been obtained from S by corrupting an ε-fraction of the points in S, we have that ∆(S, S ′ ) ≤ 2ε. By Lemma 8.3, the set S of uncorrupted samples is (ε, τ )-good with respect to G with probability at least 1 − τ. We phenceforth condition on this event. Since S is (ε, τ )-good, all x ∈ S have kx − µG k2 ≤ O( d log |S|/τ ). Thus, the NAIVE P RUNE ′′ ′′ ′ procedure does not remove from S ′ any member of S. Hence, p its output, S , has ∆(S, S ) ≤ ∆(S, S ) and ′′ for any x ∈ S , there is ap y ∈ S with kx − ykp 2 ≤ O( d log |S|/τ ). By the triangle inequality, for any x, z ∈ S ′′ , kx − zk2 ≤ O( d log |S|/τ ) = O( d log(d/ετ )). Then we iteratively apply the F ILTER -G AUSSIAN -U NKNOWN -M EAN procedure of Proposition 8.5 unp til it terminates returning a mean vector µ with dTV (N (µ, I), G) = O(ε log(1/ε)). We claim that we need at most O(d log(d/ετ )) iterations for this to happen. Indeed, the sequence of iterations results in a sequence of sets Si′ , so that ∆(S, Si′ ) ≤ ∆(S, S ′ ) − i · ε/(d log(d/ετ )). Thus if we do not terminate in the first 2d log(d/ετ ) iterations, in the next iteration the algorithm terminates outputting the sample mean of S. 82 8.1.1 Algorithm F ILTER -G AUSSIAN -U NKOWN -M EAN: Proof of Proposition 8.5 In this subsection, we describe the efficient algorithm establishing Proposition 8.5 and prove its correctness. Our filter algorithm is very simple: We consider the empirical distribution defined by the (corrupted) sample ′ multiset S ′ . We calculate its mean vector µS and covariance matrix M . If the matrix Σ has no large ′ eigenvalues, we return µS . Otherwise, we use the eigenvector v ∗ corresponding to the maximum magnitude ′ eigenvalue of Σ and the mean vector µS to define a filter. Our efficient filtering procedure is presented in detailed pseudocode below. Algorithm 14 Filter algorithm for a Gaussian with unknown mean and identity covariance 1: procedure F ILTER -G AUSSIAN -U NKNOWN -M EAN (S ′ , ε, τ ) input: A multiset S ′ such that there exists an (ε, τ )-good S with ∆(S, S ′ ) ≤ 2ε output: Multiset S ′′ or mean vector p′ satisfying Proposition 8.5 ′ 2: Compute the sample mean µS = EX∈u S ′ [X] and the sample covariance matrix Σ , i.e., Σ = ′ ′ (Σi,j )1≤i,j≤d with Σi,j = EX∈u S ′ [(Xi − µSi )(Xj − µSj )]. 3: Compute approximations for the largest absolute eigenvalue of Σ − I, λ∗ := kΣ − Ik2 , and the associated unit eigenvector v ∗ . ′ 4: if kΣ − Ik2 ≤ O(ε log(1/ε)), then return µS . p 5: Let δ := 3 εkΣ − Ik2 . Find T > 0 such that ′ Pr (|v ∗ · (X − µS )| > T + δ) > 8 exp(−T 2 /2) + 8ε/(d log(dε/τ )). X∈u S ′ ′ return the multiset S ′′ = {x ∈ S ′ : |v ∗ · (x − µS )| ≤ T + δ}. 6: The rest of this section is devoted to the analysis of our algorithm F ILTER -G AUSSIAN -U NKOWN M EAN. 8.1.2 Proof of Correctness of F ILTER -G AUSSIAN -U NKOWN -M EAN By definition, there exist disjoint multisets L, E, of points in Rd , where L ⊂ S, such that S ′ = (S \ L) ∪ E. ′ With this notation, we can write ∆(S, S ′ ) = |L|+|E| |S| . Our assumption ∆(S, S ) ≤ 2ε is equivalent to |L| + |E| ≤ 2ε · |S|, and the definition of S ′ directly implies that (1 − 2ε)|S| ≤ |S ′ | ≤ (1 + 2ε)|S|. Throughout the proof, we assume that ε is a sufficiently small constant. ′ We define µG , µS , µS , µL , and µE to be the means of G, S, S ′ , L, and E, respectively. Our analysis will make essential use of the following matrices: • MS ′ denotes EX∈u S ′ [(X − µG )(X − µG )T ], • MS denotes EX∈u S [(X − µG )(X − µG )T ], • ML denotes EX∈u L [(X − µG )(X − µG )T ], and • ME denotes EX∈u E [(X − µG )(X − µG )T ]. Our analysis will hinge on proving the important claim that Σ − I is approximately (|E|/|S ′ |)ME . This means two things for us. First, it means that if the positive errors align in some direction (causing ME to have a large eigenvalue), there will be a large eigenvalue in Σ − I. Second, it says that any large eigenvalue of Σ − I will correspond to an eigenvalue of ME , which will give an explicit direction in which many error points are far from the mean. 83 We begin by noting that we have concentration bounds on G and therefore, on S due to its goodness. Fact 8.6. Let w ∈ Rd be any unit vector, then for any T > 0, PrX∈u S (|w · (X − µG )| > T ) ≤ 2 exp(−T 2 /2) + ε/(d log(d/ετ )), and PrX∼G (|w · (X − µG )| > T ) ≤ 2 exp(−T 2 /2). Proof. The second line is a standard concentration result for Gaussians, and the former follows from it using the goodness of S. By using the above fact, we obtain the following simple claim: Claim 8.7. Let w ∈ Rd be any unit vector, then for any T > 0, ′ ′ Pr (|w · (X − µS )| > T + kµS − µG k2 ) ≤ 2 exp(−T 2 /2) + ε/(d log(d/ετ )). X∈u S and ′ ′ Pr (|w · (X − µS )| > T + kµS − µG k2 ) ≤ 2 exp(−T 2 /2). X∼G ′ ′ Proof. This follows from Fact 8.6 upon noting that |w·(X−µS )| > T +kµS −µG k2 only if |w·(X−µG )| > T. We can also use this to prove concentration bounds for L. In particular: Corollary 8.8. kML k2 = O(log(|L|/|S|)). Proof. We need to bound v T ML v = EX∈u L [(v · (X − µG ))2 ] for all unit vectors v. This is Z ∞ 0 G Pr (|v · (X − µ )| > T )2T dT = X∈u L Z O(d log(d/ετ )) Pr (|v · (X − µG )| > T )2T dT. X∈u L 0 Our bound then follows from noting that, since L is a subset of S, we have that   G G Pr (|v · (X − µ )| > T ) ≤ min 1, (|S|/|L|) · Pr (|v · (X − µ )| > T ) , X∈u L X∈u S and using Claim 8.7. Next, we prove a bound on MS ′ . Lemma 8.9. We have that MS ′ = I + (|E|/|S ′ |)ME + O(ε log(1/ε)) , where the O(ε log(1/ε)) term denotes a matrix of spectral norm O(ε log(1/ε)). Proof. Notice that |S ′ |MS ′ = |S|MS − |L|ML + |E|ME = |S|(I + O(ε)) − O(ε log(1/ε)) + |E|ME , where the second line is by the goodness of S. Therefore, we have that MS ′ = I + (|E|/|S ′ |)ME + O(ε log(1/ε)). 84 We get a similarly useful bound on the difference between the mean vectors: Lemma 8.10. We have that p ′ (µS − µG ) = (|E|/|S ′ |)(µE − µG ) + O(ε log(1/ε)) , p p where the O(ε log(1/ε)) denotes a vector with ℓ2 norm at most O(ε log(1/ε)). Proof. ′ |S ′ |(µS − µG )) = |S|(µS − µG ) − |L|(µL − µG ) + |E|(µE − µG ). S G L G L G T L G Since p S is good kµ − µ k2 = O(ε). Since kML k ≫ (µ − µ )(µ − µ ) , we have that kµ − µ k2 ≤ O( log(|L|/|S|)). Therefore, we have that p ′ (µS − µG ) = (|E|/|S ′ |)(µE − µG ) + O(ε log(1/ε)) , as desired. From this we conclude that Σ − I is approximately proportional to ME . Corollary 8.11. Σ − I = (|E|/|S ′ |)ME + O(ε log(1/ε)) + O(|E|/|S|)2 kME k2 . Proof. We have that ′ ′ Σ − I = MS ′ − I − (µS − µG )(µS − µG )T . By Lemmas 8.9 and 8.10, this is (|E|/|S ′ |)ME + O(ε log(1/ε)) + O((|E|/|S|)2 kµE − µG k22 ) = (|E|/|S ′ |)ME + O(ε log(1/ε)) + O(|E|/|S|)2 kME k2 . From this we can immediately see that if our algorithm returns on Step 4, then it returns a correct answer. In particular, if λ∗ = kΣ − Ik2 = O(ε log(1/ε)), we have by Corollary 8.11 that |E|/|S ′ |kME k2 ≤ λ∗ + O(ε log(1/ε)) + O(|E|/|S|)2 kME k2 . Therefore, kME k2 = O(ε log(1/ε)). On the other hand, we have kME k2 ≥ kµE − µG k22 , and therefore by Lemma 8.10, p p p ′ kµS − µG k2 ≤ (|E|/|S ′ |)kME k2 + O(ε log(1/ε)) = O(ε log(1/ε)). Next, we need to show that if λ∗ > Cε log(1/ε) that a T as in Step 5 exists. To show this, we note again by Corollary 8.11 that λ∗ = (v ∗ )T (Σ − I)v ∗ = (|E|/|S ′ | + O(|E|/|S|)2 )(v ∗ )T ME v ∗ + O(ε log(1/ε)). Therefore, E [|v ∗ · (X − µG )|2 ] = (v ∗ )T ME v ∗ ≫ (|S ′ |/|E|)λ∗ . X∈u E 85 On the other hand, ∗ G 2 E [|v · (X − µ )| ] = X∈u E Z √ O( d log(d/ετ )) 0 ≤ |S ′ |/|E| Z √ O( √ Pr (|v ∗ · (X − µG )| > T )2T dT X∈u E d log(d/ετ )) Pr (|v ∗ · (X − µG )| > T )2T dT + λ∗ /100. X∈u S ′ λ∗ /10 √ Therefore, it must be the case that for some value of T ′ > λ∗ /10 for which PrX∈u S ′ (|v ∗ · (X − µG )| > T ′ ) > exp(−T ′2 /4) + 8ε/(d log(dε/τ )). Letting T = T ′ − δ yields the necessary T . Finally, we need to show that if our algorithm returns an S ′′ in Step 6 that ∆(S, S ′′ ) < ∆(S, S ′ ) − 2ε/(d log(d/ετ )). Claim 8.12. We have that ∆(S, S ′′ ) ≤ ∆(S, S ′ ) − 2ε/(d log(d/ετ )) . Proof. Recall that S ′ = (S \ L) ∪ E, with E and L disjoint multisets such that L ⊂ S. We can similarly write S ′′ = (S \ L′ ) ∪ E ′ , with L′ ⊇ L and E ′ ⊂ E. Since ∆(S, S ′ ) − ∆(S, S ′′ ) = |E \ E ′ | − |L′ \ L| , |S| it suffices to show that |E \ E ′ | ≥ |L′ \ L| + ε|S|/d. Note that |L′ \ L| is the number of points rejected by the filter that lie in S ∩ S ′ . Note that the fraction of elements of S that are removed to produce S ′′ (i.e., satisfy |v ∗ · (x − µS ′ )| > T + δ) is at most 2 exp(−T 2 /2) + ε/(d log(d/ετ )). Hence, it holds that |L′ \ L| ≤ (2 exp(−T 2 /2) + ε/(d log(d/ετ )))|S|. On the other hand, Step 5 of the algorithm ensures that the fraction of elements of S ′ that are rejected by the filter is at least 8 exp(−T 2 /2) + 8ε/(d log(d/ετ )). Note that |E \ E ′ | is the number of points rejected by the filter that lie in S ′ \ S. Therefore, we can write: |E \ E ′ | ≥ (8 exp(−T 2 /2) + 8ε/(d log(d/ετ )))|S ′ | − (2 exp(−T 2 /2) + ε/(d log(d/ετ )))|S| ≥ (8 exp(−T 2 /2) + 8ε/(d log(d/ετ )))|S|/2 − (2 exp(−T 2 /2) + ε/(d log(d/ετ )))|S| ≥ (2 exp(−T 2 /2) + 3ε/(d log(d/ετ )))|S| ≥ |L′ \ L| + 2ε|S|/(d log(d/ετ )) , where the second line uses the fact that |S ′ | ≥ |S|/2 and the last line uses the fact that |L′ \ L|/|S| ≤ (2 exp(−T 2 /2) + ε/(d log(d/ετ ))). Noting that log(d/ετ ) ≥ 1, this completes the proof of the claim. 8.2 Learning a Gaussian With Unknown Covariance In this subsection, we use our filter technique to agnostically learn a Gaussian with zero mean vector and unknown covariance. By combining the algorithms of the current and the previous subsections, as in our convex programming approach (Section 4.5), we obtain a filter-based algorithm to agnostically learn an arbitrary unknown Gaussian. The main result of this subsection is the following theorem: Theorem 8.13. Let G be a Gaussian in d dimensions with mean 0 and unknown covariance, and let ε, τ > 0. Let S be a set of N independent samples from G for N = Ω((d log(d/ετ ))6 /ε2 ). Let S ′ be a set of N elements of Rd obtained from S by adversarially changing at most an ε-fraction of the samples of S. There exists an algorithm A that, given S ′ and ε, returns the parameters of a Gaussian distribution G′ so that with probability at least 1 − τ over the samples from S, it holds dTV (G, G′ ) ≤ δ = O(ε log(1/ε)). As in the previous subsection, we will need a condition on S under which our algorithm will succeed. 86 Definition 8.14. Let G be a d-dimensional Gaussian with mean 0 and covariance matrix Σ. Let S be a set of N points of Rd , and ε, τ > 0. We say that S is (ε, τ )-good with respect to G if the following conditions hold: • For all x ∈ S we have that xT Σ−1 x = O(d log(N/τ )). d • For p any even degree-2 polynomial p : R → R we have that |EX∼G [p(X)] − EX∈u S [p(X)]| ≤ ε EX∼G [p(X)2 ] , EX∼G [p2 (X)] − EX∈u S [p2 (X)] ≤ ε EX∼G [p(X)2 ] , and Pr (p(X) ≥ 0) ≤ 2 Pr (p(X) ≥ 0) + ε/(d log(N/τ ))2 . X∈u S X∼G Let us first note some basic properties of such polynomials on a normal distribution. The proof of this lemma is deferred to Section F. Lemma 8.15. For any even degree-2 polynomial p : Rd → R, we can write p(x) = (Σ−1/2 x)T P2 (Σ−1/2 x)+ p0 , for a d × d symmetric matrix P2 and p0 ∈ R. Then, for X ∼ G, we have 1. E[p(X)] = p0 + tr(P2 ), 2. Var[p(X)] = 2kP2 k2F and 3. For all T > 1, Pr(|p(X) − E[p(X)]| ≥ T ) ≤ 2e1/3−2T /3 Var[p(X)] . 4. For all δ > 0, Pr(|p(X)| ≤ δ2 ) ≤ O(δ). We note that, if S is obtained by taking random samples from G, then S is good with high probability. The proof of this lemma is also deferred to Section F. Lemma 8.16. Let G be a d-dimensional Gaussian with mean 0 and let ε, τ > 0. Then, for Ω((d log(d/ετ ))6 /ε2 ) ≤ N ≤ poly(d/ετ ), we have that if S is obtained by taking N independent samples from G, then S is (ε, τ )good with respect to G with probability at least 1 − τ . As in Definition 8.4, ∆(S, S ′ ) is the be the size of the symmetric difference of S and S ′ divided by |S|. The basic thrust of our algorithm is as follows. By Lemma 8.16, with probability 1 − τ we have that S is (ε, τ )-good with respect to G. The algorithm is then handed a new set S ′ so that ∆(S, S ′ ) ≤ 2ε|S|. The algorithm will run in stages. In each stage the algorithm will either output G′ or will return a new set S ′′ so that ∆(S, S ′′ ) < ∆(S, S ′ ). In the latter case, the algorithm will recurse on S ′′ . We formalize this idea below: Proposition 8.17. There is an algorithm that given a set finite S ′ ⊂ Rd , so that there is a mean 0 Gaussian G and a set S that is (ε, τ )-good with respect to G with ∆(S, S ′ ) ≤ 2ε|S|, runs in time poly(d log(1/τ )/ε) and returns either the parameters of a Gaussian G′ with dTV (G, G′ ) ≤ O(ε log(1/ε)) or a subset S ′′ of Rd with ∆(S, S ′′ ) < ∆(S, S ′ ). Given Proposition 8.17, the proof of Theorem 8.13 is straightforward. By Lemma 8.16 the original set S is (ε, τ )-good with respect to G with probability at least 1 − τ . Then, S ′ satisfies the hypotheses of Proposition 8.17. We then repeatedly iterate the algorithm from Proposition 8.17 until it outputs a distribution G′ close to G. This must eventually happen because at every step the distance between S and the set returned by the algorithm decreases by at least 1. 87 8.2.1 Analysis of Filter-based Algorithm: Proof of Proposition 8.17 We now turn our attention to the proof of Proposition 8.17. We first define the matrix Σ′ to be EX∈S ′ [XX T ], and let G′ be the mean 0 Gaussian with covariance matrix Σ′ . Our goal will be to either obtain proof that G′ is close to G or to devise a filter that allows us to clean up S ′ by removing some elements, most of which are not in S. The idea here is the following: We know by Corollary 2.14 that G and G′ are close unless I − Σ−1/2 Σ′ Σ−1/2 has large Frobenius norm. This happens if and only if there is some matrix M with kM kF = 1 so that tr(M Σ−1/2 Σ′ Σ−1/2 − M ) = E [(Σ−1/2 X)T M (Σ−1/2 X) − tr(M )] X∈u S ′ is far from 0. On the other hand, we know that the distribution of p(X) = (Σ−1/2 X)T M (Σ−1/2 X)−tr(M ) for X ∈u S is approximately that of p(G), which is a variance O(1) polynomial of Gaussians with mean 0. In order to substantially change the mean of this function, while only changing S at a few points, one must have several points in S ′ for which p(X) is abnormally large. This in turn will imply that the variance of p(X) for X from S ′ must be large. This phenomenon will be detectable as a large eigenvalue of the matrix of fourth moments of X ∈ S ′ (thought of as a matrix over the space of second moments). If such a large eigenvalue is detected, we will have a p with p(X) having large variance. By throwing away from S ′ elements for which |p| is too large, we will return a cleaner version of S ′ . The algorithm is as follows: Algorithm 15 Filter algorithm for a Gaussian with unknown covariance matrix. 1: procedure F ILTER -G AUSSIAN -U NKNOWN -C OVARIANCE(S ′ , ε, τ ) input: A multiset S ′ such that there exists an (ε, τ )-good S with ∆(S, S ′ ) ≤ 2ε output: Either a set S ′′ with ∆(S, S ′′ ) < ∆(S, S ′ ) or the parameters of a Gaussian G′ with dTV (G, G′ ) = O(ε log(1/ε)). Let C > 0 be a sufficiently large universal constant. 2: Let Σ′ be the matrix EX∈u S ′ [XX T ] and let G′ be the mean 0 Gaussian with covariance matrix Σ′ . 3: if there is any x ∈ S ′ so that xT (Σ′ )−1 x ≥ Cd log(|S ′ |/τ ) then 4: return S ′′ = S ′ − {x : xT (Σ′ )−1 x ≥ Cd log(|S ′ |/τ )}. 5: Let L be the space of even degree-2 polynomials p so that EX∼G′ [p(X)] = 0. 6: Define two quadratic forms on L (i) QG′ (p) = E[p2 (G′ )] , (ii) QS ′ (p) = EX∈u S ′ [p2 (X)] . 7: 8: 9: 10: 11: Computing maxp∈L−{ok QS ′ (p)/QG′ (p) and the associated polynomial p∗ (x) normalized so that QG′ (p∗ ) = 1 using F IND - MAX - POLY below. if QS ′ (p∗ ) ≤ (1 + Cε log2 (1/ε))QG′ (p∗ ) then return G′ Let µ be the median value of p∗ (X) over X ∈ S ′ . Find a T ≥ C ′ so that Pr (|p∗ (X) − µ| ≥ T ) ≥ 12 exp(−(T − 4/3) + 3ε/(d log(N/τ ))2 X∈u S ′ 12: return S ′′ = {X ∈ S ′ : |p∗ (X) − µ| < T }. Thr function F IND - MAX - POLY uses similar notation to S EPARATION O RACLE U NKNOWN C OVARIANCE so that F ILTER -G AUSSIAN -U NKNOWN -C OVARIANCE and S EPARATION O RACLE U NKNOWN C OVARIANCE can be more easily compared. 88 Algorithm 16 Algorithm for maximizing QS ′ (p)/QG′ (p). 1: function F IND - MAX - POLY (S ′ , Σ′ ) input: A multiset S ′ and a Gaussian G′ = N (0, Σ′ ) output: The even degree-2 polynomial p∗ (x) with EX∼G′ [p∗ (X)] ≈ 0 and QG′ (p∗ ) ≈ 1 that approximately maximizes QS ′ (p∗ ) and this maximum λ∗ = QS ′ (p∗ ). 2: Compute an approximate eigendecomposition of Σ′ and use it to compute Σ′−1/2 3: Let x(1) , . . . , x(|S ′ |) be the elements of S ′ . ⊗2 . 4: For i = 1, . . . , |S ′ |, let y(i) = Σ′−1/2 x(i) and z(i) = y(i) ′| P |S T . 5: Let TS ′ = I ♭ I ♭T + (1/|S ′ |) i=1 z(i) z(i) ∗ 6: Approximate the top eigenvalue λ and corresponding unit eigenvector v ∗ of TS ′ .. 7: Let p∗ (x) = √12 ((Σ′−1/2 x)T v ∗♯ (Σ′−1/2 x) − tr(v ∗♯ )) 8: return p∗ and λ∗ . Let us first show that F IND - MAX - POLY is correct. Claim 8.18. Algorithm F IND - MAX - POLY is correct and F ILTER -G AUSSIAN -U NKNOWN -C OVARIANCE runs time poly(d log τ /ε). Proof. First, assume that we can compute all eigenvalues and eigenvectors exactly. By Lemma 8.15 all even polynomials with degree-2 that have EX∼G [p(X)] = 0√ can be written as p(x) = (Σ′−1/2 x)T P2 (Σ′−1/2 x) − ♯ tr(P2 ) for a symmetric matrix P2 . If we take P2 = v / 2 for a unit vector v such that v ♯ is symmetric, then VarX∼G′ [p(X)] = 2kP2 kF = kv2 k = 1. Note that since the covariance matrix of S ′ is Σ′ , we have E [p(X)] = E ′ [(Σ′−1/2 X)T P2 (Σ′−1/2 X) − tr(P2 )] X∼S ′ X∼S = E ′ [tr((XX T )Σ′−1/2 P2 Σ′−1/2 )] − tr(P2 ) X∼S = tr( E ′ [(XX T )]Σ′−1/2 P2 Σ′−1/2 ) − tr(P2 ) X∼S ′ ′−1/2 = tr(Σ Σ P2 Σ′−1/2 ) − tr(P2 ) = 0 . We let√T ′ be the multiset of y = Σ−1/2 x for x ∈ S ′ and U ′ the multiset of z = y ⊗2 for y in T ′ . Recall that P2♭ = 2v. We thus have QS ′ (p) := = = = E [p(X)2 ] = E ′ [(Y T P2 Y − tr(P2 ))2 ] X∈u S ′ T 2 Y ∼T E [(Y P2 Y ) ] + tr(P2 )2 − 2tr(P2 ))2 ] Y ∈u T ′ E [tr(((Y Y T )P2 )2 ] + tr(P2 I)2 − 0 Y ∈u T ′ E [2(Z T v)2 ] + 2(v T I ♭ )2 Z∈u U ′ E [2v T (ZZ T )v] + 2v T (I ♭ I ♭T )v Z∈u U ′ T = 2v TS ′ v . Thus, the p(x) that maximizes QS ′ (p) is given by the unit vector v that maximizes v T TS ′ v subject to v ♯ being symmetric. 89 Let v ′ = v ♯T ♭ . Note that v T TS ′ v = v ′T TS ′ v ′ by symmetries of TS ′ . Thus, by linearity, v ′′ = v/2 + v ′ /2 also has v ′′T TS ′ v ′′ = v T TS ′ v. However, if v ♯ is not symmetric, v ′′ has kv ′′ k2 < 1. Thus, the unit vector v ′′ /kv ′′ k2 achieves a higher value of the bilinear form. Consequently, v ∗♯ is symmetric. Now we have that p∗ (x) that maximizes QS ′ (p) is given by the unit vector v that maximizes v T TS ′ v. Since QG′ (p) := EX∼G′ [p(X)2 ] = 2kP2 kF = kvk2 = 1, this also maximizes QS ′ (p)/QG′ (p). We note that we can achieve EX∼G′ [p∗ (X)] = O(ε2 ) and EX∼G′ [(p∗ (X))2 ] = 1 + O(ε2 ) in time poly(ε/d) using standard algorithms to compute the eigen-decomposition of a symmetric matrix. This suffices for the correctness of the remaining part of F ILTER -G AUSSIAN -U NKNOWN -C OVARIANCE The other steps in F ILTER -G AUSSIAN -U NKNOWN -C OVARIANCE can be easily done in poly(|S ′ |d log(1τ )/ε) time. In order to analyze algorithm F ILTER -G AUSSIAN -U NKNOWN -C OVARIANCE, we note that we can write S ′ = (S \ L) ∪ E where L = S \ S ′ and L = S ′ \ S. It is then the case that ∆(S, S ′ ) = (|L| + |E|)/|S|. Since this is small we have that |L|, |E| = O(ε|S ′ |). We can also write Σ′ and ΣS\L ((|S| − |L|)/|S ′ |) + ΣE (|E|/|S ′ |) = ΣS\L + O(ε)(ΣE − ΣS\L ), where ΣS\L = EX∈u S\L [XX T ], ΣE = EX∈u E [XX T ]. A critical part of our analysis will be to note that ΣS\L is very close to Σ, and thus that either Σ′ is very close to Σ or else ΣE is very large in some direction. Lemma 8.19. We have that kI − Σ−1/2 ΣS\L Σ−1/2 kF = O(ε log(1/ε). Proof. Note that, since the matrix inner product is an inner product,   tr(M Σ−1/2 ΣS\L Σ−1/2 ) − tr(M ) . kI − Σ−1/2 ΣS\L Σ−1/2 kF = sup kM kF =1 We need to show that for any M with kM kF = 1 that tr(M Σ−1/2 ΣS\L Σ−1/2 ) − tr(M ) is small. Since tr(M Σ−1/2 ΣS\L Σ−1/2 ) = tr(M T Σ−1/2 ΣS\L Σ−1/2 ) = tr( 12 (M + M T )Σ−1/2 ΣS\L Σ−1/2 ) and 1 k 2 (M + M T )kF ≤ 21 (kM kF + kM T kF ) = 1, we may assume WLOG that M is symmetric. Consider such an M . We note that tr(M Σ−1/2 ΣS\L Σ−1/2 ) = E [tr(M Σ−1/2 XX T Σ−1/2 )] = X∈u S\L E X∈u S\L [(Σ−1/2 X)T M (Σ−1/2 X)]. Let p(x) denote the quadratic polynomial p(x) = (Σ−1/2 x)T M (Σ−1/2 x) − tr(M ). By Lemma 8.15, EX∼G [p(X)] = 0 and VarX∼G [p(X)] = 2kM k2F = 2. p Since S is (ε, τ )-good with respect to G, we have that EX∈S [p(X)] = ε EX∼G [p2 (X)] = O(ε). Therefore, it suffices to show that the contribution from L is small. In particular, it will be enough to show that P X∈L p(X) = O(ε log(1/ε)). |S| This holds essentially because the distribution of p(X) for X ∈ S is close to that for p(G), which has rapidly decaying tails. Therefore, throwing away an ε-fraction of the mass cannot change the value of the 90 mean by very much. In particular, we have that P Z ∞ |{x ∈ L : p(x) > t}| x∈L p(x) ≤ dt |S| |S| 0 Z ∞ min(ε, Pr (p(X) > t))dt ≤ ≤ Z X∈u S 0 O(d log(N/τ )) 0 ≤ε+ ≤ε+ Z 0 Z ∞ min(ε, 2 Pr(p(G) > t)) + ε/(d log(N/τ ))2 dt min(ε, 2 exp(−Ω(t − 1)))dt C log(1/ε) εdt + Z ∞ 2 exp(−Ω(t))dt C log(1/ε)−1 0 ≤ ε + O(ε log(1/ε)) + O(ε) = O(ε log(1/ε)) , where C above is a sufficiently large constant. The third line uses that max |p(x)| ≤ max kΣ−1/2 xk22 kM k2 + trM ≤ O(d log(N/τ )) · 1 + x∈S √ x∈S d = O(d log(N/τ )) . This completes the proof. As a corollary of this we note that Σ′ cannot be too much smaller than Σ. Corollary 8.20. Σ′ ≥ (1 − O(ε log(1/ε)))Σ. Proof. Lemma 8.19 implies that Σ−1/2 ΣS\L Σ1/2 has all eigenvalues in the range 1 ± O(ε log(1/ε). Therefore, ΣS\L ≥ (1+O(ε log(1/ε)))Σ. Our result now follows from noting that Σ′ = ΣS\L ((|S|−|L|)/|S ′ |)+ ΣE (|E|/|S ′ |), and ΣE = EX∈u E [XX T ] ≥ 0. The first step in verifying correctness is to note that if our algorithm returns on Step 4 that it does so correctly. Claim 8.21. If our algorithm returns on Step 4, then ∆(S, S ′′ ) < ∆(S, S ′ ). Proof. This is clearly true if we can show that all x removed have x 6∈ S. However, this follows because (Σ′ )−1 ≤ 2Σ−1 , and therefore, by (ε, τ )-goodness, all x ∈ S satisfy xT (Σ′ )−1 x ≤ 2xT Σ−1 x = O(d log(N/τ )) < Cd log(N/τ ) for C sufficiently large. Next, we need to show that if our algorithm returns a G′ in Step 9 that dTV (G, G′ ) is small. Claim 8.22. If our algorithm returns in Step 9, then dTV (G, G′ ) = O(ε log(1/ε)). Proof. By Corollary 2.14, it suffices to show that kI − Σ−1/2 Σ′ Σ−1/2 kF = O(ε log(1/ε)). 91 However, we note that kI − Σ−1/2 Σ′ Σ−1/2 kF ≤ kI − Σ−1/2 ΣS\L Σ−1/2 kF + (|E|/|S ′ |)kI − Σ−1/2 ΣE Σ−1/2 kF ≤ O(ε log(1/ε)) + (|E|/|S ′ |)kI − Σ−1/2 ΣE Σ−1/2 kF . Therefore, we will have an appropriate bound unless kI − Σ−1/2 ΣE Σ−1/2 kF = Ω(log(1/ε)). Next, note that there is a matrix M with kM kF = 1 so that kI − Σ−1/2 ΣE Σ−1/2 kF = tr(M Σ−1/2 ΣE Σ−1/2 − M ) = E [(Σ−1/2 X)T M (Σ−1/2 X) − tr(M )]. X∈u E Indeed we can take M = (I − Σ−1/2 ΣE Σ−1/2 )/kI − Σ−1/2 ΣE Σ−1/2 kF . Thus, there is a symmetric M such that this holds. Letting p(X) be the polynomial p(X) = (Σ−1/2 X)T M (Σ−1/2 X) − tr(M ), Using Lemma 8.15, EX∼G [p(X)] = 0 and VarX∼G [p(X)] = 2. Therefore, p ∈ L and QG′ (p) = 2. We now compare this to the size of QS ′ (p). On the one hand, we note that using methodology similar to that used in Lemma 8.19 we can show that EX∈u S\L [p2 (X)] is not much less than 2. In particular, P   2 X∈L p (X) 2 2 E [p (X)] ≥ E [p (X)] − . X∈u S |S| X∈u S\L On the one hand, we have that E [p2 (X)] ≤ E[p2 (G)](1 + ε) = 2 + O(ε) , X∈u S by assumption. On the other hand, we have that P Z ∞ 2 |{X ∈ L : p2 (X) > t}| X∈L p (X) ≤ dt |S| |S| 0 Z ∞ min(ε, Pr (p2 (X) > t))dt ≤ ≤ Z X∈u S 0 O(d log(N/τ ))2 0 ≤ε+ ≤ε+ Z 0 Z ∞ min(ε, 2 Pr(p2 (G) > t)) + ε/(d log(N/τ )2 )dt √ min(ε, 2 exp(−Ω( t − 1)))dt C log2 (1/ε) εdt + 0 2 Z ∞ √ 2 exp(−Ω( t))dt C log2 (1/ε)−1 ≤ ε + O(ε log (1/ε)) + O(ε log(1/ε)) = O(ε log2 (1/ε)). Therefore, we have that EX∈u S\L [p2 (X)] = 2 + O(ε log2 (1/ε)). Since, by assumption QS ′ (p) ≤ 2 + O(ε log2 (1/ε)), this implies that (|E|/|S ′ |) EX∈u E [p2 (X)] = O(ε log2 (1/ε)). By Cauchy-Schwartz, this implies that r p (|E|/|S ′ |) E [p(X)] ≤ (|E|/|S ′ |) (|E|/|S ′ |) E [p2 (X)] = O(ε log(1/ε)). X∈u E X∈u E Thus, (|E|/|S ′ |)kI − Σ−1/2 ΣE Σ−1/2 kF = O(ε log(1/ε)). This shows that if the algorithm returns in this step, it does so correctly. 92 Next, we need to show that if the algorithm reaches Step 11 that such a T exists. Claim 8.23. If the algorithm reaches Step 11, then there exists a T > 1 so that Pr (|p(X) − µ| ≥ T ) ≥ 12 exp(−(T − 1)/3) + 3ε/(d log(N/τ ))2 . X∈u S ′ Proof. Before we begin, we will need the following critical Lemma: Lemma 8.24. Var [p(X)] ≤ 1 + O(ε log(1/ε)). X∼G Proof. We note that since VarX∼G′ (p(G′ )) = QG′ (p) = 1, that we just need to show that the this variance with respect to G instead of G′ is not too much larger. This will essentially be because the covariance matrix of G cannot be much bigger than the covariance matrix of G′ by Corollary 8.20. Using Lemma 8.15, we can write p(x) = (Σ′−1/2 x)T P2 (Σ′−1/2 x) + p0 , where kP2 kF = 21 VarX∼G′ (p(G′ )) = 21 and p0 = µ + tr(P2 ). We can also express p(x) in terms of G as p(x) = (Σ−1/2 x)T M (Σ−1/2 x) + p0 , and have VarX∼G [p(X)] = kM kF . Here, M is the matrix Σ1/2 Σ′−1/2 P2 Σ′−1/2 Σ1/2 . By Corollary 8.20, it holds Σ′ ≥ (1 − O(ε log(1/ε)))Σ. Consequently, Σ1/2 Σ′−1/2 ≤ (1+O(ε log(1/ε)))I, and so kΣ1/2 Σ′−1/2 k2 ≤ 1+O(ε log(1/ε)). Similarly, kΣ′−1/2 Σ1/2 k2 ≤ 1 + O(ε log(1/ε)). We claim that Pthen kABkF ≤ kAk2 kBkF . If Bj are the columns of B, then we Pif A, B are matrices, have kABk2F = j kABj k22 ≤ kAk22 j kBj k22 = (kAk2 kBkF )2 . Similarly for rows, we have kABkF ≤ kAkF kBk2 . Thus, we have Var [p(X)] = 2kM kF ≤ 2kΣ1/2 Σ′−1/2 k2 kP2 kF kΣ′−1/2 Σ1/2 k2 ≤ 1 + O(ε log(1/ε)) . X∼G Next, we need to consider µ. In particular, we note that by the similarity of S and S ′ , µ must be between the 40 and 60 percentiles of values of p(X) for X ∈ S. However, since S is (ε, τ )-good, this must be between the 30 and 70 percentiles of p(G). Therefore, by Cantelli’ s inequality, q (40) |µ − E [p(X)]| ≤ 2 Var [p(X)] ≤ 3 . X∼G X∼G We are now ready to proceed. Our argument will follow by noting that while QS ′ (p) is much larger than expected, very little of this discrepancy can be due to points in S \ L. Therefore, the points of E must provide a large contribution. Given that there are few points in E, much of this contribution must come from there being many points near the tails, and this will guarantee that some valid threshold T exists. Let µ̂ be EX∼G [p(X)]. In particular, we have that VarX∈u S ′ (p(X)) = QS ′ (p) ≥ 1 + Cε log2 (1/ε), which means that P 2 X∈S ′ |p(X) − µ̂| ≥ 1 + Cε log2 (1/ε). |S ′ | Now, because S is good, we know that P 2 X∈S |p(X) − µ̂| = E[|p(G) − µ̂|2 ](1 + O(ε)) = Var [p(X)](1 + O(ε)) ≤ 1 + O(ε log(1/ε)). X∼G |S| 93 Therefore, we have that P X∈S\L |p(X) |S ′ | − µ̂|2 ≤ 1 + O(ε log(1/ε)). Hence, for C sufficiently large, it must be the case that X |p(X) − µ̂|2 ≥ (C/2)ε log 2 (1/ε)|S ′ | , X∈E and therefore, X X∈E |p(X) − µ|2 ≥ (C/3)ε log 2 (1/ε)|S ′ | . On the other hand, we have that Z ∞ X 2 {X ∈ E : |p(X) − µ| > t}2tdt |p(X) − µ| = 0 X∈E ≤ Z C 1/4 log(1/ε) 0 O(tε|S ′ |)dt + Z C 1/4 {X ∈ E : |p(X) − µ| > t}2tdt C 1/4 log(1/ε) Z (d log(N/τ )) ≤ O(C 1/2 ε log2 (1/ε)|S ′ |) + |S ′ | Therefore, we have that Z (d log(N/τ )) (d log(N/τ )) Pr (|p(X) − µ| > t)2tdt . ′ C 1/4 log(1/ε) X∈u S Pr (|p(X) − µ| > t)2tdt ≥ (C/4)ε log 2 (1/ε) . ′ log(1/ε) X∈u S (41) Assume for sake of contradiction that Pr (|p(X) − µ| ≥ T ) < 12 exp(−(T − 4)/3) + 3ε/(d log(N/τ ))2 , X∈u S ′ for all T > 1. Plugging this into Equation (41), we find that Z (d log(N/τ )) 24 exp(−t/3)dt + C 1/4 log(1/ε)−4 Z (d log(N/τ )) C 1/4 log(1/ε) 6tε/(d log(N/τ ))2 dt ≥ (C/4)ε log 2 (1/ε) , which yields a contradiction. Finally, we need to verify that if our algorithm returns output in Step 12, that it is correct. Claim 8.25. If the algorithm returns during Step 12, then ∆(S, S ′′ ) ≤ ∆(S, S ′ ) − ε/(d log(N/τ ))2 . Proof. We note that it is sufficient to show that |E \ S ′′ | > |(S \ L) \ S ′′ |. In particular, it suffices to show that |{X ∈ E : |p(X) − µ| > T }| > |{X ∈ S \ L : |p(X) − µ| > T }|. For this, it suffices to show that |{X ∈ S ′ : |p(X) − µ| > T }| > 2|{X ∈ S \ L : |p(X) − µ| > T }|, or that |{X ∈ S ′ : |p(X) − µ| > T }| > 2|{X ∈ S : |p(X) − µ| > T }|. 94 By assumption, we have that |{X ∈ S ′ : |p(X) − µ| > T }| > (12 exp(−(T − 4)/3) + 3ε/(d log(N/τ ))2 )|S ′ | . On the other hand, we have that |{X ∈ S : |p(X) − µ| > T }| ≤ |S|(2 Pr(|p(G) − µ| > T ) + ε/(d log(N/τ ))2 ) ≤ 3|S ′ | Pr (|p(X) − µ| > T ) + 3ε/(d log(N/τ ))2 )|S ′ | . X∼G On the other hand by the last claim, p(X) for X ∼ G is an even degree-2 polynomial of a Gaussian with variance at most 3/2. Therefore, by Lemma 8.15 Pr (|p(X) − E[p(X)]| ≥ T ) ≤ 2e1/3−2T /3 Var[p(X)] ≤ exp((T − 1)/3)) . X∼G However, from equation (40), E[p(X)] − µ ≤ 3 and so Pr (|p(X) − µ| > T ) ≤ 2 exp(−(T − 4)/3). X∼G This completes our proof. Acknowledgements J.L. would like to thank Michael Cohen and Sam Hopkins for some very helpful discussions. References [ABL14] P. Awasthi, M. F. Balcan, and P. M. Long. The power of localization for efficiently learning linear separators with noise. In STOC 2014, pages 449–458, 2014. [ADLS15] J. Acharya, I. Diakonikolas, J. Li, and L. Schmidt. Sample-optimal density estimation in nearly-linear time. CoRR, abs/1506.00671, 2015. [AGHK13] A. Anandkumar, R. Ge, D. Hsu, and S. Kakade. A tensor spectral approach to learning mixed membership community models. In COLT 2013, pages 867–881, 2013. [AGM12] S. Arora, R. Ge, and A. Moitra. Learning topic models - going beyond SVD. In FOCS 2012, pages 1–10, 2012. [AGMS15] S. Arora, R. Ge, A. Moitra, and S. Sachdeva. Provable ICA with unknown gaussian noise, and implications for gaussian mixtures and autoencoders. Algorithmica, 72(1):215–236, 2015. [AHK12] A. Anandkumar, D. Hsu, and S. Kakade. A method of moments for mixture models and Hidden Markov Models. Journal of Machine Learning Research - Proceedings Track, 23:33.1–33.34, 2012. [AJOS14] J. Acharya, A. Jafarpour, A. Orlitsky, and A. T. Suresh. Sorting with adversarial comparators and application to density estimation. In Proceedings of the 2014 IEEE International Symposium on Information Theory (ISIT), pages 1682–1686, 2014. [AK01] S. Arora and R. Kannan. Learning mixtures of arbitrary Gaussians. In Proceedings of the 33rd Symposium on Theory of Computing, pages 247–257, 2001. 95 [BBBB72] R.E. Barlow, D.J. Bartholomew, J.M. Bremner, and H.D. Brunk. Statistical Inference under Order Restrictions. Wiley, New York, 1972. [BD15] S. Balmand and A. Dalalyan. Convex programming approach to robust estimation of a multivariate gaussian model, 2015. [Ber06] T. Bernholt. Robust estimators are hard to compute. Technical report, University of Dortmund, Germany, 2006. [Bru09] S. C. Brubaker. Robust PCA and clustering in noisy mixtures. In SODA 2009, pages 1078– 1087, 2009. [BS10] M. Belkin and K. Sinha. Polynomial learning of distribution families. In FOCS, pages 103– 112, 2010. [BV08] S. C. Brubaker and S. Vempala. Isotropic PCA and Affine-Invariant Clustering. In Proc. 49th IEEE Symposium on Foundations of Computer Science, pages 551–560, 2008. [CDSS13] S. Chan, I. Diakonikolas, R. Servedio, and X. Sun. Learning mixtures of structured distributions over discrete domains. In SODA, pages 1380–1394, 2013. [CDSS14a] S. Chan, I. Diakonikolas, R. Servedio, and X. Sun. Efficient density estimation via piecewise polynomial approximation. In STOC, pages 604–613, 2014. [CDSS14b] S. Chan, I. Diakonikolas, R. Servedio, and X. Sun. Near-optimal density estimation in nearlinear time using variable-width histograms. In NIPS, pages 1844–1852, 2014. [CGG02] M. Cryan, L. Goldberg, and P. Goldberg. Evolutionary trees can be learned in polynomial time in the two state general Markov model. SIAM Journal on Computing, 31(2):375–397, 2002. [CLM+ 16] M. B. Cohen, Y. T. Lee, G. L. Miller, J. W. Pachocki, and A. Sidford. Geometric median in nearly linear time. In Proceedings of STOC’16, 2016. [CLMW11] E. J. Candès, X. Li, Y. Ma, and J. Wright. Robust principal component analysis? J. ACM, 58(3):11, 2011. [CW01] A. Carbery and J. Wright. Distributional and Lq norm inequalities for polynomials over convex bodies in Rn . Mathematical Research Letters, 8(3):233–248, 2001. [Das99] S. Dasgupta. Learning mixtures of Gaussians. In Proceedings of the 40th Annual Symposium on Foundations of Computer Science, pages 634–644, 1999. [DDKT16] C. Daskalakis, A. De, G. Kamath, and C. Tzamos. A size-free CLT for poisson multinomials and its applications. In Proceedings of the 48th Annual ACM Symposium on the Theory of Computing, STOC ’16, New York, NY, USA, 2016. ACM. [DDO+ 13] C. Daskalakis, I. Diakonikolas, R. O’Donnell, R.A. Servedio, and L. Tan. Learning Sums of Independent Integer Random Variables. In FOCS, pages 217–226, 2013. [DDS12a] C. Daskalakis, I. Diakonikolas, and R.A. Servedio. Learning k-modal distributions via testing. In SODA, pages 1371–1385, 2012. [DDS12b] C. Daskalakis, I. Diakonikolas, and R.A. Servedio. Learning Poisson Binomial Distributions. In STOC, pages 709–728, 2012. 96 [DDS15a] C. Daskalakis, I. Diakonikolas, and R. A. Servedio. Learning poisson binomial distributions. Algorithmica, 72(1):316–357, 2015. [DDS15b] A. De, I. Diakonikolas, and R. Servedio. Learning from satisfying assignments. In Proceedings of the 26th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015, pages 478– 497, 2015. [DG85] L. Devroye and L. Györfi. Nonparametric Density Estimation: The L1 View. John Wiley & Sons, 1985. [DK14] C. Daskalakis and G. Kamath. Faster and sample near-optimal algorithms for proper learning mixtures of Gaussians. In Proceedings of the 27th Annual Conference on Learning Theory, COLT ’14, pages 1183–1213, 2014. [DKS15] I. Diakonikolas, D. M. Kane, and A. Stewart. Optimal learning via the fourier transform for sums of independent integer random variables. CoRR, abs/1505.00662, 2015. [DKS16] I. Diakonikolas, D. M. Kane, and A. Stewart. The fourier transform of poisson multinomial distributions and its algorithmic applications. In Proceedings of STOC’16, 2016. [DKT15] C. Daskalakis, G. Kamath, and C. Tzamos. On the structure, covering, and learning of Poisson multinomial distributions. In Proceedings of the 56th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’15, Washington, DC, USA, 2015. IEEE Computer Society. [DL96] L. Devroye and G. Lugosi. A universally acceptable smoothing factor for kernel density estimates. Annals of Statistics, 24:2499–2512, 1996. [DL97] L. Devroye and G. Lugosi. Nonasymptotic universal smoothing factors, kernel complexity and Yatracos classes. Annals of Statistics, 25:2626–2637, 1997. [DL01] L. Devroye and G. Lugosi. Combinatorial methods in density estimation. Springer Series in Statistics, Springer, 2001. [FM99] Y. Freund and Y. Mansour. Estimating a mixture of two product distributions. In Proceedings of the 12th Annual COLT, pages 183–192, 1999. [FOS05] J. Feldman, R. O’Donnell, and R. Servedio. Learning mixtures of product distributions over discrete domains. In Proc. 46th Symposium on Foundations of Computer Science (FOCS), pages 501–510, 2005. [GLS88] M. Grötschel, L. Lovász, and A. Schrijver. Geometric Algorithms and Combinatorial Optimization, volume 2. Springer, 1988. [Hau92] D. Haussler. Decision theoretic generalizations of the PAC model for neural net and other learning applications. Information and Computation, 100:78–150, 1992. [HK13] D. Hsu and S. M. Kakade. Learning mixtures of spherical gaussians: moment methods and spectral decompositions. In Innovations in Theoretical Computer Science, ITCS ’13, pages 11–20, 2013. [HM13] M. Hardt and A. Moitra. Algorithms and hardness for robust subspace recovery. In COLT 2013, pages 354–375, 2013. 97 [HP15] M. Hardt and E. Price. Sharp bounds for learning a mixture of two Gaussians. In Proceedings of the 47th Annual ACM Symposium on the Theory of Computing, STOC ’15, pages 753–760, New York, NY, USA, 2015. ACM. [HR09] P. J. Huber and E. M. Ronchetti. Robust statistics. Wiley New York, 2009. [HRRS86] F. R. Hampel, E. M. Ronchetti, P. J. Rousseeuw, and W. A. Stahel. Robust statistics. The approach based on influence functions. Wiley New York, 1986. [Hub67] P. J. Huber. The behavior of maximum likelihood estimates under nonstandard conditions. In Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Statistics, pages 221–233. University of California Press, 1967. [JP78] D. S. Johnson and F. P. Preparata. The densest hemisphere problem. Theoretical Computer Science, 6:93–107, 1978. [KL93] M. J. Kearns and M. Li. Learning in the presence of malicious errors. SIAM Journal on Computing, 22(4):807–837, 1993. [KLS09] A. Klivans, P. Long, and R. Servedio. Learning halfspaces with malicious noise. Proc. 17th Internat. Colloq. on Algorithms, Languages and Programming (ICALP), 2009. [KMR+ 94] M. Kearns, Y. Mansour, D. Ron, R. Rubinfeld, R. Schapire, and L. Sellie. On the learnability of discrete distributions. In Proc. 26th STOC, pages 273–282, 1994. [KMV10] A. T. Kalai, A. Moitra, and G. Valiant. Efficiently learning mixtures of two Gaussians. In STOC, pages 553–562, 2010. [KSS94] M. Kearns, R. Schapire, and L. Sellie. Toward Efficient Agnostic Learning. Machine Learning, 17(2/3):115–141, 1994. [LM00] B. Laurent and P. Massart. Adaptive estimation of a quadratic functional by model selection. Annals of Statistics, pages 1302–1338, 2000. [LMTZ12] G. Lerman, M. B. McCoy, J. A. Tropp, and T. Zhang. Robust computation of linear models, or how to find a needle in a haystack. CoRR, abs/1202.4044, 2012. [LS15] J. Li and L. Schmidt. A nearly optimal and agnostic algorithm for properly learning a mixture of k gaussians, for any constant k. CoRR, abs/1506.01367, 2015. [LT15] P. L. Loh and X. L. Tan. High-dimensional robust precision matrix estimation: Cellwise corruption under -contamination. Available at arXiv:1509.07229, 2015. [MR05] E. Mossel and S. Roch. Learning nonsingular phylogenies and Hidden Markov Models. In Proceedings of the 37th Annual Symposium on Theory of Computing (STOC), 2005. [MV10] A. Moitra and G. Valiant. Settling the polynomial learnability of mixtures of Gaussians. In FOCS, pages 93–102, 2010. [Sco92] D.W. Scott. Multivariate Density Estimation: Theory, Practice and Visualization. Wiley, New York, 1992. [Ser01] R. Servedio. Smooth boosting and learning with malicious noise. In Proceedings of the Fourteenth Annual Conference on Computational Learning Theory, pages 473–489, 2001. 98 [Ser03] R. Servedio. Smooth boosting and learning with malicious noise. JMLR, 4:633–648, 2003. [Sil86] B. W. Silverman. Density Estimation. Chapman and Hall, London, 1986. [SOAJ14] A. T. Suresh, A. Orlitsky, J. Acharya, and A. Jafarpour. Near-optimal-sample estimators for spherical gaussian mixtures. In NIPS, pages 1395–1403, 2014. [Tuk75] J.W. Tukey. Mathematics and picturing of data. In Proceedings of ICM, volume 6, pages 523–531, 1975. [Val85] L. Valiant. Learning disjunctions of conjunctions. In Proc. 9th IJCAI, pages 560–566, 1985. [Ver10] R. Vershynin. Introduction to the non-asymptotic analysis of random matrices, 2010. [VW02] S. Vempala and G. Wang. A spectral algorithm for learning mixtures of distributions. In FOCS, pages 113–122, 2002. [Whi82] H. White. Maximum likelihood estimation of misspecified models. Econometrica, 50(1):1–25, 1982. [Yat85] Y. G. Yatracos. Rates of convergence of minimum distance estimators and Kolmogorov’s entropy. Annals of Statistics, 13:768–774, 1985. [ZL14] T. Zhang and G. Lerman. A novel m-estimator for robust pca. J. Mach. Learn. Res., 15(1):749– 808, January 2014. A Deferred Proofs from Section 2 Proof of Lemma 2.15: We include the simple proof for completeness. By Kraft’s inequality, for any pair of distributions, we have that d2TV (P, Q) ≤ 2H 2 (P, Q), where H(P, Q) denotes the Hellinger distance between P, Q. Since P, Q are product measures, we have that d d Y Y p √ 2 ( pi qi + (1 − pi )(1 − qi )) . (1 − H (Pi , Qi )) = 1 − H (P, Q) = 2 i=1 i=1 √ √ √ The elementary inequality 2 ab = a + b − ( a − b)2 , a, b > 0, gives that √ Therefore, pi q i + p (1 − pi )(1 − qi ) ≥ 1 − d2TV (P, Q) (pi − qi )2 = 1 − zi . (pi + qi )(2 − pi − qi ) d d X Y zi , (1 − zi )) ≤ 2 ≤ 2 · (1 − i=1 where the last inequality follows from the union bound. 99 i=1 B Deferred Proofs from Section 4 This section contains deferred proofs of several concentration inequalities. Proof of Lemma 4.5: Recall that for any J ⊆ [m], we let wJ ∈ Rm be the vector which is given by wiJ = for i ∈ J and wiJ = 0 otherwise. By convexity, it suffices to show that " N X Pr ∃J : |J| = (1 − 2ε)N, and i=1 wiJ Yi YiT − (1 − 2ε)I 2 1 |J| # ≥ δ1 ≤ τ . For any fixed wJ we have N X i=1 wiJ Yi YiT − I = = X 1 Yi YiT − I (1 − 2ε)N i∈J 1 (1 − 2ε)N N X i=1 Yi YiT − Therefore, by the triangle inequality, we have N X i=1 wiI Yi YiT − (1 − 2ε)I 2  1 1 I − 1 − 2ε (1 − 2ε)N N X 1 1 Yi YiT − ≤ I (1 − 2ε)N 1 − 2ε i=1 2 X i6∈J Yi YiT −  1 1 − 2ε   − 1 I .   X 1 1 T −1 I + Yi Yi − (1 − 2ε)N 1 − 2ε i6∈J By Lemma 4.3, the first term is at most δ1 with probability 1 − τ by setting   d + log(1/τ ) N =Ω . δ12 We now wish to show that with probability 1 − τ , there does not exist a J so that the second term is more than δ1 , for our choice of N . By multiplying both sides by γ = (1 − 2ε)/ε, this event is equivalent to the event that there is a J so that 1 X Yi YiT − I 2εN i6∈J > γ1 δ1 . 2 By Lemma 4.3, for any fixed τ ′ , this happens with probability at most τ ′ if we choose N ≥c d + log(1/τ ′ ) , γδ12 (42)  N for some universal constant c. We wish to union bound over all J of size (1 − 2ε)N . There are (1−2ε)N −1 N such events. Thus, we take τ ′ = (1−2ε)N τ . We now need to show that for our choice of N and τ ′ , (42) n is satisfied. By algebraic manipulations, and the fact that log αn = O(nH(α)) for n sufficiently large, where H(x) is the binary entropy function, the RHS of (42) simplifies to c d + log 1/τ + O(N H(2ε)) d + log 1/τ ′ =c . 2 γδ1 γδ12 100 . 2 Thus, (42) is satisfied if N  By our choice of δ1 , 1 − H(2ε) γδ12   H(2ε) 1− γδ12  ≥c d + log 1/τ . γδ12 ≥ 1/2, and hence, (42) is satisfied for our choice of m. Proof of Lemma 4.9: Let U = V ΛV T be the diagonalization of U . Then by the properties of trace, we have N 1 X tr(Xi XiT U ) − tr(U ) N = i=1 N 1 X tr(Xi XiT V ΛV T ) − tr(Λ) N i=1 = N 1 X tr(XiT V ΛV T Xi ) − tr(Λ) . N i=1 Let Yi = (Yi1, , . . . , Yid ) = V T Xi . Since V is an orthogonal matrix, and because a spherical Gaussian is rotationally invariant, we have Yi ∼ N (0, I). By computation, the lemma is equivalent to the statement that d N X X λj i=1 j=1 N (Yij2 − 1) ≤ δ . Since Yi ∼ N (0, I), we have that the Yij2 − 1 are all independent random variables with kYij2 − 1kψ1 ≤ c for some universal constant c. Thus, we may invoke Bernstein’s unequality (Prop 5.16), where our weight vector a ∈ RN d is given by aij = λj /N , and thus satisfies kak∞ = kU k/N and kak22 d N X X λ2j = N2 i=1 j=1 N X 1 1 = = N2 N i=1 Pd = kU k2F = 1. Thus, Bernstein’s inequality gives us that     2  d N X X λj 2 δ δ   Pr (Y − 1) > δ ≤ 2 exp −K min 2 , N ij c /N ckU k/N i=1 j=1   ≤ 2 exp −Ω min δ2 N, δN since by assumption 2 i=1 λj ≤τ , for our choice of N , where the second line follows because the spectral norm of any matrix with Frobenius norm 1 is at most 1. Proof of Theorem 4.15: Let v = A♭ ∈ Ssym . We will show that    T  hv, M vi = 2v T Σ⊗2 v + v T Σ♭ Σ♭ v . 2 Since M is a symmetric operator on Rd , its quadratic form uniquely identifies it and this suffices to prove the claim. 101 P Since A is symmetric, it has a eigenvalue expansion A = di=1 λi ui uTi , which immediately implies P that v = di=1 λi ui ⊗ ui . Let X ∼ N (0, Σ). We compute the quadratic form: hv, M vi = = d X i,j=1 d X i,j=1 = d X i,j=1 = d X i,j=1 = d X i,j=1 λi λj hui ⊗ ui , E[(X ⊗ X)(X ⊗ X)T ]uj ⊗ uj i   λi λj E hui ⊗ ui , (X ⊗ X)(X ⊗ X)T uj ⊗ uj i   λi λj E hui , Xi2 huj , Xi2   λi λj E hB T ui , Y i2 hB T uj , Y i2  λi λj hB T ui , B T ui ihB T uj , B T uj i + 2hB T ui , B T uj i2 , where the last line follows by invoking Isserlis’s theorem. We now manage both sums individually. We have d X i,j=1 λi λj hB T ui , B T ui ihB T uj , B T uj i = d X = d X λi uTi Σui i=1 i=1 !2 !   2 ♭ λi (ui ⊗ ui ) Σ T    T = v T Σ♭ Σ♭ v , and d X i,j=1 λi λj hB T ui , B T uj i2 = = X i,j λi λj h(B T ui )⊗2 , (B T uj )⊗2 i d X i,j=1 = d X i,j=1 λi λj h(B T ⊗ B T )ui ⊗ ui , (B T ⊗ B T )uj ⊗ uj i λi λj (ui ⊗ ui )Σ⊗2 (uj ⊗ uj ) = v T Σ⊗2 v . B.1 Proof of Theorem 4.17 We will proceed in a couple of steps. First, we prove concentration of the empirical fourth moment, without worrying about removing points. We will use the following theorem: 102 Theorem B.1 (Theorem 5.44 of Vershynin). Let A1 , . . . , AN ∈ Rd√be independent random variables with identical second moment M = E[Ai ATi ]. Let R be so that kAi k ≤ R almost surely for all i. Then, for all t ≥ 0, we have that with probability at least 1 − n · exp(−ct2 ), N 1 X Ai ATi − Σ N i=1 2 r   R 1/2 2 where γ = t ≤ max kΣk2 γ, γ . d With some massaging, this allows us to show: Lemma B.2. Fix ε, τ > 0. Let M4 denote the canonical flattening of the fourth moment tensor of N (0, I). We have that with probability 1 − τ , s  N N 1 3 X d log τ log τ ε 1 +ε . Zi ZiT − M4 ≤ O  N N i=1 2 In particular, if then 1 N PN T i=1 Zi Zi d3 log2 ε2 e N =Ω − M4 2 1 τ ! , ≤ O(ε). We briefly remark that with somewhat more involved (but standard) methods, we believe we can strengthen this bound to   2 d3 d + log2 1/τ e + . N =Ω ε2 ε However, for simplicity of exposition we only present the weaker bound. 2 Proof. Let D be the distribution over Rd which is given by X ⊗2 where X ∼ N (0, I) if kXk22 ≤ O(d log(N/(τ ε))), and 0 otherwise. That is, a sample from D is drawn by sampling X ⊗2 , and zeroing it out if its norm is too large. Let I ⊆ [N ] be the set of indices so that kXi k22 ≤ O(d log τNε ). For each i ∈ I, we have that Xi ∼ D. Let M4′ = EX∼D [(X ⊗2 )(X ⊗2 )T ]. Since we are only removing large points, it is evident that M4′  M4 , and kM4 k = O(d2 ). By Theorem B.1, we have  s 1 m  d log log 1 X τ τε  Zi ZiT − M4′ ≤ max O(d)γ, γ 2 where γ = O  , |I| |I| i∈I 2 except with probability 1 − O(τ ). By basic Gaussian concentration, we know that the probability that we throw away Zi from this process is at most O(τ /m). Hence with probability 1−O(τ ), we have that I = [N ]. Union bounding over these two events and simplifying yields that  s N 1 N 3 X d log log 1 τ τε  Zi ZiT − M4′ ≤ O  . N N i=1 2 103 It now suffices to show that kM4 − M4′ k2 ≤ O(ε). We have kM4 − M4′ k2 T  T = E[(X ⊗ X)(X ⊗ X) ] − E (X ⊗ X)(X ⊗ X) i h ≤ E k(X ⊗ X)(X ⊗ X)T k2 1{kXk2 ≥Ω(d log N )} 2 τε h i 4 = E kXk2 1{kXk2 ≥Ω(d log N )} 2 τε Z ∞ 2 2 ≤ t Pr[kXk2 ≥ t]dt Ω(d log τNε ) ≤ O(ε) , kXk22  N ≤ O d log τε  2 by basic Gaussian concentration. We have now shown that spectral concentration holds when we don’t allow any subselection of the points. To complete the proof of the theorem, we now need to use concentration of low-degree polynomials to show that this still holds when we allow ourselves to remove points. Proof of Theorem 4.17. We will first prove a couple of key claims. First, we shall show that there cannot be too many i so that p2 (Xi ) is large:  Claim B.3. Fix τ, ε > 0. Let N ≥ Ω log(1/τ )/ε2 . There is a universal constant (independent of ε, τ ) c′ so that for all c > c′ , we have that with probability 1 − O(τ ), 1 {i : p2 (Xi ) ≥ c log2 (1/ε)} ≤ 2ε . N Proof. Let Ui = 1{p2 (Xi )≥c log2 (1/ε)} . Then, E[Ui ] = PrX∼N (0,I) [p2 (X) ≥ c log2 (1/ε)] ≤ O(ε). The P result then follows from a Hoeffding bound on N1 N i=1 Ui . We now show that if we remove all points so that p2 (Xi ) is too large, then this cannot change the expectation by too much:  Claim B.4. Let c > 0 be sufficiently large. Fix τ, ε > 0, and let N ≥ Ω log(1/τ )/ε2 . Let Ai = p2 (Xi ) if p2 (Xi ) ≤ c log2 (1/ε), and 0 otherwise. Let α = EX∼N (0,I) [p2 (X)]. Then N 1 X Ai − α ≤ O(c · ε log2 1/ε) . N i=1 Proof. Let X ∼ N (0, I), and let A = p2 (X) if p2 (X) ≤ c log2 1/ε, and 0 otherwise. Let A be distributed as D. Then Ai ∼ D for all i. In particular, each Ai is a bounded random variable. Hence, by Hoeffding’s inequality, by our choice of N , we have N 1 X Ai − α′ ≤ O(ε) , N i=1 104 where α′ = EA∼D [p2 (A)]. It thus suffices to show that |α′ − α| < O(c · ε log2 1/ε). We have i h |α′ − α| = E p2 (X)1{p2 (X)≥c log2 1/ε} X∼N (0,I) Z ∞ = √ t2 Pr[p(X) ≥ t]dt c log 1/ε Z ∞ ≤ √ t2 exp(−Ω(t))dt c log 1/ε ≤ O(c · ε log2 1/ε) . Let us now prove the theorem. We first condition on the event that for all homogenous degree 2 polynomials p with kpk2 = 1, we have N 1 X 2 (43) p (Xi ) − 1 ≤ O(ε) . N i=1 We observe that every v = M ♭ ∈ S corresponds to a homogenous degree two polynomial p(X) = X T M X, and moreover, kpk2 = 2kM kF . Then Lemma 7 asserts that by our choice of N , (43) holds with probability 1 − O(τ ). Moreover, this implies that to show the theorem, it suffices to show that for all homogenous degree two polynomials p with kpk2 = 1, we have N X i=1 wi p2 (Xi ) − 1 ≤ O(ε log2 (1/ε)) , for all w ∈ Sm,ε . Moreover, let C be a (1/3)-net for the set of all homogenous degree 2 polynomials with kpk2 = 1. It is 2 well-known that we can take |C| = 2O(d ) . Let us also condition on the event that for all p ∈ C, we have 1 {i : p2 (Xi ) ≥ c log2 (1/ε)} ≤ 2ε, and N m 1 X Ai − 1 ≤ O(ε log2 1/ε) , N (44) (45) i=1 where Ai is defined as in Claim B.4 depends on p. By claims B.3 and B.4, by our choice of N , for any fixed p, these hold with probability 1 − O(τ ′ ), where τ ′ = O(τ /|C|), so that by a union bound this event occurs with probability 1 − O(τ ). Fix any p ∈ C. Let J ∗ be the set of 2εN indices with largest (p2 (Xi ) − 1), and let J1∗ = {i : p2 (Xi ) ≥ c log2 (1/ε)}. Observe that J1∗ ⊆ J ∗ , by (44). Moreover, by (45), we have 1 X 2 (p (Xi ) − 1) ≤ O(ε log2 (1/ε)) . N ∗ (46) i6∈J1 Fix any I ⊆ [m] so that |I| = (1 − 2ε)N . Partition [N ] \ I into two sets J + ∪ J − where J + = {i 6∈ I : 105 p2 (Xi ) ≥ 1}, and J − = {i 6∈ I : p2 (Xi ) < 1}. We then have 1 X 1 X 2 1 X 2 (p (Xi ) − 1) ≤ (p2 (Xi ) − 1) − (p (Xi ) − 1) |I| |I| |I| + − i∈I i∈I∪J ≤ i∈J N 1 X 2 1 X 2 (p (Xi ) − 1) p (Xi ) − 1 + 2 |I| |I| − i=1 i∈J |J − | ≤ O(ε) + |I| ≤ O(ε) . (47) where the penultimate line follows from (43) and since p2 (Xi ) ≥ 0 and hence |p2 (Xi ) − 1| ≤ 1 for all i ∈ J − . Moreover, we have that X 1 1 X 2 (p (Xi ) − 1) ≥ (p2 (Xi ) − 1) |I| (1 − 2ε)N ∗ i6∈J1 i∈I ≥ (1 − O(ε)) 2 1 X 2 (p (Xi ) − 1) N ∗ i6∈J1 ≥ −O(ε log 1/ε) , 2 1 P 2 by (46) and hence this along with (47) implies that |I| i∈I (p (Xi ) − 1) ≤ O(ε log 1/ε). Since this holds for all I with |I| = (1 − 2ε)N , by convexity this implies that for all w ∈ SN,ε , we have X i∈I wi (p2 (Xi ) − 1) ≤ O(ε log2 1/ε) . Finally, by the usual net argument, this implies that for all degree 2 p with kpk2 = 1, we have X i∈I wi (p2 (Xi ) − 1) ≤ O(ε log2 1/ε) , which by the logic above, suffices to prove the theorem. C Deferred Proofs from Section 5 Proof of Theorem 5.8: The first two properties follow directly from (25). We now show the third property. Suppose this does not happen, that is, there are j, j ′ so that ℓ = ℓ(j) = ℓ(j ′ ) so that kµj − µj ′ k22 ≥ Ω(dk log k/ε). That means that by (25) there is some sequence of clusters S1 , . . . , St so that Si ∩ Si+1 6= ∅ for each i, |Si | ≥ 4εN for each i, and moreover, there is a Xi ∈ S1 so that kXi − µ1 k22 ≤ O(d log k/ε) and an Xi′ ∈ St so that kXi′ − µ2 k22 ≤ O(d log k/ε). But by (25), we know that each Si contains an point Xi′′ so that kXi′′ − µri k22 ≤ O(d log k/ε). In particular, by the triangle inequality, this means that if kµri − µri+1 k22 ≤ O(d log k/ε) for all i = 1, . . . , t − 1, and we can set µr1 = µj and µrt = µj ′ . Construct an auxiliary graph on k vertices, where we put an edge between nodes ri and ri+1 . By the above, there must be a path from j to j ′ in this graph. Since this graph has k nodes, there must be a path of length at most k from j to j ′ ; moreover, by the above, we know that this implies that kµj − µj ′ k22 ≤ O(kd log k/ε). 106 Finally, the fourth property follows from the same argument as the proof of the third. P T Proof of Lemma 5.9: Let C = N i=1 wi (Xi − µ)(Xi − µ) − I. Let v be the top eigenvector of N X i=1 wi (Xi − µ)(Xi − µ)T − I − X j∈[k] αj (µj − µ)(µj − µ)T Observe that by (26), we have N X i=1 wi (Xi − µ)(Xi − µ)T  X i∈G wi (Xi − µ)(Xi − µ)T  wg (I + Q) − f (k, γ, δ1 )I  (1 − ε)(I + Q) − f (k, γ, δ1 )I , and so in particular N X i=1 wi (Xi − µ)(Xi − µ)T − (I + Q)  −ε(I + Q) − f (k, γ, δ1 )I . Therefore, for any unit vector u ∈ Rd , we must have ! N X c wi (Xi − µ)(Xi − µ)T − (I + Q) u ≥ −εuT (I + Q)uT − f (k, γ, δ1 ) ≥ − h(k, γ, δ) . uT 2 i=1 In particular, since v T P N  T − (I + Q) v ≥ ckh(k, γ, δ), we must have w (X − µ)(X − µ) i i i=1 i v T N X i=1 ! T wi (Xi − µ)(Xi − µ) − (I + Q) v > 0, and hence v T N X i=1 ! T wi (Xi − µ)(Xi − µ) − (I + Q) v ≥ ckh(k, γ, δ) . Let U = [v, u1 , . . . , ud−1 ] be an d × k matrix with orthonormal columns, where the columns span the set of vectors {(µj − µ) : j ∈ [k]} ∪ {v}. We note the rank of this set is at most k due to the definition of µ. Using the dual characterization of the Schatten top-k norm, we have that kCkTk = max Tr(X T CX) ≥ Tr(U T CU ). X∈Rd×k 107 Observe that since span(Q) ⊆ span(U ), we have T  kCkTk ≥ Tr U CU = Tr U N X T i=1 ! ! T wi (Xi − µ)(Xi − µ) − (I + Q) U  X = Tr U T (C − Q)U + γj + kQkTk j∈[k] k−1 X = v T (C − Q)v + i=1 uTi (C − Q)ui + X γj j∈[k] X c ≥ ckh(k, γ, δ) − (k − 1) h(k, γ, δ) + γj 2 j∈[k] X c ≥ kh(k, γ, δ) + γj , 2 j∈[k] as claimed. Proof of Lemma 5.10: By Fact 4.2 and (27) we have k inequality, we have X i∈E wi (Xi − µ) 2 X ≥ k∆k2 − i∈G P wi i=G wg Xi − µk ≤ k1/2 δ2 . Now, by the triangle wi (Xi − µ) − wg µ 2 ≥ Ω(k∆k2 ). Using the fact that variance is nonnegative we have ! !T X wi X wi , (Xi − µ) (Xi − µ) wb wb X wi (Xi − µ)(Xi − µ)T  wb i∈E i∈E i∈E and therefore X i∈E T wi (Xi − µ)(Xi − µ) 2 ≥Ω  k∆k22 wb  ≥Ω  k∆k22 ε  . On the other hand, X i∈G wi (Xi − µ)(Xi − µ)T − I 2 ≤ X i∈G wi (Xi − µ)(Xi − µ)T − wg I 2 + wb ≤ f (k, γ, δ1 ) + wb . where in the last inequality we have used Fact 4.2 and (26). Hence altogether this implies that N X i=1 T wi (Xi − µ)(Xi − µ) − I 2 ≥Ω  k∆k22 ε as claimed. 108  − wb − f (k, γ, δ1 ) ≥ Ω  k∆k22 ε  , C.1 Proof of Theorem 5.12 Once more, let ∆ = µ − µ̂ and expand the formula for M : N X i=1 wi Yi YiT − I = = = N X i=1 N X i=1 N X i=1 wi (Xi − µ + ∆)(Xi − µ + ∆)T − I T wi (Xi − µ)(Xi − µ) − I + N X i=1 T wi (Xi − µ)∆ + ∆ N X i=1 wi (Xi − µ)T + ∆∆T wi (Xi − µ)(Xi − µ)T − I − ∆∆T . We start by proving completeness. Claim C.1. Suppose that w = w∗ . Then kM kTk ≤ P i∈[k] γj + ckh(k,γ,δ1 ) . 2 Proof. w∗ are the weights that are uniform on the uncorrupted points. Because E ≤ 2εN p , we have that ∗ ∗ w ∈ SN,ε . Using (26), this implies that w ∈ Cf (k,γ,δ1 ) . By Corollary 5.11, k∆k2 ≤ O(ε log 1/ε). m X i=1 ≤ wi∗ (Xi − µ)(Xi − µ)T − I − ∆∆T N X i=1 wi∗ (Xi − µ)(Xi − µ)T − I − ≤ kf (k, γ, δ1 ) + < X γj + j∈[k] X X j∈[k] Tk αj (µj − µ)(µj − µ)T + Tk X j∈[k] αi (µj − µ)(µj − µ)T 2 γj + O(ε log 1/ε) j∈[k] ckh(k, γ, δ) . 2 Claim C.2. Suppose that w 6∈ Cckh(k,γ,δ). Then kM kTk > Proof. We split into two cases. In the first case, k∆k22 ≤ N X i=1 wi (Xi − µ)(Xi − µ)T − I Tk P i∈[k] γj ckh(k,γ,δ) . 10 ≥ X + ckh(k,γ,δ1 ) . 2 By Lemma 5.9, we have that γj + j∈[k] 3ckh(k, γ, δ) . 4 By the triangle inequality, kM kTk ≥ X j∈[k] γj + X 3ckh(k, γ, δ) ckh(k, γ, δ) − k∆k22 ≥ γj + , 4 2 i∈[k] as desired. 109 + k∆∆T k2 Tk In the other case, k∆k22 ≥ M as follows: M= N X i=1 = ckh(k,γ,δ) . 10 Recall that Q = P j∈[k] αj (µj − µ)(µj − µ)T from (22). Write wi (Xi − µ)(Xi − µ)T − I − ∆∆T X wi (Xi − µ)(Xi − µ)T − wg I − wg Q i∈G ! + wg Q + X i∈E wi (Xi − µ)(Xi − µ)T − wb I − ∆∆T Now taking the Schatten top-k norm of M , we have ! X X wi (Xi − µ)(Xi − µ)T − wg I − wg Q + wg Q + wi (Xi − µ)(Xi − µ)T − wb I − ∆∆T i∈G i∈E ≥ wg Q + ≥ wg Q +  ≥ ≥ ≥ X j∈[k] X X i∈E X i∈E j∈[k] wi (Xi − µ)(Xi − µ)T  γj − 4εkγ  + γj + Ω j∈[k] X wi (Xi − µ)(Xi − µ)T γj +  k∆k22 ε  X i∈E Tk Tk X − i∈G wi (Xi − µ)(Xi − µ)T − wg I − wg Q Tk Tk − kwb Ik2 − ∆∆T − kf (k, γ, δ1 ) − 4ε − k∆k22 wi (Xi − µ)(Xi − µ)T Tk − kf (k, γ, δ1 ) − 4ε − k∆k22 (48) ckh(k, γ, δ) . 2 The first inequality is the triangle inequality, the second is by (26) and Fact 4.2, the third is because the summed matrices are positive semidefinite, the fourth follows from Lemma 5.10, and the fifth holds for all c sufficiently large. By construction, we have that ℓ(w) ≥ 0. It remains to show that ℓ(w∗ ) < 0. 1 X (Xi − µ̂)(Xi − µ̂)T − I |G| i∈G Tk 1 X = (Xi − µ + ∆)(Xi − µ + ∆)T − I |G| i∈G ≤ + Tk X 1 X (Xi − µ)(Xi − µ)T − I − αj (µj − µ)(µj − µ)T |G| i∈G X j∈[k] j∈[k] αj (µj − µ)(µj − m)T ≤ kf (k, γ, δ1 ) + X j∈[k] + 2k∆k2 i∈G Tk γj + 2k 1/2 1 X (Xi − µ) |G| δ2 k∆k2 + 110 k∆k22 Tk Tk + k∆k22 2 Therefore, ℓ(w∗ ) ≤ kf (k, γ, δ) + If k∆k22 ≤ ckh(k,γ,δ) , 10 ∗ X j∈[k] γj + 2k1/2 δk∆k2 + k∆k22 − Λ. then ℓ(w ) ≤ X γj + kh(k, γ, δ) + 2kδ j∈[k] We wish to show that 2kδ p ch(k, γ, δ) ckh(k, γ, δ) √ − Λ. + 10 10 p ch(k, γ, δ) ckh(k, γ, δ) √ ≤ , 10 10 or equivalently, that p ch(k, γ, δ) √ . 2 10 √ p But this is true for c sufficiently large, as h(k, γ, δ) ≥ δ. Therefore, δ≤ ℓ(w∗ ) ≤ X γj + j∈[k] where the second inequality holds since Λ > P On the other hand, consider when k∆k22 ≥ Λ≥ (c + 5)kh(k, γ, δ) − Λ ≤ 0, 5 ckh(k,γ,δ) . j∈[k] γj + 2 ckh(k,γ,δ) . By (48), we 10 X γj + Ω j∈[k]  k∆k22 ε  know that . Then we know ∗ ℓ(w ) ≤ kf (k, γ, δ) + 2k 1/2 δk∆k2 + The first and third terms are immediately dominated by Ω k 1/2 δk∆k2 = O   k∆k22 k∆k22 ε k∆k22 ε −Ω  k∆k22 ε  .  , it remains to show that  . Or equivalently, k1/2 δε = O (k∆k2 ) . This follows since √ p k∆k2 ≥ O( h(k, γ, δ)) ≥ O( kδ2 ) = O(k1/2 δε) Therefore in this case as well, ℓ(w∗ ) < 0, as desired. D Deferred Proofs from Section 6 Proof of Lemma 6.22: By Lemma 6.6 applied with ε′ := ε3/2 /10d in place of ε, since we have Ω(d4 log(1/τ )/ε′2 ) samples from P, with probability at least 1 − τ, the set S is such that for all affine functions L, it holds | PrX∈u S (L(X) ≥ 0) − PrX∼P (L(X) ≥ 0)| ≤ ε′ /d. We henceforth condition on this event. 111 Let CT be the event that all coordinates in T take their most common value. For a single coordinate i, the probability that it does not take its most common value, min{pi , 1 − pi }, satisfies min{pi , 1 − pi } = pi (1 − pi )/ max{pi , 1 − pi } ≤ 2pi (1 − pi ). Thus, by a union bound, we have that PrP (CT ) ≥ 3/5. Let #T (x) be the number of coordinates of x in T which do not have their most common value, and observe that #T (x) is an affine function of x. Noting that for x ∈ {0, 1}d , we have that 1 − #T (x) > 0 if and only if CT holds for x, it follows that | PrS (CT ) − PrP [CT ]| ≤ ε′ /d. Hence, we have that PrS (CT ) ≥ 1/2. For any affine function L(x), let LT (x) = L(x) − #T (x) · max L(y). y∈{0,1}d Note that for x ∈ {0, 1}d , we have that LT (x) > 0 if and only if L(x) > 0 and CT holds for x. Therefore, we can write PrX∈u S (LT (X) > 0) PrX∼P (LT (X) > 0) − PrX∈u S (CT ) PrX∼P (CT ) |PrX∈u S (LT (X) > 0) PrX∼P (CT ) − PrX∼P (LT (X) > 0) PrX∈u S (CT )| = PrX∈u S (CT ) PrX∼P (CT )   ≤ (10/3) · Pr (LT (X) > 0) · Pr (CT ) − Pr (CT ) X∈u S X∼P X∈u S  − Pr (CT ) Pr (LT (X) > 0) − Pr (LT (X) > 0) Pr (L(X) > 0) − Pr (L(X) > 0) = X∈u S X∼P X∈u S X∼P ′ X∈u S 3/2 ≤ (10/3) · 2ε /d ≤ ε 2 /d . This completes the proof of Lemma 6.22. E Deferred Proofs from Section 7 Proof of Lemma 7.6: Let SP ⊆ S be the set of samples drawn from P and SQ ⊆ S be the set of samples drawn from Q. Firstly, we note that by a Chernoff bound, ||SP |/|S| − α| ≤ O(ε/d2 ) with probability 1 − τ /3. Assuming this holds, it follows that |SP | ≥ (α/2)|S| ≥ (ε1/6 /2)|S| = Ω(d4 log(1/τ )/ε2 ). Similarly, |SQ | ≥ (1 − α)|S|/2 ≥ Ω(d4 log(1/τ )/ε2 ). By Lemma 6.6 applied with ε′ := (c2 /4) · ε in place of ε, since we have Ω((d4 + d2 log(τ ))/ε′2 ) samples, with probability 1 − τ /3, the set SP is ε′ -good for P , i.e., it satisfies that for all affine functions L, | PrX∈u SP (L(X) > 0) − PrX∼P (L(X) > 0)| ≤ ε′ /d. We show that assuming S is ε′ -good, it is (ε, i) good for each 1 ≤ i ≤ d. Note that PrX∼P [Xi = 1] = pi ≥ c and PrX∼P [Xi = 0] = 1 − pi ≥ c. Since | PrX∼P [Xi = 1] − PrX∈u SP [Xi = 1]| ≤ c2 ε/(4d), it follows that PrX∈u S [Xi = 1] ≥ c/2. For any affine function L, define L(0) (x) := L(x) − xi (maxy |L(y)|) and L(1) (x) := L(x) − (1 − xi )(maxy |L(y)|). Then, we have 112 the following: Pr (L(X) > 0) − Pr (L(X) > 0 | Xi = 1) = X∼P 1 X∈u SP =  PrX∈u S 1 L1 (X) > 0 P PrX∈u S 1 (Xi > 0) P ≤ (2/c2 ) 2 Pr 1 X∈u SP ≤ (2/c ) pi  PrX∼P L1 (X) > 0 − pi  L1 (X) > 0 pi − Pr X∼P Pr 1 X∈u SP ≤ 2/c2 · 2ε′ /d ≤ ε/d .  L (X) > 0 − Pr  L1 (X) > 0 Pr (Xi > 0) 1 X∼P X∈u S1  L (X) > 0 1 ! − Pr X∼P !  L (X) > 0 1 Pr (Xi > 0) − pi 1 X∈u SP Similarly, we obtain that Pr (L(X) > 0) − Pr (L(X) > 0) ≤ ε/d . X∈u S1 X∼Π So, we have that SP is (ε, i) good for P for all 1 ≤ i ≤ d with probability 1 − τ /3 . Similarly, SQ is (ε, i) good for Q for all 1 ≤ i ≤ d with probability 1 − τ /3. Thus, we have that ||SP |/|S| − α| ≤ ε/d2 , SP is (ε, i) good for P and SQ is (ε, i) good for Q for all 1 ≤ i ≤ d with probability 1 − τ . That is, S is (ε, i)-good for Π for all 1 ≤ i ≤ d with probability at least 1 − τ . Proof of Lemma 7.19: Let SP ⊆ S be the set of samples drawn from P and SQ ⊆ S be the set of samples drawn from Q. Firstly, we note that by a Chernoff bound, ||SP |/|S| − α| ≤ O(ε/d2 ) with probability at least 1 − τ /3. Assuming this holds, |SP | ≥ (α/2)|S| ≥ δ|S| = Ω(d4 log(1/τ )/ε2 ). Similarly, |SQ | ≥ (1 − α)|S|/2 ≥ Ω(d4 log(1/τ )/ε2 ). By Lemma 6.6 applied with ε′ := ε/6, since we have Ω(d4 log(1/τ )/ε′2 ) samples, with probability at least 1 − τ /3, the set SP is ε-good for P . Similarly, with probability at least 1 − τ /3, the set SQ is ε-good for Q. Thus, with probability 1 − τ , we have that Q respectively. F |SP | |S| − α ≤ ε and that SP and SQ are ε-good for P and Deferred Proofs from Section 8 Proof of Lemma 8.3: By Fact 4.8, the first property holds with probability at least 1 − τ /3. After translating by µG , we note that (iii) and (iv) follow immediately from Lemmas 4.3 and 4.4 with probability 1 − τ /3. It remans to show that, conditioned on (i), (ii) holds with probability at least p 1 − τ /3. To simplify some expressions, let δ := ε/(d log(d/ετ )) and R = C d log(|S|/τ ). We need to show that, if f is the indicator function of any halfspace, with probability at least 1 − τ /4 it holds E [f (X)] − E [f (X)] ≤ δ. X∼G x∈u S In fact, we will show that with probability at least 1 − τ /8 we have E [f (X)] ≤ E [f (X)] + δ , x∈u S X∼G as the other direction will hold with a similar probability. In order to do this, we will demonstrate a finite collection C of indicators of halfspaces so that for any halfspace indicator f , there is a g ∈ C so that 113 !! • g ≥ f on B(µG , R), and • EX∼G [g(X)] ≤ EX∼G [f (X)] + δ/2. We note that given such a C, by an application of the Chernoff and union bounds, we have that so long as |S| ≫ log(|C|)/δ2 it holds E [g(X)] − E [g(X)] < δ/2 X∼G x∈u S for all g ∈ C. This would imply that for all f in question, if g ∈ C is as guaranteed above, we have E [f (X)] ≤ E [g(X)] x∈u S x∈u S ≤ E [g(X)] + δ/2 X∼G ≤ E [f (X)] + δ , X∼G where the first line above holds since S is supported on B(µG , R). It remains to construct C. We claim that it suffices to take C be the the set of indicators of halfspaces of the form v · (x − µG ) ≥ T , where v is taken from a δ/(CR)-cover of the unit sphere and T is a multiple of δ/C with |T | ≤ 2R. By standard results, v can be taken from a set of size O(δ/R)d and T from a set of size O(R/δ), thus |C| = O(δ/R)d+1 . Hence, condition (ii) will be satisfied with appropriately high probability so long as |S| ≫ d log(δ/R)/ε2 , which is sufficient for our purposes. What remains to show is that the C described above is sufficient. Consider f , the indicator of the halfspace w · (x − µG ) ≥ T for some unit vector w. If |T | ≥ R, f is constant on B(µG , R), and replacing T by sgn(T )R does not change f on B(µG , R) and changes the expectation of f by a negligible amount. Therefore, we can assume that |T | ≤ R. Let v be a unit vector with kv − wk2 ≤ (δ/(CR)) and T ′ ∈ [T − 2δ/C, T − δ/C] be a multiple of δ/C. We claim that the g ∈ C given by the halfspace v ·(x− µG ) ≥ T ′ suffices. To verify the first property, note that if w · (x − µG ) ≥ T , then v · (x − µG ) = w · (x − µG ) + (v − w) · (x − µG ) ≥ T − R(δ/(CR)) ≥ T ′ . For the second property, we note that the expectation of f is an error function of T , while the expectation of g is an error function of T ′ . Since the error function is Lipschitz, the difference is O(T −T ′ ) = O(δ/C) < δ/2 for C sufficiently large. This completes the proof. Proof of Lemma terms. Thus, we may write p(x) = P P 8.15: Note that an even polynomial has no degree-1 1 ′ 2+ ′) = (P p x p x x + p . Taking (P ) = p and (P o 2 i,i i,i 2 )j,i = 2 pi,j , for i > j, gives that 2 i,j i i,i i i>j i,j i j p(x) = xT P2′ x + p0 . Taking P2 = Σ1/2 P2′ Σ1/2 , we have p(x) = (Σ−1/2 x)T P2 (Σ−1/2 x) + p0 , for a d × d symmetric matrix P2 and p0 ∈ R. Let P2 = U T ΛU , where U is orthogonal and Λ is diagonal be an eigen-decomposition of the symmetric −1/2 x)T P (U Σ−1/2 x). Let X ∼ G and Y = U Σ−1/2 X. Then, Y ∼ N (0, I) matrix P2 . Then, 2 P p(x)2 = (U Σ and p(X) = i λi Yi +p0 for independent Gaussians Yi . Thus, p(X) follows a generalized χ2 -distribution. Thus, we have # " X X 2 λi = p0 + tr(P2 ) , E[p(X)] = E λi Y i + p 0 = p 0 + i i and Var[p(X)] = Var " X λi Yi2 # + p0 = i 114 X i λ2i = kPF k2 . P Lemma F.1 (cf. Lemma 1 from [LM00]). Let Z = i ai Yi2 , where Yi are independent random variables distributed as N (0, 1). Let a be the vector with coordinates ai . Then, √ Pr(Z ≥ 2kak2 x + 2kak∞ x) ≤ exp(−x) . We thus have:   sX X λi (Yi2 − 1) > 2 ( Pr  λ2i )t + 2(max λi )t ≤ e−t . i Noting that tr(P2 ) = P i λi , i P i λ2i = kP2 kF and maxi λi = kP2 k2 ≤ kP2 k, for µp = E[p(X)] we have: √ Pr(p(X) − µp > 2kP2 kF ( t + t)) ≤ e−t . i √ √ Noting that 2 a = 1 + a − (1 − a)2 ≤ 1 + a for a > 0, we have Pr(p(X) − µp > kP2 kF (3t + 1)) ≤ e−t . Applying this for −p(x) instead of p(x) and putting these together, we get Pr(|p(X) − µp | > kP2 kF (3t + 1)) ≤ 2e−t . Substituting t = T /3kP2 kF − 1/3, and 2kP2 k2F = VarX∼G (p(X)) gives: Pr(|p(X) − E [p(X)]| ≥ T ) ≤ 2e1/3−2T /3 VarX∼G [p(X)] . X∼G The final property is a consequence of the following anti-concentration inequality: Theorem F.2 ([CW01]). Let p : Rd → R be a degree-d polynomial. Then, for X ∼ N (0, I), we have p Pr(|p(X)| ≤ ε E[p(X)2 ] ≤ O(dε1/d ) . This completes the proof. Proof of Lemma 8.16: Note that we can reduce this to the case where Σ = I. We can consider the multiset T of y with y = Σ−1/2 x for the corresponding x ∈ S. Then, T is a set of independent samples from N (0, I) and note that if it is (ε, τ )good for N (0, I), then S is (ε, τ )-good for G. Thus, we assume that Σ = I. By Fact 4.8, the first property holds with probability at least 1 − τ /4. Let MS be the empirical second moment matrix of S, i.e., the d×d matrix with (MS )i,j = EX∈u S [Xi Xj ]. Then, by Lemma 4.3, with probability at least 1 − τ /4, kMS − Ik2 ≤ ε/4d3/2 . Let TS be d2 × d2 matrix that is given by the canonical flattening of the empirical fourth moment tensor of S. Then, by B.2, we have that with probability at least 1 − τ /4, kTS − M4 k2 ≤ ε/2, where M4 is the flattened fourth moment tensor of G = N 0, I. We claim that these bounds on MS and TS imply the the conditions about the expectation of even degree2 polynomials. Using Lemma 8.15, we can write p(x) = xT P2 x + p0 for a symmetric matrix P2 ∈ Rd×d 2 and p0 ∈ R. Recall that we write P2♭ ∈ Rd for the flattened out version of P2 . Then, in terms of these, we can write E [p(X)] = p0 + tr(P2T MS ) . X∈u S 115 Lemma 8.15, gives that EX∼G [p(X)] = p0 + tr(P2 ). Thus, we have | E [p(X)] − E [p(X)]| = |tr(P2T (MS − I))| ≤ kP2 kF kMS − IkF X∈u S X∼G q ≤ Var [p(X)]/2 · dkMS − Ik2 (using Lemma 8.15) X∼G q E [p(X)2 ] . ≤ε X∼G Again, in terms of P2 and p0 , we can write: E [p(X)2 ] = p20 + 2p0 tr(P2T MS ) + P2♭T TS P2♭ , X∈u S and E [p(X)2 ] = p20 + 2p0 tr(P2 ) + P2♭T M4 P2♭ . X∼G We can take norms of the difference between these equations, giving | E [p(X)2 ] − E [p(X)2 ]| ≤ 2p0 kP2 kF kMS − IkF + kP2 k2F kTS − M4 k2 . X∈u S X∼G We need to express the RHS in terms of EX∼G [p(X)2 ] = VarX∼G [p(X)]+EX∼G [p(X)]2p . Using Lemma 8.15, 2 = Var 2 ]/2 and |p | = | E kP k [p(X)]/2 ≤ E [p(X) [p(X)] + tr(P )| ≤ EX∼G [p(X)2 ] + X∼G X∼G 0 X∼G 2 p √2 F √ 2 dkP2 kF ≤ d EX∼G [p(X) ]. Thus, we have | E [p(X)2 ] − E [p(X)2 ]| ≤ 2p0 kP2 kF kMS − IkF + kP2 k2F kTS − M4 k2 X∈u S X∼G √ ≤ (2 dkMS − IkF + kTS − M4 k2 ) E [p(X)2 ] X∼G 3/2 ≤ (2d kMS − Ik2 + kTS − M4 k2 ) E [p(X)2 ] X∼G 2 ≤ ε E [p(X) ] . X∼G For the last property, we need a finite set of degree-2 polynomials so that we can take a union bound. Claim F.3. For any γ > 0, there exists a set C of degree-2 polynomials on Rd of size (γ/d log(N/τ )(d2 + 2 1))d +2 , such that for every degree-2 polynomial p(x) on Rd such no coefficient of p(x) has absolute value bigger than 1, except possibly for the constant term which has absolute value at most O(d log(N/τ )), there is a q(x) ∈ C such that for all x with kxk22 = O(d log(N/τ )), |p(x) − q(x)| ≤ γ. Proof. Note that any degree 2 polynomial on Rd has at most d2 + 1 coefficients. We take C to be the set of polynomials with coefficients that are multiples of γ/ log(N/τ )d(d2 + 1) with absolute value no bigger than 1, and constant term a multiple of γ/ log(N/τ )d(d2 +1) with absolute value no 2 bigger than O(d log(N/τ )). Then, |C| ≤ (γ/d log(N/τ )(d2 + 1))d +2 . Now, given p(x), we take q(x) ∈ C to be the polynomial whose coefficients are the corresponding coefficients of p(x) rounded towards zero to a multiple of γ/ log(N/τ )d(d2 + 1). When xT Σ−1 x = O(d log(N/τ )), the absolute value of any monomial of degree at most 2 is bounded from above by kxk2∞ ≤ O(d log(N/τ )). Thus, the absolute value of the error between corresponding terms of p(x) and q(x) is at most γ/(d2 + 1) and so |p(x) − q(x)| ≤ γ. Let δ = ε/C(d log(N/τ ))2 for some sufficiently high constant C. We apply the above with γ = δ2 . Let 2 be the set containing q(x), q(x)−δ2 and q(x)+δ2 for all q(x) ∈ C. Then |C ′ | ≤ poly((d log(N/τ ))/ε)d . By Chernoff and union bound for N ≥ Ω((d log(d/ετ ))6 /ε2 ), then with probability at least 1 − τ /4, for all q ∈ C ′ that C′ Pr (q(X) ≥ 0) − Pr (q(X) ≥ 0) < ε/2(d log(N/τ ))2 . X∈u S X∼G 116 We now ahow that if for all x ∈ S we have that xT Σ−1 x = O(d log(N/τ )), this implies the last property. Note that if p(x) satifies the three claims then so does αp(x) for any α > 0. Thus, we may assume without loss of generality that VarX∼G p(x) = 1. Note that if p0 = 0 and x ∈ S, then |p(x)| ≤ xT P2 x ≤ kxk22 kP2 k2 ≤ O(d log(N/τ )) · kP2 kF = O(d log(N/τ )), since by Lemma 8.15, 2kP2 kF = VarX∼G p(x) = 1. Thus, if |p0 | ≥ Ω(d log(N/τ )) then PrX∈u S (p(X) ≥ 0) is 0 or 1. In this case, the claim for the minimum value |p0 | can take and have this probabiltiy 0 or 1 respectively is stronger. We can therefore assume that |p0 | = O(d log(N/τ )). Since kP2 kF = 1/2, the absolute value of each other coefficient is less than 1. Thus, there is a q(x) ∈ C with |p(x)−q(x)| ≤ δ2 for all x ∈ S. Note that this q(x) has VarX∼G [q(x)] = 2 2 Θ(1) p and thus, by anti-concentration bounds, PrX∼G (|q(X)| ≤ δ ) ≤ O(δ). Also, PrX∈G [kXk2 ≥ Ω( d log(N/τ )] ≤ τ /N ≤ δ. Hence, we have: Pr (p(x) ≥ 0) ≥ Pr (q(x) − δ2 ≥ 0) X∈u S X∈u S ≥ Pr (q(X) − δ2 ≥ 0) − Cδ/2 (since q(x) − δ2 ∈ C ′ ) X∼G ≥ Pr (q(X) + δ2 ≥ 0) − (C/2 + O(1))δ X∼G p ≥ Pr (p(x) ≥ 0) − (C/2 + O(1))δ − Pr [kXk2 ≥ Ω( d log(N/τ )] X∼G X∈G ≥ Pr (p(x) ≥ 0) − Cδ . X∼G Similarly PrX∈u S (p(x) ≥ 0) ≤ PrX∼G (p(x) ≥ 0) + Cδ. Thus, we have Pr (p(X) ≥ 0) ≤ Pr (p(X) ≥ 0) + ε/(d log(N/τ ))2 , X∈u S X∼G which is stronger than the required bound. By a union bound, all four of the assumptions we made that hold with probability at least 1 − τ /4, hold with probability at least 1 − τ . 117
10math.ST
Under consideration for publication in Theory and Practice of Logic Programming 1 arXiv:cs/0110034v2 [cs.PL] 10 Jul 2003 Inference of termination conditions for numerical loops in Prolog ALEXANDER SEREBRENIK and DANNY DE SCHREYE Department of Computer Science, K.U. Leuven Celestijnenlaan 200A, B-3001, Heverlee, Belgium (e-mail: {Alexander.Serebrenik,Danny.DeSchreye}@cs.kuleuven.ac.be) Abstract We present a new approach to termination analysis of numerical computations in logic programs. Traditional approaches fail to analyse them due to non well-foundedness of the integers. We present a technique that allows overcoming these difficulties. Our approach is based on transforming a program in a way that allows integrating and extending techniques originally developed for analysis of numerical computations in the framework of query-mapping pairs with the well-known framework of acceptability. Such an integration not only contributes to the understanding of termination behaviour of numerical computations, but also allows us to perform a correct analysis of such computations automatically, by extending previous work on a constraint-based approach to termination. Finally, we discuss possible extensions of the technique, including incorporating general term orderings. Keywords: termination analysis, numerical computation. 1 Introduction One of the important aspects in verifying the correctness of logic programs (as well as functional programs and term rewrite systems) is verification of termination. Due to the declarative formulation of programs, the danger of non-termination may be increased. As a result, termination analysis received considerable attention in logic programming (see e.g. (Apt et al. 1994; Bossi et al. 2002; Bruynooghe et al. 2002; Codish and Taboch 1999; Colussi et al. 1995; Decorte et al. 1999; Dershowitz et al. 2001; Genaim et al. 2002; Lindenstrauss and Sagiv 1997; Mesnard 1996; Mesnard and Ruggieri 2003; Plümer 1991; Ruggieri 1997; Verbaeten et al. 2001)). Numerical computations form an essential part of almost any real-world program. Clearly, in order for a termination analyser to be of practical use it should contain a mechanism for inferring termination of such computations. However, this topic attracted less attention of the research community. In this paper we concentrate on automatic termination inference for logic programs depending on numerical computations. Dershowitz et al. (Dershowitz et al. 2001) showed that termination of general numerical computations, for instance on floating point numbers, may be counter-intuitive, i.e., the observed behaviour does not necessarily coincide with the theoretically expected one. Moreover, as the following program shows, similar results can be obtained even if the built-in predicates of the underlying language are restricted to include “greater than” and multiplication only. Example 1 2 Alexander Serebrenik and Danny De Schreye Consider the following program, that given a positive number x results in a sequence of calls p(0.25x ), p((0.25)2 x ), . . . p(X ) ← X > 0, X 1 is X ∗ 0.25, p(X 1). If we reason purely in terms of real numbers, we might expect that the computation started by p(1.0) will be infinite. However, in practice the goal above terminates with respect to this program, since there exists k , such that (0.25)k is small enough for the comparison (0.25)k > 0 to fail. ✷ We discuss these issues in detail in (Serebrenik and De Schreye 2002). In the current paper we avoid these complications by restricting to integer computations only. Next, we illustrate the termination problem for integer computations with the following example: Example 2 Consider the following program: p(X ) ← X < 7, X 1 is X + 1, p(X 1). This program terminates for queries p(X ), for all integer values of X . ✷ Most of the existing automated approaches to termination analysis for logic programs (Codish and Taboch 1999; Lindenstrauss and Sagiv 1997; Mesnard and Neumerkel 2001; Ohlebusch 2001) fail to prove termination for such examples. The reason is that they are most often based on the notion of a level mapping, that is, a function from the set of all possible atoms to the natural numbers, which should decrease while traversing the rules. Usually level mappings are defined to depend on the structure of terms and to ignore constants, making the analysis of Example 2 impossible. Of course, this can be easily repaired, by considering level mappings that map each natural number to itself. In fact, the kernels of two termination analysers for logic programs, namely cTI (Mesnard 1996; Mesnard and Neumerkel 2001) and TerminWeb (Codish and Taboch 1999), rely on abstracting logic programs to CLP(N ) programs, and use the identity level mapping on N in the analysis of the abstract versions of the programs1. Note however that this is insufficient for the analysis of Example 2. In fact, there remain two problems. First, the program in Example 2 is defined on a (potentially negative) integer argument. This means that we need a level mapping which is different from the identity function. Two approaches for solving this problem are possible. First, one can change the definition of the level mapping to map atoms to integers. However, integers are not well-founded. To prove termination one should prove that the mapping is to some well-founded subset of integers. In the example above (−∞, 7) forms such a subset with an ordering ≻, such that x ≻ y if x < y, with respect to the usual ordering on integers. Continuing this line of thought one might consider mapping atoms to more general well-founded domains. In fact, already in the early days of program analysis (Floyd 1967; Katz and Manna 1975) general well-founded domains were discussed. However, the growing importance of automatic termination analysers and requirements of robustness and efficiency stimulated researchers 1 We thank anonymous referees for pointing this link to related work out to us. Inference of termination conditions 3 to look for more specific instances of well-founded domains, such as natural numbers in logic programming and terms in term-rewriting systems. The second approach, that we present in the paper, does not require changing the definition of level mapping. Indeed, the level mapping as required exists. It maps p(X ) to 7 − X if X < 7 and to 0 otherwise. This level mapping decreases while traversing the rule, i.e., the size of p(X ), 7 − X for X < 7, is greater than the size of p(X 1), 6 − X for X < 7 and 0 for X ≥ 7, thus, proving termination. A second problem with approaches based on the identity function, as the level mapping used on CLP(N ), is that, even if the program in Example 2 would have been defined on natural values of X only, they would still not be able to prove termination. The reason is that the natural argument increases under the standard ordering of the natural numbers. Such bounded increases (be it of structure-sizes or of numerical values) are not dealt with by standard termination analysers. Note that the two approaches presented above also solve this second problem. The main contribution of this paper is that we provide a transformation - similar to multiple specialisation (Winsborough 1992) - that allows us to define level mappings of the form illustrated in the second approach above in an automatic way. To do so, we incorporate techniques of (Dershowitz et al. 2001), such as level mapping inference, in the framework of the acceptability with respect to a set (De Schreye et al. 1992; Decorte and De Schreye 1998). This integration provides not only a better understanding of termination behaviour of integer computations, but also the possibility to perform the analysis automatically as in Decorte et al. (Decorte et al. 1999). Moreover, we will also be somewhat more general than (Decorte et al. 1999), by studying the problem of termination inference, rather than termination verification. More precisely, we will be inferring conditions that, if imposed on the queries, will ensure that the queries will terminate. Inference of termination conditions was studied in (Mesnard 1996; Mesnard and Neumerkel 2001; Genaim and Codish 2001). Unlike termination conditions inferred by these approaches, stated in terms of groundedness of arguments, our technique produces conditions based on domains of the arguments, as shown in Example 3. Example 3 Extend the program of Example 2 with the following clause: p(X ) ← X > 7, X 1 is X + 1, p(X 1). This extended program terminates for X ≤ 7 and this is the condition we will infer. ✷ The rest of the paper is organised as follows. After making some preliminary remarks, we present in Section 3 our transformation—first by means of an example, then more formally. In Section 4 we discuss more practical issues and present the algorithm implementing the termination inference. Section 5 contains the results of an experimental evaluation of the method. In Section 6 we discuss further extensions, such as proving termination of programs depending on numerical computations as well as symbolic ones. We summarise our contribution in Section 7, review related work and conclude. 4 Alexander Serebrenik and Danny De Schreye 2 Preliminaries We follow the standard notation for terms and atoms. A query is a finite sequence of atoms. Given an atom A, rel(A) denotes the predicate occurring in A. AtomP (TermP ) denotes the set of all atoms (terms) that can be constructed from the language underlying P . The extended Herbrand Base BPE (the extended Herbrand Universe UPE ) is the quotient set of AtomP (TermP ) modulo the variant relation. An SLD-tree constructed using the left-toright selection rule of Prolog is called an LD-tree. A goal G LD-terminates for a program P , if the LD-tree for (P , G) is finite. The following definition is similar to Definition 6.30 (Apt 1997). Definition 1 Let P be a program and p, q be predicates occurring in it. We say that • p refers to q in P if there is a clause in P that uses p in its head and q in its body. • p depends on q in P and write p ⊒ q, if (p, q) is in the transitive closure of the relation refers to. • p and q are mutually recursive and write p ≃ q, if p ⊒ q and q ⊒ p. The only difference between our definition and the one by Apt (Apt 1997) is that we require the relation ⊒ to be the transitive closure of the relation refers to, while (Apt 1997) requires it to be transitive, reflexive closure. Using our definition we call a predicate p recursive if p ≃ p holds. We recall some basic notions, related to termination analysis. A level mapping is a function | · |: BPE → N , where N is the set of the naturals. Similarly, a norm is a function k · k : UPE → N . We study termination of programs with respect to sets of queries. The following notion is one of the most basic notions in this framework. Definition 2 Let P be a definite program and S be a set of atomic queries. The call set, Call(P , S ), is the set of all atoms A from the extended Herbrand Base BPE , such that a variant of A is a selected atom in some derivation for P ∪ {← Q }, for some Q ∈ S and under the left-to-right selection rule. The following definition (Serebrenik and De Schreye 2001) generalises the notion of acceptability with respect to a set (De Schreye et al. 1992; Decorte and De Schreye 1998) by extending it to mutual recursion. Definition 3 Let S be a set of atomic queries and P a definite program. P is acceptable with respect to S if there exists a level mapping | · | such that • for any A ∈ Call(P , S ) • for any clause A′ ← B1 , . . . , Bn in P , such that mgu(A, A′ ) = θ exists, • for any atom Bi , such that rel(Bi ) ≃ rel(A) and for any computed answer substitution σ for ← (B1 , . . . , Bi −1 )θ holds that | A | > | Bi θσ | · De Schreye et al. (De Schreye et al. 1992) characterise LD-termination in terms of acceptability. Inference of termination conditions 5 Theorem 1 (cf. (De Schreye et al. 1992)) Let P be a definite program. P is acceptable with respect to a set of atomic queries S if and only if P is LD-terminating for all queries in S . We also need to introduce notions of rigidity and of interargument relations. Given a norm k · k and a term t , Bossi et al. (Bossi et al. 1991) call t rigid with respect to k · k if for any substitution σ, kt σk = kt k. Observe that ground terms are rigid with respect to all norms. The notion of rigidity is obviously extensible to atoms and level mappings. Interargument relations have initially been studied by (Ullman and Van Gelder 1988; Plümer 1991; Verschaetse and De Schreye 1991). In this paper we use the definition of (Decorte et al. 1999). Definition 4 Let P be a definite program, p/n a predicate in P . An interargument relation for p/n is a relation Rp ⊆ N n . Rp is a valid interargument relation for p/n with respect to a norm k · k if and only if for every p(t1 , . . . , tn ) ∈ AtomP if P |= p(t1 , . . . , tn ) then (kt1 k, . . . , ktn k) ∈ Rp . Combining the notions of rigidity, acceptability and interargument relations allows us to reason on termination completely at the clause level. Theorem 2 (rigid acceptability (cf. (Decorte et al. 1999))) Let S be a set of atomic queries and P a definite program. Let k · k be a norm and, for each predicate p in P , let Rp be a valid interargument relation for p with respect to k · k. If there exists a level mapping | · | which is rigid on Call(P , S ) such that • for any clause H ← B1 , . . . , Bn ∈ P , and • for any atom Bi in its body such that rel(Bi ) ≃ rel(H ), • for substitution θ such that the arguments of the atoms in (B1 , . . . , Bi −1 )θ all satisfy their associated interargument relations RB1 , . . . , RBi−1 : | H θ |>| Bi θ | then P is acceptable with respect to S . 3 Methodology In this section we introduce our methodology using a simple example. In the subsequent sections, we formalise it and discuss different extensions. Computing a query with respect to the following example results in a sequence of calls with oscillating arguments like p(−2), p(4), p(−16), . . . and stops if the argument is greater than 1000 or smaller than −1000. The treatment is done first on the intuitive level. Example 4 We are interested in proving termination of the set of queries {p(z ) | z is an integer} with respect to the following program: p(X ) ← X > 1, X < 1000, X 1 is − X ∗ X , p(X 1). p(X ) ← X < −1, X > −1000, X 1 is X ∗ X , p(X 1). 6 Alexander Serebrenik and Danny De Schreye The direct attempt to define the level mapping of p(X ) as X fails, since X can be positive as well as negative. Thus, a more complex level mapping should be defined. We start with some observations. The first clause is applicable if 1 < X < 1000, the second one, if −1000 < X < −1. Thus, termination of p(X ) for X ≤ −1000, −1 ≤ X ≤ 1 or X ≥ 1000 is trivial. Moreover, if the first clause is applied and 1 < X < 1000 holds, then either −1000 < X 1 < −1 or X 1 ≤ −1000 ∨ −1 ≤ X 1 ≤ 1 ∨ X 1 ≥ 1000 should hold. Similarly, if the second clause is applied and −1000 < X < 1 holds, either 1 < X 1 < 1000 or X 1 ≤ −1000 ∨ −1 ≤ X 1 ≤ 1 ∨ X 1 ≥ 1000 should hold. We use this observation and split the domain of the argument of p, denoted p1 , in three parts as following: a b c 1 < p1 < 1000 −1000 < p1 < −1 p1 ≤ −1000 ∨ −1 ≤ p1 ≤ 1 ∨ p1 ≥ 1000 Next we replace the predicate p with three new predicates p a , p b and p c . We add conditions before the calls to p to ensure that p a is called if p(X ) is called and 1 < X < 1000 holds, p b is called if p(X ) is called and −1000 < X < −1 holds and p c is called if p(X ) is called and X ≤ −1000 ∨ −1 ≤ X ≤ 1 ∨ X ≥ 1000 holds. The following program is obtained: p a (X ) ← X > 1, X < 1000, X 1 is − X ∗ X , −1000 < X 1, X 1 < −1, p b (X 1). a p (X ) ← X > 1, X < 1000, X 1 is − X ∗ X , (X 1 ≤ −1000; (−1 ≤ X 1, X 1 ≤ 1); X 1 ≥ 1000), p c (X 1). b p (X ) ← X < −1, X > −1000, X 1 is X ∗ X , 1 < X 1, X 1 < 1000, p a (X 1). p b (X ) ← X < −1, X > −1000, X 1 is X ∗ X , (X 1 ≤ −1000; (−1 ≤ X 1, X 1 ≤ 1); X 1 ≥ 1000), p c (X 1). Observe that the transformation we performed is a form of multiple specialisation, wellknown in the context of abstract interpretation (Winsborough 1992). Now we define three different level mappings, one for atoms of p a , another one for atoms of p b and the last one for atoms of p c . Let  1000 − n if 1 < n < 1000 | p a (n) | = 0 otherwise  1000 + n if −1000 < n < −1 | p b (n) | = 0 otherwise | p c (n) | = 0 We verify acceptability of the transformed program with respect to {p a (n) | 1 < n < 1000} ∪ {p b (n) | −1000 < n < −1} via the specified level mappings. This implies termination of the transformed program with respect to these queries, and thus, termination of the original program with respect to {p(z ) | z is an integer}. For the sake of brevity we discuss only queries of the form p a (n) for 1 < n < 1000. Heads of the first and the second clauses can be unified with this query, however, the Inference of termination conditions 7 second clause does not contain calls to predicates mutually recursive with p a and the only such atom in the first clause is p b (m), where m = −n 2 . Then, | p a (n) | > | p b (m) | should hold, i.e., 1000 − n > 1000 + m, that is 1000 − n > 1000 − n 2 (n > 1 and m = −n 2 ), which is true for n > 1. For queries of the form p b (n), the acceptability condition is reduced to 1000 + n > 1000 − n 2 which is true for n < −1. ✷ The intuitive presentation above hints at the main issues to be discussed in the following sections: how the cases such as those above can be extracted from the program, and how given the extracted cases, the program should be transformed. Before discussing the answers to these questions we present some basic notions. 3.1 Basic notions In this section we formally introduce some notions that further analysis will be based on. Recall that the aim of our analysis is to find, given a predicate and a query, a sufficient condition for termination of this query with respect to this program. Thus, we need to define a notion of a termination condition. We start with a number of auxiliary definitions. Given a predicate p, pi denotes the i-th argument of p and is called argument position denominator. Definition 5 Let P be a program, S be a set of queries. An argument position i of a predicate p is called integer argument position, if for every p(t1 , . . . , tn ) ∈ Call(P , S ), ti is an integer. Argument position denominators corresponding to integer argument positions will be called integer argument position denominators. An integer inequality is an atom of one of the following forms Exp1 > Exp2, Exp1 < Exp2,Exp1 ≥ Exp2 or Exp1 ≤ Exp2, where Exp1 and Exp2 are constructed from integers, variables and the four operations of arithmetics on integers. A symbolic inequality over the arguments of a predicate p is constructed similarly to an integer inequality. However, instead of variables, integer argument positions denominators are used. Example 5 X > 0 and Y ≤ X + 5 are integer inequalities. Given a predicate p of arity 3, having only integer argument positions, p1 > 0 and p2 ≤ p1 + p3 are symbolic inequalities over the arguments of p. ✷ Disjunctions of conjunctions based on integer inequalities are called integer conditions. Similarly, disjunctions of conjunctions based on symbolic inequalities over the arguments of the same predicate are called symbolic conditions over the integer arguments of this predicate. Definition 6 Let p(t1 , . . . , tn ) be an atom and let cp be a symbolic condition over the arguments of p. An instance of the condition with respect to an atom, denoted cp (p(t1 , . . . , tn )), is obtained by replacing the argument positions denominators with the corresponding arguments, i.e., pi with ti . 8 Alexander Serebrenik and Danny De Schreye Example 6 Let p(X , Y , 5) be an atom and let cp be a symbolic condition (p1 > 0) ∧ (p2 ≤ p1 + p3 ). Then, cp (p(X , Y , 5)) is (X > 0) ∧ (Y ≤ X + 5). ✷ Now we are ready to define termination condition formally. Definition 7 Let P be a program, and Q be an atomic query. A symbolic condition crel(Q ) is a termination condition for Q if given that crel(Q ) (Q ) holds, Q left-terminates with respect to P. For any integer z a termination condition for p(z ) with respect to Examples 2 and 4 is true, i.e., for any integer z , p(z ) terminates with respect to these programs. Clearly, more than one termination condition is possible for a given query with respect to a given program. For example, termination conditions for p(5) with respect to Example 3, are among others, true, p1 ≤ 7 and p1 > 0. Analogously, false, p1 ≤ 7, p1 < 10 are termination conditions for p(11) with respect to Example 3. It should also be noted that a disjunction of two termination conditions is always a termination condition. Similarly to Theorems 1 and 2 we would like to consider termination with respect to sets of atomic queries. Therefore we extend the notion of termination condition to a set of queries. This, however, is meaningful only if all the queries of the set have the same predicate. We call such a set single predicate set of atomic queries. For a single predicate set of atomic queries S , rel(S ) denotes the predicate of the queries of the set. Definition 8 Let P be a program, and S be a single predicate set of atomic queries. A symbolic condition crel(S ) is a termination condition for S if crel(S ) is a termination condition for all Q ∈ S . From the discussion above it follows that a termination condition for S = {p(z ) | z is an integer} with respect to Examples 2 and 4 is true. This is not the case for Example 3, since termination is observed only for some queries of S , namely p(z ), such that z ≤ 7. Thus, p1 ≤ 7 is a termination condition for S with respect to Example 3. We discuss now inferring what values integer arguments can take during traversal of the rules, i.e., the “case analysis” performed in Example 4. It provides already the underlying intuition—calls of the predicate p c are identical to the calls of the predicate p, where c holds for its arguments. More formally, we define a notion of a set of adornments. Later we specify when it is guard-tuned and we show how such a guard-tuned set of adornments can be constructed. Definition 9 Let p be a predicate. The set Ap = {c1 , . . . , cn } of symbolic conditions over the integer W arguments of p is called set of adornments for p if ni=1 ci = true and for all i, j such that 1 ≤ i < j ≤ n, ci ∧ cj = false. A set of adornments partitions the domain for (some of) the integer variables of the predicate. Similarly to Example 4, in the examples to come, elements of a set of adornments are denoted a, b, c, . . . Inference of termination conditions 9 Example 7 Example 4, continued. The following are examples of sets of adornments: {a, b, c} where a is 1 < p1 < 1000, b is − 1000 < p1 < −1 and c is p1 ≤ −1000 ∨ −1 ≤ p1 ≤ 1 ∨ p1 ≥ 1000. and {d, e} where d is p1 ≤ 100 and e is p1 > 100. ✷ In the next section we are going to present a transformation, related to the multiple specialisation technique. To define it formally we introduce the following definition: Definition 10 Let H ← B1 , . . . , Bn be a rule. B1 , . . . , Bi , is called an integer prefix of the rule, if for all j , 1 ≤ j ≤ i ≤ n, Bj is an integer inequality and the only variables in its arguments are variables of H . B1 , . . . , Bi is called the maximal integer prefix of the rule, if it is an integer prefix and B1 , . . . , Bi , Bi +1 is not an integer prefix. Since an integer prefix constrains only variables appearing in the head of a clause, there exists a symbolic condition over the arguments of the predicate of the head, such that the integer prefix is its instance with respect to the head. In general, this symbolic condition is not necessarily unique. Example 8 Consider the following program: p(X , Y , Y ) ← Y > 5· The only integer prefix of this rule is Y > 5. There are two symbolic conditions over the arguments of p, p2 > 5 and p3 > 5, such that Y > 5 is their instance with respect to p(X , Y , Y ). ✷ In order to guarantee the uniqueness of such symbolic conditions we require integer argument positions in the heads of the rules to be occupied by distinct variables. For the sake of simplicity we assume all argument positions in the heads of the rules to be occupied by distinct variables. Apt et al. (Apt et al. 1994) call such a rule homogeneous. Analogously, a logic program is called homogeneous if all its clauses are homogeneous. Programs can be easily rewritten to a homogeneous form (see (Apt et al. 1994)). In the following we assume that all programs are homogeneous. 3.2 Program transformation The next question that should be answered is how the program should be transformed given a set of adornments. After this transformation p c (X1 , . . . , Xn ) will behave with respect to the transformed program exactly as p(X1 , . . . , Xn ) does, for all calls that satisfy the condition c. Intuitively, we replace each call to the predicate p in the original program by a number of possible calls in the transformed one. S Given a program P and a set of possible adornments A = p ∈P Ap , the transformation is performed in a number of steps. Below we use Example 2 as a running example to illustrate the different steps. Recall that it consists of only one clause p(X ) ← X < 7, X 1 is X + 1, p(X 1). 10 Alexander Serebrenik and Danny De Schreye As set of adornments we use Ap = {a, b}, where a is p1 < 7 and b is p1 ≥ 7. 1. For each clause r in P and for each call p(t1 , . . . , tn ) to a recursive predicate p W occurring in r add c ∈Ap c(p(t1 , . . . , tn )) before p(t1 , . . . , tn ). By Definition 9 the disjunction is true, thus, the transformed program is equivalent to the original one. In the example, the clause is transformed to p(X ) ← X < 7, X 1 is X + 1, (X 1 < 7 ; X 1 ≥ 7), p(X 1). 2. For each clause, such that the head of the clause, say p(t1 , . . . , tn ), has a recursive W predicate p, add c ∈Ap c(p(t1 , . . . , tn )) as the first subgoal in its body. As for the previous step, the introduced call is equivalent to true, so that the transformation is obviously correct. In the example, we obtain: p(X ) ← (X < 7 ; X ≥ 7), X < 7, X 1 is X + 1, (X 1 < 7 ; X 1 ≥ 7), p(X 1). 3. Next, moving to an alternative procedural interpretation of disjunction, for each clause in which we introduced a disjunction in one of the previous two steps, and for W each such introduced disjunction c ∈Ap c(p(t1 , . . . , tn )) we split these disjunctions, introducing a separate clause for each disjunct. Thus, we apply the transformation H ← B1 , . . . , (A1 ; . . . ; Ak ), . . . , Bn . H ← B1 , . . . , A1 , . . . , Bn . H ← B1 , . . . , A2 , . . . , Bn . .. . H ← B1 , . . . , Ak , . . . , Bn . to to each disjunction introduced in steps 1 and 2. For our running example, we obtain four clauses: p(X ) ← X p(X ) ← X p(X ) ← X p(X ) ← X < 7, X < 7, X ≥ 7, X ≥ 7, X < 7, X 1 is X + 1, X 1 < 7, p(X 1). < 7, X 1 is X + 1, X 1 ≥ 7, p(X 1). < 7, X 1 is X + 1, X 1 < 7, p(X 1). < 7, X 1 is X + 1, X 1 ≥ 7, p(X 1). Note that, although this transformation is logically correct, it is not correct for Prolog programs with non-logical features. For instance, in the presence of “cut”, it may produce a different computed answer set. Also, in the context of “read” or “write” calls, the procedural behaviour may become very different. However, for purely logical programs with integer computations, both the declarative semantics and the computed answer semantics are preserved. Likewise, the termination properties are also preserved. Indeed, the transformation described can be seen as a repeated unfolding of ; using the following clauses: ; (X , Y ) ← X . ; (X , Y ) ← Y . Inference of termination conditions 11 It is well-known that unfolding cannot introduce infinite derivations (Bossi and Cocco 1994). On the other hand, an infinite derivation of the original program can be easily mimicked by the transformed program. From here on we will restrict our attention to purely logical programs, augmented with integer arithmetic. To prepare the next step in the transformation, note that, in the program resulting from step 3, for each rule r and for each recursive predicate p: • if a call p(t1 , . . . , tn ) occurs in r , then it is immediately preceded by some c(p(t1 , . . . , tn )), • if an atom p(t1 , . . . , tn ) occurs as the head of r , then it is immediately followed by some c(p(t1 , . . . , tn )). Moreover, since the elements Ap partition the domain (see Definition 9), conjuncts like ci (p(t1 , . . . , tn )), p(t1 , . . . , tn ) and cj (p(t1 , . . . , tn )), p(t1 , . . . , tn ) for i 6= j , are mutually exclusive, as well as the initial parts of the rules, like p(t1 , . . . , tn ) ← ci (p(t1 , . . . , tn )) and p(t1 , . . . , tn ) ← cj (p(t1 , . . . , tn )), i 6= j . This means that we can now safely rename the different cases apart. 4. Replace each occurrence of c(p(t1 , . . . , tn )), p(t1 , . . . , tn ) in the body of the clause with c(p(t1 , . . . , tn )), p c (t1 , . . . , tn ) and each occurrence of a rule p(t1 , . . . , tn ) ← c(p(t1 , . . . , tn )), B1 , . . . , Bn with a corresponding rule p c (t1 , . . . , tn ) ← c(p(t1 , . . . , tn )), B1 , . . . , Bn . In our example we get: p a (X ) ← X p a (X ) ← X p b (X ) ← X p b (X ) ← X < 7, X < 7, X ≥ 7, X ≥ 7, X < 7, X 1 is X < 7, X 1 is X < 7, X 1 is X < 7, X 1 is X + 1, X 1 < 7, p a (X 1). + 1, X 1 ≥ 7, p b (X 1). + 1, X 1 < 7, p a (X 1). + 1, X 1 ≥ 7, p b (X 1). Because of the arguments presented above, the renaming is obviously correct, in the sense that the LD-trees that exist for the given program and for the renamed program are identical, except for the names of the predicates and for a number of failing 1step derivations (due to entering clauses that fail in their guard in the given program). As a result, both the semantics (up to renaming) and the termination behaviour of the program are preserved. 5. Remove all rules with a maximal integer prefix which is inconsistent, and remove from the bodies of the remaining clauses all subgoals that are preceded by an inconsistent conjunction of inequalities. In the example, both rules defining p b are eliminated and we obtain: p a (X ) ← X < 7, X < 7, X 1 is X + 1, X 1 < 7, p a (X 1). p a (X ) ← X < 7, X < 7, X 1 is X + 1, X 1 ≥ 7, p b (X 1). Performing this step requires verifying the consistency of a set of constraints, a task 12 Alexander Serebrenik and Danny De Schreye that might be computationally expensive. Depending on the constraints the implementation of our technique is supposed to deal with, the programmer can either opt for more restricted but potentially faster solvers, such as linear rational solver (Holzbaur 1995), or for more powerful but potentially slower ones, such as mixed integer programminging solver (ILOG 2001). 6. Replace each rule p c (t1 , . . . , tn ) ← c(p(t1 , . . . , tn )), B1 , . . . , Bn by a rule p c (t1 , . . . , tn ) ← B1 , . . . , Bn · In the example we obtain: p a (X ) ← X < 7, X 1 is X + 1, X 1 < 7, p a (X 1)· p a (X ) ← X < 7, X 1 is X + 1, X 1 ≥ 7, p b (X 1)· which is the adorned program, P A (P {a,b} in our case). Note that this last step is only correct if we also transform the set of original queries. Namely, given a single prediS cate set of original atomic queries S for P and a set of adornments A = p ∈P Ap , the corresponding set of queries considered for P A is S A = {c1 (Q ) ∧ Q c1 , . . . , cn (Q ) ∧ Q cn | Q ∈ S , {c1 , . . . , cn } = Arel(Q ) }, where Q c denotes p c (t1 , . . . , tn ) if Q is p(t1 , . . . , tn ). In our running example the set of queries is {z < 7 ∧ p a (z ), z ≥ 7 ∧ p b (z ) | z is an integer}. Before stating our results formally we illustrate the transformation by a second example. Example 9 Example 4, continued. With the first set of adornments from Example 7 we obtain P {a,b,c} : p a (X ) ← X > 1, X < 1000, X 1 is − X ∗ X , −1000 < X 1, X 1 < −1, p b (X 1). a p (X ) ← X > 1, X < 1000, X 1 is − X ∗ X , (X 1 ≤ −1000; (−1 ≤ X 1, X 1 ≤ 1); X 1 ≥ 1000), p c (X 1). b p (X ) ← X < −1, X > −1000, X 1 is X ∗ X , 1 < X 1, X 1 < 1000, p a (X 1). b p (X ) ← X < −1, X > −1000, X 1 is X ∗ X , (X 1 ≤ −1000; (−1 ≤ X 1, X 1 ≤ 1); X 1 ≥ 1000), p c (X 1). The set of queries to be considered is { z > 1 ∧ z < 1000 ∧ p a (z ), z > −1000 ∧ z < −1 ∧ p b (z ), (z ≤ −1000 ∨ (z ≥ −1 ∧ z ≤ 1) ∨ z ≥ 1000) ∧ p c (z ) | } z is an integer Inference of termination conditions 13 If the second set of adornments is used, the program P {d,e} is obtained: p d (X ) ← X p e (X ) ← X p d (X ) ← X p d (X ) ← X > 1, X < 1000, X 1 is − X ∗ X , X 1 ≤ 100, p d (X 1). > 1, X < 1000, X 1 is − X ∗ X , X 1 ≤ 100, p d (X 1). < −1, X > −1000, X 1 is X ∗ X , X 1 ≤ 100, p d (X 1). < −1, X > −1000, X 1 is X ∗ X , X 1 > 100, p e (X 1). Analogously, the following is the set of the corresponding queries {z ≤ 100 ∧ p d (z ), z > 100 ∧ p e (z ) | z is an integer} ✷ Formally, the following lemma holds: Lemma 1 Let P be a definite pure logical program with integer computations, let Q be an atomic query, let A = ∪Ap be a set of adornments and let c be an adornment in Arel(Q ) . Let P A be a program obtained as described above with respect to A . Then, c is a termination condition for Q with respect to P if and only if P A LD-terminates with respect to c(Q ) ∧ Q c . Proof The construction of P A implies that the LD-tree of c(Q ) ∧ Q c with respect to P A is isomorphic to the LD-tree of c(Q ) ∧ Q with respect to P , implying the theorem. Again, in practice we do not prove termination of a single query, but of a single predicate set of queries. Furthermore, recalling that a disjunction of termination conditions is a termination condition itself we can generalise our lemma to disjunctions of adornments. Taking these two considerations into account, the following theorem holds. Theorem 3 Let P be a definite pure logical program with integer computations, let S be a single predicate set of atomic queries, let A = ∪Ap be a set of adornments and let c1 , . . . , cn be adornments in Arel(S ) . Let P A be a program obtained as described above with respect to A . Then, c1 ∨ . . . ∨ cn is a termination condition for S with respect to P if and only if P A LD-terminates with respect to {c1 (Q ) ∧ Q c1 , . . . , cn (Q ) ∧ Q cn | Q ∈ S }. Proof Immediately from Lemma 1 and the preceding observations. The goal of the transformation presented is, given a program and a partition of the domain, to generate a program having separate clauses for each one of the cases. Clearly, this may (and usually will) increase the number of clauses. Each clause can be replaced by maximum c n +1 new clauses, were c is a number of adornments and n is a number of recursive body subgoals. Thus, the size of the transformed program doesn’t exceed r × c n +1 , (1) where r is the size of the original one. This may seem a problematically large increase, however, the number of recursive body atoms (depending on numerical arguments) in numerical programs is usually small. 14 Alexander Serebrenik and Danny De Schreye Since the transformation preserves termination, acceptability of the transformed program implies termination of the original program. In the next section we will see that having separate clauses for different cases allows us to define less sophisticated level-mappings for proving termination. Such level-mappings can be constructed automatically, and thus, play a key role in automation of the approach. 4 Generating adornments, level mappings and termination constraints In the previous section we have shown the transformation that allows reasoning on termination of the numerical computations in the framework of acceptability with respect to a set of queries. In this section we discuss how adornments can be generated, how level mappings can be proposed and which termination conditions finally turn up. 4.1 Guard-tuned sets of adornments In Example 7 we have seen two different sets of adornments. Both of them are valid according to Definition 9. However, recalling P {a,b,c} and P {d,e} as shown in Example 9, we conclude that {a, b, c} is in some sense preferable to {d, e}. Observe that P {d,e} does not only have two mutually recursive predicates, as P {a,b,c} does, but also self-loops on one of the predicates. To distinguish between “better” and “worse” sets of adornments we define guard-tuned sets of adornments. Intuitively, a set of adornments of a predicate p is guard-tuned if it is based on “subcases” of maximal integer prefixes. Definition 11 Let P be a homogeneous program, let p be a predicate in P . A set of adornments Ap is called guard-tuned if for every A ∈ Ap and for every rule r ∈ P , defining p, with the symbolic condition c corresponding to its maximal integer prefix, either c ∧ A = false or c ∧ A = A holds. Example 10 The first set of adornments, presented in Example 7, is guard-tuned while the second one is not guard-tuned. ✷ Examples 7 and 10 suggest the following way of constructing a guard-tuned set of adornments. First, we collect the symbolic conditions, corresponding to the maximal integer prefixes of the rules defining a predicate p (we denote this set Cp ). Let Cp be {c1 , . . . , cn }. Then we define Ap to be the set of all conjunctions ∧ni=1 di , where di is either ci or ¬ci . Computing Ap might be exponential in the number of elements of Cp , i.e., in the number of maximal integer prefixes. The number of integer prefixes is bounded by the number of clauses. Thus, recalling (1), the upper bound on the size of the transformed program is r × 2r (n +1) , i.e., it is exponential in the number of clauses r and in a number of recursive subgoals n. However, again our experience suggests that numerical parts of real-world programs are usually relatively small and depend on one or two different integer prefixes. Analogously, clauses having more than two recursive body subgoals are highly exceptional. Therefore, we conclude that in practice the size of the transformed program is not problematic. Inference of termination conditions 15 We claim that the constructed set Ap is always a guard-tuned set of adornments. Before stating this formally, consider the following example. Example 11 Consider the following program. r (X ) ← X > 5. r (X ) ← X > 10, r (X ). Then, Cr = {r1 > 5, r1 > 10}. The following conjunctions can be constructed from the elements of Cp and their negations: {r1 > 5 ∧ r1 > 10, r1 > 5 ∧ ¬(r1 > 10), ¬(r1 > 5) ∧ r1 > 10, ¬(r1 > 5) ∧ ¬(r1 > 10)}. After simplifying and removing inconsistencies Ar = {r1 > 10, r1 > 5 ∧ r1 ≤ 10, r1 ≤ 5}. ✷ Lemma 2 Let P be a program, p be a predicate in P and Ap be constructed as described. Then Ap is a guard-tuned set of adornments. Proof The proof is done by checking the definitions. 1. Let a1 , a2 ∈ Ap and a1 6= a2 . Then, there exists ci ∈ Cp , such that a1 = d1 ∧ . . . ∧ ci ∧ . . . ∧ dn and a2 = d1 ∧ . . . ∧ ¬ci ∧ . . . ∧ dn . Thus, a1 ∧ a2 = false. 2. By definition of Ap , ∨ai ∈Ap ai = true. Thus, Ap is a set of adornments. 3. Let a ∈ Ap be an adornment and let c be a symbolic condition corresponding to the maximal integer prefix of a rule. By definition of Cp , c ∈ Cp . Thus, either c is one of the conjuncts of a or ¬c is one of the conjuncts of a. In the first case, c ∧ a = a. In the second case c ∧ a = c ∧ (¬c) = false. Therefore, Ap is a guard-tuned set of adornments.  From here on we assume that all sets of adornments are guard-tuned. 4.2 How to define a level mapping. One of the questions that should be answered is how the level mappings should be generated automatically. Clearly, one cannot expect automatically defined level mappings to be powerful enough to prove termination of all terminating examples. In general we cannot hope but for a good guess. The problem with level mappings is that they should reflect changes on possibly negative arguments and remain non-negative at the same time. We also like to remain in the framework of level mappings on atoms defined as linear combinations of sizes of their arguments (Bossi et al. 1994). We solve this problem by defining different level mappings for different adorned versions of the predicate. The major observation underlying the technique presented in this subsection is that if p1 > p2 appears in the adornment of a recursive clause, then for each call to this adorned predicate p1 − p2 will be positive, and thus, can be used for defining a level mapping. On the other hand, p1 < p2 can always be interpreted as p2 > p1 . These observations form a basis for definition of a primitive level mapping. 16 Alexander Serebrenik and Danny De Schreye Definition 12 Let p c be an adorned predicate. The primitive level mapping, | · |pr , is defined as • if c is E1 ρ E2 , where E1 and E2 are expressions and ρ is either > or ≥ then  (E1 − E2 )(t1 , . . . , tn ) if E1 (t1 , . . . , tn ) ρ E2 (t1 , . . . , tn ) c pr | p (t1 , . . . , tn ) | = 0 otherwise • if c is E1 ρ E2 , where E1 and E2 are expressions and ρ is either < or ≤ then  (E2 − E1 )(t1 , . . . , tn ) if E1 (t1 , . . . , tn ) ρ E2 (t1 , . . . , tn ) | p c (t1 , . . . , tn ) |pr = 0 otherwise • otherwise, | p c (t1 , . . . , tn ) |pr = 0· If more than one conjunct appears in the adornment, the level mapping is defined as a linear combination of primitive level mappings corresponding to the conjuncts. Definition 13 Let p c1 ∧...∧cn be an adorned predicate such that each ci is E1i ρi E2i for some expressions E1i and E2i and ρi is either > or ≥. Let wc1 , . . . , wcn be natural numbers. Then, a level mapping | · | satisfying | p c1 ∧...∧cn (t1 , . . . , tn ) | = ∑ wci | p ci (t1 , . . . , tn ) |pr , i is called a natural level mapping. Example 12 The level mappings used in Example 4 are natural level mappings such that wp1 >1 = wp1 <−1 = 0, wp1 <1000 = wp1 >−1000 = 1. We have seen that these level mappings are powerful enough to prove termination. ✷ The definition of natural level mapping implies that if c is a disjunction, it is ignored. The reason for doing so is that disjunctions are introduced only as negations of symbolic constraints corresponding to maximal integer prefixes of the rules. Thus, they signify that some rule cannot be applied, and can be ignored. Example 13 Example 4, continued. Recalling that c denotes p1 ≤ −1000 ∨ −1 ≤ p1 ≤ 1 ∨ p1 ≥ 1000 the following holds for any integer n, | p c (n) |pr = 0. ✷ Of course, if the original program already contains disjunctions of numerical constraints, then we transform it in a preprocessing to eliminate the disjunctions. As the following example illustrates, natural level mappings gain their power from the fact that the set of adornments used is guard-tuned. Inference of termination conditions 17 Example 14 In Example 7 we have seen two different sets of adornments. We have seen in Example 4 that if a guard-tuned set of adornments is chosen the natural level mapping is powerful enough to prove acceptability and, thus, termination. If a non guard-tuned set of adornments is chosen, the second program of Example 9 is obtained. Then, a following natural level mapping is defined (for some natural numbers wp1 ≤100 and wp1 >100 ):  100 − X if X ≤ 100 | p d (X ) | = wp1 ≤100 ∗ 0 otherwise  X − 100 if X > 100 | p e (X ) | = wp1 >100 ∗ 0 otherwise Consider the following clause. p d (X ) ← X > 1, X < 1000, X 1 is − X ∗ X , X 1 ≤ 100, p d (X 1). In order to prove acceptability we have to show that the size of the call to p d (X ) is greater than the size of the corresponding call to p d (X 1). If the first argument x at the call to p d (X ) is greater than 1 and less than 10, the acceptability decrease requires wp1 ≤100 (100 − x ) > wp1 ≤100 (100 + x 2), contradicting x > 1 and wp1 ≤100 being a natural number. Thus, acceptability cannot be proved with natural level mappings. ✷ The approach of (Decorte et al. 1999) defines symbolic counterparts of the level mappings and infers the values of the coefficients by solving a system of constraints. Intuitively, instead of considering wci ’s as given coefficients, they are regarded as variables. More formally, similarly to (Decorte et al. 1999), we introduce the following notion. Definition 14 Let p c1 ∧...∧cn be an adorned predicate. A symbolic counterpart of a natural level mapping is an expression: | p c1 ∧...∧cn (t , . . . , t ) |s = W | p ci (t , . . . , t ) |pr , 1 n ∑ ci 1 n i where the Wci ’s are symbols, associated to a predicate p c1 ∧...∧cn . The intuition behind the symbolic counterpart of a natural level mapping is that natural level mappings are instances of it. Therefore, we also require Wc ≥ 0 to hold for any constraint c. Example 15 Example 4, continued. Recalling that a stands for 1 < p1 < 1000, a symbolic counterpart of a natural level mapping for p a (n) is Wp1 >1 (n − 1) + Wp1<1000(1000 − n). ✷ In order to verify the rigid acceptability condition (Theorem 2) interargument relations may be required as well. Interargument relations are usually represented as saying that a weighted sum of sizes of some arguments (with respect to a given norm) is greater or equal to a weighted sum of sizes of other arguments (see e.g. (Plümer 1990)). In the numerical case these sizes should be replaced with expressions as used in Definition 12. Observe that for simpler examples no interargument relations are needed. Symbolic counterparts of norms and interargument relations can be defined analogously to Definition 14. In the next subsection we discuss how the symbolic counterparts are used to infer termination conditions. 18 Alexander Serebrenik and Danny De Schreye 4.3 Inferring termination constraints In this section, we combine the steps studied so far into an algorithm that infers termination conditions. The program transformation, described in Section 3.2, implies that a trivial termination condition can be computed as a disjunction of the adornments corresponding to the predicates that can be completely unfolded, i.e., to the predicates that do not depend directly or indirectly on recursive predicates. More formally we can draw the following corollary from Theorem 3: Corollary 1 Let P be a program, let S be a single predicate set of atomic queries and let A be a set of adornments for rel(S ). Let A = {c | c ∈ A , for all q such that rel(S )c ⊒ q : q is not recursive W inP A }. Then c ∈A c is a termination condition for S with respect to P . Proof By definition of A, for all Q ∈ S , P A LD-terminates with respect to {c(Q ) ∧ Q c | c ∈ A}. W Thus, by Theorem 3, c ∈A c is a termination condition for S with respect to P .  Example 16 The termination condition constructed according to Corollary 1 for Example 4 is c, i.e., (p1 ≤ −1000) ∨ (−1 ≤ p1 ≤ 1) ∨ (p1 ≥ 1000). ✷ In general, the termination condition is constructed as a disjunction of two conditions: cond1 for non-recursive cases, according to Corollary 1, and cond2 , for recursive cases. The later condition is initialised to be ¬cond1 and further refined by adding constraints obtained from the rigid acceptability condition, as in (Decorte et al. 1999)2 . The algorithm is sketched in Figure 1. Termination inference is inspired by the constraints-based approach of Decorte et al. (Decorte et al. 1999). Similarly to their work we start by constructing symbolic counterparts of the level mappings (Definition 14) and interargument relations, and construct conditions following from rigid acceptability (Theorem 2) and validity of interargument relations. Unlike their work in our case no rigidity constraints are needed (since integer arguments are ground and obviously rigid) and norms are fixed. Thus, the constraints system turns out to be simpler and better suited for automation. Finally, the conditions constructed are solved with respect to the symbolic variables (Wci ’s). In Example 17 below we are going to see that rigid acceptability will be implied by the following constraint (Σ): Wq1 >q2 (X − Y ) > Wq1 >q2 ((X − Y ) − Y ), that is Wq1 >q2 Y > 0 should hold. In both approaches Wq1 >q2 ≥ 0 is required to hold. At this point the approach of (Decorte et al. 1999), interpreting Y as a norm of arguments (i.e., Y is a natural number), will conclude Wq1 >q2 > 0. In our case, we do not know a priori that Y is a natural number. Therefore, we would infer from Σ that Y > 0 and Wq1 >q2 > 0. In general, given the system of constraints inferred by (Decorte et al. 1999), we distinguish between the following cases: 2 Any other technique proving termination and able to provide some constraint that, if satisfied, implies termination can be used instead of (Decorte et al. 1999). Inference of termination conditions 19 • There is no solution. We report cond1 as a termination condition (Corollary 1). Observe that when the algorithm reports the termination condition to be false, it suspects the possibility of non-termination. • There is a solution for any values of integer variables. Namely, there are natural level mappings and interargument relations that prove termination of the program for any values of integer variables. Termination condition in this case is, thus, true. • There is a solution for some values of integer variables. In other words, the solution constrains integer variables appearing in the clauses. Two cases can be distinguished: — Integer variables constrained appear in the heads of the clauses. Then, constraints on these variables can be regarded as constraints on the arguments of the queries posed. In this case termination can be shown if these constraints are fulfilled. — Integer variables constrained do not appear in the heads of the clauses. In this case our methodology is too weak to obtain some information implying termination of the queries. The best we can do is to report termination for cond1 . Let P be a homogeneous program, let S be a single predicate set of atomic queries and let q be rel(S ). 1. For each p ≃ q construct a guard-tuned set Ap . (Section 4.1) S 2. Adorn P with respect to q and p≃q Ap . (Section 3.2) 3. Let A = {c | c ∈ Aq , for all p such that q c ⊒ p : p is not recursive in P A }. W W Let cond1 = c∈A c. Let cond2 = c∈Aq ,c6∈A c. 4. Let S ′ be {c(Q) ∧ Q c | c ∈ Aq , c 6∈ A, c(Q) ∧ Q c ∈ S A }. 5. Define the symbolic counterparts of level mappings and interargument relations. (Section 4.2) 6. Let Σ be a set of constraints on the symbolic variables, following from rigid acceptability of S ′ with respect to P A and validity of interargument relations. 7. Solve Σ with respect to the symbolic variables. (a) Solution of Σ doesn’t produce extra constraints on variables. Report termination for true. (b) Solution of Σ produces extra constraints on integer variables, appearing in the heads of the clauses. Conjunct these constraints to termination condition cond2 . Report termination for cond1 ∨ cond2 . (c) There is no solution or integer variables, constrained by the solution of Σ, do not appear in the heads of the clauses Report termination for cond1 . Fig. 1. Termination Inference Algorithm Example 17 Consider the following program. q(X , Y ) ← X > Y , Z is X − Y , q(Z , Y )· We look for integer values of X and Y such that q(X , Y ) terminates. First, the algorithm 20 Alexander Serebrenik and Danny De Schreye infers adornments. In our case {a, b} are inferred, such that a denotes q1 > q2 and b denotes q1 ≤ q2 . The adorned version of this program is q a (X , Y ) ← X > Y , Z is X − Y , Z > Y , q a (Z , Y )· q a (X , Y ) ← X > Y , Z is X − Y , Z ≤ Y , q b (Z , Y )· The corresponding set of queries is {x > y ∧ q a (x , y), x ≤ y ∧ q b (x , y) | x , y are integers}· There is no clause defining q b . By Corollary 1, b, i.e., q1 ≤ q2 is a termination condition. This is the one we denoted cond1 . The termination condition for q a , denoted cond2 , is initialised to be q1 > q2 . The symbolic counterpart of a natural level mapping is  X − Y if X > Y | q a (X , Y ) | = Wq1 >q2 ∗ 0 otherwise The set of constraints Σ implied by rigid acceptability is: Wq1 >q2 (X − Y ) > Wq1 >q2 ((X − Y ) − Y ), (2) that is Wq1 >q2 Y > 0 should hold. Since Wq1 >q2 ≥ 0, Y > 0 and Wq1 >q2 > 0 should hold. Variable Y appears in the head of the clause, i.e., Y > 0 can be viewed as a constraint on the query. We update cond2 to be (q1 > q2 ) ∧ (q2 > 0) and report termination for q1 ≤ q2 ∨ (q1 > q2 ∧ q2 > 0). ✷ Formally the following theorem holds. Theorem 4 Let P be a homogeneous pure logical program with integer computation, let S be a single predicate set of atomic queries and let Algo be the algorithm presented in Figure 1. Then the following holds: • Algo(P , S ) terminates; • Let c be a symbolic condition returned by Algo(P , S ). Then c is a termination condition for S . Proof • Termination of Algo(P , S ) follows from termination of its steps. Termination of steps 1 and 2 follows from the presentation of these transformations in Sections 4.1 and 3.2, respectively. Termination of steps 3–7 is obvious. • Partial correctness follows from the correctness of transformations and the corresponding result of (Decorte et al. 1999). Correctness of step 1 is established by Lemma 2, of step 2 by Theorem 3. For step 4 observe that termination for queries in S A \S ′ is obvious by choice of A. Correctness of steps 6 and 7 follows from the corresponding result of (Decorte et al. 1999).  In Example 17 the termination condition inferred by our algorithm was optimal, i.e., any other termination condition implies it. However, undecidability of the termination problem implies that no automatic tool can always guarantee optimality. Inference of termination conditions 21 Example 18 Consider the following program. q(X , Y ) ← X > Y , Z is X − Y , Y 1 is Y + 1, q(Z , Y 1)· We would like to study termination of this program with respect to {q(z1 , z2 ) | z1 , z2 are integers}. Our algorithm infers the following termination condition: q1 ≤ q2 ∨ (q1 > q2 ∧ q2 ≥ 0). This is a correct termination condition, but it is not optimal as q(z1 , z2 ) terminates, in fact, for all values of z1 and z2 , i.e., the optimal termination condition is true. ✷ 5 Experimental evaluation The algorithm presented in Figure 1 was integrated in the system implementing the constraintbased approach of (Decorte et al. 1999). As a preliminary step of our analysis, given a program and a set of atomic queries, the call set has to be computed. To do so, the type inference technique of Janssens and Bruynooghe (Janssens and Bruynooghe 1992) was used. We opted for a very simple type inference technique that provides us only with information whether some argument is integer or not. More refined analysis can be used. For instance, the technique presented in (Janssens et al. 1994) would have allowed us to know whether some numerical argument belongs to a certain interval. Alternatively, the integer intervals domain fo Cousot and Cousot (Cousot and Cousot 1976; Cousot and Cousot 1977) might have been used. We have tested our system on a number of examples. First, we considered examples from two textbooks chapters dedicated to programming with arithmetic, namely, Chapter 8 of Sterling and Shapiro (Sterling and Shapiro 1994) and Chapter 9 of Apt (Apt 1997). These results are summarised in Tables 1 and 2, respectively. We can prove termination of all the examples presented for all possible values of the integer arguments, that is, the termination condition inferred is true. Next, we’ve collected a number of programs from different sources. Table 3 presents timings and results for these programs. Again, termination of almost all programs can be shown for all possible values of the integer arguments. We believe that the reason for this is that most textbooks authors prefer to write programs ensuring termination. Finally, Table 4 demonstrates some of the termination conditions inferred by our system. We can summarise our results by saying that the system turned out to be powerful enough to analyse correctly a broad spectrum of programs, while the time spent on the analysis never exceeded 0.20 seconds. In fact, for 90% of the programs results were obtained in 0.10 seconds or less. The core part of the implementation was done in SICStus Prolog (SICS 2002), type inference of Janssens and Bruynooghe (Janssens and Bruynooghe 1992) was implemented in MasterProLog (IT Masters 2000). Tests were performed on SUN SPARC Ultra-60, model 2360. The SPECint 95 and SPECfp 95 ratings for this machine are 16.10 and 29.50, respectively. In Tables 1–4 the following abbreviations are used: • Ref: reference to the program; • Name: name of the program; • Queries: single predicate set of atomic queries of interest, where the arguments are denoted 22 Alexander Serebrenik and Danny De Schreye Table 1. Examples of Sterling and Shapiro Ref Queries Time 8.1 8.2 8.3 8.4 8.5 8.6a 8.6b 8.7a 8.7b 8.8 8.9 8.10 8.11 8.12 greatest common divisor(i , i , v ) factorial(i , v ) factorial(i , v ) factorial(i , v ) between(i , i , v ) sumlist(li , v ) sumlist(li , v ) inner product(li , li , v ) inner product(li , li , v ) area(lp, v ) maxlist(li , v ) length(v , li ) length(li , v ) range(i , i , v ) 0.03 0.02 0.03 0.03 0.03 0.00 0.00 0.00 0.01 0.03 0.02 0.01 0.01 0.03 Table 2. Examples of Apt — — — — — — Name Queries Time between delete factorial in tree insert length1 maximum ordered quicksort quicksort acc quicksort dl search tree tree minimum between(i , i , v ) delete (i , i , v ) fact(i , v ) in tree(i , t) insert(i , t, v ) length(li , v ) maximum(li , v ) ordered(li ) qs(li , v ) qs acc(li , v ) qs dl(li , v ) is search tree(t) minimum(t, v ) 0.02 0.04 0.01 0.01 0.01 0.00 0.00 0.01 0.10 0.10 0.13 0.06 0.01 c, if the argument is a character; i, if the argument is an integer; li, if the argument is a list of integers; lp, if the argument is a list of pairs of integers; t , if the argument is a binary tree, containing integers; v , if the argument is a variable; • Time: time (in seconds) needed to analyse the example; Inference of termination conditions 23 Table 3. Various examples Name Ref Queries Time T dldf exp fib fib forwardfib money (Bratko 1986) (Coelho and Cotta 1988) (Bueno et al. 1994) (O’Keefe 1990) (Bratko 1986) (Bueno et al. 1994) 0.03 0.07 0.16 0.05 0.02 0.20 T N+ T T∗ T T oscillate p32 p33 p34 primes pythag r triangle Example 4 (Hett 2001) (Hett 2001) (Hett 2001) (Clocksin and Mellish 1981) (Clocksin and Mellish 1981) (Dershowitz et al. 2001) (McDonald and Yazdani 1990) depthfirst2(c, v , i ) exp(i , i , v ) fib(i , v ) fib(i , v ) fib3(i , v ) money(v , v , v , v , v, v, v, v) p(i ) gcd(i , i , v ) coprime(i , i ) totient phi(i , v ) primes(i , v ) pythag(v , v , v ) r(i , v ) triangle(i , v ) 0.07 0.03 0.05 0.14 0.08 0.05 0.01 0.03 T T T T T N+ T N+ Table 4. Examples of inferring termination conditions Name Ref Queries Time Condition q q gcd Example 17 Example 18 (Bratko 1986) q(i , i ) q(i , i ) gcd(i ,i ,v ) 0.04 0.05 0.10 q1 ≤ q2 ∨ (q1 > q2 ∧ q2 > 0) q1 ≤ q2 ∨ (q1 > q2 ∧ q2 ≥ 0) q1 = q2 ∨ (q1 > q2 ∧ q2 ≥ 1) • T: termination behaviour, see further. One of the less expected results was finding non-terminating examples in Prolog textbooks. The first one, due to Coelho and Cotta (Coelho and Cotta 1988), should compute an nth power of a number. exp(X , 0, 1)· exp(X , Y , Z ) ← even(Y ), R is Y /2, P is X ∗ X , exp(P , R, Z )· exp(X , Y , Z ) ← T is Y − 1, exp(X , T , Z 1), Z is Z 1 ∗ X · even(Y ) ← R is Y mod 2, R = 0· The termination condition inferred by our system is false and indeed, this is the only termination condition possible, since for any goal G the LD-tree of this program and G is infinite. This fact is denoted in Table 3 as N+. Similarly, the fact that for any goal G the LD-tree of the program and G is finite and our system is powerful enough to discover this is denoted as T. 24 Alexander Serebrenik and Danny De Schreye McDonald and Yazdani suggest the following exercise in their book (McDonald and Yazdani 1990): write a predicate triangle which finds the number of balls in a triangle of base N . For example, for N = 4 the number of balls is 4 + 3 + 2 + 1 = 10. The next program is the solution provided by the authors: triangle(1, 1)· triangle(N , S ) ← M is N − 1, triangle(M , R), S is M + R· Once more, the termination condition inferred by our system is false, and it is the only possible one. O’Keefe (O’Keefe 1990) suggested a more efficient way of calculating Fibonacci numbers performing O (n) work each time it is called, unlike the version of (Bueno et al. 1994) that performs an exponential amount of work each time. fib(1, X ) ←!, X = 1· fib(2, X ) ←!, X = 1· fib(N , X ) ← N > 2, fib(2, N , 1, 1, X )· fib(N , N , X 2, , X ) ←!, X = X 2· fib(N0 , N , X 2, X 1, X ) ← N 1 is N0 + 1, X 3 is X 2 + X 1, fib(N1 , N , X 3, X 2, X )· Termination of goals of the form fib(i,v) with respect to this example depends on the cut in the first clause of fib/5. If it is removed and if we add at the beginning of the second clause N0 6= N termination can be proved. This fact is denoted T∗ in Table 3. Note that this replacement does not affect complexity of the computation. Observe also that a more declarative way to write the program might be to add N0 < N instead of N0 6= N . However, while the latter condition can be inferred automatically from the program, it is not clear whether this is also the case for the former one. 6 Further extensions In this section we discuss possible extensions of the algorithm presented in Section 4. First of all, we discuss integrating termination analysis of numerical and symbolic computations, and then show how our results can be used to improve existing termination analyses of symbolic computations, such as (Mesnard 1996; Codish and Taboch 1999). 6.1 Integrating numerical and symbolic computation In the real-world programs numerical computations are sometimes interleaved with symbolic ones, as illustrated by the following example collecting leaves of a tree with a variable branching factor, being a common data structure in natural language processing (Pollard and Sag 1994). Example 19 collect(X , [X |L], L) ← atomic(X ) · Inference of termination conditions collect(T , L0, L) ← compound(T ), functor(T , , A), 25 (3) process(T , 0, A, L0, L) · process( , A, A, L, L) · process(T , I , A, L0, L2) ← I < A, I 1 is I + 1, arg(I 1, T , Arg), (4) collect(Arg, L0, L1), process(T , I 1, A, L1, L2)· To prove termination of {collect(t, v, [])}, where t is a tree and v is a variable, three decreases should be shown: between a call to collect and a call to process in (3), between a call to process and a call to collect in (4) and between two calls to process in (4) . The first two can be shown only by a symbolic level mapping, the third one—only by the numerical approach. ✷ Thus, our goal is to combine the existing symbolic approaches with the numerical one presented so far. One of the possible ways to do so is to combine two level mappings, | · |1 and | · |2 by mapping each atom A ∈ BPE either to a natural number | A |1 or to a pair of natural numbers (| A |1 , | A |2 ) and prove termination by establishing decreases via orderings on (N ∪ N 2 ) as suggested in (Serebrenik and De Schreye 2001). Example 20 Example 19, continued. Define ϕ : BPE → (N ∪ N 2 ) as follows: ϕ(collect(t , l 0, l )) = kt k, ϕ(process(t , i, a, l 0, l )) = (kt k, a − i) where k · k is a term-size norm. The decreases are satisfied with respect to >, such that A1 > A2 if and only if ϕ(A1 ) ≻ ϕ(A2 ), where ≻ is defined as: n ≻ m, if n >N m, n ≻ (n, m), if true, (n, m1 ) ≻ (n, m2 ), if m1 >N m2 and (n1 , m) ≻ n2 , if n1 >N n2 and >N is the usual order on the naturals. ✷ This integrated approach allows one to analyse correctly examples such as ground, unify, numbervars (Sterling and Shapiro 1994) and Example 6.12 in (Dershowitz et al. 2001). 6.2 Termination of symbolic computations—revised A number of modern approaches to termination analysis of logic programs (Codish and Taboch 1999; Mesnard 1996; Mesnard et al. 2002) abstract a program to CLP(N) and then infer termination of the original program from the corresponding property of the abstract one. However, as mentioned in the introduction, techniques used to prove termination of the numerical program are often restricted to the identity function as the level-mapping. Example 21 Consider the following example: p(X ) ← append(X , , [ , , , , , , , ]), p([ |X ]) · append([], L, L) · append([H |X ], Y , [H |Z ]) ← append(X , Y , Z )· Using the list-length norm, defined as  1 + kt ′k if t = [h|t ′ ] kt k = 0 otherwise 26 Alexander Serebrenik and Danny De Schreye the following CLP(N )-abstraction can be computed: p(X ) ← append(X , , 7), p(1 + X ) · append(0, L, L) · append(1 + X , Y , 1 + Z ) ← append(X , Y , Z )· Computing a model for the abstraction of append and transforming the clause for p as described by Mesnard (Mesnard 1996) the following program is obtained: p(X ) ← X ≤ 7, p(1 + X )· Termination of this program cannot be shown by the identity function as a level-mapping. Thus, non-termination will be suspected. ✷ Our approach is able to bridge the gap and provide the correct analysis of Example 21. Since our results have been stated for numerical computations and not for CLP(N ) minor changes in the abstraction process are required. Instead of replacing a term t in an atom a with the size of t , a fresh variable V is introduced. Then, we add a goal V is size(t ) before a (if a is a body subgoal) or after a (if it is a head of the clause). Next, we replace t in a by V , and proceed with the transformation of (Mesnard 1996). Example 22 Example 21, continued. Applying the abstraction technique above with respect to the listlength norm the following program is obtained: p(X ) ← append(X , , 7), X 1 is X + 1, p(X 1) · append(0, L, L) · append(X 1, Y , Z 1) ← X 1 is X + 1, Z 1 is Z + 1, append(X , Y , Z )· After computing the models this program is transformed to: p(X ) ← X ≤ 7, X 1 is X + 1, p(X 1)· Termination of p(n) with respect to this program can be shown by our approach for any integer number n. This implies termination of p(t ) with respect to the original one for any list of finite length t . ✷ To summarise this discussion, we believe that integrating our technique for proving termination of numerical computations with CLP(N ) abstracting methodologies of (Codish and Taboch 1999; Mesnard 1996; Mesnard et al. 2002) will significantly extend the class of logic programs that can be analysed automatically. 7 Conclusion We have presented an approach to verification of termination for logic programs with integer computations. This functionality is lacking in current available termination analysers for Prolog, such as cTI (Mesnard 1996; Mesnard and Neumerkel 2001), TerminWeb (Codish and Taboch 1999), and TermiLog (Lindenstrauss and Sagiv 1997; Lindenstrauss et al. 1997). The main contribution of this work is threefold. First, from the theoretical perspective, our study improves Inference of termination conditions 27 the understanding of termination of numerical computations, situates them in the wellknown framework of acceptability and allows integration with the existing approaches to termination of symbolic computations. Moreover, our technique can be used to strengthen the existing techniques for proving termination of symbolic computations. Second, unlike the majority of works on termination analysis for logic programs concerned with termination verification, we go further and do inference, i.e., we infer conditions on integer arguments of the queries that imply termination. To perform the inference task we apply a methodology inspired by the constraints based approach (Decorte et al. 1999), i.e., we start by symbolic counterparts of level mappings and interargument relations and infer constraints on the integer arguments from rigid acceptability condition and validity of interargument relations. Finally, the methodology presented has been integrated in the automatic termination analyser of (Decorte et al. 1999). It was shown that our approach is robust enough to prove termination for a wide range of numerical examples, including gcd and mod (Dershowitz et al. 2001) all examples appearing in Chapter 8 of (Sterling and Shapiro 1994) and those appearing in (Apt 1997). Termination of numerical computations was studied by a number of authors (Apt 1997; Apt et al. 1994; Dershowitz et al. 2001). Apt et al. (Apt et al. 1994) provided a declarative semantics, so called Θ-semantics, for Prolog programs with first-order built-in predicates, including arithmetic operations. In this framework the property of strong termination, i.e., finiteness of all LD-trees for all possible goals, was completely characterised based on an appropriately tuned notion of acceptability. This approach provides important theoretical results, but seems to be difficult to integrate in automatic tools. In (Apt 1997) it is claimed that an unchanged acceptability condition can be applied to programs in pure Prolog with arithmetic by defining the level mappings on ground atoms with the arithmetic relation to be zero. This approach ignores the actual computation, and thus, its applicability is restricted to programs using arithmetic but whose termination behaviour is not dependent on their arithmetic part, such as quicksort. Moreover, there are many programs that terminate only for some queries, such as Example 17. Alternatively, Dershowitz et al. (Dershowitz et al. 2001) extended the query-mapping pairs formalism of (Lindenstrauss and Sagiv 1997) to deal with numerical computations. However, this approach inherited the disadvantages of (Lindenstrauss and Sagiv 1997), such as high computational price, inherent to this approach due to repetitive fixpoint computations. Moreover, since our approach gains its power from the underlying framework of (Decorte et al. 1999), it allows one to prove termination of some examples that cannot be analysed correctly by (Dershowitz et al. 2001), similar to confused delete (Decorte et al. 1999). More research has been done on termination analysis for constraint logic programming (Colussi et al. 1995; Mesnard 1996; Ruggieri 1997). Since numerical computations in Prolog should be written in a way that allows a system to verify their satisfiability we can see numerical computations of Prolog as an ideal constraint system. Thus, all the results obtained for ideal constraints systems can be applied. Unfortunately, the research was either oriented towards theoretical characterisations (Ruggieri 1997) or restricted to domains isomorphic to N (Mesnard 1996), such as trees and terms. In a contrast to the approach of (Dershowitz et al. 2001) that was restricted to verifying 28 Alexander Serebrenik and Danny De Schreye termination, we presented a methodology for inferring termination conditions. It is not clear whether and how (Dershowitz et al. 2001) can be extended to infer such conditions. Numerical computations have been also analysed in the early works on termination analysis for imperative languages (Floyd 1967; Katz and Manna 1975), considering, as we have already pointed out in Section 1, general well-founded domains. However, our approach to automation differs significantly from these works. Traditionally, the verification community considered automatic generation of invariants (Bjørner et al. 1997), while automatic generation of ranking functions (level mappings, in the logic programming parlance) just started to emerge (Colón and Sipma 2001; Colón and Sipma 2002). The inherent restriction of the latter results is that ranking functions have to be linear. Moreover, in order to perform the analysis of larger programs, such as mergesort, in a reasonable amount of time, authors further restricted the ranking functions to depend on one variable only. Unlike these results, our approach doesn’t suffer from such limitations. The idea of splitting a predicate into cases was first mentioned by Ullman and Van Gelder (Ullman and Van Gelder 1988), where existence has been assumed of a preprocessor that transformed a set of clauses to the new set, in which every subgoal unifies with all of the rules for its predicate symbol. However, neither in this paper, nor in the subsequent one ((Sohn and Van Gelder 1991)) the methodology proposed was presented formally. To the best of our knowledge the first formal presentation of splitting in the framework of termination analysis is due to Lindenstrauss et al. (Lindenstrauss et al. 1998). Unlike these results, a numerical and not a symbolic domain was considered in the current paper. The termination condition inferred for Example 17 is optimal, i.e., it is implied by any other termination condition. Clearly, undecidability of the termination problem implies that no automatic tool can always guarantee optimality of the condition inferred. However, verifying if the condition inferred is optimal seems to be an interesting question, related to looping analysis (Bol 1991; De Schreye et al. 1990; Shen 1997; Shen et al. 2001; Skordev 1997). So far, in the context of logic programming, optimality of termination conditions inferred has been studied by Mesnard et al. (Mesnard et al. 2002) only for symbolic computations. 8 Acknowledgement Alexander Serebrenik is supported by GOA: “LP + : a second generation logic programming language”. We are very grateful to Gerda Janssens and Vincent Englebert for making their type analysis systems available for us. Many useful suggestions and helpful comments were proposed to us by anonymous referees—we are much obliged to their careful reading. References A PT, K. R. 1997. From Logic Programming to Prolog. Prentice-Hall International Series in Computer Science. Prentice Hall. A PT, K. R., M ARCHIORI , E., AND PALAMIDESSI , C. 1994. A declarative approach for first-order built-in’s in Prolog. Applicable Algebra in Engineering, Communication and Computation 5, 3/4, 159–191. Inference of termination conditions 29 B JØRNER , N., B ROWNE , A., AND M ANNA , Z. 1997. Automatic generation of invariants and intermediate assertions. Theoretical Computer Science 173, 1 (February), 49–87. B OL , R. N. 1991. Loop checking in logic programming. Ph.D. thesis, Universiteit van Amsterdam. B OSSI , A. AND C OCCO , N. 1994. Preserving universal temination through unfold/fold. In Algebraic and Logic Programming, G. Levi and M. Rodrı́guez-Artalejo, Eds. Lecture Notes in Computer Science, vol. 850. Springer Verlag, 269–286. B OSSI , A., C OCCO , N., E TALLE , S., AND ROSSI , S. 2002. On modular termination proofs of general logic programs. Theory and Practice of Logic Programming 2, 3, 263–291. B OSSI , A., C OCCO , N., AND FABRIS , M. 1991. Proving Termination of Logic Programs by Exploiting Term Properties. In Proceedings of CCPSD-TAPSOFT’91. Lecture Notes in Computer Science, vol. 494. Springer Verlag, 153–180. B OSSI , A., C OCCO , N., AND FABRIS , M. 1994. Norms on terms and their use in proving universal termination of a logic program. Theoretical Computer Science 124, 2 (February), 297–328. B RATKO , I. 1986. Prolog programming for Artificial Intelligence. Addison-Wesley. B RUYNOOGHE , M., C ODISH , M., G ENAIM , S., AND VANHOOF, W. 2002. Reuse of results in termination analysis of typed logic programs. In Static Analysis, 9th International Symposium, M. V. Hermenegildo and G. Puebla, Eds. Lecture Notes in Computer Science, vol. 2477. Springer Verlag, 477–492. B UENO , F., G ARC ÍA DE LA BANDA , M. J., AND H ERMENEGILDO , M. V. 1994. Effectiveness of global analysis in strict independence-based automatic parallelization. In Logic Programming, Proceedings of the 1994 International Symposium, M. Bruynooghe, Ed. MIT Press, 320–336. C LOCKSIN , W. F. AND M ELLISH , C. S. 1981. Programming in Prolog. Springer Verlag. C ODISH , M. AND TABOCH , C. 1999. A semantic basis for termination analysis of logic programs. Journal of Logic Programming 41, 1, 103–123. C OELHO , H. AND C OTTA , J. C. 1988. Prolog by example. Springer Verlag. C OL ÓN , M. A. AND S IPMA , H. B. 2001. Synthesis of linear ranking functions. In Tools and Algorithms for the Construction and Analysis of Systems, 7th International Conference, T. Margaria and W. Yi, Eds. Lecture Notes in Computer Science, vol. 2031. Springer Verlag, 67–81. C OL ÓN , M. A. AND S IPMA , H. B. 2002. Practical methods for proving program termination. In Computer Aided Verification, 14th International Conference, E. Brinksma and K. Guldstrand Larsen, Eds. Lecture Notes in Computer Science, vol. 2404. Springer Verlag, 442–454. C OLUSSI , L., M ARCHIORI , E., AND M ARCHIORI , M. 1995. On termination of constraint logic programs. In Principles and Practice of Constraint Programming - CP’95,, U. Montanari and F. Rossi, Eds. Lecture Notes in Computer Science, vol. 976. Springer Verlag, 431–448. C OUSOT, P. AND C OUSOT, R. 1976. Static determination of dynamic properties of programs. In Proceedings of the Second International Symposium on Programming. Dunod, Paris, France, 106– 130. C OUSOT, P. AND C OUSOT, R. 1977. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM Press, New York, NY, Los Angeles, California, 238–252. D E S CHREYE , D., V ERSCHAETSE , K., AND B RUYNOOGHE , M. 1990. A practical technique for detecting non-terminating queries for a restricted class of Horn clauses, using directed, weighted graphs. In Logic Programming, Proceedings of the Seventh International Conference, D. H. Warren and P. Szeredi, Eds. MIT Press, 649–663. D E S CHREYE , D., V ERSCHAETSE , K., AND B RUYNOOGHE , M. 1992. A framework for analyzing the termination of definite logic programs with respect to call patterns. In Proceedings of the International Conference on Fifth Generation Computer Systems., I. Staff, Ed. IOS Press, 481– 488. 30 Alexander Serebrenik and Danny De Schreye D ECORTE , S. AND D E S CHREYE , D. 1998. Termination analysis: some practical properties of the norm and level mapping space. In Proceedings of the 1998 Joint International Conference and Symposium on Logic Programming, J. Jaffar, Ed. MIT Press, 235–249. D ECORTE , S., D E S CHREYE , D., AND VANDECASTEELE , H. 1999. Constraint-based termination analysis of logic programs. ACM TOPLAS 21, 6 (November), 1137–1195. D ERSHOWITZ , N., L INDENSTRAUSS , N., S AGIV, Y., AND S EREBRENIK , A. 2001. A general framework for automatic termination analysis of logic programs. Applicable Algebra in Engineering, Communication and Computing 12, 1-2, 117–156. F LOYD , R. W. 1967. Assigning meanings to programs. In Mathematical Aspects of Computer Science, J. Schwartz, Ed. American Mathematical Society, 19–32. Proceedings of Symposiumsia in Applied Mathematics; v. 19. G ENAIM , S. AND C ODISH , M. 2001. Inferring termination conditions for logic programs using backwards analysis. In Logic for Programming, Artificial Intelligence, and Reasoning, 8th International Conferencerence, Proceedings, R. Nieuwenhuis and A. Voronkov, Eds. Lecture Notes in Computer Science, vol. 2250. Springer Verlag, 685–694. G ENAIM , S., C ODISH , M., G ALLAGHER , J., AND L AGOON , V. 2002. Combining norms to prove termination. In Third International Workshop on Verification, Model Checking and Abstract Interpretation, A. Cortesi, Ed. Lecture Notes in Computer Science, vol. 2294. Springer Verlag, 126– 138. H ETT, W. 2001. P-99: Ninety-nine Prolog problems. http://www.hta-bi.bfh.ch/˜hew/informatik3/prolog/p-99/. Available at H OLZBAUR , C. 1995. OFAI CLP(Q,R) Manual. Tech. Rep. TR-95-09, Austrian Research Institute for Artificial Intelligence, Vienna. ILOG. 2001. ILOG Solver 5.1 User’s Manual. ILOG s.a. http://www.ilog.com. IT M ASTERS. 2000. MasterProLog http://www.itmasters.com/. Programming Environment. Available at JANSSENS , G. AND B RUYNOOGHE , M. 1992. Deriving descriptions of possible values of program variables by means of abstract interpretation. Journal of Logic Programming 13, 2&3 (July), 205–258. JANSSENS , G., B RUYNOOGHE , M., AND E NGLEBERT, V. 1994. Abstracting numerical values in CLP(H, N). In Programming Language Implementation and Logic Programming, 6th International Symposiumsium, PLILP’94, M. V. Hermenegildo and J. Penjam, Eds. Lecture Notes in Computer Science, vol. 844. Springer Verlag, 400–414. K ATZ , S. AND M ANNA , Z. 1975. A closer look at termination. Acta Informatica 5, 333–352. L INDENSTRAUSS , N. AND S AGIV, Y. 1997. Automatic termination analysis of logic programs. In Proceedings of the Fourteenth International Conference on Logic Programming, L. Naish, Ed. MIT Press, 63–77. L INDENSTRAUSS , N., S AGIV, Y., AND S EREBRENIK , A. 1997. TermiLog : A system for checking termination of queries to logic programs. In Computer Aided Verification, 9th International Conference, O. Grumberg, Ed. Lecture Notes in Computer Science, vol. 1254. Springer Verlag, 63–77. L INDENSTRAUSS , N., S AGIV, Y., AND S EREBRENIK , A. 1998. Unfolding the mystery of mergesort . In Proceedings of the 7th International Workshop on Logic Program Synthesis and Transformation, N. Fuchs, Ed. Lecture Notes in Computer Science, vol. 1463. Springer Verlag. M C D ONALD , C. AND YAZDANI , M. 1990. Prolog programming: a tutorial introduction. Artificial Intelligence Texts. Blackwell Scientific Publications. M ESNARD , F. 1996. Inferring left-terminating classes of queries for constraint logic programs. In Proceedings of the 1996 Joint International Conference and Syposium on Logic Programming, M. Maher, Ed. The MIT Press, Cambridge, MA, USA, 7–21. Inference of termination conditions 31 M ESNARD , F. AND N EUMERKEL , U. 2001. Applying static analysis techniques for inferring termination conditions of logic programs. In Static Analysis, 8th International Symposium, SAS 2001, P. Cousot, Ed. Lecture Notes in Computer Science, vol. 2126. Springer Verlag, 93–110. M ESNARD , F., PAYET, E., AND N EUMERKEL , U. 2002. Dectecting optimal termination conditions of logic programs. In Static Analysis, 8th International Symposium, SAS 2002, P. Cousot, Ed. Lecture Notes in Computer Science, vol. 2477. Springer Verlag, 509–527. M ESNARD , F. AND RUGGIERI , S. 2003. On proving left termination of constraint logic programs. ACM Transaction on Computational Logic 4, 2, 207–259. O HLEBUSCH , E. 2001. Automatic termination proofs of logic programs via rewrite systems. Applicable Algebra in Engineering, Communication and Computing 12, 1-2, 73–116. O’K EEFE , R. A. 1990. The Craft of Prolog. MIT Press, Cambridge, MA, USA. P L ÜMER , L. 1990. Termination proofs for logic programs based on predicate inequalities. In Proceedings of ICLP’90. MIT Press, 634–648. P L ÜMER , L. 1991. Automatic termination proofs for Prolog programs operating on nonground terms. In International Logic Programming Symposium. MIT Press. P OLLARD , C. AND S AG , I. A. 1994. Head-driven Phrase Structure Grammar. The University of Chicago Press. RUGGIERI , S. 1997. Termination of constraint logic programs. In Automata, Languages and Programming, 24th International Colloquium, ICALP’97, P. Degano, R. Gorrieri, and A. MarchettiSpaccamela, Eds. Lecture Notes in Computer Science, vol. 1256. Springer Verlag, 838–848. S EREBRENIK , A. AND D E S CHREYE , D. 2001. Non-transformational termination analysis of logic programs, based on general term-orderings. In Logic Based Program Synthesis and Transformation 10th International Workshop, Selected Papers, K.-K. Lau, Ed. Lecture Notes in Computer Science, vol. 2042. Springer Verlag, 69–85. S EREBRENIK , A. AND D E S CHREYE , D. 2002. On termination of logic programs with floating point computations. In 9th International Static Analysis Symposium, M. V. Hermenegildo and G. Puebla, Eds. Lecture Notes in Computer Science, vol. 2477. Springer Verlag, 151–164. S HEN , Y.-D. 1997. An extended variant of atoms loop check for positive logic programs. New Generation Computing 15, 2, 187–204. S HEN , Y.-D., Y UAN , L.-Y., AND YOU , J.-H. 2001. Loop checks for logic programs with functions. Theoretical Computer Science 266, 1–2, 441–461. SICS. 2002. SICStus User Manual. Version 3.10.0. Swedish Institute of Computer Science. S KORDEV, D. 1997. An abstract approach to some loop detection problems. Fundamenta Informaticae 31, 2, 195–212. S OHN , K. AND VAN G ELDER , A. 1991. Termination detection in logic programs using argument sizes. In Proceedings of the Tenth ACM SIGACT-SIGART-SIGMOD Symposium on Principles of Database Systems. ACM Press, 216–226. S TERLING , L. AND S HAPIRO , E. 1994. The Art of Prolog. The MIT Press, Cambridge, MA, USA. U LLMAN , J. D. AND VAN G ELDER , A. 1988. Efficient tests for top-down termination of logical rules. Journal of the ACM 35, 2 (April), 345–373. V ERBAETEN , S., S AGONAS , K., AND D E S CHREYE , D. 2001. Termination proofs for logic programs with tabling. ACM Transactions on Computational Logic 2, 1, 57–92. V ERSCHAETSE , K. AND D E S CHREYE , D. 1991. Deriving termination proofs for logic programs, using abstract procedures. In Logic Programming, Proceedings of the Eigth International Conference, K. Furukawa, Ed. MIT Press, 301–315. W INSBOROUGH , W. 1992. Multiple specialization using minimal-function graph semantics. Journal of Logic Programming 13, 2/3, 259–290.
2cs.AI
1 Adaptive Channel Prediction, Beamforming and Scheduling Design for 5G V2I Network arXiv:1707.07068v1 [cs.IT] 21 Jul 2017 Tadilo Endeshaw Bogale+ , Xianbin Wang++ and Long Bao Le+ Institute National de la Recherche Scientifique (INRS) Université du Québec, Montréal, Canada+ Western University, London, Canada++ Email: {tadilo.bogale, long.le}@emt.inrs.ca, [email protected] Abstract— One of the important use-cases of 5G network is the vehicle to infrastructure (V2I) communication which requires accurate understanding about its dynamic propagation environment. As 5G base stations (BSs) tend to have multiple antennas, they will likely employ beamforming to steer their radiation pattern to the desired vehicle equipment (VE). Furthermore, since most wireless standards employ an OFDM system, each VE may use one or more sub-carriers. To this end, this paper proposes a joint design of adaptive channel prediction, beamforming and scheduling for 5G V2I communications. The channel prediction algorithm is designed without the training signal and channel impulse response (CIR) model. In this regard, first we utilize the well known adaptive recursive least squares (RLS) technique for predicting the next block CIR from the past and current block received signals (a block may have one or more OFDM symbols). Then, we jointly design the beamforming and VE scheduling for each sub-carrier to maximize the uplink channel average sum rate by utilizing the predicted CIR. The beamforming problem is formulated as a Rayleigh quotient optimization where its global optimal solution is guaranteed. And, the VE scheduling design is formulated as an integer programming problem which is solved by employing a greedy search. The superiority of the proposed channel prediction and scheduling algorithms over those of the existing ones is demonstrated via numerical simulations. Index Terms— Channel prediction, Beamforming, Scheduling, Recursive least squares (RLS), Adaptive filtering. I. I NTRODUCTION With the proliferation of mobile internet and smart devices, it is clear that data traffic over wireless networks will continue to grow exponentially in foreseeable future. Driven by many emerging use cases and industry applications, intensive efforts have been undertaken by both academia and industry to design the next generation 5G network. One of the important sectors that uses the 5G network infrastructure is the automotive industry which is currently undergoing dramatic technological transformations, as more and more vehicles are connected to the Internet and with each other [1], [2]. The development of effective vehicular communication systems in highly mobile environment requires accurate understanding about the propagation channel. Furthermore, as 5G base stations (BSs) tend to have large scale antennas, BSs will likely employ beamforming technology to steer their radiation pattern to the desired vehicle equipment (VE). In addition, the current vehicle to vehicle (V2V) communication standard (i.e., IEEE 802.11p) employs a multicarrier system where each of the VEs may use one or more sub-carriers. Thus, efficient and integrated design of channel impulse response (CIR) prediction, beamforming and scheduling is crucial for the successful realization of the future vehicle to infrastructure (V2I) networks. A number of efforts have been made to estimate the CIR of vehicular communication systems. In [3], least square and minimum mean square error (MMSE) estimation techniques are discussed and their performances in different vehicular AdHoc network (VANET) scenarios are thoroughly investigated. In [4], a cross-layer channel estimator for the 802.11p system where known data are inserted at the higher layers is proposed. The Wiener filter approach to estimate the channel transfer function is discussed in [5]. The filter coefficients are evaluated in IEEE 802.11p systems. In [6], channel estimation and tracking algorithms exploiting the transmitted symbols, time domain truncation, decision-directed feedback, pilot information and V2V channel characteristics is presented. In [2], location aware channel state information (CSI) estimation and beamforming is proposed for millimeter wave vehicular communications. The authors of [7] propose a channel prediction based scheduling strategy for a single antenna system in flat fading channels for data dissemination in VANETs. Along this line, a scheduling method that employs successive interference cancellation (SIC) for V2V systems is discussed in [8]. Measurement results show that the coherence time of vehicular channels is sometimes less than 1 ms due to the high mobility of vehicles in highway scenarios [9]. Furthermore, as the scattering environment can rapidly be changed due to mobility, it is not trivial to find a general CIR statistical model for vehicular channels [7], [10]. These two factors create a significant challenge to learn the instantaneous CIR and its statistical model using the conventional training based CIR estimation approach. This is because the estimated CIR will be likely outdated when it is used to transmit data in the subsequent time slots (this is validated in Section IV). One way of addressing this challenge is by just increasing the training overhead. However, such an approach will dramatically reduce the network throughput especially for a multiuser setup as the training overhead increases with the number of VEs. For these reasons, the current paper proposes adaptive channel prediction, beamforming and scheduling design that does not utilize the training signal and CIR statistical model. In this regard, first we apply the well known adaptive recursive least squares (RLS) technique (which does not require the channel statistics) for predicting the next block CIR from the past and current block received signals (a block may have one or more orthogonal frequency division multiplexing (OFDM) symbols) [11], [12]. Then, we jointly design the beamforming and VE scheduling for each sub-carrier to maximize the uplink channel average sum rate by utilizing the predicted CIR. The receive beamforming problem is formulated as a Rayleigh quotient problem where its global optimality is guaranteed. And, the VE scheduling design is formulated as a non-convex integer programming problem where we propose the greedy search based algorithm [13]. The superiority of the proposed channel prediction and scheduling algorithms over the existing ones (i.e., algorithms that employ outdated CIR with a greedy scheduling and predicted CIR with a random VE selection) is demonstrated by numerical simulations. This paper is organized as follows. Section II discusses the system and channel models. In Section III, the proposed CIR prediction, and joint beamforming and scheduling designs are presented. Computer simulation results are provided in Section IV. Finally, conclusions are drawn in Section V. II. S YSTEM AND C HANNEL M ODEL We consider a multiuser system with a transmission scheme having a sampling period Ts and a channel having a maximum delay spread Td . It is assumed that the BS and each VE are equipped with N antennas and 1 antenna, respectively. For these settings, the number of multipath CIR taps L is approximated as L = TTds [14]. The multipath coefficients between the kth VE to the nth BS antenna is denoted as [15] h̄kn = [h̄kn1 , h̄kn2 , · · · , h̄knL ]T . (1) The analytical model for H̄k = [h̄k1 , h̄k2 , · · · , h̄kN ] may vary from one standard to another. In this paper, we assume that each element of h̄kn is independent of others. However, h̄knl is correlated over time. We further assume that the spatial correlation matrix of all multipath components are the same. Under these assumptions, H̄k can be expressed as [16] √ √ (2) H̄k = Pk H̃k Rk where each entry of H̃k is an independent and identically distributed (i.i.d) zero mean circularly symmetric complex Gaussian (ZMCSCG) random variable with unit variance, Rk ∈ C N ×N is a positive semidefinite spatial covariance 2 2 2 2 matrix, and Pk = diag(gk1 , gk1 , · · · , gkL ) ∈ <L×L with gkl being the channel gain corresponding to the lth path. In most wireless standards (e.g., 802.11p), OFDM based transmission is commonly adopted. For such a transmission, the channel coefficient of each sub-carrier has practical importance. In fact, this coefficient can be obtained by linearly combining the multipath tap coefficients (1). To this end, the channel between the kth VE to the BS’s nth antenna in subcarrier s can be expressed as [14], [17] hkns = fsH h̄kn −j 2π M s −j 2π M 2s (3) −j 2π M (L−1)s = [1, e ,e ,··· ,e ] with M where being the fast Fourier transform (FFT) size of the OFDM. Under this model, one can consider the CIR prediction, beamforming and scheduling designs either for the uplink or fsH downlink channels. Here, we consider the uplink channel, and the sth sub-carrier kth VE signal to interference plus noise ratio (SINR) for this channel can be expressed as1 γks = PK i6=k H Pks |wks hks |2 H h |2 + σ 2 |w |2 Pis |wks is ks (4) where hks = [hk1s , · · · , hkN s ]T , Pks (wks ) is the kth VE sth sub-carrier transmitted power (receive beamforming vector) and σ 2 is the noise power at the BS. We assume that H̄k is constant at least for Sc OFDM symbols where Sc is related to the channel coherence time2 . The ith block CIR for the kth VE H̄k [i] can thus be given as [18] √ √ H̄k [i] = Pk [i]H̃k [i] Rk [i]. (5) III. CIR PREDICTION , BEAMFORMING AND SCHEDULING DESIGN This section discusses the proposed CIR prediction, joint beamforming and scheduling design algorithms. A. CIR prediction design As stated in the introduction section, the paper assumes that the CIR statistical model is not known. √ proposed √ Thus, the approach may need to jointly predict Pk [i + 1], Rk [i + 1] and H̃k [i+1] from the past and √ current block √ received signals. Since the time scale at which Pk [i] and Rk [i] are varied is much larger than that √ of H̃k [i] [19], √ [20], we predict H̃k [i+1] by assuming that Pk [j] and are constant for j = √ Rk [j] √ i+1, i, · · · , i−Cb +1, where Pk [i] and Rk [i] are computed from the Cb most recent block received signals and Cb is the design parameter. In the following, we discuss the proposed algorithm to predict H̃k [i + 1]. For better mathematical tractability, we denote the Eigenvalue decomposition of Rk as (we ignore here the time index i since it is clear from the context) svd(Rk ) , Uk Dk UH k (6) where Dk is a Qk × Qk sized diagonal matrix containing the non-zero eigenvalues of Rk arranged in decreasing order. As Qk ≤ N , we can represent the low dimensional equivalent CIR matrix of H̃k ∈ C L×Qk using (6) as q q ˜ = P−1 H̄ U D−1 . H̃ (7) k k k k k ˜ [i] is independent, the CIR prediction Since each element of H̃ k ˜ [i + 1] separately. We utilize can be done for each entry of H̃ k ˜ [i+1] from H̃ ˜ [i], · · · , H̃ ˜ [i− the RLS algorithm to predict H̃ k k k Sb + 1] where Sb is the design parameter. The RLS algorithm is explained as follows [12], [21]. ˜ [i] as f [i] (i.e., ignoring k and Denote an element of H̃ k the entry indexes). The main idea of the RLS algorithm is to predict f [i + 1] from f [i] , [f [i], · · · , f [i − Sb + 1]]T as fˆ[i + 1] = q[i]T f [i]. (8) 1 The methodology used in this paper can be applied for the downlink channel. 2 In the following, we use the word block to denote S consecutive OFDM c symbols. And the predictor q[n] is calculated to optimize n X min q[n] j=n−Sb +1 λn−j |f [j + 1] − q[n]T f [j]|2 (9) where 0 < λ ≤ 1 is a forgetting factor that accounts for a possible non stationarity of the input samples f [j]. After doing some straightforward steps, one can compute q[n] recursively as [12], [21] q[n] = q[n − 1] + τ [n − 1]e[n] (10) where e[n] = f [n] − fˆ[n], τ [n] = Z[n − 1]f [n] λ + f [n]H Z[n − 1]f [n] (11) and matrix Z is the inverse of the sample covariance matrix P the n−j λ f [j]f [j]H which can be calculated recursively as j 1 (I − τ [n]f [n]H )Z[n − 1]. (12) λ One can observe from (10) that q[n] depends on q[n − 1] and τ [n − 1]. This recursive behavior requires appropriate parameter initializations. In the current paper, we employ λ = 0.999, Z[0] = δI and q[0] = 0 with δ = 100 [12]3 . ˜ [i + 1] are predicted, the next Once all the elements of H̃ k task is to perform the joint beamforming and scheduling design which is presented in the next subsection. Z[n] = B. Joint beamforming and VE scheduling design Once the CIR of each VE is predicted, the next task is to schedule VEs to utilize one or more sub-carriers. In practice, a scheduler is designed to optimize some performance criteria. In the current paper, we consider the maximization of the total sum rate achieved at each sub-carrier corresponding to the first OFDM symbol of the (i + 1)th block under a per VE power constraint which can be mathematically formulated as4 max Ks ,Ks ,wks Ks X k=1 p log(1 + γks ), Pks ≤ Pmax , k ∈ Ks (13) p where γks (wks ) is the kth VE sth sub-carrier SINR (receive beamforming vector), Pmax is the maximum transmitted power at each sub-carrier of a VE and Ks is the scheduled set p of VEs at sub-carrier s. Note that since γks is computed using the predicted CIR, this SINR could be different from the true γks achieved at the first OFDM symbol of the (i + 1)th block. The VE scheduling problem (13) is an integer programming non-convex problem which prohibits us from getting the global optimal solution. Here we propose to solve the above problem by utilizing greedy scheduling technique where we sequentially increase the number of VEs (i.e., Ks ) while ensuring a non-decreasing sum rate [13]. In fact, for fixed Ks , the global 3 These initializations may not necessarily yield the optimal performance. More information about the optimal selection of λ can be found in [22]. 4 Note that some applications require a minimum γ p to ensure a certain ks service quality. And considering the rate maximization problem by taking into p account the minimum γks is left for future research. optimal solution that maximizes (4) (which also maximizes (13)) can be obtained by applying the generalized Rayleigh quotient approach [23]. The proposed joint beamforming and VE scheduling algorithm is summarized in Algorithm I. Algorithm I: Joint beamforming and scheduling algorithm. Input: The number of VEs to be scheduled (Kt ). Initialization: Set Kt = {1, 2, · · · , Kt }, Ks = ∅, Ks = 0 and fs (Ws ) = 0, where fs (Ws ) is the objective function of (13) with Ks VEs and Ws = [w1s , w2s , · · · , wKs s ]. while Ks ≤ Kt do • Set u = ∅. for j ∈ Kt and j 6∈ Ks do • Compute fs (W̃s ) with K̃s = Ks ∪ {j} VEs, where W̃s is the receive beamforming for the VEs in K̃s . if fs (W̃s ) > fs (Ws ) then • Set u = j and fs (Ws ) = fs (W̃s ). end if end for if u = ∅ then • Break. else • Set Ks = Ks ∪ {u} and Ks = Ks + 1. end if end while Practical Issues: Up to now, we have provided the framework for the joint adaptive channel prediction, beamforming and scheduling algorithms. In fact, these algorithms require the predicted CIR which is computed by employing H̄k [j], j ≤ i, ∀k. However, since more than one VEs could be scheduled to use a given sub-carrier, H̄k [j] may be observed with additional noise and the CIR of other VEs. In a general setup, the received signal at the sth sub-carrier and jth OFDM symbol can be expressed as ys [j] = fsH H̄k [j]xks [j] + K s −1 X fsH H̄i [j]xis [j] + ns [j] (14) i=1 where xks [j] is the transmitted signal from the kth VE at the sth sub-carrier of jth OFDM symbol, and ns [.] is the received noise at the sth sub-carrier where each of its entries is i.i.d ZMCSCG random variable with variance σ 2 . One can examine (14) for two cases: Ks = 1 and Ks > 1. In the case of Ks = 1, if the kth VE utilizes L sub-carriers FL = [fs1 , fs2 , · · · , fsL ] that ensures FL FH L ≈ I and xks , ∀s are known perfectly, H̄k [j] can be estimated as [15] ˆ [j] = H̄ [j] + n̄[j] H̄ k k (15) where the entries of n̄[.] are i.i.d ZMCSCG random variables each with variance σ 2 . When Ks > 1, one can achieve the CIR expression similar to (15) if there exists a set of sub-carriers Ok such that xks , s ∈ Ok is orthogonal to xis , s ∈ Ok , ∀i 6= k. In the current paper, we assume that the transmitted symbols xks [j], ∀k, j are recovered perfectly at the BS from the received signal ys [j] (i.e., the predicted CSI corresponding to the jth OFDM symbol has sufficient quality to recover xks [j], ∀k, j without any error) and the number of OFDM symbols per block Sc is selected such that the observed samples corresponding to H̄k [j] is as given in (15) for all 40 MMSE Proposed RLS Outdated CIR 5 35 Average sum SE (bps/Hz) Mean square error (MSE) 5.5 4.5 4 3.5 Perfect CIR MMSE Proposed RLS Outdated CIR Random scheduling 30 25 20 15 10 5 0 3 0 50 100 150 200 250 300 350 1 400 Fig. 1. Comparison of MSEs achieved by different CIR predictors. 14 Average SE (bps/Hz) 10 8 6 4 2 0 2.5 5 7.5 10 12.5 15 17.5 VEs. In addition, the spatial covariance matrix Rk of (6) is computed by taking into account the effect of n̄[.] like in [24]. Thus, in practice, the proposed algorithms require training signals just at the beginning of the transmission duration or when the BS is not able to reliably decode the transmitted signals xks [j] which occurs quiet rarely. IV. S IMULATION R ESULTS This section presents simulation results. We consider a typical scenario of IEEE 802.11p standard where the relative powers of gkl , ∀k, l are [0 dB, −6.3 dB, −25.1 dB, −22.7 dB] (i.e., VTV - Expressway Oncoming without Wall, 300 m - 400 m scenario) [25], [26]. The spatial channel covariance matrices for this environment is characterized for the commonly adopted uniform linear array (ULA) model as Rk = 5 6 7 8 Fig. 3. Effect of the maximum number of scheduled VEs Kmax . A. CIR prediction Average SE achieved with single user scheduling. Ck X 4 20 SNR (dB) Fig. 2. 3 where αkij = J0 (2πfk |i − j|) with J0 (.) as the zeroth-order Bessel function and fk is the maximum Doppler frequency normalized by the sampling rate T1s [12]. Furthermore, we set L = 4, M = 64, N = 8, Ts = 166µs, Cb = Sb = 8, the carrier frequency as 5.6 GHz, the speed of each VE as 90 km/hr, Rk = R, ∀k with Ck = 8 and θki , ∀i are selected randomly. The signal to noise ratio (SNR) for and is controlled by each sub-carrier is defined as γ = Pmax σ2 varying Pmax while keeping σ 2 constant. All of the plots are generated for s = 4 by averaging 10000 channel realizations5 . Perfect CIR MMSE Proposed RLS Outdated CIR Random scheduling 12 2 Maximum number of scheduled VEs (K max ) Block index (i) a(θki )a(θki )H (16) i=1 where Ck is the number of clusters in the environment corresponding to the kth VE CIR, θki is the angle of arrival (AoA) for the ith cluster, and a(θ) = 2π 2π √1 [1, ej λ̃ d sin (θ) , · · · , ej(N −1) λ̃ d sin (θ) ]T with λ̃ as the N transmission wave length and d = 0.5λ̃ is the antenna spacing [24]. We assume the well known Jake’s model to capture the channel correlation between H̃k [i] and H̃k [j] as E{(H̃k [i])m,n (H̃k [j])H m,n } = αkij (17) This simulation discusses the accuracy of the predicted CIR coefficients and convergence of the proposed RLS algorithm when γ is set to γ = 20 dB. We compare the mean square error (MSE) values between the true and predicted CIR coefficients for three algorithms in Fig. 1: the MMSE predictor which requires the CIR statistics, the proposed RLS predictor and the design that utilizes outdated CIR. This figure shows that employing the outdated CIR suffers from high prediction error. Furthermore, the MSE achieved by the proposed RLS approach decreases with i and achieves closer to that of the MMSE approach in around 200 blocks. This confirms that the proposed RLS predictor converges to the optimal estimator6 . B. Joint beamforming and scheduling This subsection presents the performance of the proposed joint beamforming and scheduling design. In this regard, we set the total number of VEs as Kt = 24 and Ks ≤ Kmax . We compare the average spectrum efficiency (SE) (i.e., average rate per Hertz) achieved by five approaches as shown in Fig. 2 when Kmax = 1: perfect CIR, MMSE predicted CIR, proposed RLS predicted CIR and outdated CIR, all with the proposed scheduling, and proposed RLS predicted CIR with random scheduling. One can observe from this figure that the average SE achieved by the proposed CIR prediction and scheduling approach is higher than those of random scheduling and outdated CIR ones, and its performance is closer to the 5 Note that similar average performance is observed for other sub-carriers. that the proposed RLS predictor cannot perform better than the MMSE approach as the latter assumes perfect CIR statistical knowledge. 6 Note 18 Average sum SE (bps/Hz) 16 Perfect CIR MMSE Proposed RLS Outdated CIR Random scheduling 14 12 10 8 6 4 2 4 8 12 16 20 24 Total number of scheduled VEs (K t) Fig. 4. Effect of the total number of scheduled VEs Kt . average SE achieved by the MMSE predictor approach which utilizes the CIR statistics. The best average SE is achieved when the CIR is known perfectly which is expected. Next we examine the effect of Kmax on the performance of the approaches when γ is set to 10 dB as shown in Fig. 3. One can observe from this figure that the sum SE degrades with Kmax for all approaches except the perfect CIR case. The potential reason for this is that when Kmax > 1, the scheduling algorithm likely supports more than one VEs and each VE will experience undesired interference which occurs due to the channel prediction error and worsens with Kmax 7 . Lastly, we evaluate the effect of Kt on the performance of the approaches when Smax = 2 and γ = 10 dB as shown in Fig. 4. As can be seen from this figure, the average sum SE achieved by all approaches increase with Kt up to a certain limit which fits with the phenomena observed in [13]. V. C ONCLUSIONS This paper proposes the joint design of adaptive channel prediction, beamforming and scheduling for 5G V2I network. The channel prediction algorithm is designed without assuming the training and CIR model. In this regard, first we utilize the well known RLS technique, which does not require the channel statistics, for predicting the next block CIR. Then, we jointly design the beamforming and sub-carrier scheduling for the uplink communication to maximize the average sum rate by utilizing the predicted CIR. The receive beamforming problem is formulated as a Rayleigh quotient problem where its global optimal solution is guaranteed. And, the VE scheduling design problem is formulated as an integer programming problem where we propose the greedy based algorithm. Simulation results have confirmed the superiority of the proposed channel prediction and scheduling algorithm over the existing ones in terms of CIR accuracy and average rate. R EFERENCES [1] “5G automotive vision,” 2015, ERTICO - ITS EUROPE, 5G-PPP. [2] N. Garcia, H. Wymeersch, E. G. Strm, and D. Slock, “Location-aided mm-wave channel estimation for vehicular communication,” in Proc. IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), July 2016, pp. 1–5. 7 Recall that the proposed greedy algorithm schedules the VEs based on the predicted CIRs which may be different from the true CIRs. [3] A. M. S. Abdelgader, S. Feng, and L. Wu, “On channel estimation in vehicular networks,” IET Communications, vol. 11, no. 1, pp. 142–149, 2017. [4] K. K. Nagalapur, F. Brnnstrm, and E. G. Strm, “On channel estimation for 802.11p in highly time-varying vehicular channels,” in Proc. IEEE International Conference on Communications (ICC), June 2014, pp. 5659–5664. [5] J. Nuckelt, M. Schack, and T. Kurner, “Performance evaluation of Wiener filter designs for channel estimation in vehicular environments,” in Proc. IEEE Vehicular Technology Conference (VTC Fall), Sept 2011, pp. 1–5. [6] M. M. Awad, K. G. Seddik, and A. Elezabi, “Channel estimation and tracking algorithms for harsh vehicle to vehicle environments,” in Proc. IEEE Vehicular Technology Conference (VTC-Fall), Sept 2015, pp. 1–5. [7] F. Zeng, R. Zhang, X. Cheng, and L. Yang, “Channel prediction based scheduling for data dissemination in VANETs,” IEEE Commun. Letters, vol. PP, no. 99, pp. 1–1, 2017. [8] Y. Watanabe, K. Sato, and T. Fujii, “A scheduling method for V2V networks using successive interference cancellation,” in IEEE Vehicular Networking Conference (VNC), Dec. 2016, pp. 1–2. [9] R. C. Daniels and R. W. Heath, “Link adaptation with position/motion information in vehicle-to-vehicle networks,” IEEE Tran. Wireless Commun., vol. 11, no. 2, pp. 505–509, Feb. 2012. [10] L. Azpilicueta, C. Vargas-Rosales, and F. Falcone, “Intelligent vehicle communication: Deterministic propagation prediction in transportation systems,” IEEE Vehic. Techno. Mag., vol. 11, no. 3, pp. 29–37, Sept. 2016. [11] J. Akhtman and L. Hanzo, “Channel impulse response tap prediction for time-varying wireless channels,” IEEE Tran. Vehic. Tech., vol. 56, no. 5, pp. 2767–2769, Sept 2007. [12] D. Schafhuber and G. Matz, “MMSE and adaptive prediction of timevarying channels for OFDM systems,” IEEE Tran. Wireless Commun., vol. 4, no. 2, pp. 593–602, March 2005. [13] T. E. Bogale, L. B. Le, and A. Haghighat, “User scheduling for massive MIMO OFDMA systems with hybrid analog-digital beamforming,” in Proc. IEEE Conference on Communications (ICC), Jun. 2015. [14] D. Tse and P. Viswanath, Fundamentals of Wireless Communication, Cambridge University Press, 2005. [15] T. E. Bogale, L. B. Le, X. Wang, and L. Vandendorpe, “Pilot contamination in wideband massive MIMO system: Number of cells vs multipath,” in Proc. IEEE Global Telecommun. Conf., 2015. [16] F. Talebi and T. Pratt, “Channel sounding and parameter estimation for a wideband correlation-based MIMO model,” IEEE Trans. Veh. Technol., pp. 1 – 9, 2015. [17] H. Zarrinkoub, Understanding LTE with MATLAB: From Mathematical Modeling to Simulation and Prototyping, John W&S, Ltd, 2014. [18] X. Hou, S. Li, C. Yin, and G. Yue, “Two-dimensional recursive least square adaptive channel estimation for OFDM systems,” in Proc. International Conference on Wireless Communications, Networking and Mobile Computing., Sept 2005, vol. 1, pp. 232–236. [19] M. R. Akdeniz, Y. Liu, M. K. Samimi, S. Sun, S. Rangan, T. S. Rappaport, and E. Erkip, “Millimeter wave channel modeling and cellular capacity evaluation,” IEEE J. Select. Areas in Commun., vol. 32, no. 6, pp. 1164 – 1179, Jun. 2014. [20] M. C. Vanderveen, A-J. V. Veen, and A. Paulraj, “Estimation of multipath parameters in wireless communications,” IEEE Trans. Signal Process., vol. 46, no. 3, pp. 682 – 690, Mar. 1998. [21] S. Haykin, Adaptive Filter Theory, PrenticeHall, Englewood Cliffs, NJ, USA, 1991. [22] S. Van Vaerenbergh, I. Santamara, and M. Lzaro-Gredilla, “Estimation of the forgetting factor in kernel recursive least squares,” in Proc. IEEE International Workshop on Machine Learning for Signal Processing, Sept. 2012, pp. 1–6. [23] T. E. Bogale and L. Vandendorpe, “Max-Min SNR signal energy based spectrum sensing algorithms for cognitive radio networks with noise variance uncertainty,” IEEE Trans. Wireless Commun., vol. 30, no. 1, pp. 280 – 290, Jan. 2014. [24] T. E. Bogale, L. B. Le, and X. Wang, “Hybrid analog-digital channel estimation and beamforming: Training-throughput tradeoff,” IEEE Trans. Commun., Dec. 2015. [25] L. Bernado, N. Czink, T. Zemen, and P. Belanovic, “Physical layer simulation results for IEEE 802.11p using vehicular non-stationary channel model,” in Proc. IEEE International Conference on Communications Workshops, May 2010, pp. 1–5. [26] M. A. Ingram, G. Acosta, and L. Dong, “Small-scale fading models for the IEEE 802.11p (WAVE/DSRC) standard,” 2006, Georgia Institute of Technology (Technical Report).
7cs.IT
arXiv:1802.07789v1 [cs.CV] 21 Feb 2018 Semantic Segmentation Refinement by Monte Carlo Region Growing of High Confidence Detections Philipe A. Dias Henry Medeiros [email protected] [email protected] EECE, Marquette University Milwaukee, WI, USA Abstract tasks aim at pixel-wise classification of known objects or of different instances of these objects. These subproblems aim to achieve increasingly complex goals and have therefore been addressed with different levels of success. In recent years, the combination of Deep Convolutional Neural Networks (DCNN) and increasingly larger publicly available datasets has led to substantial improvements in the state-of-the-art of image classification tasks [15, 12]. Similar advances became then possible for object detection with the advent of region proposal networks (RPN) [23]. For segmentation tasks, however, the performance of typical DCNNs architectures is limited by the typical downsampling (pooling) intrinsic to such networks. Downsampling is employed to learn hierarchical features (from lowlevel to high-level features), but it ultimately leads to imprecise, coarse segmentation in scenarios that require pixelwise predictions. Different strategies with varying levels of complexity have been proposed to address this limitation, including atrous convolutions [3], upsampling strategies [18, 24, 17], and post-processing based on superpixels [20] or conditional random fields (CRFs) [3, 14]. Although these methods represent significant steps towards solving this problem, the segmentation they produce tend not to be finely aligned with the boundaries of the objects. In this paper, we propose the Region Growing Refinement (RGR) algorithm, a post-processing module that operates on the principle of appearance-based region growing to refine the predictions generated by a DCNN for semantic segmentation. Based on the classification scores available from the detector, our method first divides the image into three regions: high confidence background, high confidence object, and uncertainty region. The pixels within the uncertainty region, which are the ones that tend to be misclassified by DCNN-based methods, are then labeled by means of region growing. We apply Monte Carlo sampling to select initial seeds from the high confidence regions, which are then grown using a similarity criterion based on a distance metric computed in the 5-D space of spatial and color coordinates. Our model has the advantage of not requiring any Despite recent improvements using fully convolutional networks, in general, the segmentation produced by most state-of-the-art semantic segmentation methods does not show satisfactory adherence to the object boundaries. We propose a method to refine the segmentation results generated by such deep learning models. Our method takes as input the confidence scores generated by a pixel-dense segmentation network and re-labels pixels with low confidence levels. The re-labeling approach employs a region growing mechanism that aggregates these pixels to neighboring areas with high confidence scores and similar appearance. In order to correct the labels of pixels that were incorrectly classified with high confidence level by the semantic segmentation algorithm, we generate multiple region growing steps through a Monte Carlo sampling of the seeds of the regions. Our method improves the accuracy of a state-ofthe-art fully convolutional semantic segmentation approach on the publicly available COCO and PASCAL datasets, and it shows significantly better results on select sequence of the finely-annotated DAVIS dataset. 1. Introduction Image understanding is a primary goal of computer vision, which is crucial to several applications ranging from activity recognition to object tracking, autonomous navigation, security and surveillance, among many others. One of the most important aspects of image understanding is the determination of the objects present in the image. Such determination can be carried out at different levels of granularity, which correspond to four well-known subproblems of image understanding: image classification, object detection, semantic segmentation, and instance segmentation. While the objective of image classification is to label the scene at the image-level and object detection attempts to localize the bounding boxes of known objects, segmentation 1 dataset-specific parameter optimization, working in a fully unsupervised manner. We employ the Fully Convolutional Instance-aware Semantic Segmentation (FCIS) algorithm [16], the winner of the MS COCO 2016 Semantic Segmentation Challenge [17], as a predictor module as well as the baseline for our performance evaluation. When evaluating our results on the MS COCO dataset, we observed that the available ground truth annotations contain non-negligible inaccuracies in terms of adherence to the actual boundaries of the objects. To assess the effects of this problem and achieve a more accurate evaluation of the benefits of our approach, we also assess its efficacy on the PASCAL VOC2012 [6] validation set as well as on selected video sequences from the DAVIS (Densely Annotated VIdeo Segmentation) dataset [22]. Compared to the first two datasets, annotations provided for the DAVIS dataset are more fine-grained, with tighter adherence to actual object real boundaries. As a result, in addition to relatively small increases in segmentation accuracy for the MS COCO dataset (+1.5% in AP ) and the PASCAL validation sets (+0.5% in mAP %), we report significantly better quantitative results for the DAVIS sequences (+3.2% in IoU %), which more realistically reflect the segmentation improvement observed through qualitative (visual) inspection. 2. Related Work The relatively recent development of DCNNs trained on large publicly available datasets represented an inflection point in image understanding research. Compared to the period when models based on hand-engineered features (e.g. HOG [5], SIFT [19]) were the norm, currently the state-ofthe-art in object recognition tasks is being improved at a dramatically faster pace. Between 2011 and 2015, the top5 classification error on the ImageNet dataset was reduced from 25.8% to 3.57% [12]. However, traditional CNN-based methods that are effective for image classification and object detection present limitations for segmentation tasks. The combination of max-pooling and striding operations constitute a standard strategy for learning hierarchical features, which are a determining factor in the success of deep learning models. They explore the transition invariance favored by image-level labeling tasks, i.e., the fact that only the presence of an object matters, not its location. Such premise, however, does not hold for pixel-dense classification tasks, which require precise object localization. As pointed out by Chen et al. in [3], such spatial insensitivity and image downsampling inherent to conventional DCNNs are two major hindering factors for their performance in image segmentation. A particularly noticeable effect is that these methods generate coarse segmentation masks, with limited boundary adherence. One particularly successful strategy investigated for seg- mentation tasks is the concept of fully convolutional networks (FCNs) [18]. In FCNs, the traditionally fully connected layers at the end of conventional CNNs are replaced by convolutional layers, which upsample the feature maps to generate a pixel-dense prediction. Different upsampling or decoding approaches have been proposed, including the use of deconvolution layers [21, 18], and encoder-decoder architectures with skip-layer connections [24, 13, 11, 17]. While these approaches aim at recovering the information lost due to downsampling, other methods focus on reducing the downsampling rate. The Deeplab architecture [3] is one such method in which the concept of dilated (or atrous) convolutions is successfully employed to reduce the downsampling rate from 1/32 to 1/8. Such strategy, however, performs convolutions on high-resolution feature maps, requiring substantially more computational resources than other approaches. A variation of the semantic segmentation problem is instance segmentation, which requires detecting and segmenting individual object instances. Coarse segmentations are a significant challenge for this type of task, since neighboring instances of objects of the same class are frequently merged into a single segmentation. Dai et al. in [4] introduce the concept of instance-sensitive FCNs, in which an FCN is designed to compute score maps that determine the likelihood that a pixel belongs to a relative position (e.g.right-upper corner) of an object instance. FCIS [16] is an extension of this approach, which achieved the state-of-the-art performance and won the COCO 2016 segmentation competition. In addition to adjustments in CNN architectures, multiple works have investigated the use of low-level information strategies to construct models for object detection and semantic segmentation. Following the success of CNNs on image classification tasks, Girschick et al. in [9] introduced the model known as RCNN that performs object detection by evaluating multiple region proposals. In RCNN, the region proposals are generated using Selective Search [26], which consists on merging a set of small regions [8] based on different similarity measures, an approach closely related to the concept of superpixels. Superpixel are perceptually meaningful clusters of pixels, which are grouped based on color similarity and other low-level properties. Stutz et al. [25] provide a review of existing superpixel approaches, with a comprehensive evaluation of 28 state-of-the-art algorithms. One of the most widely-used method is the Simple Linear Iterative Clustering (SLIC) algorithm [2], a k-means-based method that groups pixels into clusters according to their proximity in both spatial and color spaces. Semantic segmentation models using superpixels traditionally employ them as a preprocessing step. The image is first divided into superpixels, followed by a prediction step in which each element is individually evaluated using engineered hierarchical features [10] or DCNNs [7, 20]. In addition to the generation of region proposals or presegmentation elements, local-appearance information has been also employed in post-processing steps to improve segmentations obtained with deep CNN models. One such post-processing approach is to model the problem as a CRF defined over neighboring pixels or small patches, which however might lead to excessive smoothing of boundaries due to the lack of long-range connections [14]. Krähenbühl et al. in [14] introduces an efficient algorithm for fully connected CRFs containing pairwise potentials that associate all pairs of pixels in a image. This algorithm is successfully exploited by the Deeplab model [3] to produce fine-grained segmentations. However, this refinement model contains parameters that have to be optimized in a supervised manner when applied to different datasets. 3. Proposed Approach The method we propose for refinement of segmentation boundaries is a generic post-processing module that can be coupled to the output of any CNN or similar model for semantic segmentation. Our RGR algorithm consists of four main steps: 1) identification of low and high confidence classification regions; 2) Monte Carlo sampling of initial seeds; 3) region growing; and, 4) majority voting and final classification. The operations that comprise these steps are described in detail below. In our description, we make reference to Figure 1 and Algorithm 1, which lists the operations performed by our method for each proposed detection in an image. If multiple detections are present, the algorithm is executed once for each detection. 1) Step 1 - Thresholding the image into three regions: Conventional models typically infer a final classification by pixel-wise thresholding the scores obtained for each class. In such case, the selection of an adequate threshold represents a trade-off between false positives and false negatives. Instead of relying on intermediate threshold values, our refinement module directly exploits the available classification scores to differentiate between three regions: a) high confidence foreground (or object) RF ; b) high confidence background RB ; and, c) uncertainty region RU . As defined in Eq. 1, these regions are identified using two high confidence thresholds τF and τB RF = {pj |M (pj ) > τF } , RU = {pj |τB < M (pj ) < τF } , (1) RB = {pj |M (pj ) < τB } , where pj is the j-th pixel in the input image I, and M (pj ) is its corresponding detection score computed according to the detection confidence map M . High confidence regions correspond to areas where pixels present scores near the extremes of the likelihood range. For normalized scoremaps, values lower than a threshold τB ∼ 0.0 identify pixels in the high confidence background, while values larger than τF ∼ 1.0 indicate high confidence foreground elements. In order to recover possible false negatives, morphological thickening is performed on the background RB boundaries. The fourth leftmost image in Figure 1 illustrates the division of the image into the three regions RF , RU , and RB . 2) Step 2 - Monte Carlo sampling of initial seeds: Inspired by the notion of pixel affinity employed by many algorithms for superpixel segmentation, our method applies a region growing approach to classify pixels within the uncertainty zone. More specifically, we build on the simple non-iterative clustering (SNIC) algorithm [1]. The first difference between RGR and SNIC is the selection of initial seeds. SNIC selects initial seeds on a regular grid over the whole image. In contrast, our algorithm selects seeds by Monte Carlo sampling the high confidence regions. Such an adaptation guarantees that pixels composing the uncertainty region will be labeled according to high confidence information. Our Monte Carlo approach consists of ns iterations. In each iteration i, a set S (i) of initial seeds is defined by uniformly sampling the high-confidence area RH = RB ∪ RF . Let ph represents pixels within the region RH , where the index h = 1, . . . , |RH |. Uniform sampling of seeds can thus be performed index-wise according to h ∼ U (1, |RH |). We determine the number of seeds to be sampled as a function of the sampling domain area (i.e. |RH |) and the desired average spacing between samples. Such a spacing between seeds is necessary to ensure the availability of paths through which all initial centroids can propagate through the uncertainty region. By drawing multiple sets of seeds, we reduce the impact of possible high confidence false positives on the final segmentation. 3) Step 3 - Region Growing: Initial centroids are grown according to an adaptation of the SNIC algorithm. The dashed block at the bottom of Figure 1 illustrates the sequence of operations performed by RGR for region growing. Like its predecessor SLIC [2], SNIC measures the similarity between a pixel and a centroid as their distance in a five-dimensional space of color and spatial coordinates. Let the spatial position of a pixel be represented by a vector x = [x y]T , while its color is expressed in the CIELAB color-space by c = [l a b]T . The distance between a pixel j and a centroid k is given by s kxj − xk k22 kcj − ck k22 + , (2) dj,k = θs θm where θs and θm as normalizing factors for spatial and color distances, respectively. Aiming at lower computational times, we restrict the region growing to a Region of Interest (RoI) around the uncertain zone RU . Based on the spatial distance to RU , the Figure 1. Best viewed in color. Diagram illustrating the sequence of tasks performed by the proposed RGR model for segmentation refinement. Each task and its corresponding output (shown above the arrows) are described in Algorithm 1. background RB can be split into two regions: far background Rf B and near background RnB . Since the far background is unlikely to influence the clustering of the uncertain region, Rf B can be ignored during the region growing computation. Hence, we define the RoI for region growing as RoI = RnB ∪ RF ∪ RU . (3) The region growing implementation relies on a priority queue, which is constantly populated with nodes that correspond to unlabeled pixels 4 or 8-connected to a region being grown. This queue is sorted according to the similarity between the candidate pixel and the growing region, given by the metric defined in Eq. 2. While the queue is not empty, each iteration consists of: 1) popping the first element of the queue, which corresponds to the unlabeled pixel that is mostly similar to a neighboring centroid k; 2) annexing this (i) pixel to the respective cluster ψk ; 3) updating the region centroid; and, 4) populating the queue with neighbors of this pixel that are still unlabeled. Compared to the original SNIC algorithm, we add a con- straint in order to reduce the incidence of false detections. A node is only pushed into the queue if its distance to the corresponding centroid is smaller than a certain value dMax . In this way, we ensure that an unlabeled pixel within RU will only inherit information from high confidence pixels that are sufficiently similar to it. This creates the possibility of “orphan” elements, i.e., pixels for which no node is ever created. Such pixels are therefore classified as background. For each set of initial seeds Si the region growing process generates as output a cluster map Ψ(i) that associates each (i) pixel to a respective cluster ψk . 4) Step 4 - Majority voting and final classification: Following the region growing process, RGR conducts a majority voting procedure to ultimately classify each generated cluster into foreground or background. As expressed in Eq. 4, a pixel pj contributes a positive vote for foreground classification if its original prediction score M (pj ) is larger than a threshold τ0 . We compute the ratio of positive votes across (i) all pixels pj ∈ ψk , generating a refined likelihood map Algorithm 1 RGR refinement algorithm Input: Image I, confidence map M Output: Refined semantic segmentation Ŷ of image I 1: Threshold M into three regions: background RB , foreground RF and uncertain zone RU 2: Define a Region of Interest (RoI) according to Eq. 3 3: for i = 1 to ns do 4: Form a set S (i) of initial seeds by uniformly sampling from RB ∪ RF 5: Generate a set of clusters Ψ(i) by performing region growing using the SNIC algorithm with S (i) as input (i) For each generated cluster ψk ∈ Ψ(i) , compute confidence map M̂ (i) according to Eq. 4 7: end for 8: Compute the pixel-wise average M of M̂ (i) , i = 1, . . . , n 9: Generate Ŷ by pixel-wise thresholding M 6: M̂ (i) for each set of clusters according to Y = {pj |M (pj ) > τ0 } , M̂ (i) (pj ) = |Y | (i) |ψk | (4) 4.1. COCO 2016 segmentation dataset (5) Based on the COCO official guidelines, we evaluate the performance obtained by FCIS and FCIS+RGR on the validation set composed of 40k images. Table 4 summarizes the performance of both methods according to the standard COCO metrics including AP (averaged over 0.5 : 0.95 IoU thresholds), AP50 , AP75 APS , APM APL (AP at different scales). While increasing the number of true positive detections (+0.3% in AR), for all scenarios the naive FCIS+SPPX approach decreases the AP by introducing a larger number of false positives into the final detection. Our refinement model, RGR, on the other hand, increases the baseline FCIS overall performance by 1.8%. Compared to the variation of +0.5% in AP50 , the increase of 2.8% in AP75 demonstrates that RGR is particularly successful for cases where the detections obtained from the input CNN are accurately located. In addition, Figure 2 presents the average precision obtained for each of the 80 COCO categories. Due to its region growing strategy based on local affinity characteristics, it is natural that RGR refinement is especially effective for objects with more uniform appearance (e.g. airplane, frisbee, baseball bat). Nevertheless, these results also demonstrate the robustness of the refinement provided by RGR, since none of the object categories observe a noticeable decrease in average precision. A closer inspection by means of a qualitative analysis also shows that the metrics obtained might be misleading. Despite the extensive efforts and systematic approaches described in [16] to create such a huge dataset, for some in- The likelihood maps M̂(i) obtained from the ns Monte Carlo samplings are P averaged to generate a final pixel dense ns score map M = n1s i=1 M (i) . Finally, each pixel is classified into foreground if more than 50% of its average votes correspond to positives. Otherwise, the region is labeled as background. Mathematically, this is equivalent to Ŷ (pj ) = 1M(pj )>0.5 . to 1.5 × τ0 , hence 0.6. As for the background detection, we configure the high confidence lower threshold as τB = 0.0. We opted for the publicly available FCIS model [16] trained on the MS COCO 2016 dataset, which represents the state-of-the-art approach on semantic segmentation, as the input for our refinement algorithm as well as the baseline comparison approach. We denote the combination of FCIS and the refinement module RGR as FCIS+RGR. Since RGR works in a region growing manner that is inspired by the concept of superpixel segmentation, our performance analysis also includes FCIS+SPPX, a naive refinement method that consists of performing majority voting within superpixels generated with SNIC. We also considered refinement using the CRF approach proposed in [14]. We evaluated the efficacy of this refinement technique on both PASCAL validation set and DAVIS selected sequences. In order to evaluate generalization capability, these experiments were performed without any dataset-specific fine-tuning of parameters. Decrease in average precision values were observed for both datasets, revealing that parameters optimization is crucial for this method to be efficient. (6) 4. Experiments To the best of our knowledge, the COCO dataset is the largest publicly available dataset for semantic/instance segmentation, with a total of 2.5 million labeled instances in 328, 000 images [17]. However, as discussed in Section 4.1, COCO ground truth annotations contain imprecisions intrinsic from its labeling procedure. Hence, with the purpose of minimizing the influence of dataset-specific errors, we assess the performance of FCIS and FCIS+RGR on: i) the COCO 2016 validation set; ii) the PASCAL VOC 2012 dataset; and, iii) selected video sequences of the DAVIS dataset. For all our experiments, we defined the thresholds as follows. First, τ0 corresponds to the original detector optimal threshold. For FCIS this value is 0.4, as reported in [16]. To identify high confidence foreground, we empirically selected a high confidence threshold τF corresponding FCIS FCIS + SPPX FCIS + RGR AP (%) 35.1 34.9 36.9 AP50 (%) 60.1 59.0 60.6 COCO 2016 (val) AP75 (%) APS (%) 36.5 9.8 36.4 9.3 39.3 11.4 APM (%) 38.4 38.2 40.7 APL (%) 59.8 59.6 60.5 PASCAL 2012 (val) mAP (%) 70.6 70.9 71.1 DAVIS IoU (%) 71.2 72.8 74.4 Table 1. Comparison between results obtained by FCIS+RGR and FCIS on COCO 2016 validation set. stances the segmentation annotations provided as ground truth lack accurate adherence to real object boundaries. As consequence, a visual inspection reveals that improvements obtained through RGR refinement are not reflected in the final metrics for a significant number of images. Figure 3 provides multiple examples of the imprecisions in ground truth annotations, collected from different object classes. While for the airplane example the segmentation obtained using RGR is clearly better in qualitative terms, its overlap (IoU ) with the ground truth is 7.7% lower than the one associated with the FCIS output. 4.2. PASCAL VOC 2012 segmentation dataset Table 4 also contains a summary of the results obtained by FCIS, FCIS+SPPX and our method FCIS+RGR. The segmentation refinement generated using RGR provides final mAP slightly better than both FCIS (+0.5%) and the refined version using naive superpixel-wise majority voting. However, as illustrated in Figure 4, a qualitative inspection reveals that such a small difference in performance does not properly reflect the higher boundary adherence provided by the refinements produced by RGR. Although the PASCAL annotations are more pixel-accurate than the ones available for COCO, they contain 5 pixels-wide border areas that are not consider neither object nor background, ultimately limiting the evaluation of boundary adherence. 4.3. DAVIS 2016 selected video sequences Given the aforementioned inaccuracies in the annotations available for the COCO and PASCAL datasets, we additionally report quantitative results on selected video sequences of the DAVIS dataset. The DAVIS dataset for Video Object Segmentation is composed by high quality video sequences [22], with pixel-accurate ground truth segmentation for each frame. From its 50 original video sequences, we selected a total of 24 sequences that contain Figure 2. Mean average precision values obtained by FCIS and FCIS+RGR for each of the 80 COCO categories. Figure 3. Examples of detections on the COCO dataset. From left to right: original image, ground truth, FCIS detection, FCIS+RGR. Ground truth annotations for images in the second and third rows are also examples of annotation with poor boundary adherence. Figure 4. Examples of detections on the PASCAL VOC 2012 dataset. From left to right: original image, ground truth, FCIS detection, FCIS+RGR. target objects whose corresponding classes are contained within the 80 objects categories composing the COCO dataset. Moreover, these sequences encompass 13 different COCO classes, including classes for which FCIS+RGR did not provide significant performance improvements on the COCO evaluation (e.g. person, bicycle, boat and bear). As summarized in Table 4, segmentations obtained using FCIS+RGR have an average IoU 3.2% higher than the original FCIS ones, while 1.6% better than the results obtained using a naive superpixel-wise majority voting for refinement. Official metrics for performance evaluation on the DAVIS also include a contour accuracy metric F, which corresponds to a contour F-measure computed based on contour-based precision and recall. Segmentations refined using RGR yielded an increase of 2.8% in F, confirming its ability to improve boundary adherence. Figure 6 presents the results obtained for each video Figure 5. Mean average precision (mAP ) obtained by FCIS and FCIS+RGR for each of the PASCAL VOC 2012 classes (val). the robustness against high confidence false positives, errors might be propagated if the score maps collected from the detector module (CNN) contain regions with high concentration of false positives. An example of such case is found in Figure 7. Given the high confidence of the false positives generated by the FCIS model for internal parts of the bicycle wheels, RGR is therefore unable to correct these mistakes and hence these regions remain incorrectly segmented. 5. Conclusion Figure 6. Mean IoU (Jaccard) obtained by FCIS and FCIS+RGR for each of the selected DAVIS 2016 video sequences. sequence, with FCIS+RGR providing improvements in a range from 1.1% to 6.9% depending on the sequence. The fact that larger quantitative improvements are obtained for the DAVIS sequences corroborates our argument that the annotations available for the COCO and PASCAL datasets provide limited information regarding boundary accuracy/adherence of segmentation methods. We have presented RGR, an effective post-processing algorithm for segmentation refinement. Traditionally, the final classification step of existing methods for semantic segmentation consists of thresholding score maps obtained from DCNNs. Based on the concepts of Monte Carlo sampling and region growing, our algorithm achieves an adaptive thresholding by exploiting high confidence detections and low-level image information. Our results demonstrate the efficacy of RGR refinement, with precision increases on three different segmentation datasets. Moreover, we highlight limitations of existing datasets in terms of boundary adherence of available ground truth annotations. This is an intrinsic limitation of annotations procedures that rely on approximating segmentations as polygons. While the quality of the segmentation is proportional to the number of vertices selected by the user, on the other hand selecting more points increases the labeling time per object. As future work, we consider exploiting RGR for improving annotations available for existing datasets or designing an alternative annotation tool. Finally, we hypothesize that the performance of existing DCNNs for semantic segmentation could be improved by training with RGR as an additional step before computing losses. Such an arrangement could lead to a detector module that optimally interacts with RGR, identifying keypoints for the refinement process. References Figure 7. Examples of detections on the DAVIS dataset. From left to right: original image, ground truth, FCIS detection, FCIS+RGR. 4.4. Failure cases As demonstrated by the experimental results, the quality of the refinement obtained using RGR depends on the accuracy of the detector model used as input, especially in terms of localization. Although Monte Carlo sampling improves [1] R. Achanta and S. Sabine. Superpixels and Polygons using Simple Non-Iterative Clustering. In CVPR ’17, pages 4651– 4660, 2017. 3 [2] R. Achanta, A. Shaji, K. Smith, A. Lucchi, P. Fua, and S. Süsstrunk. SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(11):2274–2281, 2012. 2, 3 [3] L.-C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and A. L. Yuille. Deeplab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. arXiv preprint arXiv:1606.00915, 2016. 1, 2, 3 [4] J. Dai, K. He, Y. Li, S. Ren, and J. Sun. Instance-sensitive fully convolutional networks. In European Conference on Computer Vision, pages 534–549. Springer, 2016. 2 [5] N. Dalal and B. Triggs. Histograms of oriented gradients for human detection. In Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on, volume 1, pages 886–893. IEEE, 2005. 2 [6] M. Everingham, L. Van Gool, C. K. I. Williams, J. Winn, and A. Zisserman. The PASCAL Visual Object Classes Challenge 2012 (VOC2012) Results. http://www.pascalnetwork.org/challenges/VOC/voc2012/workshop/index.html. 2 [7] C. Farabet, C. Couprie, L. Najman, and Y. LeCun. Learning hierarchical features for scene labeling. IEEE transactions on pattern analysis and machine intelligence, 35(8):1915– 1929, 2013. 3 [8] P. F. Felzenszwalb and D. P. Huttenlocher. Efficient graphbased image segmentation. International journal of computer vision, 59(2):167–181, 2004. 2 [9] R. Girshick, J. Donahue, T. Darrell, and J. Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pages 580–587, 2014. 2 [10] S. Gould, J. Rodgers, D. Cohen, G. Elidan, and D. Koller. Multi-class segmentation with relative location prior. International Journal of Computer Vision, 80(3):300–316, 2008. 3 [11] B. Hariharan, P. Arbeláez, R. Girshick, and J. Malik. Hypercolumns for object segmentation and fine-grained localization. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, volume 07-12-June, pages 447–456, 2015. 2 [12] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 770–778, 2016. 1, 2 [13] A. Kendall, V. Badrinarayanan, and R. Cipolla. Bayesian SegNet: Model Uncertainty in Deep Convolutional EncoderDecoder Architectures for Scene Understanding. arXiv preprint arXiv:1511.02680, 2015. 2 [14] P. Krähenbühl and V. Koltun. Efficient Inference in Fully Connected CRFs with Gaussian Edge Potentials. In Advances in neural information processing systems, pages 109– 117, 2011. 1, 3, 5 [15] A. Krizhevsky, I. Sutskever, and G. E. Hinton. ImageNet Classification with Deep Convolutional Neural Networks. Advances In Neural Information Processing Systems, pages 1–9, 2012. 1 [16] Y. Li, H. Qi, J. Dai, X. Ji, and Y. Wei. Fully Convolutional Instance-aware Semantic Segmentation. arXiv preprint arXiv:1611.07709, 2016. 2, 5 [17] G. Lin, A. Milan, C. Shen, and I. Reid. RefineNet: MultiPath Refinement Networks for High-Resolution Semantic Segmentation. arXiv preprint arXiv:1611.06612, 2016. 1, 2, 5 [18] J. Long, E. Shelhamer, and T. Darrell. Fully convolutional networks for semantic segmentation. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, volume 07-12-June, pages 3431–3440, 2015. 1, 2 [19] D. G. Lowe. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of Computer Vision, 2004. 2 [20] M. Mostajabi, P. Yadollahpour, and G. Shakhnarovich. Feedforward semantic segmentation with zoom-out features. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 3376–3385, 2015. 1, 3 [21] H. Noh, S. Hong, and B. Han. Learning deconvolution network for semantic segmentation. In Proceedings of the IEEE International Conference on Computer Vision, volume 2015 Inter, pages 1520–1528, 2015. 2 [22] F. Perazzi, J. Pont-Tuset, B. McWilliams, L. V. Gool, M. Gross, and A. Sorkine-Hornung. A Benchmark Dataset and Evaluation Methodology for Video Object Segmentation. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 724–732, 2016. 2, 6 [23] S. Ren, K. He, R. Girshick, and J. Sun. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. IEEE Transactions on Pattern Analysis and Machine Intelligence, 39(6):1137–1149, 2017. 1 [24] O. Ronneberger, P. Fischer, and T. Brox. U-net: Convolutional networks for biomedical image segmentation. In International Conference on Medical Image Computing and Computer-Assisted Intervention, pages 234–241. Springer, 2015. 1, 2 [25] D. Stutz, A. Hermans, and B. Leibe. Superpixels: An evaluation of the state-of-the-art. Computer Vision and Image Understanding, 2017. 2 [26] J. R. R. Uijlings, K. E. A. Van De Sande, T. Gevers, and A. W. M. Smeulders. Selective search for object recognition. International Journal of Computer Vision, 104(2):154–171, 2013. 2
1cs.CV
arXiv:1605.03733v1 [cs.SY] 12 May 2016 Kernel-based system identification from noisy and incomplete input-output data Riccardo S. Risuleo, Giulio Bottegal and Håkan Hjalmarsson ∗ May 13, 2016 Abstract In this contribution, we propose a kernel-based method for the identification of linear systems from noisy and incomplete input-output datasets. We model the impulse response of the system as a Gaussian process whose covariance matrix is given by the recently introduced stable spline kernel. We adopt an empirical Bayes approach to estimate the posterior distribution of the impulse response given the data. The noiseless and missing data samples, together with the kernel hyperparameters, are estimated maximizing the joint marginal likelihood of the input and output measurements. To compute the marginal-likelihood maximizer, we build a solution scheme based on the Expectation-Maximization method. Simulations on a benchmark dataset show the effectiveness of the method. 1 Introduction Common formulations of system identification problems postulate the perfect knowledge of the input signal feeding the unknown system [1]. In many applications however, the input signal is available only in a noisy version, giving raise to a setup usually referred to as an errors-in-variables (EIV) model [2]. Static EIV models have been subject of extensive studies in the statistical literature since the beginning of the last century [3]; later the system identification community has become interested in dynamical EIV models [4, 5, 2]. Identification of EIV systems is a challenging task; even in the linear case, standard least-squares yields biased estimates, due to the presence of noise in the regressors. Therefore, lots of efforts have been devoted to the development of ad-hoc methods for EIV systems. Bias eliminating least-squares (BELS) have ∗ R. S. Risuleo, G. Bottegal and H. Hjalmarsson are with the ACCESS Linnaeus Center, School of Electrical Engineering, KTH Royal Institute of Technology, Sweden (risuleo;bottegal;[email protected]). This work was supported by the European Research Council under the advanced grant LEARN, contract 267381 and by the Swedish Research Council under contract 621-2009-4017. 1 been introduced in [6] to correct the bias of standard least-squares. Another method for the identification of EIV systems has been obtained by generalizing the so-called Frisch scheme, originally developed for static EIV models [3], to dynamic models. Interestingly, the dynamic Frisch scheme provides a unique identified model under mild conditions [7]. This is in contrast with the static case, where in general many models are compatible with the observed data. The accuracy of the Frisch scheme for dynamic system identification has been extensively studied in the literature [8]; the method has been recently extended to more general noise setups [9, 10, 11]. Other EIV identification methods rely upon maximum-likelihood criteria. Both time-domain [12, 13] and frequencydomain [14] approaches have been developed in the past; for a survey and a comparison of the maximum likelihood methods see [15]. In this paper, we consider a more general dynamic EIV setup. Specifically, we assume that some of the samples may be missing, for instance due to lossy transmission channels or sensor malfunction. Therefore, our task is to jointly identify the system and reconstruct the missing input-output values. Some techniques to deal with this problem have been proposed in the past, both in time and frequency domains [16, 17, 18, 19, 20]. Recently, regularization techniques based on nuclear norm have been proposed for system identification with missing data [21, 22]. The method described in this paper to deal with EIV models with missing data relies on a regularized kernel-based approach. Interpreting kernel-based regularization as a Gaussian regression problem [23], we model the unknown impulse response of the system as a zero-mean Gaussian random vector. The covariance matrix is given by the recently introduced stable spline kernel [24, 25], which penalizes non-exponentially stable systems. According to the empirical Bayes (EB) paradigm [26], we obtain an impulse response estimator as a function of the noiseless input and the kernel hyperparameters. These quantities are estimated maximizing the joint marginal likelihood (marginal likelihood) of the noisy inputs and outputs. We devise an iterative algorithm to solve the marginal likelihood maximization problem, based on the EM method. We briefly address the problem of identifiability. We test the proposed approach with numerical simulations. In this paper we consider the case of both missing input and missing output samples, as well as noisy data; as compared to [27] where a kernel-based approach is adopted for the case of noiseless input and missing output samples. The paper is organized as follows. In Section 2 we formulate the problem the identification of EIV models with missing data. In Section 3 we show how to estimate the system impulse response. In Section 4 we solve the marginal likelihood problem that yields the missing samples and the kernel hyperparameters. In Section 5 we discuss some pitfalls in the model. In Section 6 we validate our method on a benchmark dataset. In Section 7 we discuss our results and conclude the paper. 2 1.1 Notation b We denote by “{ak }” a sequence of scalars ak indexed by k; “{ak }k=a ” is the b set of ak with k ranging from a to b. Given {ak }k=a , “a” indicates the column vector of the stacked scalars and “ai ” indicates the ith element of said vector. If a ∈ RN is a column vector, “Tm×n (·)” indicates the Toeplitz operator that associates to the vector a the m × n matrix A such that (   ai−j+1 , i ≥ j, i − j + 1 ≤ N, (1) A i,j = 0, otherwise. The symbol “δi,j ” denotes the Kronecker delta and “⊗” is the standard Kronecker product between matrices. The symbol “ ∼ =” indicates equality up to an additive constant. 2 Problem formulation We consider the problem of identifying a dynamic system from noisy samples of input and output. Figure 1 shows a schematic representation of the setup under study. The system is strictly causal, asymptotically stable, and linear wt ηt + vt S ut εt + yt Figure 1: Block scheme of the system setup. time-invariant. The input-output relation can be represented as vt = ∞ X gk wt−k , (2) k=1 where the gk is the (unknown) impulse response of the system. The objective is to reconstruct the samples of the impulse response from N samples of the input ut and output yt . These samples are measurements of the true system input wt and output vt , corrupted by sensor noises ut = wt + ηt , y t = vt + ε t . (3) The noise sequences ηt and εt are assumed mutually independent, Gaussian and white, with unknown variance σu2 and σy2 , respectively. The ratio γ = σy2 /σu2 is assumed known, in order to guarantee identifiability (see e.g. [5]). We suppose that the system is at rest prior to the collection of the measurements, that is wk = 0, vk = 0, for all k < 1. 3 We assume also that some of the samples are not available; see the following example. Example 1. We have run a system for N = 9 time instants collecting the following measurements:  u1  y1 × u3 u4 × × u7 y2 × y4 y5 y6 ×  u9 ,  × y9 . × N u u such that 1 ≤ tiu < ti+1 ≤ N, Define the set of natural numbers {tuk }k=1 y Ny and utui is an available measurement. In a similar fashion define {tk }k=1 . These sets indicate the Nu and Ny time instants at which we have available sensor measurements of the input and output respectively. We define the available measurement vectors ũ ∈ Nu and ỹ ∈ Ny such that R R ũk = utuk , k = 1, . . . , Nu , ỹk = ytyk , k = 1, . . . , Ny . P (4) Py as the Nu ×N respectively Ny ×N Furthermore, define the operators u and matrices defined by    , u i,j = δi,tu j P Py i,j = δi,t y j . (5) By construction, these matrices are right semi-orthogonal : PuPTu = IN u Py PTy = IN ; , (6) y they have full row rank and they represent the mappings betweev the complete data and the available data: ũ = Pu u , ỹ = Py y, (7) where u and y are vectors of all the stacked values of all (available and not) measurements of input and output. Example 1 (continued). The times of available input measurements are: {tuk } = {1, 3, 4, 7, 9}, and the 5 × 9 matrix (8) Nu = 5, Pu is Pu  1 0  = 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0  0 0  0  0 1 We can now formally define the problems of interest in this paper. 4 (9) Problem 1. [System Identification] Given Nu ordered samples of the input process ut , collected at times tuk , and Ny ordered samples of the output process yt , collected at times tyk , estimate the first n samples of the system impulse response n {gk }k=1 . We also consider the problem of reconstructing the missing samples: Problem 2. [Input smoothing] Given Nu ordered samples of the input process ut , collected at times tuk , and Ny ordered samples of the output process yt , collected at times tyk , estimate the sample wk , k ∈ , k ≤ N . N Problem 3. [Output smoothing] Given Nu ordered samples of the input process ut , collected at times tuk , and Ny ordered samples of the output process yt , collected at times tyk , estimate the sample vk , k ∈ , k ≤ N . N By adopting a kernel-based approach, we introduce a nonparametric model for the impulse response that allows us to solve the three proposed problems with a single algorithm based on a marginal likelihood approach. We will first see how to solve Problem 1, using an EB approach. Remark 1. If tuk = tyk = k for k = 1, . . . , N , then ũ = u and ỹ = y, and Problem 1 corresponds to the standard dynamic EIV setup (see [2] for a survey). 3 Kernel-based linear system identification We first focus on the problem of identifying g. For a given wt , Problem 1 becomes a linear regression problem: collecting wt into the column vector w, we can construct the N × n Toeplitz matrix W = TN ×n (w); using this matrix we can write the convolution (2) as the matrix product (10) v = W g, and we can formulate the regression problem in the available output data: ỹ = P Py W g + ε̃. (11) In this equation ε̃ = y ε are the samples of the noise that correspond to the available samples of the output. From the semi-orthogonality of y , we have that Eε̃ = 0, Eε̃ε̃T = σy2 INy . (12) P Adopting a kernel-based approach [25], we model g as a Gaussian random vector, with covariance matrix given by a kernel function suitable for linear system identification. In particular, we use the first-order stable-spline kernel [24], so that   g ∼ N (0, λKβ ), Kβ i,j := β max(i,j) . (13) The quantity λ > 0 is a scaling factor, while β ∈ (0, 1) is a shaping parameter that regulates the exponential decay of the realizations from (13). These two parameters are usually referred to as hyperparameters. 5 By postulating (13) a Gaussian prior for the impulse response, we can derive the joint distribution of the measurements ỹ and g as       Σỹ ΣTgỹ ỹ 0 ∼N , (14) g 0 Σgỹ λKβ where Py W Kβ W T PTy + σy2IÑ , Σgỹ = λKβ PTy . Σỹ = λ y (15) From (14) we can calculate the posterior distribution of the unknown impulse response parameters given the available data ỹ (See, e.g., [12, App. B.7]): (16) g|ỹ ∼ N (m, P ) where  1 T W P = σy2 1 m = 2PWT σy P Py W + (λKβ ) −1 T y P −1 (17) T y ỹ. With the posterior distribution, we find the (Bayesian) minimum variance estimate of g as the posterior mean m. From (17), we see that the posterior mean depends on the quantities λ, β and w, as well as on the output noise covariance σy2 . All these parameters are unknown and need to be estimated from the data. Using an EB approach, we estimate the parameters by replacing them with their maximum marginal likelihood estimates λ̂, β̂ and ŵ (and σ̂y2 , but this needs a special treatment: see Section 5). In the next section we focus on the problem of finding the maximizers of the marginal likelihood. Solving the marginal likelihood problem is also the key to solve Problem 2 and Problem 3. 4 Kernel-based input and output smoothing Input smoothing and hyperparameter selection Consider the measurement model (3). We can write it as a regression in the smoothed input wt by observing that v = W g = Gw (18) where G = TN ×N (g). Considering also the unavailability of some data, we obtain the linear regression model in the available measurements       ỹ ε̃ yG = w+ (19) ũ η̃ u P P 6 P where η̃ = u η is white noise of variance σu2 . Under the Bayesian prior assumption (13), the available observation vector and the impulse response parameter are jointly Gaussian, with a log-likelihood given by L(ỹ, ũ, g; w, λ, β) = log p(ỹ|g; w) + log p(ũ; w) + log p(g; λ, β) , (20) where P 1 log p(ỹ|g; w) ∼ = − 2 kỹ − y Gwk2 2σy 1 log p(ũ|w) ∼ = − 2 kũ − u wk2 2σu 1 1 −1 log p(g; λ, β) = − g T (λKβ ) g − log det (λKβ ) 2 2 P (21) Since g is not available, we can interpret it as a latent variable, which we estimate using the expectation maximization (EM) method. The term “EM method” refers to a class of algorithms used to solve maximum likelihood problems with latent variables. In these methods, an iterative algorithm is built by alternating between estimating the likelihood, and updating the likelihood parameters using the estimated likelihood. The estimated likelihood is created in the expectation step by taking the conditional expectation of the log-likelihood with respect to the posterior distribution of the latent variables given the available data, for some estimate of the parameters:    Q θ; θ(k) = E L(ỹ, ũ, g; θ) (22) where θ = [wT , λ, β] are the parameters to be estimated, and the expectation is taken with respect of the distribution (16), with the vector θ replaced with an estimate θ(k) . By construction this function is such that    L ỹ, ũ; θ − L ỹ, ũ; θ(k) ≥ Q θ; θ(k) ) − Q θ; θ(k) . (23)  where L ỹ, ũ; θ is the marginal likelihood of the available data. In the subsequent maximization step, the parameter update is chosen as the maximum of Q(θ; θ(k) ), so that   Q θ(k+1) ; θ(k) − Q θ; θ(k) > 0 (24) and consequently the marginal likelihood, in the updated parameters, is increased as well. By iterating the expectation and maximization steps, from any initialization of the parameters, we obtain a sequence of estimates of the parameters that converge to a local maximizer of the marginal likelihood of the available data (for a complete look on the EM algorithm [28]). In the case at hand, we can compute the expectation of the joint log- 7 likelihood (20) in closed form: P   1 T (k) 1 T (k) ∼ E log p(ỹ|g; w) = 2 ỹ y M w − w A w , σy 2   1 T T 1 T ∼ E log p(ũ|w) = 2 ũ u w − w u u w , σu 2 n o −1 (k) 1 E log p(g; λ, β) = − trace λKβ (P + m(k) m(k) T ) 2 1 − log det (λKβ ) . 2 P PP All the expectations are taken with respect to the posterior distribution (16), with λ, β, and w replaced by their estimates λ(k) , β (k) and w(k) . In these expressions m(k) and P (k) are the posterior mean and covariance as expressed in (17), with the unknown parameters replaced by their estimates; M (k) = TN ×N (m(k) ) is the Toeplitz matrix of the posterior mean and A(k) is the posterior second T T moment of the matrix GT Ty = TN ×N (g) y , that is  A(k) = E GT Ty y G h i (25)  = RT (P (k) + m(k) m(k) T ⊗ Ty y R . P P PP PP The N n × N matrix R is defined as  RT = I N S S2 ··· Sn (26)  where S is the N × N upward shift operator   S i,j = δi,j−1 . (27) To find the updated parameter values, we maximize the conditional expectations with respect to the parameters: w(k+1) = arg max E log p(ỹ|g; w) + E log p(ũ|w) , (28) λ(k+1) , β (k+1) = arg max E log p(g; λ, β) . (29) w λ,β The cost function in (28) is quadratic in the decision variable, so the maximum is available in closed form as  −1   w(k+1) = A(k) + γ Tu u M (k) T Ty ỹ + γ Tu ũ , PP P P where γ = σy2 /σu2 . The optimization (29) can be solved in closed form with respect to λ: n o 1 (30) λ∗ (β) = trace Kβ−1 P (k) + m(k) m(k) T . n With this, the update of β is given by  β (k+1) = arg max n log λ∗ (β) + log det Kβ , (31) β∈(0, 1) 8 which can be solved with scalar optimization methods, or grid search. Once we have β (k+1) , we also have the update for λ:  λ(k+1) = λ∗ β (k+1) . (32) Appealing to theory of the EM-method, we have the following result: Theorem 1. The sequences {w(k) }, {λ(k) }, and {β (k) } generated by the iterations (28) and (29) are such that: L(ỹ, ũ; w(k+1) , λ(k+1) , β (k+1) ) > L(ỹ, ũ; w(k) , λ(k) , β (k) ). (33) where L(ỹ, ũ; w, λ, β) is the marginal likelihood of the data; and L(ỹ, ũ; w(k) , λ(k) , β (k) ) → L∗ (34) as k → ∞, where L∗ is a local extremum of L(ỹ, ũ; w, λ, β). Proof. By construction, the iterations (28) and (29) are iterations in an EM algorithm. The E-step function (22), seen as the function of two variables Q(x; y) is continuous in x and y. So the sequence generated satisfy the conditions in Theorem 1 in [29] and (33) and (34) follow. Interestingly, except for pathological cases, the EM-method is guaranteed to converge to a local maximum of the marginal likelihood (see [28, Ch. 3] for details). Corollary 1. If the sequences {w(k) }, {λ(k) }, and {β (k) } generated by the iterations (28) and (29) are such that: kw(k+1) − w(k) k22 + kβ (k+1) − β (k) k22 + kλ(k+1) − λ(k) k22 → 0, as k → ∞, then they converge to a stationary point of L(ỹ, ũ; w, λ, β). Proof. Follows directly from Theorem 6 in [29]. Remark 2. Theorem 1 gives a natural stopping criterion for the EM algorithm. When the increase in the likelihood between two iterates is below a certain threshold, (approximate) convergence to a maximimum is safely guaranteed. Corollary 1 further guarantees the convergence of the parameters to a local maximizer when the change between iterations is infinitesimal. 4.1 Kernel-based output smoothing To solve Problem 3 we first observe that, since the output noise is white, the output smoothing problem is a simulation problem, and the smoothed output signal is given by the convolution W g. After solving Problem 1 and Problem 2, we can find an estimate of the smoothed output signal v̂ by plugging in the estimates ŵ and ĝ in the convolution, obtaining v̂ = Ŵ ĝ. 9 (35) 5 Some remarks on identifiability It is well known (see, e.g. [30], [8]) that, in general, errors-in-variables problems are not identifiable. Different models may explain the same observed data and therefore it is impossible to assess the validity of a certain model from the data. In the case of Gaussian noise, where only second moments carry information about the distributions, any attempt to identify the noise variances, the system, and the input samples is bound to fail. In our EM framework, this follows from the shape of the likelihood (20): for instance leaving free both σu2 and w, we can choose w = ũ and L(ỹ, ũ, g; w, λ, β) can be made arbitrarily large by choosing a small enough σu2 . Various additional assumptions can be posed to circumvent the non-identifiability issue, see [2]. In our setup, if we know the ratio γ = σy2 /σu2 we can estimate the unknown variances by adding the following equation to the iterations of the EM method: σy2 (k+1) = Py M (k)w(k+1) + w(k+1) T A(k)w(k+1) ỹ T ỹ − 2ỹ T T +γ T ũ ũ − 2ũ Pu w Nu + Ny + w(k+1) T Nu + Ny (k+1) PTu Puw(k+1) , (36) σu2 (k+1) = σy2 (k+1) /γ. In the case of missing data we have other identifiability problems, in addition to the ones inherited from errors-in-variables. The possibility of multiple models explaining the available data is linked to aliasing, as the missing data can be seen as data decimation [31]. In order to have a unique solution to the likelihood problem maximize log p(ỹ|g; w) + log p(ũ; w) + log p(g; λ, β), (37) w, λ, β where g is the true impulse response, we need that the symmetric matrix 1 T G σy2 PTy Py G+ σ12 PTu Pu (38) u is invertible. This is the case as long as the effect of every missing input sample is visible at least once in the output: Proposition 1. There is a unique solution to (37) if and only if for every missing input sample time τu ∈ / {tui }, there is a k ∈ {0 . . . n} and a τy ∈ {tyi } such that gk 6= 0 and k + τ u = τy . P Proof. Matrix (38) is invertible iff there is no α such that y Gα P = 0 and α = 0 means that α can be written as i∈{t αi ei u α = 0. The condition / u k} N where ei are vectors in the canonical basis of and a are scalars. The i P i condition y Gα 6= 0 translates into i∈{t a S g = 6 0, where S is defined u / k} i y in (27). This concludes the proof. P P R P P g 10 6 Simulations To evaluate the performance of the proposed method, we perform a set of Monte Carlo (MC) simulations. In the MC simulations, we identify the impulse responses of 500 systems from the dataset D1 described in [32]. For each system in the dataset, we generate N = 210 input and output samples; the input is Gaussian white noise with variance equal to 1. The output measurements are affected by Gaussian white noise of variance equal 0.1, namely 10% of the noiseless output variance. The variance of the noise affecting the input varies with the experiment. We use the iterative method presented in Section 4 to estimate the first n = 100 samples of the impulse response. The noise variance is updated iteratively with (36). The iterations are initialized at w(0) = u, λ(0) = 10, β (0) = 0.6. The noise variances σy2 and σu2 are initialized, respectively, at the sample variance of 2 (0) the least squares residuals and at σy /γ. The iterations are stopped when the relative change of the parameter updates is below 1%. We evaluate the goodness of fit using the standard score fit(a, aref ) = 1 − ka − aref k2 , karef − mean(aref )k2 (39) where aref is a true value and a its estimate. We calculate the median fit of the estimated impulse responses, inputs, and outputs over the dataset. We consider two different scenarios. In the first scenario, we corrupt the dataset with increasing fractions of missing samples. In the second scenario, we corrupt the dataset with input noises of increasing variance. Table 1 gives a summary of the experimental conditions. Scenario A: Missing data The input noise is Gaussian white noise with variance 0.1 (10% of the input signal variance). Before performing the identification, we randomly select and remove a fraction of the available data: in Exp. 1, we remove from 0% to 50% of the input samples, in 10% increments; in Exp. 2, we remove from 0% to 50% of the output samples, in 10% increments; in Exp. 3, we remove equal fractions of input and output, between 0% and 25%, in 5% increments. The results are plotted in Figure 2. Interestingly, a large fraction of missing input samples has A (Exp. 1) A (Exp. 2) A (Exp. 3) B σy2 σu2 missing input missing output 10% 10% 10% 10% 10% 10% 10% 0% ÷ 100% 0% ÷ 50% 0% 0% ÷ 25% 0% 0% 0% ÷ 50% 0% ÷ 25% 0% Table 1: Experimental conditions in the simulation scenarios 11 severe effect on the performance, whereas a large fraction of missing output samples has a milder effect on the identification performance. In Exp. 1 and Exp. 2, the model has always resulted identifiable, whereas in Exp. 3 a number of systems were non-identifiable. The results are collected in Table 2. Scenario A fit(ĝ, g) 0.8 0.7 0.6 fit(ŵ, w) 0.5 0% 0.8 10% 15% 20% 25% 30% 35% 40% 45% 50% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 20% 25% 30% 35% Total missing samples 40% 45% 50% 0.7 0.6 0.5 0% 0.8 fit(v̂, v) 5% 0.7 0.6 0.5 0% Exp. 1 Exp. 2 Exp. 3 5% 10% 15% Figure 2: Plot of the median fit of the impulse response (top), the smoothed input (middle) and the smoothed output (bottom) over 500 MC runs, for increasing fractions of missing samples; In Exp.1 we remove input samples, in Exp.2 we remove output samples, in Exp.3 we remove input and output samples. 12 Scenario B: Input noise The input noise is Gaussian white noise. We consider values of the input noise variance between 0 (no noise) and 1 (same variance as the input), in increments of 0.2. The results are plotted in Figure 3. In this scenario, we compare the performance of the proposed method with a kernel-based identification method that does not account for input noise. We estimate the impulse response using the posterior mean m from (17), with λ, β and σy2 estimated trough marginal likelihood, with all instances of w replaced by the noisy measurements u. Scenario B fit(ĝ, g) 0.8 0.6 0.4 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 Input noise variance [a.u.] 0.8 0.9 1 Figure 3: Plot of the median fit of the impulse response estimate over 500 MC runs, for increasing values of the input noise variance. We compare the proposed estimator (blue) with performance of an estimator that does not account for input noise (black). 7 Conclusions In this paper we have presented a nonparametric kernel-based method for the identification of the impulse response of a linear systems in the presence of noisy and missing input-output data. The method relies upon a Gaussian regression framework, where the impulse response of the system is modeled as a Gaussian process with a suitable covariance matrix. Using an EB approach, we find the minimum mean-squared estimate of the impulse response. This estimate depends on the unknown noiseless input, as well as on the kernel hyperparameters and the noise variances. These quantities are estimated from the marginal Unsolvable problems 0 3 5 16 27 40 Total missing samples 0% 10% 20% 30% 40% 50% Table 2: Number of non-identifiable systems in Exp. 3 (out of 500) 13 likelihood of the data, obtained integrating out the impulse response. We have devised an iterative scheme that solves the marginal likelihood maximization in simple updates, and we have discussed the convergence properties of the algorithm. We have tested the method on a data bank of linear systems, where we have analyzed the degradation in performance for increasing amounts of missing data, and increasing noise variance on the input measurements. We have briefly addressed the question of identifiability; and simulations seem to validate our theoretical results, however, this aspect needs further study. References [1] L. Ljung, System Identification, Theory for the User. Prentice Hall, 1999. [2] T. Söderström, “Errors-in-variables methods in system identification,” Automatica, vol. 43, no. 6, pp. 939–958, 2007. [3] R. Frisch, “Statistical confluence analysis by means of complete regression systems (university institute of economics, oslo, 1934, pp. 5–8),” in The Foundations of Econometric Analysis, pp. 271–273, Cambridge University Press, 1934. [4] B. D. Anderson, “Identification of scalar errors-in-variables models with dynamics,” Automatica, vol. 21, no. 6, pp. 709–716, 1985. [5] K. V. Fernando and H. Nicholson, “Identification of linear systems with input and output noise: the koopmans-levin method,” IEE Proc. D. Control Theory Appl., vol. 132, no. 1, pp. 30–36, 1985. [6] W.-X. Zheng and C.-B. Feng, “Unbiased parameter estimation of linear systems in the presence of input and output noise,” Int. J. Adapt. Control Signal Process., vol. 3, no. 3, pp. 231–251, 1989. [7] S. Beghelli, R. Guidorzi, and U. Soverini, “The frisch scheme in dynamic system identification,” Automatica, vol. 26, no. 1, pp. 171–176, 1990. [8] T. Söderström, U. Soverini, and K. Mahata, “Perspectives on errors-invariables estimation for dynamic systems,” Signal Process., vol. 82, no. 8, pp. 1139–1154, 2002. [9] D. Fan and G. Luo, “Frisch scheme identification for errors-in-variables systems,” in Proc. IEEE Int. Conf. Cogn. Infor. (ICCI), pp. 794 – 799, 2010. [10] L. Ning, T. T. Georgiou, A. Tannenbaum, and S. P. Boyd, “Linear models based on noisy data and the frisch scheme,” SIAM Rev., vol. 57, no. 2, pp. 167–197, 2015. 14 [11] E. Zhang and R. Pintelon, “Errors-in-variables identification of dynamic systems in general cases,” in Proc. IFAC Symp. System Identification (SYSID), vol. 48, pp. 309–313, 2015. [12] T. Söderström, “Identification of stochastic linear systems in presence of input noise,” Automatica, vol. 17, no. 5, pp. 713–725, 1981. [13] R. Diversi, R. Guidorzi, and U. Soverini, “Maximum likelihood identification of noisy input–output models,” Automatica, vol. 43, no. 3, pp. 464–472, 2007. [14] J. Schoukens, R. Pintelon, G. Vandersteen, and P. Guillaume, “Frequencydomain system identification using non-parametric noise models estimated from a small number of data sets,” Automatica, vol. 33, no. 6, pp. 1073– 1086, 1997. [15] T. Söderström, M. Hong, J. Schoukens, and R. Pintelon, “Accuracy analysis of time domain maximum likelihood method and sample maximum likelihood method for errors-in-variables and output error identification,” Automatica, vol. 46, no. 4, pp. 721–727, 2010. [16] A. Isaksson, “Identification of arx-models subject to missing data,” IEEE Trans. Autom. Control, vol. 38, no. 5, pp. 813–819, 1993. [17] R. Pintelon and J. Schoukens, “Frequency domain system identification with missing data,” IEEE Trans. Autom. Control, vol. 45, no. 2, pp. 364– 369, 2000. [18] R. Wallin and A. Hansson, “Maximum likelihood estimation of linear SISO models subject to missing output data and missing input data,” Int. J. Control, pp. 1–11, 2014. [19] I. Markovsky and R. Pintelon, “Identification of linear time-invariant systems from multiple experiments,” IEEE Trans. Signal Process., vol. 63, no. 13, pp. 3549–3554, 2015. [20] E. Zhang, R. Pintelon, and J. Schoukens, “Errors-in-variables identification of dynamic systems excited by arbitrary non-white input,” Automatica, vol. 49, no. 10, pp. 3032–3041, 2013. [21] Z. Liu, A. Hansson, and L. Vandenberghe, “Nuclear norm system identification with missing inputs and outputs,” Syst. Control Lett., vol. 62, no. 8, pp. 605–612, 2013. [22] I. Markovsky and K. Usevich, “Structured low-rank approximation with missing data,” SIAM J. Matrix Anal. & Appl., vol. 34, no. 2, pp. 814–830, 2013. [23] C. Williams and C. Rasmussen, Gaussian processes for machine learning. 2006. 15 [24] G. Pillonetto and G. De Nicolao, “A new kernel-based approach for linear system identification,” Automatica, vol. 46, no. 1, pp. 81–93, 2010. [25] G. Pillonetto, F. Dinuzzo, T. Chen, G. D. Nicolao, and L. Ljung, “Kernel methods in system identification, machine learning and function estimation: A survey,” Automatica, vol. 50, pp. 657–682, mar 2014. [26] J. Maritz and T. Lwin, Empirical bayes methods. Chapman and Hall London, 1989. [27] G. Pillonetto and A. Chiuso, “A Bayesian learning approach to linear system identification with missing data,” in Proc. IEEE Conf. Decis. Control (CDC), pp. 4698–4703, 2009. [28] G. McLachlan and T. Krishnan, The EM algorithm and extensions, vol. 382. John Wiley and Sons, 2007. [29] C. F. J. Wu, “On the convergence properties of the EM algorithm,” Ann. Statist., vol. 11, pp. 95–103, mar 1983. [30] G. Bottegal, G. Picci, and S. Pinzoni, “On the identifiability of errorsin-variables models with white measurement errors,” Automatica, vol. 47, no. 3, pp. 545–551, 2011. [31] R. Wallin and A. Isaksson, “Multiple optima in identification of arx models subject to missing data,” EURASIP J. Adv. Signal Process., vol. 2002, no. 1, pp. 1–8, 2002. [32] T. Chen, L. Ljung, M. Andersen, A. Chiuso, F. Carli, and G. Pillonetto, “Sparse multiple kernels for impulse response estimation with majorization minimization algorithms,” in Proc. IEEE Conf. Decis. Control (CDC), pp. 1500–1505, 2012. 16
3cs.SY
Under review as a conference paper at ICLR 2017 R ENDER GAN: G ENERATING R EALISTIC L ABELED DATA Leon Sixt, Benjamin Wild, & Tim Landgraf Fachbereich Mathematik und Informatik Freie Universität Berlin Berlin, Germany arXiv:1611.01331v5 [cs.NE] 12 Jan 2017 {leon.sixt, benjamin.wild, tim.landgraf}@fu-berlin.de A BSTRACT Deep Convolutional Neuronal Networks (DCNNs) are showing remarkable performance on many computer vision tasks. Due to their large parameter space, they require many labeled samples when trained in a supervised setting. The costs of annotating data manually can render the use of DCNNs infeasible. We present a novel framework called RenderGAN that can generate large amounts of realistic, labeled images by combining a 3D model and the Generative Adversarial Network framework. In our approach, image augmentations (e.g. lighting, background, and detail) are learned from unlabeled data such that the generated images are strikingly realistic while preserving the labels known from the 3D model. We apply the RenderGAN framework to generate images of barcode-like markers that are attached to honeybees. Training a DCNN on data generated by the RenderGAN yields considerably better performance than training it on various baselines. 1 I NTRODUCTION When an image is taken from a real world scene, many factors determine the final appearance: background, lighting, object shape, position and orientation of the object, the noise of the camera sensor, and more. In computer vision, high-level information such as class, shape, or pose is reconstructed from raw image data. Most real-world applications require the reconstruction to be invariant to noise, background, and lighting changes. In recent years, deep convolutional neural networks (DCNNs) advanced to the state of the art in many computer vision tasks (Krizhevsky et al., 2012; He et al., 2015; Razavian et al., 2014). More training data usually increases the performance of DCNNs. While image data is mostly abundant, labels for supervised training must often be created manually – a time-consuming and tedious activity. For complex annotations such as human joint angles, camera viewpoint or image segmentation, the costs of labeling can be prohibitive. In this paper, we propose a method to drastically reduce the costs of labeling such that we can train a model to predict even complex sets of labels. We present a generative model that can sample from the joint distribution of labels and data. The training procedure of our model does not require any manual labeling. We show that the generated data is of high quality and can be used to train a model in a supervised setting, i.e. a model that maps from real samples to labels, without using any manually labeled samples. We propose two modifications to the recently introduced GAN framework (Goodfellow et al., 2014). First, a simple 3D model is embedded into the generator network to produce samples from corresponding input labels. Second, the generator learns to add missing image characteristics to the model output using a number of parameterized augmentation functions. In the adversarial training we leverage large amounts of unlabeled image data to learn the particular form of blur, lighting, background and image detail. By constraining the augmentation functions we ensure that the resulting image still represents the given set of labels. The resulting images are hard to distinguish from real samples and can be used to train a DCNN to predict the labels from real input data. 1 Under review as a conference paper at ICLR 2017 10 9 8 7 11 0 1 12 2 13 3 4 6 5 (b) Tagged bees in the hive (a) Tag structure Figure 1: (a) The tag represents a unique binary code (cell 0 to 11) and encodes the orientation with the semicircles 12 and 13. The red arrow points towards the head of the bee. This tag encodes the id 100110100010. (b) Cutout from a high-resolution image. The RenderGAN framework was developed to solve the scarcity of labeled data in the BeesBook project (Wario et al., 2015) in which we analyze the social behavior of honeybees. A barcode-like marker is attached to the honeybees’ backs for identification (see Fig. 1). Annotating this data is tedious, and therefore only a limited amount of labeled data exists. A 3D model (see the upper row of Fig. 2) generates a simple image of the tag based on position, orientation, and bit configuration. The RenderGAN then learns from unlabeled data to add lighting, background, and image details. Training a DCNN on data generated by the RenderGAN yields considerably better performance compared to various baselines. We furthermore include a previously used computer vision pipeline in the evaluation. The networks’ detections are used as feature to track the honeybees over time. When we use detections from the DCNN instead of the computer vision pipeline, the accuracy of assigning the true id increases from 55% to 96%. Our contributions are as follows. We present an extension of the GAN framework that allows to sample from the joint distribution of data and labels. The generated samples are nearly indistinguishable from real data for a human observer and can be used to train a DCNN end-to-end to classify real samples. In a real-world use case, our approach significantly outperforms several baselines. Our approach requires no manual labeling. The simple 3D model is the only form of supervision. 2 R ELATED WORK There exists multiple approaches to reduce the costs associated with labeling. A common approach to deal with limited amount of labels is data augmentation (Goodfellow et al., 2016, Chapter 7.4). Translation, noise, and other deformations can often be applied without changing the labels, thereby effectively increasing the number of training samples and reducing overfitting. DCNNs learn a hierarchy of features – many of which are applicable to related domains (Yosinski et al., 2014). Therefore, a common technique is to pre-train a model on a larger dataset such as ImageNet (Deng et al., 2009) and then fine-tune its parameters to the task at hand (Girshick et al., 2014; Long et al., 2015; Razavian et al., 2014). This technique only works in cases where a large enough related dataset exists. Furthermore, labeling enough data for fine-tuning might still be costly. If a basic model of the data exists (for example, a 3D model of the human body), it can be used to generate labeled data. Peng et al. (2015) generated training data for a DCNN with 3D-CAD models. Figure 2: First row: Images from the 3D model without augmentation. Below: Corresponding images from the RenderGAN. Last row: Real images of bee’s tags. 2 Under review as a conference paper at ICLR 2017 real data D noise G 0-1 fake Figure 3: Topology of a GAN. The discriminator network D is trained to distinguish between ”fake” and real data. The generator network G receives a random vector as input. G is optimized to maximize the chance of the discriminator making a mistake. Su et al. (2015) used 3D-CAD models from large online repositories to generate large amounts of training images for the viewpoint estimation task on the PASCAL 3D+ dataset (Xiang et al., 2014). Massa et al. (2015) are matching natural images to 3D-CAD models with features extracted from a DCNN. Richter et al. (2016) and Ros et al. (2016) used 3D game engines to collect labeled data for image segmentation. However, the explicit modeling of the image acquisition physics (scene lighting, reflections, lense distortions, sensor noise, etc.) is cumbersome and might still not be able to fully reproduce the particularities of the imaging process such as unstructured background or object specific noise. Training a DCNN on generated data that misses certain features will result in overfitting and poor performance on the real data. Generative Adversarial Networks (GAN) (see Fig. 3) can learn to generate high-quality samples (Goodfellow et al., 2014), i.e. sample from the data distribution p(x). Denton et al. (2015) synthesized images with a GAN on the CIFAR dataset (Krizhevsky, 2009), which were hard for humans to distinguish from real images. While a GAN implicitly learns a meaningful latent embedding of the data (Radford et al., 2015), there is no simple relationship between the latent dimensions and the labels of interest. Therefore, high-level information can’t be inferred from generated samples. cGANs are an extension of GANs to sample from a conditional distribution given some labels, i.e. p(x|l). However, training cGANs requires a labeled dataset. Springenberg (2015) showed that GANs can be used in a semi-supervised setting but restricted their analysis to categorical labels. Wang & Gupta (2016) trained two separate GANs, one to model the object normals and another one for the texture conditioned on the normals. As they rely on conditional GANs, they need large amounts of labeled data. Chen et al. (2016) used an information theoretic to disentangle the representation. They decomposed the representation into a structured and unstructured part. And successfully related on a qualitative level the structured part to high-level concepts such as camera viewpoint or hair style. However, explicitly controlling the relationship between the latent space and generated samples without using labeled data is an open problem, i.e. sampling from p(x, l) without requiring labels for training. 3 R ENDER GAN Most supervised learning tasks can be modeled as a regression problem, i.e. approximating a function fˆ : Rn 7→ L that maps from data space R to label space L. We consider fˆ to be the best available function on this particular task. Analogous to ground truth data, one could call fˆ the ground truth function. In the RenderGAN framework, we aim to solve the inverse problem to this regression task: generate data given the labels. This is achieved by embedding a simple 3D model into the generator of a GAN. The samples generated by the simple model must correspond to the given labels but may lack many factors of the real data such as background or lightning. Through a cascade of augmentation functions, the generator can adapt the images from the 3D model to match the real data. We formalize image augmentation as a function φ(x, d), which modifies the image x based on the augmentation parameter d (a tensor of any rank). The augmentation must preserve the labels of the image x. Therefore, it must hold for all images x and all augmentations parameters d: fˆ (φ(x, d)) = fˆ(x) 3 (1) Under review as a conference paper at ICLR 2017 real data D M Gl noise ... φ0 G0 φk 0-1 fake Gk G Figure 4: The generator G cannot directly produce samples. Instead, G has to predict parameters Gl for the 3D model M . The image generated by M is then modified through the augmentation functions φi parameterized by Gi to match the real data. The augmentation function must furthermore be differentiable w.r.t. x and d as the gradient will be back-propagated through φ to the generator. Image augmentations such as lighting, surrounding, and noise do preserve the labels and fit this definition. We will provide appropriate definitions of φ for the mentioned augmentations in the following section. If appropriate augmentation functions are found that can model the missing factors and are differentiable, we can use the GAN framework to find parameters that result in realistic output images. Multiple augmentation functions can be combined to perform a more complex augmentation. Here, we will consider multiple augmentation functions applied sequentially, i.e. we have k augmentation functions φi and k corresponding outputs Gi from the generator. The output of the previous augmentation function is the input to the next one. Thus, we can write the generator given some labels l as: g(z, l) = φk (φk−1 (. . . φ0 (M (l), G0 (z)) . . . , Gk−1 (z)), Gk (z)) (2) where M is the 3D model. We can furthermore learn the label distribution with the generator. As the discriminator loss must be backpropagated through the 3D model M, it must be differentiable. This can be achieved by emulating the 3D model with a neural network (Dosovitskiy et al., 2015). The resulting generator g(z) can be written as (see Fig. 4 for a visual interpretation): g(z) = φk (φk−1 (. . . φ0 (M (Gl (z)), G0 (z)) . . . , Gk−1 (z)), Gk (z)) (3) As any differentiable function approximator can be employed in the GAN framework, the theoretical properties still hold. The training is carried out as in the conventional GAN framework. In a real application, the augmentation functions might restrict the generator from converging to the data distribution. If the training converges, we can collect generated realistic data with g(z) and the high-level information captured in the 3D model with Gl (z). We can now train a supervised learning algorithm on the labeled generated data (Gl (z) , g (z)) and solve the regression task of approximating fˆ without depending on manual labels. 4 A PPLICATION TO THE B EES B OOK PROJECT In the BeesBook project, we aim to understand the complex social behavior of honey bees. For identification, a tag with a binary code is attached to the back of the bees. The orientations in space, position, and bits of the tags are required to track the bees over time. Decoding this information is not trivial: the bees are oriented in any direction in space. The tag might be partially occluded. Moreover, spotlights on the tag can sometimes even confuse humans. A previously used computer vision pipeline did not perform reliably. Although we invested a substantial amount of time on labeling, a DCNN trained on this data did not perform significantly better (see Sec. 3). We therefore wanted to synthesize labeled images which are realistic enough to train an improved decoder network. Following the idea outlined in section 3, we created a simple 3D model of a bee marker. The 3D model comprises a mesh which represents the structure of the marker and a simple camera model to project the mesh to the image plane. The model is parameterized by its position, its pitch, yaw and roll, and its ID. Given a parameter set, we obtain a marker image, a background segmentation mask 4 Under review as a conference paper at ICLR 2017 outputs: zbits 3D model φblur φlighting φbg φdetail 0.90 zoffset G Figure 5: Augmentation functions of the RenderGAN applied to the BeesBook project. The arrows from G to the augmentation functions φ depict the inputs to the augmentation functions. The generator provides the position and orientations to the 3D model, whereas the bits are sampled uniformly. On top, the output of each stage is shown. The output of φdetail is forwarded to the discriminator. and a depth map. The generated images lack many important factors: blur, lighting, background, and image detail (see Fig. 2). A DCNN trained on this data does not generalize well (see Sec. 5). Over the last years we collected a large amount of unlabeled image data. We successfully augmented the 3D model using this dataset, as described below. We trained a neural network to emulate the 3D model. Its outputs are indistinguishable from the images of the 3D model. The discriminator error can now be backpropagated through the 3D model which allows the generator to also learn the distributions of positions and orientations of the bee marker. The IDs are sampled uniformly during training. The weights of the 3D model network are fixed during the RenderGAN training. We apply different augmentation functions that account for blur, lighting, background, and image detail. The output of the 3D model and of each augmentation function is of shape (64, 64) and in the range [−1, 1]. In Fig. 5, the structure of the generator is shown. Blurriness: The 3D model produces hard edges, but the images of the real tags show a broad range of blur. The generator produces a scalar α ∈ [0, 1] per image that controls the blur. φblur (x, α) = (1 − α) (x − bσ (x)) + bσ (x) (4) where bσ (x) = x ∗ kσ denotes convolving the image x with a Gaussian kernel kσ of scale σ. The implementation of the blur function is inspired by Laplacian pyramids (Burt & Adelson, 1983). As required for augmentation functions, the labels are preserved, because we limit the maximum amount of blur by picking σ = 2. φblur is also differentiable w.r.t the inputs α and x. Lighting of the tag: The images from the 3D model are binary. In real images, tags exhibit different shades of gray. We model the lighting by a smooth scaling and shifting of the pixel intensities. The generator provides three outputs for the lighting: scaling of black parts sb , scaling of white parts sw and a shift t. All outputs have the same dimensions as the image x. An important invariant is that the black bits of the tag must stay darker than the white bits. Otherwise, a bit could flip, and the label would change. By restricting the scaling sw and sb to be between 0.10 and 1, we ensure that this invariant holds. The lighting is locally corrolated and should cause smooth changes in the image. Hence, Gaussian blur b(x) is applied to sb , sw , and t. φlighting (x, sw , sb , t) = x · b(sw ) · W (x) + x · b(sb ) · (1 − W (x)) + b(t) (5) The segmentation mask W (x) is one for white parts and zero for the black part of the image. As the intensity of the input is distributed around -1 and 1, we can use thresholding to differentiate between black and white parts. Background: The background augmentation can change the background pixels arbitrarily. A segmentation mask Bx marks the background pixels of the image x which are replaced by the pixels from the generated image d. φbg (x, d) = x · (1 − Bx ) + d · Bx 5 (6) Under review as a conference paper at ICLR 2017 The 3D model provides the segmentation mask. As φbg can only change background pixels, the labels remain unchanged. Details: In this stage, the generator can add small details to the whole image including the tag. The output of the generator d is passed through a high-pass filter to ensure that the added details are small enough not to flip a bit. Furthermore, d is restricted to be in [−2, 2] to make sure the generator cannot avoid the highpass filter by producing huge values. With the range [−2, 2], the generator has the possibility to change black pixels to white, which is needed to model spotlights. φdetail (x, d) = x + highpass(d) (7) The high-pass is implemented by taking the difference between the image and a blurred version of the image (σ = 3.5). As the spotlights on the tags are only a little smaller than the bits, we increase its slope after the cutoff frequency by repeating the high-pass filter three times. The image augmentations are applied in the order as listed above: φdetail ◦ φbackground ◦ φlighting ◦ φblur . Please note that there exist parameters to the augmentation functions that could change the labels. As long as it is guaranteed that such augmentations will result in unrealistic looking images, the generator network will learn to avoid them. For example, even though the detail augmentation could be used to add high-frequency noise to obscure the tag, this artifact would be detected by the discriminator. Architecture of the generator: The generator network has to produce outputs for each augmentation function. We will outline only the most important parts. See our code available online for all the details of the networks1 . The generator starts with a small network consisting of dense layers, which predicts the parameters for the 3D model (position, orientations). The output of another dense layer is reshaped and used as starting block for a chain of convolution and upsampling layers. We found it advantageous to merge a depth map of the 3D model into the generator as especially the lighting depends on the orientation of the tag in space. The input to the blur augmentation is predicted by reducing an intermediate convolutional feature map to a single scalar. An additional network is branched off to predict the input to the lighting augmentation. For the background generation, the output of the lighting network is merged back into the main generator network together with the actual image from the 3D model. For the discriminator architecture, we mostly rely on the architecture given by Radford et al. (2015), but doubled the number of convolutional layers and added a final dense layer. This change improved the quality of the generated images. Clip layer: Some of the augmentation parameters have to be restricted to a range of values to ensure that the labels remain valid. The training did not converge when using functions like tanh or sigmoid due to vanishing gradients. We are using a combination of clipping and activity regularization to keep the output in a given interval [a, b]. If the input x is out of bounds, it is clipped and a regularization loss r depending on the distance between x and the appropriate bound is added.  γ||x − a||1 if x < a r(x) = 0 (8) if a ≤ x ≤ b  γ||x − b||1 if x > b f (x) = min(max(a, x), b) (9) With the scalar γ, the weight of the loss can be adapted. For us γ = 15 worked well. If γ is chosen too small, the regularization loss might not be big enough to move the output of the previous layer towards the interval [a, b]. During training, we observe that the loss decreases to a small value but never vanishes. Training: We train generator and discriminator as in the normal GAN setting. We use 2.4M unlabeled images of tags to train the RenderGAN. We use Adam (Kingma & Ba, 2014) as an optimizer with a starting learning rate of 0.0002, which we reduce in epoch 200, 250, and 300 by a factor of 0.25. In Fig. 6b the training loss of the GAN is shown. The GAN does not converge to the point where the discriminator can no longer separate generated from real samples. The augmentation functions might restrict the generator too much such that it cannot model certain properties. Nevertheless, it is hard for a human to distinguish the generated from real images. In some cases, the 1 https://github.com/berleon/deepdecoder 6 Under review as a conference paper at ICLR 2017 16 real fake D G Loss 12 8 4 0.0 0.2 0.4 0.6 0.8 0 1.0 50 100 150 200 250 300 350 Epoch (a) (b) Figure 6: (a) Histogram of the discriminator scores on fake and real samples. (b) Losses of the generator (G) and discriminator (D). Figure 7: Random points in the z-space given the tag parameters generator creates unrealistic high-frequencies artifacts. The discriminator unfailingly assigns a low score to theses images. We can therefore discard them for the training of the supervised algorithm. More generated images are shown in Appendix A. In Fig. 7, we show random points in the latent space, while fixing the tag parameters. The generator indeed learned to model the various lighting conditions, noise intensities, and backgrounds. 5 R ESULTS We constructed the RenderGAN to generate labeled data. But does a DCNN trained with the RenderGAN data perform better than one trained on the limited amounts of real data? And are learned augmentations indeed needed or do simple hand-designed augmentation achieve the same result? The following paragraphs describe the different datasets used in the evaluation. We focus on the performance of a DCNN on the generated data. Thus, we do not compare our method to conventional GANs as those do not provide labels and are generally hard to evaluate. Data from the RenderGAN: We generate 5 million tags with the RenderGAN framework. Due to the abundance, one training sample is only used twice during training. It is not further augmented. Real Data: The labels of the real data are extracted from ground truth data that was originally collected to evaluate bee trajectories. This ground truth data contains the path and id of each bee over multiple consecutive frames. Data from five different time spans was annotated – in total 66K tags. As the data is correlated in time (same ids, similar lighting conditions), we assign the data from one time span completely to either the train or test set. The data from three time spans forms the train set (40K). The test set (26K) contains data from the remaining two time spans. The ground truth data lacks the orientation of the tags, which is therefore omitted for this evaluation. Due to the smaller Table 1: Datasets created with learned representations and hand-designed augmentations Name HM 3D HM LI HM BG Learned 3D model 3D model, blur, lighting 3D model, blur, lighting, background 7 Hand-Designed blur, lighting, background, noise, spotlights background, noise, spotlights noise, spotlights Under review as a conference paper at ICLR 2017 Table 2: Comparison of the mean Hamming distance (MHD) on the different data sets. More samples of the training data can be found in Appendix D. Data MHD Real 0.956 HM 3D 0.820 HM LI 0.491 HM BG 0.505 RenderGAN 0.424 RenderGAN + Real CV Training Data 0.416 1.08 size of the real training set, we augment it with random translation, rotation, shear transformation, histogram scaling, and noise (see Appendix C for exact parameters). RenderGAN + Real: We also train a DCNN on generated and real data which is mixed at a 50:50 ratio. Handmade augmentations: We tried to emulate the augmentations learned by the RenderGAN by hand. For example, we generate the background by an image pyramid where the pixel intensities are drawn randomly. We model all effects, i.e. blur, lighting, background, noise and spotlights (see Appendix B for details on their implementation). We apply the handmade augmentation to different learned representations of the RenderGAN, e.g. we use the learned lighting representation and add the remaining effects such as background and noise with handmade augmentations (HM LI). See Table 1 for the different combinations of learned representations and hand designed augmentations. Computer vision pipeline CV : The previously used computer vision pipeline (Wario et al., 2015) is based on manual feature extraction. For example, a modified Hough transformation to find ellipses. The MHD obtained by this model is only a rough estimate given that the computer vision pipeline had to be evaluated and fine-tuned on the same data set due to label scarcity. Training setup: An epoch consists of 1000 batches á 128 samples. We use early stopping to select the best parameters of the networks. For the training with generated data, we use the real training set as the validation set. When training on real data, the test set is also used for validation. We could alternatively reduce the real training set further and form an extra validation set, but this would harm the performance of the DCNN trained on the real data. We use the 34-layer ResNet architecture (He et al., 2015) but start with 16 feature maps instead of 64. The DCNNs are evaluated on the mean Hamming distance (MHD) i.e. the expected value of bits decoded wrong. Human experts can decode tags with a MHD of around 0.23. Results: In Table 2, we present the results of the evaluation. The training losses of the networks are plotted in Fig. 8. The model trained with the data generated by the RenderGAN has an MHD of 0.424. The performance can furthermore be slightly improved by combining the generated with real data. The small gap in performance when adding real data is a further indicator of the quality of the generated samples. If we use predictions from this DCNN instead of the computer vision pipeline, the accuracy of the tracking improves from 55% of the ids assigned correctly to 96%. At this quality, it is possible to analyze the social behavior of the honeybees reliably. Compared to the handmade augmentations (HM 3D), data from the RenderGAN leads to considerably better performance. The large gap in performance between the HM 3D and HM LI data highlights the importance of the learned lighting augmentation. 8 Under review as a conference paper at ICLR 2017 0.5 Loss 0.4 0.3 0.2 0.1 0.0 0 10 20 30 40 50 60 70 80 Real train Real val HM 3D train HM 3D val HM LI train HM LI val HM BG train HM BG val RenderGAN train RenderGAN val RenderGAN + Real train RenderGAN + Real val Epoch Figure 8: Training and validation losses of DCNNs trained on different data sets. As some data sets are missing the orientation of the tags, only the loss of the bits are plotted. Binary crossentropy is used as loss for the bits. The train and validation loss of each dataset have the same color. 6 D ISCUSSION We proposed a novel extension to the GAN framework that is capable of rendering samples from a basic 3D model more realistic. Compared to computer graphics pipelines, the RenderGAN can learn complex effects from unlabeled data that would be otherwise hard to model with explicit rules. Contrary to conventional GANs, the generator provides explicit information about the synthesized images, which can be used as labels for a supervised algorithm. The training of the RenderGAN requires no labels. We showed an application of the RenderGAN framework to the BeesBook project, in which the generator adds blur, lighting, background, and details to images from a basic 3D model. The generated data looks strikingly real and includes fine details such as spotlights, compression artifacts, and sensor noise. In contrast to previous work that applied 3D models to produce training samples for DCNNs (Su et al., 2015; Richter et al., 2016; Ros et al., 2016), we were able to train a DCNN from scratch with only generated data that still generalizes to unseen real data. While some work is required to adapt the RenderGAN to a specific domain, once set up, arbitrary amounts of labeled data can be acquired cheaply, even if the data distribution changes. For example, if the tag design changes to include more bits, small adaptions to the 3D model’s source code and eventually the hyperparameters of the augmentation functions would be sufficient. However, if we had labeled the data by hand, then we would have to annotate data again. While the proposed augmentations represent common image characteristics, a disadvantage of the RenderGAN framework is that these augmentation functions must be carefully customized for the application at hand to ensure that high-level information is preserved. Furthermore, a suitable 3D model must be available. 7 F UTURE W ORK For future work, it would be interesting to see the RenderGAN framework used on other tasks where basic 3D models exist e.g. human faces, pose estimation, or viewpoint prediction. In this context, one could come up with different augmentation functions e.g. colorization, affine transformations, or diffeomorphism. The RenderGAN could be especially valuable to domains where pre-trained models are not available or when the annotations are very complex. Another direction of future work might be to extend the RenderGAN framework to other fields. For example, in speech synthesis, one could use an existing software as a basic model and improve the realism of the output with a similar approach as in the RenderGAN framework. 9 Under review as a conference paper at ICLR 2017 R EFERENCES Peter Burt and Edward Adelson. The laplacian pyramid as a compact image code. IEEE Transactions on communications, 31(4):532–540, 1983. Xi Chen, Yan Duan, Rein Houthooft, John Schulman, Ilya Sutskever, and Pieter Abbeel. Infogan: Interpretable representation learning by information maximizing generative adversarial nets. arXiv preprint arXiv:1606.03657, 2016. Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A large-scale hierarchical image database. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pp. 248–255. IEEE, 2009. Emily L Denton, Soumith Chintala, Rob Fergus, et al. Deep generative image models using a laplacian pyramid of adversarial networks. In Advances in neural information processing systems, pp. 1486–1494, 2015. Alexey Dosovitskiy, Jost Tobias Springenberg, and Thomas Brox. Learning to generate chairs with convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1538–1546, 2015. Ross Girshick, Jeff Donahue, Trevor Darrell, and Jitendra Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 580–587, 2014. Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In Advances in Neural Information Processing Systems, pp. 2672–2680, 2014. Ian Goodfellow, Yoshua Bengio, and Aaron Courville. Deep learning. Book in preparation for MIT Press, 2016. URL http://www.deeplearningbook.org. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. arXiv preprint arXiv:1512.03385, 2015. Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014. Alex Krizhevsky. Learning Multiple Layers of Features from Tiny Images, 2009. ISSN 1098-6596. Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pp. 1097–1105, 2012. Jonathan Long, Evan Shelhamer, and Trevor Darrell. Fully Convolutional Networks for Semantic Segmentation. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3431–3440, 2015. ISSN 10636919. doi: 10.1109/CVPR.2015.7298965. Francisco Massa, Bryan Russell, and Mathieu Aubry. Deep exemplar 2d-3d detection by adapting from real to rendered views. arXiv preprint arXiv:1512.02497, 2015. Xingchao Peng, Baochen Sun, Karim Ali, and Kate Saenko. Learning Deep Object Detectors from 3D Models. Iccv, 2015. doi: 10.1109/ICCV.2015.151. Alec Radford, Luke Metz, and Soumith Chintala. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks, 2015. Ali Sharif Razavian, Hossein Azizpour, Josephine Sullivan, and Stefan Carlsson. Cnn features offthe-shelf: an astounding baseline for recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 806–813, 2014. Stephan R Richter, Vibhav Vineet, Stefan Roth, and Vladlen Koltun. Playing for data: Ground truth from computer games. In European Conference on Computer Vision, pp. 102–118. Springer, 2016. 10 Under review as a conference paper at ICLR 2017 German Ros, Laura Sellart, Joanna Materzynska, David Vazquez, and Antonio M Lopez. The synthia dataset: A large collection of synthetic images for semantic segmentation of urban scenes. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3234– 3243, 2016. Jost Tobias Springenberg. Unsupervised and semi-supervised learning with categorical generative adversarial networks. arXiv preprint arXiv:1511.06390, 2015. Hao Su, Charles R Qi, Yangyan Li, and Leonidas J Guibas. Render for cnn: Viewpoint estimation in images using cnns trained with rendered 3d model views. In Proceedings of the IEEE International Conference on Computer Vision, pp. 2686–2694, 2015. Xiaolong Wang and Abhinav Gupta. Generative image modeling using style and structure adversarial networks. arXiv preprint arXiv:1603.05631, 2016. Fernando Wario, Benjamin Wild, Margaret Jane Couvillon, Raúl Rojas, and Tim Landgraf. Automatic methods for long-term tracking and the detection and decoding of communication dances in honeybees. Frontiers in Ecology and Evolution, 3:103, 2015. Yu Xiang, Roozbeh Mottaghi, and Silvio Savarese. Beyond pascal: A benchmark for 3d object detection in the wild. In IEEE Winter Conference on Applications of Computer Vision, pp. 75–82. IEEE, 2014. Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod Lipson. How transferable are features in deep neural networks? In Advances in neural information processing systems, pp. 3320–3328, 2014. 11 Under review as a conference paper at ICLR 2017 Appendices A G ENERATED I MAGES (a) Generated images (b) Real images Figure 9: Continuum visualization on the basis of the discriminator score: Most realistc scored samples top left corner to least realistc bottom right corner. Images with artifacts are scored unrealistic and are not used for training. 12 Under review as a conference paper at ICLR 2017 Figure 10: Images generated with the generator given a fixed bit configuration Figure 11: Correspondence of generated images and 3D model 13 Under review as a conference paper at ICLR 2017 B H ANDMADE AUGMENTATIONS We constructed augmentations for blur, lighting, background, noise and spotlights manually. For synthesizing lighting, background and noise, we use image pyramids, i.e. a set of images L0 , . . . , L6 of size (2i × 2i ) for 0 ≤ i ≤ 6. Each level Li in the pyramid is weighted by a scalar ωi . Each pixel of the different level Li is drawn from N (0, 1). The generated image I6 is given by: I0 = ω0 L0 Ii = ωi Li + upscale(Ii−1 ) (10) (11) , where upscale doubles the image dimensions. The pyramid enables us to generate random images while controlling their frequency domain by weighting the pyramid levels appropriately. • Blur: Gaussian blur with randomly sampled scale. • Lighting: Similar as in the RenderGAN. Here, the scaling of the white and black parts and shifting is constructed with image pyramids. • Background: image pyramids with the lower levels weight more. • Noise: image pyramids with only the last two layer. • Spotlights: overlay with possible multiple 2D Gauss function with a random position on the tag and random covariance. We selected all parameters manually by comparing the generated to real images. However, using slightly more unrealistic images resulted in better performance of the DCNN trained with the HM 3D data. The parameters of the handmade augmentations can be found online in our source code repository. C AUGMENTATIONS OF THE REAL DATA We scale and shift the pixel intensities randomly, i.e. sI +t, where I is the image and s, t are scalars. The noise is sampled for each pixel from N (0, ), where  ∼ max(0, N (µn , σn )) is drawn for each image separately. Different affine transformations (rotation, scale, translation, and shear) are used. Table 3: Parameters of the augmentation of the real data Name Intensity Scale (s) Intensity Shift (t) Noise Mean (µn ) Noise Std (σn ) Rotation Scale Shear Translation 14 Distribution unif(0.9, 1.1) unif(-0.2, 0.2) 0.04 0.03 unif(0, 2π) unif(0.7, 1.1) unif(-0.3, 0.3) unif(-4, 4) Under review as a conference paper at ICLR 2017 D T RAINING SAMPLES (a) Real trainings samples (b) HM 3D training samples (c) HM LI training samples (d) HM BG training samples (e) RenderGAN Figure 12: Training samples from the different datasets. 15
9cs.NE
arXiv:1607.04030v3 [math.GT] 26 Feb 2018 THE EXTENDED MAPPING CLASS GROUP CAN BE GENERATED BY TWO TORSIONS XIAOMING DU Abstract. Let Sg be the closed oriented surface of genus g and let Mod± (Sg ) be the extended mapping class group of Sg . When the genus is at least 5, we prove that Mod± (Sg ) can be generated by two torsion elements. One of these generators is of order 2, and the other one is of order 4g + 2. 1. Introduction Let Sg be the closed oriented surface of genus g. The extended mapping class group Mod± (Sg ) is defined as Homeo± (Sg )/Homeo0 (Sg ), the group of homotopy classes of homeomorphisms (including orientation-preserving ones and orientation-reversing ones) of Sg , and the mapping class group Mod(Sg ) is defined by Homeo+ (Sg )/Homeo0 (Sg ), the group of orientation-preserving homotopy classes of homeomorphisms of Sg . For Mod(Sg ), Dehn and Lickorish found independently Dehn twist generating sets of Mod(Sg ) [3, 11]. Humphries reduced the number of Dehn twist generators to the lowest bound [5]. Wajnryb in [17] found that the minimal number of the generators (not only Dehn twist generators) for the mapping class groups is 2. We are also interested in the torsion generating set. McCarthy and Papadopoulos in [15] proved that Mod(Sg ) can be generated by infinitely many elements of order 2 when g ≥ 3. Luo showed that Mod(Sg ) is generated by 12g + 6 elements of order 2 when g ≥ 3 [12]. Brendle and Farb reduced the number of the involution generators to 6 [1] and prove Mod(Sg ) can be generated by three torsion elements. Kassabov reduced the number of the involution generators to 4 [8] for g ≥ 7. Korkmaz in [9] proved Mod(Sg ) can be generated by two torsion elements of order 4g + 2. Monden in [14] proved Mod(Sg ) can be generated by 3 torsion elements of order 3. 2010 Mathematics Subject Classification. 57N05, 57M20, 20F38. Key words and phrases. mapping class group, generator, torsion. This research is supported by NSFC (Grant No. 11401219). The author wish to thank BICMR for its hospitality and thank Boju Jiang who asked me about the problem of finding lower bounds of the orders and the numbers of torsion generators for the mapping class groups. The author also wish to thank Dingsen Yan who teach me how to draw pictures with the metapost package of the latex. 1 2 XIAOMING DU For the extended mapping class group Mod± (Sg ), Dehn-Nielsen-Baer theorem [4] says that Mod± (Sg ) is isomorphic to Out(π1 (Sg )), the outer automorphism group of π1 (Sg ). Ivanov proved that Mod± (Sg ) is the automorphism group of the curve complex [6]. Brock and Margalit showed that Mod± (Sg ) is the automorphism group of the pants complex and it is also the isometry group of the Teichmüller space under the Weil-Petersson metric ([2],[13]). Korkmaz showed that Mod± (Sg ) can be generated by 2 elements, one of which is a Dehn twist [9]. Stukow in [16] proved Mod± (Sg ) is generated by 3 elements of order 2. It is an open problem if Mod± (Sg ) can be generated by two torsion elements (See [10], Problem 5.3). In this paper, under the condition that the genus of the surface is at least 5, we answer this question affirmatively: Theorem 1.1. For g ≥ 5, the extended mapping class group Mod± (Sg ) can be generated by 2 torsion elements. One of these generators is of order 2 and the other one is of order 4g + 2. 2. Preliminaries Notations: (a) We use the convention of functional notation, namely, elements of the mapping class group are applied right to left, i.e. the composition F G means that G is applied first. (b) A Dehn twist means a right-hand Dehn twist. (c) We denote the curves by lower case letters a, b, c, d (possibly with subscripts) and the Dehn twists about them by the corresponding capital letters A, B, C, D. Notationally we do not distinguish a diffeomorphism/curve and its isotopy class. We recall the following results (see, for instance, section 3.3, 5.1, 7.5 of [4]): Lemma 2.1. For any ϕ ∈ Mod(Sg ) and any isotopy classes a, b of simple closed curves in Sg satisfying ϕ(a) = b, we have: B = ϕ A ϕ−1 . Lemma 2.2. For any ϕ ∈ Mod± (Sg ) \ Mod(Sg ) and any isotopy classes a, b of simple closed curves in Sg satisfying ϕ(a) = b, we have: B −1 = ϕ A ϕ−1 . Lemma 2.3. Let a, b be two simple closed curves on Sg . If a is disjoint from b, then AB = BA. THE EXTENDED MAPPING CLASS GROUP CAN BE GENERATED BY TWO TORSIONS 3 c y x d a b z Figure 1 Lemma 2.4 (Lantern relation). Let a, b, c, d, x, y, z be the curves showed in Figure 1 on a genus zero surface with four boundaries. Then ABCD = XY Z. In other words, since a, b, c are disjoint from x, y, z, we have D = (XA−1 )(Y B −1 )(ZC −1 ). The elements having the form of U V −1 for some disjoint simple closed curves u, v play a crucial role in our proof. The proof of the main result relies on Humphries’ theorem: Theorem 2.5 (Humphries). Let a1 , a2 , . . . a2g , b be the curves as on the lefthand side of Figure 2. Then the mapping class group Mod(Sg ) is generated by Ai ’s and B. a1 b a3 a4 a2 a3 a4 a5 a2 a1 a 2g b σ a6 a 2g a 2g a1 a2 a4 a3 Figure 2 Consider the genus g surface as a regular (4g+2)-gon whose corresponding opposite sides are glued together, as indicated on the right-hand side of Figure 2. We redraw the curves of Humphries’ generating set on the righthand side of Figure 2 as follow. The set of curves ai ’s on the left-hand side of Figure 2 is a chain of simple closed curves and fills the surface. We find a chain of simple closed curves which also fills the surface on the right-hand side of Figure 2, identify them with ai ’s. To see the corresponding curve of b, notice that b intersects a4 once and is disjoint from other ai ’s. Then find such a curve on the right-hand side of Figure 2. Look at the (4g+2)-gon. There is a natural 2π/(4g+2) rotation preserving the gluing way of the (4g + 2)-gon. This rotation induces a period map σ 4 XIAOMING DU of the genus g surface. Moreover, σ(ai ) = ai+1 for 1 ≤ i ≤ 2g − 1. Take a0 = σ(a2g ). Then we have a1 = σ(a0 ). Under modulo 2g + 1, we have ak = σ k (a0 ) for all integer k and ai+1 = σ(ai ) still holds for all i’s. Similarly, since σ is of order 4g+2, under modulo 4g+2, we take b0 = b and bk = σ k (b). Then we have σ(bj ) = bj+1 for all j’s. To see back the image of bj ’s on the left-hand side of Figure 2, since the set of ak ’s form a chain of simple closed curves filling the surface, we only need to calculate the geometric intersection number i(bj , ak ) for each k on the right-hand side of Figure 2, then find a curve with the same geometric intersection numbers with ak ’s as on the left-hand side of Figure 2. Figure 3 shows this way to think of the images of bj ’s. Figure 2 and Figure 3 will be used in the proof of Theorem 3.1 to verify the disjointness between some ai and bj . b2 b1 b2g-4 b2g+2 b2g+4 b4g-4 b4g-2 b2g+3 b4g-3 b2g-5 b2g-3 b3 b4g b2g-2 b4g-1 b2g-1 b0 b2g b4g+1 b2g+1 Figure 3 3. The main result and the proof Let τ be the symmetry of the (4g + 2)-gon as on the left-hand side of Figure 4. Then τ induces an orientation-reversing homeomorphism of the genus g surface. The fixed point set of τ forms a non-separating curve. A part of such a non-separating curve is along the axis of the symmetry. We still denote the homotopy class of such a homeomorphism as τ . Since τ preserves the curve b, it is easy to check that (τ ◦ B)2 = Id. THE EXTENDED MAPPING CLASS GROUP CAN BE GENERATED BY TWO TORSIONS 5 E ´ ´ ´ Figure 4 Theorem 3.1. Let σ be the element of order 4g + 2 and τ ◦B be the element of order 2 as we described above. Then for g ≥ 5 we have Mod± (Sg ) = hσ, τ ◦ Bi. Remark 3.2. This generating set can also apply to Mod± (Sg,1 ), i.e., the extended mapping class group of the surface with one marked point. This is because the element σ and τ ◦ B fix the center point of the 4g + 2-gon. Remark 3.3. From Theorem 3.1 we can also deduce that Mod± (Sg ) can be generated by 3 symmetries when g ≥ 5. The reason is that σ is like the rotation of the (4g + 2)-gon. In the dihedral group of the (4g + 2)-gon, the rotation is the product of two reflections (see the right-hand side of Figure 4). Such reflections of (4g + 2)-gon induce orientation reversing order 2 maps τ, τ2 on the surface. Hence Mod± (Sg ) = hτ ◦ B, τ, τ2 i. So we can get another proof of the result in [16] under the condition g ≥ 5. Our generating set is different from the generating set in [16]. The fixed-point sets of two of the symmetries in [16] are separating curves. The fixed-point sets of our symmetries are non-separating curves. Proof of Theorem 3.1. Denote the subgroup generated by σ and τ ◦ B as G. We prove that G = Mod± (Sg ) in four steps: Step 1. Under modulo 4g + 2, the following two conditions are equivalent: (1) integers i, k satisfy k ∈ {4, 5, 6, . . . , 4g − 2} \ {2g − 2, 2g, 2g + 2, 2g + 4}; −1 and (2) bi is disjoint from bi+k . Under such conditions we have Bi Bi+k −1 Bi Bi+k are in G. Step 2. Under modulo 2g + 1 for m and modulo 4g + 2 for n, the following two conditions are equivalent: (1) integers m, n satisfy m 6∈ {n, n + 4}; (2) am is disjoint from bn . Under such conditions we have Am Bn−1 and A−1 m Bn are in G. Step 3. Using the lantern relation, prove that for all k, Ak ∈ G. Step 4. Finally, G = Mod± (Sg ). The proof of Step 1: It is obvious that b0 is disjoint from bk if and only if k ∈ {4, 5, 6, . . . , 4g − 2} \ {2g − 2, 2g, 2g + 2, 2g + 4} (see Figure 2 and Figure 3). So do bi and 6 XIAOMING DU bi+k . Under such conditions, we first prove that B0 Bk−1 ∈ G. Consider the element σ k (τ ◦ B) σ k (τ ◦ B). In the dihedral subgroup of Mod± (Sg ), σ k τ σ k τ is the identity. After adding the Dehn twist B, since bk is disjoint from b0 , we can easily check that σ k (τ ◦ B) σ k (τ ◦ B) = B0 Bk−1 . For every −1 integer i, conjugate B0 Bk−1 by σ i . Then we have Bi Bi+k is in G. The −1 commutativity of Bi and Bi+k promise Bi Bi+k is in G. The proof of Step 2: It is obvious that the disjointness between ai and b0 is equivalent to i 6∈ {0, 4}. So am is disjoint from bn is equivalent to m 6∈ {n, n + 4}. From these conditions, we also see that ai is disjoint from b0 if and only if a4−i is disjoint from b0 . By the conjugacy relation, for some i, k, m, n satisfying the conditions in Step 1 and Step 2, if there exists ϕ ∈ G and a pair of disjoint curves (bi , bi+k ) −1 such that ϕ : (bi , bi+k ) 7→ (am , bn ), since Bi Bi+k is in G, Am Bn−1 is also in G. We need to find such a ϕ ∈ G. The proofs in odd genus case and in even genus case are slightly different. Suppose first that the genus g is odd. See Figure 5. -1 -1 (B2g+2 B2g-4 ) (B2g+2 B2g-3 )   b2g+2 b4g+1 c1 b2g+2 -1 -1 ... (B2g-3 B-1 (B2g-3 B 6 ) (B2g-3 B-1 2g-8) (B2g-3 B 2g-7) 7)  c2 c1 b2g-3 -1 B0 B2g-3 -1 (B3 B 2g-3 ) (B2 B-1 2g-3 )  a3  b2g-3  c3 b2g-3 b2g-3 Figure 5 −1 By Step 1, B2g+2 B4g+1 is in G. If g ≥ 5, b2g+2 is disjoint from b2g−3 , b2g−4 . −1 −1 −1 Both B2g+2 B2g−4 and B2g+2 B2g−3 are in G. The element (B2g+2 B2g−4 ) · −1 (B2g+2 B2g−3 ) maps the pair of curves (b2g+2 , b4g+1 ) to the pair of curves −1 (b2g+2 , c1 ) as in Figure 5 (2). Hence B2g+2 C1−1 is in G. Now B2g−3 B2g+2 is −1 also in G. So B2g−3 C1 is in G. The curve b2g−3 is disjoint from b2g−7 , b2g−8 , . . . , b7 , b6 . The elements −1 −1 (B2g−3 B6−1 ), (B2g−3 B7−1 ) . . . (B2g−3 B2g−8 ), (B2g−3 B2g−7 ) are in G. Then THE EXTENDED MAPPING CLASS GROUP CAN BE GENERATED BY TWO TORSIONS 7 −1 −1 their product (B2g−3 B6−1 ) · (B2g−3 B7−1 ) . . . (B2g−3 B2g−8 ) · (B2g−3 B2g−7 ) maps the pair of curves (b2g−3 , c1 ) to the pair of curves (b2g−3 , c2 ) as in Figure 5 (4). We have B2g−3 C2−1 is in G. The curve b2g−3 is disjoint from b3 and b2 . The elements (B2g−3 B2−1 ), −1 −1 (B2g−3 B3−1 ) are in G. Their product (B3 B2g−3 ) · (B2 B2g−3 ) maps the pair of curves (b2g−3 , c2 ) to the pair of curves (b2g−3 , a3 ). So we get that B2g−3 A−1 3 −1 is in G. Its inverse A3 B2g−3 is also in G. Suppose now that g is even. See Figure 6. -1 -1 (B 2g-3 B4-1)(B 2g-3 B5-1) ... (B 2g-3 B2g-8 )(B 2g-3 B2g-7)  c2 c1 b2g-3  b2g-3 -1 B0 B2g-3  a4 b2g-3 Figure 6 In this case, the proof of B2g−3 C1−1 ∈ G is the same as the odd genus case. −1 −1 The element (B2g−3 B4−1 ) · (B2g−3 B5−1 ) . . . (B2g−3 B2g−8 ) · (B2g−3 B2g−7 ) maps the pair of curves (b2g−3 , c1 ) to the pair of curves (b2g−3 , c2 ) as in −1 Figure 6 (2). The element B0 B2g−3 maps the pair of curves (b2g−3 , c2 ) to the pair of curves (b2g−3 , a4 ). So we get that B2g−3 A−1 4 is in G. Its inverse −1 A4 B2g−3 is also in G. The element σ 2g+5 maps (a3 , b2g−3 ) to (a2g+8 , b0 ) when g is odd and maps (a4 , b2g−3 ) to (a2g+9 , b0 ) when g is even. We have Ai B0−1 = B0−1 Ai ∈ G for some i where ai is disjoint from b0 . Notice that τ σ k τ maps ai to ai−k , hence Ai−k = (τ σ k τ ) Ai (τ σ k τ )−1 . So as long as ai−k is disjoint from b0 , we have (τ ◦ B0 ) σ k (τ ◦ B0 ) (Ai B0−1 ) σ k = (B0−1 ◦ τ ) σ k (τ ◦ Ai ) σ k = B0−1 (τ σ k τ ) Ai σ k = B0−1 (Ai−k τ σ k τ ) σ k = B0−1 Ai−k = Ai−k B0−1 . Taking all possible k and conjugating by σ n , we have all Am Bn−1 ∈ G for m 6∈ {n, n + 4}. The commutativity of Am and Bn promises A−1 m Bn is in G. The proof of Step 3: See Figure 7. There is a natural lantern lying on the surface, bounded by a1 , a3 , a5 and f . By the lantern relation, we have B0 B2 E = A1 A3 A5 F , −1 −1 ), where e and f are the curves showed in or A1 = (B0 A−1 3 )(B2 A5 )(EF −1 −1 Figure 7. The elements B0 A−1 3 and B2 A5 are the inverses of A3 B0 and 8 XIAOMING DU A5 B2−1 respectively. By the result of step 2, they are in G. We only need to prove EF −1 is also in G. b a1 a1 f b a3 f e a5 a3 a5 b g- b g- Figure 7 When g ≥ 5, b2g−3 is disjoint from b0 , . . . , b3 , a1 , . . . , a6 , e, f . Notice −1 −1 EF −1 = (EB2g−3 )(B2g−3 F −1 ). We verify EB2g−3 and B2g−3 F −1 are in G. −1 −1 −1 By the previous steps, The element (B2g−3 B3 ) · (A6 B2g−3 ) · (A5 B2g−3 ) −1 · (A4 B2g−3 ) is in G and maps the pair of curves (b2g−3 , b0 ) to (b2g−3 , f ). −1 Notice B2g−3 B0−1 is in G. So B2g−3 F −1 is in G. The element (A2 B2g−3 ) −1 −1 −1 · (A1 B2g−3 ) · (A4 B2g−3 ) · (B1 B2g−3 ) maps the pair of curves (b2g−3 , a5 ) −1 is in G. We now get to (b2g−3 , e). Notice B2g−3 A−1 5 is in G. So B2g−3 E −1 −1 −1 EF = (EB2g−3 )(B2g−3 F ) is in G. The proof of Step 4: The fact that the elements A1 and A1 B0−1 are in G means that B0 ∈ G. Now all the curves ai ’s are in the same orbit of σ. So do bj ’s. So all the Ai ’s and Bj ’s are in G. These include Humphries’ generators of Mod(Sg ). So G contains Mod(Sg ). Finally, one of the generator τ ◦ B is an orientationreversing mapping class. Hence G = Mod± (Sg ).  Remark 3.4. The idea of Step 2 and Step 3 in the above proof is based on the method in [9] to prove Mod(Sg ) is generated by two torsions of order 4g + 2. References [1] T. E. Brendle and B. Farb. Every mapping class group is generated by 3 torsion elements and by 6 involutions. J. Algebra 278 (2004), 187–198. [2] J. Brock and D. Margalit. Weil-Petersson isometries via the pants complex. Proc. Amer. Math. Soc., 135(3):795–803 (electronic), 2007. [3] M. Dehn. Papers on group theory and topology (Springer-Verlag, New York, 1987) (Die Gruppe der Abbildungsklassen, Acta Math. Vol. 69 (1938), 135– 206). [4] B. Farb and D. Marglait. A Primer on Mapping Class Groups. Princeton Math. Ser., (Princeton University Press, 2012), 623–658. [5] S. P. Humphries. Generators for the mapping class group. Topology of lowdimensional manifolds. Proc. Second Sussex Conf. Chelwood Gate 1977 Lecture Notes in Math. 722 (Springer, 1979), 44–47. [6] N. V. Ivanov. Automorphism of complexes of curves and of Teichmuller spaces. Internat. Math. Res. Notices, (14):651–666, 1997. THE EXTENDED MAPPING CLASS GROUP CAN BE GENERATED BY TWO TORSIONS 9 [7] D. Johnson. The structure of Torelli group I: A finite set of generators for I. Ann. of Math. 118 (1983), 423–442. [8] M. Kassabov. Generating Mapping Class Groups by Involutions. arXiv:math.GT/0311455 v1 25 Nov 2003. [9] M. Korkmaz. Generating the surface mapping class group by two elements. Trans. Amer. Math. Soc. 357 (2005), 3299–3310. [10] M. Korkmaz. Minimal generating sets for the mapping class group of a surface. Handbook of Teichmüller theory. Volume III, 441–463, IRMA Lect. Math. Theor. Phys., 17, Eur. Math. Soc., Zürich, 2012. [11] W. B. R. Lickorish. A finite set of generators for the homeotopy group of a 2-manifold. Proc. Camb. Phils. Soc. 60 (1964), 769–778. [12] F. Luo. Torsion Elements in the Mapping Class Group of a Surface. arXiv:math.GT/0004048 v1 8 Apr 2000. [13] D. Margalit. Automorphisms of the pants complex. Duke Math. J., 121(3):457–479, 2004. [14] N. Monden. Generating the mapping class group by torsion elements of small order. Mathematical Proceedings of the Cambridge Philosophical Society, 154 (2013), pp 41–62, doi:10.1017/S0305004112000357. [15] J. D. McCarthy and A. Papadopoulos. Involutions in surface mapping class groups.Enseign. Math.(2) 33 (1987), no. 3–4, 275–290. 456. [16] M. Stukow. The extended mapping class group is generated by 3 symmetries. C. R. Math. Acad. Sci. Paris 338 (2004), no. 5, 403–406. [17] B. Wajnryb. Mapping class group of a surface is generated by two elements. Topology, 35(2), 377–383, 1996. South China University of Technology, Guangzhou 510640, P.R.China E-mail address: [email protected]
4math.GR
STUDY OF JOINT MMSE CONSENSUS AND RELAY SELECTION ALGORITHMS FOR DISTRIBUTED BEAMFORMING arXiv:1707.00953v1 [cs.IT] 28 May 2017 Hang Ruan * and Rodrigo C. de Lamare*# *Department of Electronics, The University of York, England, YO10 5BB # CETUC, Pontifical Catholic University of Rio de Janeiro, Brazil Emails: [email protected], [email protected] ∗ ABSTRACT This work presents joint minimum mean-square error (MMSE) consensus algorithm and relay selection algorithms for distributed beamforming. We propose joint MMSE consensus relay and selection schemes with a total power constraint and local communications among the relays for a network with cooperating sensors. We also devise greedy relay selection algorithms based on the MMSE consensus approach that optimize the network performance. Simulation results show that the proposed scheme and algorithms outperform existing techniques for distributed beamforming. Index Terms— Distributed beamforming, relay selection, consensus algorithms. 1. INTRODUCTION Distributed beamforming has been widely investigated in wireless communications in recent years [1, 2, 3, 15]. It is key for situations in which the channels between the sources and the destination have poor quality so that devices cannot communicate directly and the destination relies on relays that receive and forward the signals [2]. The work in [3] formulates an optimization problem that maximizes the output signal-to-interference-plus-noise ratio (SINR) under the individual relay power constraints. The approach in [7] proposes an MMSE consensus cooperative relay networking scheme to exchange data among all the relays under a total power constraint, which limits the total power of all relays regardless of the power allocation. While local communications among the relays are enabled, the ability to mitigate fading effects in wireless channels of the network can be improved [8]. Further earlier works in [12] and [13] explored local communications, while avoiding network centralized processing, which is not desirable and always comes along with the use of total power constraints [7]. However, in most scenarios relays are either not ideally distributed in terms of locations or the channels involved with some of the relays have poor quality. Possible solutions can be categorized in two approaches. One is to adaptively adjust the power of each relay according to the qualities of its associated channels, known as adaptive power control or power allocation. Some power control methods based on channel magnitude and relative analysis has been studied in [6, 14]. An alternative solution is to use relay selection, which selects a number of relays according to a criterion of interest while discarding the remaining relays. In [4], multi-relay selections algorithm have been developed to maximize the secondary receiver in a two-hop cognitive relay network. In [8], several optimum singlerelay selection schemes and a multi-relay selection scheme using ∗ This work was supported in part by The University of York relay ordering based on maximizing the output SNR under individual relay power constraints are developed and discussed. The work in [9] proposed a low-cost greedy search method for the uplink of cooperative direct sequence code-division multiple access systems, which approaches the performance of an exhaustive search. Other approaches include the use of subspace techniques [16, 17, 18, 19, 20, 21, 22, 135, 37, 25, 26, 27, 28, 29, 30, 31, 137, 33, 34, 35, 36, 47, 37, 38, 39, 40, 41, 42, 43, 44, 49, 46, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 196, 68, 69, 70, 71]. and large sensor arrays [197, 198, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 99, 89, 90, 91, 92, 93, 95, 96, 97, 98, 100, 101],[174, 161, 179, 176, 164, 107, 108, 138, 163, 131, 112, 138, 114, 193, 116, 117, 133]. In this work, we propose a joint minimum mean-square error (MMSE) consensus and relay selection approach and develop iterative greedy search based relay selection algorithms for distributed beamforming. In the first proposed algorithm we aim to find largest minimum value of a cost function regarding the desired signal by enabling only one relay at once, testing through all the relays one by one, then we select all the disabled relays when the network has the largest MMSE (LMMSE) value in each iteration, namely, the SMMSE consensus greedy (LMMSEC-G) relay selection algorithm. In the second proposed approach, we aim to find the smallest minimum value of the same cost function, by disabling only one relay at once, testing through all the relays one by one, then preserve all the selected relays when the network has the smallest MMSE (SMMSE) estimate in each iteration, namely, the the SMMSE consensus greedy (SMMSEC-G) relay selection algorithm. We compare the proposed greedy relay selection algorithms to the exhaustive search and the scenario without relay selection, showing their excellent output SINR performance which is close to the exhaustive search approach. This paper is organized as follows. In Section 2, the system model is introduced. In Section 3, the joint MMSE consensus and relay selection scheme is presented. In Section 4, the greedy relay selection algorithms are proposed. In Section 5, simulations are presented and discussed. Finally, conclusions are drawn in Section 6. 2. SYSTEM MODEL We consider a wireless communication network consisting of K signal sources (one desired signal with the others as interferers), M distributed single-antenna relays and a destination. It is assumed that the quality of the channels between the signal sources and the destination is very poor so that direct communications is not possible and their links are negligible. The M relays receive information transmitted by the signal sources and then retransmit to the destination as a beamforming procedure, in which a two-step amplify-and-forward (AF) protocol (as shown in Fig. 1) is considered as required for cooperative communications. M relays K signal sources destination where γ is the distance based path loss, L is the known path loss at the destination, d is the distance of interest relative to the destination and ρ is the path loss exponent, which can vary due to different environments and is typically set within 2 to 5, with a lower value representing a clear and uncluttered environment which has a slow attenuation and a higher value describing a cluttered and highly attenuating environment. Shadow fading describes the phenomenon where objects can obstruct the propagation of the signal attenuating the signal further, and can be modeled as a random variable with probability distribution given by β = 10( noise n g F noise ν Fig. 1. System model. In the first step, the sources transmit the signals to the relays as x = Fs + ν, (1) where s = [s1 , s2 , · · · , sK ] ∈ C1×K are √ signal sources with zero mean, [.]T denotes the transpose, sk = Pk s, E[|s|2 ] = 1, Pk is the transmit power of the kth signal source, k = 1, 2, · · · , K, s is the information symbol. Without loss of generality we can assume s1 as the desired signal while the others are treated as interferers. F = [f1 , f2 , · · · , fK ] ∈ CM ×K is the channel matrix between the signal sources and the relays, fk = [f1,k , f2,k , · · · , fM,k ]T ∈ CM ×1 , fm,k denotes the channel between the mth relay and the kth source (m = 1, 2, · · · , M , k = 1, 2, · · · , K). ν = [ν1 , ν2 , · · · , νM ]T ∈ CM ×1 is the complex Gaussian noise vector at the relays and σν2 is the noise variance at each relay (νm ˜ CN (0, σν2 )). The vector x ∈ CM ×1 represents the received data at the relays. In the second step, the relays transmit y ∈ CM ×1 which is an amplified and phase-steered version of x, which can be written as y = Wx, (2) where W = diag[w1 , w2 , · · · , wM ] ∈ CM ×M is a diagonal matrix whose diagonal entries denote the beamforming weights. The signal received at the destination is given by z = gT y + n, , (5) where β is the shadowing parameter, N (0, 1) means the Gaussian distribution with zero mean and unit variance, σs is the shadowing spread in dB. The shadowing spread reflects the severity of the attenuation caused by shadowing, and is typically given between 0dB to 9dB. The channels modeled with both path-loss and shadowing are described by F = γβF0 , (6) g = γβg0 , (7) where F0 and g0 denote the Rayleigh distributed channels without path-loss and shadowing [10, 11]. 3. PROPOSED JOINT MMSE CONSENSUS AND RELAY SELECTION In this section, we detail the proposed joint MMSE consensus and relay selection scheme for distributed beamforming using an alternating optimization approach in which the relay selection is followed by MMSE consensus of beamformers. We assume at the mth relay the MMSE estimate of the desired signal ŝm,1 can be found as ŝm,1 = φm xm , (8) where φm = arg minφ E[|s1 − φxm |2 ] = PK k=1 For convenience we define s̃m,1 = relay weight as ŝm,1 E[|ŝm,1 |2 ] ∗ fm,1 P1 |fm,k |2 Pk + σn2 . and the normalized wm φm , so that the total transmission E[|ŝ |2 ] PMm,1 PM 2 2 E[|w m s̃m,1 | ] = m=1 m=1 |wm | . power can be expressed as Therefore, the MMSE consensus optimization associated with a fixed set of relays under a total power constraint is given by (3) where z is a scalar, g = [g1 , g2 , · · · , gM ]T ∈ CM ×1 is the complex Gaussian channel vector between the relays and the destination, n (n ˜ CN (0, σn2 ), σn2 = σν2 ) is the noise at the destination and z is the received signal at the destination. Note that both F and g are modeled as Rayleigh distributed (i.e., both the real and imaginary coefficients of the channel parameters have Gaussian distribution). Using the Rayleigh distribution for the channels, we also consider distance based large-scale channel propagation effects that include distance-based fading (or path loss) and shadowing. Distance-based fading represents how a signal is attenuated as a function of the distance and can be highly affected by the environment. [10, 11] An exponential based path loss model can be described by √ L γ= √ , (4) dρ σs N (0,1) ) 10 ∗ wm = arg min wm M X m=1 E[|s1 − gm wm s̃m,1 |2 ] s.t. M X m=1 (9) 2 |wm | ≤ PT , where PT is the maximum allowable total transmit power of all relays. The relay selection problem for the MMSE consensus can be described as an optimization problem using a total relay transmit power constraint described by Sopt = arg min M M SE(S) α,w s.t. M X m=1 αm |wm |2 ≤ PT , αm ∈ {0, 1}, m = 1, 2, · · · , M (10) PM 2 where M M SE(S) = m=1 αm E[|s1 − gm wm s̃m,1 | ], w = T M ×1 [w1 , w2 , · · · , wM ] ∈ C , Sopt and S are the optimum relay set of size Mopt , (1 ≤ Mopt ≤ M ) and the original relay set of size M , respectively. The vector α = [α1 , α2 , · · · , αM ]T ∈ RM ×1 , αm (m = 1, · · · , M ) is the relay cooperation parameter vector which determines if the mth relay will cooperate. The solution of (10) regarding wm indicates the following relationship: ∗ wm = ∗ αm gm λ + αm |gm |2 s |fm,1 |2 P12 , 2 2 k=1 |fm,k | Pk + σn Table 1. LMMSEC-G relay selection algorithm Initialize Sopt = S(0), α = 1, w̃m = 1, λm (0) = 1, τm,q (0) = 1 and compute M M SEo = M M SE(0). for i = 1, · · · , M − Mmin step 1: compute τm,q (i) = τm,q (i − 1) + µτ (um − uq ), and τm,q (i) = τm,q (i − 1) + µτ (um − uq ). step 2: compute the consensus weight using (14). step 3: solve the optimization problem (17) and obtain S̄(i). compute S(i) using S(i − 1)-S̄(i). compute M M SE(i) using S(i). compare M M SE(i) to M M SE(i)(i − 1), if M M SE(i) < M M SE(i − 1) update Sopt = S(i) and M M SEo = M M SE(i). update α(i). else keep Sopt = S(i − 1) and M M SEo = M M SE(i − 1). break. end if. end for. (11) PK where λ is the Langrange multiplier, which can be determined by enabling the local communication of the relays with an MMSE consensus approach. To this end, we employ an auxiliary beamforming weight vector w̃m = [w̃1,m , · · · , w̃M,m ]T and consider the following joint optimization problem: min αm E[|s1 − gm wm s̃m,1 |2 ] w̃m ,α (12) s.t. ||α||1 ||w̃m ||2 ≤ PT , w̃m = w, αm ∈ {0, 1}, m = 1, 2, · · · , M where w = diag(W) ∈ CM ×1 . It is supposed that the mth relay is connected to a subset of relays denoted by Mm . The second constraint in (12) can be replaced by w̃m = w̃q , q ∈ Mm so that (12) is reformulated as min 2 w̃m ,α 4.1. LMMSEC-G relay selection algorithm 2 We develop the LMMSEC-G algorithm to obtain the solution of (12), which depends on the relay selection parameter vector α to find the optimum α. The LMMSEC-G works in an iterative way and discards only the worst relay to find the optimal relay set in each iteration. Additionally, the parameter Mmin can be introduced to restrict the minimum number of relays that must be used. The LMMSEC-G algorithm finds the largest MMSE at each iteration and selects the complementary relays, which is described as follows αm E[|s1 − gm wm s̃m,1 | ] + λm (i)(||α||1 ||w̃m || − PT ) X T + τm,q (w̃m − w̃q ), q∈Mm (13) where λm (i) and τm,q are Lagrange multipliers.The proposed algorithmic solution relies on the alternating optimization associated with relay selection, computation of the optimal weights and Lagrange multipliers at the mth relay as w̃t,m r  ∗ |fm,1 |2 P12 αm gm   PK (  2 − λm (i)+αm |gm |2  |fm,k |2 Pk +σn k=1   = if t =Pm αm q∈M τm,q;t   m  − ,  2λm (i)   if t 6= m P S̄(i) = arg max M M SE(S(i − 1)) α(i) q∈Mm τm,q;m 2 (14) where τm,q;t denotes the tth element of τm,q . The Lagrange multipliers are updated as follows λm (i) = |λm (i − 1) + µλ (||w̃m ||2 − PT )|, (15) τm,q (i) = τm,q (i − 1) + µτ (um − uq ), (16) where µλ and µτ are step sizes with small positive values, um = [|w1,m |, · · · , |wM,m |]T and i is the time index [7]. 4. PROPOSED GREEDY RELAY SELECTION ALGORITHMS In this section, we detail the algorithms that perform relay selection, develop the LMMSEC-G and SMMSEC-G relay selection algorithms and review the exhaustive search. ), s.t. ||w̃m (i)||2 =≤ PT , w̃m (i) = w(i), αm (i) ∈ {0, 1}, m = 1, 2, · · · , M M − i ≥ Mmin , (17) where S̄(i) denotes the complement of the set S(i) from set S(i−1). The optimization problem compares all the MMSE values assuming that only one different single relay is enabled while the others are disabled. LMMSEC-G cancels the relay with largest MMSE value from set S(i − 1) and evaluates the MMSE performance of the remaining relays, which is solved only once in each iteration. If the MMSE in the current iteration is smaller than that in the previous iteration (i.e. M M SE(i) < M M SE(i − 1)), then the selection process continues; if M M SE(i) ≥ M M SE(i − 1), we cancel the selection of the current iteration and keep the relay set S(i − 1) and M M SE(i − 1). The LMMSEC-G algorithm is shown in Table. 1. 4.2. SMMSEC-G relay selection algorithm The proposed SMMSEC-G algorithm is an alternative way to find the solution of (12) regarding α, which aims to find the smallest MMSE from the remaining relays after disabling a single relay each time. It is an improved greedy search based method which also Table 2. SMMSECG Initialize Sopt = S(0), α = 1, w̃m = 1, λm (0) = 1, τm,q (0) = 1 and compute M M SEo = M M SE(0). for i = 1, · · · , M − Mmin step 1: compute τm,q (i) = τm,q (i − 1) + µτ (um − uq ), and τm,q (i) = τm,q (i − 1) + µτ (um − uq ). step 2: compute the consensus weight using (14). step 3: solve the optimization problem (18) and obtain S(i). compute M M SE(i) using S(i). compare M M SE(i) to M M SE(i − 1), if M M SE(i) < M M SE(i − 1) update Sopt = S(i) and M M SEo = M M SE(i). update α(i). else keep Sopt = S(i − 1) and M M SEo = M M SE(i − 1). break. end if. end for. by varying the input SNR or the total number of relays in the network. The parameters used include: number of signal sources K = 3, the path loss exponent ρ = 2, the power path loss from signals to the destination L = 10dB, shadowing spread σs = 3dB, PT = 1dBW, Mmin = 1. For the local communication between the relays, we set Mm = {m+1} and M = 1, µλ = µτ = 0.001. 100 repetitions are executed for each of the studied methods. In Fig. 2, we fixed the total number of relays M = 5 and interference-to-noise ratio (INR) at 10dB and evaluate the SINR versus SNR performance of the joint MMSE consensus and relay selection approaches and the existing techniques. Both the greedy search based methods, namely, LMMSEC-G and SMMSEC-G, increase the SINR performance as compared with the case without any relay selection and approach the exhaustive search especially at low SNRs. Fig. 3 illustrates that with a fixed SNR(0dB) and INR(0dB) how the output SINR varies when the total number of relays in the network increases. It is clear that using more relays enhance the overall network performance and the SMMSEC-G method performs very close to the exhaustive search. The proposed techniques could also be evaluated in terms of BER performance [90, 91, 92, 93, 94, 174, 163, 131, 138, 114, 193, 116, 117, 133, 199]. 10 5 0 −5 SINR (dB) works in iterations but with higher complexity and much better performance. We also consider Mmin as a restriction to the minimum number of relays that must be used. Before the first iteration all relays are considered (i.e., S(0) = S). Consequently, we solve the following problem once for each iteration in order to cancel the relay with worst performance from set S(i − 1) and evaluate the M M SE(i) at time instant i: −20 no relay selection exhaustive search LMMSEC−G SLMMSEC−G −30 −35 α(i) s.t. (M − i)||w̃m (i)|| ≤ PT , w̃m (i) = w(i), αm (i) ∈ {0, 1}, m = 1, 2, · · · , M M − i ≥ Mmin , −15 −25 S(i) = arg min M M SE(S(i − 1)) 2 −10 −40 −10 (18) −5 0 5 SNR (dB) 10 15 20 Fig. 2. SINR performance versus SNR If the MMSE in the current iteration is lower than that in the previous iteration (i.e. M M SE(i) < M M SE(i − 1)), then the selection process continues; if M M SE(i) ≥ M M SE(i − 1), we cancel the selection of the current iteration and keep the relay set S(i − 1) and M M SE(i − 1). The SMMSEC-G algorithm is shown in Table. 2. −10 −12 −14 4.3. Exhaustive Search SINR (dB) In an exhaustive search procedure, we test every possible combinations among all the relays, which means the change of status if a relay is chosen or not will contribute to a different possible combination. To obtain the global optimum solution, we need to run the consensus algorithm once without iterations. Also, we can predefine Mf ix as the required selected number of relays as an additional requirement. However, the complexity can be extremely high depending on the number of relays. −16 −18 −20 −22 no relay selection exhaustive search LMMSEC−G SMMSEC−G −24 −26 −28 −30 1 2 3 4 5 6 7 8 M 5. SIMULATIONS In the simulations we focus on the output SINR performance comparison of the proposed LMMSEC-G and SMMSEC-G algorithms Fig. 3. SINR performance versus M 9 10 6. CONCLUSION We have proposed a joint MMSE consensus and relay selection approach and developed efficient algorithms for distributed beamforming. We have proposed the LMMSEC-G and SMMSEC-G greedy optimization algorithms based on the MMSE criterion with known network quantities and relay selection strategies, which determines if a relay should cooperate or not in the network. The LMMSEC-G and SMMSEC-G algorithms have shown excellent performance and outperformed previously reported techniques. 7. REFERENCES [1] R. Mudumbai, D.R. Brown III, U. Madhow, and H.V. Poor, “Distributed Transmit Beamforming Challenges and Recent Progress,” IEEE Communications Magazine, Vol. 47, Issue. 2, pp. 102-110, 2009. [2] A. B. Gershman, N. D. Sidiropoulos, S. Shahbazpanahi, M. Bengtsson, and B. Ottersten, “Convex Optimization-Based Beamforming,” IEEE Signal Processing Magazine, Vol. 27, Issue. 3, pp. 62-75, May 2010. [3] J. Uher, T. A. Wysocki, and B. J. Wysocki, “Review of Distributed Beamforming,” Journal of Telecommunications and Information Technology, 2011. [4] J. Xu, H. Zhang, D. Yuan, Q. Jin, and C. Wang, “Novel Multiple Relay Selection Schemes in Two-Hop Cognitive Relay Networks,” Third International Conference on Communications and Mobile Computing, pp 207-310, April 2011. [5] L. Landau, “Advanced Robust Adaptive Beamforming for Wireless Networks,” Master Thesis, Technische Universitat Ilmenau Fakultat fur Elektrotechnik und Informationstechnik, May 2011. [6] Y. Jing and H. Jafarkhani, “Network Beamforming Using Relays With Perfect Channel Information,” IEEE Transactions on Information Theory, VOL. 55, NO. 6, pp. 2499-2517, June 2009. [7] J. Choi, “Distributed Beamforming Using a Consensus Algorithm for Cooperative Relay Networks,” IEEE Communication Letters, VOL. 15, Issue 4, pp. 368-370, April 2011. [8] Y. Jing, and H. Jafarkhani, “Single and Multiple Relay Selection Schemes and their Achievable Diversity Orders,” IEEE Transactions on Wireless Communications, VOL. 8, NO. 3, pp. 1414-1423, March 2009. [9] J. Gu and R. C. de Lamare, “Joint PIC and Relay Selection Based on Greedy Techniques for Cooperative DS-CDMA Systems,” Proc. of International Conference on Speech Acoustics and Signal Processing, pp 2754-2758, 4-9 May 2014. [10] T. Hesketh, R, C. de Lamare and S. Wales, “Joint maximum likelihood detection and link selection for cooperative MIMO relay systems,” IET Communications, Vol. 8, Issue 14, pp 2489-2499, Sep 2014. [11] T. J. Hesketh, “Detection and Resource Allocation Algorithms for Cooperative MIMO Relay Systems,” Ph.D. Thesis, University of York, Electronics, Communications Research Group, Feb 2014. [12] B. Johannson, C. M. Carretti, and M. Johansson, “On Distributed Optimization Using peer-to-peer Communications in Wireless Sensor Networks,” Proc. IEEE SECON, pp. 497-505, 2008. [16] L. L. Scharf and D. W. Tufts, “Rank reduction for modeling stationary signals,” IEEE Transactions on Acoustics, Speech and Signal Processing, vol. ASSP-35, pp. 350-355, March 1987. [17] A. M. Haimovich and Y. Bar-Ness, “An eigenanalysis interference canceler,” IEEE Trans. on Signal Processing, vol. 39, pp. 76-84, Jan. 1991. [18] D. A. Pados and S. N. Batalama ”Joint space-time auxiliary vector filtering for DS/CDMA systems with antenna arrays” IEEE Transactions on Communications, vol. 47, no. 9, pp. 1406 - 1415, 1999. [19] J. S. Goldstein, I. S. Reed and L. L. Scharf ”A multistage representation of the Wiener filter based on orthogonal projections” IEEE Transactions on Information Theory, vol. 44, no. 7, 1998. [20] Y. Hua, M. Nikpour and P. Stoica, ”Optimal reduced rank estimation and filtering,” IEEE Transactions on Signal Processing, pp. 457-469, Vol. 49, No. 3, March 2001. [21] M. L. Honig and J. S. Goldstein, “Adaptive reduced-rank interference suppression based on the multistage Wiener filter,” IEEE Transactions on Communications, vol. 50, no. 6, June 2002. [22] E. L. Santos and M. D. Zoltowski, “On Low Rank MVDR Beamforming using the Conjugate Gradient Algorithm”, Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, 2004. [23] Q. Haoli and S.N. Batalama, “Data record-based criteria for the selection of an auxiliary vector estimator of the MMSE/MVDR filter”, IEEE Transactions on Communications, vol. 51, no. 10, Oct. 2003, pp. 1700 - 1708. [24] R. C. de Lamare and R. Sampaio-Neto, “Reduced-Rank Adaptive Filtering Based on Joint Iterative Optimization of Adaptive Filters”, IEEE Signal Processing Letters, Vol. 14, no. 12, December 2007. [25] Z. Xu and M.K. Tsatsanis, “Blind adaptive algorithms for minimum variance CDMA receivers,” IEEE Trans. Communications, vol. 49, No. 1, January 2001. [26] R. C. de Lamare and R. Sampaio-Neto, “Low-Complexity Variable Step-Size Mechanisms for Stochastic Gradient Algorithms in Minimum Variance CDMA Receivers”, IEEE Trans. Signal Processing, vol. 54, pp. 2302 - 2317, June 2006. [27] C. Xu, G. Feng and K. S. Kwak, “A Modified Constrained Constant Modulus Approach to Blind Adaptive Multiuser Detection,” IEEE Trans. Communications, vol. 49, No. 9, 2001. [28] Z. Xu and P. Liu, “Code-Constrained Blind Detection of CDMA Signals in Multipath Channels,” IEEE Sig. Proc. Letters, vol. 9, No. 12, December 2002. [13] M. G. Rabbat, R. D. Nowak, and J. A. Bucklew, “eneralized Consensus Computation in Networked Systems with Erasure Links,” Proc. IEEE SPAWC, pp. 1088-1092, 2005. [29] R. C. de Lamare and R. Sampaio Neto, ”Blind Adaptive CodeConstrained Constant Modulus Algorithms for CDMA Interference Suppression in Multipath Channels”, IEEE Communications Letters, vol 9. no. 4, April, 2005. [14] S. Schedler and V. Kuehn, “Resource Allocation for Distributed Beamforming with Multiple Relays and Individual Power Constraints,” Proc. International Sympositum Wireless Communications Systems (ISWCS), pp 1-5, Aug 2014. [30] L. Landau, R. C. de Lamare and M. Haardt, “Robust adaptive beamforming algorithms using the constrained constant modulus criterion,” IET Signal Processing, vol.8, no.5, pp.447-457, July 2014. [15] O. T. Demir, T. E. Tuncer, “Optimum Discrete Distributed Beamforming for Single Group Multi Casting Relay Networks with Relay Selection,” ICASSP 2015, pp 2524-2528, April 2015. [31] R. C. de Lamare, “Adaptive Reduced-Rank LCMV Beamforming Algorithms Based on Joint Iterative Optimisation of Filters”, Electronics Letters, vol. 44, no. 9, 2008. [32] R. C. de Lamare and R. Sampaio-Neto, “Adaptive ReducedRank Processing Based on Joint and Iterative Interpolation, Decimation and Filtering”, IEEE Transactions on Signal Processing, vol. 57, no. 7, July 2009, pp. 2503 - 2514. [33] R. C. de Lamare and Raimundo Sampaio-Neto, “Reducedrank Interference Suppression for DS-CDMA based on Interpolated FIR Filters”, IEEE Communications Letters, vol. 9, no. 3, March 2005. [34] R. C. de Lamare and R. Sampaio-Neto, “Adaptive ReducedRank MMSE Filtering with Interpolated FIR Filters and Adaptive Interpolators”, IEEE Signal Processing Letters, vol. 12, no. 3, March, 2005. [35] R. C. de Lamare and R. Sampaio-Neto, “Adaptive Interference Suppression for DS-CDMA Systems based on Interpolated FIR Filters with Adaptive Interpolators in Multipath Channels”, IEEE Trans. Vehicular Technology, Vol. 56, no. 6, September 2007. [36] R. C. de Lamare, “Adaptive Reduced-Rank LCMV Beamforming Algorithms Based on Joint Iterative Optimisation of Filters,” Electronics Letters, 2008. [37] R. C. de Lamare and R. Sampaio-Neto, “Reduced-rank adaptive filtering based on joint iterative optimization of adaptive filters”, IEEE Signal Process. Lett., vol. 14, no. 12, pp. 980983, Dec. 2007. [38] R. C. de Lamare, M. Haardt, and R. Sampaio-Neto, “Blind Adaptive Constrained Reduced-Rank Parameter Estimation based on Constant Modulus Design for CDMA Interference Suppression”, IEEE Transactions on Signal Processing, June 2008. [39] M. Yukawa, R. C. de Lamare and R. Sampaio-Neto, “Efficient Acoustic Echo Cancellation With Reduced-Rank Adaptive Filtering Based on Selective Decimation and Adaptive Interpolation,” IEEE Transactions on Audio, Speech, and Language Processing, vol.16, no. 4, pp. 696-710, May 2008. [40] R. C. de Lamare and R. Sampaio-Neto, “Reduced-rank spacetime adaptive interference suppression with joint iterative least squares algorithms for spread-spectrum systems,” IEEE Trans. Vehi. Technol., vol. 59, no. 3, pp. 1217-1228, Mar. 2010. [41] R. C. de Lamare and R. Sampaio-Neto, “Adaptive reducedrank equalization algorithms based on alternating optimization design techniques for MIMO systems,” IEEE Trans. Vehi. Technol., vol. 60, no. 6, pp. 2482-2494, Jul. 2011. [42] R. C. de Lamare, L. Wang, and R. Fa, “Adaptive reduced-rank LCMV beamforming algorithms based on joint iterative optimization of filters: Design and analysis,” Signal Processing, vol. 90, no. 2, pp. 640-652, Feb. 2010. [43] R. Fa, R. C. de Lamare, and L. Wang, “Reduced-Rank STAP Schemes for Airborne Radar Based on Switched Joint Interpolation, Decimation and Filtering Algorithm,” IEEE Transactions on Signal Processing, vol.58, no.8, Aug. 2010, pp.41824194. [44] L. Wang and R. C. de Lamare, ”Low-Complexity Adaptive Step Size Constrained Constant Modulus SG Algorithms for Blind Adaptive Beamforming”, Signal Processing, vol. 89, no. 12, December 2009, pp. 2503-2513. [45] L. Wang and R. C. de Lamare, “Adaptive Constrained Constant Modulus Algorithm Based on Auxiliary Vector Filtering for Beamforming,” IEEE Transactions on Signal Processing, vol. 58, no. 10, pp. 5408-5413, Oct. 2010. [46] L. Wang, R. C. de Lamare, M. Yukawa, ”Adaptive ReducedRank Constrained Constant Modulus Algorithms Based on Joint Iterative Optimization of Filters for Beamforming,” IEEE Transactions on Signal Processing, vol.58, no.6, June 2010, pp.2983-2997. [47] L. Qiu, Y. Cai, R. C. de Lamare and M. Zhao, “Reduced-Rank DOA Estimation Algorithms Based on Alternating Low-Rank Decomposition,” IEEE Signal Processing Letters, vol. 23, no. 5, pp. 565-569, May 2016. [48] L. Wang, R. C. de Lamare and M. Yukawa, “Adaptive reducedrank constrained constant modulus algorithms based on joint iterative optimization of filters for beamforming”, IEEE Transactions on Signal Processing, vol.58, no. 6, pp. 2983-2997, June 2010. [49] L. Wang and R. C. de Lamare, “Adaptive constrained constant modulus algorithm based on auxiliary vector filtering for beamforming”, IEEE Transactions on Signal Processing, vol. 58, no. 10, pp. 5408-5413, October 2010. [50] R. Fa and R. C. de Lamare, “Reduced-Rank STAP Algorithms using Joint Iterative Optimization of Filters,” IEEE Transactions on Aerospace and Electronic Systems, vol.47, no.3, pp.1668-1684, July 2011. [51] Z. Yang, R. C. de Lamare and X. Li, “L1-Regularized STAP Algorithms With a Generalized Sidelobe Canceler Architecture for Airborne Radar,” IEEE Transactions on Signal Processing, vol.60, no.2, pp.674-686, Feb. 2012. [52] Z. Yang, R. C. de Lamare and X. Li, “Sparsity-aware spacetime adaptive processing algorithms with L1-norm regularisation for airborne radar”, IET signal processing, vol. 6, no. 5, pp. 413-423, 2012. [53] Neto, F.G.A.; Nascimento, V.H.; Zakharov, Y.V.; de Lamare, R.C., ”Adaptive re-weighting homotopy for sparse beamforming,” in Signal Processing Conference (EUSIPCO), 2014 Proceedings of the 22nd European , vol., no., pp.1287-1291, 1-5 Sept. 2014 [54] Almeida Neto, F.G.; de Lamare, R.C.; Nascimento, V.H.; Zakharov, Y.V.,“Adaptive reweighting homotopy algorithms applied to beamforming,” IEEE Transactions on Aerospace and Electronic Systems, vol.51, no.3, pp.1902-1915, July 2015. [55] L. Wang, R. C. de Lamare and M. Haardt, “Direction finding algorithms based on joint iterative subspace optimization,” IEEE Transactions on Aerospace and Electronic Systems, vol.50, no.4, pp.2541-2553, October 2014. [56] S. D. Somasundaram, N. H. Parsons, P. Li and R. C. de Lamare, “Reduced-dimension robust capon beamforming using Krylov-subspace techniques,” IEEE Transactions on Aerospace and Electronic Systems, vol.51, no.1, pp.270-289, January 2015. [57] H. Ruan and R. C. de Lamare, “Robust adaptive beamforming using a low-complexity shrinkage-based mismatch estimation algorithm,” IEEE Signal Process. Lett., vol. 21 no. 1 pp. 60-64, Nov. 2013. [58] H. Ruan and R. C. de Lamare, “Robust Adaptive Beamforming Based on Low-Rank and Cross-Correlation Techniques,” IEEE Transactions on Signal Processing, vol. 64, no. 15, pp. 39193932, Aug. 2016. [59] S. Xu and R.C de Lamare, , Distributed conjugate gradient strategies for distributed estimation over sensor networks, Sensor Signal Processing for Defense SSPD, September 2012. [60] S. Xu, R. C. de Lamare, H. V. Poor, “Distributed Estimation Over Sensor Networks Based on Distributed Conjugate Gradient Strategies”, IET Signal Processing, 2016 (to appear). [74] M. Costa, ”Writing on dirty paper,” IEEE Trans. Inform. Theory, vol. 29, no. 3, pp. 439-441, May 1983. [61] S. Xu, R. C. de Lamare and H. V. Poor, Distributed Compressed Estimation Based on Compressive Sensing, IEEE Signal Processing letters, vol. 22, no. 9, September 2014. [75] R. C. de Lamare and A. Alcaim, ”Strategies to improve the performance of very low bit rate speech coders and application to a 1.2 kb/s codec” IEE Proceedings- Vision, image and signal processing, vol. 152, no. 1, February, 2005. [62] S. Xu, R. C. de Lamare and H. V. Poor, “Distributed reducedrank estimation based on joint iterative optimization in sensor networks,” in Proceedings of the 22nd European Signal Processing Conference (EUSIPCO), pp.2360-2364, 1-5, Sept. 2014 [76] P. Clarke and R. C. de Lamare, ”Joint Transmit Diversity Optimization and Relay Selection for Multi-Relay Cooperative MIMO Systems Using Discrete Stochastic Algorithms,” IEEE Communications Letters, vol.15, no.10, pp.1035-1037, October 2011. [63] S. Xu, R. C. de Lamare and H. V. Poor, “Adaptive link selection strategies for distributed estimation in diffusion wireless networks,” in Proc. IEEE International Conference onAcoustics, Speech and Signal Processing (ICASSP), , vol., no., pp.54025405, 26-31 May 2013. [77] P. Clarke and R. C. de Lamare, ”Transmit Diversity and Relay Selection Algorithms for Multirelay Cooperative MIMO Systems” IEEE Transactions on Vehicular Technology, vol.61, no. 3, pp. 1084-1098, October 2011. [64] S. Xu, R. C. de Lamare and H. V. Poor, “Dynamic topology adaptation for distributed estimation in smart grids,” in Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), 2013 IEEE 5th International Workshop on , vol., no., pp.420-423, 15-18 Dec. 2013. [65] S. Xu, R. C. de Lamare and H. V. Poor, “Adaptive Link Selection Algorithms for Distributed Estimation”, EURASIP Journal on Advances in Signal Processing, 2015. [66] T. G. Miller, S. Xu, R. C. de Lamare and H. V. Poor, “Distributed Spectrum Estimation Based on Alternating Mixed Discrete-Continuous Adaptation,” IEEE Signal Processing Letters, vol. 23, no. 4, pp. 551-555, April 2016. [67] N. Song, R. C. de Lamare, M. Haardt, and M. Wolf, “Adaptive Widely Linear Reduced-Rank Interference Suppression based on the Multi-Stage Wiener Filter,” IEEE Transactions on Signal Processing, vol. 60, no. 8, 2012. [68] N. Song, W. U. Alokozai, R. C. de Lamare and M. Haardt, “Adaptive Widely Linear Reduced-Rank Beamforming Based on Joint Iterative Optimization,” IEEE Signal Processing Letters, vol.21, no.3, pp. 265-269, March 2014. [78] Y. Cai, R. C. de Lamare, and R. Fa, “Switched Interleaving Techniques with Limited Feedback for Interference Mitigation in DS-CDMA Systems,” IEEE Transactions on Communications, vol.59, no.7, pp.1946-1956, July 2011. [79] Y. Cai, R. C. de Lamare, D. Le Ruyet, “Transmit Processing Techniques Based on Switched Interleaving and Limited Feedback for Interference Mitigation in Multiantenna MC-CDMA Systems,” IEEE Transactions on Vehicular Technology, vol.60, no.4, pp.1559-1570, May 2011. [80] T. Wang, R. C. de Lamare, and P. D. Mitchell, “LowComplexity Set-Membership Channel Estimation for Cooperative Wireless Sensor Networks,” IEEE Transactions on Vehicular Technology, vol.60, no.6, pp.2594-2607, July 2011. [81] T. Wang, R. C. de Lamare and A. Schmeink, ”Joint linear receiver design and power allocation using alternating optimization algorithms for wireless sensor networks,” IEEE Trans. on Vehi. Tech., vol. 61, pp. 4129-4141, 2012. [82] R. C. de Lamare, “Joint iterative power allocation and linear interference suppression algorithms for cooperative DS-CDMA networks”, IET Communications, vol. 6, no. 13 , 2012, pp. 1930-1942. [69] R.C. de Lamare, R. Sampaio-Neto and M. Haardt, ”Blind Adaptive Constrained Constant-Modulus Reduced-Rank Interference Suppression Algorithms Based on Interpolation and Switched Decimation,” IEEE Trans. on Signal Processing, vol.59, no.2, pp.681-695, Feb. 2011. [83] T. Peng, R. C. de Lamare and A. Schmeink, “Adaptive Distributed Space-Time Coding Based on Adjustable Code Matrices for Cooperative MIMO Relaying Systems”, IEEE Transactions on Communications, vol. 61, no. 7, July 2013. [70] Y. Cai, R. C. de Lamare, “Adaptive Linear Minimum BER Reduced-Rank Interference Suppression Algorithms Based on Joint and Iterative Optimization of Filters,” IEEE Communications Letters, vol.17, no.4, pp.633-636, April 2013. [84] T. Peng and R. C. de Lamare, “Adaptive Buffer-Aided Distributed Space-Time Coding for Cooperative Wireless Networks,” IEEE Transactions on Communications, vol. 64, no. 5, pp. 1888-1900, May 2016. [71] R. C. de Lamare and R. Sampaio-Neto, “Sparsity-Aware Adaptive Algorithms Based on Alternating Optimization and Shrinkage,” IEEE Signal Processing Letters, vol.21, no.2, pp.225,229, Feb. 2014. [85] J. Gu, R. C. de Lamare and M. Huemer, “Buffer-Aided Physical-Layer Network Coding with Optimal Linear Code Designs for Cooperative Networks,” IEEE Transactions on Communications, 2017. [72] R. C. de Lamare, “Massive MIMO Systems: Signal Processing Challenges and Future Trends”, Radio Science Bulletin, December 2013. [86] K. Zu, R. C. de Lamare, “Low-Complexity Lattice ReductionAided Regularized Block Diagonalization for MU-MIMO Systems”, IEEE. Communications Letters, Vol. 16, No. 6, June 2012, pp. 925-928. [73] W. Zhang, H. Ren, C. Pan, M. Chen, R. C. de Lamare, B. Du and J. Dai, “Large-Scale Antenna Systems With UL/DL Hardware Mismatch: Achievable Rates Analysis and Calibration”, IEEE Trans. Commun., vol.63, no.4, pp. 1216-1229, April 2015. [87] K. Zu, R. C. de Lamare, “Low-Complexity Lattice ReductionAided Regularized Block Diagonalization for MU-MIMO Systems”, IEEE. Communications Letters, Vol. 16, No. 6, June 2012. [88] K. Zu, R. C. de Lamare and M. Haart, “Generalized design of low-complexity block diagonalization type precoding algorithms for multiuser MIMO systems”, IEEE Trans. Communications, 2013. [89] M. Tomlinson, ”New automatic equaliser employing modulo arithmetic,” Electronic Letters, vol. 7, Mar. 1971. [90] C. T. Healy and R. C. de Lamare, “Decoder-optimised progressive edge growth algorithms for the design of LDPC codes with low error floors”, IEEE Communications Letters, vol. 16, no. 6, June 2012, pp. 889-892. [91] A. G. D. Uchoa, C. T. Healy, R. C. de Lamare, R. D. Souza, “LDPC codes based on progressive edge growth techniques for block fading channels”, Proc. 8th International Symposium on Wireless Communication Systems (ISWCS), 2011, pp. 392-396. [92] A. G. D. Uchoa, C. T. Healy, R. C. de Lamare, R. D. Souza, “Generalised Quasi-Cyclic LDPC codes based on progressive edge growth techniques for block fading channels”, Proc. International Symposium Wireless Communication Systems (ISWCS), 2012, pp. 974-978. [93] A. G. D. Uchoa, C. T. Healy, R. C. de Lamare, R. D. Souza, “Design of LDPC Codes Based on Progressive Edge Growth Techniques for Block Fading Channels”, IEEE Communications Letters, vol. 15, no. 11, November 2011, pp. 1221-1223. [94] C. T. Healy and R. C. de Lamare, “Design of LDPC Codes Based on Multipath EMD Strategies for Progressive Edge Growth,” IEEE Transactions on Communications, vol. 64, no. 8, pp. 3208-3219, Aug. 2016. [95] H. Harashima and H. Miyakawa, ”Matched-transmission technique for channels with intersymbol interference,” IEEE Trans. Commun., vol. 20, Aug. 1972. [96] K. Zu, R. C. de Lamare and M. Haardt, “Multi-branch tomlinson-harashima precoding for single-user MIMO systems,” in Smart Antennas (WSA), 2012 International ITG Workshop on , vol., no., pp.36-40, 7-8 March 2012. [97] K. Zu, R. C. de Lamare and M. Haardt, “Multi-Branch Tomlinson-Harashima Precoding Design for MU-MIMO Systems: Theory and Algorithms,” IEEE Transactions on Communications, vol.62, no.3, pp.939,951, March 2014. [98] L. Zhang, Y. Cai, R. C. de Lamare and M. Zhao, “Robust Multibranch TomlinsonHarashima Precoding Design in Amplify-and-Forward MIMO Relay Systems,” IEEE Transactions on Communications, vol.62, no.10, pp.3476,3490, Oct. 2014. [99] W. Zhang et al., “Widely Linear Precoding for Large-Scale MIMO with IQI: Algorithms and Performance Analysis,” IEEE Transactions on Wireless Communications, vol. 16, no. 5, pp. 3298-3312, May 2017. [100] B. Hochwald, C. Peel and A. Swindlehurst, ”A vectorperturbation technique for near capacity multiantenna multiuser communication - Part II: Perturbation,” IEEE Trans. Commun., vol. 53, no. 3, Mar. 2005. [101] C. B. Chae, S. Shim and R. W. Heath, ”Block diagonalized vector perturbation for multiuser MIMO systems,” IEEE Trans. Wireless Commun., vol. 7, no. 11, pp. 4051 - 4057, Nov. 2008. [102] R. C. de Lamare, R. Sampaio-Neto, “Adaptive MBER decision feedback multiuser receivers in frequency selective fading channels”, IEEE Communications Letters, vol. 7, no. 2, Feb. 2003, pp. 73 - 75. [103] A. Rontogiannis, V. Kekatos, and K. Berberidis,” A SquareRoot Adaptive V-BLAST Algorithm for Fast Time-Varying MIMO Channels,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 265-268, May 2006. [104] R. C. de Lamare, R. Sampaio-Neto, A. Hjorungnes, “Joint iterative interference cancellation and parameter estimation for CDMA systems”, IEEE Communications Letters, vol. 11, no. 12, December 2007, pp. 916 - 918. [105] Y. Cai and R. C. de Lamare, ”Adaptive Space-Time Decision Feedback Detectors with Multiple Feedback Cancellation”, IEEE Transactions on Vehicular Technology, vol. 58, no. 8, October 2009, pp. 4129 - 4140. [106] J. W. Choi, A. C. Singer, J Lee, N. I. Cho, “Improved linear soft-input soft-output detection via soft feedback successive interference cancellation,” IEEE Trans. Commun., vol.58, no.3, pp.986-996, March 2010. [107] R. C. de Lamare and R. Sampaio-Neto, “Blind adaptive MIMO receivers for space-time block-coded DS-CDMA systems in multipath channels using the constant modulus criterion,” IEEE Transactions on Communications, vol.58, no.1, pp.21-27, January 2010. [108] R. Fa, R. C. de Lamare, “Multi-Branch Successive Interference Cancellation for MIMO Spatial Multiplexing Systems”, IET Communications, vol. 5, no. 4, pp. 484 - 494, March 2011. [109] R.C. de Lamare and R. Sampaio-Neto, “Adaptive reducedrank equalization algorithms based on alternating optimization design techniques for MIMO systems,” IEEE Trans. Veh. Technol., vol. 60, no. 6, pp. 2482-2494, July 2011. [110] P. Li, R. C. de Lamare and R. Fa, “Multiple Feedback Successive Interference Cancellation Detection for Multiuser MIMO Systems,” IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2434 - 2439, August 2011. [111] R.C. de Lamare, R. Sampaio-Neto, “Minimum mean-squared error iterative successive parallel arbitrated decision feedback detectors for DS-CDMA systems,” IEEE Trans. Commun., vol. 56, no. 5, May 2008, pp. 778-789. [112] R.C. de Lamare, R. Sampaio-Neto, “Minimum mean-squared error iterative successive parallel arbitrated decision feedback detectors for DS-CDMA systems,” IEEE Trans. Commun., vol. 56, no. 5, May 2008. [113] R.C. de Lamare and R. Sampaio-Neto, “Adaptive reducedrank equalization algorithms based on alternating optimization design techniques for MIMO systems,” IEEE Trans. Veh. Technol., vol. 60, no. 6, pp. 2482-2494, July 2011. [114] P. Li, R. C. de Lamare and J. Liu, “Adaptive Decision Feedback Detection with Parallel Interference Cancellation and Constellation Constraints for Multiuser MIMO systems”, IET Communications, vol.7, 2012, pp. 538-547. [115] J. Liu, R. C. de Lamare, “Low-Latency Reweighted Belief Propagation Decoding for LDPC Codes,” IEEE Communications Letters, vol. 16, no. 10, pp. 1660-1663, October 2012. [116] P. Li and R. C. de Lamare, Distributed Iterative Detection With Reduced Message Passing for Networked MIMO Cellular Systems, IEEE Transactions on Vehicular Technology, vol.63, no.6, pp. 2947-2954, July 2014. [117] A. G. D. Uchoa, C. T. Healy and R. C. de Lamare, “Iterative Detection and Decoding Algorithms For MIMO Systems in Block-Fading Channels Using LDPC Codes,” IEEE Transactions on Vehicular Technology, 2015. [118] R. C. de Lamare, ”Adaptive and Iterative Multi-Branch MMSE Decision Feedback Detection Algorithms for MultiAntenna Systems”, IEEE Trans. Wireless Commun., vol. 14, no. 10, October 2013. [119] R. Combes, Z. Altman and E. Altman, “Interference coordination in wireless networks: A flow-level perspective,” Proceedings IEEE INFOCOM 2013, vol., no., pp.2841,2849, 1419 April 2013. [120] R. Aggarwal, C. E. Koksal, and P. Schniter, “On the design of large scale wireless systems”, IEEE J. Sel. Areas Commun, vol. 31, no. 2, pp. 215-225, Feb. 2013. [121] C. Shepard, H. Yu, N. Anand, L. E. Li, T. L. Marzetta, R. Yang, and L. Zhong, Argos: Practical many-antenna base stations, in ACM Int. Conf.Mobile Computing and Networking (MobiCom), Istanbul, Turkey, Aug. 2012. [122] J. Hoydis, C. Hoek, T. Wild, and S. ten Brink, Channel measurements for large antenna arrays, in IEEE International Symposium on Wireless Communication Systems (ISWCS), Paris, France, Aug. 2012. [123] X. Gao, F. Tufvesson, O. Edfors, and F. Rusek, Measured propagation characteristics for very-large MIMO at 2.6 GHz, in Proc. of the 46th Annual Asilomar Conference on Signals, Systems, and Computers,, Pacific Grove, California, USA, Nov. 2012. [124] J. Arnau, B. Devillers, C. Mosquera, A. Prez-Neira, “Performance study of multiuser interference mitigation schemes for hybrid broadband multibeam satellite architectures”, EURASIP Journal on Wireless Communications and Networking, 2012:132 (5 April 2012). [125] J. Jose, A. Ashikhmin, T. L. Marzetta, S. Vishwanath, “Pilot Contamination and Precoding in Multi-Cell TDD Systems,” IEEE Transactions on Wireless Communications, vol.10, no.8, pp. 2640-2651, August 2011. [126] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, “Energy and spectral efficiency of very large multiuser MIMO systems”, IEEE Trans. Commun., vol. 61, no. 4, pp. 1436-1449, Apr. 2013. [127] H. Yang and T. L. Marzetta, Performance of conjugate and zero-forcing beamforming in large-scale antenna systems, IEEE J. Sel. Areas Commun., vol. 31, no. 2, pp. 172179, Feb. 2013. [128] A. Ashikhmin and T. L. Marzetta, Pilot contamination precoding in multi-cell large scale antenna systems, in IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, Jul. 2012. [129] J. Zhang, X. Yuan, and L. Ping, Hermitian precoding for distributed MIMO systems with individual channel state information, IEEE J. Sel. Areas Commun., vol. 31, no. 2, pp. 241250, Feb. 2013. [130] K. Vardhan, S. Mohammed, A. Chockalingam and B. Rajan, “A low-complexity detector for large MIMO systems and multicarrier CDMA systems”, IEEE J. Sel. Commun., vol. 26, no. 3, pp. 473-485, Apr. 2008. [131] R.C. de Lamare, R. Sampaio-Neto, Minimum mean-squared error iterative successive parallel arbitrated decision feedback detectors for DS-CDMA systems, IEEE Trans. Commun., vol. 56, no. 5, May 2008, pp. 778-789. [132] P. Li and R. D. Murch, Multiple Output Selection-LAS Algorithm in Large MIMO Systems, IEEE Commun. Lett., vol. 14, no. 5, pp. 399-401, May 2010. [133] R. C. de Lamare, ”Adaptive and Iterative Multi-Branch MMSE Decision Feedback Detection Algorithms for MultiAntenna Systems”, IEEE Transactions on Wireless Communications, vol. 14, no. 10, October 2013. [134] Q. Zhou and X. Ma, Element-Based Lattice Reduction Algorithms for Large MIMO Detection, IEEE J. Sel. Areas Commun, vol. 31, no. 2, pp. 274-286, Feb. 2013. [135] H. Qian and S. N. Batalama, Data-record-based criteria for the selection of an auxiliary vector estimator of the MMSE/MVDR filter, IEEE Trans. Commun., vol. 51, no. 10, pp. 17001708, Oct. 2003. [136] Y. Sun, V. Tripathi, and M. L. Honig, Adaptive, iterative, reducedrank (turbo) equalization, IEEE Trans. Wireless Commun., vol. 4, no. 6, pp. 27892800, Nov. 2005. [137] R. C. de Lamare and R. Sampaio-Neto, Adaptive reducedrank processing based on joint and iterative interpolation, decimation, and filtering, IEEE Trans. Signal Process., vol. 57, no. 7, July 2009, pp. 2503-2514. [138] R.C. de Lamare and R. Sampaio-Neto, Adaptive reduced-rank equalization algorithms based on alternating optimization design techniques for MIMO systems, IEEE Trans. Veh. Technol., vol. 60, no. 6, pp. 2482-2494, July 2011. [139] Z. Tu and R.S. Blum, Multiuser diversity for a dirty paper approach, IEEE Commun. Lett., vol. 7, no. 8, pp. 370372, Aug. 2003. [140] G. Dimic and N.D. Sidiropoulos, On downlink beamforming with greedy user selection: Performance analysis and a simple new algorithm, IEEE Trans. Signal Processing, vol. 53, no. 10, pp. 38573868, Oct. 2005. [141] Z. Shen, J.G. Andrews, R.W. Heath Jr., and B.L. Evans, Low complexity user selection algorithms for multiuser MIMO systems with block diagonalization, IEEE Trans. Signal Processing, vol. 54, no. 9, pp. 36583663, Sept. 2006. [142] N. Dao and Y. Sun, “User-selection algorithms for multiuser precoding,” IEEE Trans. Veh. Technol., vol. 59, no. 7, Sep. 2010. [143] P. Clarke and R. C. de Lamare, ”Transmit Diversity and Relay Selection Algorithms for Multi-relay Cooperative MIMO Systems”, IEEE Transactions on Vehicular Technology, vol. 61 , no. 3, March 2012, pp. 1084 - 1098. [144] G. Caire and S. Shamai (Shitz), “On the achievable throughput of a multiantenna Gaussian broadcast channel,” IEEE Trans. Inform. Theory, vol. 49, no. 7, pp. 16911706, July 2003. [145] M. Joham, W. Utschick, and J. Nossek, “Linear transmit processing in MIMO communications systems,” IEEE Trans. Signal Processing, vol. 53, no. 8, pp. 27002712, Aug. 2005. [146] Q. Spencer, A.L. Swindlehurst, and M. Haardt, “Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels,” IEEE Trans. Signal Processing, vol. 52, no. 2, pp. 462471, Feb. 2004. [147] V. Stankovic and M. Haardt, “Generalized design of multiuser MIMO precoding matrices,” IEEE Trans. Wireless Commun., vol. 7, no. 3, pp. 953-961, Mar. 2008. [148] K. Zu, R. C. de Lamare and M. Haardt, “Generalized design of low- complexity block diagonalization type precoding algorithms for multiuser MIMO systems”, IEEE Trans. Communications, 2013. [164] J. H. Choi, H. Y. Yu, Y. H. Lee, Adaptive MIMO decision feedback equalization for receivers with time-varying channels, IEEE Trans. Signal Proc., 2005, 53, no. 11, pp. 42954303. [149] C. Windpassinger, R. Fischer, T. Vencel and J. Huber, “Precoding in multiantenna and multiuser communications,” IEEE Trans. Wireless Commun., vol. 3, no. 4, Jul. 2004. [165] C. Windpassinger, L. Lampe, R.F.H. Fischer, T.A Hehn, “A performance study of MIMO detectors,” IEEE Transactions on Wireless Communications, vol. 5, no. 8, August 2006, pp. 2004-2008. [150] C.B. Peel, B.M. Hochwald, and A.L. Swindlehurst, A vectorperturbation technique for near capacity multiantenna multiuser communicationpart I: channel inversion and regularization, IEEE Trans. Commun., vol. 53, no. 1, pp. 195202, Jan. 2005. [151] M. Biguesh, A.B. Gershman, “Training-based MIMO channel estimation: a study of estimator tradeoffs and optimal training signals”, IEEE Transactions on Signal Processing, vol. 54 no. 3, March 2006. [152] S. Verdu, Multiuser Detection, Cambridge, 1998. [153] E. Viterbo and J. Boutros, “A universal lattice code decoder for fading channels”, IEEE Trans. on Inf. Theory, vol. 45, no. 5, pp.16391642, July 1999. [154] M. O. Damen, H. E. Gamal, and G. Caire, On maximum likelihood detection and the search for the closest lattice point, IEEE Trans. Inform. Theory, vol. 49, pp. 23892402, Oct. 2003. [155] Z. Guo and P. Nilsson, Algorithm and Implementation of the K-Best Sphere Decoding for MIMO Detection, IEEE Journal on Selected Areas in Communications, vol. 24, no. 3, pp. 491503, March 2006. [156] C. Studer, A. Burg, and H. Bolcskei, Soft-output sphere decoding: algorithms and VLSI implementation, IEEE J. Sel. Areas Commun., vol. 26, pp. 290-300, Feb. 2008. [166] Y. H. Gan, C. Ling, and W. H. Mow, Complex lattice reduction algorithm for low-complexity full-diversity MIMO detection, IEEE Trans. Signal Processing, vol. 56, no. 7, July 2009. [167] K. J. Kim, J. Yue, R. A. Iltis, and J. D. Gibson, “A QRDM/Kalman filter-based detection and channel estimation algorithm for MIMO-OFDM systems”, IEEE Trans. Wireless Communications, vol. 4,pp. 710-721, March 2005. [168] Y. Jia, C. M. Vithanage, C. Andrieu, and R. J. Piechocki, Probabilistic data association for symbol detection in MIMO systems, Electron. Lett., vol. 42, no. 1, pp. 3840, Jan. 2006. [169] S. Yang, T. Lv, R. Maunder, and L. Hanzo, ”Unified BitBased Probabilistic Data Association Aided MIMO Detection for High-Order QAM Constellations”, IEEE Transactions on Vehicular Technology, vol. 60, no. 3, pp. 981-991, 2011. [170] M. K. Varanasi, “Decision feedback multiuser detection: A systematic approach,” IEEE Trans. on Inf. Theory, vol. 45, pp. 219-240, January 1999. [171] J. F. Rler and J. B. Huber, ”Iterative soft decision interference cancellation receivers for DS-CDMA downlink employing 4QAM and 16QAM,” in Proc. 36th Asilomar Conf. Signal, Systems and Computers, Pacific Grove, CA, Nov. 2002. [157] B. Shim and I. Kang, On further reduction of complexity in tree pruning based sphere search, IEEE Trans. Commun., vol. 58, no. 2, pp. 417422, Feb. 2010. [172] J. Luo, K. R. Pattipati, P. K. Willet and F. Hasegawa, “Optimal User Ordering and Time Labeling for Ideal Decision Feedback Detection in Asynchronous CDMA”, IEEE Trans. on Communications, vol. 51, no. 11, November, 2003. [158] A. Duel-Hallen, “Equalizers for Multiple Input Multiple Output Channels and PAM Systems with Cyclostationary Input Sequences,” IEEE J. Select. Areas Commun., vol. 10, pp. 630639, April, 1992. [173] G. Woodward, R. Ratasuk, M. L. Honig and P. Rapajic, “Minimum Mean-Squared Error Multiuser Decision-Feedback Detectors for DS-CDMA,” IEEE Trans. on Communications, vol. 50, no. 12, December, 2002. [159] G. D. Golden, C. J. Foschini, R. A. Valenzuela and P. W. Wolniansky, “Detection algorithm and initial laboratory results using V-BLAST space-time communication architecture”, Electronics Letters, vol. 35, No.1, January 1999. [174] R.C. de Lamare, R. Sampaio-Neto, “Adaptive MBER decision feedback multiuser receivers in frequency selective fading channels”, IEEE Communications Letters, vol. 7, no. 2, Feb. 2003, pp. 73 - 75. [160] J. Benesty, Y. Huang, and J. Chen, A fast recursive algorithm for optimum sequential signal detection in a BLAST system, IEEE Trans. Signal Processing, vol. 51, pp. 17221730, July 2003. [175] F. Cao, J. Li, and J. Yang, ”On the relation between PDA and MMSE-ISDIC,” IEEE Signal Processing Letters, vol. 14, no. 9, Sep. 2007. [161] A. Rontogiannis, V. Kekatos, and K. Berberidis,” A SquareRoot Adaptive V-BLAST Algorithm for Fast Time-Varying MIMO Channels,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 265-268, May 2006. [176] Y. Cai and R. C. de Lamare, ”Adaptive Space-Time Decision Feedback Detectors with Multiple Feedback Cancellation”, IEEE Transactions on Vehicular Technology, vol. 58, no. 8, October 2009, pp. 4129 - 4140. [162] R. Fa, R. C. de Lamare, “Multi-Branch Successive Interference Cancellation for MIMO Spatial Multiplexing Systems”, IET Communications, vol. 5, no. 4, pp. 484 - 494, March 2011. [177] P. Li and R. C. de Lamare, ”Adaptive Decision-Feedback Detection With Constellation Constraints for MIMO Systems”, IEEE Transactions on Vehicular Technology, vol. 61, no. 2, 853-859, 2012. [163] P. Li, R. C. de Lamare and R. Fa, “Multiple Feedback Successive Interference Cancellation Detection for Multiuser MIMO Systems,” IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2434 - 2439, August 2011. [178] M. Reuter, J.C. Allen, J. R. Zeidler, R. C. North, “Mitigating error propagation effects in a decision feedback equalizer”, IEEE Transactions on Communications, vol. 49, no. 11, November 2001, pp. 2028 - 2041. [179] R.C. de Lamare, R. Sampaio-Neto, A. Hjorungnes, “Joint iterative interference cancellation and parameter estimation for cdma systems”, IEEE Communications Letters, vol. 11, no. 12, December 2007, pp. 916 - 918. [195] T. Adali, P. J. Schreier and L. L. Scharf, “Complex-valued signal processing: the proper way to deal with impropriety”, IEEE Trans. Signal Processing, vol. 59, no. 11, pp. 51015125 , November 2011. [180] S. Haykin, Adaptive Filter Theory, 4th ed. Englewood Cliffs, NJ: Prentice- Hall, 2002. [196] N. Song, R. C. de Lamare, M. Haardt, and M. Wolf, “Adaptive Widely Linear Reduced-Rank Interference Suppression based on the Multi-Stage Wiener Filter,” IEEE Transactions on Signal Processing, vol. 60, no. 8, 2012. [181] C. Berrou and A. Glavieux, “Near optimum error-correcting coding and decoding: Turbo codes,” IEEE Trans. Commun., vol. 44, Oct. 1996. [182] C. Douillard et al., “Iterative correction of intersymbol interference: Turbo equalization,” European Trans. Telecommun., vol. 6, no. 5, pp. 507511, Sept.Oct. 1995. [183] X. Wang and H. V. Poor, “Iterative (turbo) soft interference cancellation and decoding for coded CDMA,” IEEE Trans. Commun., vol. 47, pp. 10461061, July 1999. [184] M. Tuchler, A. Singer, and R. Koetter, ”Minimum mean square error equalization using a priori information,” IEEE Trans. Signal Processing, vol. 50, pp. 673-683, Mar. 2002. [185] B. Hochwald and S. ten Brink, Achieving near-capacity on a mutliple- antenna channel, IEEE Trans. Commun., vol. 51, pp. 389-399, Mar. 2003. [186] J. Hou, P. H. Siegel, L. B. Milstein, “Design of multiinput multi-output systems based on low-density Parity-check codes,” IEEE Transactions on Communications, vol. 53, no. 4, pp. 601- 611, April 2005. [187] H. Lee, B. Lee, and I. Lee, “Iterative detection and decoding with an improved V-BLAST for MIMO-OFDM Systems, IEEE J. Sel. Areas Commun., vol. 24, pp. 504-513, Mar. 2006. [188] J. Wu, H.-N. Lee, “Performance Analysis for LDPC-Coded Modulation in MIMO Multiple-Access Systems,” IEEE Transactions on Communications, vol. 55, no. 7, pp. 1417-1426, July 2007 [189] X. Yuan, Q. Guo, X. Wang, and Li Ping, ”Evolution analysis of low-cost iterative equalization in coded linear systems with cyclic prefixes,” IEEE J. Select. Areas Commun. (JSAC), vol. 26, no. 2, pp. 301-310, Feb. 2008. [190] J. W. Choi, A. C. Singer, J Lee, N. I. Cho, Improved linear soft-input soft-output detection via soft feedback successive interference cancellation, IEEE Trans. Commun., vol.58, no.3, pp.986-996, March 2010. [191] M. J. Wainwright, T. S. Jaakkola, and A.S. Willsky, “A new class of upper bounds on the log partition function,” IEEE Trans. Information Theory, vol. 51, no. 7, pp. 2313 - 2335, July 2005. [192] H. Wymeersch, F. Penna and V. Savic, “Uniformly Reweighted Belief Propagation for Estimation and Detection in Wireless Networks,” IEEE Trans. Wireless Communications, vol. PP, No. 99, pp. 1-9, Feb. 2012. [193] J. Liu, R. C. de Lamare, “Low-Latency Reweighted Belief Propagation Decoding for LDPC Codes,” IEEE Communications Letters, vol. 16, no. 10, pp. 1660-1663, October 2012. [194] A. Hakkarainen, J. Werner, K. R. Dandekar and M. Valkama, “Widely-linear beamforming and RF impairment suppression in massive antenna arrays,” Journal of Communications and Networks, vol.15, no.4, pp.383,397, Aug. 2013 [197] R. C. de Lamare, ”Massive MIMO Systems: Signal Processing Challenges and Future Trends”, URSI Radio Science Bulletin, 2013. [198] W. Zhang, H. Ren, C. Pan, M. Chen, R. C. de Lamare, B. Du and J. Dai, “Large-Scale Antenna Systems With UL/DL Hardware Mismatch: Achievable Rates Analysis and Calibration”, IEEE Transactions on Communications, vol.63, no.4, pp. 1216-1229, April 2015. [199] J. Gu and R. C. de Lamare, “Buffer-aided distributed spacetime coding schemes and algorithms for cooperative DSCDMA systems”, EURASIP Journal on Wireless Communications and Networking, December 2016. [200] S. Vishwanath, N. Jindal and A. J. Goldsmith, “On the capacity of multiple input multiple output broadcast channels,” in Proc. IEEE International Conf. Commun. (ICC), New York, USA, Apr. 2002, pp. 1444-1450.
7cs.IT
Beyond Markov Logic: Efficient Mining of Prediction Rules in Large Graphs arXiv:1802.03638v2 [cs.DB] 13 Feb 2018 Tommaso Soru André Valdestilhas AKSW, University of Leipzig Leipzig, Germany 04109 [email protected] AKSW, University of Leipzig Leipzig, Germany 04109 [email protected] Edgard Marx Axel-Cyrille Ngonga Ngomo Leipzig University of Applied Sciences Leipzig, Germany 04277 [email protected] ABSTRACT Graph representations of large knowledge bases may comprise billions of edges. Usually built upon human-generated ontologies, several knowledge bases do not feature declared ontological rules and are far from being complete. Current rule mining approaches rely on schemata or store the graph in-memory, which can be unfeasible for large graphs. In this paper, we introduce HornConcerto, an algorithm to discover Horn clauses in large graphs without the need of a schema. Using a standard fact-based confidence score, we can mine close Horn rules having an arbitrary body size. We show that our method can outperform existing approaches in terms of runtime and memory consumption and mine high-quality rules for the link prediction task, achieving state-of-the-art results on a widely-used benchmark. Moreover, we find that rules alone can perform inference significantly faster than embedding-based methods and achieve accuracies on link prediction comparable to resourcedemanding approaches such as Markov Logic Networks. CCS CONCEPTS •Computing methodologies → Knowledge representation and reasoning; •Information systems → Association rules; KEYWORDS Rule Mining, Knowledge Bases, SPARQL, RDF ACM Reference format: Tommaso Soru, André Valdestilhas, Edgard Marx, and Axel-Cyrille Ngonga Ngomo. . Beyond Markov Logic: Efficient Mining of Prediction Rules in Large Graphs. In Proceedings of Submitted, 2018, KDD, 7 pages. DOI: 1 INTRODUCTION The number of published triple-based datasets has been exponentially increasing in the last years. Knowledge Bases such as DBpedia [13], UniProt [6], and LinkedGeoData [25] comprise more than Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). Submitted, 2018 © 2018 Copyright held by the owner/author(s). . DOI: DICE, Paderborn University Paderborn, Germany 33098 [email protected] one billion triples each. While these knowledge bases span manifold domains, they are usually far from being complete. Several approaches have been devised to tackle this problem, known as link prediction or knowledge base completion. Most of these methods belong to the categories of translation-based approaches, tensorfactorization algorithms, neural networks, or general statisticallearning algorithms, some of which involving the use of first-order rules. Beyond their utility in inference engines, rules help to understand insights in data, which is not a trivial task on large datasets. In particular, rules have shown to be more explainable than factorization models, as they can be easily understood by humans as well as machines. Rules have been specifically used in different environments, e.g. reasoners, rule-based systems, and Markov Logic Networks (MLNs). Non-probabilistic reasoners utilize declared schemata describing a definition or a restriction, which imply – for their nature – a crisp reasoning. For instance, with the restriction ∃spouse v Person (“All entities who have a spouse are persons.”), one can infer that an entity is a person with a confidence value of 1.0, if they have a spouse. On the other hand, probabilistic reasoners assign a real confidence value between 0 and 1 to each statement, which can thus exist within some probability degree [27]. However, the growth of published structured data has made rule mining and probabilistic inference impracticable on certain datasets. In order to optimize the computation, existing methods load data in-memory or rely on schemata while loading data into in-disk databases. Unfortunately, classes and properties in ontologies are as complete as their instantiations. For instance, in DBpedia 2016-04, among 63, 764 properties, only 3.5% and 3.8% of them are provided with a domain and range, respectively.1 Moreover, loading the largest available datasets in-memory is not feasible on a machine with average resources. In this paper, we introduce an algorithm to the efficient discovery of Horn rules in graphs dubbed HornConcerto.Using a standard fact-based confidence score, we can mine closed Horn rules having an arbitrary body size. Our work brings the following contributions: (1) We outperform existing rule mining approaches in terms of runtime and memory consumption, while scaling to very large knowledge bases. (2) We mine high-quality rules for link prediction. 1 Retrieved on August 5th, 2017. Submitted, KDD, 2018 Tommaso Soru, André Valdestilhas, Edgard Marx, and Axel-Cyrille Ngonga Ngomo (3) We find that rules alone can perform inference significantly faster than embedding-based methods and achieve accuracies on link prediction comparable to resource-demanding approaches such as Markov Logic Networks. This paper is arranged as follows. The next section presents the related work, while Section 3 introduces the preliminary concepts. The HornConcerto approach is described in Section 4. Section 5 shows the evaluation results, which are discussed in Section 6. In Section 7, we conclude. 2 RELATED WORK This work is mainly related with Inductive Logic Programming (ILP) systems to mine rules in datasets where statements are composed by triples (or triplets). The main differences among these approaches are in data storage type and the confidence score used for rules. Warmr is a framework which combines ILP with association-rule mining, performing a breadth-first search to find frequent patterns. It uses a standard confidence function [7]. Aleph implements several measures for rule quality and has the peculiarity to generate random negative examples [17]. With this respect, Sherlock, Amie, and Amie+ use only declared statements as counterexamples, thus embracing the open-world assumption (OWA) [8, 23]. While Amie uses an in-memory database to discover rules, Ontological Pathfinding (OP) – state-of-the-art rule miner in terms of performances – utilizes an external DBMS [4]. Among the frameworks based on MLNs, the majority do not provide the possibility of discovering rules. NetKit-SRL [16], ProbCog [10], Tuffy [19], Markov theBeast [22], and RockIt [20] all need rules as input in order to proceed with the weight learning, grounding, and inference phases. Alchemy [12] instead performs the construction of rules in a combinatorial way; however, this method is highly inefficient, especially on datasets having an elevated number of distinct properties. Besides link prediction and knowledge expansion [5], probabilistic inference systems showed to be effective in fields such as question answering [24], instance matching [14], and class expression learning [3]. 3 PRELIMINARIES 3.1 Horn clauses In the context of first-order logic, an atom is a formula which contains a predicate and a list of undefined arguments and cannot be divided into sub-formulas. For instance, the atom A := a(x 1 , x 2 ) features a binary predicate a on the free variables x 1 , x 2 . The typical structure of first-order rules expects an implication sign, an atom H as the head (i.e., the implication target), and a set of atoms B 1 , . . . , Bn as the body. The body can be composed by one or more conjunction literals, i.e. H ⇐= B 1 ∧ . . . ∧ Bn . An expression can be rewritten in disjunctive normal form (DNF) if it can be expressed as a chain of inclusive disjunctions. Turning the rule above to the equivalent DNF, we have H ∨ ¬B 1 ∨ . . . ∨ ¬Bn . Definition 3.1. Horn clause. A Horn clause (or rule) is a disjunction of literals with at most one positive, i.e. non-negated, literal. Ó → − → − Therefore, let B := ni=1 Bi , any first-order rule H ⇐= B is also a Horn clause. 3.2 Rule scoring Most rule mining algorithms measure and rank rules according to some score. The most used measure for rule quality relies on the number of occurrences in data and is called standard confidence. Definition 3.2. Standard confidence. The support of a Horn clause estimates the probability of the rule head to hold true, given the body: → − P(H ∩ B ) → − P(H | B ) = (1) → − P( B ) → − The standard confidence of a rule R := H ⇐ B is defined as: → − {H ∧ B } c(R) = (2) → − {B } The numerator in Equation (2) is also called support. For the sake of simplicity, we will name the denominator “body support”. → − For instance, for H := h(x, y) and B = B 1 := b1 (x, y), the standard confidence is a rate between two absolute numbers, i.e. (i) the number of occurrences found in graph G such that b1 (x, y) ∧h(x, y) holds over (ii) the number of occurrences such that b1 (x, y) holds. We now formally define the concept of triple in a graph. Definition 3.3. Triple. Given a directed labelled multi-graph G = (V , E, l) with labelling function l : V ∪ E → U , where U is the set of all possible labels, a triple (s, p, o) := (s̄, p̄, ō) belongs to the graph G iff s, o ∈ V ∧ e = (s, o) ∈ E ∧ l(s) = s̄ ∧ l(e) = p̄ ∧ l(o) = ō. Algorithms such as Amie and Sherlock introduced a score which can deal with incomplete data [8, 23]. This score is referred to with the name partial completeness assumption (PCA) score. Definition 3.4. PCA score. A Horn clause can be associated to a score called PCA score. The rationale behind the PCA is that a missing relationship should not be treated as counterexample; instead, only triples (s, p, o 1 ) can be treated as counterexamples for a triple (s, p, o 2 ) with o 1 , o 2 . Being H̄ any relationship h(·, ·), the → − PCA score of a rule R := H ⇐ B is defined as: → − {H ∧ B } pca(R) = (3) → − {H̄ ∧ B } 4 HORN CONCERTO In this section, the core of the approach is presented. HornConcerto is a rule mining algorithm designed with scalability in mind. Moreover, we adopted a few constraints in order to let the computation focus on the more informative sections of the datasets first. HornConcerto is a complete algorithm, meaning that if run without constraints, it can detect all Horn rules of a given type. However, when dealing with large datasets, these constraints are necessary to reduce runtime and resource consumption. The constraints are defined as such: (1) consider only rules having a confidence value of at least θ ∈ [0, 1]; (2) consider only rules having one of the top P properties in its body. → − (3) consider only top Ti properties (i ≥ 2) as part of a | B | = i. Beyond Markov Logic: Efficient Mining of Prediction Rules in Large Graphs 4.1 Algorithm The HornConcerto algorithm is shown in Algorithm 1. First, we retrieve the top P properties sorted by their occurrence counts. The occurrence counts are the body support values for rules having a body size of 1. Then, we mine the rules and compute their standard confidence (see Definition 3.2). For each top-property q̄, we count the occurrences of p(x, y) and q̄(x, y) to happen together. We can then find a map m 1 : Π → N such that: m 1 (p) = |{(x, y) ∈ V 2 : (x, p, y), (x, q̄, y) ∈ G ∧ p , q̄}|∀p ∈ Π (4) where Π = {l(e) : e ∈ E}, i.e. the set of properties in the graph. The confidence of a rule is thus the ratio between their support in Equation (4) and body support. Intuitively, changing (x, y) into (y, x) in the rule body, we can discover rules of type p(x, y) ⇐ q(y, x), i.e. inverse properties. Algorithm 1: HornConcerto 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Data: target graph G, θ , P, T Result: set P of mined rules and confidence values retrieve the top P properties; for each rule type (in parallel) do initialize cache; for each top property in P do if rile body size ≤ 1 then Find matching digons and compute respective rule support; Store matching digons into set R; else 4 Find matching triangles and compute respective rule support; Store matching triangles into set R; for each rule in R do Compute body support (i.e., find #adjacencies of body properties); end end for each rule in R sorted by descend confidence do if confidence ≥ θ then Add rule and its confidence to output set P; else break; end end end end We then extend this concept to rules having a body size of 2. These cases involving 3 nodes and 3 edges can be viewed as cliques (n) of length 3 (or triangles). The aim is to compute a map m 2 : Π 2 → N which returns the triangles involving properties (p, r ) given q̄. 4 m 2 (p, r ) = |{(x, y, z) ∈ V 3 : (x, p, y), (z, r , y), (x, q̄, z) ∈ G}|∀p, r ∈ Π (5) (n) Submitted, KDD, 2018 Consequently, rules of type p(x, y) ⇐ q̄(x, z) ∧ r (z, y) can be mined computing the absolute number of adjacencies among q̄ and r ; such values are the body support values for rules having a body size of 2. m 2 (p, r ) = |{(x, y, z) ∈ V 3 : (x, q̄, z), (z, r , y) ∈ G}|∀p, r ∈ Π (6) In the cases above, since free variables always appear at least twice in a rule, the rules are called closed. Closed rules have been preferred over open rules by existing algorithms, as they express propositions found in natural language [4, 8]. Proceeding by induction, the maps above can be extended to mine closed rules having an arbitrary size. In our evaluation, we mine six different types of Horn clauses, of which two are composed by two predicates (i.e., digons) and four by three predicates (i.e., triangles): (1) p(x, y) ⇐= q(x, y) (2) p(x, y) ⇐= q(y, x) (3) p(x, y) ⇐= q(x, z) ∧ r (z, y) (4) p(x, y) ⇐= q(x, z) ∧ r (y, z) (5) p(x, y) ⇐= q(z, x) ∧ r (z, y) (6) p(x, y) ⇐= q(z, x) ∧ r (y, z) (d ) 4.2 Implementation and complexity analysis HornConcerto was implemented2 in Python 2.7 and the Sparql query language3 , using Numpy and the Joblib library for multithread processing. A Docker version of Virtuoso OpenSource 7.20 was used as triple store and query engine. These architectural choices were motivated by the high availability of large knowledge bases in the so-called Web of Data [1]. We therefore made HornConcerto compliant with the Resource Description Framework (RDF) and the Sparql query language. The computational complexity of our implementation excluding constraints is linear with respect to the number of properties in the graph. [21] proved Sparql patterns to be Pspace-complete. However, the time complexity relies on the Sparql engine which computes the queries. The number of graph patterns in queries grows linearly with the size of the rule body. Since our queries contain only AND and FILTER operators, they can be computed in a → − → − time O(| B | · |E|), where B is the body size and E is the total number of triples [21]. We provided HornConcerto with optimizations based on caching, pruning, and parallel processing. As queries for adjacencies might be repeated more than once, we introduced a caching system which stores the values and avoids unnecessary queries. Moreover, as rules are sorted by confidence value in descending order, the algorithm can easily prune search spaces. We implemented a parallel-processing version which executes each rule type on a different thread. 5 EVALUATION In our setup, we evaluated the rule mining algorithms on four different measures: (1) execution runtime, (2) memory consumption (RAM and disk), (3) number of rules discovered, and (4) quality of rules for link prediction. 2 The source code is available online at the address https://github.com/mommi84/ horn-concerto/. 3 https://www.w3.org/TR/sparql11-query/ Submitted, KDD, 2018 Tommaso Soru, André Valdestilhas, Edgard Marx, and Axel-Cyrille Ngonga Ngomo The datasets used are described in Table 1. D1-D2 are part of a benchmark for link prediction [2]. Both datasets are divided into three parts, i.e. training, validation, and test set. The sizes shown in the table are the union of the training and validation sets, while the test sets feature 5, 000 and 59, 071 triples respectively. Datasets D3-D4 are instead excerpts of the DBpedia knowledge graph [13]. D3-D4, unlike D1-D2 which were manually annotated, are naturally incomplete and hence, the closed world assumption does not apply. We compared HornConcerto with two state-ofthe-art rule mining approaches, i.e. OP and Amie+. We ran all three algorithms using their default settings; for HornConcerto, θ = 0.001, P = 200,T = 10. For a fair comparison in the runtime and memory evaluation, we set all approaches to utilize the same confidence thresholds. Finally, while HornConcerto and Amie+ expect only a triple dataset as input, OP expects an optional schema containing domains and ranges for each property. We thus extracted the values of domain and range for every property featuring this information and added them to the OP input. The experiments were carried out on a 8-core machine with 32 GB of RAM and running Ubuntu 16.04. Table 1: Datasets used in the evaluation. Source D1 D2 D3 D4 5.1 # triples # nodes # prop. WordNet (WN18) 146,442 40,943 Freebase (FB15k) 533,144 14,951 DBpedia 2.0 Person 7,035,092 2,299,075 DBpedia EN 2016-04 397,831,457 5,174,547 18 1,345 10,341 63,764 Rule mining results The results of the comparative evaluation on runtime, rules discovered, and memory consumption can be seen in Table 2. Only HornConcerto could complete the computation on both datasets, as Amie+ threw an out-of-memory error due to the large size of D4 and OP started but did not finish to fill out its DBMS tables within 5 days. HornConcerto discovered less rules (i.e., 1,401) on D4, which can be considered a superset of D3. This is explained by the fact that the confidence score depends on certain ratios in data; increasing the dataset section does not necessarily lead to the same ratio values. To assess the scalability of our method, we executed it using different numbers of CPUs. We evaluated how parallelism and the use of CPUs affect the runtime of the rule mining process. Figure 1a shows that the runtime remains almost the same until 4 CPUs, drops at around 6, and then stabilizes again after 6 CPUs. The reason is because we parallelize the computation on rule types, which are 6 in total. 5.2 Link prediction results We compared HornConcerto with Amie+ and other state-of-theart approaches on the link prediction task using datasets D1 and D2. D3 and D4 are not suited for link prediction, since there the closed world assumption does not apply, meaning that a missing edge is not necessarily false. As previously mentioned, the OP algorithm relies on schemata to build rules from data. Being D1-D2 both schema-free datasets, all executions of OP returned 0 rules discovered, forcing us to abort its evaluation on link prediction. Then, we compared their performance with the aforementioned TransE [2] and the following: HolE, a state-of-the-art algorithm for link prediction based on holographic embeddings and neural networks by [18]; ComplEx, a latent-factorization method by [26]; Analogy by [15], an approach to link prediction using analogies among nodes embedded in a vector space; an ensemble learning approach dubbed DistMult, by [11]. In order to evaluate the rules discovered by HornConcerto and Amie+ on link prediction, we used four different settings. The first three settings are based on the intuition which states that the probability of a missing link is proportional to the confidence scores of the rules involving its predicate. We chose three different functions to compute this probability, i.e. average (Avg), maximum (Max), and product of complements (Prod). These functions take the vector of the confidence scores as input. The fourth setting relies on MLNs, instead. We thus plugged the input datasets and the rules discovered by HornConcerto and Amie+ to Mandolin4 , a framework based on MLNs. Dataset D1-D2 are split into training, validation, and test set. For each triple in the test set, corrupted triples are generated by altering subjects and objects. Then, the probability of the triple is computed using the functions described above and MLNs. The mean reciprocal rank is obtained by inverting the average rank (by descending probability) of a correct triple among the corrupted ones. Hits@N measures the percentage of cases where a correct triple ranks in the top-N triples. Link prediction results are shown in Table 3. Results show that HornConcerto achieves the best Hits@3 on D2 and state-of-the-art accuracies on dataset D1, where the differences among the two rule mining approaches are relatively small. In Figure 2a, we plotted the number of relevant rules (i.e., rules meeting the confidence threshold θ = 0.001) discovered over time on dataset D3. We launched 5 different settings, varying the number of top properties (P = 50, 100, 200) and the number of adjacencies (T = 5, 10, 20). The configuration hP,T i which yielded the maximum number of rules is h200, 10i, while h50, 10i produced less than one third of rules of the former. Increasing P or T trivially leads to more rules discovered. As can be seen, all the curves have a sudden braking at around t = 200s, which is a consequence of having smaller (and thus simpler) rules be mined first. In order to understand the effects of hyperparameters θ , P, and T on the accuracy, we ran HornConcerto on D1 in a grid pattern. We computed the Hits@10 accuracy on D1, varying θ = {0.0001, ..., 0.1} and P = {10, ..., 500}. Figure 2b shows that choosing a smaller θ of one order of magnitude has little to no influence on the Hits@10 value; the same applies to T , which was set to 100 in figure. On the other hand, experiments with P ≥ 50 achieved a score increment of +6% w.r.t. P = 10. 6 DISCUSSION As pointed out in [9], implementing the PCA score in Sparql is inefficient. In fact, we showed that the choice of using the PCA score 4 https://github.com/AKSW/Mandolin Beyond Markov Logic: Efficient Mining of Prediction Rules in Large Graphs Submitted, KDD, 2018 Table 2: Results on all datasets. In the disk memory consumption, the dataset itself is not included. Dataset Approach D1 D2 Rules RAM (GB) Disk (GB) 20 sec 151 0.1 < 0.1 ----- No Schema Available ----12 sec 365 1 0.1 Amie+ OP HornConcerto 2 h 45 min 45,427 0.1 < 0.1 ----- No Schema Available ----2 h 01 min 17,585 8 1 Amie+ OP HornConcerto D3 > 5 days > 6,000 > 5 days N/A 59 min 3,125 32 5 32 < 0.1 > 1, 000 1 Amie+ ----- Out Of Memory ----OP > 5 days N/A 2 > 1, 000 HornConcerto 11 h 34 min 1,401 32 5.6 D4 Time in minutes Runtime Amie+ OP HornConcerto hits1 hits3 hits10 96 100 94 92 80 90 60 2 88 4 6 8 number of CPUs 0 0.5 Gibbs iter. (a) 1 ·109 (b) Figure 1: Effects of parallelization on runtime (left) and Gibbs sampling iterations on accuracy (right) on dataset D3. Table 3: Link prediction results on D1 and D2. Hits@N values are in %. For each measure, the best result is highlighted in bold. D1 (WN18) D2 (FB15k) MRR Hits@1 Hits@3 Hits@10 MRR Hits@1 Hits@3 Hits@10 TransE HolE ComplEx Analogy DistMult E 0.495 0.938 0.941 0.942 0.790 11.3 93.0 93.6 93.9 78.4 88.8 94.5 94.5 94.4 N/A 94.3 94.9 94.7 94.7 95.0 0.463 0.524 0.692 0.725 0.837 29.7 40.2 59.9 64.6 79.7 57.8 61.3 75.9 78.5 N/A 74.9 73.9 84.0 85.4 90.4 Amie+ +Avg Amie+ +Max Amie+ +Prod Amie+ +MLNs 0.961 0.970 0.927 0.892 95.9 96.8 91.9 89.2 96.2 97.1 92.9 94.3 96.5 97.1 94.6 96.0 0.333 0.352 0.336 0.307 29.8 32.2 30.6 30.7 33.4 35.3 33.7 36.7 39.5 39.8 38.7 39.8 HornConcerto +Avg HornConcerto +Max HornConcerto +Prod HornConcerto +MLNs 0.963 0.971 0.941 0.904 95.9 96.9 91.8 90.4 96.6 97.3 96.4 94.2 97.0 97.4 97.2 95.9 0.479 0.810 0.508 0.224 41.2 79.2 44.7 22.4 50.6 81.9 52.7 31.4 60.3 83.6 61.9 37.2 instead of the standard confidence, even in systems not based on Sparql query engines, can lead to scalability issues. Moreover, our evaluation suggests that approaches which rely on schemata as the only mean to achieve a good optimization still struggle with large datasets. The concept of having to provide a property domain-range schema falls into contradiction with the need for rules, since this environment would more likely occur when no or few ontological insights are available. Submitted, KDD, 2018 P=50, T=10 P=100, T=10 P=200, T=10 P=100, T=5 P=100, T=20 7000 6000 relevant rules Tommaso Soru, André Valdestilhas, Edgard Marx, and Axel-Cyrille Ngonga Ngomo 5000 4000 3000 2000 1000 0 149 599 1049 1499 1949 2399 2849 Time (seconds) (b) Hits@10 accuracy (a) Relevant rules Figure 2 The link prediction results we obtained were the most interesting ones. Firstly, HornConcerto was able to perform better than Amie+, in contrast with previous research where PCA was showed being more effective than standard confidence on the extraction of higher-quality rules. More interestingly, we achieved the highest accuracy on Hits@N and MRR on D1 and Hits@3 on D2 just by using a simple maximization of the rule confidence scores. The reason why dataset D2 was harder to learn might be that rules having a longer body are needed to describe more complex relationships. The fact that embedding-based approaches perform well could confirm this hypothesis. However, these approaches are extremely slow at generating links; as their models compute a probability value for a given triple, yielding new links has a complexity of O(|V | 2 · |Π|). Finally, we surprisingly found that, independently on the rule mining algorithm, rules alone can achieve higher accuracies on link prediction than cumbersome and resource-demanding approaches such as Markov Logic Networks. Even after one billion Gibbs sampling iterations (see Figure 1b), the links predicted through MLNs were not as good as the ones found by our three simple functions. This can pave the way to an investigation on the existence of boundaries and theoretical limits that a rule-based prediction algorithm cannot overcome, due to mathematical constraints. 7 CONCLUSION In this paper, we presented HornConcerto, an algorithm for mining rules in large directed labelled graphs. Our Sparql-based implementation has shown an unprecedented ability to scale on large datasets. In the rule mining task, HornConcerto achieved stateof-the-art performances in execution runtime and disk memory consumption. While these accomplishments were fulfilled, our algorithm managed to mine high-quality rules in datasets having hundreds of millions of triples without the need of a schema and achieve state-of-the-art link predictions on a widely-used benchmark. Our findings suggest that (i) rule-based algorithms are still competitive on link prediction and (ii) rules alone can achieve accuracies comparable to cumbersome and resource-demanding approaches such as Markov Logic Networks. REFERENCES [1] Christian Bizer, Tom Heath, and Tim Berners-Lee. 2009. Linked data-the story so far. Semantic services, interoperability and web applications: emerging concepts (2009). [2] Antoine Bordes, Nicolas Usunier, Alberto Garcia-Duran, Jason Weston, and Oksana Yakhnenko. 2013. Translating embeddings for modeling multi-relational data. In Advances in Neural Information Processing Systems. [3] Lorenz Bühmann, Daniel Fleischhacker, Jens Lehmann, Andre Melo, and Johanna Völker. 2014. Inductive Lexical Learning of Class Expressions. In Knowledge Engineering and Knowledge Management. https://doi.org/10.1007/ 978-3-319-13704-9 4 [4] Yang Chen, Sean Goldberg, Daisy Zhe Wang, and Soumitra Siddharth Johri. 2016. Ontological Pathfinding. In Proceedings of the 2016 International Conference on Management of Data. ACM, 835–846. [5] Yang Chen and Daisy Zhe Wang. 2014. Knowledge expansion over probabilistic knowledge bases. In Proceedings of the 2014 ACM SIGMOD international conference on Management of data. ACM. [6] The UniProt Consortium. 2017. UniProt: the universal protein knowledgebase. Nucleic Acids Research 45, Database-Issue (2017), D158–D169. http: //dblp.uni-trier.de/db/journals/nar/nar45.html#Consortium17a [7] Luc Dehaspe and Hannu Toivonen. 2001. Discovery of relational association rules. In Relational data mining. Springer, 189–212. [8] Luis Galárraga, Christina Teflioudi, Katja Hose, and Fabian M Suchanek. 2015. Fast rule mining in ontological knowledge bases with AMIE+. The VLDB Journal 24, 6 (2015). [9] Luis Antonio Galárraga, Christina Teflioudi, Katja Hose, and Fabian Suchanek. 2013. AMIE: association rule mining under incomplete evidence in ontological knowledge bases. In WWW. ACM. [10] Dominik Jain and Michael Beetz. 2010. Soft evidential update via markov chain monte carlo inference. In Annual Conference on Artificial Intelligence. Springer. [11] Rudolf Kadlec, Ondrej Bajgar, and Jan Kleindienst. 2017. Knowledge Base Completion: Baselines Strike Back. arXiv preprint arXiv:1705.10744 (2017). [12] Stanley Kok, Marc Sumner, Matthew Richardson, Parag Singla, Hoifung Poon, Daniel Lowd, Jue Wang, and Pedro Domingos. 2009. The Alchemy system for statistical relational {AI }. Technical Report. Department of Computer Science and Engineering, University of Washington. [13] Jens Lehmann, Chris Bizer, Georgi Kobilarov, Sören Auer, Christian Becker, Richard Cyganiak, and Sebastian Hellmann. 2009. DBpedia - A Crystallization Point for the Web of Data. Journal of Web Semantics 7, 3 (2009), 154–165. https: //doi.org/doi:10.1016/j.websem.2009.07.002 [14] Luı́s Leitão, Pável Calado, and Melanie Weis. 2007. Structure-based inference of XML similarity for fuzzy duplicate detection. In CIKM. ACM. [15] Hanxiao Liu, Yuexin Wu, and Yiming Yang. 2017. Analogical Inference for Multi-Relational Embeddings. arXiv preprint arXiv:1705.02426 (2017). Beyond Markov Logic: Efficient Mining of Prediction Rules in Large Graphs [16] Sofus A Macskassy and Foster Provost. 2005. Netkit-srl: A toolkit for network learning and inference. In Proceeding of the NAACSOS Conference. [17] Stephen Muggleton. 1995. Inverse entailment and Progol. New generation computing 13, 3 (1995), 245–286. [18] Maximilian Nickel, Lorenzo Rosasco, and Tomaso Poggio. 2015. Holographic Embeddings of Knowledge Graphs. AAAI (2015). [19] Feng Niu, Christopher Ré, AnHai Doan, and Jude Shavlik. 2011. Tuffy: Scaling up statistical inference in markov logic networks using an rdbms. VLDB 4, 6 (2011). [20] Jan Noessner, Mathias Niepert, and Heiner Stuckenschmidt. 2013. Rockit: Exploiting parallelism and symmetry for map inference in statistical relational models. AAAI (2013). [21] Jorge Pérez, Marcelo Arenas, and Claudio Gutierrez. 2009. Semantics and complexity of SPARQL. ACM Transactions on Database Systems (TODS) 34, 3 (2009), 16. [22] Sebastian Riedel. 2008. Improving the accuracy and Efficiency of MAP Inference for Markov Logic. In Proceedings of the 24th Annual Conference on Uncertainty in AI (UAI ’08). 468–475. [23] Stefan Schoenmackers, Oren Etzioni, Daniel S Weld, and Jesse Davis. 2010. Learning first-order horn clauses from web text. In EMNLP. [24] Saeedeh Shekarpour, Edgard Marx, Axel-Cyrille Ngonga Ngomo, and Sören Auer. 2014. SINA: Semantic Interpretation of User Queries for Question Answering on Interlinked Data. Web Semantics 1 (2014), –. [25] Claus Stadler, Jens Lehmann, Konrad Höffner, and Sören Auer. 2012. LinkedGeoData: A Core for a Web of Spatial Open Data. Semantic Web Journal 3, 4 (2012), 333–354. http://jens-lehmann.org/files/2012/linkedgeodata2.pdf [26] Théo Trouillon, Johannes Welbl, Sebastian Riedel, Éric Gaussier, and Guillaume Bouchard. 2016. Complex embeddings for simple link prediction. In International Conference on Machine Learning. 2071–2080. [27] Beat Wuthrich. 1995. Probabilistic knowledge bases. IEEE Transactions on Knowledge and Data Engineering 7, 5 (1995), 691–698. Submitted, KDD, 2018
2cs.AI
Disentangled Representations via Synergy Minimization arXiv:1710.03839v1 [cs.LG] 10 Oct 2017 Greg Ver Steeg1 , Rob Brekelmans1 , Hrayr Harutyunyan2 , and Aram Galstyan1 Abstract— Scientists often seek simplified representations of complex systems to facilitate prediction and understanding. If the factors comprising a representation allow us to make accurate predictions about our system, but obscuring any subset of the factors destroys our ability to make predictions, we say that the representation exhibits informational synergy. We argue that synergy is an undesirable feature in learned representations and that explicitly minimizing synergy can help disentangle the true factors of variation in underlying data. We explore different ways of quantifying synergy, deriving new closed-form expressions in some cases, and then show how to modify learning to produce representations that are minimally synergistic. We introduce a benchmark task to disentangle separate characters from images of words. We demonstrate that Minimally Synergistic (MinSyn) representations correctly disentangle characters while methods relying on statistical independence fail. I. I NTRODUCTION Instead of the colors “blue” and “green”, imagine a language with the concepts of “grue”, which describes something that is green during the daytime and blue at night, and “bleen”, which is blue by day and green by night [1]. The Grue language looks unnecessarily complex to us, as we would have to describe a blue-eyed person as bleen-eyed by day and grue-eyed at night. However, one can imagine that the Grue-speaking people are familiar with two types of jellyfish: a poisonous, grue-colored species and a non-poisonous, bleencolored species. They would find our language inconvenient because of cumbersome warnings to avoid “green during the day and blue at night”-jellyfish. Which set of concepts is simpler ultimately depends on the types of observations one is trying to characterize and this can be formalized with the concept of informational synergy. Synergy is colloquially defined as a situation where the “whole is more than the sum of its parts.” To predict the current visual appearance of a green object from a description in the Grue language requires knowing whether the object is grue or bleen and whether it is currently night or day. Knowing either fact alone imparts no information. This mirrors the canonical example of synergy, the XOR gate on binary random variables with X = Z1 ⊕ Z2 , where either input, Zj , alone is uninformative about X while both together perfectly determine X. The focus of this work is to explore whether synergy can be useful in the context of unsupervised learning. Just as different languages can exhibit more or less synergy while being equally expressive, latent variable models can exhibit more or 1 University Institute of Southern California, Information Sciences [email protected], [email protected], [email protected] 2 Yerevan State University, [email protected] less synergy while being equally predictive. We thus introduce the principle of minimum synergy (MinSyn) for representation learning. We expect minimally synergistic representations to be more interpretable since each learned latent variable is encouraged to be individually informative about predicted observations. Disentangling factors of variation is often cited as a goal for unsupervised learning [2], but pinning down this hazy concept has proven difficult. Statistical independence of latent factors is often used as a proxy for disentangling [3], [4], but we demonstrate how independence-based approaches can fail to recover true structure while an approach based on synergy minimization succeeds. After reviewing various attempts to define a well-behaved information-theoretic measure of synergy [5], [6], [7], [8], we identify a candidate measure which is well suited to our unsupervised representation learning problem and derive concrete formulations for the Gaussian and binary cases. We introduce an intuitive benchmark task where we train a model on images of handwritten words and check whether factors are learned that correspond to individual characters. MinSyn learning correctly disentangles the characters while other methods fail. We conclude with a discussion of open questions for using synergy to improve representation learning. II. Q UANTIFYING S YNERGY While there is no consensus on the correct way to measure synergistic information, we can understand how a group of random variables interact to predict a target variable using the Partial Information Decomposition framework [8]. For a given set of inputs Z1:m = {Z1 , ..., Zj , ...Zm }, we seek to understand how the mutual information I(Z1:m : X),with some target X, is distributed across predictors and subsets of predictors. We seek to identify information, or reduction in uncertainty about the target X [9], as unique, if it can be achieved only by conditioning on a single given predictor, redundant, if it is available in more than one predictor, or synergistic, if it appears only from considering interactions among two or more predictors. Much of the literature to date on information decomposition has focused on finding measures that maintain a number of technical properties such as symmetry, monotonicity, and positivity, while also matching intuition across a variety of canonical examples (see [5] for a detailed discussion). We now briefly introduce several candidate synergy measures and explore their properties before eventually deciding to use Correlational Importance, or CI synergy, to guide representation learning in Section II-B. To compare measures and build intuition, Sec. II-C describes a simple example of synergy for Gaussian variables. A. Candidate Synergy Measures Among proposed measures of synergy, Whole Minus Sum synergy, arising in the neuroscience literature [10], directly formalizes the intuition of information in the whole minus information in the sum of the parts: WMS(Z1:m ; X) ≡ I(Z1:m ; X) − m X I(Zj ; X) (1) j=1 This measure is maximized when each individual Zj contains no information about X, but taken together they contain full information about X. However, this quantity can be negative when there is redundant information that is counted multiple times in the sum over singleton predictors. Thus, by observing WMS synergy equal to zero, we cannot determine whether no synergy is present or if there is a mixture of synergy and redundancy [8]. To address these concerns, [5] instead consider synergy as the “whole minus union of the parts,” where the union information is taken with respect to a variational distribution which solves the following optimization problem. U (Z1:m ; X) = min Iq (Z1:m : X) q(z1:m ,x) (2) s.t. q(zj , x) = p(zj , x), ∀zj , x B. Correlational Importance (CI) Synergy We now consider Correlational Importance [11], [12], or CI synergy, as a promising and tractable candidate measure for use in representation learning. CI was originally presented to characterize the relationship between an experimental stimulus and observed neural responses resulting from the brain’s noisy encoding procedure. The measure reflects the extent to which the neural code stores information about a given stimulus in individual neurons versus in correlations among multiple neurons. More concretely, [11], [12] calculate CI synergy as the KL divergence between the true posterior of stimulus given responses and a distribution pCI (x|z1:m ) which ignores correlations in the encoding process:   C(Z1:m ; X) = DKL p(x|z1:m ) pCI (x|z1:m ) (4) Q p(x) j p(zj |x) (5) pCI (x|z1:m ) ≡ pCI (z1:m ) X Y pCI (z1:m ) ≡ p(x) p(zj |x) x We use a subscript to denote mutual information with respect to the variational distribution, q. The marginal constraints on q ensure that the information contained in individual predictors is unchanged. The minimization squeezes out any information contained in higher order interactions among the Zj . With this measure of union information, GK synergy is defined as the information contained in Z that is not present in the union of information from individual Zj ’s, as follows. S(Z1:m ; X) ≡ I(Z1:m : X) − U (Z1:m ; X) overly simplistic. Therefore, despite the theoretical appeal of GK synergy, for the purpose of optimal representation learning we are motivated to explore more practical measures. (3) While this measure performs nicely for several lowdimensional exemplar problems and fits many theoretical desiderata [5], its applicability is limited by the intractable optimization in Eq. 2 over all distributions consistent with the marginals, for which we have no closed form solution. To make GK synergy tractable for learning problems, we considered a simpler scenario where we restrict distributions to be Gaussian. In that case, we were able to derive the first closed form expression for GK synergy, which is shown in Appendix A. The synergy-minimizing distribution obtained ends up looking quite simple, qGK (x|z1:m ) ∼ N (ρ∗ z∗ , 1 − ρ2∗ ), where Z∗ denotes the predictor most correlated with X and ρ∗ measures the Pearson correlation between X and the predictor Z∗ . In other words, if we have multiple predicted variables, Xi , synergy is minimized if each Xi depends on only a single latent factor, Zparent(i) . An immediate corollary provides an interesting theoretical connection between synergy minimization and representation learning: Gaussian latent tree models minimize (Gaussian) GK synergy of latent factors, Z1:m , with respect to observed variables, Xi . Latent tree models are difficult to learn, and the constraint of having only one parent for each observed variable can be j CI synergy was shown by [12] and [13] to provide an upper bound on the information loss to using the CI decoder rather than the true maximum likelihood decoder [9] in communicating over a noisy channel with input X and output Z1:m . A sufficient condition for CI to achieve a global minimum of zero is that the encoding distribution follows theQ conditional independence assumptions and p(z1:m |x) = j p(zj |x). As shown in [14], this condition is not necessary and the minimum can also be attained for non-factorized distributions if, over the entire support of X: p(z1:m ) Y p(z1:m |x) = p(zj |x) pCI (z1:m ) j We will explore a learning framework under the condition of minimal CI synergy in Section III. C. An Example of Gaussian Synergy Given the simple linear structure of a multivariate Gaussian, it may be surprising that these models can exhibit informational synergy. For a three dimensional joint distribution over Z1 , Z2 , and X, what types of correlation structures will lead to Z1 and Z2 being synergistic with respect to X? Mutual information is invariant under scaling and translation of the marginals, so w.l.o.g. we take each variable to have a mean of zero and a standard deviation of one. We use brackets to indicate expectation values, defining ρj = Zj X and Σ1,2 = Z1 Z2 . The marginal distributions between X and each Zj are thus fully specified as    1 ρj p(zj , x) ∼ N ~0, ρj 1 ����������� (����) ��� I(Z:X) U(Z;X) S(Z;X) C(Z;X) ��� ��� ��� (a) ��� -��� � (b) ���� ��� ���� � Σ�� (a) (b) (c) Fig. 1. For normal distributions over Z1 , Z2 , X, it is possible for Z1 , Z2 to contain synergistic information about X. The ellipsoids represent level sets of normal distributions with covariance specified in Eq. 6 along with the marginal projections for each pair of variables. Between (a) and (b), the value of Σ1,2 changes while ρ1 , ρ2 are unchanged. While (a) is synergistic, (b) exhibits zero GK synergy. (c) We show how mutual information, union information, GK synergy, and CI synergy change over the entire range of Σ1,2 . Further, the set of joint distributions compatible with these marginal relationships can be written as q(z1 , z2 , x) ∼ N (~0, Σ), where the covariance matrix has the form  1 Σ = Σ1,2 ρ1 Σ1,2 1 ρ2  ρ1 ρ2  1 (6) D. Independence versus Synergy Statistical independence can be quantified with total correlation [15], a multivariate generalization of mutual information. Dependence among latent variables Z1:m = {Z1 , Z2 , ..., Zm } is characterized: m X T C(Z1:m ) = H(Zj ) − H(Z1:m ) (7) j=1 For this to specify a valid covariance matrix, it must be positive semidefinite which implies the constraints ρ2j ≤ 1, Σ21,2 ≤ p1, and the less trivial constraint that Σ1,2 is between ρ1 ρ2 ± (1 − ρ21 )(1 − ρ22 ). If we choose the X-marginals to be ρ1 = 1/2 and ρ2 = 3/4, the space of joint distributions is then parametrized only by the correlation between Z1 and Z2 , Σ1,2 . We visualize the joint induced by two different choices of Σ1,2 in Figure 1: a synergistic case with Σ1,2 = −.10 in 1(a), and a nonsynergistic case with Σ1,2 = .67 in 1(b). In both cases, the ellipsoids represent the level sets of the distribution, with the green representing the joint, and the vertical axis representing the target X. For the synergistic case in Figure 1(a), observe that, specifying the value of one of the predictors, Z1 for example, leaves a plane of possible distributions for the other two variables. The joint distribution is a tilted plate, so the value of X, or the coordinate of intersection with this plane on the vertical axis, is not specified by Z1 alone. On the other hand, knowledge of both predictors gives a tight estimate of X since the plate is thin, and we thus expect any candidate measure to give non-zero synergy. In the non-synergistic case of Figure 1(b), the ellipsoid for the joint distribution is fatter and more symmetric, meaning that our uncertainty about X is similar whether conditioning on a single predictor or both together. Indeed, there is zero GK synergy in this case. We also plot how GK synergy and CI synergy vary with Σ1,2 in Figure 1(c). While areas of low and high synergy are qualitatively similar, the synergyminimizing distribution, which is the main interest of this paper, differs for the two synergy measures. This quantity is zero if and only if all Zj are independent, which can also be seen by a simple rearrangement of the entropy terms to obtain a KL divergence Q DKL (p(z1:m )|| j p(zj )). Minimizing dependence between latent variables is a commonly proposed method for achieving disentangled representations [3], [4], [16], [17]. Representations comprised of statistically independent latent factors differ from ones with minimal synergy. Consider the classic example of the XOR gate, where we take Z1 , Z2 to be iid random variables taking binary values with probability half, and X = Z1 ⊕Z2 . By definition Z1 , Z2 are independent, meaning T C(Z1:2 ) = 0, but all candidate measures for the synergy of Z1:2 with respect to the prediction target, X, take on a maximal value of 1 bit [5]. Differences in learned representations are illustrated in Sec. IV. III. M IN S YN L EARNING For representation learning, we must shift from considering a one-dimensional target X to a high-dimensional set of input features X1:n = {X1 , ..., Xi , ..., Xn }. We consider a standard auto-encoder architecture [18], with encoding functions Zj = fj (X1:n ) transforming the data into some latent factor space, and decoding functions X̄i = gi (Z1:m ) that approximately recover observations from latent representations. The functions can be parametrized, for instance, as neural networks. Common training objectives for autoencoders minimize a reconstruction loss between the observed variables, Xi , and the reconstructed ones, X̄i [19]. While the optimal decoder with respect to the posterior probability of Xi given Z1:m would be gi (z) = Ep (Xi |Z1:m = z), this is typically intractable. Thus, we replace the expectation over p with a variational distribution q, which we will take to minimize the synergy among the latent factors Z1:m with respect to each predicted variable, Xi . We frame the synergy minimization problem over variational distributions q(xi , z1:m ) which approximate the true distribution, p, as follows. arg min Synergyq (Z1:m ; Xi ) s.t. ∀j q(xi , zj ) = p(xi , zj ) q(xi |z1:m ) (8) The marginal constraint ensures that the information that each individual latent factor contains about a predicted variable is unchanged, while the information contained jointly among latent factors is tuned to minimize a synergy measure. For mathematical tractability, we choose to minimize CI synergy. Solving the optimization in Eq. 8 using the CI synergy measure in Eq. 4, we see that the global minimizer of CI = 0 is achieved for the distribution q(xi |z1:m ) = pCI (xi |z1:m ) which satisfies the constraints of our optimization problem and depends only on marginal relationships between Xi , Zj . Given this framework for MinSyn learning, we just need to obtain an explicit form for the decoder which minimizes CI synergy. We provide expressions for MinSyn decoders for the Gaussian and binary cases below. A. CI Synergy for Gaussian Decoders Assume the relationships between each latent variable Zj and Xi are Gaussian. For simplicity and w.l.o.g. we give expressions below for variables that have been standardized to have zero mean and unit variance. The form of the CI minimizing distribution, pCI (xi |z1:m ), is given in Eq. 5. The distribution depends on the correlations ρij ≡ Xi Zj .   X ρij 1 1  (9) pCI (xi |z1:m ) = N  zj , 1 + Ri j 1 − ρ2ij 1 + Ri P ρ2ij where Ri = j 1−ρ2ij . Now the CI synergy in Eq. 4 is just defined as the KL divergence between two Gaussian distributions, the actual distribution p(xi |z1:m ) and the distribution assuming conditional independence above. B. CI Synergy for Binary Decoders In Sec. IV we will also show results where outputs are considered as binary variables, so we give an expression for a MinSyn decoder where all variables are binary. As above, this takes the form of pCI (xi = 1|z1:m ), which implies the following form for the decoder distribution. X pCI (xi = 1|z1:m ) = sig( wi,j zj + bi ) (10) j where the sigmoid function, often used in neural networks, is defined sig(v) = 1/(1 + e−v ) and w, b denote weights and biases respectively [19]. Instead of explicitly training w, b as in a typical neural network, these parameters are now set according to the joint statistics of the observations and encoded states as follows. p(Xi = 1) X p(Zj = 0|Xi = 1) bi = log + log p(Xi = 0) p(Z j = 0|Xi = 0) j wi,j = log p(Zj = 1|Xi = 1)p(Zj = 0|Xi = 0) p(Zj = 0|Xi = 1)p(Zj = 1|Xi = 0) In both the binary and Gaussian cases, our MinSyn decoder depends on the statistics of the pairwise marginals. It would be time consuming to compute these for the entire dataset after each gradient update. Therefore, we follow a similar strategy to that used in Batch Normalization [20]. During training, we calculate statistics only on the batch of samples currently being used for a gradient update. At the same time, we update a moving average of these statistics. During test time, we used the learned average. IV. R ESULTS A. EMNIST Handwritten Words Dataset We begin by introducing a new dataset and benchmark task for disentangling natural factors of variation. A common task in representation learning is to construct low-dimensional latent factor representations of handwritten characters (like the famous MNIST digits) that can be used to reconstruct the original images. We extend this problem to consider combinations of handwritten letters into words. What is the most natural (disentangled) way to represent this type of data? One way to represent this space is to include a latent factor for each possible word. However, the number of possible words is large so representing the data in this way could be inefficient. Moreover, if new words are introduced, we will need to add new factors and retrain the model. A more succinct representation would learn about the existence of characters and represent words as combinations of characters. The number of factors required is then just the number required to represent a character times the number of characters in the word. Therefore, we hypothesize that character disentangled representations will be better able to reconstruct new words that were not seen in training. We consider representations that recover a characterlevel representation from raw image data to have correctly disentangled the natural factors of variation. It is common in computer vision to build in assumptions of spatial locality using convolutional layers and pooling. Since characters are trivially distinguished through spatial localization, we can only fairly use this benchmark to test disentangling on domainagnostic methods. Knowledge of the spatial layout of pixels cannot be used. ICA and latent factor generative models typically assume independent latent factors. For this example, it is clear that the character-level factors are not independent since not all combinations of characters result in valid English words. For instance if you see a word that starts with “t”, the second letter is much more likely to be “h” than any other character due to the ubiquity of the word “the” in the English language. Therefore, we hypothesize that disentangling based {a,b,d,f,l,p,s,t} x {a,e,i,n,o,r,s,u} x {d,e,m,n,r,s,t,y} English words used in training (149 valid of 512 possible) aid,aim,air,and,ans,ant,any,are,arm,arr,art,ass,bad,ban,bar bas,bat,bay,bed,bee,bes,bet,bey,bid,bin,bis,bit,bod,bot,boy brr,bud,bum,bun,bur,bus,but,buy,dad,dam,day,den,did,die,dim din,dis,doe,don,dos,dot,dry,dud,due,dun,fad,fan,far,fas,fat fay,fed,fee,fem,fen,fer,fey,fie,fin,fir,fit,foe,for,fry,fun fur,fut,lad,lam,las,lat,lay,led,lee,let,lid,lie,lit,lot,pad pan,par,pas,pat,pay,pee,pen,per,pet,pie,pin,pis,pit,pod,pot pry,pun,pus,put,sad,sat,say,see,sen,set,sin,sir,sis,sit,sod son,sos,sot,soy,sud,sue,sum,sun,tad,tam,tan,tar,tat,tee,ten tie,tin,tis,tit,toe,tom,ton,tor,tot,toy,try,tum,tun,tut Fig. 2. Characters and words used to construct the training set. on independence will perform poorly for this benchmark task. For the current experiments, we construct a simple dataset of handwritten word images composed of letters from the EMNIST dataset [21] (see Figure 4 for several examples). We first observe the 300 most commonly appearing English words, and consider the 8 letters that appear most frequently in the first, second, and third positions of these words. Any of the 512 combinations of these letters which form valid English words are included as a training sample, leading to a dataset of 149 word images (Fig. 2). We construct a test set using all remaining combinations of these letters, noting that reconstruction performance on this set should be hampered if our representations memorize words instead of learning individual letters. In this experiment, we use identical image samples each time a letter appears in a word to remove variation in capitalization and writing style, an assumption that would match a typewritten text scenario. This variation could be included for added challenge in future experiments. Code constructing this dataset can be found at [22], and can be used as a template for exploring novel ways of sampling words and letters. Just as in the Grue example, the ideal disentangled representation may vary depending on details of the relevant task. B. Disentangled Representations from Handwritten Words We now apply several latent factor learning methods to the dataset of handwritten words generated as described in the previous section. For each method, we use 9 latent factors under the intuition that if a disentangled representation uses 3 latent factors to describe each character position, then these three factors will be capable of distinguishing 23 = 8 different characters in that position. We considered several approaches including two methods based on independence and two methods based on minimizing synergy. The independence-based methods we used were FastICA [3] and InfoMax [16], implemented using [23] and [24], respectively. The MinSyn implementations are based on the derivation of MinSyn decoders in the Gaussian and binary cases in Sec. III. We also compare to an auto-encoder with no synergy constraint. Finally, a common trick to improve robustness of standard auto-encoders is to add Gaussian noise to the inputs in training, a so-called denoising auto-encoder. Implementations are described in detail in Sec. B. 1) Disentangled latent factors: In Figure 3, we visualize decoder maps learned by different methods. Each method has a decoder map for each of 9 latent factors, presented in no particular order. Our expectation for disentangled ICA Latent Factors Fig. 3. Decoder weights for each of 9 latent factors learned by i) MinSyn Binary, ii) FastICA, and iii) an auto-encoder without synergy constraints representations is that each latent factor should correspond to only a single character, and therefore the associated decoder map will have nonzero weight in only one character position. To quantify the overlap in decoder feature maps, we define the average character concentration (ACC) score and report it in Table IV-B.2. For a given factor j and pixel i, we have decoder weights, wi,j . We denote the set of pixels that belong to character k as Sk . We P define the concentration of weights P 2 2 in character k as Cj,k = i∈Sk wi,j / i wi,j . Finally, ACC is defined as P the P average entropy across m latent factors, ACC = 1/m j k −Cj,k log Cj,k . ACC would be zero if each latent factor were concentrated on an individual character position. Figure 3 shows that standard auto-encoders produce very entangled representations and looking at the ACC scores in Table IV-B.2 shows that denoising does not help. As hypothesized, the dependence between characters induced by sampling English words causes entanglement of the ICA sources, with learned features spanning multiple positions. InfoMax fares even worse than ICA both visually (not shown) and according to ACC score. While statistical independence at first glance seems to be a natural way of quantifying disentanglement, this benchmark exemplifies how this intuition can fail. In contrast, MinSyn learns qualitatively different maps that both visually disentangle the characters and have lower ACC scores than any other methods. 2) Reconstructing training and test data: One argument in favor of character disentangled representations is that Training data (English words) and reconstructions Test data (not words) and reconstructions Fig. 4. Train/test data shown in top row, with MinSyn reconstruction below. they should in principle be equally capable of representing any words comprised of the same characters, even if those words were not present during training. Recall that we trained on a set of valid three-letter English words. Using the same characters, we can construct test “words” that are not in the English dictionary and test the ability of our latent factor representations to reconstruct them. We visualize some words from the training and test set along with their reconstructions using MinSyn in Fig. 4. In Table IVB.2, we compare the average L2 loss on training and test data across methods. Minimizing synergy leads to the best character disentanglement according to ACC and, as hypothesized, the most disentangled method also produces the best reconstruction results on both training and test data. Note that ICA and InfoMax use PCA to reduce to 9 components, before producing an orthogonal transformation into a basis of independent components, and therefore the reconstruction scores are identical even though the ACC’s differ. We also found that MinSyn constrained representations were more robust to different types of out-of-domain noise than their unconstrained counterparts, but we omit those results here due to space. Method Train loss Test loss ACC MinSyn (Binary) MinSyn (Gaussian) ICA InfoMax PCA Auto-encoder Denoising 12.94 58.68 49.83 49.83 49.83 35.98 38.26 48.12 91.26 85.23 85.23 85.23 73.67 76.40 0.558 0.670 0.824 0.849 0.950 1.07 1.08 V. R ELATED WORK Decomposing information in terms of unique, synergistic, and redundant components is an active area of research [25], [8], [5], with reviews of proposed measures appearing in [6] and [7]. While synergy is rarely mentioned with regard to representation learning, one motivation for exploring CI synergy was a new approach to latent factor models demonstrating state-of-the-art results for clustering and covariance estimation [26]; the approach combines total correlation explanation [27], [28] with a condition that can be recognized in the context of this paper as a CI synergy constraint. Similarly to the notion of synergy, disentanglement in representation learning has resisted a unique characterization, with statistical independence [3], [16] and sparsity via L1 regularization representing the most common approaches for achieving this goal [29], [2]. Another successful idea to reduce the fragility of learned representations involves adding noise to the latent factors (e.g. dropout). One can speculate that dropout reduces synergies in representations since it is not possible combine information from all latent factors (some fraction of which will be dropped out) to produce a given prediction. A recent approach [17] generalizes dropout with learned multiplicative noise to approximate the Information Bottleneck objective [30]. Disentangled and minimally sufficient P representations are encouraged by minimizing the objective j I(X1:n : Zj ) + T C(Z1:j ). Finally, other efforts attempt to guide Generative Adversarial Networks toward learning disentangled representations by maximizing mutual information with latent codes that incorporate prior knowledge about the data [31]. A line of work which superficially contradicts this one is the “Integrated Information Theory of Consciousness” (IIT) [32]. This line of work proposes that what makes consciousness (which we might call a learned neural representation) unique is precisely the degree to which the whole is more than the sum of the parts. A synergy measure is then introduced (integrated information), and consciousness is posited to maximize this synergy measure. While it appears that IIT proposes representations that maximize synergy while we propose representations that minimize synergy, these approaches actually address different ideas. IIT is concerned with the “internal synergy” of the brain as a system. In contrast, this work always focuses on the synergy with respect to a given prediction. It is possible that a system might have high “internal synergy” as defined in IIT while having low synergy with respect to particular predictions, hence IIT and MinSyn are not directly comparable. VI. C ONCLUSION The absurdity of the Grue language mirrors a common dysfunction in machine learning. Many factors (grue/bleen and night/day) have to be combined to describe simple observations (visual appearance of an object) and therefore individual factors (like grue) do not seem very meaningful to us. Concepts like blue/green seem more natural and we suggest that informational synergy provides a way to quantify this intuition. This presents an opportunity to leverage the long history of academic interest in synergy measures to quantify and eliminate undesirable and unnecessary synergies in representation learning, hopefully leading to more interpretable models. This work provides a first step in exploring the promise of reducing synergies in learning, however a number of challenges remain. Decades of research on synergy measures have not produced a consensus so finding the best measure for learning is an open problem. Because this field has remained theoretical, even popular synergy measures are difficult to estimate with little effort expended on tractable approximations. Existing work focuses on identifying synergies in observed data, while we suggest a fundamental shift in focus to using show their objective values coincide. For the dual, let k = arg maxi ρi . Set all vi = ui = 0, except vk = ρk , uk = ρ2k . This satisfies the constraints and gives an objective of ρ2k . For the primal program, we propose the following feasible point.   In ρ M̄ = +B (13) ρ> ρ2k synergy as a principle for designing representations. Finally, while we minimized synergy in this work, it could be that reducing synergies with a tunable regularization strength would be more effective and that some amount of synergy is desirable or even necessary in some cases. Despite many open questions, we showed that at least one measure, CI synergy, is tractable and straightforward to apply to representation learning. We showed that MinSyn led to the learning of qualitatively different representations. We presented a benchmark task for disentangling factors of variation in data and and found that MinSyn learning succeeded where other approaches failed. While this proof of concept is encouraging, the difficulties we highlighted indicate ample room for improvement. The symmetric matrix B is defined so that ∀i = 1, . . . , k − 1, k + 1, . . . , n, Bi,k = ρi /ρk , or zero otherwise. Inspection of the matrix reveals that it is positive semidefinite and the value of the objective is ρ2k . Finally, we can write the expressions for union information and GK synergy in terms of the correlation, ρk , with the largest magnitude. A PPENDIX U (Z1:n ; X) = I(Zk ; X) = 1/2 log(1 − ρ2k ) (14) 1 − ρ> Σ−1 ρ S(Z1:n ; X) = 1/2 log 1 − ρ2k (15) A. Derivation of GK Synergy for the Gaussian Case a) GK synergy for Gaussians: We have seen that measuring GK synergy depends on a difficult optimization problem to find the union information. However, if we restrict ourselves to Gaussian distributions, we are able to obtain an analytic expression for GK synergy. We begin by recasting the optimization in Eq. 2 after restricting ourselves to Gaussian distributions. The scaled and centered Gaussian distributions are completely characterized by a covariance matrix, M , which must be positive semi-definite. We take the sub-matrix that is the covariance only for Z1:n to be Σ. The correlations between Zi and X are ρi . The formula for mutual information is expressed in terms of the determinants of these matrices, with marginal constraints imposed on the covariance. U (Z1:n ; X) = min M 0 s.t. det Σ det M Mii = 1, Mi,n+1 = ρi , ∀i 1/2 log (11) Using the Schur complement, we can re-write the objective as −1/2 log(1 − ρ> Σ−1 ρ) which is equivalent to minimizing ρ> Σ−1 ρ. We rewrite the minimization involving a matrix inverse using a trick. We construct a matrix, M̄ , which is the same as M but with M̄n+1,n+1 = t. min t M̄ 0 s.t. M̄ii = 1, M̄i,n+1 = ρi , i = 1, . . . , n (12) Looking at the Schur complement for the condition M̄  0, we see that minimizing t is equivalent to minimizing ρ> Σ−1 ρ. Now that we have a canonical SDP we can use standard methods to construct a dual program. Feasible points of the dual provide a lower bound on the solution to our primal problem, Eq. 12, and vice versa [33]. If we find a feasible point for the dual and primal whose objective value coincides, then this point is the optimum for both programs. The dual is as follows.   u1 . . . 0 −v1 X   min 2vi ρi − ui s.t.  ... un −vn   0 u,v∈Rn i −v1 −vn 1 To prove the optimum of the primal problem, we give a feasible point for both the dual and primal problems and If we now consider optimizing this quantity over some variational distribution q matching the pairwise marginals, qGK (z1:n , x) = arg min S(Z1:m ; X) s.t. q(z1:n ,x) p(zi , x) = q(zi , x) we see that U (Z1:n ; X) and I(Zi ; X) are both constant for given marginals (since they depend only on ρ). Therefore, GK synergy reduces to minimizing mutual information subject to the marginal constraints. While we cannot solve this problem in general, we can again turn to the special case of Gaussian distributions for a solution. This optimization is exactly the one we had to solve to calculate the union information in Eq. 11. We found and proved the optimal point using SDPs. The solution can be expressed in terms of the covariance matrix over X, Σ, which can be read from Eq. 13. For simplicity and w.l.o.g., we re-order the ρi so that ρ1 has the largest magnitude. In that case, qGK (z1:n ) is defined by its covariance matrix as follows.   1 ρ2 /ρ1 ... ρn /ρ1  ρ2 /ρ1 1 0 0    Σ= . (16)  . ..  .. 0  0 ρn /ρ1 0 0 1 As a sanity check, we can use Eq. 16 to calculate that the value of the minimum of S(Z1 , Z2 ; X) that appears in the plot in Fig. 1 should be Σ1,2 = ρ2 /ρ1 = 1/2/3/4 = 2/3. A matrix in this special form is called an arrowhead matrix. The inverse can be found using standard identities1 and is a diagonal matrix plus a rank one matrix. This inverse is needed to complete our analysis since for Gaussians, qGK (x|z) ∼ N (ρ> Σ−1 z, 1 − ρ> Σ−1 ρ).  qGK (X|Z1:n = z) ∼ N ρ1 z1 , 1 − ρ21 , (17) After all this work, we come to the trivial solution that the least synergistic relationship according to MI synergy measures is to take the best predictor and throw the others 1 If more than one ρ have the same, maximal magnitude, the inverse does i not exist and the space of solutions is degenerate. away! This surprising conclusion holds for Gaussians, but not in the more general case, where no analytic form for GK synergy is known. In the Gaussian case, if we have many variables to predict, Xi , then minimizing GK synergy implies that each should depend on only a single latent factor. This is equivalent to a Gaussian latent tree model. The implications for learning for minimizing GK synergy in the general case remain an open question. B. Implementation Details All models were implemented using TensorFlow [34] and optimized using Adam [35] with a learning rate 0.001. 1) MinSyn Gaussian: We consider an auto-encoder with learned encoder weights and biases w, b, and a softplus P activation function zj = softplus( i wj,i xi +bi ), and decoder weightsPand biases u, d according to the linear decoder x̄i = j ui,j zj + dj , trained to minimize the expected squared reconstruction error, E[|X −X̄|22 ]. The only difference between our implementation and a standard one is that instead of learning the decoder weights as separate parameters, they ρij 1 are set according to Eq. 9: ui,j = 1+R 2 . i 1−ρij 2) MinSyn Binary: In the binary case, we re-scale pixel grayscale values into the range [0, 1] and interpret them as probabilities for a binary random variable to be on or off. The encoded state, Z1:m is constructed as a sigmoid of a linear function of the inputs. The decoder is specified similarly, except with weights specified as in Eq. 10. We use the cross entropy loss as is typical for binary random variables. 3) Auto-encoders: For comparison, we also consider a fully-connected auto-encoder where the decoder weights are trained rather than fixed according to the CI-minimizing distributions above. We use a softplus non-linearity in the encoder and a sigmoid activation in the decoder, training to minimize cross entropy loss. For the denoising auto-encoder, we add Gaussian noise with σ = .25 to each input feature. ACKNOWLEDGMENT We thank Jimmy Foulds, Virgil Griffith, and David Kale for comments on this project. The authors acknowledge support from from DARPA grants W911NF-16-1-0575 and FA875017-C-0106. R EFERENCES [1] N. Goodman, Fact, fiction and forecast. JSTOR, 1955, vol. 74. [2] Y. Bengio, A. Courville, and P. Vincent, “Representation learning: A review and new perspectives,” Pattern Analysis and Machine Intelligence, vol. 35, no. 8, pp. 1798–1828, 2013. [3] A. Hyvärinen and E. Oja, “Independent component analysis: algorithms and applications,” Neural networks, vol. 13, no. 4, pp. 411–430, 2000. [4] L. Dinh, D. Krueger, and Y. Bengio, “Nice: Non-linear independent components estimation,” arXiv preprint arXiv:1410.8516, 2014. [5] V. Griffith and C. Koch, “Quantifying synergistic mutual information,” in Guided Self-Organization: Inception. Springer, 2014, pp. 159–190. [6] E. Olbrich, N. Bertschinger, and J. Rauh, “Information decomposition and synergy,” Entropy, vol. 17, no. 5, pp. 3501–3517, 2015. [7] N. Timme, W. Alford, B. Flecker, and J. M. Beggs, “Synergy, redundancy, and multivariate information measures: an experimentalist’s perspective,” Journal of computational neuroscience, vol. 36, no. 2, pp. 119–140, 2014. [8] P. Williams and R. Beer, “Nonnegative decomposition of multivariate information,” arXiv:1004.2515, 2010. [9] T. M. Cover and J. A. Thomas, Elements of information theory. WileyInterscience, 2006. [10] E. Schneidman, W. Bialek, and M. J. Berry, “Synergy, redundancy, and independence in population codes,” the Journal of Neuroscience, vol. 23, no. 37, pp. 11 539–11 553, 2003. [11] S. Nirenberg, S. M. Carcieri, A. L. Jacobs, and P. E. Latham, “Retinal ganglion cells act largely as independent encoders,” Nature, vol. 411, no. 6838, pp. 698–701, 2001. [12] P. E. Latham and S. Nirenberg, “Synergy, redundancy, and independence in population codes, revisited,” The Journal of neuroscience, vol. 25, no. 21, pp. 5195–5206, 2005. [13] N. Merhav, G. Kaplan, A. Lapidoth, and S. S. Shitz, “On information rates for mismatched decoders,” IEEE Transactions on Information Theory, vol. 40, no. 6, pp. 1953–1967, 1994. [14] S.-i. Amari and H. Nakahara, “Correlation and independence in the neural code,” Neural computation, vol. 18, no. 6, pp. 1259–1267, 2006. [15] S. Watanabe, “Information theoretical analysis of multivariate correlation,” IBM Journal of research and development, vol. 4, no. 1, pp. 66–82, 1960. [16] A. J. Bell and T. J. Sejnowski, “An information-maximization approach to blind separation and blind deconvolution,” Neural computation, vol. 7, no. 6, pp. 1129–1159, 1995. [17] A. Achille and S. Soatto, “Information dropout: learning optimal representations through noise,” arXiv preprint arXiv:1611.01353, 2016. [18] P. Vincent, H. Larochelle, Y. Bengio, and P.-A. Manzagol, “Extracting and composing robust features with denoising autoencoders,” in Proceedings of the 25th international conference on Machine learning. ACM, 2008, pp. 1096–1103. [19] I. Goodfellow, Y. Bengio, and A. Courville, Deep learning. MIT Press, 2016. [20] S. Ioffe and C. Szegedy, “Batch normalization: Accelerating deep network training by reducing internal covariate shift,” arXiv preprint arXiv:1502.03167, 2015. [21] G. Cohen, S. Afshar, J. Tapson, and A. van Schaik, “Emnist: an extension of mnist to handwritten letters,” arXiv preprint arXiv:1702.05373, 2017. [22] R. Brekelmans, “Emnist handwritten character disentanglement benchmark,” software available from https://github.com/brekelma/ character-disentanglement-emnist. [23] F. Pedregosa, et al., “Scikit-learn: Machine learning in Python,” Journal of Machine Learning Research, vol. 12, pp. 2825–2830, 2011. [24] A. Gramfort, M. Luessi, E. Larson, D. A. Engemann, D. Strohmeier, C. Brodbeck, L. Parkkonen, and M. S. Hmlinen, “{MNE} software for processing {MEG} and {EEG} data,” NeuroImage, vol. 86, pp. 446 – 460, 2014. [Online]. Available: http://www.sciencedirect.com/ science/article/pii/S1053811913010501 [25] R. G. James, J. Emenheiser, and J. P. Crutchfield, “Unique information via dependency constraints,” arXiv:1709.06653, 2017. [26] G. Ver Steeg and A. Galstyan, “Low complexity gaussian latent factor models and a blessing of dimensionality,” arXiv:1706.03353, 2017. [27] G. Ver Steeg and A. Galstyan, “Discovering structure in highdimensional data through correlation explanation,” in Advances in Neural Information Processing Systems (NIPS), 2014. [28] G. Ver Steeg and A. Galstyan, “Maximally informative hierarchical representations of high-dimensional data,” in Artificial Intelligence and Statistics (AISTATS), 2015. [29] R. Tibshirani, “Regression shrinkage and selection via the lasso,” Journal of the Royal Statistical Society. Series B (Methodological), pp. 267–288, 1996. [30] N. Tishby, F. C. Pereira, and W. Bialek, “The information bottleneck method,” arXiv preprint physics/0004057, 2000. [31] X. Chen, Y. Duan, R. Houthooft, J. Schulman, I. Sutskever, and P. Abbeel, “Infogan: Interpretable representation learning by information maximizing generative adversarial nets,” in Advances in Neural Information Processing Systems, 2016, pp. 2172–2180. [32] M. Oizumi, L. Albantakis, and G. Tononi, “From the phenomenology to the mechanisms of consciousness: integrated information theory 3.0,” 2014. [33] L. Vandenberghe and S. Boyd, “Semidefinite programming,” SIAM review, vol. 38, no. 1, pp. 49–95, 1996. [34] M. Abadi, et al., “TensorFlow: Large-scale machine learning on heterogeneous systems,” 2015, software available from tensorflow.org. [Online]. Available: http://tensorflow.org/ [35] D. Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv preprint arXiv:1412.6980, 2014.
7cs.IT
Representation Learning using Event-based STDP Amirhossein Tavanaeia , Timothée Masquelierb , Anthony Maidaa arXiv:1706.06699v3 [cs.NE] 9 Mar 2018 a The School of Computing and Informatics University of Louisiana at Lafayette, Lafayette, LA 70504, USA Email: {tavanaei,maida}@louisiana.edu b CERCO UMR 5549, CNRS-Université de Toulouse 3, F-31300, France Email: [email protected] Abstract Although representation learning methods developed within the framework of traditional neural networks are relatively mature, developing a spiking representation model remains a challenging problem. This paper proposes an event-based method to train a feedforward spiking neural network (SNN) layer for extracting visual features. The method introduces a novel spike-timingdependent plasticity (STDP) learning rule and a threshold adjustment rule both derived from a vector quantization-like objective function subject to a sparsity constraint. The STDP rule is obtained by the gradient of a vector quantization criterion that is converted to spike-based, spatio-temporally local update rules in a spiking network of leaky, integrate-and-fire (LIF) neurons. Independence and sparsity of the model are achieved by the threshold adjustment rule and by a softmax function implementing inhibition in the representation layer consisting of WTAthresholded spiking neurons. Together, these mechanisms implement a form of spike-based, competitive learning. Two sets of experiments are performed on the MNIST and natural image datasets. The results demonstrate a sparse spiking visual representation model with low reconstruction loss comparable with state-of-the-art visual coding approaches, yet our rule is local in both time and space, thus biologically plausible and hardware friendly. Keywords: Representation Learning, spiking neural networks, quantization, STDP, bio-inspired model 1. Introduction Unsupervised learning approaches using neural networks have frequently been used to extract features from visual inputs [1, 2]. Single layer networks using distributed representations or autoencoder networks [3, 4] have offered effective representation platforms. However, the robust, high level, and efficient representation that is obtained by networks in the brain is still not fully understood [5, 6, 7, 8, 9, 10, 11]. Understanding the brain’s functionality in representation learning can be accomplished by studying spike activity [12] and bio-inspired spiking neural Preprint submitted to Neural Networks March 12, 2018 networks (SNNs) [13, 14, 15]. SNNs provide a biologically plausible architecture, high computational power, and an efficient neural implementation [16, 17, 18]. The main challenge is to develop a spiking representation learning model that encodes input spike trains to uncorrelated, sparse, output spike trains using spatio-temporally local learning rules. In this study, we seek to develop representation learning in a network of spiking neurons to address this challenge. Our contribution determines novel spatio-temporally local learning rules embedded in a single layer SNN to code independent features of visual stimuli received as spike trains. Synaptic weights in the proposed model are adjusted based on a novel spike-timingdependent plasticity (STDP) rule which achieves spatio-temporal locality. Nonlinear Hebbian learning has played a key role in the development of a unified unsupervised learning approach to represent receptive fields [19]. Földiák [20], influenced by Barlow [21], was one of the early designers of sparse, weakly distributed representations having low redundancy. Földiák’s model introduced a set of three learning rules (Hebbian, anti-Hebbian, and homeostatic) to work in concert to achieve these representations. Zylberberg et al. [22] showed that Földiák’s plasticity rules, in a spiking platform, could be derived from the constraints of reconstructive accuracy, sparsity, and decorrelation. Furthermore, the acquired receptive fields of the representation cells in their model (named SAILnet) qualitatively matched those in primate visual cortex. The representation kernels determining the synaptic weight sets have been successfully utilized by our recent study [23] for a spiking convolutional neural network to extract primary visual features of the MNIST dataset. Additionally, the learning rules only used information which was locally available at the relevant synapse. Although SAILnet utilized spiking neurons in the representation layer and the plasticity rules were spatially local, the learning rules were not temporally local. The SAILnet plasticity rules use spike counts accumulated over the duration of a stimulus presentation interval. Since the SAILnet rules do not use spike times, the question of training the spiking representation network using a spatio-temporally local, spikebased approach like spike-timing-dependent plasticity (STDP) [24], which needs neural spike times, remains unresolved. Later work, [25], extends [22] to use both excitatory and inhibitory neurons (obeying Dale’s law), but the learning rules still use temporal windows of varying duration to estimate spike rates, rather than the timing of spike events. Our work seeks to develop a learning rule which matches this performance but remains local in both time and space. In another line of research based on cost functions, Olshausen and Field [26] and Bell and Sejnowski [27] showed that the constraints of reconstructive fidelity and sparseness, when applied to natural images, could account for many of the qualitative receptive field (RF) properties of primary visual cortex (area 17, V1). These works were agnostic about the possible learning mechanisms used in visual cortex to achieve these representations. Following [26], Rehn and Sommer [28] developed the sparse-set coding (SSC) network which minimizes the number of active neurons instead of the average activity measure. Later, Olshausen et al. [29] introduced an L1 -norm minimization criterion embedded in a highly overcomplete neural framework. Although these models offer great insight into what might be computed when receptive fields are acquired, they do not offer insight into details of the learning rules used to achieve these representations. Early works that proposed a learning mechanism to explain the emergence of orientation 2 selectivity in visual cortex are those of von der Malsburg [30] and Bienenstock et al. [31]. A state-of-the-art model is that of Masquelier [32]. This model blends strong biological detail with signal processing analysis and simulation to establish a proof-of-concept demonstration of the original Hubel and Wiesel [33] feedforward model of orientation selectivity. A key feature of that model, relevant to the present paper, is the use of STDP to account for RF acquisition. STDP is the most popular learning rule in SNNs in which the synaptic weights are adapted according to the relative pre- and postsynaptic spike times [24, 34]. Different variations of STDP have shown successful visual feature extraction in layer-wise training of SNNs [35, 36, 37, 38]. In a similar vein, Burbank [39] has also proposed an STDP-based autoencoder. This autoencoder uses a mirrored pair of Hebbian and anti-Hebbian STDP rules. Its goal is to account for the emergence of symmetric, but physically separate, connections for encoding weights (W ) and decoding weights (W T ). Another component playing a key role in representing uncorrelated visual features in a bioinspired SNN pertains to the inhibition circuits embedded within a layer. For instance, Savin et al. [40] developed an independent component analysis (ICA) computation within an SNN using STDP and synaptic scaling in which independent neural activities in the representation layer were controlled by lateral inhibition. Lateral inhibition established a winner(s)-take-all (WTA) neural circuit to maintain the independence and sparsity of the neural representation layer. More recent work [41] has combined a layer of unsupervised STDP with an explicit layer of non-learning inhibitory neurons. The inhibitory neurons impose a WTA discipline. Their representations were tested on the handwritten MNIST dataset and have been shown to be effective for recognition of such digits. The acquired representations tended to resemble MNIST prototypes, although their reconstructive properties were not directly studied. [42] also studied a spiking network with stochastic neurons that performs MNIST classification and acquires MNIST prototype representations. Their architecture is a 3-layer network where the hidden layer uses a soft WTA to implement inhibition. Since there is no functional need to introduce an explicit inhibitory layer if there is no learning, our work uses a softmax function [43, 44] to achieve WTA inhibition. In our work, the standard softmax is adapted to a spiking network. Our acquired representations, when trained on the MNIST dataset, acquires representations resembling V1-like receptive fields, in contrast to the MNIST prototypes of the research described above. Other works related to spike-based clustering and vector quantization are the evolving SNNs (eSNNs and deSNNs) of [45, 46, 47, 48, 49] which acquire representations via a recruitment learning paradigm [50] where neurons are recruited to participate in the representation of the new pattern (based on similarity or dissimilarity to preexisting representations). In the deSNN framework, if a new online pattern is sufficiently similar to an already represented pattern, the representations are merged to form a cluster. This later work uses a number of bio-plausible mechanisms, including spiking neurons, rank-order coding [51], a variant of STDP, and dynamic synapses [52]. The present research proposes event-based, STDP-type rules embedded in a single layer SNN for spatial feature coding. Specifically, this paper proposes a novel STDP-based representation 3 learning method in the spirit of [32, 39, 22]. Its learning rules are local in time and space and implement an approximation to clustering-based, vector quantization [53] using the SNN while controlling the sparseness and independence of visual codes. Local in time means that the information to modify the synapse is recent, say within at most a couple of membrane time constant of the postsynaptic spike that triggers the STDP. By local in space, we mean that the information used to modify the synaptic weight is, in principle, available at the presynaptic terminal and the postsynaptic cell membrane. Our derivation uses a continuous-time formulation and takes the limit as the length of the stimulus presentation interval tends to one time step. This leads to STDP-type learning rules, although they differ from the classic rules found in [32] and [34]. In this sense, the rules and resulting visual coding model are novel. Independence and sparsity are also maintained by an implicit inhibition and a new threshold adjustment rule implementing a WTA circuit. 2. Background Földiák [54] developed a feedforward network with anti-Hebbian interconnections for visual feature extraction. The Hebbian rule in his model, shown in Eq. 1, is inspired from Oja’s learning rule [55] that extracts the largest principal component from an input sequence, ∆wji ∝ (yj xi − wji yj2 ) (1) X (2) yj = xi wji i where, wji is the weight associated with the synapse connecting input (presynaptic) neuron i and representation (postsynaptic) unit j. xi and yj are input and linear output respectively. Over repeated trials, the term yj xi increases the weight when the input and the output are correlated. The second term (−wji yj2 ) maintains the learning stability [54]. With respect to binary (or spiking) units, a more appropriate assumption was made by Földiák [20]. He modified the previous feedforward network by incorporating non-linear threshold units in the representation layer. The units are binary neurons with a threshold of 0.5 in which yj ∈ {0, 1} (Note: yj2 = yj ). Thus, the Hebbian rule in Eq. 1 is simplified to ∆wji ∝ yj (xi − wji ). ( P 1, i xi wji > 0.5 yj = 0, otherwise (3) (4) The weight change rules defined in Eqs. 1 and 3 are based on the input and output correlation. Another interpretation for Eq. 3 can be explained in terms of vector quantization (or clustering in a WTA circuit) [56, 57] in which the weights connected to each output neuron represent particular clusters (centroids). The weight change is also affected by the output neuron activation, yj . In this paper, we utilize the vector quantization concept to define an objective function. The 4 objective function can be adapted to develop a spiking visual representation model equipped with a temporally local learning rule while still maintaining sparsity and independence. Our motivation is to use event-based, STDP-type learning rules. This requires the learning to be temporally local, specifically using spike times between pre- and postsynaptic neurons. 3. Spiking Visual Representation The proposed model adopts a constrained optimization approach to develop learning rules that are synaptically local. The spiking representation model is a single layer SNN shown in Fig. 1. The representation layer recodes a p × p image patch (p × p spike trains) using D spike trains generated by neurons, zj , in the representation layer. We derive plasticity rules that operate over a stimulus presentation interval T (non-local in time) and then take the limit as T tends to one local time step to derive event-based rules. In the case of a linear unit, yj , the objective function to be minimized is shown below. It uses both the vector quantization criterion and a regularizer that prefers small weight values. X 2 F (xi , wji ) = yj (xi − wji )2 + yj λwji , yj = xi wji (5) i The variables xi , yj , wji ≥ 0 denote: normalized input pixel intensities in the range [0, 1], the linear output activation, and the excitatory synaptic weight, respectively. The first component shows a vector quantization criterion that is scaled by the output neuron’s activity, yj . The yj scales the weight update rule according to the neuron’s response to the input pattern (xi ). The second component (regularizer) is also scaled by the output neuron’s activity to control the weight decay criterion (e.g. if yj = 0, wji does not undergo learning). We assume that the input and output values can be converted to the spike counts over T ms. The hyperparameter λ ≥ 0 controls the model’s relative preference for smaller weights. As λ → 0, the objective function emphasizes the vector quantization criterion. In contrast, as λ → ∞ the vector quantization component is eliminated and the minimum of the objective function is obtained when the wji ’s → 0. In response to a stimulus presentation, a subset of spiking neurons in the representation layer is activated to code the input. To represent the stimuli by uncorrelated codes, the neurons should be activated independently and sparsely. That is, the representation layer demands a WTA neural implementation. This criterion can be achieved by a soft constraint such that X X  g(x) = zj ≤ 1 ⇒ 1 − zj ≥ 0 . (6) j j where, zj shows the binary state of unit j after the T ms presentation interval such that zj = 1 if unit j fires at least once. Also, the firing status of a neuron can be controlled by its threshold, θ. Therefore, this constraint can be addressed by a threshold adjustment rule. 5 Figure 1: Spiking representation network. p × p image patch encoded by D spike trains in the representation layer. W shows the synaptic weight sets corresponding to the D kernels. The goal is to minimize the objective function (Eq. 5) while maintaining the constraint (Eq. 6). This can be achieved by using a Lagrangian function X 2 L(xi , yj , z; wji , α) = yj (xi − wji )2 + yj λwji − α(1 − zj ) (7) | {z } j Objective Function | {z } Constraint where, α is a Lagrange multiplier. Minimizing the first component of Eq. 7 results in a coding module that represents the input by a new feature vector which can cluster the data via the synaptic weights. Minimizing the second component supports the sparsity and independence of the representation to finally (as a special case) end with a winner-take-all network in which exactly one neuron fires upon stimulus presentation. This matter is accomplished by adapting the neuron’s threshold, θ = −α. The optimum of the Lagrangian function can be obtained by gradient descent on its derivatives ∂L = −2yj (xi − wji ) + 2yj λwji ∂wji (8) X  ∂L ∂L =− =− zj − 1 ∂θ ∂α (9) j From gradient descent on Eq. 8 (reversing the sign on the derivative), we obtain ∆wji ∝ yj (xi − wji ) − yj λwji (10) However, the information needed in Eq. 10 is not yet temporally local. xi denotes the rescaled pixel intensity and does not represent the input spike train. To re-encode a pixel intensity, xi , to a spike train, Gi , we use uniformly distributed spikes (however, each spike train has a different random lag) with rate according to the normalized pixel intensity in the range [0, 1]. The maximum number of spikes (for a completely white pixel) over a T = 40 ms interval is 6 40. Additionally, yj is a positive value (approximated by spike count) denoting the neuron’s activation in response to a stimulus presentation and is not available at synapse, wji . The value yj can be reexpressed as Hj representing the output spike train of neuron j. Spike trains Gi and Hj are formulated by the sum of Dirac functions as shown in Eq. 11. Gi (t) and Hj (t) are either 0 or 1 for a given t. X X δ(t − tf ) (11) δ(t − tf ) , Hj (t) = Gi (t) = tf ∈Rjf tf ∈Sif Sif and Rjf are the sets of presynaptic and postsynaptic spike times. After coding xi and yj by spike trains Gi and Hj respectively, we propose a local, STDP learning rule following Eq. 10. When, xi and yj are coded by spike trains over T ms, the synaptic change in continuous time is given by  Z T  Z T Z T 1 0 0 0 0 Hj (t0 )dt0 (12) ∆wji ∝ Hj (t )dt Gi (t )dt − wji − λwji K 0 0 0 K is a normalizer denoting the maximum number of presynaptic spikes over the T ms interval. Over a short time period (t ∈ [t0 , t0 + γ), γ < 1 ms, so that K = 1), the weight adjustment at time t is calculated by  ∆wji (t) ∝ rj (t) si (t) − wji (t) − λwji (t)rj (t) (13) rj (t) shows the firing status of neuron j at time t (rj (t) ∈ {0, 1}). si (t) specifies the presence of a presynaptic spike emitted from neuron i at time interval (t − , t]. In our experiments  = 1 ms. The synaptic weight is changed only when a postsynaptic spike occurs (rj (t) = 1). Finally, the learning rule is formulated (upon firing of output neuron j) as follows ∆wji (t) ∝ si (t) − wji (t)(1 + λ) . (14) Where, wji ≥ 0. This learning rule is applied to wji when postsynaptic neuron j fires. The weight change is related to the presynaptic spike times received by the postsynaptic neurons. This scenario resembles spike-timing-dependent plasticity (STDP). In this STDP rule (Eq. 14), the current synaptic weight affects the magnitude of the weight change. For instance, if λ = 0 and wji ∈ [0, 1] (it will be proved in Eq. 19), the smaller weights undergo larger LTP and LTD; and vice versa. It also represents a form of nearest-neighbor spike interaction [58]. The second adaptation rule is the threshold learning rule. Eq. 9 is used to implement a learning rule for adjusting the threshold, θ. The threshold learning rule shown in Eq. 15 provides an independent and sparse feature representation. The threshold is the same for all D neurons in the representation layer. ∆θ ∝ D X  zj − 1 (15) j=1 In this section, the theory of the proposed spiking representation learning algorithm was explained. The next section will describe the SNN architecture and the learning rules derived from Eqs. 14 and 15. 7 4. Network Architecture and Learning 4.1. Neuron Model The network architecture is shown in Fig. 1 consisting of p2 and D neurons in the input and representation layers respectively. Stimuli are converted to spike trains over T ms for both layers. At a given time step, a neuron in the representation layer is allowed to fire only if its firing criterion is met. The firing criterion records the neuron’s score in a winners-take-all competition. The WTA score at time step t, given the entire set of incoming weights, W , into the representation layer, is given by P exp( i wji ζi (t)) P WTAscore j (t; W ) = P (16) k exp( i wki ζi (t)) ζi (t) = X e− (t−tf ) τ (17) tf where, ζi (t) is the excitatory postsynaptic potential (EPSP) generated by input neuron i and the tf s are the recent spike times of unit i during a small interval (t − ν, t], where ν is 4 ms. The decay time constant, τ , is set to 0.5 ms. In our network, the softmax value governs the time at which STDP occurs. If WTAscore of a neuron is greater than the adaptive threshold, θ, STDP is triggered and a spike is emitted. The softmax phenomologically implements mutual inhibition among the representation neurons to develop a winners-take-all circuit [59, 44] in the representation layer. The neurons in the representation layer are purely excitatory and there is no explicit lateral inhibition between them other than that implicitly implemented by the softmax. When softmax inhibition is imposed within the representation layer, the network implements a form of competitive learning by virtue of STDP being triggered by the firing of postsynaptic neurons. Only neurons that “win the competition” are allowed to learn. 4.2. Learning Rules The synaptic weight change shown in Eq. 14 defines an STDP rule where the current synaptic weight influences the magnitude of the change. STDP events are triggered upon postsynaptic firing yielding two cases corresponding to whether the presynaptic neuron fired within the (t−, t] time interval. Eq. 18 shows the final STDP rule derived from Eq. 14. The weights fall in the range [0, 1] and are initialized randomly by sampling from the uniform distribution. (  a · 1 − wji (1 + λ) , if si = 1  ∆wji = (18) a · − wji (1 + λ) , if si = 0 a is the learning rate. If λ = 0, the first and second adaptation cases increase and decrease the synaptic weight respectively (LTP and LTD). If λ → ∞, then both cases are negative and decrease the weights down to the minimum value (wji = 0). Our experiments study the model’s 8 performance using different λ values over a broad range [0, 10−4 , . . . , 104 ]. Results are shown in Fig. 2c. The weight adjustment, at equilibrium, reveals a probabilistic interpretation as follows E[∆wji ] = 0 ↔ (19) a · P (si = 1|rj = 1)(1 − wji (1 + λ))− a · P (si = 0|rj = 1)wji (1 + λ) = a · P (si = 1|rj = 1)(1 − wji (1 + λ))− a · (1 − P (si = 1|rj = 1))wji (1 + λ) = 0 ↔ (1 + λ)wji = P (si = 1|rj = 1) (20) Therefore, the synaptic weight converges to the (1 + λ) scaled probability of presynaptic spike occurrence given postsynaptic spike (LTP probability). From Eq. 20, the weights fall in the 1 range (0, 1+λ ) so that the first case refers to LTP (∆wji ≥ 0) and the second one refers to LTD (∆wji ≤ 0), at the equilibrium point. To show that the STDP rule (Eq. 18) is consistent with the learning rule in Eq. 10, we rewrite the non-local rule with learning rate, a, as follows non−local  ∆wji = a · yj xi − wji − λwji (21) As stated earlier, this rule is temporally non-local and shows the weight change over a T ms interval. In contrast, the STDP rule is temporally local, applying the weight change at one time step when the postsynaptic neuron fires. To make Eq. 21 and Eq. 18 (which is derived from Eq. 14) comparable with each other, we consider a time interval with only one postsynaptic spike where rj = 1. Specifically, we break the T ms interval into subintervals whose boundaries are determined by the event of a postsynaptic spike. It is sufficient to analyze an arbitrary subinterval. Therefore, Eq. 21 at time t simplifies to non−local  ∆wji = a xi − wji − λwji (22) Following Eq. 19 for calculating the expected weight change using the proposed STDP rule, where rj = 1, we find that  E[∆wji ] = a P (si = 1) − wji − λwji (23) Where, P (si = 1) is the firing probability of presynaptic neuron i. Also, we generated the presynaptic spike trains using the normalized pixel intensities in the range [0, 1] with different random lags. Thus, this probability value is the same as the normalized pixel intensity, xi , as firing rate. Therefore,  non−local (24) E[∆wji ] = a xi − wji − λwji = ∆wji 9 which matches the weight change shown in Eq. 22. This shows that the proposed STDP rule is consistent with the non-local rule. Additionally, the STDP weight change is an unbiased estimation for the non-local (non-spike based) learning rule. Over a short time period, the proposed learning rule is also an unbiased estimation for the Hebbian rule of Földiák [20] (Eq. 3). For the threshold adaptation, following Eq. 15, the threshold learning rule can be written as  ∆θ = b mz − 1 (25) where, b is the learning rate. mz is the number of neurons in the representation layer firing in T ms. This rule adjusts the threshold such that only one neuron fires in response to a stimulus. This criterion provides a framework to extract independent features in a sparse representation. As we used softmax-based neurons in the representation layer, the initial threshold value, θinit , should be in the following range: 1 < θinit << 0.5 (26) D Where, D is the number of neurons in the representation layer. The upper-bound of 0.5 allows more than one neuron to be active at the initial training steps to capture visual features (θinit << 0.5). On the other hand, the initial threshold should be big enough to stop high synchronization 1 at the beginning (θinit > D ). According to the minimum number of neurons we used in the experiments (D = 8, 1/D = 0.125), the initial threshold was set to 0.15. 5. Evaluation Metrics We use the following metrics to judge the quality of the representation acquired in Fig. 1. 5.1. Reconstructed image We use reconstructed image to qualitatively assess the extent that the representation layer captures the information contained in the image patches. The representation filter set, W = {w1 , w2 , ..., wD }, is a p2 × D weight matrix coding an image patch (p2 input spike trains) to a vector of D postsynaptic spike trains. To reconstruct the image patch from the coded spike trains, the reconstruction filter set, W rec ≡ W T , is used to build p2 spike trains. For this purpose, neurons in the input layer receive spike trains from the neurons in the representation layer via the transposed synaptic weight matrix (like an autoencoder). 5.2. Reconstruction loss To report the reconstruction loss, we use the correlation measure (Pearson correlation) and the root mean square (RMS) error between the normalized original, ym , and reconstructed, ŷm , patches as shown in Eqs. 27 and 28 respectively. A patch stands for p2 spike rates, y. M 1 X Corr Recon Loss = 1 − Cor(ym , ŷm ) M m=1 10 (27) RMS = 1 M M X m=1 v u p2 u1 X t (yi,m − ŷi,m )2 . p2 (28) i=1 M is the number of patches extracted from the image. 5.3. Sparsity To calculate the sparsity, we use average activity and breadth tuning measures. The average activity specifies the density of spikes released from neurons in the representation layer over T time steps given in Eq. 29. 1 XX Sparsity = rj (t) . (29) D·T t j The breadth tuning measure introduced by Rolls and Tovee [60] specifies the density of neural layer activity (Eq. 30) calculated by the ratio of mean, µ, and standard deviation, σ, of spike frequencies in the representation layer upon presenting a stimulus. The breadth tuning measures the neural selectivity such that the sparse code distribution concentrates near zero with a heavy tail [61]. For a neural layer where most of the neurons fire, the activity distribution is more uniformly spread and Breadth Tuning is greater than 0.5. In contrast, in a sparse code where most of the neurons do not fire, the distribution is peaked at zero and Breadth Tuning is less than 0.5. 1 σ Breadth Tuning = 2 , C= (30) C +1 µ 6. Experiments and Results We ran two experiments using the MNIST [62] and the natural image [26] datasets to evaluate the proposed local representation learning rules embedded in the single-layer SNN. For both datasets, the intensities of the gray-scale images were normalized to fall in the range of [0, 1] yielding possible spike rates to generate uniformly distributed spike trains for the input layer over T = 40 ms. The learning rates for STDP learning, a, (Eq. 18) and for threshold adjustment, b, (Eq. 25) were set to 0.0005 and 0.0001, respectively1 . We ran a number of experiments with different learning rates and found that changing a and b in the range [0.00005, 0.001] did not change the model’s performance significantly. Additionally, as the threshold adjustment rule is not modulated by the current threshold value, we chose a smaller learning rate (0.0001) for it to avoid possible threshold instability. 1 The maximum number of postsynaptic spikes is 40 and the maximum number of patches sampled from an 1 MNIST digit is 25. Our simple strategy for setting the learning rates is: a, b < 25×40 = 0.001. 11 6.1. Experiment 1: MNIST dataset Experiments were run using 5 × 5 patches sampled from 28 × 28 MNIST digits. We used a random subset of the MNIST digits divided into 15,000 training and 1000 testing images for learning and evaluating the model. The SNN architecture consists of 25 (5 × 5 image patch) neurons in the input layer and D = {2i , i = 3 . . . 7} neurons in the representation layer. These variations of the network architecture (different D values) determine under-complete to overcomplete representations. Trained filters, after 1 through 15,000 iterations, for the network with 32 neurons in the representation layer are shown in Fig. 2a. After 1000 training iterations, the kernels start becoming selective to specific visual patterns (orientations). The filters shown in this image tend to be orientation selective and extract different visual features. Fig. 2c shows the RMS reconstruction loss and other statistical characteristics (max, min, mean) of the trained weights versus the log regularizer hyperparameter (log10 λ). For λ ≤ 0.1, the RMS loss values reach a near optimal uniformly low plateau2 . For this reason, λ was set to zero for further experiments. Additionally, Fig. 2c shows that the maximum and minimum synaptic weights after training are 1/(1 + λ) and 0 respectively as predicted by Eq. 20. The three performance measures from the Section 5 were used to assess the model. These were the reconstructed images, the reconstruction loss, and the sparsity. The reconstructed images of randomly selected digits 0 through 9, acquired by the SNN with D = 32 neurons in the representation layer, are shown in Fig. 2b. The reconstructed maps show high quality images comparable with the original images. The reconstruction loss measures for the SNNs with D = 8 through 128 filters appear in Figs. 3a and 3b. The SNNs with D = 16 and 32 show the lowest reconstruction loss after training. The sparsity measures reported by the average sparsity and the breadth tuning are shown in Fig. 3c and 3d. The sparsity measures also show better performance for the networks with D = {16, 32, 64} filters. The average sparsity value of 0.09 shows that only 9% of the neurons were active on each trial. The breadth tuning value of 0.23 indicates the sparse stimulus representation. Figs. 3e and 3f depict the summary of the model’s performance after training for D = {8, . . . , 128} and D = 32 kernels, respectively. 6.2. Experiment 2: Natural images This experiment evaluates representations acquired from 16 × 16 natural image patches [26]. Fig. 4a shows the trained representation filters for the SNNs with 8, 16, 32, 64, and 128 neurons in the representation layer. For instance, where D = 32, except for the filters marked with dotted circles, the other filters have low correlation with each other. For visual assessments, Fig. 4b shows four natural images and their reconstructed maps. Performance of the proposed model in terms of the reconstruction loss and sparsity measures on natural images is shown in Fig. 4c. The lowest reconstruction loss belongs to the networks with {16, 32, 64} neurons in the representation layer. The small number of neurons (D = 8) is not able to capture the 2 The average RMS reconstruction loss values for the SNNs with λ ≤ 0.1 was reported 0.167±0.001 (Ninety-five percent confidence intervals of the RMS loss values (standard error of the mean; n = 5) were calculated). 12 (a) (b) (c) Figure 2: (a): D = 32 trained filters after 1, 10, ..., 15000 iterations. The red-blue spectrum denotes the maximum-minimum synaptic weights. (b): Reconstructed images based on overlapped and non-overlapped 5 × 5 patches. The overlapped patches are selected by 5 × 5 windows sliding over the image with a stride of 1. The non-overlapped patches slide over the image with a stride of 5. (c): RMS reconstruction loss and synaptic weight ranges for the SNN with D = 32 filters versus log10 regularizer hyperparameter, λ. λ = 0 is approximated by 10−31 . 13 Figure 3: (a)-(d): Model performance trends on MNIST after 1 through 15000 training iterations in terms of (a): correlation-based reconstruction loss, (b): RMS reconstruction loss, (c): average sparsity, and (d): breadth tuning.(e): The model’s performance after training. (f ): The evaluation measures for the trained visual representation model with D = 32 kernels. Error bars show standard error of the mean. 14 (a) (b) (c) Figure 4: Model’s performance on the natural image patches. (a): Representation filters after training the SNNs with D = {8, 16, 32, 64, 128} spiking neurons in the representation layer. (b): Original (first row) and reconstructed (second row) image sections (D = 32). (c): Reconstruction loss and sparsity measures of the models with 8 through 512 filters. visual codes. On the other hand, using too many neurons (D > 128) increases reconstruction loss because a number of neurons cannot be involved in the learning process due to the WTA constraint. 6.3. Comparisons The proposed spiking representation learning method shows better performance than the traditional K-means clustering [63] and the restricted Boltzman machine (RBM) [64, 65] while introducing local learning in time and space. We implemented these two methods, as traditional quantization-like representation learning examples, using the same training/testing images. The K-means and RBM approaches were applied to the normalized pixel intensities of image patches (not spike trains). Thus, these methods are not temporally local. Table 1 shows this comparison in terms of reconstruction loss (correlation and RMS). Our model outperforms the RBM and K-means methods except for the two cases (natural images) in which the RBM shows slightly better performance. Fig. 5 shows the trained filters obtained by K-means, RBMs, and our model based on the MNIST and natural image patches. K-means, similar to our model, detects different visual orientations for the MNIST and natural image patches, but the filters are highly correlated. The RBM did not perform well for the MNIST dataset but it successfully learned 15 Figure 5: D = 16, 32, and 64 representation filters trained on the MNIST and natural images datasets using K-means, RBM, and our STDP. representative visual filters for the natural image patches where D = 64. These trained filters (Fig. 5) confirm the reconstruction loss variations reported in Table 1. Table 2 compares our results with the only (to the best of our knowledge) spike-based representation learning models. The correlation-based reconstruction loss on MNIST and natural images (0.2 and 0.4) shows improvement over the existing spiking autoencoder using mirrored STDP (0.2 and 0.65) proposed by Burbank [39]. The sparse representation introduced by King et al [25], which is a modified version of the SAILnet algorithm [22], reported an RMS reconstruction loss around 0.74 that is calculated based on the spike rates normalized to unit standard deviation (let’s say zRMS). Our model compared favorably with their model with zRMS=0.67. However, our model did not scale well to a larger number of neurons when D ≥ 128 in the representation layer. The problem appears  to stem from the threshold adjustment rule (Eq. 25). If we change the rule to ∆θ = b mz − q , where q is a proportion of D, the representation layer would be more active and a large number of filters can be trained to reduce the reconstruction 16 Table 1: Reconstruction loss (correlation and RMS) obtained by K-means and RBM in comparison with our method. Rec. Loss D K-means RBM Our STDP MNIST Corr. 16 32 64 0.22 0.23 0.26 0.49 0.49 0.40 0.20 0.20 0.24 MNIST RMS 16 32 64 0.18 0.21 0.26 0.27 0.27 0.26 0.17 0.17 0.21 Natural Corr. 16 32 64 0.45 0.52 0.57 0.92 0.41 0.44 0.49 0.40 0.47 Natural RMS 16 32 64 0.31 0.36 0.40 0.47 0.27 0.26 0.24 0.27 0.40 Table 2: The reconstruction loss values reported by Burbank [39] in terms of correlation loss and King et al. [25] in terms of zRMS in comparison with our results. Dataset Natural images MNIST Burbank [39] Corr: 0.65 Corr: 0.2 King et al. [25] zRMS: 0.74 - Our Model Corr: 0.4, zRMS: 0.67 Corr: 0.2 loss. 7. Discussion and Conclusion This paper derived a novel STDP-based representation learning method to be embedded in an SNN and evaluated the acquired representations in two experiments to establish the method’s initial viability. The derived rules were extremely simple, yet the evaluated reconstruction loss was extremely low. The simplicity of the rules (resulting from the constraint of temporal locality) makes them attractive for hardware implementation. The learning rules were derived by constrained optimization incorporating a vector quantizationlike objective function with regularization and a sparsity constraint. The learning rules included spatio-temporally local STDP-type weight adaptation and a threshold adjustment rule. The STDP rule at equilibrium showed a probabilistic interpretation of the synaptic weights scaled by the regularizer hyperparameter. In addition to the threshold adaptation rule, the WTAthresholded neurons in the representation layer implemented inhibition (by a novel temporal, spiking softmax function) to represent sparse and independent visual features. Softmax is a standard way to implement a winners-take-all (WTA) circuit and to implement mutual inhibition without using explicit inhibitory neurons in the representation layer [44, p. 181], [43, p. 238]. The experimental results showed high performance of the proposed model in comparison with spiking and non-spiking approaches. Our model almost outperformed the traditional KMeans and RBM models in representation learning and training of the orientation selective kernels. Also, our method showed better performance (in terms of reconstruction loss) than the state-of-the-art spiking representation learning approaches used by [39] (spiking autoencoder) and [22, 25] (sparse representation). To obtain the spatio-temporally local learning rules embedded in the SNN, we started from a non-spiking quantization criterion inspired from [20]. Then, we developed novel rules to im17 plement an STDP based representation learning and a threshold adjustment rule for spiking platforms. The spike-based platform and spatio-temporally local learning rules lead the main difference between our study and well-known, traditional representation learning methods introduced in the literature. Existing spiking representation learning methods in the literature suffer from limitations such as violating Dale’s law [22], synapses that can change sign [22, 25], low performance in terms of reconstruction loss [39], and non-spiking input signals [22, 25]. In this study we proposed an STDP learning rule which updates the synaptic weights falling within the range [0, 1]. The SNN architecture consists of excitatory neurons and an implicit inhibition occurring in the representation layer. The implicit inhibition is analogous to a separate inhibitory layer balancing neural activities in the representation neural layer where Dale’s law is maintained. Furthermore, the proposed SNN implements spiking neurons in both the input and representation layers and the neurons only communicate through temporal spike trains. To the best of our knowledge, our approach is the only high performance (in terms of reconstruction loss) representation learning model implemented on SNNs. There are several studies in the literature developing SNNs equipped with bio-inspired STDP for unsupervised feature extraction through single or multi-layer spike-based architectures. The most recent works of [41, 42, 38], and [23] have utilized these features to classify MNIST digits. Although these networks introduce novel spiking network architectures for feature representation, they do not offer a pure representation learning approach with low reconstruction loss. Although our proposed spiking representation learning was successful for reconstruction, there is a limitation that the spike rate of the presynaptic neurons is higher than biological spiking neurons. Our future work seeks to reduce this spike rate to be more biologically plausible. Using more presynaptic neurons presenting mutual exclusive intensity bands would be a starting point. Additionally, it is a matter of future work to determine how well the acquired representations from our STDP algorithm perform in a pattern recognition context. It can also be tested in future work whether our acquired representations are stackable to afford the ability for multilayer, STDP-based learning. References [1] M. Bhand, R. Mudur, B. Suresh, A. Saxe, A. Y. Ng, Unsupervised learning models of primary cortical receptive fields and receptive field plasticity, in: Advances in neural information processing systems, 2011, pp. 1971–1979. [2] H. Lee, C. Ekanadham, A. Y. Ng, Sparse deep belief net model for visual area V2, in: Advances in neural information processing systems, 2008, pp. 873–880. [3] A. Coates, A. Ng, H. Lee, An analysis of single-layer networks in unsupervised feature learning, in: Proceedings of the fourteenth international conference on artificial intelligence and statistics, 2011, pp. 215–223. 18 [4] Y. Bengio, A. Courville, P. Vincent, Representation learning: A review and new perspectives, IEEE transactions on pattern analysis and machine intelligence 35 (8) (2013) 1798– 1828. [5] R. Q. Quiroga, L. Reddy, G. Kreiman, C. Koch, I. Fried, Invariant visual representation by single neurons in the human brain, Nature 435 (7045) (2005) 1102–1107. [6] N. K. Logothetis, D. L. Sheinberg, Visual object recognition, Annual review of neuroscience 19 (1) (1996) 577–621. [7] M. Riesenhuber, T. Poggio, Neural mechanisms of object recognition, Current opinion in neurobiology 12 (2) (2002) 162–168. [8] M. P. Young, S. Yamane, Sparse population coding of faces in the inferotemporal cortex, Science 256 (5061) (1992) 1327–1331. [9] S. M. Landi, W. A. Freiwald, Two areas for familiar face recognition in the primate brain, Science 357 (6351) (2017) 591–595. [10] B. A. Wandell, Foundations of vision., Sinauer Associates, 1995. [11] Y. Frégnac, J. Fournier, F. Gérard-Mercier, C. Monier, M. Pananceau, P. Carelli, X. Troncoso, The visual brain: Computing through multiscale complexity, in: Micro-, Meso-and Macro-Dynamics of the Brain, Springer, 2016, pp. 43–57. [12] M. W. Self, J. C. Peters, J. K. Possel, J. Reithler, R. Goebel, P. Ris, D. Jeurissen, L. Reddy, S. Claus, J. C. Baayen, et al., The effects of context and attention on spiking activity in human early visual cortex, PLoS biology 14 (3) (2016) e1002420. [13] W. Maass, Networks of spiking neurons: the third generation of neural network models, Neural Networks 10 (9) (1997) 1659–1671. [14] E. M. Izhikevich, Which model to use for cortical spiking neurons?, IEEE transactions on neural networks 15 (5) (2004) 1063–1070. [15] S. Ghosh-Dastidar, H. Adeli, Spiking neural networks, International Journal of Neural Systems 19 (04) (2009) 295–308. [16] W. Maass, To spike or not to spike: that is the question, Proceedings of the IEEE 103 (12) (2015) 2219–2224. [17] W. Maass, On the computational power of noisy spiking neurons, in: Advances in neural information processing systems, 1996, pp. 211–217. [18] D. Neil, M. Pfeiffer, S.-C. Liu, Learning to be efficient: Algorithms for training low-latency, low-compute deep spiking neural networks, in: Proceedings of the 31st Annual ACM Symposium on Applied Computing, ACM, 2016, pp. 293–298. 19 [19] C. S. Brito, W. Gerstner, Nonlinear Hebbian learning as a unifying principle in receptive field formation, PLoS computational biology 12 (9) (2016) e1005070. [20] P. Földiák, Forming sparse representations by local anti-Hebbian learning, Biological Cybernetics 64 (2) (1990) 165–170. [21] H. B. Barlow, Unsupervised learning, Neural Computation 1 (3) (1989) 295–311. [22] J. Zylberberg, J. T. Murphy, M. R. DeWeese, A sparse coding model with synaptically local plasticity and spiking neurons can account for the diverse shapes of V1 simple cell receptive fields, PLoS Comput Biol 7 (10) (2011) e1002250. [23] A. Tavanaei, A. S. Maida, Multi-layer unsupervised learning in a spiking convolutional neural network, in: Neural Networks (IJCNN), 2017 International Joint Conference on, IEEE, 2017, pp. 2023–2030. [24] H. Markram, W. Gerstner, P. J. Sjöström, Spike-timing-dependent plasticity: a comprehensive overview, Frontiers in synaptic neuroscience 4 (2012) 2. [25] P. D. King, J. Zylberberg, M. R. DeWeese, Inhibitory interneurons decorrelate excitatory cells to drive sparse code formation in a spiking model of V1, The Journal of Neuroscience 33 (13) (2013) 5475–5485. [26] B. A. Olshausen, D. J. Field, Emergence of simple-cell receptive field properties by learning a sparse code for natural images, Nature 381 (6583) (1996) 607–609. [27] A. J. Bell, T. J. Sejnowski, The “independent components” of natural scenes are edge filters, Vision Research 37 (23) (1997) 3327–3338. [28] M. Rehn, F. T. Sommer, A network that uses few active neurones to code visual input predicts the diverse shapes of cortical receptive fields, Journal of computational neuroscience 22 (2) (2007) 135–146. [29] B. A. Olshausen, C. F. Cadieu, D. K. Warland, Learning real and complex overcomplete representations from the statistics of natural images, in: Proc SPIE, Vol. 7446, 2009, pp. 74460S–1. [30] C. von der Malsburg, Self-organization of orientation sensitive cells in the striate cortex, Kybernetik 14 (1973) 85–100. [31] E. L. Bienenstock, L. N. Cooper, P. W. Munro, Theory for the development of neuron selectivity: Orientation specifity and binocular interaction in visual cortex, Journal of Neuroscience 2 (1) (1892) 32–48. 20 [32] T. Masquelier, Relative spike time coding and STDP-based orientation selectivity in the early visual system in natural continuous and saccadic vision: a computational model, Journal of Computational Neuroscience 32 (3) (2012) 425–441. [33] D. H. Hubel, T. N. Wiesel, Receptive fields, binocular interaction and functional architecture in the cat’s visual cortex, The Journal of Physiology 160 (1) (1962) 106–154. [34] N. Caporale, Y. Dan, Spike timing-dependent plasticity: a Hebbian learning rule, Annu. Rev. Neurosci. 31 (2008) 25–46. [35] T. Masquelier, S. J. Thorpe, Unsupervised learning of visual features through spike timing dependent plasticity, PLoS computational biology 3 (2) (2007) e31. [36] S. R. Kheradpisheh, M. Ganjtabesh, T. Masquelier, Bio-inspired unsupervised learning of visual features leads to robust invariant object recognition, Neurocomputing 205 (2016) 382–392. [37] A. Tavanaei, T. Masquelier, A. S. Maida, Acquisition of visual features through probabilistic spike-timing-dependent plasticity, in: Neural Networks (IJCNN), 2016 International Joint Conference on, IEEE, 2016, pp. 307–314. [38] S. R. Kheradpisheh, M. Ganjtabesh, S. J. Thorpe, T. Masquelier, STDP-based spiking deep convolutional neural networks for object recognition, Neural Networks 99 (2017) 56–67. [39] K. S. Burbank, Mirrored STDP implements autoencoder learning in a network of spiking neurons, PLoS Comput Biol 11 (12) (2015) e1004566. [40] C. Savin, P. Joshi, J. Triesch, Independent component analysis in spiking neurons, PLoS Comput Biol 6 (4) (2010) e1000757. [41] P. U. Diehl, M. Cook, Unsupervised learning of digit recognition using spike-timingdependent plasticity, Frontiers in computational neuroscience 9 (2015) 99. [42] A. Shrestha, K. Ahmed, Y. Wang, Q. Qiu, Stable spike-timing dependent plasticity rule for multilayer unsupervised and supervised learning, in: Neural Networks (IJCNN), 2017 International Joint Conference on, IEEE, 2017, pp. 1999–2006. [43] C. M. Bishop, Neural networks for pattern recognition, Oxford university press, 1995. [44] I. Goodfellow, Y. Bengio, A. Courville, Deep learning, MIT press, 2016. [45] S. G. Wysoski, L. Benuskova, N. Kasabov, Evolving spiking neural networks for audiovisual information processing, Neural Networks 23 (7) (2010) 819–835. [46] S. G. Wysoski, L. Benuskova, N. Kasabov, Fast and adaptive network of spiking neurons for multi-view visual pattern recognition, Neurocomputing 71 (13-15) (2008) 2563–2575. 21 [47] S. Schliebs, N. Kasabov, Evolving spiking neural network a survey, Evolving Systems 4 (2) (2013) 87–98. [48] N. Kasabov, K. Dhoble, N. Nuntalid, G. Indiveri, Dynamic evolving spiking neural networks for on-line spatio-and spectro-temporal pattern recognition, Neural Networks 41 (2013) 188–201. [49] S. Soltic, N. Kasabov, Knowledge extraction from evolving spiking neural networks with rank order population coding, International Journal of Neural Systems 20 (06) (2010) 437– 445. [50] S. Grossberg, Adaptive resonance theory: How a brain learns to consciously attend, learn, and recognize a changing world, Neural Networks 37 (2012) 1–47. [51] S. Thorpe, J. Gautrais, Rank order coding, Computational Neuroscience 113 (1998) 113– 119. [52] W. Maass, H. Markram, Synapses as dynamic memory buffers, Neural Networks 15 (2) (2002) 155–161. [53] A. Coates, A. Y. Ng, Learning feature representations with k-means, in: Neural networks: Tricks of the trade, Springer, 2012, pp. 561–580. [54] P. Földiák, Adaptive network for optimal linear feature extraction, in: Neural Networks (IJCNN), 1989 International Joint Conference on, Vol. 1, IEEE, 1989, pp. 401–405. [55] E. Oja, Simplified neuron model as a principal component analyzer, Journal of mathematical biology 15 (3) (1982) 267–273. [56] B. Hammer, T. Villmann, Generalized relevance learning vector quantization, Neural Networks 15 (8) (2002) 1059–1068. [57] P. Schneider, M. Biehl, B. Hammer, Distance learning in discriminative vector quantization, Neural computation 21 (10) (2009) 2942–2969. [58] J. Sjöström, W. Gerstner, Spike-timing dependent plasticity, Spike-timing dependent plasticity 35 (0) (2010) 0–0. [59] A. Tavanaei, A. S. Maida, Bio-inspired spiking convolutional neural network using layerwise sparse coding and STDP learning, arXiv preprint arXiv:1611.03000 (2016) 1–16. [60] E. T. Rolls, M. J. Tovee, Sparseness of the neuronal representation of stimuli in the primate temporal visual cortex, Journal of Neurophysiology 73 (2) (1995) 713–726. [61] P. Foldiak, D. Endres, Sparse coding, Scholarpedia 3 (1) (2008) 2984. 22 [62] Y. LeCun, C. Cortes, C. J. Burges, The MNIST database, URL http://yann. lecun. com/exdb/mnist. [63] C. M. Bishop, Pattern recognition and machine learning, Springer, 2006. [64] G. Hinton, A practical guide to training restricted Boltzmann machines, Momentum 9 (1) (2010) 926. [65] N. Le Roux, Y. Bengio, Representational power of restricted Boltzmann machines and deep belief networks, Neural computation 20 (6) (2008) 1631–1649. 23
9cs.NE
Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics arXiv:1612.07767v2 [cs.CV] 26 Oct 2017 Xin Li, Fuxin Li School of Electrical Engineering and Computer Science Oregon State University [email protected], [email protected] Abstract Δ𝐼 Giant Panda (99.32% confidence) = +0.03 Deep learning has greatly improved visual recognition in recent years. However, recent research has shown that there exist many adversarial examples that can negatively impact the performance of such an architecture. This paper focuses on detecting those adversarial examples by analyzing whether they come from the same distribution as the normal examples. Instead of directly training a deep neural network to detect adversarials, a much simpler approach was proposed based on statistics on outputs from convolutional layers. A cascade classifier was designed to efficiently detect adversarials. Furthermore, trained from one particular adversarial generating mechanism, the resulting classifier can successfully detect adversarials from a completely different mechanism as well. The resulting classifier is non-subdifferentiable, hence creates a difficulty for adversaries to attack by using the gradient of the classifier. After detecting adversarial examples, we show that many of them can be recovered by simply performing a small average filter on the image. Those findings should lead to more insights about the classification mechanisms in deep convolutional neural networks. 𝐼 Δ𝐼 +0.03 Shark (93.89% confidence) Goldfish (95.15% confidence) = Figure 1. An optimization algorithm finds adversarial examples which, with almost negligible perturbations to human eyes, completely distort the prediction result of a deep neural network [28]. Such algorithms have been found to be universal to different deep networks. This paper studies their properties and seeks a defense. tonomous driving, robotics, or any automatic identification (face, iris, speech, etc.). If the result of the network can be hacked at the will of a hacker, wrong authentications and other devastating effects would be unavoidable. Therefore, there are ample reasons to believe that it is important to identify whether an example comes from a normal or an adversarial distribution. A reliable procedure can prevent robots from behaving in undesirable manners because of the false perceptions it made about the environment. The understanding of whether an example belongs to the training distribution has deep roots in statistical machine learning. The i.i.d. assumption was commonly used in learning theory, so that the testing examples were assumed to be drawn independently from the same distribution of the training examples. This is because machine learning is only good at performing interpolation, where some training examples surround a testing example. Extrapolation is known to be difficult, since it is extremely difficult to estimate data labels or statistics if the data is extremely different from any known or learned observations. Many current approaches deal with adversarial examples by adding them back to the training set and re-train. However in their experiments, new adversarials can almost always be found from the re-trained classifier. This is because that the space of extrapolation is significantly larger than the area a machine learning algo- 1. Introduction Recent advances in deep learning have greatly improved the capability to recognize visual objects [13, 26, 7]. Stateof-the-art neural networks perform better than human on difficult, large-scale image classification tasks. However, an interesting discovery has been that those networks, albeit resistant to overfitting, would have completely failed if some of the pixels in the image were perturbed via an adversarial optimization algorithm [28, 4] . An image indistinguishable from the original for a human observer could lead to significantly different results from a deep network(Fig. 1). Those adversarial examples are dangerous if a deep network is utilized in any crucial real application, be it au1 rithm can interpolate, and the ways to find vulnerabilities of a deep learning system are almost endless. A more conservative approach is to refrain from making a prediction if the system does not feel comfortable about it. Such an approach seeks to build a wall to fence all testing examples in the extrapolation area out of the predictor, and only predict in the small interpolation area. Work such as [16] provides basic theoretical frameworks of classification with an abstain option. Although these concepts are well-known, the difficulties lie in the high-dimensional spaces that are routinely used in machine learning and especially deep learning. Is it even possible to define interpolation vs. extrapolation in a 4, 000dimensional or 40, 000-dimensional space? It looks like almost everything is extrapolation since the data is inherently sparse in such a high-dimensional space [9, 6], a phenomenon well-known as the curse of dimensionality. The enforcement of the i.i.d. assumption seems impossible in such a high-dimensional space, because the inverse problem of estimating the joint distribution requires an exponential number of examples to be solved efficiently. Some recent work on generative adversarial networks proposes using a deep network to train this discriminative classifier [3, 22], where a generative approach is required to generate those samples, but it is largely confined to unsupervised settings and may not be applicable for every domain convolutional networks (CNNs) have been applied to. In this work we propose a discriminative approach to identify adversarial examples, which trains on simple features and can approach good accuracy with limited training examples. The main difference between our approach and previous outlier detection/adversarial detection algorithms (e.g. [2]) is that their approaches usually treat deep learning as a black box and only works at the final output layer, while we believe that the learned filters in the intermediate layers efficiently reduce the dimensionality and are useful for detecting adversarial examples. We make a number of empirical visualizations that show how the adversarial examples change the prediction of a deep network. From those intuitions, we extract simple statistics from convolutional filter outputs of various layers in the CNN. A cascade classifier is proposed that utilizes features from many layers to discriminate between normal and adversarial examples. Experiments show that our features from convolutional filter output statistics can separate between normal and adversarial examples very well. Trained with one particular adversarial generation method, it is robust enough to generalize to adversarials produced from another generation approach [20] without any special adaptation or additional training. Those confidence estimates may improve the safety of applying these deep networks, and hopefully provide insights for further research on self-aware learning. As a simple extension, the results from visualizations of the features prompted us to perform an average filter on corrupted images, and found out that many correct predictions can be recovered from this simple filtering. 2. Deep Convolutional Neural Networks A deep convolutional neural network consists of many convolutional layers which are connected to spatially/temporally adjacent nodes in the next layer: Zm+1 = [T (W1 ∗ Zm ), T (W2 ∗ Zm ), . . . , T (Wk ∗ Zm )] (1) where Zm is the input features at layer m, W1 , . . . WK are filters that could be much smaller than the size of Zm (e.g. 3 × 3, 5 × 5, 7 × 7), ∗ is the convolution operator, and T is a nonlinear transformation function such as the rectified linear unit (ReLU) T (x) = max(0, x). Other commonly used layers in a CNN include max-pooling layers, or other normalization layers [13] such as batch normalization layers [10]. Most deep networks adopt similar principles while adding more structural complexity in the system such as more layers and smaller filters in each layer [26], multi-layered network within each layer [27], residual network [7], etc. A convolutional neural network makes sense in structured data because it naturally exploits the locality structure in data. In an image, pixels that are located close to each other are naturally more correlated than pixels that are far away [17]. The same holds for temporal data (video, speech) where objects (frames, utterances) that are temporally close can be assumed to be more correlated. 3. Understanding the Trained Deep Classifier Under Adversarial Optimization 3.1. Adversarial Optimization The famous result that deep networks can be broken easily [28] is an important motivation of this work. The idea is to start from an existing example (image) and optimize to obtain an example that will be classified to another category while being close to the original example. Namely, the following optimization problem is solved: min ckrk1 + L(fθ (x0 + r, y)) r s.t. x0 + r ∈ [0, 1]d (2) where x0 is a known example and y is an arbitrary category label, d is the input dimensionality. c is a parameter that can be tuned for trading off between proximity to the original example x0 and the classification loss on the other category y. It has been shown, to the astound of many, that one can choose an r with very small norm while completely change the output of the algorithm (e.g. Fig. 1), this can even be done universally for almost all networks, datasets and categories [28, 4]. Besides, adversarials trained from one network may even fool a related one trained from the same dataset [18]. This has led many people to question whether deep networks are really learning the “proper” rules for classifying those images. 3.2. Adversarial Behavior In order to gain a deeper understanding of the behavior of a deep network and illustrate the difference between adversarial and normal example distributions, we utilize spectral analysis. As a starting point, we perform principal component analysis (PCA) [11] at the 14-th layer of a VGG network trained on the ImageNet dataset (the first fullyconnected layer). The rationale behind using PCA is that each deep learning layer is a nonlinear activation function on a linear transformation, hence a large part of the learning process lies within the linear transformation, for which PCA is a standard tool to analyze. A linear PCA is performed on the entire collection of 50, 000 images from the ImageNet validation set, as well as 4, 000 adversarials collected using the approach in (2), starting from random images in the collection. The result shows very interesting findings (Fig. 2) and sheds more light on the internal mechanics of those adversarial examples. In Fig. 2(a), we show the PCA projection onto the first two eigenvectors. This cannot separate normal and adversarial examples, as one could possibly imagine. The adversarial examples seem to exactly belong to the same distribution as normal ones. However, it does seem that the adversarial examples reside mostly in the center while the normal examples occupy a bigger chunk of space. Interestingly, as we move to the tail of the PCA projection space, the picture starts to change significantly. In Fig. 2(b), we can see that there are a significant amount of adversarial examples that has extremely large values w.r.t. to the normal examples in the tail of the distribution. We chose to print the projection on the 3, 547-th and 3, 844-th eigenvector, but similar distributions can be found all over the tail. As one can see, at such a far end on the tail, the projections of normal examples are very similar to random samples under a Gaussian distribution. An explanation for that could be that under these “uninformative” directions, most of the weighted features are nearly independent w.r.t. each other, hence the distribution of their sum is similar to Gaussian, according to the central limit theorem1 . However, although normal examples behave similarly to a Gaussian, some adversarial examples are having projections with a deviation as large as 5 or 10 times the standard deviation, which are extremely unlikely to occur under a Gaussian distribution. 1 Note this is without a ReLU transformation. ReLU would destroy the negative part of the data distribution so that it no longer looks like a Gaussian. However, some tail effects can be observed even in the distribution after ReLU. Fig. 2(c) and Fig. 2(d) show that there are two distinct phenomena: • The extremal values and standard deviations on the projections onto the first 500 − 700 eigenvectors are decidedly lower in adversarial examples than in normal ones. • The extremal values and standard deviations on the projections onto the last 1, 000 − 1, 500 eigenvectors are decidedly higher in the adversarial examples than the normal ones. It is interesting to reflect about the causes and consequences of those properties. One deciding property is that there is a strong regularization effect in adversarial examples on almost all the informative directions. Hence, the predictions in adversarial examples are lower than those in normal examples, rather than the confidence values may have indicated (Fig. 1). In Fig. 3, we show the number of categories with a prediction higher than a threshold, before the final softmax transformation exp(fi (x)) pi (x) = P i exp(fi (x)) (3) that converts raw predictions fi (x) into probabilities. The result shows that normal examples have on average one category with a raw prediction value more than 20, however adversarial examples have only 0.01 category with raw predictions more than 20. The reason that those adversarial examples appear more confident after softmax is because that the predictions on all the other categories are regularized even more. Hence the normalization component of softmax has decided that the single prediction, although much less strong, should be assigned a probability of more than 90%. We note that this issue was also pointed out by [2] in a different manner and they proposed a solution in the OpenMax classifier, which we compare against in the experiments. But besides that, it seems that such extremal and standard deviation statistics are evident features that could help discriminating normal and adversarial examples. Unfortunately, they only occur as a statistic from a large sample, as any single point in Fig. 2(a) looks similar to a single point in the normal distribution. We have tried to utilize the tail distributions (Fig. 2(b)) to create a classifier which easily achieved more than 99% accuracy separating adversarials from normals, however we subsequently found out that since the tail almost do not contribute to the classification, knowing this defense, the adversarial example can deliberately remove their footprints on the tail distributions. This leads us to think about an approach that would turn a single image into a distribution, so that we can use statistics as detectors for adversarial examples. An image is a distribution of pixels. Especially, the output of each filter from each convolutional layer is an image which could be 1 0 -1 -2 8 4 2 0 -2 -3 -4 -4 -6 -6 -4 -2 0 10 6 2 8 6 4 -10 -5 Eigenvector Number 1 0 5 Eigenvector Number 3547 (a) 2 0 500 1000 1500 2000 2500 3000 3500 4000 4500 Eigenvector Number (b) Normalized Standard Deviation 1.6 Normal examples Adversarial Examples Extremal Value 2 Eigenvector Number vs. Extremal Value 12 Normal examples Adversarial Examples 10 Eigenvector Number 3984 Eigenvector Number 2 Tail Distribution 12 Normal examples Adversarial Examples 3 (c) Normalized Standard Deviation Head Distribution 4 Normal examples Adversarial Examples 1.4 1.2 1 0.8 0.6 0 500 1000 1500 2000 2500 3000 3500 4000 4500 Eigenvector Number (d) Figure 2. Blue indicates normal examples and red/orange indicate adversarial examples. Projections are normalized by dividing the standard deviation of all normal examples projected on the corresponding dimension. (a) The projection of the data at layer 14 onto the 2 most prominent directions; Adversarial example cannot be identified from normal ones. (b) Projection of the same data to the 3, 547-th and 3, 844-th PCA projections, some adversarial examples are having significantly higher deviation to the mean; (c) The absolute normalized extremal value in the projection to each eigenvector; (d) The average normalized standard deviation of normal and adversarial examples on each projection. Standard deviations of normal examples stand at 1 because of the normalization. treated as a distribution where the samples are the pixels. Therefore, in the following section we aim to build a classifier based on collecting statistics from such distributions. 4. Identifying Adversarial Examples 4.1. Feature Collection Suppose the output at a convolutional layer m is an W × H × K tensor, where W and H represent the width and height of the image at that stage (smaller than original after max-pooling), and K represents the number of convolutional filters. Such a tensor can be considered as a K-channel image where each pixel has a K-dimensional feature. We consider the feature on every pixel to be a random vector drawn from the distribution Dm of convolutional pixel outputs, a K-dimensional distribution. Average Number of Categories per Example with Prediction Above Threshold Normal examples Adversarial Examples 102 Average Number of Categories Above Threshold Average Number of Categories Average Number of Categories per Example with Prediction Larger than Threshold 100 10 -2 10-4 0 10 20 30 40 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 50 0.1 Network Prediction Threshold before SoftMax (a) Normal examples Adversarial Examples 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 Network Prediction Threshold After SoftMax (b) Figure 3. Average number of categories per example with predictions higher than a threshold. (a) Before softmax; (b) After softmax. As one can see, in normal examples, there are on average about 1 category with a prediction score of more than 20 (before softmax), while with adversarial ones, only 1% examples have a category with a prediction score more than 20. However, since prediction values on all categories have dropped, after softmax adversarial examples obtain much higher likelihood on one category. on each of the K-dimensional features. Normalized PCA coefficients are collected via Algorithm 1. Extremal and percentile statistics are straightforward to understand. The features we collect are non-subdifferentiable, hence essentially preventing adversaries to use gradient-based attacks to counter the classifier. Although we are interested in a generative adversarial network-type adversary which would learn to avoid our detector, such adversaries would have to resort to derivative-free optimization methods, which currently do not scale to the size of a realistic image. The best derivative-free approach we have tried scales up to several hundreds of variables. The genetic algorithm in [20] scales better, but as we will soon show, their lowlevel feature statistics are so different from natural images, making them very easy to be detected, even without training on any data from their adversarial generation algorithm. Algorithm 1 PCA Statistics Extraction 1: INPUT: Image I, layer m. 2: For all normal images in a training set, compute their CNN filter output of layer m to form an example matrix Zm . 3: Compute the mean e and PCA projection matrix W of Zm . 4: Compute the standard deviation s on each dimension in the PCA projection W> (Zm − e1> ). 5: For each image I, project its CNN filter output of layer m ZmI using PCA: zmI = W> (ZmI − e1> ), and normalize them by dividing the standard deviation s on each respective dimension. 1 6: Collect the statistic for each image as xI = n kzmI k1 , where L1 norm is the vector L1 norm. The resulting statistic is K-dimensional. The list of statistics we collect is: • Normalized PCA coefficients 4.2. Classifier Cascade • Minimal and Maximal values [29] proposed a famous strategy for face detection by using a cascaded boosting classifier composed by a sequence • 25-th, 50-th and 75-th percentile values of base classifiers. A cascade classifier is ideal when it is easy to identify many of the examples from a category but some important cases can be difficult. In Fig. 4, SC N represents the classifier at each stage. X is the input of the cascade classifier. The negatives in a cascade classifier from each stage will be outputted directly, while the positives will go to the next stage. In our case, the normal category is much easier to detect than the adversarial category (see e.g. Fig. 6). In our initial experiments with VGGNet, we found that more than 80% of normal examples can be determined from the first convolutional layer with 100% precision. Therefore, we constructed a cascade classifier based on convolutional layers: the first stage works with features collected from the outputs of the first convolutional layer, the second with the second layer, etc. (Fig. 4). The base classifiers will not solely consider statistics from their own stage, instead, after one stage of training, the remaining positive examples will be concatenated to the corresponding features on the next stage. Figure 4. A cascade classifier is defined on each of the convolutional layers in a convolutional network (SC i represents the i-th convolutional layer) The operations that are represented by Fig. 4 can also be summarized as Algorithm 2. Algorithm 2 Training Process of a cascade of Classifier 1: Npool ← Normal example pool, Ptrain ← Training set of Np perturbed examples, L ← Number Of convolutional layers 2: while current layer ≤ L Or Npool 6= ∅ do 3: Draw Np sized subset Pnormal from Npool 4: T ← Pnormal ∪ Ptrain 5: Train SVM on T 6: Predict SVM on Npool , eliminate those predicted as normal above a threshold (described in text) 7: end while The overall false positive rate ofQa K stage cascade clasK sifier can be represented as: F = i=1 fi , where fi is the false positive rate at each layer. And similarly the true QKpositive rate can be represented in the same form: T = i=1 ti where ti is the true positive rate at each stage. In order to maximize recall, we maintain a high true positive rate and select a classification threshold which corresponds to a high true positive rate (97% in AlexNet and 98% in VGG). 5. Related Work Szegedy et al. [28] proposes the adversarial optimization formulation in eq. (2). [4] proposes an explanation of the adversarial mechanism, and proposed a simpler adversarial optimization mechanism that only corrupts based on the signs of gradient of the network. The fact that such examples can be generated so easily with the gradient sign method shows that adversarial examples come from attacking the magnifying effect coming from the linearities in the network. [20] proposes another mechanism to generate adversarials using evolutionary optimization. The result of these do not resemble natural images but still can be classified by deep networks with high confidence(Fig. 5). [19] proposes another efficient approach. [23] proposes an approach to generate adversarials that match the convolutional filter outputs as well as perturbing the data. [25, 8] propose approaches to sample adversaries or minimax optimization for making learning more robust. While most of the work are done on standard benchmarks such as MNIST, CIFAR and ImageNet, [14] is an interesting work on projecting the adversaries in physical world. Recently, there have been a lot of focus on training adversarial generation networks to create Generative Adversarial Networks (GANs) [3, 22, 32, 24]. These networks play a two-player game where a generator network aims to generate adversarials that will not be correctly classified by another discriminator network, and the goal is to generate images more and more similar to natural images. It has been shown that these networks generate images that resemble natural images. However, this generative approach is different from our goal, where we aim to create discriminative networks that discriminates from images that are already indistinguishable from natural images (e.g. Fig.1). Mechanisms for detecting and countering adversarial examples have also been proposed [5, 21]. [18] proposes to use the foveation mechanism to alleviate adversarial examples when it is already known to be adversarial, but did not attempt to detect adversarials. The open-set deep networks proposed by [2] seek to alleviate concerns from a soft-max classification by creating an abstain option. The universum classifier [31] is similar but with more theoretical arguments. Self-aware learning (classification with an abstain option) had been proposed in e.g. [12, 16]. It is relevant to robust learning (e.g. [15]), however robust learning usually seek to directly optimize the minimax loss under adversarial conditions, instead of outputting an abstain option. [1, 30] also focuses on classification with an abstain option. 6. Experiments Our algorithm is tested on 2 approaches to generate adversaries. The main one is data generated using the L-BFGS were much easier to distinguish, even though our classifier was trained only on L-BFGS adversarials instead of EA ones (Table 3). We only need the first three convolutional layers to reach an overall 97.34% classification accuracy. We believe the reason is that our features capture natural image statistics, and because EA-adversarials look so unnatural, their statistics are vastly different than natural images (see Sec. 6.3 for more discussions). Table 1. Classification Result with AlexNet for Normal vs. LBFGS-adversarials Figure 5. Evolved Adversarial Images Unrecognizable to Humans algorithm by [28]. We generated 4, 000 adversarials from a random subset of the ILSVRC-2012 validation set (total of 50, 000 images). In order to test the out-of-sample generalization capability, we included another dataset, which includes 5, 000 EA-adversarial images generated using the algorithm in [20]. These datasets are tested with 2 different network structures, VGG-16 [26] and AlexNet [13]. All input images had been normalized and re-shaped into 224 × 224 for VGG-16 model and 227 × 227 for AlexNet. The MatConvNet toolbox is used for the deep networks. Features are extracted from the statistics of interest, mentioned in section 4.1, in the lower 9 convolutional layers from the VGG-16 network, and in all 5 convolutional layers from AlexNet. All the classifiers were trained with a subset of 2, 000 L-BFGS adversarials and a randomly selected subset of 45, 000 normal images in the ILSVRC-2012 dataset. Testing was done on a random held-out dataset with the other 5, 000 normal images and 2, 000 L-BFGS adversarials for the L-BFGS experiments, and on a randomly selected 5, 000 normal images and 5, 000 EA-adversarials for the EA experiments. The training and testing sets do not overlap in any means: for all the testing LBFGS adversarials, the corresponding normal images were not seen in the training set. EA experiments are only conducted with AlexNet since we found out that EA-adversarials did not succeed fooling the VGG-16 network. We have also tried some other fast adversarial generation approaches such as [4], but they generally do not generate adversarials that fool classifiers as completely (with more than 90% confidence) or as universally (on 100% of the images) as the L-BFGS algorithm. Additional experiment results using DeepFool and on ResNet can be found in the supplementary material. 6.1. Single-Layer Results The first experiments we did were by extracting statistics on each single convolutional layer output, instead of using the cascade classifier. From Tables 1 and 2, one can see that the statistics from a single layer have some discriminative power to distinguish normal examples from adversarials, but are not extremely effective. However, EA-adversarials Network Layer Accuracy Network Layer Accuracy 2nd 57.5 ± 0.7 5th 74.9 ± 0.9 3rd 67.3 ± 0.7 6th 78.95 ± 0.6 4th 70.9 ± 0.6 Table 2. Classification Result with VGG-16 for Normal vs. LBFGS-Adersarials Network Layer Accuracy Network Layer Accuracy Network Layer Accuracy 2nd 72.1 ± 0.7 5th 81.4 ± 0.9 8th 74.2 ± 0.7 3rd 84.1 ± 0.7 6th 74.3 ± 0.6 9th 71.2 ± 0.7 4th 80.3 ± 0.6 7th 73.9 ± 0.6 10th 74.3 ± 0.8 Table 3. Classification Result for Normal vs. EA-Adversarials Layer Accuracy 2nd 93.45 ± 0.69 3rd 98.3 ± 0.73 4th 97.9 ± 0.57 6.2. Experiment for LBFGS-Adversarials Detection Next we test the cascade classifier on both AlexNet and VGG-16. The parameter C is set to 0.005. On AlexNet, the average accuracy of the cascade classifier reaches 83.4% over 20 random trials, and the AUC (area-under-curve) metric is 90.7%. We compared against the recently published OpenMax method [2]. To learn the Weibull distribution required for OpenMax, the EVT was applied on the same training set as the algorithm. Figure 6(a) shows the results, where we were able to outperform OpenMax by over 9% in area-under-curve (AUC) and 11% in terms of accuracy. In VGG-16, the results were even better. The accuracy of the classifier was on average 90.665% over 20 random trials. Fig.6(b) shows the ROC curve. We believe the fact that VGG has a lot more layers than AlexNet helps setting more constraints on the layer statistics, and is subsequently helpful for detecting adversarial examples. Finally, the cascade classifier was tested on EAadversarials. We obtained more than 96% accuracy with 0 false positive rate, with a final accuracy of 97.3% and AUC of 98.2% (Fig.6(c)). In other words, our algorithm is rarely fooled by EA-adversarials, even without training on them. (a) (b) (c) Figure 6. (a) Comparison Between OpenMax detection Methods and Cascade Classifier: The blue curve represents the performace of OpenMax Method, and green curve represents the perfornace for Cascade Classifier.(b) Overall ROC Performance Curve of Cascade Classifier Trained on VGG-16 Network. (c) Overall ROC of data generated from EA-adversarials dataset on AlexNet. 6.3. Visualization of Statistics Our experiment results show that EA-adversarials are easy to detect with our detector. To gain more insight into this result, we made a few comparisons between the statistics of interest extracted from normal images, LBFGSadversarials and EA-adversarials. We visualized the average of the statistics that are used for the detection task from the first layer of the AlexNet on all its dimensions. As can be seen in Fig.7(a), the difference on the PCA projection statistics on extracted from EAadversarials and that of the normal images is very dramatic. Meanwhile, compared to the EA-adversarials, the statistics from LBFGS-adversarial have much less difference from the normal data and the difference does not change very much across different dimensions. From Fig. 7(b), one can see that LBFGS-adversarials have smaller extremal values than normal images. This might imply that the LBFGS optimization worked to diminish strong signals from the original image by introducing small pixel perturbations, and that helped our classifiers separating them from normal images. From Fig. 7(c), we see the EA-adversarials evidently differ from normal images. Those results illustrate why EA-adversarials are easier to detect. We suspect it would be easy to reach 100% accuracy, had we actually trained on some EA-adversarials. The capability to generalize to EA-adversarials without training on them showed the general capability of our cascade classifiers to capture natural image statistics and distinguish natural images from unnatural ones. 7. Discussions 7.1. Self-Aware Learning with an Abstain Option The framework of self-aware learning [16, 2, 31] considers the case where the learning algorithm has an abstain option of saying “I don’t know”, instead of always making an actual prediction. We define a framework that is slightly different than [16], avoiding the requirement in some frameworks of never making a mistake. We assume that the training input is drawn i.i.d. from a distribution P (x, y), where x is the input and y is the output. Assume that the testing input is drawn from a mixture distribution between P (x, y) and Q(x, y): Pm = ΩP (x, y) + (1 − Ω)Q(x, y) (4) , where Ω ∈ {0, 1} is an unknown mixture weight, and Q(x, y) is an adversarial distribution. Assume that we have a classifier that includes a function f (x), and a boolean strategy ai between predict and abstain that can be chosen for each individual xi . Assume that the expected error from our classifier on the adversarial distribution is eq (which could be assumed, if no other prior is present, as the random guessing error of C−1 C for a C-class classification problem). Further assume that abstaining always incur a fixed cost ea . As long as ea < eq , abstaining would be better than predicting on the example drawn from the adversarial distribution, however, ea should be set sufficiently large so that the classifier would still make predictions when confident, instead of abstaining everything. For each testing input, the testing of the self-aware classifier is then trying to optimize mina EPm La (x, y) where  P (yi 6= f (xi )), if ai = predict,     (xi , yi ) ∼ P (x, y)  eq if ai = predict La (xi , yi ) =   , (xi , yi ) ∼ Q(x, y)    ea if ai = abstain (5) hence the classifier needs to select between making a prediction using its function f (x) and risk paying eq versus abstaining. It is easy to derive the optimal strategy: ai = predict, if P (Ω = 1|xi )P (yi 6= f (xi )) (6) +P (Ω = 0|xi )eq < ea ai = abstain, otherwise (7) (a) (b) (c) Figure 7. (a) PCA Projection Comparison; (b) Maximum Feature Map Extremal Value Comparison; (c) Median Value Comparison Our approach can be seen as estimating P (Ω = 1|xi ) in this framework. Experiments about the effect of such selfaware learning is shown in the supplementary material. We eagerly hope to apply it in realistic applications in future work. 7.2. Image Recovery Insights from [4] indicate that the adversarial mechanism is very specifically attacking vulnerable gradients starting from the first convolutional layer. Insights from the previous experiments also suggest that LBFGS-adversarials work to diminish filter responses from the first convolutional layer. Therefore a natural idea would be to destroy the adversarial effects in the first convolutional layer to try to recover the original image. We tried a very simple approach: applying a small (e.g. 3 × 3) average filter on the adversarial image before using the CNN to classify it. The positive and negative adverse gradients will average out in this approach, and make the masked activations from the normal images more prominent. In Table 4 we illustrate such recovery results: after using a 3 × 3 average filter on identified adversarial examples, the classification accuracy improved from almost 0% to 73.0%, showcasing the effectiveness of this simple average filter. Table 4. Recovery Results. Simply using a 3 × 3 average filter we can recover a large proportion of adversarial examples after detecting them using the algorithm described previously. More complex cancellation approaches such as foveation in [18] that utilizes cropping can achieve better results. Approach Original Image (Non-corrupted) 3 × 3 Average Filter 5 × 5 Average Filter Foveation (Object Crop MP) [18] Top-5 Accuracy (Recovered Images) 86.5% 73.0% 68.0% 82.6% Those results show that we can both detect and recover from adversarial examples with high accuracy. But the main reason we performed this (overly simplistic) experiment is to show how simple it might be to cancel out some adversarial perturbations. Importantly, this result indicates that current deep convolutional networks are too locally focused: these are corruptions that can be cancelled out by a simple 3 × 3 average filter, however they can adversely impact the entire result of the deep network. For human with a large receptive field, they will not even care about what happens within a 3 × 3 area. Therefore, we believe that future deep learning approaches should focus on enlarging the receptive field in order to reduce the chance of being fooled by adversarial examples. Another potential direction is to research classification approaches that do not require a softmax-type normalization, in order to avoid regularizing attacks such as the ones used in the adversarial optimization in (2). 8. Conclusion This paper proposes an approach that detects adversarial examples using simple statistics on convolutional layer outputs. A cascade classifier was designed based on simple statistics on filter outputs from each layer. And it was capable of detecting more than 85% of the adversarial examples. Experiments showed that our cascade classifier significantly outperforms state-of-the-art on detecting adversarial examples. Experiment also showed transfer learning capabilities of our classifier, since the classifier we trained with LBFGS adversarials are capable of detecting EA-adversarials as well. Insights drawn from these experiments lead us to perform simple 3 × 3 average filter to corrupted images, which successfully recovered most of them. In the future, we would like to explore GAN-type generative adversarial networks from the current results, with multiple rounds of adversarial detection and counter-detection. Acknowledgements This paper was supported by Future of Life grants 2015143880 and 2016-158701. References [1] A. Balsubramani. Learning to abstain from binary prediction. arXiv preprint arXiv:1602.08151, 2016. [2] A. Bendale and T. E. Boult. Towards open set deep networks. In IEEE Conference on Computer Vision and Pattern Recognition, 2016. [3] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. Generative adversarial nets. In Advances in Neural Information Processing Systems, pages 2672–2680, 2014. [4] I. J. Goodfellow, J. Shlens, and C. Szegedy. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572, 2014. [5] S. Gu and L. Rigazio. Towards deep neural network architectures robust to adversarial examples. arXiv preprint arXiv:1412.5068, 2014. [6] T. Hastie, R. Tibshirani, and J. Friedman. The Elements of Statistical Learning. Springer-Verlag, New York, 2001. [7] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. In IEEE Conference on Computer Vision and Pattern Recognition, 2016. [8] R. Huang, B. Xu, D. Schuurmans, and C. Szepesvári. Learning with a strong adversary. In International Conference on Learning Representations, 2016. [9] P. Indyk and R. Motwani. Approximate nearest neighbors: towards removing the curse of dimensionality. In Proceedings of the thirtieth annual ACM symposium on Theory of computing, pages 604–613, 1998. [10] S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167, 2015. [11] I. Jolliffe. Principle Component Analysis. Springer-Verlag, 1986. [12] R. Kleinberg, A. Niculescu-Mizil, and Y. Sharma. Regret bounds for sleeping experts and bandits. Machine learning, 80(2-3):245–272, 2010. [13] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems, pages 1097–1105, 2012. [14] A. Kurakin, I. Goodfellow, and S. Bengio. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533, 2016. [15] G. R. Lanckriet, L. E. Ghaoui, C. Bhattacharyya, and M. I. Jordan. A robust minimax approach to classification. Journal of Machine Learning Research, 3:555–582, 2003. [16] L. Li, M. L. Littman, T. J. Walsh, and A. L. Strehl. Knows what it knows: a framework for self-aware learning. Machine learning, 82(3):399–443, 2011. [17] X. Li, F. Li, X. Fern, and R. Raich. Filter shaping for convolutional networks. In International Conference on Learning Representations, 2017. [18] Y. Luo, X. Boix, G. Roig, T. A. Poggio, and Q. Zhao. Foveation-based mechanisms alleviate adversarial examples. arXiv preprint arXiv:1511.06292v3, 2016. [19] S. Moosavi-Dezfooli, A. Fawzi, and P. Frossard. Deepfool: a simple and accurate method to fool deep neural networks. CoRR, abs/1511.04599, 2015. [20] A. Nguyen, J. Yosinski, and J. Clune. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. In IEEE Conference on Computer Vision and Pattern Recognition, 2015. [21] N. Papernot, P. McDaniel, X. Wu, S. Jha, and A. Swami. Distillation as a defense to adversarial perturbations against deep neural networks. arXiv preprint arXiv:1511.04508, 2015. [22] A. Radford, L. Metz, and S. Chintala. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434, 2015. [23] S. Sabour, Y. Cao, F. Faghri, and D. J. Fleet. Adversarial manipulation of deep representations. In International Conference on Learning Representations, 2016. [24] T. Salimans, I. Goodfellow, W. Zaremba, V. Cheung, A. Radford, and X. Chen. Improved techniques for training gans. arXiv preprint arXiv:1606.03498, 2016. [25] U. Shaham, Y. Yamada, and S. Negahban. Understanding adversarial training: Increasing local stability of neural nets through robust optimization. arXiv preprint arXiv:1511.05432, 2015. [26] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014. [27] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich. Going deeper with convolutions. arXiv:1409.4842, 2014. [28] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199, 2013. [29] P. Viola and M. J. Jones. Robust real-time face detection. International journal of computer vision, 57(2):137–154, 2004. [30] Y. Wiener and R. El-Yaniv. Agnostic selective classification. In Advances in Neural Information Processing Systems, pages 1665–1673, 2011. [31] X. Zhang and Y. LeCun. Universum prescription: Regularization using unlabeled data. In AAAI Conference on Artificial Intelligence, 2017. [32] J. Zhao, M. Mathieu, and Y. LeCun. Energy-based generative adversarial network. arXiv preprint arXiv:1609.03126, 2016. Supplementary Material 1. Results on DeepFool For this experiment we used 5000 adversarial images generated with the DeepFool algorithm. We collected a training set of images using the adversarials, with an equal number of real images drawn from the ILSVRC2012 validation set. For the Deep- Fool adversarials we used the implementation given in the Foolbox algorithm library. Given this data, we chose to use the ResNet 50 architecture as the backbone CNN for our experiments. Because we use ImageNet data, we preprocessed our training set accordingly: all images were reshaped to 224x224x3, the channels were modified to BGR ordering, and the channel-wise mean was subtracted from each sample. We then performed a forward pass as usual on all images, performing the classifier cascade at each layer. Given the output of each convolutional layer, we extracted features that would characterize images as being either from a real or adversarial distribution. For each output we extracted PCA coefficients, extremal values, and values within the 25th, 50th and 75th percentile to form a new training sample. We then used an SVM to learn the real statistics from the adversarials. The real examples were given a ground truth label of 1, and the adversarials were given a label of 0. We performed a parameter search over kernel type and C value. In all our experiments a C of 0.005 and a linear kernel performed the best. We then tested on 2000 real images and 2000 DeepFool adversarials. In our experiments with ResNet, we only performed the cascade for the first three layers before we found nearly all of the adversarial images. The result can be seen in Fig. 1. The algorithm maintained more than 90% AUC, showing that DeepFool did not fundamentally change the type of adversarials. 2. Results on Self-Aware Learning We implemented self aware learning using ResNet 50, the goal being to use the softmax probabilities to learn parameters that would cause the network to more intelligently classify inputs. The network should classify an image if it was sure the image was real, or abstain if either the network was not sufficiently confident, or if the image was adversarial, as described in Sec. 7.1. To test the presented algorithm, we use 2, 000 real images drawn from ILSVRC2012 validation set, and 2, 000 adversarial images from the testing set of the previous experiment, generated using the DeepFool algorithm. We tested the self aware learning algorithm with a high eq = 10. This worked well enough that the network chose to abstain or classify, rather than incur a high penalty for guessing incorrectly. We observed that for each testing image, our estimation of the source distribution resulted in ea between 2 and 8. We then varied ea between these values to see if there was a threshold at which we could abstain from all adversarials, retaining predictions for only real examples. We were also interested in thresholds that maximized the true positive rate (prediction of real examples) while abstaining from as many adversarials as possible. We found the lower thresholds resulted in the abstaining from predicting on all adversarials, but it also abstained from many (but not all) real examples. Higher thresholds resulted in many more real predictions retained, but some also some adversarials made it through. High thresholds would finally result in the network not abstaining at all. The results can be seen in Fig. 2. It can be seen that besides abstaining adversarial examples, the system also abstains from predicting on some normal examples that the classifier is not confident on. Hence, with a high abstain ratio the prediction accuracy on normal examples is also higher. 3. Images Classified Correctly and Incorrectly In this section we show some images classified correctly and incorrectly from the algorithm. Unfortunately we are not quite able to observe any particular visible trends, maybe due to the subtlety of adversarial images. Figure 1. ROC Curve for Detecting DeepFool adversarials in ResNet-50, the algorithm maintained more than 90% in AUC Figure 2. Self-aware learning results. In a mixture of half real and half adversarial examples, the classification accuracy of discarding nothing falls a little under 50%, with more examples abstained, the accuracy improves significantly. The accuracy of retained normal examples (blue curve) also improves when more examples are abstained, as the abstained examples also include normal examples that are not predicted confidently. (a) (b) (c) (d) Figure 3. Some of Misclassification on L-BFGS images by Our Classifier. (a) and (b) are from normal dataset. (c) and (d) are from LBFGS-Adversarial dataset, which is misclassified to category n02408429(water buffalo) and n01518878(ostrich, Struthio camelus). (a) (b) (c) (d) Figure 4. Some of Correctly Classified on L-BFGS images by Our Classifier. (a) and (b) are from normal dataset. (c) and (d) are from LBFGS-Adversarial dataset, which is misclassified to category n04209133(shower cap) and n02328150(Angora). (a) (b) (c) (d) Figure 5. Some of Misclassfied EA images by Our Classifier. From left to right, they are misclssified to category n03220513 (dome), n01749939 (green mamba), n04118776 (rule, ruler) and n03935335 piggy (bank, penny bank) Figure 6. Some of Correctly Classified EA images by Our Classifier. From left to right they are misclassified to n06874185 (traffic light, traffic signal, stoplight), n03443371 (goblet), n04522168 (vase) and n03742115 (medicine chest, medicine cabinet) (a) (b) (c) (d) Figure 7. Images Misclassified by OpenSet Method but Correctly Classified by Our Classifier. (c) and (d) are from LBFGS-Adversarial dataset, which is misclassified to category n02133161(American black bear) and n02328150(Agona).
1cs.CV
Learning One-hidden-layer Neural Networks with Landscape Design Rong Ge Jason D. Lee Tengyu Ma arXiv:1711.00501v2 [cs.LG] 3 Nov 2017 November 6, 2017 Abstract We consider the problem of learning a one-hidden-layer neural network: we assume the input x ∈ Rd is from Gaussian distribution and the label y = a⊤ σ(Bx) + ξ, where a is a nonnegative vector in Rm with m ≤ d, B ∈ Rm×d is a full-rank weight matrix, and ξ is a noise vector. We first give an analytic formula for the population risk of the standard squared loss and demonstrate that it implicitly attempts to decompose a sequence of low-rank tensors simultaneously. Inspired by the formula, we design a non-convex objective function G(·) whose landscape is guaranteed to have the following properties: 1. All local minima of G are also global minima. 2. All global minima of G correspond to the ground truth parameters. 3. The value and gradient of G can be estimated using samples. With these properties, stochastic gradient descent on G provably converges to the global minimum and learn the ground-truth parameters. We also prove finite sample complexity result and validate the results by simulations. 1 Introduction Scalable optimization has been playing crucial roles in the success of deep learning, which has immense applications in artificial intelligence. Remarkably, optimization issues are often addressed through designing new models that make the resulting training objective functions easier to be optimized. For example, over-parameterization [LSSS14], batch-normalization [IS15], and residual networks [HZRS16a, HZRS16b] are often considered as ways to improve the optimization landscape of the resulting objective functions. How do we design models and objective functions that allow efficient optimization with guarantees? Towards understanding this question in a principled way, this paper studies learning neural networks with one hidden layer. Roughly speaking, we will show that when the input is from Gaussian distribution and under certain simplifying assumptions on the weights, we can design an objective function G(·), such that [a] all local minima of G(·) are global minima [b] all the global minima are the desired solutions, namely, the ground-truth parameters (up to permutation and some fixed transformation). We note that designing such objective functions is challenging because 1) the natural ℓ2 loss objective does have bad local minimum, and 2) due to the permutation invariance1 , the objective 1 Permuting the rows of B ⋆ and the coordinates of a⋆ correspondingly preserves the functionality of the network. 1 function inherently has to contain an exponential number of isolated local minima. 1.1 Setup and known issues with proper learning We aim to learn a neural network with a one-hidden-layer using a non-convex objective function. We assume input x comes from Gaussian distribution and the label y comes from the model y = a⋆ ⊤ σ(B ⋆ x) + ξ (1.1) where a⋆ ∈ Rd , B ⋆ ∼ Rm×d are the ground-truth parameters, σ(·) is a element-wise non-linear function, and ξ is a noise vector with zero mean. Here we can without loss of generality assume x comes from spherical Gaussian distribution N (0, Idd×d ). 2 For technical reasons, we will further assume m ≤ d and that a⋆ has non-negative entries. The most natural learning objective is perhaps the ℓ2 loss function, given the additive noise. Concretely, we can parameterize with training parameters a ∈ Rd , B ∼ Rm×d of the same dimension as a⋆ and B ⋆ correspondingly, ŷ = a⊤ σ(Bx) , (1.2) and then use stochastic gradient descent to optimize the ℓ2 loss function. When we have enough training examples, we are effectively minimizing the following population risk with stochastic updates,   f (a, B) = E kŷ − yk2 . (1.3) However, empirically stochastic gradient descent cannot converge to the ground-truth parameters in the synthetic setting above when σ(x) = ReLU(x) = max{x, 0}, even if we have access to an infinite number of samples, and B ⋆ is a orthogonal matrix. Such empirical results have been reported in [LSSS14] previously, and we also provide our version in Figure 1 of Section 6. This is consistent with observations and theory that over-parameterization is crucial for training neural networks successfully [LSSS14, HMR16, SC16]. These empirical findings suggest that the population risk f (a, B) has spurious local minima with inferior error compared to that of the global minimum. This phenomenon occurs even if we assume we know a⋆ or a⋆ = 1 is merely just the all one’s vector. Empirically, such landscape issues seem to be alleviated by over-parameterization. By contrast, our method described in the next section does not require over-parameterization and might be suitable for applications that demand the recovery of the true parameters. 1.2 Our contributions Towards learning with the same number of training parameters as the ground-truth model, we first study the landscape of the population risk f (·) and give an analytic formula for it — as an explicit function of the ground-truth parameter and training parameter with the randomness of the data being marginalized out. The formula in equation (2.3) shows that f (·) is implicitly attempting to solve simultaneously a finite number of low-rank tensor decomposition problems with commonly shared components. 2 This is because if x ∼ N (0, Σ), then we can whiten the data by taking x′ = Σ−1/2 x and define B ⋆′ = BΣ1/2 . We note that B ⋆′ x′ = Bx and therefore we main the functionality of the model. 2 Inspired by the formula, we design a new training model whose associated loss function — named and formally defined in equation (2.6) — corresponds to the loss function for decomposing a matrix (2-nd order tensor) and a 4-th order tensor (Theorem 2.2). Empirically, stochastic gradient descent on f ′ learns the network as shown in experiment section (Section 6). Despite the empirical success of f ′ , we still lack a provable guarantee on the landscape of f ′ . The second contribution of the paper is to design a more sophisticated objective function G(·) whose landscape is provably nice — all the local minima of G(·) are proven to be global, and they correspond to the permutation of the true parameters. See Theorem 2.3. Moreover, the value and the gradient of G can be estimated using samples, and there are no constraints in the optimization. These allow us to use straightforward stochastic gradient descent (see guarantees in [GHJY15, JGN+ 17]) to optimize G(·) and converge to a local minimum, which is also a global minimum (Corollary 2.4). Finally, we also prove a finite-sample complexity result. We will show that with a polynomial number of samples, the empirical version of G share almost the same landscape properties as G itself (Theorem 2.7). Therefore, we can also use an empirical version of G as a surrogate in the optimization. f′ 1.3 Related work The work of Arora et al. [ABGM14] is one of the early results on provable algorithms for learning deep neural networks, where the authors give an algorithm for learning deep generative models with sparse weights. Livni et al. [LSSS14], Zhang et al. [ZLJ16, ZLWJ17], and Daniely et al. [DFS16] study the learnability of special cases of neural networks using ideas from kernel methods. Janzamin et al. [JSA15] give a polynomial-time algorithm for learning one-hidden-layer neural networks with twice-differential activation function and known input distributions, using the ideas from tensor decompositions. A series of recent papers study the theoretical properties of non-convex optimization algorithms for one-hidden-layer neural networks. Brutzkus and Globerson [BG17] and Tian [Tia17] analyze the landscape of the population risk for one-hidden-layer neural networks with Gaussian inputs under the assumption that the weights vector associated to each hidden variable (that is, the filters) have disjoint supports. Li and Yuan [LY17] prove that stochastic gradient descent recovers the groundtruth parameters when the parameters are known to be close to the identity matrix. Zhang et al. [ZPS17] studies the optimization landscape of learning one-hidden-layer neural networks with a specific activation function, and they design a specific objective function that can recover a single column of the weight matrix. Zhong et al. [ZSJ+ 17] studies the convergence of non-convex optimization from a good initializer that is produced by tensor methods. Our algorithm works for a large family of activation functions (including ReLU) and any full-rank weight matrix. To our best knowledge, we give the first global convergence result for gradient-based methods for our general setting.3 The optimization landscape properties have also been investigated on simplified neural networks models. Kawaguchi [Kaw16] shows that the landscape of deep neural nets does not have bad local minima but has degenerate saddle points. Hardt and Ma [HM17] show that re-parametrization using identity connection as in residual networks [HZRS16a] can remove the degenerate saddle points in 3 The work of [JSA15, ZSJ+ 17] are closely related, but they require tensor decomposition as the algorithm/initialization. 3 the optimization landscape of deep linear residual networks. Soudry and Carmon [SC16] showed that an over-parameterized neural network does not have bad differentiable local minimum. Hardt et al. [HMR16] analyze the power of over-parameterization in a linear recurrent network (which is equivalent to a linear dynamical system.) The optimization landscape has also been analyzed for other machine learning problems, including SVD/PCA phase retrieval/synchronization, orthogonal tensor decomposition, dictionary learning, matrix completion, matrix sensing [BH89, SJ13, GHJY15, SQW15, BBV16, GLM16, BNS16, GJZ17]. Our analysis techniques build upon that for tensor decomposition in [GHJY15] — we add two additional regularization terms to deal with spurious local minimum caused by the weights a⋆ and to remove the constraints. 1.4 Notations: We use N, R to denote the set of natural numbers and real numbers respectively. We use k·k to denote the Euclidean norm of a vector and spectral norm of a matrix. We use k·kF to denote the Frobenius/Euclidean norm of a matrix or high-order tensor. For a vector x, let kxk0 denotes its infinity norm and for a matrix A, let |A|0 be a shorthand for kvec(A)k0 where vec(A) is the vectorization of A. For a vector x, let |x|2nd denotes the second largest absolute values of the entries for x. We note that |·|2nd is not a norm. We use A ⊗ B to denote the Kronecker product of A and B, and A⊗k is a shorthand for A ⊗ · · · ⊗ A where A appears k times. For vectors a ⊗ b and a⊗k denote the tensor product. We use λmax (·), λmin (·) to denote the largest and smallest eigenvalues of a square matrix. Similarly, σmax (·) and σmin (·) are used to denote the largest and smallest singular values. We denote the identity matrix in dimension d × d by Idd×d , or Id when the dimension is clear from the context. In the analysis, we rely on many properties of Hermite polynomials. We use hj to denote the jth normalized Hermite polynomial. These polynomials form an orthonormal basis. See Section 4.1 for an introduction of Hermite polynomials. We will define other notations when we first use them. 2 2.1 Main Results Connecting ℓ2 Population Risk with Tensor Decomposition We first show that a natural ℓ2 loss for the one-hidden-layer neural network can be interpreted as simultaneously decomposing tensors of different orders. A straightforward approach of learning the model (1.1) is to parameterize the prediction by ŷ = a⊤ σ(Bx) , (2.1) where a ∈ Rd , B ∼ Rm×d are the training parameters. Naturally, we can use ℓ2 as the empirical loss, which means the population risk is   f (a, B) = E kŷ − yk2 . (2.2) Throughout the paper, we use b⋆1 ⊤ , . . . , b⋆m ⊤ to denote the row vectors of B ⋆ and similarly for B. 4   ⋆⊤  b1 b⊤ 1  ..   ..  ⋆ That is, we have B =  .  and B =  . . Let ai and a⋆i ’s be the coordinates of a and a⋆ b⊤ b⋆m ⊤ m respectively. We give the following analytic formula for the population risk defined above.  Theorem 2.1. Assume vectors bi , b⋆i ’s are unit vectors. Then, the population risk f defined in equation (2.2) satisfies that f (a, B) = X σ̂k2 k∈N X a⋆i b⋆i ⊗k i∈[m] − X 2 ai b⊗k i i∈[m] + const . (2.3) F where σ̂k is the k-th Hermite coefficient of the function σ. See section 4.1 for a short introduction of Hermite polynomial basis. 4 Connection to tensor decomposition: We see from equation (2.3) that the population risk of f is essentially an average of infinite number of loss functions for tensor decomposition. For a fixed k ∈ N, we have that the k-th summand in equation (2.3) is equal to (up to the scaling factor σ̂k2 ) fk , Tk − X 2 ai b⊗k i i∈[m] . (2.4) F P where Tk = i∈[m] a⋆i b⋆i ⊗k is a k-th order tensor in (Rd )⊗k . We note that the objective fk naturally ⊗k attempts to decompose the k-order rank-m tensor Tk into m rank-1 components a1 b⊗k i , . . . , am bm . The proof of Theorem 2.1 follows from using techniques in Hermite Fourier analysis, which is deferred to Section 4.2. Issues with optimizing f :. It turns out that optimizing the population risk using stochastic gradient descent is empirically difficult. Figure 1 shows that in a synthetic setting where the noise is zero, the test error empirically doesn’t converge to zero for sufficiently long time with various learning rate schemes, even if we are using fresh samples in iteration. This suggests that the landscape of the population risk has some spurious local minimum that is not a global minimum. See Section 6 for more details on the experiment setup. An empirical fix:. Inspired by the connection to tensor decomposition objective described earlier in the subsection, we can design a new objective function that takes exactly the same form as the tensor decomposition objective function f2 + f4 . Concretely, let’s define ŷ ′ = a⊤ γ(Bx) (2.5) where γ = σˆ2 h2 + σ̂4 h4 and h2 (t) = √12 (t2 − 1) and h4 (t) = √124 (t4 − 6t2 + 3) are the 2nd and 4th normalized probabilists’ Hermite polynomials [Wik17b]. We abuse the notation slightly by using 4 When σ = ReLU , we have that σ̂0 = σ̂n = 0. √1 , 2π σ̂1 = 1 . 2 For n ≥ 2 and even, σ̂n = 5 ((n−3)!!)2 √ . 2πn! For n ≥ 2 and odd, the same notation to denote the its element-wise application on a vector. Now for each example we use kŷ ′ − yk2 as loss function. The corresponding population risk is   f ′ (a, B) = E kŷ ′ − yk2 . (2.6) Now by an extension of Theorem 2.1, we have that the new population risk is equal to the σ̂22 f2 + σ̂42 f4 . Theorem 2.2. Let f ′ be defined as in equation (2.6) and f2 and f4 be defined in equation (2.4). Assume bi , b⋆i ’s are unit vectors. Then, we have f ′ = σ̂22 f2 + σ̂42 f4 + const (2.7) It turns out stochastic gradient descent on the objective f ′ (a, B) (with projection to the set of matrices B with row norm 1) converges empirically to the ground truth (a⋆ , B ⋆ ) or one of its equivalent permutations. (See Figure 2.) However, we don’t know of any existing work for analyzing the landscape of the objective f ′ (or fk for any k ≥ 3). We conjecture that the landscape of f ′ doesn’t have any spurious local minimum under certain mild assumptions on (a⋆ , B ⋆ ). Despite recent attempts on other loss functions for tensor decomposition [GM17], we believe that analyzing f ′ is technically challenging and its resolution will be potentially enlightening for the understanding landscape of loss function with permutation invariance. See Section 6 for more experimental results. 2.2 Landscape design for orthogonal B ⋆ The population risk defined in equation (2.6) — though works empirically for randomly generated ground-truth (a⋆ , B ⋆ ) — doesn’t have any theoretical guarantees. It’s also possible that when (a⋆ , B ⋆ ) are chosen adversarially or from a different distribution, SGD no longer converges to the ground-truth. To solve this problem, we design another objective function G(·), such that the optimizer of G(·) still corresponds to the ground-truth, and G() has provably nice landscape — all local minima of G() are global minima. In this subsection, for simplicity, we work with the case when B ⋆ is an orthogonal matrix and state our main result. The discussion of the general case is deferred to the end of this Section and Section A. We define our objective function G(B) as     X X G(B) , sign(σ̂4 ) E y · φ(bj , bk , x) − µ sign(σ̂4 ) E y · ϕ(bj , x) j,k∈[d],j6=k +λ j∈[d] m X i=1 (kbi k2 − 1)2 (2.8) where ϕ(·, ·) is defined as ϕ(v, x) = 1 1 1 kvk4 − (v ⊤ x)2 kvk2 + (v ⊤ x)4 . 8 4 24 6 (2.9) and φ(·, ·, ·) is defined as 1 1 1 kvk2 kwk2 + hv, wi2 − kwk2 (v ⊤ x)2 − kvk2 (w⊤ x)2 2 2 2 1 + 2(v ⊤ x)(w⊤ x)v ⊤ w + (v ⊤ x)2 (w⊤ x)2 . 2 φ(v, w, x) = (2.10) The rationale behind of the choices of φ and ϕ will only be clearer and relevant in later sections. For now, the only relevant property of them is that both are smooth functions whose derivatives are easily computable. We remark that we can sample G(·) using the samples straightforwardly — it’s defined as an average of functions of examples and the parameters. We also note that only parameter B appears in the loss function. We will infer the value of a⋆ using straightforward linear regression after we get the (approximately) accurate value of B ⋆ . Due to technical reasons, our method only works for the case when a⋆i > 0 for every i. We will assume this throughout the rest of the paper. The general case is left for future work. Let a⋆max = max a⋆i , a⋆min = min a⋆i , and κ⋆ = max a⋆i / min a⋆i . Our result will depend on the value of κ⋆ . Essentially we treat κ⋆ as an absolute constant that doesn’t scale in dimension. The following theorem characterizes the properties of the landscape of G(·). Theorem 2.3. Let c be a sufficiently small universal constant (e.g. c = 0.01 suffices) and suppose the activation function σ satisfies σ̂4 6= 0. Assume µ ≤ c/κ⋆ , λ ≥ c−1 a⋆max , and B ⋆ is an orthogonal matrix. The function G(·) defined as in equation (2.8) satisfies that 1. A matrix B is a local minimum of G if and only if B can be written as B = DP B ⋆ where P is a permutation matrix and D is a diagonal matrix with Dii ∈ {±1 ± O(µa⋆max /λ)}.5 Furthermore, this means that all local minima of G are also global. 2. Any saddle point B has a strictly negative curvature in the sense that λmin (∇2 G(B)) ≥ −τ0 where τ0 = c min{µa⋆min /(κ⋆ d), λ} 3. Suppose B is an approximate local minimum in the sense that B satisfies k∇G(B)k ≤ ε and λmin (∇2 G(B)) ≥ −τ0 Then B can be written as B = P DB ⋆ + EB ⋆ where P is a permutation matrix, D is a diagonal matrix satisfying the same bound as in bullet 1, and |E|∞ ≤ O(ε/(σ̂4 a⋆min )). As a direct consequence, B is Od (ε)-close to a global minimum in Euclidean distance, where Od (·) hides polynomial dependency on d and other parameters. The theorem above implies that we can learn B ⋆ (up to permutation of rows and sign-flip) if we take λ to be sufficiently large and optimize G(·) using stochastic gradient descent. In this case, the diagonal matrix D in bullet 1 is sufficiently close to identity (up to sign flip) and therefore a local minimum B is close to B ⋆ up to permutation of rows and sign flip. The sign of each b⋆i can be recovered easily after we recover a (see Lemma 2.5 below.) Stochastic gradient descent converges to a local minimum [GHJY15] (under the additional property as established in bullet 2 above), which is also a global minimum for the function G(·). 5 More precisely, |Dii | = q 1 √ 1−µ|σ̂4 |a⋆ /( 6λ) i 7 We will prove the theorem in Section 5 as a direct corollary of Theorem 5.1. The technical bullet 2 and 3 of the theorem is to ensure that we can use stochastic gradient descent to converge to a local minimum as stated below.6 Corollary 2.4. In the setting of Theorem 2.3, we can use stochastic gradient descent to optimize function G(·) (with fresh samples at each iteration) and converge to an approximate global minimum B that is ε-close to a global minimum in time poly(d, 1/ε). After approximately recovering the matrix B ⋆ , we can also recover the coefficient a⋆ easily. Note that fixing B, we can fit a using simply linear regression. For the ease of analysis, we analyze a slightly different algorithm. The lemma below is proved in Section B. Lemma 2.5. Given a matrix B whose rows have unit norm, and are δ-close to B ⋆ in Euclidean distance up to permutation and sign flip with δ ≤ 1/(2κ⋆ ). Then, we can give estimates a, B ′ (using e.g., Algorithm 1) such that there exists a permutation P where ka − P a⋆ k∞ ≤ δa⋆max and B ′ is row-wise δ-close to P B ⋆ . The key step towards analyzing objective function G(B) is the following theorem that gives an analytic formula for G(·). Theorem 2.6. The function G(·) satisfies X √ a⋆i G(B) = 2 6|σ̂4 | · i∈[d] +λ X |σ̂4 |µ X ⋆ ⋆ hb⋆i , bj i2 hb⋆i , bk i2 − √ ai hbi , bj i4 6 j,k∈[d],j6=k i,j∈[d] m X i=1 (kbi k2 − 1)2 (2.11) Theorem 2.6 is proved in Section 4. We will motivate our design choices with a brief overview in Section 3 and formally analyze the landscape of G in Section 5 (see Theorem 5.1). Finite sample complexity bounds. : Extending Theorem 2.3, we can characterize the landb which implies that stochastic gradient on G b also converges approxiscape of the empirical risk G, mately to the ground-truth parameters with polynomial number of samples. Theorem 2.7. In the setting of Theorem 2.3, suppose we use N empirical samples to approximate b There exists a fixed polynomial poly(d, 1/ε) such that if N ≥ G and obtain empirical risk G. b very similar properties to that of G. poly(d, 1/ε), then with high probability the landscape of G b Precisely, if B is an approximate local minimum in the sense that λmin (∇2 G(B)) ≥ −τ0 /2 and ⋆ ⋆ b k∇G(B)k ≤ ε/2, then B can be written as B = DP B + EB where P is a permutation matrix, D is a diagonal matrix and |E|∞ ≤ O(ε/(σ̂4 a⋆min )). All of the results above assume that B ⋆ is orthogonal. Since the local minimum are preserved by linear transformation of the input space, these results can be extended to the general case when B ⋆ is not orthogonal but full rank (with some additional technicality) or the case when the dimension is larger than the number of neurons (m < d). See Section A for details. 6 In the most general setting, converging to a local minimum of a non-convex function is NP-hard. 8 3 Overview: Landscape Design and Analysis In this section, we present a general overview of ideas behind the design of objective function G(·). Inspired by the formula (2.3), in Section 3.1, we envision a family of possible objective functions for which we have unbiased estimators via samples. In Section 3.2, we pick a specific function that feeds our needs: a) it has no spurious local minimum; b) the global minimum corresponds to the ground-truth parameters. 3.1 Which objective can be estimated by samples? Recall that in equation (2.2) of Theorem 2.1 we give an analytic formula for the straightforward population risk f . Although the population risk f doesn’t perform well empirically, the lesson that we learn from it help us design better objective functions. One of the key fact that leads to the proof of Theorem 2.1 is that for any continuous and bounded function γ, we have that   h i X X ⊤ a⋆j hb⋆j , bi ik  . γ̂k σ̂k  E y · γ(bi x) = k∈N j∈[d] Here σ̂k and γ̂k are the k-th Hermite coefficient of the function σ and γ. That is, letting hk the k-th normalized probabilists’ Hermite polynomials [Wik17b] and h·, ·i be the standard inner product between functions, we have σ̂k = hhk , σi. Note that γ can be chosen arbitrarily to extract different terms. For example, by choosing γ = hk , we obtain that h i X ⊤ a⋆j hb⋆j , bi ik . (3.1) E y · hk (bi x) = σ̂k j∈[d] That is, we can always access functions forms that involves weighted sum of the powers of hb⋆i , bi i, as in RHS of equation (3.1). Using a bit more technical tools in Fourier analysis (see details in Section 4), we claim that most of the symmetric polynomials over variables hb⋆i , bj i can be estimated by samples: Claim 3.1 (informal). For an arbitrary polynomial p() over a single variable, there exits a corresponding function φp such that X X p p(hb⋆j , bi i) (3.2) a⋆j E [y · φ (B, x)] = i j Moreover, for an any polynomial q(·, ·) over two variables, there exists corresponding φq such that X X q a⋆j q(hb⋆j , bi i, hb⋆k , bi i) (3.3) E [y · φ (B, x)] = j i,k We will not prove these two general claims. Instead, we only focus on the formulas in Theorem 4.5 and Theorem 4.6, which are two special cases of the claims above. Motivated by Claim 4.3, in the next subsection, we will pick an objective function which has no spurious local minimum among those functional forms on the right-hand sides of equation (3.2) and (3.3). 9 3.2 Which objective has no spurious local minima? As discussed briefly in the introduction, one of the technical difficulties to design and analyze objective functions for neural networks comes from the permutation invariance — if a matrix B is a good solution, then any permutation of the rows of B still gives an equally good solution (if we also permute the coefficients in a accordingly). We only know of a very limited number of objective functions that guarantee to enjoy permutation invariance and have no spurious local minima [GHJY15]. We start by considering the objective function used in [GHJY15], XX min P (B) = hb⋆i , bj i2 hb⋆i , bk i2 i j6=k s.t. ∀i ∈ [d], kbi k = 1 (3.4) Note that here we overload the notation by using b⋆i ’s to denote a set of fixed vectors that we wanted to recover and using bi ’s to denote the variables. Careful readers may notice that P (B) doesn’t fall into the family of functions that we described in the previous section (that is, RHS equation of (3.2) and (3.3)), because it lacks the weighting a⋆i ’s. We will fix this issue later in the subsection. Before that we first summarize the nice properties of the landscape  ⋆ ⊤  of P (B). (b1 )  ..  ⋆ For the simplicity of the discussion, let’s assume B =  .  forms an orthonormal matrix in (b⋆d )⊤ the rest of the subsection. Then, any permutation and sign-flip of the rows of B ⋆ leads to a global minimum of P (·) — when B = SQB ⋆ with a permutation matrix Q and a sign matrix S (diagonal with ±1), we have that P (B) = 0 because one of hb⋆i , bj i2 and hb⋆i , bk i2 has to be zero for all i, j, k 7 ). It turns out that these permutations/sign-flips of B ⋆ are also the only local minima8 of function P (·). To see this, notice that P (B) is a degree-2 polynomial of B. Thus if we pick an index s and fix every row except for bs , then P (B) is a quadratic function over unit vector bs – reduces to an smallest eigenvector problem. Eigenvector problems are known to have no spurious local minimum. Thus the corresponding function (w.r.t bs ) has no spurious local minimum. It turns out the same property still holds when we treat all the rows as variables and add the row-wise norm constraints (see proof in [GHJY15]). However, there are two issues with using objective function P (B). The obvious one is that it doesn’t involve the coefficients a⋆i ’s and thus doesn’t fall into the forms of equation (3.3). Optimistically, we would hope that for nonnegative a⋆i ’s the weighted version of P below would also enjoy the similar landscape property X X hb⋆i , bj i2 hb⋆i , bk i2 P ′ (B) = a⋆i i j6=k When a⋆i ’s are positive, indeed the global minimum of P ′ are still just all the permutations of the B ⋆ .9 However, when max a⋆i > 2 min a⋆i , we found that P ′ starts to have spurious local minima . 7 Note that B ⋆ is orthogonal, and j 6= k We note that since there are constraints here, by local minimum we mean the local minimum on the manifold defined by the constraints. 9 This is the main reason why we require a⋆ ≥ 0. 8 10 It seems that spurious local minimum often occurs when a row of B is a linear combination of a smaller number of rows of B ⋆ . See Section D for a concrete example. To remove such spurious local minima, we add a regularization term below that pushes each row of B to be close to one of the rows of B ⋆ , X X hb⋆i , bj i4 (3.5) R(B) = −µ a⋆i i j We see that for each fixed j, the part in R(B) that involves bj has the form X X −µ a⋆i hb⋆i , bj i4 = −µh a⋆i b⋆i ⊗4 , b⊗4 j i i (3.6) i P This is commonly used objective function for decomposing tensor i a⋆i b⋆i ⊗4 . It’s known that for orthogonal b⋆i ’s, the only local minima are ±b⋆1 , . . . , ±b⋆d [GHJY15]. Therefore, intuitively R(B) pushes each of the bi ’s towards one of the b⋆i ’s. 10 Choosing µ to be small enough, it turns out that P ′ (B) + R(B) doesn’t have any spurious local minimum as we will show in Section 5. Another issue with the choice of P ′ (B) + R(B) is that we are still having a constraint minimization problem. Such row-wise norm constraints only make sense when the ground-truth B ⋆ is orthogonal and thus has unit row norm. A straightforward generalization of P (B) to non-orthogonal case requires some special constraints that also depend on the covariance matrix B ⋆ B ⋆⊤ , which in turn requires a specialized procedure to estimate. Instead, we move the constraints into the objective function by considering adding another regularization term that approximately enforces the constraints. It turns out the following regularizer suffices for the orthogonal case, X S(B) = λ (kbi k2 − 1)2 . (3.7) i Moreover, we can extend this easily to the non-orthogonal case (see Section A) without estimating any statistics of B ⋆ in advance. We note that S(B) is not the Lagrangian multiplier and it does change the global minima slightly. We will take λ to be large enough so that kbi k has to be close to 1. As a summary, we finally use the unconstrained objective min G(B) , P ′ (B) + R(B) + S(B) Since R(B) and S(B) are degree-4 polynomials of B, the analysis of G(B) is much more delicate, and we cannot use much linear algebra as we could for P ′ (B). See Section 5 for details. Finally we note that a feature of this objective G(·) is that it only takes B as variables. We will estimate the value of a⋆ after we recover the value of B. (see Section B). 4 Analytic Formula for Population Risks 4.1 Basics on Hermite Polynomials In this section, we briefly review Hermite polynomials and Fourier analysis on Gaussian space. Let Hj be the probabilists’ Hermite polynomial [Wik17b], and let hj = √1j! Hj be the normalized 10 However, note that R(B) by itself doesn’t work because it does not prevent the solutions where all the bi ’s are equal to the same b⋆j . 11 Hermite polynomials. The normalized Hermite polynomial forms a complete orthonormal basis in 2 the function space L2 (R, e−x /2 ) in the following sense11 . For two functions f, g that map R to R, define the inner product hf, gi with respect to the Gaussian measure as hf, gi = [f (x)g(x)] . E x∼N (0,1) The polynomials h0 , . . . , hm , . . . are orthogonal to each other under this inner product: hhi , hj i = δij . Here δij = 1 if i = j and otherwise δij = 0. Given a function σ ∈ L2 (R, e−x Hermite coefficient of σ be defined as 2 /2 ) , let the k-th σ̂k = hσ, hk i . Since h0 , . . . , hm , . . . , forms a complete orthonormal basis, we have the expansion that X σ(x) = σ̂k hk (x) . k∈N We will leverage several other nice properties of the Hermite polynomials in our proofs. The following claim connects the Hermite polynomial to the coefficients of Taylor expansion of a certain exponential function. It can also serve as a definition of Hermite polynomials. Claim 4.1 ([O’D14, Equation 11.8]). We have that for t, z ∈ R, ∞ X 1 1 Hk (z)tk . exp(tz − t2 ) = 2 k! k=0 The following Claims shows that the expectation E [hn (x)hm (y)] can be computed easily when x, y are (correlated) Gaussian random variables. Claim 4.2 ([O’D14, Section 11.2]). Let (x, y) be ρ-correlated standard normal variables (that is, both x,y have marginal distribution N (0, 1) and E[xy] = ρ). Then, n E [hm (x)hn (y)] = ρ δmn .   As a direct corollary, we can compute Ex∼N (0,Idd×d ) σ(u⊤ x)γ(v ⊤ x) by expanding in the Hermite basis and applying the Claim above. Claim 4.3. Let σ, γ be two functions from R to R such that σ 2 , γ 2 ∈ L2 (R, e−x unit vectors u, v ∈ Rd , we have that h i X σ(u⊤ x)γ(v ⊤ x) = σ̂i γ̂i hu, vii . E x∼N (0,Idd×d ) 11 2 We denote by L (R, e −x2 /2 2 /2 ). Then, for any i∈N 2 ) the weighted L2 space, namely, L (R, e−x 12 2 /2 n R o 2 ∞ ) , f : −∞ f (x)2 e−x /2 dx < ∞ Proof of Claim 4.3. Let s = u⊤ x and t = v ⊤ x. Then s, t are two spherical standard normal random variables that are hu, vi-correlated, and we have that h i ⊤ ⊤ σ(u x)γ(v x) = E [σ(s)γ(t)] . E x∼N (0,Idd×d ) We expand σ(s) and γ(t) in the Fourier basis and obtain that   X X σ̂i hi (s) γ̂j hj (t) E [σ(s)γ(t)] = E  = X i∈N j∈N σ̂i γ̂j E [hi (s)hj (t)] i,j = X i 4.2 σ̂i γ̂i hu, vii (by Claim 4.2) Analytic Formula for population risk f and f ′ In this section we prove Theorem 2.1 and Theorem 2.2, which both follow from the following more general Theorem. Theorem 4.4. Let γ, σ ∈ L2 (R, e−x Define the population risk fγ as 2 /2 ), and ŷ = a⊤ γ(Bx) with parameter a ∈ Rℓ and B ∈ Rℓ×d .   fγ (a, B) = E ky − ŷk2 .  ⊤  ⋆⊤  b1 b1  ..   ..  ⋆ Suppose B =  .  and B =  .  and bi ’s and b⋆i ’s have unit ℓ2 norm. Then, b⊤ b⋆m ⊤ ℓ f (a, B) = X k∈N σ̂k X i∈[m] a⋆i b⋆i ⊗k − γ̂k X 2 ai b⊗k i i∈[ℓ] + const, F where σ̂k , γ̂k are the k-th Hermite coefficients of the function σ and γ respectively. We can see that Theorem 2.1 follows from choosing γ = σ and Theorem 2.2 follows from choosing γ = σ̂2 h2 + σ̂4 h4 . The key intuition here is that we can decompose σ into a weighted combination of Hermite polynomials, and each Hermite polynomial influence the population risk more or less independently (because they are orthogonal polynomials with respect to the Gaussian measure). Proof of Theorem 4.4. We have   i h 2 fγ = E kŷ − yk2 = E a⋆⊤ σ(B ⋆ x) − a⊤ γ(Bx) 13  X = E i∈[m] X = i∈[m],j∈[ℓ] −2 i∈[m],j∈[ℓ] = X a⋆i aj X σ̂k X σ̂k2 hb⋆i , b⋆j ik + X k∈N i∈[m],j∈[ℓ] k∈N 4.3 i ⊤ ⋆ ⋆⊤ x)γ(b x) a a σ(b E i j j i k∈N i,j∈[m] −2  ai γ(b⊤ i x) h a⋆i a⋆j X i∈[ℓ] 2 h i ⋆ ⋆ ⋆⊤ ⋆⊤ E ai aj σ(bi x)σ(bj x) + X X = a⋆i σ(b⋆i ⊤ x) − X i∈[m],j∈[ℓ] ai aj X k∈N i,j∈[ℓ] h i ⊤ ⊤ E ai aj γ(bi x)γ(bj x) γ̂k2 hbi , bj ik σ̂k γ̂k hb⋆i , bj ik a⋆i b⋆i ⊗k i∈[m] X X − γ̂k X (by Claim 4.3) 2 ai b⊗k i i∈[ℓ] . F Analytic Formula for population risk G In this section we show that the population risk G(·) (defined as in equation (2.8)) has the following analytical formula: X X √ G(B) = 2 6|σˆ4 | · hb⋆i , bj i2 hb⋆i , bk i2 a⋆i i∈[d] j,k∈[d],j6=k m X |σ̂4 |µ X ⋆ ⋆ (kbi k2 − 1)2 . ai hbi , bj i4 + λ − √ 6 i,j∈[d] i=1 The formula will be crucial for the analysis of the landscape of G(·) in Section 5. The formula follows straightforwardly from the following two theorems and the definition (2.8). Theorem 4.5. Let φ(·, ·, ·) be defined as in equation (2.10), we have that   X X X √ hb⋆i , bj i2 hb⋆i , bk i2 . a⋆i φ(bj , bk , x) = 2 6σ̂ · E y · i∈[d] j,k∈[d],j6=k j,k∈[d],j6=k Theorem 4.6. Let ϕ(·, ·) be defined as in equation (2.9), then we have that   X σ̂4 X ⋆ ⋆ ai hbi , bj i4 . ϕ(bj , x) = √ E y · 6 i,j∈[d] j∈[d] In the rest of the section we prove Theorem 4.5 and 4.6. We start with a simple but fundamental lemma. Essentially all the result in this section follows from expanding the two sides of equation (4.1) below. 14 Lemma 4.7. Let u, v ∈ Rd be two fixed vectors and x ∼ N (0, Idd×d ). Then, for any s, t ∈ R,   1 1 2 2 ⊤ 2 2 ⊤ (4.1) exp(hu, vist) = E exp(u xt − kuk t ) exp(v xs − kvk s ) . 2 2   Proof. Using the fact that E exp(v ⊤ x) = exp( 21 kvk2 ), we have that,   1 1 2 2 ⊤ 2 2 ⊤ E exp(u xt − kuk t ) exp(v xs − kvk s ) 2 2 h i 1 1 = E exp((tu + sv)⊤ x) exp(− kuk2 t2 − kvk2 s2 ) 2 2   1 1 1 2 2 2 2 = exp( ktu + svk − kukt − kvk s ) (by the formula E exp(v ⊤ x) = exp( 21 kvk2 )) 2 2 2 = exp(hu, vist) . Next we extend some of the results in the previous section to the setting with different scaling (such as when v in Claim 4.3 is no longer a unit vector.) Lemma 4.8. Let u be a fixed unit vector and v be an arbitrary vector in Rd . Let ϕ(v, x) = 1 ⊤ 2 1 1 4 2 ⊤ 4 8 kvk − 4 (v x) kvk + 24 (v x) . h i (4.2) hu, vi4 δ4,k = E Hk (u⊤ x)ϕ(v, x) As a sanity check, we can verify that when v is a unit vector, ϕ(v, x) = Lemma reduces to a special case of Claim 4.2. √ 24h4 (v ⊤ x) and th Proof. Let A, B be formal power series in variable s, t defined as A = exp(hu, vist) and B =   ⊤ xt − 1 kuk2 t2 ) exp(v ⊤ xs − 1 kvk2 s2 ) . We refer the readers to [Wik17a] for more backexp(u E 2 2 grounds of power series. For casual readers, one can just think of A as B as two power series obtained by expanding the exp(·) via Taylor expansion. For a formal power series A in variable x, let [xα ]A to denote coefficient in front of the monomial xα . By Lemma 4.7, we have that A = B, and thus [s4 tk ]A = [s4 tk ]B , (4.3) which implies that      1 1 2 1 4 4 ⊤ 2 2 k ⊤ hu, vi δ4,k = E [t ] exp(u xt − t ) · [s ] exp(v xs − kvk s ) 24 2 2   1 =E Hk (u⊤ x)ϕ(v, x) . k! (4.4) where the last line is by the fact that ϕ(v, x) = [s4 ] exp(v ⊤ xs − 12 kvk2 s2 ). This can be verified by T applying Claim 4.1 with t = skvk and z = vkvkx , and noting that H4 (x) = x4 − 6x2 + 3. Now we are ready prove Theorem 4.6 using Lemma 4.8. 15 P ⊤ Proof of Theorem 4.6. Using the fact that σ(v ⊤ x) = ∞ k=0 σ̂k hk (v x), we have that   h i X X ⋆⊤ ⋆   σ(b x)ϕ(b , x) = a y · ϕ(b , x) E j j i i E j i,j∈[d] X = i,j∈[d] = a⋆i ∞ h i X ⋆⊤ σ̂ h (b x)ϕ(b , x) E k k i j k h i σ̂4 X ⋆ ⋆ ai hbi , bj i4 a⋆i E σ̂4 h4 (b⋆i ⊤ x)ϕ(bj , x) = √ 6 i,j∈[d] i,j∈[d] X (by Lemma 4.8 and hj = √1 Hj ) j Towards proving Theorem 4.5, we start with the following Lemma. Inspired by the proofs above, we design a function φ(v, w, x) such that we can estimate hu, vi2 hu, wi2 by taking expectation of  E σ(u⊤ x)φ(v, w, x) . Lemma 4.9. Let a be a fixed unit vector in Rd and v, w two fixed vectors in Rd . Let ϕ(·, ·) be defined as in Lemma 4.8. Define φ(v, w, x) as φ(v, w, x) = ϕ(v + w, x) + ϕ(v − w, x) − 2ϕ(v, x) − 2ϕ(w, x) 1 1 1 = kvk2 kwk2 + hv, wi2 − kwk2 (v ⊤ x)2 − kvk2 (w⊤ x)2 2 2 2 1 ⊤ 2 ⊤ 2 ⊤ ⊤ ⊤ − 2(v x)(w x)v w + (v x) (w x) . 2 (4.5) (4.6) Then, we have that h i √ 2 2 ⊤ E σ(u x)φ(v, w, x) = 2 6σ̂4 hu, vi hu, wi . Proof. Using the fact that hu, v + wi2 + hu, v − wi4 − 2hu, vi2 − 2hu, wi4 = 12hu, vi2 hu, wi2 and Lemma 4.8, we have that h i 12hu, vi2 hu, wi2 δ4,k = E Hk (u⊤ x)(ϕ(v + w, x) + ϕ(v − w, x) − 2ϕ(v, x) − 2ϕ(w, x)) h i (4.7) = E Hk (u⊤ x)φ(v, w, x) . Using the fact that σ(u⊤ x) = h P∞ k=0 σ̂k hk (u ⊤ x), we conclude that ∞ i X h i σ̂k E hk (u⊤ x)φ(v, w, x) E σ(u x)φ(v, w, x) = ⊤ k=0 i σ̂4 h = √ E H4 (u⊤ x)φ(v, w, x) 6 √ = 2 6σ̂4 hu, vi2 hu, wi2 16 (by Lemma 4.8 and hj = √1 Hj ) j (by Lemma 4.8 again) Now we are ready to prove Theorem 4.5 by using Lemma 4.9 for every summand. Proof of Theorem 4.5. We have that   i X X X h ⋆⊤ φ(bj , bk , x) = a⋆i E y · E σ(bi x)φ(bj , bk , x) i j,k j,k X X √ hb⋆i , bj i2 hb⋆i , bk i2 . a⋆i = 2 6σ̂4 i 5 (by Lemma 4.9) j,k Landscape of Population Risk G(·) In this section we prove Theorem 2.3. Since the landscape property is invariant with respect to rotations of parameters, without loss of generality we assume B ⋆ is the identity matrix Id throughout this section. (See Section A for a precise statement for the invariance.) Recall that by Theorem 2.6, the population risk G(·) in the case of B ⋆ = Id is equal to X X √ 2 2 ⊤ G(B) = 2 6|σ̂4 | a⋆i (b⊤ j ei ) (bk ei ) i |σ̂4 |µ − √ 6 d X i=1 a⋆i j6=k d X 4 (b⊤ j ei ) +λ d X j=1 j=1 2 kbj k2 − 1 . (5.1) In the rest of section we work with the formula above for G(·) instead of the original definition. In fact, for future reference, we study a more general version of the function G. For nonnegative vectors α, β and nonnegative number µ, let Gα,β,µ be defined as Gα,β,µ (B) = d X i=1 αi X j6=k 2 ⊤ 2 (b⊤ j ei ) (bk ei ) −µ d X i=1 βi d X j=1 4 (b⊤ j ei ) d X (kbj k2 − 1)2 +λ (5.2) j=1 Here ei denotes the i-th natural basis vector. We see that G is sub-case of Gα,β,µ and we prove the following extension of Theorem 2.3. Let αmax = maxi αi and αmin = mini αi . Theorem 5.1. Let κα = αmax /αmin and c be a sufficiently small universal constant (e.g. c = 10−2 suffices). Suppose µ ≤ cαmin /βmax and λ ≥ 4 max(µβmax , αmax ). Then, the function Gα,β,µ (B) defined as in equation (5.2) satisfies that 1. A matrix B is a local minimum of Gα,β,µ if and only if B can be written = DP where n q as B o 1 P is a permutation matrix and D is a diagonal matrix with Dii ∈ ± 1−µβ . i /λ 2. Any saddle point B has strictly negative curvature in the sense that λmin (∇2 Gα,β,µ (B)) ≤ −τ0 2 /β where τ0 = c min{µβmin /(κα d), µβmin max , λ} 3. Suppose B is an approximate local minimum in the sense that B satisfies k∇g(B)k ≤ ε and λmin (∇2 g(B)) ≥ −τ0 17 Then B can be written as B = DP + E where P is a permutation matrix, D is a diagonal matrix with the entries satisfying    ε 1 ε  1 18dε2 2 − ≤ D ≤ 1 + 1 − ii 2 i i 2λ 2λ βmin 1 − µβ 1 − µβ λ λ and E is an error matrix satisfying |E|∞ ≤ 3ε/βmin . As a direct consequence, B is Od (ε)-close to a global minimum in Euclidean distance, where Od (·) hides polynomial dependency on d and other parameters. Here we recall that |E|∞ denotes the largest √ entries in the matrix E. Theorem 2.3 follows straight√ forwardly from Theorem 5.1 by setting α = 2 6|σ̂4 |a⋆ and β = |σ̂4 |a⋆ / 6. In the rest of the section we prove Theorem 5.1. Note that our variable B is a matrix of dimension d × d and we use bi to denote the rows of  ⊤  b1   B, that is, B =  ... . Naturally, towards analyzing the properties of a local minimum B, the first b⊤ d step is that we pick a row bs of B and treat only bs as variables and others rows as fixed. We will show that local optimality of bs will imply that bs is equal to one of the basis vector ej up to some scaling factor. This step is done in Section 5.1. Then in Section 5.2 we show that the local optimality of all the variables in B implies that each of the rows of B corresponds to different basis vector, which implies that B is a permutation matrix (up to scaling of the rows). 5.1 Step 1: Analysis of Local Optimality of a Single Row Suppose we fix b1 , · · · , bs−1 , bs+1 , · · · , bd , and optimize only over bs , we obtain the objective h of the following form: hα,β,λ (x) = d X i=1 αi x2i − d X i=1 2 βi x4i + λ kxk2 − 1 (5.3) P 2 ⋆ We can see that setting αi = a⋆i k6=s (b⊤ k ei ) , βi = ai , and x = bs gives us the original objective G(B). In this subsection, we will work with h(·) and analyze the properties of the local minima of h(·). The following lemma shows that a local minimum x of the objective h(·) must be a scaling of a basis vector. Recall that |x|2nd denotes the second largest absolute value of the entries of x. The lemma deals generally an approximate local minimum, though we suggest casual readers simply think of ε, τ = 0 in the lemma. d Lemma 5.2. Let h(·) be defined in equation p (5.3) with non-negative vectors α and β in R . Suppose parameters ε, τ ≥ 0 satisfy that ε ≤ τ 3 /βmin . If some point x satisfies k∇h(x)k ≤ ε and λmin (∇2 h(x)) ≥ −τ , then we have r τ |x|2nd ≤ . βmin 18 Proof. Without loss of generality, we can take ε = gradient and Hessian of function h(·) are p 1/3 τ 3 /βmin which means τ = ε2/3 βmin . The ∇h(x) = 2 diag(α)x − 4 diag(β)x⊙3 + γx ∇2 h(x) = 2 diag(α) − 12 diag(β ⊙ x⊙2 ) + γId + 8λxx⊤ . (5.4) where γ , 4λ(kxk2 − 1). Let S = {i : |xi | ≥ δ} be the indices of the coordinates that are significantly away from zero, 1/3  ε . Since k∇h(x)k ≤ ε, we have that |∇h(x)i | ≤ ε for every i ∈ [d], which implies where δ = βmin that ∀i ∈ [d], 2αi xi + γxi − 4βi x3i ≤ ε (5.5) which further implies that ∀i ∈ S, 2αi + γ − 4βi x2i ≤ ε δ (5.6) If |S| = 1, then we are done because |x|2nd ≤ δ. Next we prove that |S| ≥ 2. For the sake of contradiction, we assume that |S| ≥ 2. Moreover, WLOG, we assume that |x|1 ≥ |x|2 are the two largest entries of |x| in absolute values. p p We take v ∈ Rd such that v1 = −x2 / x21 + x22 , and v2 = x1 / x21 + x22 , and vj = 0 for j ≥ 2. Then we have that v ⊤ x = 0 and kvk = 1. We evaluate the quadratic form and have that v ⊤ ∇2 h(x)v = v ⊤ (2 diag(α) + γId )v − 12v ⊤ diag(β ⊙ x⊙2 )v (since v ⊤ x = 0) = (2α1 + γ)v12 + (2α2 + γ)v22 − 12β1 v12 x21 − 12β2 v22 x22 ε (by equation (5.6) and kvk = 1) ≤ −8β1 v12 x21 − 8β2 v22 x22 + δ ε x2 x2 ≤ −8(β1 + β2 ) 2 2 1 2 + x1 + x2 δ ε ≤ −8βmin x22 + . δ Recall that δ =  ε βmin 1/3 . Then we conclude that 1/3 v ⊤ ∇2 h(x)v ≤ −6βmin ε2/3 = −6τ. 1/3 This contradicts with the assumption that λmin (∇2 h(x)) ≥ −βmin ε2/3 = τ and that kvk = 1. Therefore we have |S| = 1 and 1/3 r  p ε τ ≤ ( using ε ≤ τ 3 /βmin ) |x|2nd ≤ δ = βmin βmin For future reference, we can also show that for a sufficiently strong regularization term (sufficiently large λ), the norm of a local minimum x should be bounded from below and above by 1/2 and 2. This are rather coarse bounds that suffice for our purpose in this subsection. In Section 5.2 we will show that all the rows of a local minimum B of G have norm close to 1. 19 Lemma 5.3. In the setting of Lemma 5.2, 1. Suppose in addition that λ ≥ 4 max(βmax , τ ) and ε ≤ 0.1βmin d−3/2 , then kxk2 ≤ 2 . 2. Let i⋆ = arg maxi |xi |. In addition to the previous conditions in bullet 1, assume that λ ≥ 4αi⋆ . Then, 1 kxk2 ≥ . 2 We remark that we have to state the conditions for the upperbounds and lowerbounds separately since they will be used with these different conditions. Proof. Let S = {i : |xi | ≥ δ} be the indices of the coordinates that are significantly away from zero,  1/3 ε where δ = βmin . We first show that kxk2 ≤ 2. We divide into two cases: 1 S is empty. Since ε ≤ 0.1βmin d−3/2 , then δ ≤ √ √2 . d We conclude that kxk2 ≤ 2. 2 S is non-empty. For i ∈ S, recall equation (5.6) which implies that ε + 4βi x2i δ ε ≤ + 4βmax kxk2 δ ε βmax 2 kxk ≤ + kxk2 + 1 4λδ λ 4λ(kxk2 − 1) ≤ 1/3 Since λ ≥ 4βmax , so λ ≥ βmin ε2/3 ≥ kxk2 ≤ 2. 3ε 4δ , and thus from the display above we have that Next we show that kxk2 ≥ 21 . Again we divide into two cases: 1. S is empty. For the sake of contradiction, assume that kxk2 ≤ 12 , then γ ≤ −2λ. We show that there is sufficient negative curvature. Recall that ∇2 h(x) = 2 diag(α) − 12 diag(β ⊙ x⊙2 ) + γI + 8λxx⊤  2 diag(α) − 12 diag(β ⊙ x⊙2 ) − 2λI + 8λxx⊤ Choose index j ⋆ so that αj ⋆ = αmin , then 2 2 2 e⊤ j ⋆ ∇ h(x)ej ⋆ = 2αmin − 12βj ⋆ xj ⋆ − 2λ + 8λxj ⋆ ≤ 2αmin + 8λδ2 − 2l ≤ 2αmin − λ(2 − 8δ2 ) 4 ≤ 2αmin − λ 3 5 ≤ − λ ≤ −3τ 6 (by δ2 ≤ 1 12 ) ( by λ ≥ 4 max{αmin , τ }) This contradicts with the fact that λmin (∇2 h(x)) ≥ −τ . Thus when S is empty, kxk2 ≥ 21 . 20 2. S is non-empty. Recall that i⋆ = arg maxi |xi |, and by definition i⋆ ∈ S. Using Equation (5.6) γ ≥ −2αi⋆ − ε δ which implies that kxk2 ≥ 1 − ε αi⋆ − . λ 4λδ 1/3 Since λ ≥ 4αi⋆ , and λ ≥ βmin ε2/3 ≥ δε , we conclude that kxk2 ≥ 1/2. We have shown that a local minimum x of h should be a scaling of the basis vector ei⋆ . The following lemma strengthens the result by demonstrating that not all basis vector can be a local minimum — the corresponding coefficient αi⋆ has to be reasonably small for ei⋆ being a local minimum. The key intuition here is that if αi⋆ is very large compared to other entries of α, then if we move locally the mass of ei⋆ from entry i⋆ to some other index j, the objective function will be likely to decrease because αj x2j is likely to be smaller than αi⋆ x2i⋆ . (Indeed, we will show that such movement will cause a second-order decrease of the objective function in the proof.) Lemma 5.4. In the setting of Lemma 5.2, let p i⋆ = arg maxi |xi |. 2 λmin (∇ h(x)) > −τ for 0 ≤ τ ≤ 0.1βmin /d and ε ≤ τ 3 /βmin , then If k∇h(x)k ≤ ε, and αi⋆ ≤ αmin + 2ε + 2τ + 4βi⋆ . Proof. For the ease of notation, assume WLOG that i⋆ = 1. Let δ = (τ /βmin )1/2 . By the assumptions, we have that δ ≤ √16d . By Lemma 5.2, we have kxk2 ≥ 12 , which implies that x21 ≥ kxk2 − (d − 1) |x|22nd ≥ Define v = − 1+ x2k x21  xk x1  1 1 − d |x|22nd ≥ 1 − dδ2 ≥ . 2 3 (5.7) e1 + ek . Since x1 is the largest entry of x, we can verify that 1 ≤ kvk2 = ≤ 2. By the assumption, we have that v ⊤ ∇2 h(x)v ≥ −τ kvk2 ≥ −4τ . (5.8) On the other hand, recall the form of Hessian (equation (5.4)), by straightforward algebraic manipulation, we have that   v ⊤ ∇2 h(x)v = v ⊤ 2 diag(α) − 12 diag(β ⊙ x⊙2 ) + γId + 8λxx⊤ . v xk xk (by v ⊤ x = 0) = 2α1 ( )2 + 2αk − 12β1 x2k − 12βk x2k + γ( )2 + γ x1 x1 xk ε ≤ (2α1 + γ)( )2 − 12(β1 + βk )x2k + 2αk + (4β1 x21 − 2α1 + ) (by equation (5.6)) x1 |x1 | 21 ≤ (4β1 x21 + ε xk ε )( )2 − 12(β1 + βk )x2k + 2αk + (4β1 x21 − 2α1 + ) |x1 | x1 |x1 | (by equation (5.6)) = −8β1 x2k − 12βk x2k + 4β1 x21 + 2αk − 2α1 + 4ε ≤ 2αk − 2α1 + 4ε + 8β1 . (by |xk | ≤ |x1 | and |x1 |2 ≥ 1/3) (by kxk ≤ 2 using Lemma 5.2) Combining equation (5.8) and the equation above gives α1 ≤ αk + 2ε + 2τ + 4β1 . Since k is arbitrary we complete the proof. The previous lemma implies that it’s very likely that the local minimum x can be written as x = xi⋆ ei⋆ and the index i⋆ is also likely to be the argmin of α. The following technical lemma shows that when this indeed happens, then we can strengthen Lemma 5.2 in terms of the error bound’s dependency on ε and τ . In Lemma 5.2, we have that |x|2nd is bounded by a function of τ . Here we strengthen the bound to be a function that only depends on ε. Thus as long as τ be small enough so that we can apply Lemma 5.2 and Lemma 5.4 to meet the condition of the lemma below, then we get an error bound that goes to zero as ε goes to zero. This translates to the error bound in bullet 3 of Theorem 5.1 where the bound on E only depends on ε. For casual readers we suggest to skip this Lemma since its precise functionality will only be clearer in the proof of Theorem 5.1. Lemma 5.5. In the setting of Lemma 5.2, in addition we assume that i = argmink |αk | and that x can be written as x = xi ei + x−i satisfying √ p kx−i k∞ ≤ 0.1 min{1/ d, βmin /(βmax )} . Then, we can strengthen the bound to kx−i k∞ ≤ 3ε . βmin Proof. WLOG, let i = 1. Let xj be the second largest entry of x in absolute value. Define v1 = 4β1 x21 − 2α1 − γ, and similarly vj = 4βj x2j − 2αj − γ. Since k∇h(x)k ≤ ε, by equation (5.6), we have that |v1 | ≤ |xε1 | and |v2 | = |xεj | . Subtracting 4β1 x21 = 2α1 + γ + v1 and 4βj x2j = 2αj + γ + vj , we obtain, 4β1 x21 = 4βj x2j − 2(αj − α1 ) + v1 − vj ≤ 4βj x2j + (v1 − vj ) Since kxk2 ≥ 12 , then x21 ≥ 1 2 − dδ2 ≥ 31 . Since |xj | ≤ δ, 4βj x2j ≤ 4βmax δ2 Combining the above two displays, (v1 − vj ) ≥ 4β1 x21 − 4βj δ2 22 (since αj − α1 ≥ 0) ≥ 4β1 x21 − 4βmax δ2 2 4 ≥ β1 − βmin 3 3 2 ≥ βmin 3 Since |v1 | ≤ ε |x1 | and |v2 | = ( using x21 ≥ 1 3 and δ ≤ p βmin /(6βmax )) (5.9) ε |x2 | , 2 ε 2 ≥ βmin , |xj | 3 (5.10) ε . and re-arranging gives |xj | ≤ 3 βmin 5.2 Local Optimality of All the Variables In this section we prove Theorem 5.1. Results in Subsection 5.1 have established that if B is a local minimum, then each row bs of B has to be a scaling of a basis vector. In this section we show that these basis vectors need to be distinct from each other. The following proposition summaries such a claim (with a weak error analysis). Proposition 5.6. In the setting of Theorem 5.1, suppose B satisfies k∇g(B)k ≤ ε and λmin (∇2 g(B)) ≥ −τ for parameters τ, ε satisfying 0 ≤ τ ≤ c min{µβmin /(κα d), λ} and ε ≤ c min{αmin , Then, the matrix B can be written as p τ 3 /βmin }. B = DP + E , where D is diagonal such that ∀i, |Dii | ∈ [1/4, 2], and P is a permutation matrix, and |E|∞ ≤ δ 1/2  . with δ = µβτmin As alluded before, in the proof we will first apply the results in Section 5.1 to show that when B is a local minimum, each row bs has a unique large entry. Then we will show that the largest entries of each row sit on different columns. The key intuition behind the proof is that if two rows, say row s, t, have their large entries on the same column, then it means that there exists a column— say column k — that doesn’t contain largest entry of any row. Then either row s or t will violate Lemma 5.4. Or in other words, either row s or t can move their mass into the column k to decrease the function value. This contradicts the assumption that B is a local minimum. Proof. As pointed in the paragraph below equation (5.3), when we restrict our attention to a particular row of B and fix the rest of the rows the function Gα,β,µ reduces to the function h(·) in equation (5.3) so that we can apply lemmas in Section 5.1. P 2 Concretely, fix an index s ∈ [d] and let x = bs . For all i ∈ [d], let ᾱi = αi j6=s (b⊤ j ei ) , and β̄i = µβi . Then we have that Gα,β,µ (B) = d X i=1 ᾱi x2i − X 23 i 2 β̄i x4i + λ kxk2 − 1 (5.11) We view the function above as h(x). Now we apply Lemma 5.2 (by replacing α, β in Lemma 5.2 2 by ᾱ, β̄). The assumption that λmin (∇2 gα,β,µ (B)) ≥ −τ implies that λmin p (∇ h(x)) ≥ −τ since 2 2 3 ∇ h(x) is a submatrix of ∇ g(B). Moreover, k∇h(x)k ≤ k∇G(B)k ≤ ε ≤ τ /(µβmin ) Hence by Lemma 5.2, we have that the second largest entry of |bs | satisfies ∀s, |bs |2nd ≤ δ. (5.12)  1/2 where δ , µβτmin for the ease of notation. We can check that δ ≤ 4√1κ d by the assumption. α Therefore, we have essentially shown that each row of B has only one single large entry, since the second largest entry is at most δ. Next we show that each row of B has largest entries on distinct columns. For each row j ∈ [d], let ij = arg maxi |e⊤ i bj | be the index of the largest entry of bj . We will show that i1 , . . . , id are distinct. For the sake of contradiction, suppose they are not distinct, that is, there are two distinct rows s, t that have the same largest entries on column l, that is, we assume that is = it = l. This implies that {i1 , . . . , id } = 6 [d] and let k ∈ [d] be the index such that k ∈ / {i1 , . . . , id }. We note that by the 1/2  1 ≤ 4√1κ d ≤ 4√ assumption δ = µβτmin . We first bound from above ᾱk d α ᾱk = αk X j6=s 2 2 (b⊤ j ek ) ≤ αk dδ ≤ 1 αmin . 16 ⊤ Assume in addition without loss of generality that |b⊤ s el | ≤ |bt el |. Let X 2 (b⊤ zl , j el ) (by δ ≤ √1 ) 4 κα d (5.13) j6=s be the sum of squares of the entries on the column l without entry b⊤ j el , and that ᾱl = αl zl . We first prove that zl ≥ 1/3. For the sake of contradiction, assume zl < 1/3. Then we have that ᾱl = αl z ≤ 31 αl . This implies that λ ≥ 4 max{ᾱl , τ }, and since l is the index of the largest column of bs we can invoke Lemma 5.3 and conclude that kbs k2 ≥ 1/2. This further implies that √ 2 2 2 (b⊤ (by δ ≤ 1/(4 d)) s el ) ≥ kbs k − d |bs |2nd ≥ 1/2 − dδ ≥ 1/3 ⊤ Since we have assumed that |b⊤ s el | ≤ |bt el |. Then we obtain that 2 ⊤ 2 zl ≥ |b⊤ t el | ≥ |bs el | ≥ 1/3 , which contradicts the assumption. Therefore, we conclude that zl ≥ 1/3. Then we are ready to bound ᾱl from below: 1 ᾱl = αl zl ≥ αl . 3 The display above and Equation (5.13) implies that ᾱl − ᾱk ≥ 24 1 αmin . 4 (5.14) Note that l is the largest entry in absolute value in the vector bs . We will apply Lemma 5.4. We fix every row of B except bs and consider the objective as a function of bs only. Again let P 2 ᾱi = αi j6=s (b⊤ j ei ) , and β̄i = µβi and we have the equation (5.11). (Note that now ᾱ depends on the choice of s which we fixed.) Lemma 5.4 gives us that ᾱl ≤ ᾱk + 2ε + 2τ + 4β¯ℓ . Since ε ≤ 1 50 αmin , τ≤ 1 50 αmin and β̄l = µβl ≤ 1 50 αmin , we obtain that 1 ᾱl ≤ ᾱk + αmin 5 (5.15) which contradicts equation (5.14). Thus we have established that i1 , . . . , id are distinct. Finally, let Q be the matrix that only contain the largest entries (in absolute value) of each columns of B. Since i1 , . . . , id are distinct, we have that Q contains exactly one entry per row and per column. Therefore Q can be written as DP where P is a permutation matrix and D is a diagonal matrix. Moreover, we have that kbs k2∞ ≥ kbs k2 − d |bs |22nd ≥ 1/4 and kbs k2 ≤ 2. Therefore, the largest entry of each row has absolute value between 1/4 and 2. Therefore |D|ii ∈ [1/4, 2]. Let E = B − P D. Then we have that |E|∞ ≤ maxs |bs |2nd ≤ δ,which completes the proof. Applying Lemma 5.5, we can further strengthen Proposition 5.6 with better error bounds and better control of the largest entries of each column. Proposition 5.7 (Strengthen of Proposition 5.6). In the setting of Proposition 5.6. Suppose in 2 /β addition that τ satisfies τ ≤ cµβmin max . Then, the matrix B can be written as B = DP + E , where P is a permutation matrix, D is diagonal such that    1 ε  ε 1 18dε2 2 ≤ |D | ≤ 1 + − 1 − ∀i ∈ [d], ii 2 i i 2λ 2λ βmin 1 − µβ 1 − µβ λ λ and |E|∞ ≤ 3ε . βmin 1/2  . Now we use Lemma 5.5 to Proof. By Proposition 5.6, we know that |E|∞ ≤ δ = µβτmin strength the error bound. As we have done in the proof of Proposition 5.6, we again fix an arbitrary sP ∈ [d] and all the 2 rows except bs and view Gα,β,µ as a function of bs . For all i ∈ [d], let ᾱi = αi j6=s (b⊤ j ei ) , and β̄i = µβi and view Gα,β,µ as a function of the form h(x) with α, β replaced by ᾱ, β̄, namely, h(x) = X k ᾱk x2k − X k 2 β̄k x4k + λ kxk2 − 1 + const 25 We will verify the condition of Lemma 5.5. Let i be the index of the largest entry in absolute value of the vector bs . Since we have shown that the largest entry in each row sits on different columns, and the second largest entry is always less than δ, we have that, ᾱi = αi X 1 2 2 αmin . (b⊤ j ei ) ≤ αi dδ ≤ 16 (by δ ≤ j6=s √1 ) 4 κα d For any k 6= i, we know that the column k contains some entry (k, jk ) which is the largest entry of some row, and we also have that jk 6= s since the largest entry of row s is on column i. Therefore, we have that X 2 ⊤ 2 2 2 ᾱk = αk (b⊤ j ek ) ≥ αl (bjk ek ) ≥ αl (kbk k − dδ ) j6=s √ (by δ ≤ 1/(4 d)) 1 ≥ αl 3 Therefore, α¯k ≥ ᾱi for any k 6=√i and p thus i = argmink |ᾱk |. By the fact that |E|∞ ≤ δ, we have that kx−i k∞ ≤ δ ≤ 0.1 min{1/ d, βmin /(βmax )}. Now we are ready to apply Lemma 5.5 and . Applying the argument for every row s gives |E|∞ ≤ β3ε . obtain that |bs |2nd ≤ β3ε min min Finally, we give the bound for the entires in D. Let v be a short hand for ∇h(bs ) which is equal to the s-th column of ∇G(B). Since B is an ε-approximate stationary point, then we have that kvk ≤ ε and by straightforward calculation of the gradient, we have vi = 2ᾱi xi − 4µβi x3i d X x2j − 1)xi . + 4λ( j=1 Since xi 6= 0, dividing by xi gives, d X vi x2j − 1) − 0 = 2ᾱi − + 4λ( xi j=1 X vi = (4λ − 4µβi )x2i + 4λ x2j + 2ᾱi − 4λ − xi 4µβi x2i j6=i Rearranging the equation above gives,  X  1 vi 4λ − 2ᾱi − 4λ x2j −  4λ − 4µβi xi j6=i   X ᾱ 1 v i  1 − i − = x2j − µβi 2λ 4λx i 1− λ j6=i x2i = To upper bound x2i , we note that |vi | < ε, ᾱi > 0, and P 2 j6=i xj  2µβi + ε 1 ε   1+ ≤1+ x2i ≤  µβi 2λ λ 1− λ 26 > 0, so (since λ ≥ 4µβi ) 0.5 0.6 0.5 Parameter Error Objective Value 0.4 0.3 0.2 0.1 0.4 0.3 0.2 0.1 0 0 1 2 3 4 Iterations 5 ×10 0 4 1 2 3 Iterations 4 5 ×10 4 Figure 1: Data are generated by a network with ReLU activation without noise. The training model uses the same architecture. Left: the estimated population risk doesn’t converge to zero. Right: the parameter error using the surrogate in equation (6.1). P For the lower bound of x2i , we note that |E|∞ ≤ δ = β3ε implies j6=i x2j ≤ dδ2 . Moreover, we min have proved that each rows has largest entry at differentPcolumns. Also note that the largest entry of row bs is on column i. Therefore, we have ᾱi = αi j6=s (bTj ei )2 ≤ αmax dδ2 . Using these two , we have estimates and δ = β3ε min x2i ≥ = 1 1− µβi λ 1− µβi λ 1 ε αmax + 1)dδ2 − ) 2λ 2λ   18dε2 ε 1− 2 − 2λ βmin (1 − ( Finally we are ready to prove Theorem 5.1 by applying Proposition 5.6. Proof of Theorem 5.1. By setting ε = 0, τ = 0 in Proposition 5.6, we have that any local minimum B satisfies that B = DP where P is a permutation matrix and D is a diagonal and the precise diagonal entries of D. It can be verified that all these points have the same function value, so that they are all global minimizers. Towards proving the second bullet, we note that a saddle point B satisfies that ∇G(B) = 0. We will prove that λmin (∇2 G(B)) ≤ −τ0 . For the sake of contradiction, suppose λmin (∇n2 G(B)) q ≥ −τo0 . 1 , Then setting ε = 0 and τ = τ0 in Propostion 5.7, we have that B = DP and Dii = ± 1−µβ i /λ which by bullet 1 implies that B is a local minimum. This contradicts the assumption that B is a saddle point. The 3rd bullet is a just a rephrasing of Proposition 5.7. 6 Simulation In this section, we provide simple simulation results that verify that minimizing G(B) with SGD recovers a permutation of B ⋆ ; however, minimizing Equation (2.2) with SGD results in finding 27 0.8 0.06 0.6 Parameter Error Objective Value 0.08 0.04 0.02 0 0.4 0.2 0 0.5 1 1.5 2 2.5 Iterations 3 ×10 0 1 5 2 3 Iterations ×10 5 Figure 2: The labels are generated from a network with ReLU activation. We learn with σ̂2 h2 + σ̂4 h4 activation. Left: the test loss subtracted by the theoretical global minimum value. Right: the error in parameter space measured by equation (6.1) spurious local minima. Based on the formula for the population risk in Equation (2.3), we also verified empirically the conjecture that SGD would successfully recover B ⋆ using the activation functions γ(z) = σ̂2 h2 (z) + σ̂4 h4 (z),12 even if the data were generated via a model with ReLU activation. (See Section 2.1 for the rationale behind such conjectures.) For all of our experiments, we chose B ⋆ = Idd×d with dimension d = 50 and a⋆ = 1 for simplicity, and the data is generated from a one-hidden-layer network with ReLU activation without noise. We use stochastic gradient descent with fresh samples at each iteration, and we plot the (expected) population error (that is, the error on a fresh batch of examples). 1 0.2 0.8 Parameter Error Objective Value 0.15 0.1 0.05 0 0.6 0.4 0.2 -0.05 -0.1 0 0 2 4 6 Iterations 8 10 0 4 2 4 Iterations 6 8 10 4 Figure 3: Learning with objective function G(·). Left: the test loss. Right: the error in parameter space measured by equation (6.1). To test whether SGD converges to a matrix B which is equivalent to B ⋆ up to permutation of rows, we use a surrogate error metric to evaluate whether B ⋆ −1 B is close to a permutation matrix. 12 We also observed that using γ(z) = mental results here. 1 |z| 2 also works but due to the space limitation we don’t report the experi- 28 Given a matrix Q with row norm 1, let e(Q) = min{1 − min max |Qij |, 1 − min max |Qij |}. i j j i (6.1) √ Then we have that if e(Q) ≤ ε for some ε < 1/3, then it implies that Q is 2ε-close to a permutation matrix in infinity norm. On the other direction, we know that if e(Q) > ε, then Q is not ε-close to any permutation matrix in infinity norm. The latter statement also holds when Q doesn’t have row norm 1. Figure 1 shows that without over-parameterization, using ReLU as an activation function, SGD doesn’t converge to zero test error and the ground-truth parameters. We decreased step-size by a factor of 4 every 5000 number of iterations after the error plateaus at 10000 iterations. For the final 5000 iterations, the step-size is less than 10−9 , so we can be confident that the non-zero objective value is not due to the variance of SGD. We see that none of the five runs of SGD converged to a global minimum. Figure 2 shows that using σ̂2 h2 + σ̂4 h4 as the activation function, SGD with projection to the set of matrices B with row norm 1 converges to the ground-truth parameters. We also plot the loss function which converges the value of a global minimum. (We subtracted the constant term in equation (2.7) so that the global minimum has loss 0.) Figure 3 shows that using our objective function G(B), the iterate converges to the ground truth matrix B ⋆ . The fact that the parameter error goes up and down is not surprising, because the algorithm first gets close to a saddle point and then breaks ties and converges to a one of the global minima. Finally we note that using the loss function G(·) seems to require significantly larger batch (and sample complexity) to reduce the variance in the gradients estimation. We used batch size 262144 in the experiment for G(·). However, in contrast, for the σ̂2 h2 + σˆ4 h4 we used batch size 8192 and for relu we used batch size 256. 7 Conclusion In this paper we first give an analytic formula for the population risk of the standard ℓ2 loss, which empirically may converge to a spurious local minimum. We then design a novel population loss that is guaranteed to have no spurious local minimum. Designing objective functions with well-behaved landscape is an intriguing and fruitful direction. We hope that our techniques can be useful for characterizing and designing the optimization landscape for other settings. We conjecture that the objective αf2 + βf4 has no spurious local minimum when α, β are reasonable constants and the ground-truth parameters are in general position13 . We provided empirical evidence to support the conjecture. Our results assume that the input distribution is Gaussian. Extending them to other input distributions is a very interesting open problem. 13 See equation (2.4) for the definition of fk and Theorem 2.2 for how to access αf2 + βf4 in the setting of onehidden-layer neural nets. 29 References [ABGM14] Sanjeev Arora, Aditya Bhaskara, Rong Ge, and Tengyu Ma. Provable bounds for learning some deep representations. In International Conference on Machine Learning, pages 584–592, 2014. [BBV16] Afonso S Bandeira, Nicolas Boumal, and Vladislav Voroninski. On the low-rank approach for semidefinite programs arising in synchronization and community detection. arXiv preprint arXiv:1602.04426, 2016. [BG17] Alon Brutzkus and Amir Globerson. Globally optimal gradient descent for a convnet with gaussian inputs. arXiv preprint arXiv:1702.07966, 2017. [BH89] Pierre Baldi and Kurt Hornik. Neural networks and principal component analysis: Learning from examples without local minima. Neural networks, 2(1):53–58, 1989. [BNS16] Srinadh Bhojanapalli, Behnam Neyshabur, and Nati Srebro. Global optimality of local search for low rank matrix recovery. In Advances in Neural Information Processing Systems, pages 3873–3881, 2016. [DFS16] Amit Daniely, Roy Frostig, and Yoram Singer. Toward deeper understanding of neural networks: The power of initialization and a dual view on expressivity. In Advances In Neural Information Processing Systems, pages 2253–2261, 2016. [GHJY15] Rong Ge, Furong Huang, Chi Jin, and Yang Yuan. Escaping from saddle pointsonline stochastic gradient for tensor decomposition. In Conference on Learning Theory, pages 797–842, 2015. [GJZ17] Rong Ge, Chi Jin, and Yi Zheng. No spurious local minima in nonconvex low rank problems: A unified geometric analysis. arXiv preprint arXiv:1704.00708, 2017. [GLM16] Rong Ge, Jason D. Lee, and Tengyu Ma. Matrix completion has no spurious local minimum. Advances in Neural Information Processing Systems (NIPS), 2016. [GM17] R. Ge and T. Ma. On the Optimization Landscape of Tensor Decompositions. ArXiv e-prints, June 2017. [HM17] Moritz Hardt and Tengyu Ma. Identity matters in deep learning. In 5th International Conference on Learning Representations (ICLR 2017), 2017. [HMR16] Moritz Hardt, Tengyu Ma, and Benjamin Recht. Gradient descent learns linear dynamical systems. CoRR, abs/1609.05191, 2016. [HZRS16a] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 770–778, 2016. [HZRS16b] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Identity mappings in deep residual networks. In European Conference on Computer Vision, pages 630–645. Springer, 2016. 30 [IS15] Sergey Ioffe and Christian Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International Conference on Machine Learning, pages 448–456, 2015. [JGN+ 17] Chi Jin, Rong Ge, Praneeth Netrapalli, Sham M Kakade, and Michael I Jordan. How to escape saddle points efficiently. arXiv preprint arXiv:1703.00887, 2017. [JSA15] Majid Janzamin, Hanie Sedghi, and Anima Anandkumar. Beating the perils of nonconvexity: Guaranteed training of neural networks using tensor methods. arXiv preprint arXiv:1506.08473, 2015. [Kaw16] Kenji Kawaguchi. Deep learning without poor local minima. In Advances in Neural Information Processing Systems, pages 586–594, 2016. [LSSS14] Roi Livni, Shai Shalev-Shwartz, and Ohad Shamir. On the computational efficiency of training neural networks. In Advances in Neural Information Processing Systems, pages 855–863, 2014. [LY17] Yuanzhi Li and Yang Yuan. Convergence analysis of two-layer neural networks with relu activation. arXiv preprint arXiv:1705.09886, 2017. [MBM16] Song Mei, Yu Bai, and Andrea Montanari. The landscape of empirical risk for nonconvex losses. arXiv preprint arXiv:1607.06534, 2016. [O’D14] Ryan O’Donnell. Analysis of boolean functions. Cambridge University Press, 2014. [SC16] Daniel Soudry and Yair Carmon. No bad local minima: Data independent training error guarantees for multilayer neural networks. arXiv preprint arXiv:1605.08361, 2016. [SJ13] Nathan Srebro and Tommi Jaakkola. Weighted low-rank approximations. In ICML, 2013. [SQW15] Ju Sun, Qing Qu, and John Wright. When are nonconvex problems not scary? arXiv preprint arXiv:1510.06096, 2015. [Ste90] Gilbert W Stewart. Matrix perturbation theory. 1990. [Tia17] Yuandong Tian. An analytical formula of population gradient for two-layered relu network and its applications in convergence and critical point analysis. arXiv preprint arXiv:1703.00560, 2017. [Wik17a] Wikipedia. Formal power series — wikipedia, the free encyclopedia, 2017. [Online; accessed 20-September-2017 ]. [Wik17b] Wikipedia. Hermite polynomials — wikipedia, the free encyclopedia, 2017. [Online; accessed 1-September-2017 ]. [ZLJ16] Yuchen Zhang, Jason D Lee, and Michael I Jordan. l1-regularized neural networks are improperly learnable in polynomial time. In International Conference on Machine Learning, pages 993–1001, 2016. 31 [ZLWJ17] Yuchen Zhang, Jason Lee, Martin Wainwright, and Michael Jordan. On the learnability of fully-connected neural networks. In Artificial Intelligence and Statistics, pages 83–91, 2017. [ZPS17] Qiuyi Zhang, Rina Panigrahy, and Sushant Sachdeva. Electron-proton dynamics in deep learning. CoRR, abs/1702.00458, 2017. [ZSJ+ 17] Kai Zhong, Zhao Song, Prateek Jain, Peter L Bartlett, and Inderjit S Dhillon. Recovery guarantees for one-hidden-layer neural networks. arXiv preprint arXiv:1706.03175, 2017. A Handling Non-Orthogonal Weights In this section, we first show that when the weight vectors {b⋆i }′ s are not orthonormal, the local optimum of a slight variant of G(B) still allow us to recover B ⋆ . The main observation is that the set of local minima are preserved (in a certain sense) by linear transformation of the variables. We design an objective function F (B) that is equivalent to G(B) up to a linear transformation. This allows us to use Theorem 2.3 as a black box to characterize all the local minima of F . A.1 Local Minimum after a Linear Transformation Given a function f (y), we say function g(·) is a linear transformation of f (·) if there is a matrix W such that g(x) = f (W x). If W has full rank, the local minima of f are closely related to the local minima of g. We recall some standard notation in calculus first. We use ∇f (t) to denote the gradient of f evaluated at t. For example, ∇f (W x) is a shorthand for ∂f∂y(y) |y=W x , and similarly ∇2 f (W x) is ∂ 2 f (y) | . (∂y)2 y=W x The following theorem then connects the gradients and Hessians of f (W x) and g(x). Essentially, it shows that the set of local minima and saddle points have a 1-1 mapping between f and g, and the corresponding norms/eigenvalues only differ multiplicatively by quantities related to the spectrum of W . Theorem A.1. Let W ∈ Rd×m (d ≥ m) be a full rank matrix. Suppose g : Rm → R and f : Rd → R are twice-differentiable functions such that g(x) = f (W x) for any x ∈ Rm . Then, for all x ∈ Rm , the following three properties hold: 1. σmin (W )k∇f (W x)k ≤ k∇g(x)k ≤ σmax (W )k∇f (W x)k. 2. If λmin (∇2 g(x)) < 0, then σmax (W )2 λmin (∇2 f (W x)) ≤ λmin (∇2 g(x)) ≤ σmin (W )2 λmin (∇2 f (W x)). 3. The point x satisfies the first and second order optimality condition for g iff y = W x also satisfy the first and second order optimality condition for f . 32 Proof. The proof follows from the relationship between the gradients of g and the gradients of f . By basic calculus, we have ∇g(x) = ∂f (y) ∂f (W x) = W⊤ ∂x ∂y y=W x = W ⊤ ∇f (W x) which immediately implies bullet 1. Similarly, we can compute the second order derivative: ∇2 g(x) = W ⊤ [∇2 f (W x)]W. To simplify notation, let A = ∇2 f (W x). Let x = arg minkxk=1 x⊤ W ⊤ AW x, and y = (W x)/kW xk. Therefore λmin (A) ≤ y ⊤ Ay ≤ λmin (W ⊤ AW )/kW xk2 ≤ λmin (W ⊤ AW )/kW k2 . On the other hand, let y be the unit vector that minimizes y ⊤ Ay, we know y is in column span of W because f is only defined on the row span, so there must exist a unit vector x such that W x = λy where λ ≥ σmin (W ). For this x we have λmin (W ⊤ AW ) ≤ x⊤ W ⊤ AW x = λ2 λmin (A) ≤ 2 (W )λ σmin min (A). This finishes the proof for 2. Finally, notice that W is full rank, so ∇g(x) = W ⊤ ∇f (W x) = 0 iff ∇f (W x) = 0. Also, ∇2 g(x) = W ⊤ [∇2 f (W x)]W  0 iff ∇2 f (W x)  0. A.2 Objective for Non-Orthogonal Weights Now we will design a new objective function that can be linearly transformed to the orthonormal case. The main idea is to view the rows of B ⋆ as the new basis that we work on (which is not necessarily orthogonal). Note that this is already the case for the first two terms of the objective function G(B), we change the objective function as follows: More concretely, we define X X √ Fα,µ,λ (B) = 2 6σ̂ · hb⋆i , bj i2 hb⋆i , bk i2 αi i∈[d] j,k∈[d] m m X X σ̂4 µ X αi hbj , b⋆i i2 − 1)2 − 1)2 . − √ (( αi hb⋆i , bj i4 + λ 6 i,j∈[d] j=1 i=1 Note change in the objective is the regularizer for the norm of bj . It is now replaced Pmthat the only ⋆ 2 by (( i=1 αi hbj , bi i − 1)2 − 1)2 , which tries to ensure the “norm” of bj in the basis defined by row of B ⋆ to be 1. The objective function that we will optimize corresponds to choosing αi = a⋆i . Similar as before, this function can be computed as expectations  Fa⋆ ,µ,λ (B) = E y · X   φ(bj , bk , x) − µ E y · j,k∈[d],j6=k m X + λE(x,y),(x′ ,y′ ) [ i=1 X j∈[d] y · φ2 (bi , x) · y ′ · φ2 (bi , x′ )], where (x′ , y ′ ) is an independent sample, and φ2 (v, x) = (v ⊤ x)2 − kvk2 . 33  ϕ(bj , x) (A.1) Intuitively, if we can find a linear transformation that makes {b⋆i }’s orthonormal, that will reduce the problem to the orthonormal case. This is in fact the whitening matrix: P ⋆ ⋆ ⋆ ⊤ ⋆ Let M = m a i=1 i bi (bi ) be the weighted covariance matrix of bi ’s. Suppose pthe SVD of M is ⊤ −1/2 ⊤ U DU and letpW = U D . We apply the transformation W to the vectors a⋆i bi ’s and obtain that oi = W ⊤ a⋆i b⋆i . We can verify that oi ’s are orthogonal vectors because X ⊤ oi o⊤ i = W M W = Id (A.2) i∈[m] For notational convenience, let’s extend the definition of the G(B) in equation by using the putting the relevant information in the subscript Gα,β,λ,o (B) = √ +λ 6σ̂ · m X i=1 X i∈[d] a⋆i X σ̂4 µ X ⋆ hoi , b̄j i2 hoi , b̄k i2 − √ ai hoi , b̄j i4 . 6 j,k∈[d],j6=k i,j∈[d] (kb̄i k2 − 1)2 (That is, the index o denotes the ground-truth solution with respect to which G is defined.) The next Theorem shows that we can rotate the objective function F properly so that it matches the objective G with a ground-truth vector oi ’s. Theorem A.2. Let W be defined as above, and let 1/a⋆ be the vector whose i-th entry is 1/a⋆i . Then, we have that G1/a⋆ ,µ,λ,oi (B) = Fa⋆ ,µ,λ (BW ⊤ )). Note this can be interpreted as a linear transformation as in vector format BW ⊤ is equal to B · (W ⊤ ⊗ Idd×d ).  ⊤ b̄1  ..  Proof. The equality can be obtained by straightforward calculation. We note that since B =  . , b̄⊤ m (W ⊤ the rows of B · ⊗ Idd×d ) are W b̄1 , . . . , W b̄m . Therefore, we have that Fa⋆ ,µ,λ (B · (W ⊤ ⊗ Idd×d )) X X √ = 2 6σ̂ · hb⋆i , W b̄j i2 hb⋆i , W b̄k i2 a⋆i i∈[d] j6=k∈[d] m m X X σ̂4 µ X ⋆ ⋆ 4 a⋆i hW b̄j , b⋆i i2 − 1)2 . ( ai hbi , W b̄j i + λ − √ 6 i,j∈[d] j=1 i=1 X 1 X p √ p = 2 6σ̂ · h a⋆i W ⊤ b⋆i , b̄j i2 h a⋆i W ⊤ b⋆i , b̄k i2 ⋆ ai i∈[d] j,k∈[d] m m X X p σ̂4 µ X 1 p ⋆ ⊤ ⋆ 4 hb̄j , a⋆i W ⊤ b⋆i i2 − 1)2 . ( a W b , b̄ i + λ − √ h i j i ⋆ 6 i,j∈[d] ai j=1 i=1 34 (A.3) X 1 X √ = 2 6σ̂ · hoi , b̄j i2 hoi , b̄k i2 a⋆i i∈[d] j,k∈[d] m m X X σ̂4 µ X 1 4 ( hb̄j , oi i2 − 1)2 . hoi , b̄j i + λ − √ a⋆i 6 i,j∈[d] (by the definition of oi ’s) j=1 i=1 From Theorem 2.3 we can immediately get the following Corollary (note that the only difference is that the coefficients now are 1/a⋆i instead of a⋆i ). Recall a⋆max = maxi a⋆i and a⋆min = mini a⋆min , we have Corollary A.3. Let κa = a⋆max /a⋆min . Let c be a sufficiently small universal constant (e.g. c = 0.01 suffices). Assume µ ≤ c/κa and λ ≥ (ca⋆min )−1 . The function G1/a⋆ ,µ,λ,oi (·) defined as in Theorem A.2 satisfies that 1. A matrix B is a local minimum of G if and only if B can be written as B = P DO where O is a matrix whose rows are oi ’s, P is a permutation matrix and D is a diagonal matrix with Dii ∈ {±1 ± O(µ/λa⋆min )}. 2. Any saddle point B has a strictly negative curvature in the sense that λmin (∇2 G(B)) ≥ −τ0 where τ0 = c min{µ/(κa a⋆max d), λ} 3. Suppose B is an approximate local minimum in the sense that B satisfies k∇g(B)k ≤ ε and λmin (∇2 g(B)) ≥ −τ0 Then B can be written as B = P DO + E where P is a permutation matrix, D is a diagonal matrix and |E|∞ ≤ O(εa⋆max /σ̂4 ). Finally, we can combine the theorem above 5.1 to give a guarantee for optimizing p ⋆ and Theorem⋆ ⊤ F . Let Γ be a diagonal matrix with Γii = ai . Let M = B Γ2 B ⋆ and κ(M ) = kM k/σmin (M ). Theorem A.4. Let c be a sufficiently small universal constant (e.g. c = 0.01 suffices). Let κa = a⋆max /a⋆min . Assume µ ≤ c/κa and λ ≥ 1/(c · a⋆min ). The function F (·) defined as in Theorem A.2 satisfies that −⊤ = P DΓB ⋆ where P is 1. A matrix B is a local minimum of F if and only if B satisfy p ⋆ B a permutation matrix, Γ is a diagonal matrix with Γii = ai , and D is a diagonal matrix with Dii ∈ {±1 ± O(µ/λa⋆min )}. Furthermore, this means that all local minima of F are also global. 2. Any saddle point B has a strictly negative curvature in the sense that λmin (∇2 F (B)) ≥ −τ0 where τ0 = c min{µ/(κa da⋆max ), λ}σmin (M ). 3. Suppose B is an approximate local minimum in the sense that B satisfies k∇F (B)k ≤ ε and λmin (∇2 F (B)) ≥ −τ0 Then B can be √written as B −⊤ = P DΓB ⋆ + E√where Γ, D, P are as in 1, the error term kEk ≤ O(εa⋆max md · κ(M )1/2 /σ̂4 ) (when εa⋆max md · κ(M )1/2 /σ̂4 < c). 35 Proof. Note that we can immediately apply Theorem 2.3 to G1/a⋆ ,µ,λ,oi (B) to characterize all its local minima. See Corollary A.3. Next we will transform the properties for local minima of G (stated in Corollary A.3) to F using Theorem A.1. First we note that the transformation matrix W and M are closely related: W W ⊤ = M, σmin (W )2 = 1/kM k, kW k2 = 1/σmin (M ). (A.4) This is because according to the definition of W , the SVD of M is M = U DU ⊤ and W = U D −1/2 , so W W ⊤ = U D −1 U ⊤ = M −1 . The claims of the singular values follow immediately from the SVD of M and W . As a result, all local minimum of F are of the form BW ⊤ where B is a local minimum of G. For B = BW ⊤ , the gradient and Hessian of F (B) and G(B) are also related by Theorem A.1. Let us first prove 1. By Corollary A.3, we know every local minimum of G is of the form B = P DO. According to the definition of O in Theorem A.2, we know each row vector oi is equal to W ⊤ (a⋆i )1/2 b⋆i , therefore O = ΓB ⋆ W . As a result, all local minima of G are of the form B = P DΓB ⋆ W . By Theorem A.1 and Theorem A.2, we know all local minima of F must be of the form B = BW ⊤ = P DΓB ⋆ W W ⊤ = P DΓB ⋆ M −1 . Now we try to compute B −⊤ . To do that observe that [ΓB ⋆ ]M −1 [ΓB ⋆ ]⊤ = I. Therefore [ΓB ⋆ M −1 ]−⊤ = ΓB ⋆ , and for any local minimum B, we have B −⊤ = (P DΓB ⋆ M −1 )−⊤ = P −⊤ D −⊤ (ΓB ⋆ M −1 )−⊤ = P −⊤ D −⊤ ΓB ⋆ . Note that P ⊤ is still a permutation matrix, and D −⊤ is still a matrix whose diagonal entries are {±1 ± O(µ/λa⋆min )},p so this is exactly the form we stated in 1. More concretely, the rows of B −⊤ are permutations of a⋆i b⋆i . For bullet 2, it follows immediately from Property 2 in Theorem A.1. Note that by property 2, λmin (∇2 F (BW ⊤ )) ≤ λmin (∇2 G(B)) = λmin (∇2 G(B))σmin (M ). kW k2 Finally we will prove 3. Let B = BW −⊤ , so that G(B) = F (B). We will prove properties of B using the properties of B from Corollary A.3. First we observe that by Theorem A.1, λmin (∇2 G(B)) ≥ kW k2 λmin (∇2 F (B)) ≥ −c min{µ/(κa da⋆max , λ}. Therefore the second order condition for Claim 3 in Corollary A.3 is satisfied. Now when k∇F (B)k ≤ ε, we have k∇G(B)k ≤ εkW k = ε/σmin (M )1/2 . By Corollary A.3, we know B can be expressed as P DO + E ′ where D is the diagonal matrix, P is a permutation matrix and |E ′ |∞ ≤ O(εa⋆max /(σ̂4 σmin (M )1/2 )). We will apply perturbation Theorem A.9 for matrix inversion. Since σmin (P DO) ≥ 1/2, we know when kE ′ k ≤ 1/4, √ k(P DO + E ′ )−1 − (P DO)−1 k ≤ 8 2kE ′ k. √ √ Here kEk is bounded by kEkF ≤ md|E ′ |∞ ≤ O(εa⋆max md/(σ̂4 σmin (M )1/2 )), which is smaller than 1/4 when ε is small enough. 36 The corresponding point in F is B = BW ⊤ , and in 1 we have already proved (P DOW ⊤ )−⊤ is of the form we want, therefore we can define E = B −⊤ − (P DOW ⊤ )−⊤ = (B − P DO)−⊤ W −1 , and √ kEk = kW −1 kk(P DO + E ′ )−1 − (P DO)−1 k = O(εa⋆max md · κ(M )1/2 /σ̂4 ). This finishes the proof. A.3 Handle Undercomplete Case The objective function F can handle the case when the weights b⋆i ’s are not orthogonal, but still requires the number of components m to be equal to the number of dimensions d. In this section we show how to use similar ideas for the case when the number of components is smaller than the dimension (m < d). Note that all the terms in F (B) only depends on the inner-products hbj , b⋆i i. Let S be the span of {b⋆i }’s and PS be the projection matrix to this subspace, it is easy to see that F (B) satisfies F (B) = F (BPS ). That is, the previous objective function only depends on the projection of B in the space S. Using similar argument as Theorem A.4, it is not hard to show the only local optimum in S satisfies the same conditions, and allow us to recover B ⋆ . However, without modifying the objective, the local optimum of F (B) can have arbitrary components in the orthogonal subspace S ⊥ . In order to prevent the components from S ⊥ , we add an additional ℓ2 regularizer: define Fα,µ,λ,δ as follows: δ Fα,µ,λ,δ (B) = Fα,µ,λ (B) + kBk2F 2 (A.5) Intuitively, since the first term Fα,µ,λ (B) only cares about the projection BPS , minimizing kBk2F will remove the components in the orthogonal subspace of S. We will choose δ carefully to make sure that the additional term does not change the local optima of Fα,µ,λ (B) by too much, while still ensuring a small projection on S ⊥ . In this case we will consider pseudo-inverse instead of inverse. In particular, for a m × d matrix B, define its pseudo-inverse B † to be the matrix such that BB † = Idm×m and B † B is the projection to the row span P of B. ⋆ ⋆ ⋆ ⊤ Let M = m i=1 ai bi (bi ) , κ(M ) = kM k/σm (M ). Theorem A.5. For any desired accuracy ε0 , we can choose parameters ε, δ, τ0 , µ, λ, such that for the objective function Fa⋆ ,µ,λ,δ (B), for any B such that k∇F(B)k ≤ ε, ∇2 F(B) ≥ −τ0 /2, p we have [B † ]⊤ = B ⋆ DΓP + E where Γ is a diagonal matrix with entries a⋆i , D is a diagonal matrix with entries close to 1, P is a permutation matrix and kEk ≤ ε0 . To choose the parameters, let c be a sufficiently small universal constant (e.g. c = 0.01 suf⋆ fices). Assume µ ≤ c/κ⋆ and λ ≥ 1/(c · a⋆min ). Let τ0 = c min{µ/(κda max ), λ}σmin (M ). Let p cσ̂ ε 1/2 4 0 √ kM k, cε δσ δ ≤ min{ ⋆ , τ /2}, and ε = min{λσ (M ) , cδ/ 0 min (M )}. 0 min 1/2 amax ·m dκ (M ) 37 We first show that if the gradient is small, then the point cannot have a large component in S ⊥. Lemma A.6. If k∇Fa⋆ ,µ,λ,δ (B)k ≤ ε, then kPS ⊥ BkF ≤ ε/δ. Proof. Since Fa⋆ ,µ,λ (B) only depends BPS , we know ∇Fa⋆ ,µ,λ (B)PS ⊥ = 0. Therefore ε ≥ k∇Fa⋆ ,µ,λ,δ (B)PS ⊥ kF = k(δB)PS ⊥ kF = δkPS ⊥ BkF , and we have kBPS ⊥ kF ≤ ε/δ as desired. Next we show that if the gradient of Fa⋆ ,µ,λ,δ (B) is small, and δ is also small, then the gradient of Fa⋆ ,µ,λ (B) can be bounded. Lemma A.7. In the setting of Theorem A.5, if k∇Fa⋆ ,µ,λ,δ (B)k ≤ ε ≤ λσmin (M )1/2 , then we have p k∇Fa⋆ ,µ,λ (B)k ≤ ε + δ 2m/σmin (M ). Towards proving Lemma A.7, we first bound the norm of B by the following claim: Claim A.8. If k∇Fa⋆ ,µ,λ,δ (B)k ≤ λσmin (M )1/2 , then each row bi must satisfy b⊤ i M bi ≤ 2. Proof. We prove by contradiction. Assume towards contradiction that there is a column bi such that b⊤ i M bi ≥ 2. We consider the quantity, ∂Fa⋆ ,µ,λ,δ (B), bi i. ∂bi √ P P ⋆ 2 ⋆ 2 Note that Fa⋆ ,µ,λ,δ has 4 terms: (1) 2 6σ̂ · i∈[d] αi j,k∈[d] hbi , bj i hbi , bk i , (2) P P P m δ 2 ⋆ 2 2 2 − σ̂√46µ i,j∈[d] αi hb⋆i , bj i4 , (3) λ m j=1 (( i=1 αi hbj , bi i − 1) − 1) , (4) 2 kBkF . Among these 4 terms, the first, third and forth terms all contribute positively to this innerproduct (because when bi is moved to (1 − ε)bi all those terms clearly decrease). Term 2 σ̂√4 µ P − 6 i,j∈[m] a⋆i hb⋆i , bj i4 contribute negatively. Therefore we can ignore terms 1 and 4: h h X ∂Fa⋆ ,µ,λ,δ ∂ σ̂4 µ X ⋆ ⋆ ai hbi , bj i4 + λ( a⋆i hb⋆i , bj i2 − 1)2 ], bi i. (B), bi i ≥ h [− √ ∂bi ∂bi 6 i∈[m] i∈[m] P P 1 ⋆ ⋆ 4 ⋆ 2 ⋆ 4 2 ⋆ Let b⊤ i M bi = C ≥ 2, we know i∈[m] ai hbi , bj i ≤ a⋆min i∈[m] (ai ) hbi , bj i ≤ C /amin . Therefore, 4σ̂4 µ X ⋆ ⋆ 4σ̂4 µ C 2 σ̂4 µ X ⋆ ⋆ ∂ ai hbi , bj i4 ], bi i = − √ ai hbi , bj i4 ≥ − √ · ⋆ [− √ h ∂bi 6 6 6 amin i∈[m] i∈[m] On the other hand, X ∂ ⊤ h [λ( a⋆i hb⋆i , bj i2 − 1)2 , bi i = 4λ(b⊤ i M bi − 1)(bi M bi ) = 4λC(C − 1). ∂bi i∈[m] By the choice of λ, µ, we can see that the negative term is negligible, and we know ∂Fa⋆ ,µ,λ,δ (B), bi i ≥ 2λC(C − 1) ∂bi p C/σmin (M ). Therefore the norm of the gradient is at least Since b⊤ i M bi = C, we√have kbi k ≤ 2λC(C − 1)/kbi | ≥ 2 2λσmin (M ), this contradicts with the assumption. The norm of the rows must all be bounded. h 38 ⊤ 2 Proof of Lemma A.7. We havep that Pmbi M bi2 ≤ 2pimplies kbi k ≤ 2/σmin (M ). The norm of the whole 2m/σmin (M ), so by triangle inequality we have matrix is bounded bykBkF ≤ i=1 kbi k ≤ p k∇Fa⋆ ,µ,λ (B)k ≤ k∇Fa⋆ ,µ,λ,δ (B)k + δkBkF ≤ ε + δ 2m/σmin (M ). Finally we are ready to prove Theorem A.5. Proof of Theorem A.5. We will separate B into two components BS = BPS and B⊥ = BPS ⊥ . We will first show that BS is close to the desirable solution. To do that wepwill use Theorem A.4 14 . By the choice of ε, δ, we know from Lemma A.7 that k∇F ⋆ a ,µ,λ (BS )k ≤ 2δ 2m/σmin (M ). Also, ∇2 Fa⋆ ,µ,λ (BS ) ≥ ∇2 Fa⋆ ,µ,λ (B) − δ ≥ −τ0 . Therefore we know BS must be of the form [BS† ]⊤ = P DΓB ⋆ + E1 , where kE1 k < ε0 /2. Also at the same time from the proof of Theorem A.4 we know BS = ′ )W ⊤ where P DO+E ′ has singular values close to 1. Therefore σ (P DO+E min (BS ) ≥ σmin (W )/2 = p 1/2 kM k. By Lemma A.6 we know kB⊥ kF ≤ ε/δ. We apply inverse matrix perturbation (Theorem A.9) again, using B = BS + B⊥ , therefore we know B † = BS† + E2 , 2 (B )) ≤ ε /2. where kE2 k ≤ O(kB⊥ kF /σmin S 0 Combining these two perturbations we know [B † ]⊤ = P DΓB ⋆ + E1 + E2⊤ , and the error term E1 + E2⊤ has spectral norm at most ε0 . A.4 Toolbox: Matrix Perturbation In the proof we used the following theorem for the perturbation of matrices. Theorem A.9 (Stewart and Sun [Ste90]). Consider the perturbation of a matrix A: if B = A + E,then we have √ kB † − A† k ≤ 2kA† kkB † kkEk. As a corollary, if kEk ≤ σmin (A)/2, then we have √ kB † − A† k ≤ 2 2σmin (A)−2 kEk. B Recovering the Linear Layer We will show in this section that if we have are given a δ-approximation of B ⋆ , then it is easy to recover a⋆ . The key observation here is that the correlation between the hb⋆i , xi and the output y is exactly proportional to a⋆i . We also note that there could be multiple other ways to recover a⋆ , e.g., using linear regression with the σ(Bx) as input and the y as output. We chose this algorithm mostly because of the ease of analysis. 14 If we restrict all the vectors to the subspace S, we can still apply Theorem A.4 as long as we replace all inverses with pseudo-inverses. 39 Algorithm 1 Recovering a⋆ Input: A matrix B with unit row norms that is row-wise δ-close to B ⋆ in Euclidean distance. b b means the empirical average. Set ai ← |a′ | and bi ← Return: Let a′i = 2E[yhx, bi i] where E i ′ bi sgn(ai ) Lemma (Restatement of Lemma 2.5). Given a matrix B whose rows are δ-close to B ⋆ in Euclidean distance up to permutation and sign flip with δ ≤ 1/(2κ⋆ ). Then, we can give estimates a, B ′ (using e.g., Algorithm 1) such that there exists a permutation P where ka − P a⋆ k∞ ≤ δa⋆max and B ′ is row-wise δ-close to P B ⋆ . To see why this simple algorithm works for recovering a⋆ , we need the following simple claim. Claim B.1. For any vector v we have m 1X ⋆ ⋆ E[yhx, vi] = ai hbi , vi. 2 i=1 The proof of this claim follows immediately from the property of Hermite polynomials. Now we are ready to prove the corollary. Proof. Without loss of generality we assume B is close to a sign flip of B ⋆ . The unknown permutation does not change the proof. Since bi is δ close to Bi⋆ , let u be the vector where uj = hb⋆j , bi − b⋆i i, we have a′i = m X i=1 a⋆i hb⋆i , bi i = m X i=1 a⋆i (hb⋆i , b⋆i i + hb⋆i , bi − b⋆i i) = a⋆i + ha⋆i , ui ∈ a⋆i ± a⋆max δ. Therefore a′i is always positive, ai is in the desirable range and kBi′ − Bi⋆ k ≤ δ. Similarly, if −bi is δ close to Bi⋆ , we have a′i ∈ −a⋆i ± a⋆max δ, and the conclusion still holds. For the settings considered in Section A, the vectors b⋆i are not necessarily orthogonal. In this case we use the following algorithm: Algorithm 2 Recovering a⋆ for general case Input: A matrix B with unit row norms, and B is δ-close to B ⋆ in spectral norm up to permutation and sign flip. b b means the empirical average. Let ui = 2E[yhx, bi i] where E ′ ⊤ −1 Let a = (BB ) u. Return: Set ai ← |a′i | and bi ← bi sgn(a′i ) Lemma B.2. Given a matrix B whose rows have unit norm, and kB − SP B ⋆ k ≤ δ for some σ2 (B) √ , we can give permutation matrix P and diagonal matrix S with ±1 entries on diagonals.If 4√min 2κ⋆ m estimates a, B ′ (using e.g., Algorithm 2) such that ka − P a⋆ k ≤ 40 √ √ 2 2a⋆max m −2 σmin (B) · δ and kB ′ − P B ⋆ k ≤ δ. Proof. We again use Claim B.1: in this case we know the vector u satisfies u = B(B ⋆ )⊤ a⋆ . As a result, for the vector a′ , we have a′ = (BB ⊤ )−1 (B(B ⋆ )⊤ )a⋆ = (B † )⊤ (B ⋆ )⊤ a⋆ = (B ⋆ B † )⊤ a⋆ . By assumption we know B = SP B ⋆ + E where kEk ≤ δ. By the perturbation of matrix inverse (Theorem A.9), we know if kEk ≤ δ ≤ σmin (B)/2, then B † = (B ⋆ )† P −1 S −1 + E ′ where √ kE ′ k ≤ 2 2σmin (B)−2 δ. Therefore a′ = (P −1 S −1 + E ′ )⊤ a⋆ = S −⊤ P −⊤ a⋆ + (E ′ )⊤ a⋆ = SP a + (E ′ )⊤ a⋆ . (Here the last equality is because for both permutation matrix P and sign flip matrix S, P −⊤ = P and S −⊤ = S.) Therefore, coordinates of a′ are permutation and sign flips of a⋆ , up to an error term (E ′ )⊤ a⋆ . √ σ2 (B) ⋆ √ , we know k(E ′ )⊤ a⋆ k ≤ kE ′ ka⋆ When δ ≤ 4√min max m ≤ amin /2, therefore the signs are 2κ⋆ m all recovered correctly. After fixing the sign, we have ka − P ak ≤ k(E ′ )⊤ a⋆ k ≤ kB ′ C − P B ⋆k ≤ δ. √ √ 2 2δa⋆max m , −2 σmin (B) and Sample Complexity In this section we will show that our algorithm only requires polynomially many samples to find the desired solution. Note that we did not try to optimize the polynomial dependency. Theorem C.1 (Theorem 2.7 Restated). In the setting of Theorem 2.3, suppose we use N empirical b There exists a fixed polynomial such that if samples to approximate G and obtain function G. ⋆ ⋆ b N ≥ poly(d, amax /amin , 1/ε), with high probability for any point B with λmin (∇2 G(B)) ≥ −τ0 /2 b and k∇G(B)k ≤ ε/2, then B can be written as B = DP + E where P is a permutation matrix, D is a diagonal matrix and |E|∞ ≤ O(ε/(σ̂4 a⋆min )). In order to bound the sample complexity, we will prove a uniform convergence result: we b are point-wise close to show that with polynomially many samples, the gradient and Hessian of G b must also be an the gradient and Hessian of G, therefore any approximate local minimum of G approximate local minimum of G. However, there are two technical issues in showing the uniform convergence result. The first b are very issue is that when the norm of B is very large, both the gradient and Hessian of G and G large and we cannot hope for good concentration. We deal with this issue by showing when B has b a large norm, the empirical gradient ∇G(B) must also have large norm, and therefore it can never be an approximate local minimum (we do this later in Lemma C.5). The second issue is that our objective function involves high-degree polynomials over Gaussian variables x, y, and is therefore not sub-Gaussian or sub-exponential. We use a standard truncation argument to show that the function does not change by too much if we restrict to the event that the Gaussian variables have bounded norm. Lemma C.2. Suppose P ′ (B) + R(B) = E(x,y) [f (x, y, B)] where f is a polynomial of degree at most 5 in x, y and at most 4 in B. Also assume that the sum of absolute values of coefficients is bounded by Γ. For any ε ≤ Γ/2, let R = Cd log(a⋆max Γ/ε) for a large enough constant C, let F be the event 41 that kxk2 ≤ R, and let Gtrunc = E(x,y) [f (x, y, B)1F ]. For any B such that kbi k ≤ 2 for all rows, we have k∇G(B) − ∇Gtrunc (B)k ≤ ε, and k∇2 G(B) − ∇2 Gtrunc (B)k ≤ ε, Proof. By standard χ2 concentration bounds, for large enough C and any z > R, the probability that kxk2 ≥ z is at most exp(−10z). By simple calculation, it is easy to check that k∇B f (x, y, B)k ≤ 4Γd1.5 a⋆max kxk5 , and 2 k∇B f (x, y, B)k ≤ 12Γd2 a⋆max kxk5 . We know k∇G(B) − ∇Gtrunc (B)k = kE[∇B f (x, y, B)(1 − 1F )k. The expectation between kxk2 ∈ [2i R, 2i+1 R], for i = 0, 1, 2, ..., is always bounded by 4Γd1.5 a⋆max k2i+1 Rk5 exp(−2i R) < ε/2i+1 . Therefore k∇G(B) − ∇Gtrunc (B)k ≤ ∞ X i=0 ε/2i+1 ≤ ε. The bound for the Hessian follows from the same argument. Finally, we combine this truncation with a result of [MBM16] that proves universal convergence of gradient and Hessian. For completeness here we state a version of their theorem with bounded gradient/Hessian: Theorem C.3 (Theorem 1 in [MBM16]). Let f (θ) be a function from Rp → R and fˆ be its empirical version. If the norm of the gradient and Hessian of a function is always bounded by τ , for variables in a ball of radius r in p dimensions, there exists a universal constant C0 such that for C = C0 max{log rτ /δ, 1}, the following hold: (a) The sample gradient converges to the population gradient. Namely if N ≥ Cp log p we have r Cp log n ] ≥ 1 − δ. Pr[ sup k∇f (θ) − ∇fˆθ k ≤ τ n kθk≤r (b) The sample Hessian converges to the empirical Hessian. Namely if N ≥ Cp log p we have r Cp log n Pr[ sup k∇f (θ) − ∇fˆθ k ≤ τ ] ≥ 1 − δ. n kθk≤r As an immediate corollary of this theorem and Lemma C.2, we have Corollary C.4. In the setting of Theorem 2.7, for every B whose rows have norm at most 2, we have with high probability, b k∇G(B) − ∇G(B)k ≤ ε/2, and b k∇2 G(B) − ∇2 G(B)k ≤ τ0 /2. 42 Proof. On the other hand, for all such matrices B, by Lemma C.2 we know the gradient and Hessian of G is close to the gradient and Hessian of Gtrunc . k∇G(B) − ∇Gtrunc (B)k ≤ ε/4, and k∇2 G(B) − ∇2 Gtrunc (B)k ≤ τ0 /4. Now, the gradient and Hessian for individual samples for estimating Gtrunc are bounded by some b are close to those poly(d, 1/ε), therefore by Theorem C.3 we know the gradient and Hessian of G of Gtrunc . When N ≥ poly(d, 1/ε) for a large enough polynomial, we have with high probability, for all B with all rows kbi k ≤ 2, b k∇Gtrunc (B) − ∇G(B)k ≤ ε/4, and b k∇2 Gtrunc (B) − ∇2 G(B)k ≤ τ0 /4. The corollary then follows from triangle inequality. Finally we handle the case when B has a row with large norm. We will show that in this case b ∇G(B) must also be large, so B cannot be an approximate local minimum. Lemma C.5. If bi is the row with largest norm and kbi k ≥ 2, then when N ≥ poly(d, a⋆max /a⋆min ) b for some fixed polynomial, we have with high probability h∇G(B), bi i ≥ cλkbi k4 for some universal constant c > 0. Proof. The proof of this Lemma is very similar to Claimh A.8. Note that by i equaP b tion (2.8) there are three terms in G(B):(1) sign(σ̂4 )Ê y · j,k∈[d],j6=k φ(bj , bk , x) , (2) h P i P 2 2 −µ sign(σ̂4 )Ê y · j∈[d] ϕ(bj , x) , (3) λ m i=1 (kbi k − 1) . Here Ê is the empirical average over the samples. Note that the first two terms are homogeneous degree 4 polynomials over B, and the third term does not depend on the sample. By argument similar to Corollary C.4, we know for any B where bi has the largest row norm, with the number of samples we choose the gradient of the first two terms is ca⋆min kbi k3 close to the gradient of their expectations, where c < 0.01 is a small constant. √ By Theorem 2.6, we know the expectation of the first two terms are equal to A1(B) = 2 6|σ̂4 | · P P |σ̂4 |µ P ⋆ 2 ⋆ 2 ⋆ ⋆ ⋆ 4 √ j,k∈[d],j6=k hbi , bj i hbi , bk i and A2(B) = − i∈[d] ai i,j∈[d] ai hbi , bj i . Here the gradient of 6 the first term always have positive correlation with bi , so we can ignore it. For the second term, we know the gradient |σ̂4 |µ X ⋆ ⋆ ∂ aj hbj , bi i3 b⋆j . [A2(B)] = − √ ∂bi 6 j Taking the inner-product with bi , and use the fact that b⋆i form an orthonormal basis, we know h ∂ [A2(B)], bi i ≥ −ca⋆min kbi k4 . ∂bi On the other hand, when kbi k ≥ 2, we have for the third term h ∂ [λ(kbi k2 − 1)2 ], bi i ≥ λ(kbi k − 1)4 ≥ λkbi k4 /16. ∂bi 43 Since λ is larger than a⋆max , we know the negative contribution from A2 and the difference between b the empirical version and G are both negligible. Therefore we have h∇G(B), bi i ≥ cλkbi k4 as desired. Now we are ready to prove Theorem 2.7: b Proof. By Lemma C.5, any point B with ∇G(B) ≤ ε must have kbi k ≤ 2 for all i. Now by Corollary C.4, we know the point B we have must satisfy k∇G(B)k ≤ ε; ∇2 G(B)  −τ0 Id. By point 3 in Theorem 2.3, this implies the guarantee on B. D Spurious Local minimum for function P ′ In this section we give an example where the function P ′ does have spurious local minimum. In this example, d = 4, and the true vectors are the standard basis vectors b⋆i = ei . We will set ⋆ a1 = 1, and a⋆2 = a⋆3 = a⋆4 = 2 + δ (where δ > 0 is an arbitrary positive constant). The √spurious local minimum that we consider is b1 = b2 = e1 = b⋆1 , b3 = e2 = b⋆2 , b4 = √ 2 2 2 e3 + 2 e4 . That is,   1 0 0 0  1 0 0 0  . B=  0 1 0 0  √ √ 0 0 22 22 The objective P ′ (B) = 1 and the only non-zero term is a⋆1 hb⋆1 , b1 i2 hb⋆1 , b2 i2 . In order to improve the objective locally, we need to change either b1 or b2 , otherwise the term a⋆1 hb⋆1 , b1 i2 hb⋆1 , b2 i2 is still 1, and all other terms (a⋆i hb⋆i , bj i2 hb⋆i , bk i2 ) are non-negative. p p Assume we have a local perturbation B ′ , where b′1 = 1 − ε21 e1 + ε1 u1 , b′2 = 1 − ε22 e1 + ε2 u2 . Here u1 , u2 are unit vectors that are orthogonal to e1 . Also, since this is a local perturbation, we make sure ε1 , ε2 ≤ ε, and b3 (2) ≥ 1 − ε, [b4 (3)]2 , [b4 (4)]2 ≥ 0.5 − ε. We will show that when ε is small enough, the objective function P ′ (B ′ ) ≥ 1. To see this, notice that the term a⋆1 hb⋆1 , b1 i2 hb⋆1 , b2 i2 is now equal to (1 − ε21 )(1 − ε22 ). On the other hand, for b1 , we have 4 X i=2 a⋆i 4 X k=3 hb⋆i , b1 i2 hb⋆i , bk i2 = ε21 (2 + δ) = ε21 (2 + ≥ ε21 (2 + 4 X 4 X hb⋆i , u1 i2 hb⋆i , bk i2 i=2 k=3 4 4 X X hb⋆i , u1 i2 ( hb⋆i , bk i2 ) δ) i=2 k=3 4 4 X X 4 hb⋆i , u1 i2 · min{ hb⋆i , bk i2 } δ) i=2 i=2 k=3 ≥ ε21 (2 + δ)(0.5 − ε). Similarly we have the same equation for b2 . Note that all the terms we analyzed are disjoint, therefore P ′ (B ′ ) ≥ (1 − ε21 )(1 − ε22 ) + ε21 (2 + δ)(0.5 − ε) + ε22 (2 + δ)(0.5 − ε). 44 By removing higher order terms of ε, it is easy to see that P ′ (B ′ ) ≥ 1 when ε is small enough. Therefore B is a local minima of P ′ . 45
8cs.DS
Submitted to the Annals of Statistics EFFICIENT ESTIMATION FOR DIMENSION REDUCTION WITH CENSORED DATA arXiv:1710.05377v1 [math.ST] 15 Oct 2017 By Ge Zhao, Yanyuan Ma and Wenbin Lu∗ We propose a general index model for survival data, which generalizes many commonly used semiparametric survival models and belongs to the framework of dimension reduction. Using a combination of geometric approach in semiparametrics and martingale treatment in survival data analysis, we devise estimation procedures that are feasible and do not require covariate-independent censoring as assumed in many dimension reduction methods for censored survival data. We establish the root-n consistency and asymptotic normality of the proposed estimators and derive the most efficient estimator in this class for the general index model. Numerical experiments are carried out to demonstrate the empirical performance of the proposed estimators and an application to an AIDS data further illustrates the usefulness of the work. 1. Introduction. Cox proportional hazards model (Cox, 1972) is probably the most widely used semiparametric model for analyzing survival data. In the Cox model, covariate effect is described by a single linear combination of covariates in an exponential function and is multiplicative in modeling the hazard function. Although this special way of modeling the hazard function permits a convenient estimation procedure, such as the maximum partial likelihood estimation (Cox, 1975), it has its limitations. As widely studied in the literature, there are many situations where the Cox model may not be proper. Due to the limitations of the Cox model, many other semiparametric survival models have been proposed in the literature, such as the accelerated failure time model (Buckley and James, 1979), proportional odds model (McCullagh, 1980) and linear transformation model (Dabrowska and Doksum, 1988), etc. Despite of all these efforts, the link between the summarized covariate effect, typically in the form of a linear combination of covariates, and the possibly transformed event time remains to have a predetermined form and hence can be restrictive sometimes. The single index feature of the above mentioned semiparametric survival models is appealing since the covariates effect has a nice interpretation. It also naturally achieves dimension reduction when there is a large number of covariates. However, the specific model form to link the covariate index to the event time may be restrictive, and it is often difficult to check the goodness-of-fit of the specific link function form. To achieve a model that is flexible yet is feasible in practice, we borrow and extend the idea of linear summary of the covariate effects, while free up the specific functional relation between the event time and the linear summaries. Thus, we propose the following general index model (1) prpT ď t | Xq “ prpT ď t | β T 0 Xq, tą0 where T is the survival time of interest, X is the p-dimensional baseline covariates, and β 0 P Rpˆd is the regression coefficient matrix, with p ą d. Several properties of model (1) is worth mentioning. Ge Zhao is graduate student (E-mail: [email protected]) and Yanyuan Ma is professor (E-mail: [email protected]), Department of Statistics, Penn State University, University Park, PA, 16802. Wenbin Lu is professor (E-mail: [email protected]), Department of Statistics, North Carolina State University, Raleigh, NC 27695. The work is supported by NSF grant DMS-1608540. Keywords and phrases: Dimension reduction, General index model, Kernel estimation, Semiparametric theory, Survival analysis ∗ 1 imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 2 1) First of all, instead of a single linear summary, we allow d linear summaries described by the d columns of β 0 . This increases the flexibility of how the covariate effects are combined. We can view this as a generalization from single index to multi index covariate summary. Imagine an extreme case when d “ p, this model degenerates to the restriction free case where the dependence of T on X is arbitrary. Of course, in practice, when d is large, the estimation will encounter difficulties and it is not feasible to carry out the analysis. However conceptually this provides a way of appreciating the flexibility of the model. In addition, we will see that in practice, when d is often smaller than p, this model framework allows us to find and incorporate the suitable number of indices d. 2) Second, we do not specify any functional form of the conditional probability. Thus, the conditional probability in (1) is simply a function of both t and β T 0 X. This relaxes both the exponential form of the covariate relation and the multiplicative form of the hazard function in the Cox model and is also much more flexible than other popular semiparametric survival models, such as the accelerated failure time and linear transformation models. Despite of the flexibility of the model in (1), we show that through properly incorporating semiparametric treatment and martingale techniques, estimation and inference is still possible. 3) In addition, the analysis can be carried out under the usual conditional independent censoring assumption, where the censoring time is allowed to depend on the covariates. The proposed general index model and associated semiparametric estimation method naturally provide a dimension reduction tool for survival data. It has a few advantages over existing dimension reduction methods for survival data. 1) First, many existing dimension reduction methods for survival data require a stronger assumption on the censoring time, such as the covariate-independent censoring assumption (e.g. Li, Wang and Chen, 1999; Lu and Li, 2011), or requires nonparametric estimation of the conditional survival function of censored survival times (Xia, Zhang and Xu, 2010) or censoring times (Li, Wang and Chen, 1999) given all the covariates, which may suffer from the curse of dimensionality. All these drawbacks are avoided here. 2) Second, most of existing methods (Xia, Zhang and Xu, 2010; Li, Wang and Chen, 1999) are constructed based on general inverse probability weighted estimation techniques in one way or another, and are thus not efficient. In contrast, our proposed method is built on the semiparametric theory (Tsiatis, 2006) and achieves the optimal semiparametric efficient estimator. The rest of the paper is organized as the following. In Section 2, we develop the estimation procedures for both the index parameters in β and functional relation between event time and the multiple indices. In Section 3, we establish the large sample properties to enable inference. We perform extensive numerical experiments in Section 4, where both simulation and analysis of an AIDS data are included. We conclude the paper with a discussion in Section 5, while relegate all the technical details in an Appendix. 2. Methodology Development. Define Z “ minpT, Cq and ∆ “ IpT ď Cq, where C is the censoring time. Assume C T | X and the relation between T and X follows the model in (1). The observed data consist of pXi , Zi , ∆i q, i “ 1, . . . , n, which are independent copies of pX, Z, ∆q. Note that even without censoring, β 0 in (1) is not identifiable because for any d ˆ d full rank matrix A, β 0 and β 0 A suite the model (1) equally well. Thus, we fix a parameterization of β 0 by assuming the upper d ˆ d block of β 0 to be the identity matrix Id . This ensures the unique identification of β 0 . Here we consider a fixed d, and our focus will be in estimating the lower block of β 0 , which has dimension pp ´ dq ˆ d. We then proceed to estimate the conditional distribution function in d p´d . Note that under the T T (1). For convenience, write X “ pXT u , Xl q , where Xu P R and Xl P R assumption of C T | X and (1), we have T Etf1 pCqf2 pT q | β T 0 Xu “ ErEtf1 pCqf2 pT q | Xu | β 0 Xs T “ ErEtf1 pCq | XuEtf2 pT q | β T 0 Xu | β 0 Xs imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 3 T “ Etf1 pCq | β T 0 XuEtf2 pT q | β 0 Xu for any functions f1 , f2 , hence C T | β T 0 X. To facilitate further development, in describing the censoring process, write Sc pz, xq “ prpC ě z | X “ xq, Λc pz, xq “ ´logSc pz, xq, λc pz, xq “ BΛc pz, xq{Bz and fc pz, xq “ ´BSc pz, xq{Bz. Similarly, to describe the event process, for any parameter vector β, define Spz, β T xq “ prpT ě z | β T X “ β T xq, f pz, β T xq “ ´BSpz, β T xq{Bz, Λpz, β T xq “ ´logSpz, β T xq and λpz, β T xq “ BΛpz, β T xq{Bz. Note that the functions S, Λ, λ and f are in fact different when the parameter β changes, so the more precise notations are Spz, β T x, βq, Λpz, β T x, βq, λpz, β T x, βq and f pz, β T x, βq. Here, without causing confusion, we omit the last parameter for notational simplicity. Using these notation, the pdf of the model described in (1) is (2) fX,Z,∆ px, z, δ, β, λ, λc , fX q “ fX pxqλpz, β T xqδ e´ şz 0 λps,βT xqds λc pz, xq1´δ e´ şz 0 λc ps,xqds , where fX pxq is the pdf of X. We assume the true data generation process is based on fX,Z,∆ px, z, δ, β 0 , λ0 , λc0 , fX0 q. T Note that following our notation, λ0 pz, β T 0 xq “ λpz, β 0 xq. We view (2) as a semiparametric model, where β is a finite dimensional parameter of interest and all the remaining unknown components of the model are treated as infinite dimensional nuisance parameters. In survival analysis, the most popular approaches to estimation are martingale based estimators (Fleming and Harrington, 1991) and nonparametric maximum likelihood estimators (NPMLE) (Zeng and Lin, 2007). Here we find that NPMLE does not suit well without adaption due to the inseparable relation between the hazard function and the covariates. Martingale approach may enable us to obtain one specific estimator for β, while we aim at obtaining a more comprehensive understanding of the estimation of β. Thus we use a less conventional approach by adopting the geometrical treatment in semiparametrics. Similar practice has been performed in Tsiatis (2006) to rediscover the partial likelihood estimator for Cox proportional hazard model. To this end, we first characterize the nuisance tangent space as described in Proposition 1. The proof utilizes properties of şmartingale integration and the details are given şt in Appendix A.1. Det T T fine M pt, β 0 Xq ” N ptq ´ 0 Y psqλ0 ps, β 0 Xqds and Mc pt, Xq ” Nc ptq ´ 0 Y psqλc ps, Xqds, where N ptq “ ∆IpZ ď tq, Nc ptq “ p1 ´ ∆qIpZ ď tq and Y ptq “ IpZ ě tq. Then M pt, β T 0 Xq and Mc pt, Xq are mean-zero martingale processes. Proposition 1. Λ1 Λ2 Λ3 The nuisance tangent space Λ “ Λ1 ‘ Λ2 ‘ Λ3 , where ı ” “ apXq : EtapXqu “ 0, apXq P Rpp´dqd , "ż 8 * T T T pp´dqd hps, β 0 XqdM ps, β 0 Xq : @hpZ, β 0 Xq P R “ , "ż08 * “ hps, XqdMc ps, Xq : @hpZ, Xq P Rpp´dqd . 0 Having found the nuisance tangent space, we can now proceed to identify the efficient score function through projecting the score function onto Λ and calculating the residual. The score function is defined as Sβ p∆, Z, Xq ” BlogfX,Z,∆px, z, δ, β, λ, λc , fX q{Bβ. Let λ1 ps, β T Xq “ Bλps, β T Xq{Bpβ T Xq T T and λ10 ps, β T 0 Xq “ Bλ0 ps, β 0 Xq{Bpβ 0 Xq. Straightforward calculation yields Sβ p∆, Z, Xq “ ż8 0 λ1 ps, β T Xq b Xl dM ps, β T Xq. λps, β T Xq imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 4 We can verify that Sβ 0 p∆, Z, Xq K Λ1 and Sβ 0 p∆, Z, Xq K Λ3 due to the martingale properties. Thus to look for the efficient score, we only need to project Sβ p∆, Z, Xq onto Λ2 and calculate its residual. To this end, we search for h˚ ps, β T 0 Xq so that ż8 T h˚ ps, β T Seff p∆, Z, Xq “ Sβ0 p∆, Z, Xq ´ 0 XqdM ps, β 0 Xq 0 * ż8" λ10 ps, β T 0 Xq ˚ T b X ´ h ps, β Xq dM ps, β T “ l 0 0 Xq T λ0 ps, β 0 Xq 0 is orthogonal to Λ2 . This entails that for any hps, β T 0 Xq, „ż 8 ż8" *  λ10 ps, β T 0 Xq ˚ T T h 0 “ E b Xl ´ h ps, β 0 Xq dM ps, β 0 Xq λ0 ps, β T 0 0 0 Xq " „ż 8 *  λ10 ps, β T 0 Xq T T ˚ T T h ps, β 0 Xq “ E b Xl ´ h ps, β 0 Xq Y psqλ0 ps, β 0 Xqds . λ0 ps, β T 0 0 Xq T T ps, β T 0 XqdM ps, β 0 Xq T T By letting hps, β T 0 Xq “ Ips “ tqapβ 0 Xq for any apβ 0 Xq, we obtain that *  λ10 pt, β T 0 Xq ˚ T T T b Xl ´ h pt, β 0 Xq Y ptqλ0 pt, β 0 Xq | β 0 X 0 “ E λ0 pt, β T 0 Xq „" *  λ10 pt, β T 0 Xq ˚ T T “ E b X ´ h pt, β Xq Y ptq | β X . l 0 0 λ0 pt, β T 0 Xq „" Note that ( ( E Xl Sc pt, Xq | β T E Xl Y ptq | β T 0X 0X ( “ ( . E Y ptq | β T E Sc pt, Xq | β T 0X 0X (3) This leads to h ˚ λ10 pt, β T 0 Xq pt, β T Xq 0 T λ0 pt, β 0 Xq ( E Xl Sc pt, Xq | β T 0X ( . b E Sc pt, Xq | β T 0X Thus the efficient score is « (ff ż8 T E X S ps, Xq | β X λ10 ps, β T Xq c l 0 0 ( dM ps, β T (4) b Xl ´ Seff p∆, Z, Xq “ 0 Xq. T λ0 ps, β T Xq E S ps, Xq | β X 0 c 0 0 Several properties of the efficient score is worth pointing out. First of all, EtSeff p∆, Z, Xq | Xu “ 0 is ensured by EtdM pt, β T 0 Xq | Xu “ 0, hence to preserve the mean zero property, we can replace T T λ10 ps, β T Xq{λ ps, β Xq by any function of s and β T 0 0 0 0 X, say gps, β 0 Xq, and still obtain « (ff ż8 E Xl Sc ps, Xq | β T 0X T ( dM ps, β T gps, β 0 Xq b Xl ´ E 0 Xq “ 0. T E Sc ps, Xq | β 0 X 0 This implies that if we are only aiming at a consistent estimator, we can use an arbitrary function T T gps, β T 0 Xq to replace λ10 ps, β 0 Xq{λ0 ps, β 0 Xq in the efficient score to get a more general martingale integration. imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 5 Second, using (3), by first taking expectation conditional on β T X, we can verify that « (ff ż8 E Xl Sc ps, Xq | β T 0X T ( Y psqλ0 ps, β T gps, β 0 Xq b Xl ´ E 0 Xqds T E Sc ps, Xq | β 0 X 0 ff « ( ż8 E Xl Sc ps, Xq | β T 0X T T T ( EtY psq | β 0 Xu gps, β 0 Xq b EtXl Y psq | β 0 Xu ´ “ E E Sc ps, Xq | β T 0 0X ˆλ0 ps, β T 0 Xqds “ 0. As a consequence, E ż8 0 « E Xl Sc ps, Xq | β T 0X ( gps, β T Xq b X ´ l 0 T E Sc ps, Xq | β 0 X (ff dN psq “ 0. This implies that we can construct estimating equations of the form « (ff n p Xli Yi pZi q | β T Xi ÿ E ∆i gpZi , β T Xi q b Xli ´ (5) “0 ( p Yi pZi q | β T Xi E i“1 for any g, where (6) (7) p Yi pZi q | β Xi E T p Xli Yi pZi q | β T Xi E ( ( řn T T j“1 Kh pβ Xj ´ β Xi qIpZj ě Zi q , řn T T j“1 Kh pβ Xj ´ β Xi q řn T T j“1 Kh pβ Xj ´ β Xi qXlj IpZj ě Zi q . řn T T j“1 Kh pβ Xj ´ β Xi q “ “ Here EtYi pZi q | β T Xi u ” EtYi ptq | β T Xi u|t“Zi and similarly for other terms, Kp¨q is a kernel function and Kh p¨q “ Kp¨{hq{h. Third, we can further relax the estimating equation form to « (ff n p apXli qYi pZi q | β T Xi ÿ E T (8) “0 ∆i gpZi , β Xi q b apXli q ´ ( p Yi pZi q | β T Xi E i“1 by taking advantage of the fact that « (ff T E apX qY pZq | β X l 0 ( E∆gpZ, β T “0 0 Xq b apXl q ´ E Y pZq | β T X 0 for any apXl q. T Fourth, when we choose to estimate λ10 ps, β T 0 Xq{λ0 ps, β 0 Xq, using, for example, the smoothed Kaplan-Meier estimator, we can then obtain the efficient estimator from solving « (ff n p Xli Yi pZi q | β T Xi ÿ p 1 pZi , β T Xi q E λ ∆i (9) “ 0. b Xli ´ ( p i , β T Xi q p Yi pZi q | β T Xi E λpZ i“1 Here we can use a local Nelson-Aalen estimator to estimator the cumulative hazard function p ΛpZ, β T Xq “ ÿ Zi ďZ ∆i Kh pβ T Xi ´ β T Xq . T T j“1 IpZj ě Zi qKh pβ Xj ´ β Xq řn imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 6 The local Nelson-Aalen estimator of hazard function can be obtained from ż8 T p p Kb pt ´ ZqdΛpt|β Xq λpZ, β T Xq “ 0 (10) “ and we estimate the derivative n ÿ i“1 ∆i Kh pβ T Xi ´ β T Xq , T T j“1 IpZj ě Zi qKh pβ Xj ´ β Xq Kb pZi ´ Zq řn p 1 pZ, β T Xq “ BλpZ, p λ β T Xq{Bpβ T Xq n ÿ Kb pZi ´ Zq řn “ ´ (11) ∆i K1h pβ T Xi ´ β T Xq T T j“1 IpZj ě Zi qKh pβ Xj ´ β Xq i“1 ř n T T n 1 ÿ j“1 IpZj ě Zi qKh pβ Xj ´ β Xq T T Kb pZi ´ Zq∆i Kh pβ Xi ´ β Xq řn ` . t j“1 IpZj ě Zi qKh pβ T Xj ´ β T Xqu2 i“1 Here K1h pvq “ BKh pvq{Bv is the first derivative of Kh with respect to its variables, which is a vector, and b is a bandwidth. For any vector or matrix a, let ab2 “ aaT . Among the different constructions of consistent estimators, the estimator obtained from (9) will be shown to achieve the smallest possible variability, hence this estimator is efficient and is what we recommend. The efficient estimator will be the focus of our study. We provide the detailed algorithm of the efficient estimation procedure below. 1. Obtain an initial estimator of β through, for example, hmave (Xia, Zhang and Xu, 2010). r Denote the result β. 2. Replacing EtY pZq | β T Xu, EtXl Y pZq | β T Xu, λpZ, β T Xq and λ1 pZ, β T Xq with their nonparametric estimated versions given in (6), (7), (10) and (11) respectively. Write the p p 1 pZ, β T Xq. p l Y pZq | β T Xu, EtY p pZq | β T Xu, λpZ, resulting estimators as EtX β T Xq and λ T T T T p p p p 3. Plug EtXl Y pZq | β Xu, EtY pZq | β Xu, λpZ, β Xq and λ1 pZ, β Xq into (9) and solve p using β r as starting value. the estimating equation to obtain the efficient estimator β, In performing the nonparametric estimations , bandwidths need to be selected. Because the final estimator is insensitive to the bandwidths, as indicated by condition C2, Lemma 1, Theorems 1 and 2, where a range of different bandwidths all lead to the same asymptotic property, we suggest that one should select the corresponding bandwidths by taking the sample size n to its suitable power to satisfy C2, and then multiply a constant to scale it. For example, when d “ 1, we let r T Xi , let b be n´1{4`1{8 multiplying the h be n´1{4´1{32 multiplying the standard deviation of β standard deviation of Zi . 3. Asymptotics. We will show that the efficient estimator described in Section 2 is rootn consistent, asymptotically normally distributed and achieves the optimal efficiency. Let the parameter space of β be B. We first list some regularity conditions. C1 (The kernel function.) The univariate kernel function Kpxq is symmetric, monotonically ş j decreasing when x ą 0şand differentiable,ş with bounded derivative. In addition, x Kpxqdx “ ş ş ν Kpxqdx ă 8, K 2 pxqdx ă 8, x2 K 2 pxqdx ă 8, K 12 pxqdx ă 8, 0, for 1 ď j ă ν, 0 ă x ş 2 12 ş ş x K pxqdx ă 8, K 22 pxqdx ă 8, x2 K 22 pxqdx ă 8. The d-dimension kernel function is ś a product of d univariate kernel functions, that is Kpuq “ dj“1 Kpuj q for u “ pu1 , ..., ud qT . For simplicity, we use the same K for both univariate and multivariate kernel functions. imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 7 C2 (The bandwidths.) The bandwidths satisfy h Ñ 0, b Ñ 0, nhd`2 b Ñ 8 and nh2ν Ñ 0, where 2ν ą d ` 1. C3 (The boundedness.) The parameter space B is bounded. C4 (The density functions of covariates.) For all β P B, the probability density function of β T X, fβT X pβ T xq, has a compact support and has four derivatives. The function fβT X pβ T xq is bounded away from zero and infinity on the support, and its first four derivatives are bounded uniformly on the support. C5 (The smoothness.) For all β P B, the absolute value of EtXj IpZj ě Zq | β T xu, EtIpZj ě Zq | β T xu, and their first four derivatives are bounded uniformly component wise. The absolute T value of EtXj XT j IpZj ě Zq | β xu and its first two derivatives are bounded uniformly component wise. C6 (The survival function.) For all β P B, the survival function of the event process Spt, β T xq, the conditional expectation of the survival function of the censoring processes EtSc pt, Xq | β T xu and the probability density function of the survival process f pt, β T xq satisfy Bi`j Spt, β T xq{Bti Bpβ T xqj , Bi`j EtSc pt, Xq | β T xu{Bti Bpβ T xqj , Bi`j f pt, β T xq{Bti Bpβ T xqj exist and are bounded and bounded away from zero, for all i ě 0, j ě 0, i ` j ď 4. C7 (The uniqueness.) The equation « ˜ ( ff¸ E Xl Y pZq | β T X λ1 pZ, β T Xq ( “0 b Xl ´ E ∆ λpZ, β T Xq E Y pZq | β T X has a unique solution on B. Because the true parameter β 0 satisfies the equation, hence the unique solution is β 0 . These conditions are quite commonly imposed in nonparametrics, survival analysis and estimating equations and are generally mild. Conditions C1 and C2 contain some basic requirements on the kernel function and the bandwidths, which are common in kernel related works. The boundedness of the parameter space B in C3 is satisfied in most practical problems. Condition C4-C6 impose certain boundedness condition of event time, censoring time, covariates, their expectations and corresponding derivatives. The unique solution requirement in C7 is needed to ensure the convergence of the estimator, which could be further relaxed to local uniqueness if needed. Before presenting the main results, we summarize several preliminary results first. These results highlight the theoretical properties of the kernel based estimators of several conditional expectations, as well as the estimation properties of the hazard function and its derivative, hence are of their own interest. These properties also play an important role in the proof of the Theorems 1 and 2. The proofs of Lemma 1 and both theorems are respectively in the Appendice A.2, A.3 and A.4. Lemma 1. (12) (13) (14) (15) (16) (17) Under the regularity conditions C1-C7 listed above, ( p Y pZq | β T X “ EtY pZq | β T Xu ` Op tpnhq´1{2 ` h2 u, E ( p XY pZq | β T X “ EtXY pZq | β T Xu ` Op tpnhq´1{2 ` h2 u, E ( B B p E Y pZq | β T X “ EtY pZq | β T Xu ` Op tpnh3 q´1{2 ` h2 u T T Bβ X Bβ X ( B p B E XY pZq | β T X “ EtXY pZq | β T Xu ` Op tpnh3 q´1{2 ` h2 u T Bβ X Bβ T X p β T xq “ λpz, β T xq ` Op tpnhbq´1{2 ` h2 ` b2 u λpz, p 1 pz, β T xq “ λ1 pz, β T xq ` Op tpnbh3 q´1{2 ` h2 ` b2 u λ imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 8 uniformly for all Z, β T X. p ´ β Ñ 0 in probaTheorem 1. The estimator obtained from solving (9) is consistent, i.e. β 0 bility when n Ñ 8. Theorem 2. The estimator obtained from solving (9) satisfies ? p ´ β q Ñ N p0, rEtSb2 p∆, Z, Xqus´1 q npβ 0 eff in distribution when n Ñ 8. Here Seff p∆, Z, Xq is given in (4). Thus, the estimator is efficient. Note that because Seff is a martingale, we have EtSb2 eff p∆, Z, Xqu « ż8˜ λ10 ps, β T 0 Xq “ E b Xl ´ λ0 ps, β T 0 0 Xq « ż8˜ λ10 ps, β T Xq 0 b Xl ´ “ E T λ ps, β 0 0 0 Xq E Xl Sc ps, Xq | β T 0X ( T E Sc ps, Xq | β 0 X E Xl Sc ps, Xq | β T 0X ( T E Sc ps, Xq | β 0 X ( ff¸b2 ( ff¸b2 λps, β T 0 XqY psqds dN psq. Therefore, a natural estimator of the estimation variance is the inverse of ) fi˛b2 ! ¨ » T p T xi p Xl Sc pzi , Xq | β n E ÿ p p 1 λ1 pzi , β xi q – ) fl‚ . ! δi ˝ b xil ´ n i“1 p i, β p T xi q p T xi p Sc pzi , Xq | β λpz E 4. Numerical Experiments. 4.1. Simulation. To evaluate the finite sample performance of our method, we perform four simulation studies. In the first study, we generate event times from “ ` ˘ ( ‰ T “ Φ 5ǫ exp 3β T X ` 1 ´ 2 where Φ is the cumulative distribution function (cdf) of the standard normal distribution, ǫ has an exponential distribution with parameter 1, and X follows a standard normal distribution independent with ǫ. We consider d “ 1, p “ 7 and the true parameter values are taken to be β “ p1, 0, ´1, 0, 1, 0, ´1qT . We further generate the covariate dependent censoring times using C “ Φp2X2 ` 2X3 q ` U where U denotes a random variable uniformly distributed on p0, c1 q, where c1 is a constant controlling the proportion of censoring. In the second study, we generate the event times from T “ exppβ T X ` ǫq where ǫ follows an exponential distribution with parameter 1 and each component in X follows independent uniform distribution on p0, 1q. We consider d “ 1, p “ 7 and set the true parameter value to be β “ p1, 1.3, ´1.3, 1, ´0.5, 0.5, ´0.5qT . We generate the censoring time from a uniform distribution on p0, c2 q, where different values of c2 are used to achieve various censoring rate. In the third study, we generate the event times from ( T “ exp 5 ´ 10p1 ´ β T Xq2 ` ǫ imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 9 where ǫ „ Normalp0, 1q, and each component of X is independently distributed with uniform distribution on p0, 1q. We consider d “ 1, p “ 10 and set the true parameter value to be β “ p1, ´0.6, 0, ´0.3, ´0.1, 0, 0.1, 0.3, 0, 0.6qT . The censoring time is generated from C “ U β T c X where T β c “ p0, 0, 0, 1, 1, 0, 0, 0, 0, 0q and U is uniformly distributed on p0, c3 q, and c3 is a constant controlling the censoring proportion. In the last simulation study, we increase d to 2 to further evaluate the performance of the proposed method. We set the event times + # 2 ÿ 2 p1 ´ β T T “ exp 5 ´ 10 j Xq ` ǫ j“1 where ǫ „ Normalp0, 1q and each component of X is independently distributed with uniform distribution on p0, 1q, β j , j “ 1, 2, denotes the jth column of β with p “ 6. The censoring time is generated from a uniform distribution on p0, c4 q, where c4 controls the censoring rate. These studies are designed to resemble and extend the simulation studies considered in Xia, Zhang and Xu (2010), which proposed hmave, the best method so far in the literature for dimension reduction under censored data. In fact, we compared our results with those from hmave. In all the studies, we generated 1000 data sets. In the first study, sample size n “ 100 was considered. We set the sample sizes to n “ 500 for the second study and to n “ 200 for all the remaining studies. The results of the first simulation study are given in Table 1 and Figure 1, where we considered three different censoring rates, 0%, 20% and 40% separately. From these results, we can see that the semiparametric method we proposed generally performs better, and often is much better than hmave, in that it has much smaller absolute biases as well as smaller sample standard errors. The semiparametric method also yields smaller difference between the estimated projection matrix p β p T βq p ´1 β p T and the true projection matrix P ” βpβ T βq´1 β T , in that both the mean and p ” βp P p ´ P are much smaller based on the semiparametric variance of the largest singular value of P method than based on hmave. The same results are also presented in Figure 1 to provide a quick visual inspection. Table 1 p ´ β of Results of study 1, based on 1000 simulations with sample size 100. “bias” is the absolute value of meanpβq each component in β, “sd” is the sample standard errors of the corresponding estimation. The last column is the p ´ P. mean and standard errors of the largest singular value of P hmave semi hmave semi hmave semi true β2 0 β3 ´1 bias sd bias sd 0.0010 0.1700 0.0025 0.1298 0.0256 0.2344 0.0129 0.1333 bias sd bias sd 0.0747 0.1688 0.0003 0.1301 0.0994 0.2236 0.0143 0.1339 bias sd bias sd 0.0056 0.1812 0.0012 0.1345 0.0261 0.2502 0.0130 0.1352 β4 β5 0 1 No censoring 0.0099 0.0058 0.1710 0.2320 0.0071 0.0059 0.1314 0.1277 20% censoring 0.0095 0.0042 0.1663 0.2281 0.0064 0.0079 0.1300 0.1268 40% censoring 0.0078 0.0079 0.1784 0.2462 0.0064 0.0090 0.1353 0.1305 β6 0 β7 ´1 λmax 0.0052 0.1643 0.0071 0.1337 0.0182 0.2264 0.0033 0.1335 0.2208 0.1578 0.0903 0.0622 0.0099 0.1612 0.0055 0.1320 0.0228 0.2217 0.0054 0.1294 0.2256 0.1560 0.0928 0.0574 0.0169 0.1707 0.0103 0.1351 0.0189 0.2416 0.0056 0.1354 0.2314 0.1604 0.0948 0.0694 imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 10 β =0 β3=−1 0% censoring 2 β6=0 5 β7=−1 2 2 2 2 2 1.5 1.5 1.5 1.5 1.5 1.5 1 1 1 1 1 1 0.5 0.5 0.5 0.5 0.5 0.5 0 0 0 0 0 0 −0.5 −0.5 −0.5 −0.5 −0.5 −0.5 −1 −1 −1 −1 −1 −1 −1.5 −1.5 −1.5 −1.5 −1.5 −1.5 −2 hmave −2 semi β2=0 20% censoring β =1 β4=0 2 hmave −2 semi hmave β3=−1 −2 semi hmave −2 semi hmave β5=1 β4=0 −2 semi 2 2 2 2 2 1.5 1.5 1.5 1.5 1.5 1.5 1 1 1 1 1 1 0.5 0.5 0.5 0.5 0.5 0.5 0 0 0 0 0 0 −0.5 −0.5 −0.5 −0.5 −0.5 −0.5 −1 −1 −1 −1 −1 −1 −1.5 −1.5 −1.5 −1.5 −1.5 −1.5 hmave semi −2 hmave −2 hmave β3=−1 β2=0 40% censoring semi semi −2 hmave β4=0 semi −2 hmave β5=1 semi −2 hmave β6=0 2 2 2 2 2 1.5 1.5 1.5 1.5 1.5 1.5 1 1 1 1 1 1 0.5 0.5 0.5 0.5 0.5 0.5 0 0 0 0 0 0 −0.5 −0.5 −0.5 −0.5 −0.5 −0.5 −1 −1 −1 −1 −1 −1 −1.5 −1.5 −1.5 −1.5 −1.5 −1.5 hmave semi −2 hmave semi −2 hmave semi −2 hmave semi −2 hmave semi β7=−1 2 −2 semi β7=−1 β6=0 2 −2 hmave semi −2 hmave Fig 1. Boxplot of hmave and the semiparametric methods of study 1. First row: no censoring; Second row: 20% censoring rate; Third row: 40% censoring rate. Dashed line: True β. The results of the second study study are presented in Tables 2, and Figures 2, where the same conclusion can be drawn as in the first study. The superiority of the semiparametric method to hmave is even more prominent in the third study, as reflected in Table 3 and Figure 3. Here, the semiparametric method is substantially more accurate in estimating each component in β, yielding smaller biases and variances. The largest singular value of the difference between the estimated and true projection matrices is also much smaller for the semiparametric method in comparison with hmave. When we increased d to 2 in the last simulation, the semiparametric method continues to generate satisfactory results, see Table 4 and Figure 4. In this case, the performance of hmave is rather concerning, possibly caused by the difficulties associated with multiple indices. imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 semi 11 Table 2 p ´ β of Results of study 2, based on 1000 simulations with sample size 200. “bias” is the absolute value of meanpβq each component in β, “sd” is the sample standard errors of the corresponding estimation. The last column is the p ´ P. mean and standard errors of the largest singular value of P hmave semi hmave semi hmave semi true β2 1.3 β3 ´1.3 bias sd bias sd 0.1958 7.0919 0.2483 5.3549 0.3428 7.6671 0.0617 4.3952 bias sd bias sd 0.5650 4.2947 0.0864 1.9872 0.5097 3.4980 0.0289 0.5161 bias sd bias sd 0.0998 0.4603 0.0158 0.3976 0.1024 0.4678 0.0107 0.4678 β4 β5 1 ´0.5 No censoring 0.1644 0.0137 9.8179 6.2261 0.0929 0.2354 2.5283 5.9618 20% censoring 0.3841 0.1947 2.4377 1.5136 0.0167 0.0109 1.2467 0.8233 40% censoring 0.0566 0.0381 0.3877 0.3085 0.0053 0.0128 0.3492 0.5517 β6 0.5 β7 ´0.5 λmax 0.3699 10.976 0.1273 3.2538 0.1672 5.6033 0.0646 1.9437 0.4247 0.1442 0.2915 0.1133 0.2155 2.2722 0.0537 0.9729 0.2656 2.4448 0.1300 3.8902 0.3212 0.1356 0.1448 0.0909 0.0386 0.2939 0.0063 0.2718 0.0371 0.3085 0.0062 0.2873 0.1991 0.1303 0.0781 0.0720 Table 3 p ´ β of Results of study 3, based on 1000 simulations with sample size 200. “bias” is the absolute value of meanpβq each component in β, “sd” is the sample standard errors of the corresponding estimation. The last column is the p ´ P. mean and standard errors of the largest singular value of P hmave semi hmave semi hmave semi true β2 ´0.6 β3 0 β4 -0.3 bias sd bias sd 0.3711 17.267 0.0124 0.1639 0.3643 10.472 0.0044 0.1538 1.3056 35.110 0.0175 0.1523 bias sd bias sd 1.4974 41.451 0.0035 0.1600 2.3355 44.735 0.0003 0.1584 1.6021 66.302 0.0239 0.1722 bias sd bias sd 0.5909 20.946 0.0209 0.1500 5.5304 146.58 0.0004 0.1514 3.2835 68.000 0.0198 0.1518 β5 -0.1 β6 β7 0 0.1 No censoring 0.5394 0.0913 0.1954 16.246 9.449 16.931 0.0035 0.0026 0.0111 0.1563 0.1585 0.1535 20% censoring 0.4699 2.3620 1.6553 49.280 40.673 47.488 0.0063 0.0023 0.0072 0.1716 0.1555 0.1615 40% censoring 0.8370 1.775 5.6482 25.442 38.877 145.82 0.0062 0.0041 0.0138 0.1506 0.1492 0.1560 β8 0.3 β9 0 β10 0.6 λmax 0.4499 26.510 0.0323 0.1590 0.2092 12.342 0.0013 0.1543 0.3660 17.304 0.0180 0.1631 0.8706 0.2953 0.2337 0.0637 0.5311 58.485 0.0184 0.1531 1.6596 57.025 0.0035 0.1633 2.9426 72.228 0.0177 0.1595 0.8822 0.2952 0.2148 0.0691 4.8272 90.530 0.0244 0.1453 1.2442 58.178 0.0021 0.1503 0.6951 23.032 0.0166 0.1579 0.8382 0.2900 0.2656 0.0556 imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 12 Table 4 p ´ β of Results of study 4, based on 1000 simulations with sample size 200. “bias” is the absolute value of meanpβq each component in β, “sd” is the sample standard errors of the corresponding estimation. The last column is the p ´ P. mean and standard errors of the largest singular value of P hmave semi hmave semi hmave semi true β3,1 2.75 β4,1 -0.75 β5,1 -1 bias sd bias sd 5.8883 130.6 0.1609 0.3393 3.4252 109.3 0.0914 0.2143 0.4704 24.214 0.0609 0.2545 bias sd bias sd 4.2011 64.499 0.0846 0.3433 2.8472 39.786 0.0358 0.2068 1.7685 56.389 0.0311 0.2018 bias sd bias sd 3.2328 14.712 0.0986 0.3604 0.5529 19.789 0.0555 0.2173 2.0826 17.661 0.0246 0.2168 β6,1 β3,2 2.0 -3.125 No censoring 2.9062 43.257 101.81 1091.9 0.1388 0.1257 0.2837 0.3674 20% censoring 3.4267 3.5963 41.570 20.496 0.0596 0.1133 0.2646 0.4051 40% censoring 1.0118 4.2734 19.938 26.892 0.0808 0.1420 0.2991 0.4864 β4,2 -1.125 β5,2 1.0 β6,2 -2.0 λmax 38.079 939.06 0.1002 0.2619 8.0696 174.9 0.0372 0.2559 33.551 855.8 0.0887 0.3121 0.8351 0.1116 0.1791 0.0788 0.4313 24.564 0.0726 0.2690 0.6443 23.323 0.0305 0.2374 0.9892 22.339 0.0724 0.2952 0.9273 0.1038 0.0971 0.0777 3.6817 73.550 0.0868 0.2627 2.0900 29.838 0.0451 0.2645 2.9417 31.115 0.0950 0.3099 0.9363 0.1071 0.0915 0.0898 imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 13 β =1.3 β =−1.3 0% censoring 2 β =0.5 5 β =−0.5 6 7 3 3 3 3 2 2 2 2 2 2 1 1 1 1 1 1 0 0 0 0 0 0 −1 −1 −1 −1 −1 −1 −2 −2 −2 −2 −2 −2 −3 hmave semi −3 hmave β =1.3 semi −3 hmave β =−1.3 2 20% censoring β =−0.5 4 3 −3 semi β =1 3 −3 hmave −3 semi hmave β =−0.5 4 semi hmave β =0.5 5 7 3 3 3 3 3 2 2 2 2 2 2 1 1 1 1 1 1 0 0 0 0 0 0 −1 −1 −1 −1 −1 −1 −2 −2 −2 −2 −2 −2 −3 hmave semi −3 hmave β =1.3 semi β =−1.3 semi −3 hmave β =1 3 2 −3 hmave semi −3 hmave β =−0.5 4 semi hmave β =0.5 5 7 3 3 3 3 3 2 2 2 2 2 2 1 1 1 1 1 1 0 0 0 0 0 0 −1 −1 −1 −1 −1 −1 −2 −2 −2 −2 −2 −2 −3 hmave semi −3 hmave semi −3 hmave semi −3 hmave semi semi β =−0.5 6 3 −3 semi β =−0.5 6 3 −3 40% censoring β =1 3 3 −3 hmave semi hmave Fig 2. Boxplot of hmave and the semiparametric methods of study 2. First row: no censoring; Second row: 20% censoring rate; Third row: 40% censoring rate. Dashed line: True β. imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 semi 14 β =−0.6 β =0 0% censoring 2 β =0 5 β =0.1 6 β =0.3 7 β =0 8 β =0.6 9 10 4 4 4 4 4 4 4 3 3 3 3 3 3 3 3 3 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 −1 −1 −1 −1 −1 −1 −1 −1 −1 −2 −2 −2 −2 −2 −2 −2 −2 −2 −3 −3 −3 −3 −3 −3 −3 −3 −3 −4 −4 −4 −4 −4 −4 −4 −4 hmave semi hmave semi β3=0 2 20% censoring β =−0.1 4 4 β =−0.6 hmave semi β4=−0.3 hmave semi β5=−0.1 hmave semi β6=0 hmave semi β7=0.1 hmave semi β8=0.3 hmave semi −4 β9=0 4 4 4 4 4 4 4 4 3 3 3 3 3 3 3 3 3 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 −1 −1 −1 −1 −1 −1 −1 −1 −1 −2 −2 −2 −2 −2 −2 −2 −2 −2 −3 −3 −3 −3 −3 −3 −3 −3 −3 −4 −4 −4 −4 −4 −4 −4 −4 hmave semi hmave semi β =0 2 hmave semi β =−0.3 3 hmave semi β =−0.1 4 hmave semi β =0 5 hmave semi β =0.1 6 hmave semi β =0.3 7 hmave semi −4 β =0 8 4 4 4 4 4 4 4 3 3 3 3 3 3 3 3 3 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 −1 −1 −1 −1 −1 −1 −1 −1 −1 −2 −2 −2 −2 −2 −2 −2 −2 −2 −3 −3 −3 −3 −3 −3 −3 −3 −3 −4 −4 −4 −4 −4 −4 −4 −4 hmave semi hmave semi hmave semi hmave semi hmave semi hmave semi hmave semi semi 10 4 semi hmave β =0.6 9 4 hmave hmave semi β10=0.6 4 β =−0.6 40% censoring β =−0.3 3 4 −4 hmave semi Fig 3. Boxplot of hmave and the semiparametric methods of study 3. First row: no censoring; Second row: 20% censoring rate; Third row: 40% censoring rate. Dashed line: True β. imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 15 β =2.75 β =−0.75 0% censoring 2 β =2 4 β =−3.125 5 β =−1.125 6 β =1 7 β =−2 8 9 8 8 8 8 8 8 8 6 6 6 6 6 6 6 6 4 4 4 4 4 4 4 4 2 2 2 2 2 2 2 2 0 0 0 0 0 0 0 0 −2 −2 −2 −2 −2 −2 −2 −2 −4 −4 −4 −4 −4 −4 −4 −4 −6 −6 −6 −6 −6 −6 −6 −6 −8 −8 −8 −8 −8 −8 −8 hmave semi hmave β =2.75 semi hmave β3=−0.75 2 20% censoring β =−1 3 8 semi hmave β4=−1 semi hmave β5=2 semi hmave β6=−3.125 semi −8 hmave β7=−1.125 semi hmave β8=1 β9=−2 5 5 5 5 5 5 5 5 4 4 4 4 4 4 4 4 3 3 3 3 3 3 3 3 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 −1 −1 −1 −1 −1 −1 −1 −1 −2 −2 −2 −2 −2 −2 −2 −2 −3 −3 −3 −3 −3 −3 −3 −3 −4 −4 −4 −4 −4 −4 −4 −5 hmave semi −5 β =2.75 semi −5 β =−0.75 2 40% censoring hmave hmave semi −5 β =−1 3 hmave semi −5 β =2 4 hmave semi −5 β =−3.125 5 hmave semi −5 β =−1.125 6 −4 hmave semi −5 β =1 7 5 5 5 5 5 5 4 4 4 4 4 4 4 3 3 3 3 3 3 3 3 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 −1 −1 −1 −1 −1 −1 −1 −1 −2 −2 −2 −2 −2 −2 −2 −2 −3 −3 −3 −3 −3 −3 −3 −3 −4 −4 −4 −4 −4 −4 −4 semi −5 hmave semi −5 hmave semi −5 hmave semi −5 hmave semi −5 hmave semi −5 semi 9 5 4 hmave hmave β =−2 8 5 −5 semi −4 hmave semi −5 hmave Fig 4. Boxplot of hmave and the semiparametric methods of study 4. First row: no censoring; Second row: 20% censoring rate; Third row: 40% censoring rate. Dashed line: True β. We also performed an additional experiment to further assess the finite sample performance of the asymptotic results established in Section 3. To this end, we generate covariates X from a standard normal distribution and event times T from a distribution with hazard function + # 2 ÿ ` T ˘ λpt|Xq “ λ0 ptq exp β j X , j“1 where the baseline hazard λ0 ptq “ t and the dimension of β is d “ 2, p “ 6. We use the parameter values β “ tp2.75, ´0.75, ´1, 2qT ; p´3.125, ´1.125, 1, ´2qT uT , and adopt the same censoring process as in the second study to yield 40% censoring rate. We carry out 1000 simulations and consider sample sizes n “ 100, 500 and 1000. The estimation results, together with sample standard errors, average of the estimated standard deviations and coverage probabilities of the 95% confidence intervals are given in Table 5. These results indicate that the large sample properties of the estimator requires more sample size than 1000. However, the general trend is that when sample size increases, the results are approaching what we expect based on the asymptotic results, in that the sample standard errors and their estimated versions are becoming closer to each other, and the 95% coverage probabilities are getting closer to the nominal level. The phenomenon that imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 semi 16 asymptotic result requires very large sample size to illustrate itself is quite common in survival data analysis and is not unique to our semiparametric method. Due to the limited sample size in practice, we recommend to use bootstrap to assess estimation variability. Table 5 Results of study 5, based on 1000 simulations with sample size 100, 500, 1000 respectively. “bias” is the absolute p ´ β of each component in β, “sd” is the sample standard errors of the corresponding estimation, value of meanpβq p component, “95%” is the sample coverage of the 95% “p σ ” is the mean of the estimated standard errors of β confidence intervals. β31 2.75 β41 -0.75 β51 -1 bias sd σ p 95% 0.3995 0.5760 0.3868 0.7100 0.5031 0.4236 0.3188 0.6577 0.2066 0.4673 0.3312 0.8051 0.1790 0.2741 0.1585 0.6663 0.1258 0.1714 0.1371 0.8022 0.0714 0.2177 0.1644 0.8298 bias sd σ p 95% 0.0611 0.1951 0.1062 0.8060 0.0492 0.1451 0.1113 0.8830 0.0188 0.1555 0.1134 0.8783 bias sd σ p 95% β61 β32 2.0 -3.125 n “ 100 0.3799 0.5515 0.5608 0.6163 0.3427 0.3956 0.7034 0.6416 n “ 500 0.1338 0.2100 0.2380 0.2979 0.1659 0.2683 0.7566 0.8127 n “ 1000 0.0423 0.0695 0.1538 0.1867 0.1190 0.1823 0.8621 0.9268 β42 -1.125 β52 1.0 β62 -2.0 0.5349 0.4376 0.3131 0.6292 0.1757 0.4772 0.3331 0.8089 0.3395 0.5377 0.3602 0.7414 0.1489 0.1897 0.2179 0.8773 0.07386 0.2202 0.2538 0.9125 0.1340 0.2244 0.2558 0.8764 0.0467 0.1433 0.1712 0.9705 0.0209 0.1650 0.1749 0.9515 0.0448 0.1711 0.1740 0.9287 4.2. AIDS Application. We apply the proposed method to analyze the HIV data from AIDS Clinical Trials Group Protocol 175 (ACTG175) (Hammer et al. (1996)). In this study, 2137 HIVinfected subjects were randomized to receive one of four treatments: zidovudine (ZDV) monotherapy, ZDV plus didanosine, ZDV plus zalcitabine and ddI monotherapy. As in Geng, Lu and Zhang (2015) and Jiang et al. (2017), the survival time of interest was chosen as the time to having a larger than 50% decline in the CD4 count, or progressing to AIDS or death, whichever comes first. Besides the treatments, there were 12 covariates included in our study, specifically, patient age in years at baseline (X1 ), patient weight in kilogram at baseline (X2 ), hemophilia indicator (X3 ), homosexual activity (X4 ), history of IV drug use (X5 ), Karnofsky score on a scale of 0-100 (X6 ), race (X7 ), gender (X8 ), antiretroviral history (X9 ), symptomatic indicator (X10 ), number of CD4 at baseline (X11 ), number of CD8 at baseline (X12 ), treatment indicator (X13 ), where we coded X13 “ 0 for treatment ZDV+ddl and X13 “ 1 for treatment ZDV+Zal. As in Jiang et al. (2017), we only analyzed data from the two composite treatments: ZDV plus didanosine and ZDV plus zalcitabine, which had been shown to have significantly better survival than the other two treatments (Geng, Lu and Zhang, 2015). This subset of data contains 1046 subjects with the censoring rate around 75%. In addition, each covariate is standardized respectively with no obvious outliers and no missing values. To determine the proper reduced space dimension d, we employ the Validated Information Criterion (VIC) (Ma et al., 2015), where the d corresponding to the smallest VIC value is selected. In the example, the VIC value at d “ 1 is 90.38. Further, when d ě 2, the VIC values are all greater than 180.7 which result from the penalty term alone. Hence we choose d “ 1 as the final model. p under the selected model, with the corresponding Table 6 contains the estimated coefficient β’s estimation standard errors and p-values. Here, we implemented the semiparametric estimator to obtain these results due to its superior theoretical and numerical performance. p , all covariates are The results in Table 6 indicate that in forming the index described by β ¨,1 imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 17 significant except hemophilia indicator (X3 ), gender (X8 ) and number of CD4 at baseline (X11 ). The estimated cumulative hazard functions are also reported in Figure 5, where it is plotted as a function of time (upper left panel), a function of the covariate index β T x (upper right panel) and as a function of both (bottom panel). Specifically, in plotting the cumulative hazard as a function of time t, we fixed the covariate index at three different sets of covariate values, respectively X1:12 “ p40, 60, 1, 0, 0, 80, 0, 0, 0, 1, 200, 800qT , X1:12 “ p20, 70, 1, 0, 0, 80, 0, 1, 0, 1, 200, 800qT , X1:12 “ p60, 70, 1, 0, 0, 20, 0, 0, 0, 1, 200, 200qT , in combination with the treatment indicator of both X13 “ 0 and X13 “ 1. Based on the plots, the estimated cumulative hazard of treatment ZDV+ddl is slightly larger than that of treatment ZDV+Zal in all scenarios. In plotting the estimated cup T x, we fixed the time at t “ 100, 500 and 1000. p as a function of the index β mulative hazard Λ Finally, we also plotted the cumulative hazard as a function of two variables t and β T x using the contour plot, where the hazard values are explicitly written out on each contour. Table 6 The estimated coefficients, standard errors and p-value in AIDS data. est std p-value p β 2,1 0.115 0.039 0.003 p β 3,1 -0.002 0.039 0.965 p β 4,1 0.093 0.039 0.017 p β 5,1 0.088 0.037 0.017 p β 6,1 -0.090 0.043 0.036 p β 7,1 0.231 0.046 0.001 p β 8,1 -0.003 0.036 0.928 p β 9,1 -0.178 0.046 0.001 p β 10,1 0.058 0.035 0.100 p β 11,1 -0.031 0.042 0.457 p β 12,1 0.201 0.033 0.001 p β 13,1 0.156 0.038 0.001 5. Discussion. We have considered a very general model for analyzing time to event data subject to censoring. The model allows the event times to link to the covariate indices in an unspecified fashion. Because both the number of indices and the functional form of the linkage to the indices are data determined, conceptually the model is maximally flexible. In practice, relatively low number of indices are expected to avoid curse of dimensionality. The work is conducted without requiring covariate independent censoring. Instead, it only requires event independent censoring conditional on covariates, which is the minimum requirement for identification. We derived a class of estimators which are consistent and asymptotically normal. We also proposed a procedure to construct the semiparametric efficient estimator that achieves the optimal estimation variability among all possible consistent estimators. imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 18 25 8 Estimated cumulative hazard function 7 6 Estimated cumulative hazard function Scenario_1, ZDV + ddI Scenario_2, ZDV + ddI Scenario_3, ZDV + ddI Scenario_1, ZDV + Zal Scenario_2, ZDV + Zal Scenario_3, ZDV + Zal 5 4 3 2 T=100 T=500 T=1000 20 15 10 5 1 0 200 400 600 Event time (a) 800 1000 0 −6 1200 −4 −2 0 5 2 12 2 2 4 10 4 0 2 T β X 1 6 6 4 −2 8 6 8 −3 6 8 10 4 8 12 10 200 12 14 14 8 10 10 62 4 −5 6 14 2 3 −4 4 16 4 −1 2 T βX (b) 16 400 600 Event time (c) Estimated cumulative hazard function 0 800 16 1000 2 p in AIDS data. (a). Comparisons of Λ p as a function of t between Fig 5. Estimated cumulative hazard function Λ p as a function of β p T X at treatments ZDV+ddl and ZDV+Zal when other covariates are fixed at three indices. (b). Λ p T X. p as a function of T and β T “ 100, 500, 1000. (c). Contour plot of Λ Appendix. A.1. Proof of Proposition 1. The result of Λ1 is obvious. To obtain Λ2 , let hpt, β T 0 X, γq “ T T Xq. Hence X, γq is a submodel of λpt, β X, γq{Bγ, where λpt, β Blogλpt, β T 0 0 0 Blogf pX, Z, ∆q Bγ żZ Bλps, β T BlogλpZ, β T 0 X, γq 0 X, γq “ ∆ ´ ds γ Bγ 0 żZ T T hps, β T “ ∆hpZ, β 0 X, γq ´ 0 X, γqλps, β 0 Xqds 0 imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 19 “ ż8 0 T hps, β T 0 X, γqdM ps, β 0 Xq. T Because λ0 pt, β T 0 Xq can be any positive function, hps, β 0 X, γq can be any function. We denote it hps, β T 0 Xq. This leads to the form of Λ2 . Similar derivation leads to Λ3 . It is easy to verify that Λ1 K Λ2 and Λ1 K Λ3 . Because C T | X, the martingale integrations associated with M pt, β T 0 Xq and MC pz, Xq are also independent conditional on X, hence Λ2 K Λ3 . This completes the proof. A.2. Proof of Lemma 1. For notational convenience, we prove the results for d “ 1 and assume the first component of β is 1. The first four results are obtained from the uniform convergence property of the kernel estimation (Mack and Silverman, 1982) under conditions C1-C2. Specifically, to derive the first four results, we first establish the following preliminary conclusion for any Z and β T X, (A.1) n 1 ÿ Kh pβ T Xj ´ β T xq “ fβT X pβ T xq ` Op pn´1{2 h´1{2 ` h2 q. n j“1 To see this, we compute the absolute bias of the left hand side of (A.1) as ˇ # ˇ + n ˇ ˇ 1 ÿ ˇ T T T ˇ E Kh pβ Xj ´ β xq ´ fβT X pβ xqˇ ˇ ˇ ˇ n j“1 ˇ ˇ ˇ ˇ “ ˇEKh pβ T Xj ´ β T xq ´ fβT X pβ T xqˇ ˇ ˇż ¸ ˜ ˇ ˇ 1 β T xj ´ β T x ˇ ˇ fβT X pβ T xj qdβ T xj ´ fβT X pβ T xqˇ K “ ˇ ˇ ˇ h h ˇż ˇ ˇ ˇ “ ˇˇ KpuqfβT X pβ T x ` huqdu ´ fβT X pβ T xqˇˇ ˇż ˇ * " ˇ ˇ 1 2 T ˚ 2 2 T ˇ T 1 T ˇ “ ˇ Kpuq fβT X pβ xq ` fβT X pβ xqhu ` fβT X pβ x qh u du ´ fβT X pβ xqˇ 2 ż 2 h sup |f 2T pβ T xq| u2 Kpuqdu, ď 2 βT x β X where throughout the text, β T x˚ is on the line connecting β T x and β T x ` hu, and the variance to be # + n 1 ÿ T T var Kh pβ Xj ´ β xq n j“1 “ “ “ “ 1 varKh pβ T Xj ´ β T xq n (2 ı 1” EKh2 pβ T Xj ´ β T xq ´ EKh pβ T Xj ´ β T xq n „ż  1 1 2 T T T T 2 T 2 K tpβ xj ´ β xq{hufβ T x pβ xj qdβ xj ´ fβT x pβ xq ` Oph q n h2 ż 1 1 K 2 puqfβT x pβ T x ` huqdu ´ fβ2 T x pβ T xq ` Oph2 {nq nh n imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 20 ď 1 f T pβ T xq nh β x ż K 2 puqdu ` h sup |f 2T pβ T xq| 2n βT x β x ż u2 K 2 puqdu ` 1 2 |f T pβ T xq| ` Oph2 {nq. n β x Therefore, we have n 1 ÿ Kh pβ T Xj ´ β T xq “ fβT X pβ T xq ` Op pn´1{2 h´1{2 ` h2 q n j“1 uniformly under conditions C1, C2 and C4. Following similar derivations, we have # + n 1 ÿ E ´ Xj IpZj ě ZqKh1 pβ T Xj ´ β T xq n j“1 ( “ E ´Xj IpZj ě ZqKh1 pβ T Xj ´ β T xq ż ( 1 xj Ipc ě ZqIpt ě ZqK 1 pβ T xj ´ β T xq{h “ ´ 2 h ˆfc pc, xj qf pt, β T xj qfX|βT X pxj | β T xj qfβT X pβ T xj qdcdtdxj dβ T xj ż ( 1 “ ´ xj K 1 pβ T xj ´ β T xq{h Sc pZ, xjl , β T xj qSpZ, β T xj qfXl |βT X pxjl | β T xj q 2 h ˆfβT X pβ T xj qdxjl dβ T xj ż 1 T 1 T T T pβ T x ` hu, xT “ ´ jl q K puqSc pZ, xjl , β x ` huqSpZ, β x ` huqfXl |βT X pxjl | β x ` huq h ˆfβT X pβ T x ` huqdxjl du ż ż 1 T T T T T pβ T x, xT q S pZ, x , β xqSpZ, β xqf px | β xqf pβ xqdx K 1 puqdu “ ´ T T c jl jl jl Xl |β X jl β X h ż ) B ! T 1 T T T T T T pβ x, x q S pZ, x , β xqSpZ, β xqf px | β xqf pβ xq dxjl ´ c jl jl Xl |βT X jl βT X h Bβ T x ˆhuK 1 puqdu ż ! ) 1 B2 T T T T T T T pβ x, x q S pZ, x , β xqSpZ, β xqf px | β xqf pβ xq dxjl ´ T T c jl jl Xl |β X jl β X 2h Bpβ T xq2 ż ˆ h2 u2 K 1 puqdu ij ) ! 1 B3 T ˚ T ˚ T ˚ T ˚ T T T ´ q S pZ, x , β x qSpZ, β x qf px | β x qf pβ x q dxjl pβ x, x T T c jl jl Xl |β X jl β X 6h Bpβ T xq3 ˆh3 u3 K 1 puqdu ż ) B ! T T T T T T T pβ x, x q S pZ, x , β xqSpZ, β xqf px | β xqf pβ xq dxjl “ T T c jl jl jl Xl |β X β X Bβ T x ż ż ) ! h2 B3 T ˚ T ˚ T ˚ T ˚ T T T q S pZ, x , β x qSpZ, β x qf pβ x, x ´ T pxjl | β x qf T pβ x q dxjl c jl jl X |β X β X l 6 Bpβ T xq3 ˆu3 K 1 puqdu B “ SpZ, β T xqfβT X pβ T xqEtXj Sc pZ, Xj q | β T xu Bβ T x ż ( B3 h2 SpZ, β T x˚ qfβT X pβ T x˚ qE Xj Sc pZ, Xj q | β T x˚ u3 K 1 puqdu ´ T 6 Bpβ xq3 imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 21 “ B fβT X pβ T xqEtXj IpZj ě Zq | β T xu T Bβ x ż ( h2 B3 ´ fβT X pβ T x˚ qE Xj IpZj ě Zq | β T x˚ u3 K 1 puqdu. T 6 Bpβ xq3 Hence the absolute bias is ˇ # ˇ + n ˇ ˇ 1 ÿ B ˇ T T ˇ f Xj IpZj ě ZqKh1 pβ T Xj ´ β T xq ´ T pβ xqEtXj pZj ě Zq | β xuˇ ˇE ´ ˇ ˇ n j“1 Bβ T x β X ˇ ˇ 2ż ˇ ˇ h ( 3 1 B3 T ˚ T ˚ ˇ ˇ f u K puqdu “ ˇ´ T pβ x qE Xj IpZj ě Zq | β x β X ˇ 6 Bpβ T xq3 ˇ ˇ " * ż ˇ B3 (ˇ h2 T T 2 ˇ ˇ sup ď f T pβ xqE Xj IpZj ě Zq | β x ˇ 3 u Kpuqdu 6 βT x ˇ Bpβ T xq3 β X and + n 1 ÿ Xj IpZj ě ZqKh1 pβ T Xj ´ β T xq var ´ n j“1 (T 1” E Xj IpZj ě ZqKh1 pβ T Xj ´ β T xq ut Xj IpZj ě ZqKh1 pβ T Xj ´ β T xq “ n (T ı ( ´ EXj IpZj ě ZqKh1 pβ T Xj ´ β T xq EXj IpZj ě ZqKh1 pβ T Xj ´ β T xq ˆż ( 1 1 12 “ xj xT pβ T xj ´ β T xq{h j IpZj ě ZqK 4 n h # ˆfc pc, xj qf pt, β T xj qfXl |βT X pxjl | β T xj qfβT X pβ T xj qdcdtdxjl dβ T xj ¸ „ T „ B B f T pβ T xqEtXj IpZj ě Zq | β T xu f T pβ T xqEtXj IpZj ě Zq | β T xu ` Oph2 q ´ Bβ T x β X Bβ T x β X ż 1 1 T T T T T “ pβ x ` hu, xT jl q pβ x ` hu, xjl qSc pZ, xjl , β x ` huq n h3 ˆSpZ, β T x ` huqfXl |βT X pxjl | β T x ` huqfβ T X pβ T x ` huqdxj K 12 puqdu `Op1{nq ż 1 T T T T T T T “ pβ T x, xT jl q pβ x, xjl qSc pZ, xjl , β xqSpZ, β xqfβT X pβ xqfXl |βT X pxjl | β xqdxjl nh3 ż ˆ K 12 puqdu ij 1 B2 T ˚ T ˚ T T ˚ T ` pβ T x˚ , xT jl q pβ x , xjl qSc pZ, xjl , β x qSpZ, β x q 2nh3 Bpβ T xq2 ˆfβT X pβ T x˚ qfXl |βT X pxjl | β T x˚ qdxjl h2 u2 K 12 puqdu ` Op1{nq ˇ ˇż 1 ˇ ˇ T T T sup ˇfβT X pβ xqEtXj Xj IpZj ě Zq | β xuˇ K 12 puqdu ď 3 nh βT x ˇ ˇż ˇ B2 ˇ 1 T ˚ T T ˚ ` sup ˇˇ fβT X pβ x qEtXj Xj IpZj ě Zq | β x uˇˇ u2 K 12 puqdu ` Op1{nq. T 2nh βT x˚ Bpβ xq2 imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 22 So n 1 ÿ Xj IpZj ě ZqKh1 pβ T Xj ´ β T xq n j“1 “ ´ (A.2) B f T pβ T xqEtXj IpZj ě Zq | β T xu ` Op pn´1{2 h´3{2 ` h2 q Bβ T x β X uniformly under conditions C1-C2. We next show ´ (A.3) n 1 ÿ 1 T K pβ Xj ´ β T xq “ fβ1 T X pβ T xq ` Op pn´1{2 h´3{2 ` h2 q. n j“1 h To see this, we compute the absolute bias of the left hand side as ˇ ˇ # + n ˇ ˇ 1 ÿ 1 T ˇ ˇ Kh pβ Xj ´ β T xq ´ fβT X pβ T xqˇ ˇE ´ ˇ ˇ n j“1 ˇ ˇ ( ˇ ˇ “ ˇE ´Kh1 pβ T Xj ´ β T xq ´ fβT X pβ T xqˇ ˇ ˇż ˜ ¸ ˇ ˇ 1 1 β T xj ´ β T x ˇ T T T ˇ fβT X pβ xj qdβ xj ´ fβT X pβ xqˇ “ ˇ ´ 2K ˇ ˇ h h ˇż ˇ ˇ ˇ 1 “ ˇˇ ´ K 1 puqfβ T X pβ T x ` huqdu ´ fβT X pβ T xqˇˇ h ˇż " * ˇ 1 1 1 p3q T ˚ 3 3 1 T 1 2 T T 2 2 “ ˇˇ ´ K puq fβT X pβ xq ` fβT X pβ xqhu ` fβT X pβ xqh u ` fβT X pβ x qh u du h 2 6 ˇ ˇ ´fβT X pβ T xqˇ ˇ ˇ ż ˇ ˇ 1 h2 p3q T ˚ 3 1 T ˇ T ˇ fβT X pβ x qu K puqdu ´ fβT X pβ xqˇ “ ˇfβT X pβ xq ´ 6 ż 2 h p3q T ď pβ xq| u2 Kpuqdu, sup |f 2 β T x βT X and the variance to be # + n 1 ÿ 1 T var K pβ Xj ´ β T xq n j“1 h “ “ “ “ ď 1 varKh1 pβ T Xj ´ β T xq n (2 ı 1” T T T T 1 12 EK pβ Xj ´ β xq ´ EKh pβ Xj ´ β xq n „ż h  1 12 1 T T T T 2 T 2 K tpβ xj ´ β xq{hufβ T x pβ xj qdβ xj ´ fβT x pβ xq ` Oph q n h4 ż 1 1 K 12 puqfβ T x pβ T x ` huqdu ´ fβ2 T x pβ T xq ` Oph2 {nq 3 nh n ż ż 1 1 2 T 12 T sup |f T pβ xq| u2 K 12 puqdu ` Op1{nq. f T pβ xq K puqdu ` nh3 β x 2nh βT x β x Therefore, (A.3) holds uniformly under conditions C1, C2 and C4. imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 23 We compute the expectation + # n 1 ÿ IpZj ě ZqKh1 pβ T Xj ´ β T xq E ´ n j“1 ( “ E ´IpZj ě ZqKh1 pβ T Xj ´ β T xq ż ( 1 “ ´ Ipc ě ZqIpt ě ZqK 1 pβ T xj ´ β T xq{h 2 h ˆfc pc, xj qf pt, β T xj qfX|βT X pxj | β T xj qfβT X pβ T xj qdcdtdxj dβ T xj ż ( 1 1 T T K pβ x ´ β xq{h Sc pZ, xjl , β T xj qSpZ, β T xj qfXl |βT X pxjl | β T xj q “ ´ j h2 ˆfβT X pβ T xj qdxjl dβ T xj ż 1 “ ´ K 1 puqSc pZ, xjl , β T x ` huqSpZ, β T x ` huqfXl |βT X pxjl | β T x ` huq h ˆfβT X pβ T x ` huqdxjl du ż ż 1 “ ´ Sc pZ, xjl , β T xqSpZ, β T xqfXl |βT X pxjl | β T xqfβT X pβ T xqdxjl K 1 puqdu h ż ) B ! 1 T T T T S pZ, x , β xqSpZ, β xqf px | β xqf pβ xq dxjl ´ T T c jl Xl |β X jl β X h Bβ T x ˆhuK 1 puqdu ż ! ) 1 B2 T T T T ´ S pZ, x , β xqSpZ, β xqf T pxjl | β xqf T pβ xq dxjl c jl Xl |β X β X 2h Bpβ T xq2 ż ˆ h2 u2 K 1 puqdu ij ! ) 1 B3 T ˚ T ˚ T ˚ T ˚ ´ S pZ, x , β x qSpZ, β x qf T pxjl | β x qf T pβ x q dxjl c jl Xl |β X β X 6h Bpβ T xq3 ˆh3 u3 K 1 puqdu ż B Sc pZ, xjl , β T xqSpZ, β T xqfXl |βT X pxjl | β T xqfβT X pβ T xqdxjl “ Bβ T x ż ż h2 B3 ´ S pZ, xjl , β T x˚ qSpZ, β T x˚ qfXl |βT X pxjl | β T x˚ qfβ T X pβ T x˚ qdxjl T 3 c 6 Bpβ xq 3 1 ˆu K puqdu B “ SpZ, β T xqfβT X pβ T xqEtSc pZ, Xj q | β T xu Bβ T x ż ( B3 h2 SpZ, β T x˚ qfβT X pβ T x˚ qE Sc pZ, Xj q | β T x˚ u3 K 1 puqdu ´ T 3 6 Bpβ xq B “ fβT X pβ T xqEtIpZj ě Zq | β T xu T Bβ x ż ( h2 B3 ´ fβT X pβ T x˚ qE IpZj ě Zq | β T x˚ u3 K 1 puqdu. T 6 Bpβ xq3 Hence the absolute bias is ˇ ˇ # + n ˇ ˇ ÿ B 1 ˇ T T ˇ IpZj ě ZqKh1 pβ T Xj ´ β T xq ´ f T pβ xqEtIpZj ě Zq | β xuˇ ˇE ´ ˇ ˇ n j“1 Bβ T x β X imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 24 and ˇ ˇ 2ż ˇ ˇ h ( 3 1 B3 T ˚ T ˚ ˇ ˇ f u K puqdu “ ˇ´ T pβ x qE IpZj ě Zq | β x ˇ 6 Bpβ T xq3 β X ˇ ˇ " * ż ˇ B3 (ˇ h2 T T 2 ˇ ˇ sup f T pβ xqE IpZj ě Zq | β x ˇ u Kpuqdu ď 2 βT x ˇ Bpβ T xq3 β X # + n 1 ÿ var ´ IpZj ě ZqKh1 pβ T Xj ´ β T xq n j“1 (T 1” E IpZj ě ZqKh1 pβ T Xj ´ β T xq ut IpZj ě ZqKh1 pβ T Xj ´ β T xq “ n ( (T ı ´ EIpZj ě ZqKh1 pβ T Xj ´ β T xq EIpZj ě ZqKh1 pβ T Xj ´ β T xq ˆż ( 1 1 “ IpZj ě ZqK 12 pβ T xj ´ β T xq{h 4 n h ˆfc pc, xj qf pt, β T xj qfXl |βT X pxjl | β T xj qfβT X pβ T xj qdcdtdxjl dβ T xj ¸ „ T „ B B 2 T T T T f T pβ xqEtIpZj ě Zq | β xu f T pβ xqEtIpZj ě Zq | β xu ` Oph q ´ Bβ T x β X Bβ T x β X ż 1 1 “ Sc pZ, xjl , β T x ` huq n h3 ˆSpZ, β T x ` huqfXl |βT X pxjl | β T x ` huqfβ T X pβ T x ` huqdxj K 12 puqdu ` Op1{nq ż ż 1 T T T T S pZ, x , β xqSpZ, β xqf pβ xqf px | β xqdx K 12 puqdu “ T T c jl jl β X Xl |β X jl nh3 ij B2 1 Sc pZ, xjl , β T x˚ qSpZ, β T x˚ q ` 2nh3 Bpβ T xq2 ˆfβT X pβ T x˚ qfXl |βT X pxjl | β T x˚ qdxjl h2 u2 K 12 puqdu ` Op1{nq ˇ ˇż 1 ˇ T T ˇ ď K 12 puqdu sup T pβ xqEtIpZj ě Zq | β xuˇ ˇf nh3 βT x β X ˇ ˇż ˇ B2 ˇ 1 T ˚ T ˚ ˇ 2 12 ˇ ` sup ˇ f T pβ x qEtIpZj ě Zq | β x u ˇ u K puqdu ` Op1{nq. 2nh βT x˚ Bpβ T xq2 β X So ´ n B 1 ÿ IpZj ě ZqKh1 pβ T Xj ´ β T xq “ fβT X pβ T xqEtIpZj ě Zq | β T xu ` Op pn´1{2 h´3{2 ` h2 q T n j“1 Bβ x (A.4) uniformly under conditions C1-C2. Following similar derivations, we have # + n 1 ÿ E Xj IpZj ě ZqKh pβ T Xj ´ β T xq n j“1 ( “ E Xj IpZj ě ZqKh pβ T Xj ´ β T xq imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 25 ż ( 1 xj Ipc ě ZqIpt ě ZqK pβ T xj ´ β T xq{h h ˆfc pc, xj qf pt, β T xj qfX|βT X pxj | β T xj qfβT X pβ T xj qdcdtdxj dβ T xj ż ( 1 “ xj K pβ T xj ´ β T xq{h Sc pZ, xjl , β T xj qSpZ, β T xj qfXl |βT X pxjl | β T xj q h ˆfβT X pβ T xj qdxjl dβ T xj ż T T T T “ pβ T x ` hu, xT jl q KpuqSc pZ, xjl , β x ` huqSpZ, β x ` huqfXl |βT X pxjl | β x ` huq “ ˆfβT X pβ T x ` huqdxjl du ż ż T T T T T T T “ pβ x, xjl q Sc pZ, xjl , β xqSpZ, β xqfXl |βT X pxjl | β xqfβT X pβ xqdxjl Kpuqdu ż ) B ! T T T T T T T q S pZ, x , β xqSpZ, β xqf px | β xqf pβ xq dxjl pβ x, x ` T T c jl jl jl Xl |β X β X Bβ T x ż ˆ huKpuqdu ij ) ! 1 B2 T ˚ T ˚ T ˚ T ˚ T ˚ T T ` q S pZ, x , β x qSpZ, β x qf pβ x , x T pxjl | β x qf T pβ x q dxjl c jl jl Xl |β X β X 2 Bpβ T xq2 ˆh2 u2 Kpuqdu ż T T T T T “ pβ T x, xT jl q Sc pZ, xjl , β xqSpZ, β xqfXl |βT X pxjl | β xqfβT X pβ xqdxjl ij ! ) B2 h2 T ˚ T T T ˚ T ˚ T ˚ T ˚ pβ x , x q S pZ, x , β x qSpZ, β x qf px | β x qf pβ x q dxjl ` T T c jl jl jl Xl |β X β X 2 Bpβ T xq2 ˆu2 Kpuqdu “ SpZ, β T xqfβT X pβ T xqEtXj Sc pZ, Xj q | β T xu ż ( 2 h2 B2 T ˚ T ˚ T ˚ ` SpZ, β x qf u Kpuqdu T pβ x qE Xj Sc pZ, Xj q | β x β X 2 Bpβ T xq2 “ fβT X pβ T xqEtXj IpZj ě Zq | β T xu ż ( B2 h2 fβT X pβ T x˚ qE Xj IpZj ě Zq | β T x˚ u2 Kpuqdu. ` T 2 Bpβ xq2 Hence the absolute bias is ˇ ˇ # + n ˇ ˇ 1 ÿ ˇ ˇ Xj IpZj ě ZqKh pβ T Xj ´ β T xq ´ fβT X pβ T xqEtXj pZj ě Zq | β T xuˇ ˇE ˇ ˇ n j“1 ˇ 2ż ˇ ˇh ˇ ( 2 B2 T ˚ T ˚ ˇ “ ˇˇ f u Kpuqdu T pβ x qE Xj IpZj ě Zq | β x ˇ 2 Bpβ T xq2 β X ˇ ˇ " * ż ˇ B2 (ˇ h2 T T 2 ˇ ˇ sup f T pβ xqE Xj IpZj ě Zq | β x ˇ u Kpuqdu ď 2 βT x ˇ Bpβ T xq2 β X and + n 1 ÿ Xj IpZj ě ZqKh pβ T Xj ´ β T xq var ´ n j“1 # imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 26 “ “ (T 1” E Xj IpZj ě ZqKh pβ T Xj ´ β T xq ut Xj IpZj ě ZqKh pβ T Xj ´ β T xq n ( (T ı ´ EXj IpZj ě ZqKh pβ T Xj ´ β T xq EXj IpZj ě ZqKh pβ T Xj ´ β T xq ˆż ( 1 1 2 xj xT pβ T xj ´ β T xq{h j IpZj ě ZqK 2 n h ˆfc pc, xj qf pt, β T xj qfXl |βT X pxjl | β T xj qfβT X pβ T xj qdcdtdxjl dβ T xj ” ı” ıT ´ fβT X pβ T xqEtXj IpZj ě Zq | β T xu fβT X pβ T xqEtXj IpZj ě Zq | β T xu ˘ `Oph2 q ż 1 1 T T T T T pβ x ` hu, xT “ jl q pβ x ` hu, xjl qSc pZ, xjl , β x ` huq n h ˆSpZ, β T x ` huqfXl |βT X pxjl | β T x ` huqfβ T X pβ T x ` huqdxj K 2 puqdu `Op1{nq ż 1 T T T T T T T “ pβ T x, xT jl q pβ x, xjl qSc pZ, xjl , β xqSpZ, β xqfβ T X pβ xqfXl |βT X pxjl | β xqdxjl nh ż ˆ K 2 puqdu ij B2 1 T T ˚ T T ˚ T ˚ pβ T x˚ , xT ` jl q pβ x , xjl qSc pZ, xjl , β x qSpZ, β x q 2nh Bpβ T xq2 So ˆfβT X pβ T x˚ qfXl |βT X pxjl | β T x˚ qdxjl h2 u2 K 2 puqdu ` Op1{nq ˇ ˇż 1 ˇ T ˇ sup ˇfβT X pβ T xqEtXj XT IpZ ě Zq | β xu ď ˇ K 2 puqdu j j nh β T x ˇ ˇż ˇ B2 ˇ h T ˚ T T ˚ ˇ ˇ ` sup ˇ fβT X pβ x qEtXj Xj IpZj ě Zq | β x uˇ u2 K 2 puqdu ` Op1{nq. T 2 2n βT x˚ Bpβ xq n 1 ÿ Xj IpZj ě ZqKh pβ T Xj ´ β T xq “ fβT X pβ T xqEtXj IpZj ě Zq | β T xu ` Op pn´1{2 h´1{2 ` h2 q n j“1 (A.5) uniformly under conditions C1-C2. + n 1 ÿ IpZj ě ZqKh pβ T Xj ´ β T xq E n j“1 ( “ E IpZj ě ZqKh pβ T Xj ´ β T xq ż ( 1 “ Ipc ě ZqIpt ě ZqK pβ T xj ´ β T xq{h h ˆfc pc, xj qf pt, β T xj qfX|βT X pxj | β T xj qfβT X pβ T xj qdcdtdxj dβ T xj ż ( 1 “ K pβ T xj ´ β T xq{h Sc pZ, xjl , β T xj qSpZ, β T xj qfXl |βT X pxjl | β T xj q h ˆfβT X pβ T xj qdxjl dβ T xj # imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 27 “ ż KpuqSc pZ, xjl , β T x ` huqSpZ, β T x ` huqfXl |βT X pxjl | β T x ` huq ˆfβT X pβ T x ` huqdxjl du ż ż T T T T “ Sc pZ, xjl , β xqSpZ, β xqfXl |βT X pxjl | β xqfβT X pβ xqdxjl Kpuqdu ż ) B ! T T T T S pZ, x , β xqSpZ, β xqf px | β xqf pβ xq dxjl ` T T c jl Xl |β X jl β X Bβ T x ż ˆ huKpuqdu ij ! ) B2 1 T ˚ T ˚ T ˚ T ˚ S pZ, x , β x qSpZ, β x qf px | β x qf pβ x q dxjl ` T T c jl Xl |β X jl β X 2 Bpβ T xq2 ˆh2 u2 Kpuqdu ż “ Sc pZ, xjl , β T xqSpZ, β T xqfXl |βT X pxjl | β T xqfβT X pβ T xqdxjl ij ! ) h2 B2 T ˚ T ˚ T ˚ T ˚ ` S pZ, x , β x qSpZ, β x qf px | β x qf pβ x q dxjl T T c jl Xl |β X jl β X 2 Bpβ T xq2 ˆu2 Kpuqdu “ SpZ, β T xqfβT X pβ T xqEtSc pZ, Xj q | β T xu ż ( h2 B2 ` SpZ, β T x˚ qfβT X pβ T x˚ qE Sc pZ, Xj q | β T x˚ u2 Kpuqdu T 2 2 Bpβ xq “ fβT X pβ T xqEtIpZj ě Zq | β T xu ż ( 2 B2 h2 T ˚ T ˚ f u Kpuqdu. ` T pβ x qE IpZj ě Zq | β x β X 2 Bpβ T xq2 Hence the absolute bias is ˇ ˇ # + n ˇ ˇ 1 ÿ ˇ ˇ IpZj ě ZqKh pβ T Xj ´ β T xq ´ fβT X pβ T xqEtIpZj ě Zq | β T xuˇ ˇE ˇ ˇ n j“1 ˇ 2ż ˇ ˇh ˇ ( 2 B2 T ˚ T ˚ ˇ ˇ “ ˇ f u Kpuqdu T pβ x qE IpZj ě Zq | β x β X ˇ 2 Bpβ T xq2 ˇ ˇ " * ż ˇ B2 (ˇ h2 T T 2 ˇ ˇ sup f T pβ xqE IpZj ě Zq | β x ˇ u Kpuqdu ď 2 βT x ˇ Bpβ T xq2 β X and var “ “ # + n 1 ÿ T T IpZj ě ZqKh pβ Xj ´ β xq n j“1 (T 1” E IpZj ě ZqKh pβ T Xj ´ β T xq ut Xj IpZj ě ZqKh pβ T Xj ´ β T xq n ( (T ı ´ EIpZj ě ZqKh pβ T Xj ´ β T xq EIpZj ě ZqKh pβ T Xj ´ β T xq ˆż ( 1 1 2 T T IpZ ě ZqK pβ x ´ β xq{h j j n h2 ˆfc pc, xj qf pt, β T xj qfXl |βT X pxjl | β T xj qfβT X pβ T xj qdcdtdxjl dβ T xj imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 28 ˙ ” ı” ıT T T T T 2 ´ fβT X pβ xqEtIpZj ě Zq | β xu fβT X pβ xqEtIpZj ě Zq | β xu ` Oph q ż 1 1 Sc pZ, xjl , β T x ` huq “ n h ˆSpZ, β T x ` huqfXl |βT X pxjl | β T x ` huqfβ T X pβ T x ` huqdxj K 2 puqdu ` Op1{nq ż ż 1 T T T T “ Sc pZ, xjl , β xqSpZ, β xqfβ T X pβ xqfXl |βT X pxjl | β xqdxjl K 2 puqdu nh ij B2 1 Sc pZ, xjl , β T x˚ qSpZ, β T x˚ q ` 2nh Bpβ T xq2 So n 1 ÿ n j“1 ˆfβT X pβ T x˚ qfXl |βT X pxjl | β T x˚ qdxjl h2 u2 K 2 puqdu ` Op1{nq ˇż ˇ 1 ˇ T T ˇ sup ˇf T pβ xqEtIpZj ě Zq | β xuˇ K 2 puqdu ď nh β T x β X ˇ ˇż ˇ B2 ˇ h T ˚ T ˚ ˇ ˇ sup ˇ ` fβT X pβ x qEtIpZj ě Zq | β x uˇ u2 K 2 puqdu ` Op1{nq. T 2n βT x˚ Bpβ xq2 IpZj ě ZqKh pβ T Xj ´ β T xq “ fβT X pβ T xqEtIpZj ě Zq | β T xu ` Op pn´1{2 h´1{2 ` h2 q (A.6) uniformly under conditions C1-C2. + # n 1 ÿ T T 2 IpZj ě ZqKh pβ Xj ´ β xq E n j“1 ( “ E IpZj ě ZqKh2 pβ T Xj ´ β T xq ż ( 1 “ Ipc ě ZqIpt ě ZqK 2 pβ T xj ´ β T xq{h 3 h ˆfc pc, xj qf pt, β T xj qfX|βT X pxj | β T xj qfβT X pβ T xj qdcdtdxj dβ T xj ż ( 1 2 “ K pβ T xj ´ β T xq{h Sc pZ, xjl , β T xj qSpZ, β T xj qfXl |βT X pxjl | β T xj q 3 h ˆfβT X pβ T xj qdxjl dβ T xj ż 1 2 K puqSc pZ, xjl , β T x ` huqSpZ, β T x ` huqfXl |βT X pxjl | β T x ` huq “ h2 ˆfβT X pβ T x ` huqdxjl du ż ! ) 1 B2 T T T T “ S pZ, x , β xqSpZ, β xqf px | β xqf pβ xq dxjl T T c jl Xl |β X jl β X 2h2 Bpβ T xq2 ż 2 ˆh u2 K 2 puqdu ij ! ) h2 B4 T ˚ T ˚ T ˚ T ˚ S pZ, x , β x qSpZ, β x qf px | β x qf pβ x q dxjl ` T T c jl Xl |β X jl β X 24 Bpβ T xq4 ˆu4 K 2 puqdu ż ! ) B2 T T T T S pZ, x , β xqSpZ, β xqf px | β xqf pβ xq dxjl “ T T c jl Xl |β X jl β X Bpβ T xq2 imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 29 h2 ` 24 ij ! ) B4 T ˚ T ˚ T ˚ T ˚ S pZ, x , β x qSpZ, β x qf T pxjl | β x qf T pβ x q dxjl c jl Xl |β X β X Bpβ T xq4 ˆu4 K 2 puqdu B2 SpZ, β T xqfβT X pβ T xqEtSc pZ, Xj q | β T xu “ Bpβ T xq2 ij ! ) h2 B4 T ˚ T ˚ T ˚ T ˚ ` S pZ, x , β x qSpZ, β x qf T pxjl | β x qf T pβ x q dxjl c jl Xl |β X β X 24 Bpβ T xq4 ˆu4 K 2 puqdu B2 “ f T pβ T xqEtIpZj ě Zq | β T xu Bpβ T xq2 β X ij ! ) h2 B4 T ˚ T ˚ T ˚ T ˚ ` S pZ, x , β x qSpZ, β x qf T pxjl | β x qf T pβ x q dxjl c jl Xl |β X β X 24 Bpβ T xq4 ˆu4 K 2 puqdu. Hence the absolute bias is ˇ ˇ # + n ˇ ˇ B2 1 ÿ ˇ T T 2 T T ˇ pβ X ´ β xq ´ IpZ ě ZqK f pβ xqEtIpZ ě Zq | β xu E T ˇ ˇ j j j h ˇ ˇ n j“1 Bpβ T xq2 β X ˇ 2ij ˇ ! ) 4 ˇh ˇ B T ˚ T ˚ T ˚ T ˚ 4 2 “ ˇˇ Sc pZ, xjl , β x qSpZ, β x qfXl |βT X pxjl | β x qfβ T X pβ x q dxjl u K puqduˇˇ T 24 Bpβ xq4 ˇ "ż ˇ * ˇ B4 (ˇ h2 T T 2 ď sup ˇ f T pβ xqE IpZj ě Zq | β x ˇˇ u Kpuqdu . 2 β T x˚ ˇ Bpβ T xq4 β X To analyze the variance, + # n 1 ÿ 2 T T IpZj ě ZqKh pβ Xj ´ β xq var n j“1 (T 1” “ E IpZj ě ZqKh2 pβ T Xj ´ β T xq ut Xj IpZj ě ZqKh2 pβ T Xj ´ β T xq n ( (T ı ´ EIpZj ě ZqKh2 pβ T Xj ´ β T xq EIpZj ě ZqKh2 pβ T Xj ´ β T xq ˆż ( 1 1 22 T T “ IpZ ě ZqK pβ x ´ β xq{h j j n h6 ˆfc pc, xj qf pt, β T xj qfXl |βT X pxjl | β T xj qfβT X pβ T xj qdcdtdxjl dβ T xj ¸ „ T „ 2 B B2 f T pβ T xqEtIpZj ě Zq | β T xu f T pβ T xqEtIpZj ě Zq | β T xu ` Oph2 q ´ Bpβ T xq2 β X pBβ T xq2 β X ż 1 1 “ Sc pZ, xjl , β T x ` huq n h5 ˆSpZ, β T x ` huqfXl |βT X pxjl | β T x ` huqfβ T X pβ T x ` huqdxj K 22 puqdu ` Op1{nq ż ż 1 T T T T “ Sc pZ, xjl , β xqSpZ, β xqfβT X pβ xqfXl |βT X pxjl | β xqdxjl K 22 puqdu nh5 ij B2 1 Sc pZ, xjl , β T x˚ qSpZ, β T x˚ q ` 2nh5 Bpβ T xq2 ˆfβT X pβ T x˚ qfXl |βT X pxjl | β T x˚ qdxjl h2 u2 K 2 puqdu ` Op1{nq imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 30 ď So ˇ ˇż 1 ˇ T T ˇ K 22 puqdu sup T pβ xqEtIpZj ě Zq | β xuˇ ˇf nh5 βT x β X ˇ ˇż ˇ B2 ˇ 1 T ˚ T ˚ ˇ ˇ ` sup ˇ fβT X pβ x qEtIpZj ě Zq | β x uˇ u2 K 22 puqdu ` Op1{nq. T 3 2 2nh βT x˚ Bpβ xq n 1 ÿ B2 f pβ T xqEtIpZj ě Zq | β T xu ` Op pn´1{2 h´5{2 ` h2 q IpZj ě ZqKh pβ T Xj ´ β T xq “ T 2 βT X n j“1 Bpβ xq (A.7) uniformly under conditions C1-C2. Combining the results of (A.1) and (A.6), we have ( p Y pZq | β X “ E T “ “ řn T T j“1 IpZj ě ZqKh pβ Xj ´ β Xq řn T T j“1 Kh pβ Xj ´ β Xq fβT X pβ T XqEtIpZj ě Zq | β T Xu ` Op pn´1{2 h´1{2 fβT X pβ T Xq ` Op pn´1{2 h´1{2 ` h2 q fβT X pβ T XqEtY pZq | β T Xu fβT X pβ T Xq ` h2 q ` Op pn´1{2 h´1{2 ` h2 q “ EtY pZq | β T Xu ` Op tpnhq´1{2 ` h2 u, uniformly under conditions C1-C2. Combining the results of (A.1) and (A.5), we have řn T T ( j“1 Xj IpZj ě ZqKh pβ Xj ´ β Xq T p E XY pZq | β X “ řn T T j“1 Kh pβ Xj ´ β Xq “ “ fβT X pβ T XqEtXj IpZj ě Zq | β T Xu ` Op pn´1{2 h´1{2 ` h2 q fβT X pβ T Xq ` Op pn´1{2 h´1{2 ` h2 q fβT X pβ T XqEtXY pZq | β T Xu T fβT X pβ Xq ` Op pn´1{2 h´1{2 ` h2 q “ EtXY pZq | β T Xu ` Op tpnhq´1{2 ` h2 u uniformly under conditions C1-C2. Combining the results of (A.1), (A.3), (A.6) and (A.4), we have ( B p E Y pZq | β T X T Bβ X řn T T 1 j“1 IpZj ě ZqKh pβ Xj ´ β Xq “ ´ řn T T j“1 Kh pβ Xj ´ β Xq řn ř t j“1 IpZj ě ZqKh pβ T Xj ´ β T Xqut nj“1 Kh1 pβ T Xj ´ β T Xqu ` ř t nj“1 Kh pβ T Xj ´ β T Xqu2 “ Bfβ T X pβ T XqEtIpZj ě Zq | β T Xu{Bβ T X ` Op pn´1{2 h´3{2 ` h2 q fβT X pβ T Xq ` Op pn´1{2 h´1{2 ` h2 q imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 31 ` “ fβ1 T X pβ T XqEtIpZj ě Zq | β T Xu fβT X pβ T Xq ´ “ ” ı” ı fβT X pβ T XqEtIpZj ě Zq | β T Xu ` Op pn´1{2 h´1{2 ` h2 q ´fβ1 T X pβ T Xq ` Op pn´1{2 h´3{2 ` h2 q fβ2 T X pβ T Xq ` Opn´1{2 h´1{2 ` h2 q ` fβ1 T X pβ T XqEtIpZj ě Zq | β T Xu fβ2 T X pβ T Xq BEtIpZj ě Zq | β T Xu Bβ T X ` Op pn´1{2 h´3{2 ` h2 q B EtY pZq | β T Xu ` Op tpnh3 q´1{2 ` h2 u Bβ T X uniformly under conditions C1-C2. Finally, combining the results of (A.1), (A.3), (A.5) and (A.2), we have ( B p E XY pZq | β T X T Bβ X řn T T 1 j“1 Xj IpZj ě ZqKh pβ Xj ´ β Xq “ ´ řn T T j“1 Kh pβ Xj ´ β Xq ř ř t nj“1 Xj IpZj ě ZqKh pβ T Xj ´ β T Xqut nj“1 Kh1 pβ T Xj ´ β T Xqu ` ř t nj“1 Kh pβ T Xj ´ β T Xqu2 “ Bfβ T X pβ T XqEtXj IpZj ě Zq | β T Xu{Bβ T X ` Op pn´1{2 h´3{2 ` h2 q fβT X pβ T Xq ` Op pn´1{2 h´1{2 ` h2 q ` “ fβ1 T X pβ T XqEtXY pZq | β T Xu fβT X pβ T Xq ´ “ ” ı” ı fβT X pβ T XqEtXj IpZj ě Zq | β T Xu ` Op pn´1{2 h´1{2 ` h2 q ´fβ1 T X pβ T Xq ` Op pn´1{2 h´3{2 ` h2 q fβ2 T X pβ T Xq ` Opn´1{2 h´1{2 ` h2 q ` fβ1 T X pβ T XqEtXY pZq | β T Xu fβT X pβ T Xq fβT X pβ T XqBEtXY pZq | β T Xu{Bβ T X fβT X pβ T Xq ` Op pn´1{2 h´3{2 ` h2 q B EtXY pZq | β T Xu ` Op tpnh3 q´1{2 ` h2 u T Bβ X uniformly under conditions C1-C2. Now we inspect the consistency of the Kaplan Meier estimator on the hazard function and its ř derivatives. Let A “ n´1 nj“1 IpZj ě Zi qKh pβ T Xj ´ β T xq ´ fβT X pβ T xqEtIpZ ě Zi q | β T xu. ż8 T T p p Kb pt ´ zqdΛpt|β xq λpz, β xq “ 0 “ “ “ n ÿ i“1 ∆i Kh pβ T Xi ´ β T xq T T j“1 IpZj ě Zi qKh pβ Xj ´ β xq Kb pZi ´ zq řn n 1 ÿ ∆i Kh pβ T Xi ´ β T xq Kb pZi ´ zq n i“1 fβ T X pβ T xqEtIpZ ě Zi q | β T xu ` A n 1 ÿ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq t1 ` Op pAqu, n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 32 We first inspect First, n 1 ÿ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq . n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu « ff n 1 ÿ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq E n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu « ff Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq “ E fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu ij Kb pzi ´ zqKh pβ T xi ´ β T xq “ f pzi , β T xi qSc pzi , xi qfX|βT X pxi , β T xi q fβT X pβ T xqSpzi , β T xqEtSc pzi , Xi q | β T xu ˆfβT X pβ T xi qdzi dxi dβ T xi ij Kb pzi ´ zqKh pβ T xi ´ β T xqEtSc pzi , Xi q | β T xi u f pzi , β T xi q “ T T T fβT X pβ xqSpzi , β xqEtSc pzi , Xi q | β xu ˆfβT X pβ T xi qdzi dβ T xi ij KpvqKpuqEtSc pz ` bv, Xi q | β T x ` huu “ f pz ` bv, β T x ` huq fβT X pβ T xqSpz ` bv, β T xqEtSc pz ` bv, Xi q | β T xu ˆfβT X pβ T x ` huqdvdu ij ij KpvqKpuq b2 B 2 T f pz ˚ , β T xqv 2 dvdu “ KpvqKpuqλpz, β xqdvdu ` 2 2Bz Spz ˚ , β T xq ij KpvqKpuqEtSc pz, Xi q | β T x˚ uf pz, β T x˚ qfβT X pβ T x˚ q 2 h2 B2 ` u dvdu 2Bpβ T xq2 fβT X pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu ij KpvqKpuq b2 B2 T f pz ˚ , β T xqv 2 dvdu “ λpz, β xq ` 2 2Bz Spz ˚ , β T xq ij KpvqKpuqEtSc pz, Xi q | β T x˚ uf pz, β T x˚ qfβT X pβ T x˚ q 2 h2 B2 ` u dvdu, 2Bpβ T xq2 fβT X pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu where throughout the text, z ˚ is on the line connecting z and z ` bv. Thus, the absolute bias is ˇ # ˇ + n ˇ ˇ 1 ÿ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq ˇ T ˇ ´ λpz, β xq ˇE ˇ ˇ ˇ n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu ˇ 2 ˇ ż ˇ B f pz ˚ , β T xq ˇ ˇ v 2 Kpvqdv ď b2 sup ˇˇ ˇ 2 T ˚ z ˚ ,βT x 2Bz Spz , β xq ˇ ˇ T ˚ T ˚ T ˚ ˇż ˇ 2 EtS pz, X q | β x uf pz, β x qf T pβ x q ˇ c i B ˇ β X `h2 sup ˇ u2 Kpuqdu ˇ T T T T ˇ T T ˚ ˇ 2Bpβ xq2 f pβ xqSpz, β xqEtS pz, X q | β xu T c i z,β x,β x β X “ Oph2 ` b2 q under conditions C1-C6. Following the same procedure, noting that A “ Op tpnhq´1{2 ` h2 u uniformly, we can show that n 1 ÿ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq Op pAq “ Op th2 ` pnhq´1{2 u, n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 33 p β T xq is of order Op tpnhq´1{2 ` h2 ` b2 u uniformly. On the other hand, the hence the bias of λpz, p β T xq is variance of λpz, ! ) p β T xq var λpz, ff « n ∆i Kh pβ T Xi ´ β T xq 1ÿ Kb pZi ´ zq “ var n i“1 fβ T X pβ T xqEtIpZ ě Zi q | β T xu ` A « ff n 1 ÿ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq “ var t1 ` Op pAqu n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu « ff « ff n n 1 ÿ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq 1 ÿ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq ď 2var ` 2var Op pAq . n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu We inspect the first term first. ff « n 1 ÿ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq 2var n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu ff « 2 Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq “ var n fβT X pβ T xqEtIpZ ě Zi q | β T xu ˛ ¨ « ff2 T T 2˝ Kb pZi ´ zq∆i Kh pβ Xi ´ β xq “ ´ λ2 pz, β T xq ` Opn´1{2 h´1{2 ` h2 ` b2 q‚ E T T n fβT X pβ xqEtIpZ ě Zi q | β xu ¨ « ff2 ˛ T T Kb pZi ´ zq∆i Kh pβ Xi ´ β xq ‚ 2˝ ` Op1{nq E “ n fβT X pβ T xqEtIpZ ě Zi q | β T xu ij 2 K 2 tpZi ´ zq{buK 2 tpβ T xi ´ β T xq{hu “ 2 2 b h n fβ2T X pβ T xqS 2 pzi , β T xqE 2 tSc pzi , Xi q | β T xu ˆf pzi , β T xi qSc pzi , xi qfX|β T X pxi , β T xi qfβT X pβ T xi qdzi dxi dβ T xi ` Op1{nq ij 2 K 2 pvqK 2 puq “ bhn fβ2 T X pβ T xqS 2 pz ` bv, β T xqE 2 tSc pz ` bv, Xi q | β T xu ˆf pz ` bv, β T x ` huqEtSc pz ` bv, Xi q | β T x ` huufβ T X pβ T x ` huqdvdu ` Op1{nq ij 2 f pz, β T xqK 2 pvqK 2 puq “ dvdu bhn fβT X pβ T xqS 2 pz, β T xqEtSc pz, Xi q | β T xu ij f pz ˚ , β T xqK 2 pvqK 2 puq bB2 v 2 dvdu ` nhBz 2 fβT X pβ T xqS 2 pz ˚ , β T xqEtSc pz ˚ , Xi q | β T xu ij fβT X pβ T x˚ qf pz, β T x˚ qEtSc pz, Xi q | β T x˚ uK 2 pvqK 2 puq 2 hB2 ` u dvdu ` Op1{nq nbBpβ T xq2 fβ2 T X pβ T xqS 2 pz, β T xqEtSc pz, Xi q2 | β T xu "ż *2 f pz, β T xq 2 2 ď K puqdu bhn fβT X pβ T xqS 2 pz, β T xqEtSc pz, Xi q | β T xu ˇ "ż ˇ * "ż * ˇ ˇ B2 b f pz ˚ , β T xq ˇ ˇ 2 2 2 ` sup ˇ K puqu du K puqdu ˇ nh z ˚ ,βT x ˇ Bz 2 fβT X pβ T xqS 2 pz ˚ , β T xqEtSc pz ˚ , Xi q | β T xu ˇ imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 34 ˇ ˇ ˇ B2 fβT X pβ T x˚ qf pz, β T x˚ qEtSc pz, Xi q | β T x˚ u ˇˇ h ˇ sup ` ˇ ˇ nb z,βT x,βT x˚ ˇ Bpβ T xq2 f 2 T pβ T xqS 2 pz, β T xqEtSc pz, Xi q2 | β T xu ˇ β X "ż * "ż * 2 2 2 ˆ K puqu du K puqdu ` Op1{nq “ Ot1{pnhbq ` h{pnbq ` b{pnhq ` 1{nu “ Ot1{pnhbqu uniformly under conditions C1-C6 and β T x˚ is on the line connecting β T x and β T x ` hu. For the second term « ff n 1 ÿ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq 2var Op pAq n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu ff2 « n 1 ÿ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq Op pAq ď 2E n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu ˛ ¨ ff2 « n T T ÿ Kb pZi ´ zq∆i Kh pβ Xi ´ β xq 1 suptOp2 pAqu‚ ď 2E ˝ n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu ˛ ¨ ff2 « n T T ÿ “ ‰ 1 Kb pZi ´ zq∆i Kh pβ Xi ´ β xq Op tpnhq´1 ` h4 u ‚ “ 2E ˝ n i“1 fβT X pβ T xqEtIpZ ě Zi q | β T xu ff2 « Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq “ 2E Otpnhq´1 ` h4 u fβT X pβ T xqEtIpZ ě Zi q | β T xu « ff "ż *2 2 f pz, β T xq ´1 ´1 ´1 ´1 2 “ K puqdu ` Opn b h ` n h bq bhn fβT X pβ T xqS 2 pz, β T xqEtSc pz, Xi q | β T xu ˆOtpnhq´1 ` h4 u “ Otpnhq´2 b´1 ` n´1 h3 b´1 u p β T xq is of under conditions C1-C6 uniformly. Summarizing the above results, the variance of λpz, T p β xq, specifically order 1{pnhbq uniformly. Hence we have the consistency of estimator λpz, p β T xq “ λpz, β T xq ` Op tpnhbq´1{2 ` h2 ` b2 u λpz, uniformly under condition C1-C6. Next we inspect the estimator for the first derivative of hazard function λpz, β T xq. Let p 12 λ n ÿ ∆i Kh1 pβ T Xi ´ β T xq T T j IpZj ě zqKh pβ Xj ´ β xq i“1 řn T T n 1 ÿ j“1 IpZj ě zqKh pβ Xj ´ β xq T T Kb pZi ´ zq∆i Kh pβ Xi ´ β xq řn “ . t j“1 IpZj ě zqKh pβ T Xj ´ β T xqu2 i“1 p 11 “ ´ λ Kb pZi ´ zq ř p 1 px, β T xq “ λ p 11 ` λ p 12 . To analyze λ p 11 , Then λ # n ÿ p Kb pZi ´ zq ř E λ11 “ E ´ i“1 ∆i Kh1 pβ T Xi ´ β T xq n T T j“1 IpZj ě zqKh pβ Xj ´ β xq + imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 35 ff n ∆i Kh1 pβ T Xi ´ β T xq 1 ÿ ´Kb pZi ´ zq “ E n i“1 fβ T X pβ T xqEtIpZ ě Zi q | β T xu ` A « ff n ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 1 ÿ “ E n i“1 fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu « ff n ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 1ÿ `E Op pAq n i“1 fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu « ff ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq “ E fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu « ff n ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 1ÿ `E Op pAq . n i“1 fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu « We inspect the first term to obtain ff « ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq E fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu ij Kb pzi ´ zqKh1 pβ T xi ´ β T xq “ ´ f pzi , β T xi qSc pzi , xi qfX|β T X pxi , β T xi q fβT X pβ T xqSpzi , β T xqEtSc pzi , Xi q | β T xu ˆfβT X pβ T xi qdzi dxi dβ T xi ij 1 KpvqK 1 puqf pz ` bv, β T x ` huqEtSc pz ` bv, Xi q | β T x ` huu fβT X pβ T x ` huqdvdu “ ´ h fβT X pβ T xqSpz ` bv, β T xqEtSc pz ` bv, Xi q | β T xu ” ı ij B f pz, β T xqEtSc pz, Xi q | β T xuf T pβ T xq {Bβ T x β X “ ´ KpvquK 1 puqdvdu T T fβT X pβ xqSpz, β xqEtSc pz, Xi q | β T xu ij fβT X pβ T x˚ qf pz ˚ , β T x˚ qEtSc pz ˚ , Xi q | β T x˚ u 2 b2 B3 ´ v KpvquK 1 puqdvdu 2Bz 2 Bβ T x fβT X pβ T xqSpz ˚ , β T xqEtSc pz ˚ , Xi q | β T xu ij fβT X pβ T x˚ qf pz, β T x˚ qEtSc pz, Xi q | β T x˚ u h2 B3 ´ Kpvqu3 K 1 puqdvdu T 3 T T T 6Bpβ xq fβT X pβ xqSpz, β xqEtSc pz, Xi q | β xu ” ı B f pz, β T xqEtSc pz, Xi q | β T xufβT X pβ T xq {Bβ T x “ fβT X pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu ij fβT X pβ T x˚ qf pz ˚ , β T x˚ qEtSc pz ˚ , Xi q | β T x˚ u 2 b2 B3 v KpvquK 1 puqdvdu ´ 2Bz 2 Bβ T x fβT X pβ T xqSpz ˚ , β T xqEtSc pz ˚ , Xi q | β T xu ij fβT X pβ T x˚ qf pz, β T x˚ qEtSc pz, Xi q | β T x˚ u h2 B3 ´ Kpvqu3 K 1 puqdvdu. 6Bpβ T xq3 fβT X pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu Hence the absolute bias is given by ˇ « ff ˇ ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq ˇ ˇE ˇ fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu ” ı ˇ B f pz, β T xqEtSc pz, Xi q | β T xufβT X pβ T xq {Bβ T x ˇˇ ˇ ´ ˇ fβT X pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu ˇ imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 36 ˇż ˇ ˇ fβT X pβ T x˚ qf pz ˚ , β T x˚ qEtSc pz ˚ , Xi q | β T x˚ u ˇˇ B3 ˇ ď b sup ˇ v 2 Kpvqdv ˇ T T T T 2 ˚ ˚ ˇ T T z ˚ ,β x,β x˚ 2Bz Bβ x fβT X pβ xqSpz , β xqEtSc pz , Xi q | β xu ˇ ˇ ˇż ˇ fβT X pβ T x˚ qf pz, β T x˚ qEtSc pz, Xi q | β T x˚ u ˇˇ B3 ˇ 2 `h sup ˇ ˇ u2 Kpuqdu T T T T 3 ˇ fβT X pβ xqSpz, β xqEtSc pz, Xi q | β xu ˇ z,βT x,βT x˚ 2Bpβ xq 2 “ Opb2 ` h2 q uniformly under condition C1-C6. Following the same procedure, we conclude that n ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 1 ÿ Op pAq “ Op th2 ` pnhq´1{2 u n i“1 fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu uniformly under conditions C1-C6 due to A “ Op th2 ` pnhq´1{2 u. Therefore, we have ” ı B f pz, β T xqEtSc pz, Xi q | β T xufβ T X pβ T xq {Bβ T x p 11 “ ` Otpnhq´1{2 ` b2 ` h2 u Eλ T T T fβT X pβ xqSpz, β xqEtSc pz, Xi q | β xu p 12 , let B “ ´1{n For λ then řn j“1 IpZj ě zqKh1 pβ T Xj ´ βT xq ´ BfβT X pβ T xqEtIpZj ě zq | β T xu{Bβ T x, řn T T 1 j“1 IpZj ě zqKh pβ Xj ´ β xq T T p λ12 “ Kb pZi ´ zq∆i Kh pβ Xi ´ β xq řn t j“1 IpZj ě zqKh pβ T Xj ´ β T xqu2 ” ı T T T n B f T pβ xqEtIpZ ě Zi q | β xu {Bβ x ` B ÿ X β 1 Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq “ ´ n i“1 rfβT X pβ T Xi qEtIpZ ě Zi q | β T xu ` As2 ” ı T T T n B f T pβ zqEtIpZ ě Zi q | β xu {Bβ x ÿ β X 1 T T “ ´ Kb pZi ´ zq∆i Kh pβ Xi ´ β xq n i“1 fβ2T X pβ T xqE 2 tIpZ ě Zi q | β T xu ˆ t1 ` Op pBq ` Op pAqu . We have » ” ı fi T T B f pβ zqEtIpZ ě Z q | β xu {Bβ T x T i β X 1 fl Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq E –´ n i“1 fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu ” ı fi » B fβT X pβ T zqEtIpZ ě Zi q | β T xu {Bβ T x fl “ ´E –Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu ” ı ij B fβT X pβ T xqSpzi , β T xqEtSc pzi , Xi q | β T xu {Bβ T x “ ´ Kb pzi ´ zqKh pβ T xi ´ β T xq fβ2 T X pβ T xqS 2 pzi , β T xqE 2 tSc pzi , Xi q | β T xu n ÿ ˆf pzi , β T xi qSc pzi , xi qfX|β T X pxi , β T xi qfβT X pβ T xi qdzi dxi dβ T xi ” ı ij B fβT X pβ T xqSpzi , β T xqEtSc pzi , Xi q | β T xu {Bβ T x “ ´ Kb pzi ´ zqKh pβ T xi ´ β T xq fβ2 T X pβ T xqS 2 pzi , β T xqE 2 tSc pzi , Xi q | β T xu ˆf pzi , β T xi qEtSc pzi , Xi q | β T xi ufβT X pβ T xi qdzi dβ T xi imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 37 “ ´ ij KpvqKpuq ” ı B fβT X pβ T xqSpz ` bv, β T xqEtSc pz ` bv, Xi q | β T xu {Bβ T x fβ2T X pβ T xqS 2 pz ` bv, β T xqE 2 tSc pz ` bv, Xi q | β T xu ˆf pz ` bv, β T x ` huqEtSc pz ` bv, Xi q | β T x ` huufβ T X pβ T x ` huqdvdu ” ı ij B fβT X pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu {Bβ T x “ ´ KpvqKpuq f pz, β T xqdvdu fβT X pβ T xqS 2 pz, β T xqEtSc pz, Xi q | β T xu ” ı T T T T ˚ ˚ ij B f 2 2 T pβ xqSpz , β xqEtSc pz , Xi q | β xu {Bβ x β X b B f pz ˚ , β T xqv 2 dvdu KpvqKpuq ´ T T T 2 ˚ ˚ 2Bz 2 fβT X pβ xqS pz , β xqEtSc pz , Xi q | β xu ” ı T T T T ij 2 2 B f T pβ xqSpz, β xqEtSc pz, Xi q | β xu {Bβ x β X h B ´ KpvqKpuq 2Bpβ T xq2 fβ2 T X pβ T xqS 2 pz, β T xqE 2 tSc pz, Xi q | β T xu ˆf pz, β T x˚ qEtSc pz, Xi q | β T x˚ ufβT X pβ T x˚ qu2 dvdu ” ı B fβT X pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu {Bβ T x f pz, β T xq “ ´ T T T 2 fβT X pβ xqS pz, β xqEtSc pz, Xi q | β xu ” ı ij B f T pβ T xqSpz ˚ , β T xqEtSc pz ˚ , Xi q | β T xu {Bβ T x 2 2 β X b B ´ f pz ˚ , β T xqv 2 KpvqKpuqdvdu 2 2Bz fβT X pβ T xqS 2 pz ˚ , β T xqEtSc pz ˚ , Xi q | β T xu ” ı ij B f T pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu {Bβ T x 2 2 β X h B ´ T 2 2Bpβ xq fβ2 T X pβ T xqS 2 pz, β T xqE 2 tSc pz, Xi q | β T xu ˆf pz, β T x˚ qEtSc pz, Xi q | β T x˚ ufβT X pβ T x˚ qu2 KpvqKpuqdvdu. Therefore ” ı ˇ » fi T T ˇ n B f pβ zqEtIpZ ě Z q | β xu {Bβ T x T ÿ i ˇ β X 1 ˇE –´ fl Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq ˇ n fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu ˇ i“1 ” ı ˇ ˇ B fβT X pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu {Bβ T x ˇ T ˇ ` f pz, β xqˇ T T T fβT X pβ xqS 2 pz, β xqEtSc pz, Xi q | β xu ˇ ” ı ˇ ˇ ˇ ˇ 2 B f T pβ T xqSpz ˚ , β T xqEtS pz ˚ , X q | β T xu {Bβ T x c i ˇ ˇ β X B ˚ T ˇ 2 ˇ f pz , β xq ď b sup ˇ ˇ 2 fβT X pβ T xqS 2 pz ˚ , β T xqEtSc pz ˚ , Xi q | β T xu ˇ z ˚ ,β T x ˇ 2Bz "ż * ˆ v 2 Kpvqdv ” ı ˇ ˇ T T T 2 B fβT X pβ xqSpz, β xqEtSc pz, Xi q | β xu {Bβ T x ˇ B 2 ˇ `h sup ˇ T 2 fβ2 T X pβ T xqS 2 pz, β T xqE 2 tSc pz, Xi q | β T xu z,βT x,βT x˚ ˇ 2Bpβ xq ˇ "ż * ˇ 2 T ˚ T ˚ T ˚ ˇ u Kpuqdu ˆf pz, β x qEtSc p, Xi q | β x ufβT X pβ x qˇ ˇ “ Opb2 ` h2 q uniformly under conditions C1-C6. Noting that B “ Op pn´1{2 h´3{2 ` h2 q, based on similar proceimsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 38 dure, we have ´ n ÿ 1 Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq n i“1 ” ı B fβT X pβ T zqEtIpZ ě Zi q | β T xu {Bβ T x fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu Op pBq “ Op pn´1{2 h´3{2 ` h2 q, ” ı T T T n B f T pβ zqEtIpZ ě Zi q | β xu {Bβ x ÿ β X 1 T T ´ Op pAq Kb pZi ´ zq∆i Kh pβ Xi ´ β xq n i“1 fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu “ Op pn´1{2 h´1{2 ` h2 q uniformly under condition C1-C6. Therefore, we can conclude that ” ı B fβT X pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu {Bβ T x p 12 “ ´ Eλ f pz, β T xq ` Opn´1{2 h´3{2 ` b2 ` h2 q T T T 2 fβT X pβ xqS pz, β xqEtSc pz, Xi q | β xu In addition, we have ” ı B f pz, β T xqEtSc pz, Xi q | β T xufβ T X pβ T xq {Bβ T x ´ “ fβT X pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu ” ı B fβT X pβ T xqSpz, β T xqEtSc pz, Xi q | β T xu {Bβ T x fβT X pβ T xqS 2 pz, β T xqEtS c pz, Xi q T | β xu f pz, β T xq T T 1 Bf pz, β T xq{Bβ T x f pz, β T xqBEtSc pz, Xi q | β T xu{Bβ T x fβT X pβ xqf pz, β xq ` ` Spz, β T xq Spz, β T xqEtSc pz, Xi q | β T xu fβT X pβ T xqSpz, β T xq ´ fβ1 T X pβ T xqf pz, β T xq fβT X pβ T xqSpz, β T xq ´ f pz, β T xqBSpz, β T xq{Bβ T x f pz, β T xqBEtSc pz, Xi q | β T xu{Bβ T x ´ S 2 pz, β T xq Spz, β T xqEtSc pz, Xi q | β T xu Bf pz, β T xq{Bβ T x f pz, β T xqBSpz, β T xq{Bβ T x ´ Spz, β T xq S 2 pz, β T xq B “ λpz, β T xq Bβ T x “ λ1 pz, β T xq. “ p 11 and E λ p 12 , we readily obtain Combining E λ ˇ ˇ ˇ ˇ ˇ ˇ ˇ ˇ p 11 ` E λ p 12 ´ B λ1 pz, β T xqˇ p 1 pz, β T xq ´ B λ1 pz, β T xqˇ “ ˇE λ ˇE λ ˇ ˇ ˇ ˇ Bβ T x Bβ T x “ Opn´1{2 h´3{2 ` b2 ` h2 q uniformly under conditions C1-C6. p 1 pz, β T xq is given by The variance of λ ! ) ! ) p 1 pz, β T xq “ var λ p 11 q ` 2varpλ p 12 q. p 11 ` λ p 12 ď 2varpλ var λ We exam each term separately. p 11 q varpλ imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 39 + ´∆i Kh1 pβ T Xi ´ β T xq “ var Kb pZi ´ zq ř T T j IpZj ě zqKh pβ Xj ´ β xq i“1 + # n ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 1ÿ “ var n i“1 fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu ` A ff « ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 2 ď var n fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu « ff n ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 1ÿ `2var Op pAq n i“1 fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu # n ÿ The first part is given by ff « ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 2 var n fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu ff2 « ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 2 “ E n fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu ff¸2 ˜ « ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 2 E ´ n fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu ij Kb2 pzi ´ zqKh12 pβ T xi ´ β T xq 2 “ n fβ2 T X pβ T xqS 2 pzi , β T xqE 2 tSc pzi , Xi q | β T xu ˆf pzi , β T xi qSc pzi , xi qfX|β T X pxi , β T xi qfβT X pβ T xi qdzi dxi dβ T xi ` Op1{nq ij K 2 pvqK 12 puqEtSc pz ` bv, Xi q | β T x ` huu 2 “ nbh3 fβ2 T X pβ T xqS 2 pz ` bv, β T xqE 2 tSc pz ` bv, Xi q | β T xu ˆf pz ` bv, β T x ` huqfβ T X pβ T x ` huqdvdu ` Op1{nq ij 2 K 2 pvqK 12 puqf pz, β T xq “ dvdu nbh3 fβT X pβ T xqS 2 pz, β T xqEtSc pz, Xq | β T xu ij b B2 f pz ˚ , β T xq ` 3 2 v 2 K 2 pvqK 12 puqdvdu T T T 2 ˚ ˚ nh Bz fβT X pβ xqS pz , β xqEtSc pz , Xi q | β xu ij f pz, β T x˚ qfβT X pβ T x˚ qEtSc pz, Xi q | β T x˚ u 2 1 B2 ` K pvqu2 K 12 puqdvdu ` Op1{nq T T T 2 2 2 nbh Bpβ T xq2 fβT X pβ xqS pz, β xqE tSc pz, Xi q | β xu "ż * "ż * f pz, β T xq 2 2 12 ď K pvqdv K puqdu nbh3 fβT X pβ T xqS 2 pz, β T xqEtSc pz, Xq | β T xu « ff "ż * "ż * B2 b f pz ˚ , β T xq 2 2 12 ` 3 sup v K pvqdv K puqdu nh z ˚ ,βT x Bz 2 fβT X pβ T xqS 2 pz ˚ , β T xqEtSc pz ˚ , Xi q | β T xu ff « f pz, β T x˚ qfβ T X pβ T x˚ qEtSc pz, Xi q | β T x˚ u B2 1 sup ` nbh z,βT x,βT x˚ Bpβ T xq2 f 2 T pβ T xqS 2 pz, β T xqE 2 tSc pz, Xi q | β T xu β X "ż * "ż * 2 2 12 ˆ K pvqdv u K puqdu ` Op1{nq imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 40 “ Ot1{pnbh3 q ` b{pnh3 q ` 1{pnbhq ` 1{nu “ Ot1{pnbh3 qu uniformly under condition C1-C6. Noting that A “ Op pn´1{2 h´1{2 ` h2 q, the second part is « ff n ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 1 ÿ 2var Op pAq n i“1 fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu ff2 « n ´Kb pZi ´ zq∆i Kh1 pβ T Xi ´ β T xq 1 ÿ Op pAq ď 2E n i“1 fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu ¨ ˛ « ff2 n T T 1 ÿ ( ´Kb pZi ´ zq∆i Kh pβ Xi ´ β xq 1 ď 2E ˝ sup Op2 pAq ‚ n i“1 fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu ¨ « ff2 ˛ n 1 pβ T X ´ β T xq ÿ ´K pZ ´ zq∆ K 1 i i i h b ‚Ot1{pnhq ` h4 u “ 2E ˝ n i“1 fβT X pβ T xqSpZi , β T xqEtSc pZi , Xi q | β T xu « "ż ˙ff * "ż * ˆ f pz, β T xq 1 b 2 2 12 ` K pvqdv K puqdu ` O “ nbh3 fβT X pβ T xqS 2 pz, β T xqEtSc pz, Xq | β T xu nh3 nbh ˆOt1{pnhq ` h4 u “ Otn´2 b´1 h´4 ` pnbq´1 hu uniformly under conditions C1-C6. Therefore p 11 q “ Ot1{pnbh3 qu varpλ uniformly under conditions C1-C6. p 12 , For λ p q varpλ ff « 12 řn n 1 pβ T X ´ β T xq ÿ IpZ ě zqK j j j“1 h “ var Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq řn t j“1 IpZj ě zqKh pβ T Xj ´ β T xqu2 i“1 ” ı » fi T T T n B f T pβ zqEtIpZ ě Zi q | β xu {Bβ x ` B ÿ β X 1 fl “ var – Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq n i“1 tfβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu ` Au2 ” ı » fi T T T B f T pβ zqEtIpZ ě Zi q | β xu {Bβ x β X 2 fl ď var –Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq n fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu ” ı fi » T T T n B f T pβ zqEtIpZ ě Zi q | β xu {Bβ x ÿ β X 1 Op pBqfl Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq `4var – n i“1 fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu ” ı fi » T T T n B f T pβ zqEtIpZ ě Zi q | β xu {Bβ x ÿ β X 1 Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq Op pAqfl . `4var – n i“1 fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu The first part is given by ” ı » fi T T T B f T pβ zqEtIpZ ě Zi q | β xu {Bβ x β X 2 fl var –Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq n f 2 T pβ T xqE 2 tIpZ ě Zi q | β T xu β X imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 41 ” ı fi2 T T T B f T pβ zqEtIpZ ě Zi q | β xu {Bβ x β X 2 – fl E Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq “ n fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu ” ı fi˛2 ¨ » T T T B f T pβ zqEtIpZ ě Zi q | β xu {Bβ x β X 2 fl‚ ` ˝E –Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq n fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu ´ ” ı ¯2 T T T ij B f T pβ xqEtIpZ ě zi q | β xu {Bβ x β X 2 “ Kb2 pzi ´ zqKh2 pβ T xi ´ β T xq n fβ4 T X pβ T xqE 4 tIpZ ě zi q | β T xu » ˆf pzi , β T xi qSc pzi , xi qfX|β T X pxi , β T xi qfβT X pβ T xi qdzi dxi dβ T xi ` Op1{nq ´ ” ı ¯2 T T T T ij B f T pβ xqSpzi , β xqEtSc pzi , Xi q | β xu {Bβ x β X 2 “ Kb2 pzi ´ zqKh2 pβ T xi ´ β T xq n fβ4 T X pβ T xqS 4 pzi , β T xqE 4 tSc pzi , Xi q | β T xu ˆf pzi , β T xi qEtSc pzi , Xi q | β T xi ufβT X pβ T xi qdzi dxi dβ T xi ` Op1{nq ´ ” ı ¯2 T T T T ij B f T pβ xqSpz ` bv, β xqEtSc pz ` bv, Xi q | β xu {Bβ x β X 2 K 2 pvqK 2 puq “ nbh fβ4 T X pβ T xqS 4 pz ` bv, β T xqE 4 tSc pz ` bv, Xi q | β T xu ˆf pz ` bv, β T x ` huqEtSc pz ` bv, Xi q | β T x ` huufβT X pβ T x ` huqdvdu ` Op1{nq ´ ” ı ¯2 T T T T ij B f T pβ xqSpz, β xqEtSc pz, Xi q | β xu {Bβ x β X 2 “ f pz, β T xqdvdu K 2 pvqK 2 puq nbh fβ3 T X pβ T xqS 4 pz, β T xqE 3 tSc pz, Xi q | β T xu ´ ” ı ¯2 T T T T ˚ ˚ ij 2 B f T pβ xqSpz , β xqEtSc pz , Xi q | β xu {Bβ x β X b B f pz ˚ , β T xqv 2 dvdu K 2 pvqK 2 puq ` 2 nh Bz fβ3 T X pβ T xqS 4 pz ˚ , β T xqE 3 tSc pz ˚ , Xi q | β T xu ´ ” ı ¯2 T T T T ij 2 B f pβ xqSpz, β xqEtS pz, X q | β xu {Bβ x c i βT X h B ` K 2 pvqK 2 puq T T T nb Bpβ xq2 fβ4 T X pβ xqS 4 pz, β xqE 4 tSc pz, Xi q | β T xu ˆf pz, β T xqEtSc pz, Xi q | β T x˚ ufβT X pβ T x˚ qu2 dvdu ` Op1{nq ´ ” ı ¯2 T T T T "ż * "ż * B f pβ xqSpz, β xqEtS pz, X q | β xu {Bβ x c i βT X 2 2 2 T ď K pvqdv K puqdu f pz, β xq nbh fβ3 T X pβ T xqS 4 pz, β T xqE 3 tSc pz, Xi q | β T xu ˇ ´ ” ı ¯2 ˇˇ ˇ T T T T ˚ ˚ ˇ B fβT X pβ xqSpz , β xqEtSc pz , Xi q | β xu {Bβ x ˇˇ b ˇ B2 ˚ T ` sup ˇ f pz , β xq ˇ ˇ nh z ˚ ,βT x ˇ Bz 2 fβ3 T X pβ T xqS 4 pz ˚ , β T xqE 3 tSc pz ˚ , Xi q | β T xu ˇ ˇ "ż * "ż * ˆ v 2 K 2 pvqdv K 2 puqdu ˇ´ ” ı ¯2 ˇ T T T T ˇ B f T pβ xqSpz, β xqEtSc pz, Xi q | β xu {Bβ x β X h ˇ sup ` ˇ ˇ nb z,βT x,βT x˚ fβ4 T X pβ T xqS 4 pz, β T xqE 4 tSc pz, Xi q | β T xu ˇ ˇ "ż * "ż * ˇ T T ˚ T ˚ ˇ K 2 pvqdv u2 K 2 puqdu ` Op1{nq ˆf pz, β xqEtSc pz, Xi q | β x ufβT X pβ x qˇ ˇ imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 42 “ Ot1{pnbhq ` b{pnhq ` h{pnbq ` 1{nu uniformly under conditions C1-C6. Noting that A “ Op pn´1{2 h´1{2 `h2 q and B “ Op pn´1{2 h´3{2 ` h2 q, the second part is ” ı fi » T T T n B f T pβ zqEtIpZ ě Zi q | β xu {Bβ x ÿ β X 1 Op pBqfl Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq 4var – n i“1 fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu ¨ ” ı » fi2 ˛ T T T n B f pβ zqEtIpZ ě Z q | β xu {Bβ x T i β X ˚1 ÿ – fl ‹ Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq ď 4E ˝ ‚ T 2 n i“1 fβT X pβ xqE 2 tIpZ ě Zi q | β T xu ˆOt1{pnhq ` h4 u ´ ” ı ¯2 T T T T B f T pβ xqSpz, β xqEtSc pz, Xi q | β xu {Bβ x β X ˚ 4 f pz, β T xq “ ˝ nbh fβ3 T X pβ T xqS 4 pz, β T xqE 3 tSc pz, Xi q | β T xu "ż * "ż * ˙ 2 2 ˆ K pvqdv K puqdu ` Otb{pnhq ` h{pnbqu Opn´1 h´3 ` h4 q ¨ “ Otn´2 b´1 h´4 ` pnbq´1 h3 u under conditions C1-C6 uniformly. The last part is ” ı fi » T T n B f pβ zqEtIpZ ě Z q | β xu {Bβ T x T ÿ i β X 1 Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq Op pAqfl 4var – n i“1 fβ2 T X pβ T xqE 2 tIpZ ě Zi q | β T xu ¨ ” ı » fi2 ˛ T T T n B f T pβ zqEtIpZ ě Zi q | β xu {Bβ x ÿ β X ˚1 –Kb pZi ´ zq∆i Kh pβ T Xi ´ β T xq fl ‹ ď 4E ˝ ‚ T T 2 2 n i“1 f T pβ xqE tIpZ ě Zi q | β xu β X ˆOtpnhq´1 ` h4 u ´ ” ı ¯2 T T T T B f T pβ xqSpz, β xqEtSc pz, Xi q | β xu {Bβ x β X ˚ 4 “ ˝ f pz, β T xq nbh fβ3 T X pβ T xqS 4 pz, β T xqE 3 tSc pz, Xi q | β T xu "ż * "ż * ˙ ˆ K 2 pvqdv K 2 puqdu ` Otb{pnhq ` h{pnbqu Opn´1 h´1 ` h4 q ¨ “ Otpnhq´2 b´1 ` h3 pnbq´1 u under conditions C1-C6 uniformly. Therefore, p 12 q “ Ot1{pnbhqu varpλ uniformly under conditions C1-C6. p 1 pz, β T xqu “ Ot1{pnbh3 qu uniformly. Hence the estimator Summarizing the results above, vartλ T p 1 pz, β xq satisfies λ p 1 px, β T xq “ λ1 px, β T xq ` Op tpnbh3 q´1{2 ` h2 ` b2 u λ uniformly under conditions C1-C6. imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 43 p satisfy A.3. Proof of Theorem 1. For each n, let β n )fi ! » T p T Xi p Xli Yi pZi q | β n E ÿ p p n 1 λ1 pZi , β n Xi q – ) fl “ 0. ! b Xli ´ ∆i T T n i“1 p p p p λpZi , β Xi q E Yi pZi q | β Xi n n p , n “ 1, 2, . . . , that converges. For notational Under condition C3, there exists a subsequence of β n p , n “ 1, 2, . . . , as the subsequence that converges and let the limit be simplicity, we still write β n β˚. From the uniform convergence in (12), (13), (16), (17) given in Lemma 1, we obtain )fi ! » T p T Xi p Xli Yi pZi q | β n E ÿ p p n λ1 pZi , β n Xi q – 1 ) fl ! ∆i b Xli ´ n i“1 p i, β p T Xi q p T Xi p Yi pZi q | β λpZ E n n n p T Xi q ` Op tpnbh3 q´1{2 ` h2 ` b2 u 1 ÿ λ1 pZi , β n ∆i T n i“1 p Xi q ` Op tpnbhq´1{2 ` h2 ` b2 u λpZi , β n ) ! fi » p T Xi ` Op tpnhq´1{2 ` h2 u E Xli Yi pZi q | β n fl ) ! b –Xli ´ p T Xi ` Op tpnhq´1{2 ` h2 u E Yi pZi q | β n « ff T n p Xi q 1 ÿ λ1 pZi , β n “ ∆i ` Op tpnbh3 q´1{2 ` h2 ` b2 u T n i“1 p λpZi , β n Xi q ) ! fi » p T Xi E Xli Yi pZi q | β n ) ` Op tpnhq´1{2 ` h2 ufl ! b –Xli ´ T p E Yi pZi q | β n Xi )fi ! » T p T Xi n E X Y pZ q | β ÿ p i i li n 1 λ1 pZi , β n Xi q – ) fl ` op p1q. ! b Xli ´ “ ∆i T T n i“1 p p λpZi , β Xi q E Yi pZi q | β Xi “ n n Thus, for sufficiently large n, we have )fi ! T p X E X Y pZ q | β i li i n i 1 ) fl ! b –Xli ´ T n p Xi E Yi pZi q | β n )fi ! » ˚T n ˚T X E X Y pZ q | β ÿ i i i li λ1 pZi , β Xi q – 1 p ´ β˚ q ) fl ` Op pβ ! ∆i b Xli ´ n ˚T n i“1 λpZi , β ˚ T Xi q E Yi pZi q | β Xi )fi ! » ˚T n ˚T X E X Y pZ q | β ÿ i i i li λ1 pZi , β Xi q – 1 ) fl ` op p1q, ! ∆i b Xli ´ n i“1 λpZi , β ˚ T Xi q E Yi pZi q | β ˚ T Xi p T Xi q λ1 pZi , β n ∆i T p λpZi , β n Xi q i“1 n ÿ “ “ » where the first equality is because the first derivative of the summation with respect to β is bounded p converges to uniformly under conditions C1-C2 by Lemma 1, and the last equality is because β n ˚ β . In addition, )fi ! » ˚T n ˚T X E X Y pZ q | β ÿ i i i li λ1 pZi , β Xi q – 1 ) fl ! b Xli ´ ∆i n i“1 λpZi , β ˚ T Xi q E Yi pZi q | β ˚ T Xi imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 44 ) fi˛ ! ˚T X E X Y pZq | β l λ1 pZ, β Xq – ) fl‚` op p1q ! b Xl ´ “ E ˝∆ λpZ, β ˚ T Xq E Y pZq | β ˚ T Xi ¨ ˚T » under conditions C1-C2. Thus, for sufficient large n we have )fi ! » T p T Xi p Xli Yi pZi q | β n E p p ÿ n 1 λ1 pZi , β n Xi q – ) fl ! 0 “ b Xli ´ ∆i T T n i“1 p p p p λpZi , β n Xi q E Yi pZi q | β n Xi )fi ! » T p T Xi n E X Y pZ q | β ÿ p i i li n 1 λ1 pZi , β n Xi q – ) fl ` op p1q ! “ ∆i b Xli ´ T T n i“1 p p λpZi , β n Xi q E Yi pZi q | β n Xi )fi ! » ˚T n T ˚ E X Y pZ q | β X i i li i 1 ÿ λ1 pZi , β Xi q – ) fl ` op p1q ! ∆i b X ´ “ li T n i“1 λpZi , β ˚ Xi q E Yi pZi q | β ˚ T Xi ! ) fi˛ » ¨ ˚T ˚T X Y pZq | β E X l λ1 pZ, β Xq – ) fl‚` op p1q ! b Xl ´ “ E ˝∆ ˚T λpZ, β ˚ T Xq E Y pZq | β Xi under conditions C1-C2 and C3. Note that ! ) fi˛ ¨ » ˚T ˚T E X Y pZq | β X l λ1 pZ, β Xq – ) fl‚ ! E ˝∆ b X ´ l T λpZ, β ˚ Xq E Y pZq | β ˚ T Xi is a nonrandom quantity that does not depend on n, hence it is zero. Thus the uniqueness requirement in Condition C7 ensures that β ˚ “ β 0 . We now show that the subsequence that converges includes all but a finite number of n’s. Assume p n ’s that do not converge to β ˚ . As this is not the case, then we can obtain an infinite sequence of β an infinite sequence in a compact set B, we can thus obtain another subsequence that converges, say to β ˚˚ ‰ β ˚ . Identical derivation as before then leads to β ˚˚ “ β 0 , which is a contradiction to p ´ β Ñ 0 in probability when n Ñ 8 under condition C1-C7. β ˚˚ ‰ β ˚ . Thus we conclude β 0 A.4. Proof of Theorem 2. We first expand (9) as )fi ! » T T p p n E X Y pZ q | β X ÿ λ p 1 pZi , β p Xi q i i li i ) fl ! b –Xli ´ ∆i 0 “ n´1{2 T T p i, β p Xi q p Xi p Yi pZi q | β λpZ E i“1 « (ff n p Xli Yi pZi q | β T Xi ÿ p 1 pZi , β T Xi q E λ 0 0 (A.8) “ n´1{2 ∆i b Xli ´ ( p i , β T Xi q p Yi pZi q | β T Xi E λpZ 0 0 i“1 ˜ # +ˇ « ( ff¸ n ˇ p Xli Yi pZi q | β T Xi p 1 pZi , β T Xi q E λ B 1ÿ T ˇ ∆ ` b X b X ´ ( i li li ˇ p i , β T Xi q p Yi pZi q | β T Xi ˇ n BpXT E λpZ i βq i“1 (A.9) ? p ´ β q, ˆ npβ 0 r is on the line connecting β and β. p where β 0 r β“β imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 45 We first consider (A.9). Because of Theorem 1 and Lemma 1, we have # +ˇ ˜ « ( ff¸ n ˇ p Xli Yi pZi q | β T Xi p 1 pZi , β T Xi q E B 1 ÿ λ T ˇ b X b X ´ ∆ ( i li li ˇ p i , β T Xi q p Yi pZi q | β T Xi ˇ r n i“1 BpXT E λpZ i βq β“β + ff¸ ˜ « # ( n T p Xli Yi pZi q | β Xi p 1 pZi , β T Xi q E λ 1 ÿ B 0 0 b XT ∆ b X ´ “ ( i li li T T p p n i“1 BpXT E Yi pZi q | β 0 Xi λpZi , β 0 Xi q i β0 q `op p1q ˜ ¸ « (ff n p Xli Yi pZi q | β T p b2 pZi , β T Xi q E X 1ÿ λ i 0 0 “ ´ ∆i 1 (A.10) b XT b Xli ´ ( li p2 pZi , β T Xi q p Yi pZi q | β T n i“1 E X λ 0 i 0 « ˜ ( ff¸ n p Xli Yi pZi q | β T E X ∆i 1ÿ B i 0 p 1 pZi , β T Xi q b Xli ´ λ ` b XT ( 0 li T p i , β T Xi q BpXT p n i“1 λpZ β q E Y pZ q | β X i i i 0 0 i 0 (A.11) `op p1q. Because of Lemma 1, (A.10) converges uniformly in probability to ˜ż ¸ « (ff T 8 b2 E X Y psq | β X λ1 ps, β T Xq l 0 0 ( ´E b XT b Xl ´ l dN psq T 2 ps, β T Xq λ E Y psq | β X 0 0 0 ¸ « ˜ż (ff 8 b2 E Xl Y psq | β T λ1 ps, β T 0X 0 Xq T T ( b Xl Y psqλps, β 0 Xqds b Xl ´ “ ´E λ2 ps, β T E Y psq | β T 0 0 Xq 0X ¨ ˛ « ( ffT (ff « ż 8 b2 T T T E X Y psq | β X E X Y psq | β X λ ps, β Xq l l 0 0 0 1 ( ( “ ´E ˝ b Xl ´ b Xl ´ Y psqds‚ T T T λps, β E Y psq | β E Y psq | β Xq X 0 0 0 0X « ¸ ˜ż (T (ff 8 b2 E Xl Y psq | β T E Xl Y psq | β T λ1 ps, β T 0X 0X 0 Xq ( ( Y psqds b b Xl ´ ´E λps, β T E Y psq | β T E Y psq | β T 0 0 Xq 0X 0X “ ´EtSeff p∆, Z, Xqb2 u, where the last equality is because the second term above is zero by first taking expectation conditional on β T 0 X. Similarly, from Lemma 1, the term in (A.12) converges uniformly in probability to the limit of # + « ˜ ( ff¸ T E X Y pZ q | β X ∆i B i i i li 0 p 1 pZi , β T Xi q b Xli ´ ( E b XT λ li . 0 Tβ q T BpX λpZi , β T X q E Y pZ q | β X i i i i 0 i 0 0 p 1,´i pZ, β T Xq be the leave-one-out version of λ p 1 pZ, β T Xq, i.e. it is constructed the same Now let λ 0 0 T p as λ1 pZ, β 0 Xq except that the ith observation is not used. Obviously, « ˜ ( ff¸ T E X Y pZ q | β X B ∆i i i i li 0 p 1 pZi , β T Xi q b Xli ´ ( b XT λ 0 li Tβ q T BpX λpZi , β T X q E Y pZ q | β X i i i i 0 0 0 i « ˜ ( ff¸ E Xli Yi pZi q | β T ∆i B 0 Xi T p ( ´ b XT λ1,´i pZi , β 0 Xi q b Xli ´ li Tβ q T BpX λpZi , β T X q E Y pZ q | β X i i i i 0 0 0 i “ op p1q. imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 46 Now let Ei mean taking expectation with respect to the ith observation conditional on all other observations, then + ˜ « # ( ff¸ T E X Y pZ q | β X B ∆i i i i li 0 T T p 1,´i pZi , β Xi q b Xli ´ ( b Xli λ Ei 0 T λpZi , β T E Yi pZi q | β T 0 Xi q BpXi β 0 q 0 Xi ˜ #ż « + ( ff¸ T E X Y psq | β X 1 B i i li 0 p 1,´i ps, β T Xi q b Xli ´ ( “ Ei λ b XT 0 li dNi psq Tβ q T BpX λps, β T E Y psq | β X q X i i i 0 i 0 0 ˜ #ż « + ( ff¸ T E X Y psq | β X B i i li 0 p 1,´i ps, β T Xi q b Xli ´ ( “ Ei λ b XT 0 li Yi psqds T BpXT β q E Y psq | β X i i i 0 0 # + « (ff ż T E X Y psq | β X B i li i 0 p 1,´i ps, β T Xi q b Xli ´ ( “ Ei EtYi psq | Xi uds λ 0 Bβ 0 E Yi psq | β T X 0 i + #ż « (ff T E X Y psq | β X B i i li 0 T p 1,´i ps, β Xi q b XlI ´ ( EtYi psq | Xuds Ei λ “ 0 Bβ 0 E Yi psq | β T 0 Xi + #ż « (ff T E X Y psq | β X B i i li 0 T p 1,´i ps, β Xi q b Xli ´ ( Yi psqds “ Ei λ 0 Bβ 0 E Yi psq | β T 0 Xi “ 0. Here, the last equality is because the integrand has expectation zero conditional on β T 0 Xi and all other observations, and the third last equality is because the expectation is with respect to Xi and does not involve β 0 . Therefore, the term in (A.12) converges in probability uniformly to + « ˜ # ( ff¸ T E X Y pZ q | β X B ∆i i i i li 0 p 1,´i pZi , β T Xi q b Xli ´ ( “0 b XT λ E li 0 Tβ q T BpX λpZi , β T X q E Y pZ q | β X i i i i 0 0 0 i Combining the results concerning (A.10) and (A.12), we thus have obtained that the expression in (A.9) is ´EtSeff p∆, Z, Xqb2 u ` op p1q. Next we decompose (A.8) into « (ff n p Xli Yi pZi q | β T Xi ÿ p 1 pZi , β T Xi q E λ 0 0 ∆i (A.12)n´1{2 “ T1 ` T2 ` T3 ` T4 , b Xli ´ ( p i , β T Xi q p Yi pZi q | β T Xi E λpZ 0 i“1 where T1 “ T2 “ T3 “ T4 “ 0 « (ff T T E X Y pZ q | β X λ pZ , β X q i i i li 1 i i 0 0 ( , n´1{2 ∆i b Xli ´ T T λpZ , β X q E Y pZ q | β X i i i i 0 0 i i“1 # + « (ff n T ÿ p 1 pZi , β T Xi q λ1 pZi , β T Xi q E X Y pZ q | β X λ i i i li 0 0 0 ( ∆i n´1{2 , ´ b Xli ´ T T p i , β T Xi q λpZ , β X q E Y pZ q | β X λpZ i i i i 0 i 0 0 i“1 « (ff ( n p Xli Yi pZi q | β T ÿ E E Xli Yi pZi q | β T λ1 pZi , β T 0 Xi 0 Xi 0 Xi q ´1{2 ( ´ ∆i n , b ( p Yi pZi q | β T λpZi , β T E Yi pZi q | β T E 0 Xi q 0 Xi 0 Xi i“1 + # n ÿ p 1 pZi , β T Xi q λ1 pZi , β T Xi q λ 0 0 ´1{2 ∆i n ´ p i , β T Xi q λpZi , β T λpZ 0 Xi q 0 i“1 « ( (ff T p Xli Yi pZi q | β T E Xli Yi pZi q | β 0 Xi E 0 Xi ( ´ b . ( p Yi pZi q | β T E Yi pZi q | β T E 0 Xi 0 Xi n ÿ imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 47 First, note that T2 + « (ff T p 1 ps, β T Xi q λ1 ps, β T Xi q E X Y psq | β X λ i i li 0 0 0 ( dNi psq b Xli ´ ´ “ n´1{2 T p β T Xi q λps, β E Yi psq | β T Xi q λps, 0 0 Xi 0 i“1 « ˜ ¸ (ff n ż T ÿ E X Y psq | β X i i li 0 ( Xli ´ “ op n´1{2 Yi psqλps, β T 0 Xli qds T E Y psq | β X i i 0 i“1 n ż ÿ # “ op p1q, where the last equality above is because the quantity inside the parenthesis is a mean zero normal random quantity of order Op p1q. Further, ˜ ( n p Xli Yi pZi q | β T ÿ E λ1 pZi , β T 0 Xi 0 Xi q ´1{2 ( ∆i T3 “ n b ´ T T λpZ , β X q E Y pZ q | β X i i i i i 0 0 i“1 (¸ ( T p E Yi pZi q | β T 0 Xi E Xli Yi pZi q | β 0 Xi ( ` ` op p1q 2 rE Yi pZi q | β T 0 Xi s ˜ řn T T n ´1 T ÿ n λ pZ , β X q j“1 Kh pβ 0 Xj ´ β 0 Xi qXlj IpZj ě Zi q 1 i i 0 ´1{2 ( ∆i “ n b ´ T λpZi , β T fβT X pβ T 0 Xi q 0 Xi qE Yi pZi q | β 0 Xi i“1 0 ( ´1 řn T T pβ T E Xli Yi pZi q | β T 0 Xi qu 0 Xi tn j“1 Kh pβ 0 Xj ´ β 0 Xi q ´ fβT 0X ( ` T T fβT X pβ 0 Xi qE Yi pZi q | β 0 Xi 0 ( « ´1 řn T T T n E Xli Yi pZi q | β 0 Xi j“1 Kh pβ 0 Xj ´ β 0 Xi qIpZj ě Zi q ( ` 2 rE Yi pZi q | β T fβT X pβ T 0 Xi s 0 Xi q 0 ff¸ ( ř n T T T Xi qu E Yi pZi q | β 0 Xi tn´1 j“1 Kh pβ 0 Xj ´ β 0 Xi q ´ fβT X pβ T 0 0 ` op p1q ´ fβT X pβ T X q i 0 0 « n n ÿ T T ÿ Kh pβ T λ1 pZi , β 0 Xi q 0 Xj ´ β 0 Xi qXlj IpZj ě Zi q ´3{2 ( ∆i “ n b ´ T T T λpZ , β X q f T pβ 0 Xi qE Yi pZi q | β 0 Xi i i 0 β X i“1 j“1 0 ff ( T T T E Xli Yi pZi q | β 0 Xi Kh pβ 0 Xj ´ β 0 Xi qIpZj ě Zi q ( ` ` op p1q T 2 fβT X pβ T 0 Xi qrE Yi pZi q | β 0 Xi s 0 “ T31 ` T32 ` T33 ` op p1q, where T31 T32 « T Kh pβ T λ1 pZi , β T 0 Xj ´ β 0 Xi qXlj IpZj ě Zi q 0 Xi q ( b E ´ ∆i “ n T T T λpZ , β X q f T pβ 0 Xi qE Yi pZi q | β 0 Xi i i 0 β0 X i“1 ff ( T T E Xli Yi pZi q | β 0 Xi Kh pβ 0 Xj ´ β T 0 Xi qIpZj ě Zi q ( ` | ∆ i , Z i , Xi T 2 fβT X pβ T 0 Xi qrE Yi pZi q | β 0 Xi s 0 « ˜ n T T ÿ Kh pβ T λ pZ , β X q 1 i i 0 Xj ´ β 0 Xi qXlj IpZj ě Zi q 0 ( b ´ E ∆i “ n´1{2 λpZi , β T fβT X pβ T Xi qE Yi pZi q | β T Xi 0 Xi q 0 0 j“1 0 ¸ ff ( T T T E Xli Yi pZi q | β 0 Xi Kh pβ 0 Xj ´ β 0 Xi qIpZj ě Zi q ( ` | ∆j , Zj , Xj T 2 fβT X pβ T 0 Xi qrE Yi pZi q | β 0 Xi s ´1{2 n ÿ 0 imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 48 T33 « T Kh pβ T λ1 pZi , β T 0 Xj ´ β 0 Xi qXlj IpZj ě Zi q 0 Xi q ( b E ´ “ ´n E ∆i λpZi , β T fβT X pβ T Xi qE Yi pZi q | β T Xi 0 Xi q 0 0 0 ff¸ ( T T E Xli Yi pZi q | β 0 Xi Kh pβ 0 Xj ´ β T 0 Xi qIpZj ě Zi q ( ` . T 2 fβT X pβ T 0 Xi qrE Yi pZi q | β 0 Xi s 1{2 ˜ 0 Here we used U-statistic property in the last equality above. Now when nh4 Ñ 0, « n T ÿ EtXli Yi pZi q | β T λ pZ , β X q 1 i i 0 Xi u 0 ( b ´ ∆i T31 “ n´1{2 T T λpZi , β 0 Xi q E Yi pZi q | β 0 Xi i“1 (ff ( T E Y pZ q | β X E Xli Yi pZi q | β T X i i i i 0 0 ( ` ` Opn1{2 h2 q 2 s rE Yi pZi q | β T X i 0 “ op p1q. Thus, T33 “ op p1q as well. To analyze T32 , ˜ « n T T ÿ Kh pβ T X q λ pZ , β i 1 i 0 Xj ´ β 0 Xi qXlj IpZj ě Zi q 0 ( T32 “ n´1{2 E ∆i b ´ T T λpZi , β T fβT X pβ T 0 Xi q 0 Xi qE IpZ ě Zi q | β 0 X “ β 0 Xi , Zi j“1 0 ¸ ff ( T T T E Xl IpZ ě Zi q | β T 0 X “ β 0 Xi , Zi Kh pβ 0 Xj ´ β 0 Xi qIpZj ě Zi q ( | ∆j , Zj , Xj ` fβT X pβ T Xi qrE IpZ ě Zi q | β T X “ βT Xi , Zi s2 0 0 0 ˜0 « n T T ÿ Kh pβ T λ pZ , β X q 1 i i 0 xj ´ β 0 Xi qxlj Ipzj ě Zi q 0 ( “ n´1{2 E ∆i b ´ T T λpZi , β T fβT X pβ T 0 Xi q 0 Xi qE IpZ ě Zi q | β 0 X “ β 0 Xi , Zi j“1 0 ff¸ ( T T T E Xl IpZ ě Zi q | β T 0 X “ β 0 Xi , Zi Kh pβ 0 xj ´ β 0 Xi qIpzj ě Zi q ( ` fβT X pβ T Xi qrE IpZ ě Zi q | β T X “ βT Xi , Zi s2 0 0 0 #0 ˜ « n T ÿ xlj Ipzj ě Zi q λ pZ , β X q 1 i i 0 ( E E ∆i “ n´1{2 b ´ T T T λpZi , β 0 Xi q fβT X pβ 0 Xi qE IpZ ě Zi q | β T 0 X “ β 0 Xi , Zi j“1 0 ¸ + ff ( T E Xl IpZ ě Zi q | β T 0 X “ β 0 Xi , Zi Ipzj ě Zi q T T T ( | β 0 Xi Kh pβ 0 xj ´ β 0 Xi q ` fβT X pβ T Xi qrE IpZ ě Zi q | β T X “ βT Xi , Zi s2 0 0 0 0 ˜ « n ÿ xlj Ipzj ě Zi q λ1 pZi , β T 0 xj q ´1{2 ( E ∆i “ n b ´ T T T λpZ , β E IpZ ě Z q | β x q X “ β x , Z i i j j i 0 0 0 j“1 ¸ ff ( T Ipz ě Z q E Xl IpZ ě Zi q | β T X “ β x , Z j i i 0 0 j 1{2 2 T ( h q | βT ` 0 Xi “ β 0 xj ` Op pn T 2 rE IpZ ě Zi q | β T s X “ β x , Z i 0 0 j ˜ n ÿ ∆i Ipzj ě Zi qλ1 pZi , β T 0 xj q ´1{2 ( “ n E T T T SpZi , β 0 xj qλpZi , β 0 xj qE Sc pZi , Xq | β T 0 X “ β 0 xj , Zi j“1 ¸ ff « ( T E Xl Sc pZi , Xq | β T 0 X “ β 0 xj , Zi T ( ´ xlj | β T ` Op pn1{2 h2 q b 0 Xi “ β 0 xj T E Sc pZi , Xq | β T X “ β x , Z j i 0 0 ˜ż n zj ÿ λ1 ps, β T 0 xj q ( “ n´1{2 E T T 0 E Sc ps, Xq | β 0 X “ β 0 xj j“1 ¸ ff « ( T E Xl Sc ps, Xq | β T 0 X “ β 0 xj T T ( ´ xlj Sc ps, Xi qds | β 0 Xi “ β 0 xj ` Op pn1{2 h2 q b T T E Sc ps, Xq | β 0 X “ β 0 xj imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 49 ff ( E Xlj Sc ps, Xj q | β T 0 xj ( ´ xlj ds ` Op pn1{2 h2 q b “ n T E Sc ps, Xj q | β 0 xj j“1 0 ff « ( ż n T T ÿ E X Y psq | β x λ ps, β x q j j lj 1 0 0 j ( ´ xlj ds ` Op pn1{2 h2 q. b Yj psqλps, β T “ n´1{2 0 xj q T T λps, β x q E Y psq | β x j 0 j 0 j j“1 ´1{2 n ż zj ÿ λ1 ps, β T 0 xj q « When nh4 Ñ 0, plugging the results of T1 and T32 to (A.12), we obtain that the expression in (A.8) is « (ff n p Xli Yi pZi q | β T ÿ p 1 pZi , β T Xi q E λ 0 Xi 0 ´1{2 b Xli ´ ∆i n ( p i , β T Xi q p Yi pZi q | β T Xi E λpZ 0 0 i“1 « (ff n ż ÿ E Xli Yi ptq | β T λ1 pt, β T 0 Xi 0 Xi q ´1{2 ( “ n dMi ptq ` op p1q b Xli ´ T T λpt, β E Y ptq | β X q X i i i 0 0 i“1 n ÿ “ n´1{2 Seff p∆i , Zi , Xi q ` op p1q. i“1 Finally, note that T4 + p 1 pZi , β T Xi q λ1 pZi , β T Xi q λ 0 0 ´ ∆i “ n p i , β T Xi q λpZi , β T λpZ 0 Xi q 0 i“1 « ( (ff T p Xli Yi pZi q | β T E Xli Yi pZi q | β 0 Xi E 0 Xi ( ´ ˆ ( p Yi pZi q | β T Xi E Yi pZi q | β T E 0 Xi 0 « ˜ ( ff¸ ( n T p Xli Yi pZi q | β T ÿ E E X Y pZ q | β X X i i i i li 0 0 ( ´ ∆i “ op n´1{2 ( p Yi pZi q | β T Xi E Yi pZi q | β T E 0 Xi 0 i“1 ff ¸ « ˜ ( n ż T ÿ E X Y psq | β x i i li 0 ( ´ xli ds ` op pn1{2 h2 q Yi psqλps, β T “ op n´1{2 0 xi q T E Y psq | β x i 0 i i“1 ´1{2 n ÿ # “ op p1q, where the last equality is because the integrands have mean zero conditional on β T 0 X, and the second last equality is obtained following the same derivation of T3 . Using these results in (A.8), combined with the results on (A.9), it is now clear that the theorem holds. References. Buckley, J. and James, I. (1979). Linear regression with censored ta. Biometrika 66 429–436. Cox, D. R. (1972). Regression models and life tables (with Discussion). Journal of the Royal Statistical Society, Series B. 34 187–220. Cox, D. R. (1975). Partial likelihood. Biometrika 62 269–276. Dabrowska, D. M. and Doksum, K. A. (1988). Partial likelihood in transformation models with censored data. Journal of the Royal Statistical Society, Series B. 18 1–23. Fleming, T. R. and Harrington, D. P. (1991). Counting processes and survival analysis. Wiley, New York. Geng, Y., Lu, W. and Zhang, H. H. (2015). On optimal treatment regimes selection for mean survival time. Statistics in Medicine 34 1169–1184. Hammer, S. M., Katzenstein, D. A., Hughes, M. D., Gundacker, H., Schooley, R. T., Haubrich, R. H., Henry, W. K., Lederman, M. M., Phair, J. P., Niu, M. et al. (1996). A trial comparing nucleoside monotherapy with combination therapy in HIV-infected adults with CD4 cell counts from 200 to 500 per cubic millimeter. New England Journal of Medicine 335 1081–1090. Jiang, R., Lu, W., Song, R. and Davidian, M. (2017). On estimation of optimal treatment regimes for maximizing t-year survival probabilities. Journal of the Royal Statistical Society: Series B 79 1165–1185. imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 50 Li, K. C., Wang, J. L. and Chen, C. H. (1999). Dimension reduction for censored regression data. The Annals of Statistics 27 1–23. Lu, W. and Li, L. (2011). Sufficient dimension reduction for censored regressions. Biometrics 67 513–523. Ma, Y., Zhang, X. et al. (2015). A validated information criterion to determine the structural dimension in dimension reduction models. Biometrika 102 409–420. Mack, Y. P. and Silverman, B. W. (1982). Weak and strong uniform consistency of kernel regression estimates. Probability Theory and Related Fields 61 405–415. McCullagh, P. (1980). Regression models for ordinal data. Journal of the Royal Statistical Society, Series B. 42 109–142. Tsiatis, A. A. (2006). Semiparametric Theory and Missing Data. Springer, New York. Xia, Y., Zhang, D. and Xu, J. (2010). Dimension reduction and semiparametric estimation of survival models. Journal of the American Statistical Association 105 278–290. Zeng, D. L. and Lin, D. Y. (2007). Maximum likelihood estimation in semiparametric regression models with censored data (with discussion). Journal of the Royal Statistical Society, Series B. 69 507–564. imsart-aos ver. 2014/10/16 file: SDR_survival.tex date: October 17, 2017 β4=0 β5=1 β6=0 β7=0 β8=0 1.5 1.5 1.5 1.5 1.5 1 1 1 1 1 0.5 0.5 0.5 0.5 0.5 0 0 0 0 0 −0.5 hmave semi −0.5 hmave semi −0.5 hmave semi −0.5 hmave semi −0.5 hmave semi β4=0 β5=1 β6=0 β7=0 β8=0 1.5 1.5 1.5 1.5 1.5 1 1 1 1 1 0.5 0.5 0.5 0.5 0.5 0 0 0 0 0 −0.5 hmave semi −0.5 hmave semi −0.5 hmave semi −0.5 hmave semi −0.5 hmave sem β4=0 β5=1 β6=0 β7=0 β8=0 1.5 1.5 1.5 1.5 1.5 1 1 1 1 1 0.5 0.5 0.5 0.5 0.5 0 0 0 0 0 −0.5 hmave semi −0.5 hmave semi −0.5 hmave semi −0.5 hmave semi −0.5 hmave semi
10math.ST
DATA AUGMENTATION BY PAIRING S AMPLES FOR I MAGES C LASSIFICATION Hiroshi Inoue IBM Research - Tokyo [email protected] arXiv:1801.02929v1 [cs.LG] 9 Jan 2018 A BSTRACT Data augmentation is a widely used technique in many machine learning tasks, such as image classification, to virtually enlarge the training dataset size and avoid overfitting. Traditional data augmentation techniques for image classification tasks create new samples from the original training data by, for example, flipping, distorting, adding a small amount of noise to, or cropping a patch from an original image. In this paper, we introduce a simple but surprisingly effective data augmentation technique for image classification tasks. With our technique, named SamplePairing, we synthesize a new sample from one image by overlaying another image randomly chosen from the training data (i.e., taking an average of two images for each pixel). By using two images randomly selected from the training set, we can generate N 2 new samples from N training samples. This simple data augmentation technique significantly improved classification accuracy for all the tested datasets; for example, the top-1 error rate was reduced from 33.5% to 29.0% for the ILSVRC 2012 dataset with GoogLeNet and from 8.22% to 6.93% in the CIFAR-10 dataset. We also show that our SamplePairing technique largely improved accuracy when the number of samples in the training set was very small. Therefore, our technique is more valuable for tasks with a limited amount of training data, such as medical imaging tasks. 1 I NTRODUCTION For machine learning tasks, such as image classification, machine translation, and text-to-speech synthesis, the amount of the samples available for training is critically important to achieve high performance by better generalization. Data augmentation, applying a small mutation in the original training data and synthetically creating new samples, is widely used to virtually increase the amount of training data (e.g. Krizhevsky et al. (2012), Szegedy et al. (2015), Fadaee et al. (2017)). There are a wide variety of approaches to synthesizing new samples from original training data; for example, traditional data augmentation techniques include flipping or distorting the input image, adding a small amount of noise, or cropping a patch from a random position. Use of data augmentation is mostly the norm for winning image classification contests. In this paper, we introduce a simple but surprisingly effective data augmentation technique for image classification tasks. With our technique, named SamplePairing, we create a new sample from one image by overlaying another image randomly picked from the training data (i.e., simply taking an average of two images for each pixel). By using two images randomly selected from the training set, we can generate N 2 new samples from N training samples. Even if we overlay another image, we use the label for the first image as the correct label for the overlaid (mixed) sample. This simple data augmentation technique gives significant improvements in classification accuracy for all tested datasets: ILSVRC 2012, CIFAR-10, CIFAR-100, and SVHN. For example, the top-1 error rate was reduced from 33.5% to 29.0% for the ILSVRC 2012 dataset with GoogLeNet and from 8.22% to 6.93% in the CIFAR-10 dataset with a simple 6-layer convolutional network. We also conducted data augmentation by overlaying an image picked from outside the training set; this approach also gives some improvements, but our technique, which picks an image to overlay from the training set, gives a far more significant gain. To show that our SamplePairing technique often gives larger benefits when the number of samples in the training data is smaller, we conducted the evaluations by reducing the number of samples used for training with the CIFAR-10. The results showed that 1 our technique yields larger improvements in accuracy when the number of samples are smaller than the full CIFAR-10 dataset. When we used only 100 samples per label (thus, 1,000 samples in total), the classification error rate was reduced from 43.1% to 31.0% with our technique. Based on these results, we believe that our technique is more valuable for tasks with a limited number of training datasets available, such as medical image classification tasks. 2 R ELATED WORK When a model is trained with a small training set, the trained model tends to overly fit to the samples in the training set and results in poor generalization. Data augmentation has been widely used to avoid this overfitting (poor generalization) problem by enlarging the size of the training set; thus, it allows the use of a larger network without significant overfitting. For example, Krizhevsky et al. employ a couple of data augmentation techniques in their Alexnet paper (Krizhevsky et al. (2012)) using random numbers: 1) randomly cropping patches of 224 × 224 pixels from the original image of 256 × 256 pixels, 2) horizontally flipping the extracted patches, and 3) changing the intensity of RGB channels. Many submissions in the ImageNet Large Scale Visual Recognition Challenge (ILCVRC) employed the first two techniques, which can give a 2048x increase in the dataset size. Our SamplePairing technique is another way to enlarge the dataset size. Since it creates pairs of images, it gives N 2 samples from the original N samples. Also, our technique is orthogonal to other data augmentation techniques; as detailed later, our implementation employs the above two basic data augmentation techniques used in Alexnet in each epoch. In this case, we can synthesize (2048 × N )2 samples in total. There are many ways to avoid overfitting other than the data augmentation. Dropout (Hinton et al. (2012)) and its variants (e.g. Wan et al. (2013)) are famous techniques used to avoid overfitting by randomly disabling connections during training. Batch normalization (Ioffe & Szegedy (2015)), which intends to solve the problem of internal covariate shift, is also known to be (potentially) effective to prevent overfitting. Our SamplePairing data augmentation is again orthogonal to these techniques and we can employ both techniques to achieve better generalization performance. Our technique randomly picks an image to overlay from the training set and creates pairs to synthesize a new sample. Our technique is not the first to create a new sample from two randomly picked original samples; existing work such as Chawla et al. (2002) and Wang & Perez (2017) also create a new sample from two samples. SMOTE, Synthetic Minority Over-sampling Technique, by Chawla et al. is a well-known technique for an imbalanced dataset; i.e., the dataset consists of a lot of ”normal” samples and a small number of ”abnormal” samples. SMOTE does over-sampling of the minority class by synthesizing a new sample from two randomly picked samples in the feature space. Comparing our technique against SMOTE, the basic idea of pairing two samples to synthesize a new sample is common between the two techniques; however, we apply the pairing for the entire dataset instead of for the minority class. Wang and Perez conducted data augmentation by pairing images using an augmentation network, a separate convolutional network, to create a new sample. Compared to their work, we simply average the intensity of each channel of pixels from two images to create a new sample and we do not need to create an augmentation network. Also, our technique yields more significant improvements compared to their reported results. A paper on a technique called mixup (Anonymous (2018), Zhang et al. (2017)) is submitted to the same conference (ICLR 2018). Although developed totally independently, mixup also mixes two randomly selected samples to create a new training data as we do in this paper. The differences between our SamplePairing and mixup include 1) mixup overlaying sample labels as well while we use the label from only one sample, 2) they use weighted average (with randomly selected weight) to overlay two samples and 3) they tested tasks other than image classification including speech recognition and Generative Adversarial Network (Goodfellow et al. (2014)). About the label to be used in training, Huszár (2017) pointed out that using the label from only one sample without overlaying the labels from two examples will resulted in the same learning result. This way is simpler than blending two labels and also is suitable for a semi-supervised setting. We also tested overlaying labels from two samples in our SamplePairing and we did not see the differences in the results larger than those due to a random number generator (see appendix). 2 label A image A (256 x 256) basic data augmentation label A label A patch A mixed patch (224 x 224) (224 x 224) training network mixing unused label B image B (256 x 256) basic data augmentation randomly picked from training set label B averaging intensity of two patches for each pixel (RGB channels) patch B (224 x 224) 1) extracting a 224x224 patch from a random position, 2) horizontal flipping randomly Figure 1: Overview of our SamplePairing data augmentation for ILSVRC dataset. For other datasets, the size of the original images is 32 × 32 and the size of the extracted patches is 28× 28. 3 M ETHOD – DATA AUGMENTATION BY SamplePairing This section describes our SamplePairing data augmentation technique. The basic idea of our technique is simple: We synthesize a new image from two images randomly picked from the training set as done in some existing techniques, such as Chawla et al. (2002) and Wang & Perez (2017). To synthesize a new image, we take the most naive approach, just averaging the intensity of two images for each pixel. Figure 1 depicts the overview of our sample pairing technique. For each training epoch, all samples are fed into the network for training in randomized order. For our technique, we randomly picked another image (image B in Figure 1) from the training set, took an average of the two images, and fed the mixed image associated with the label for the first image into the network for training. Hence, essentially, our SamplePairing randomly creates pairs of samples from the training set and synthesizes a new sample from them. The label for the second image was not used in the training. Since two images are equally weighted in the mixed image, a classifier cannot correctly predict the label of the first image (label A in Figure 1) from the mixed image unless label A and label B are the same label. So, the training loss cannot become zero even using a huge network and the training accuracy cannot surpass about 50% on average; for N -class classification, the maximum training accuracy is 0.5 + 1/(N × 2) if all classes have the same number of samples in the training set. Even though the training accuracy will not be high with SamplePairing, both the training accuracy and validation accuracy quickly improve when we stop the SamplePairing as the final fine-tuning phase of training. After the fine-tuning, the network trained with our SamplePairing can achieve much higher accuracy than the network trained without our technique, as we empirically show in this paper. The network trained with SamplePairing shows higher training error rate and training loss than the network trained without SamplePairing even after the fine tuning since the SamplePairing is a strong regularizer. When other types of data augmentation are employed in addition to our technique, we can apply them for each image before mixing them into the final image for training. The data augmentation incurs additional time to prepare the input image, but this can be done on the CPU while the GPU is executing the training through back propagation. Therefore, the additional execution time of the CPU does not visibly increase the total training time per image. As for the entire training process, we do as follows: 1) We start training without our SamplePairing data augmentation (but with basic data augmentations, including random flipping and random extraction). 3 Table 1: Training and validation sets error rates with and without our SamplePairing data augmentation. Dataset training error without SamplePairing CIFAR-10 0.55% CIFAR-100 SVHN ILSVRC with 100 classes ILSVRC with 1000 classes top-1 error top-5 error top-1 error top-5 error with SamplePairing 1.25% validation error without SamplePairing 8.22% 6.93% -15.68% 10.56% 0.95% 3.21% 26.21% 21.02% -19.82% 17.58% 33.51% 29.01% -13.46% - 1.52% - 2.08% - - 4.28% 8.58% 13.15% 27.9% reduction in error rate 5.78% 0.84% 30.5% with SamplePairing 4.15% 6.11% 11.36% -8.58% -3.05% -28.74% -13.55% 2) After completing one epoch (for the ILSVRC) or 100 epochs (for other datasets) without SamplePairing, we enable SamplePairing data augmentation. 3) In this phase, we intermittently disable SamplePairing. For the ILSVRC, we enable SamplePairing for 300,000 images and then disable it for the next 100,000 images. For other datasets, we enable SamplePairing for 8 epochs and disable it for the next 2 epochs. 4) To complete the training, after the training loss and the accuracy become mostly stable during the progress of the training, we disable the SamplePairing as the fine-tuning. We evaluated various training processes; for example, intermittently disabling SamplePairing with the granularity of a batch or without intermittently disabling it. Although SamplePairing yielded improvements even with the other training processes, we empirically observed that the above process gave the highest accuracy in the trained model. 4 4.1 E XPERIMENTS I MPLEMENTATION In this section, we investigate the effects of SamplePairing data augmentation using various image classification tasks: ILSVRC 2012, CIFAR-10, CIFAR-100, and Street View House Numbers (SVHN) datasets. For the ILSVRC dataset, we used GoogLeNet (Szegedy et al. (2015)) as the network architecture and trained the network using stochastic gradient descent with momentum as the optimization method with the batch size of 32 samples. For other datasets, we used a network that has six convolutional layers with batch normalization (Ioffe & Szegedy (2015)) followed by two fully connected layers with dropout (Hinton et al. (2012)). We used the same network architecture except for the number of neurons in the output layer. We trained the network using Adam (Kingma & Ba (2014)) as the optimizer with the batch size of 100. During the training, we used data augmentations by extracting a patch from a random position of the input image and using random horizontal flipping as the baseline regardless of whether or not it was with our SamplePairing as shown in Figure 1. In this paper, we do not ensemble predictions in the results. For the validation set, we extracted the patch from the center position and fed it into the classifier without horizontal flipping. We implemented our algorithm using Chainer (Tokui et al. (2015)) as the framework. 4.2 R ESULTS We show the improvements in the accuracy by our SamplePairing data augmentation in Table 1. For the ILSVRC dataset, as well as the full dataset with 1,000 classes, we tested a shrinked dataset with only the first 100 classes. For all the datasets we evaluated, SamplePairing reduced the classification error rates for validation sets from 3.1% (for SVHN) up to 28.8% (for the top-5 error rate of the ILSVRC with 100 classes). For training sets, our SamplePairing increased training errors for all datasets by avoiding overfitting. When comparing the ILSVRC with 100 classes and with 1,000 4 0.2 Validation error for CIFAR-10 lower is better 0.18 0.14 0.12 fine tuning 0.1 0.08 0.06 0.04 SamplePairing enabled intermittently (enabled for 8 epochs and then disabled for 2 epochs) 0.02 0 1 0.9 0 50 100 150 200 250 300 350 400 450 500 550 600 650 700 750 800 850 900 950 epoch without SamplePairing with SamplePairing Validation error for ILSVRC lower is better validation set error rate 0.16 validation set top-1 error rate 0.8 0.7 0.6 fine tuning 0.5 0.4 0.3 0.2 0.1 SamplePairing enabled intermittently (enabled for 300k images and then disabled for 100k images) 0 # trained images (x100k) without SamplePairing with SamplePairing Figure 2: Changes in validation error rates for CIFAR-10 and ILSVRC datasets with and without our SamplePairing data augmentation. classes (or the CIFAR-10 and CIFAR-100), the case with 100 classes (CIFAR-10) has a much lower training error rate and potentially suffers from the overfitting more severely. Therefore, the benefits of our SamplePairing data augmentation are more significant for the case with 100 classes than the case with 1,000 classes (for the CIFAR-10 than CIFAR-100). These results show that SamplePairing yields better generalization performance and achieves higher accuracy. Figure 2 and Figure 3 illustrate the validation error rates and the training error rates for the CIFAR10 and ILSVRC datasets. From Figure 2, we can see much better final accuracy in trade for longer training time. Because we disabled SamplePairing data augmentation intermittently (as described in the previous section), both the training error rates and validation error rates fluctuated significantly. When the network was under training with SamplePairing enabled, both the validation error rate and training error rate were quite poor. In particular, the training error rate was about 50% as we expected; the theoretical best error rate for a 10-class classification task was 45%. Even after the fine tuning, the networks trained with SamplePairing show more than 2x higher training error rate for CIFAR-10 and more than 10x higher for ILSVRC. For the validation set, however, when we disabled the SamplePairing, the validation error rates became much lower than the baseline, which did not employ SamplePairing at all, after the fine tuning as already shown in Table 1. We also show the changes in training and valiadation losses for ILSVRC dataset in Figure 4. The losses match with the training and validation error rates. Without SamplePairing, we achieved the 5 1 SamplePairing enabled intermittently (enabled for 8 epochs and then disabled for 2 epochs) 0.7 0.6 0.5 0.4 0.3 0.2 fine tuning 0.1 0 0 50 100 150 200 250 300 350 400 450 500 550 600 650 700 750 800 850 900 950 epoch without SamplePairing 1 0.9 training set top-1 error rate 0.8 with SamplePairing Training error for ILSVRC SamplePairing enabled intermittently (enabled for 300k images and then disabled for 100k images) 0.7 0.6 lower is better training set error rate 0.8 lower is better Training error for CIFAR-10 0.9 0.5 0.4 fine tuning 0.3 0.2 0.1 0 # trained images (x100k) without SamplePairing with SamplePairing Figure 3: Changes in training error rates for CIFAR-10 and ILSVRC datasets with and without our SamplePairing data augmentation. minimum validation loss in an early stage of the training and the validation loss gradually increased after that point. With SamplePairing, we did not see such increase in the validation loss. Figure 5 shows how our SamplePairing data augmentation causes improvements when the number of samples available for training is limited; we change the number of training samples in the CIFAR10. The CAFAR-10 dataset provides 5,000 samples for each of 10 classes in the training set. We gradually reduced the number of images used for training from 5,000 samples to only 10 samples per class. As shown in Figure 5, the largest gain of SamplePairing was 28% when we used 100 samples per class; the error rate was reduced from 43.1% to 31.0%. When we used only 50 samples per class, the second largest reduction of 27% was achieved. The error rate using 50 samples with SamplePairing was actually better than the error rate using 100 samples without SamplePairing. When we didn’t use all the images in the training set, we also evaluated the effect of overlaying an image randomly chosen from an image not in the training set. For example, if we used only 100 images for training, we made a pool of 100 images selected from the other 4,900 unused images and then randomly picked the image to overlay (i.e., image B in Figure 1) from this pool. The results are shown in Figure 5 as ”pairing with non-training sample.” This method also reduced error rates (except for the case of 10 images per class), but our SamplePairing, which picks an image from the training set, yielded more significant improvements regardless of the training set size. Our SamplePairing, which does not require images other than the training set, is easier to implement and also gives larger gains compared to naively overlaying another image. 6 9 8 validation loss 7 Validation loss for ILSVRC SamplePairing enabled intermittently (enabled for 300k images and then disabled for 100k images) 6 lower is better 10 5 4 fine tuning 3 2 1 0 # trained images (x100k) 12 10 with SamplePairing Training loss for ILSVRC SamplePairing enabled intermittently (enabled for 300k images and then disabled for 100k images) training loss 8 lower is better without SamplePairing 6 4 fine tuning 2 0 # trained images (x100k) without SamplePairing with SamplePairing Figure 4: Changes in validation and training losses for ILSVRC datasets with and without our SamplePairing data augmentation. In this paper, we disabled SamplePairing intermittently. Figure 6 shows how the ratio with and without SamplePairing enabled affects the final classification error on CIFAR-10. In the configuration we used in this paper (disabling SamplePairing in 2 epochs per 10 epochs, i.e. enabled in 80% of the training epochs), we got slightly better final results compared to the case without disabling SamplePairing. However, the differences were not significant if we enabled SamplePairing in more than a half of epochs; hence the tuning of the rate to disable SamplePairing is not that sensitive. 5 C ONCLUSION This paper presents our new data augmentation technique named SamplePairing. SamplePairing is quite easy to implement; simply mix two randomly picked images before they are fed into a classifier for training. Surprisingly, this simple technique gives significant improvements in classification accuracy by avoiding overfitting, especially when the number of samples available for training is limited. Therefore, our technique is valuable for tasks with a limited number of samples, such as medical image classification tasks. In this paper, we only discussed empirical evidences without theoretical explanations or proof. In future work, we like to provide a theoretical background on why SamplePairing helps generalization so much and how we can maximize the benefits of data augmentation. Another important future work is applying SamplePairing to other machine learning tasks especially Generative Adversarial Networks (Goodfellow et al. (2014)). 7 lower is better 0.8 0.7 0.6 classification error rate errors reduced by 28% 0.5 0.4 0.3 0.2 0.1 0 5000 2500 without SamplePairing 500 100 # images per class with SamplePairing 50 20 10 pairing with non-training sample Figure 5: Validation error rates for CIFAR-10 with reduced number of samples in training set. lower is better 8.5% validation set error rate 8.0% 7.5% 7.0% 6.5% 6.0% (non-zero origin) without enabled in SamplePairing 20% of epochs enabled in 40% of epochs enabled in 50% of epochs enabled in 60% of epochs enabled in 70% of epochs enabled in 80% of epochs (default in this paper) enabled in 90% of epochs enabled in all epochs with SamplePairing Figure 6: Validation error rates for CIFAR-10 with different ratios for intermittently disabling SamplePairing. R EFERENCES Anonymous. mixup: Beyond empirical risk minimization. International Conference on Learning Representations, 2018. URL https://openreview.net/forum?id=r1Ddp1-Rb. Nitesh V. Chawla, Kevin W. Bowyer, Lawrence O. Hall, and W. Philip Kegelmeyer. Smote: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research, 16(1):321– 357, 2002. Marzieh Fadaee, Arianna Bisazza, and Christof Monz. Data augmentation for low-resource neural machine translation. arXiv:1705.00440, 2017. Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial networks. arXiv:1406.2661, 2014. 8 Geoffrey Hinton, Nitish Srivastava, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. Improving neural networks by preventing co-adaptation of feature detectors. arXiv:1207.0580, 2012. Ferenc Huszár. mixup: Data-dependent data augmentation, 2017. URL http://www. inference.vc/mixup-data-dependent-data-augmentation/. Sergey Ioffe and Christian Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv:1502.03167, 2015. Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv:1412.6980, 2014. Alex Krizhevsky, Ilya Sutskever, and Geoffrey Hinton. Imagenet classification with deep convolutional neural networks. In Annual Conference on Neural Information Processing Systems (NIPS), pp. 1106–1114, 2012. Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. Going deeper with convolutions. In Conference on Computer Vision and Pattern Recognition (CVPR), 2015. Seiya Tokui, Kenta Oono, Shohei Hido, and Justin Clayton. Chainer: a next-generation open source framework for deep learning. In Workshop on Machine Learning Systems (LearningSys), 2015. Li Wan, Matthew Zeiler, Sixin Zhang, Yann LeCun, and Rob Fergus. Regularization of neural networks using dropconnect. In International Conference on Machine Learning (ICML), pp. III– 1058–III–1066, 2013. Jason Wang and Luis Perez. The effectiveness of data augmentation in image classification using deep learning. Stanford University research report, 2017. Hongyi Zhang, Moustapha Cissé, Yann N. Dauphin, and David Lopez-Paz. mixup: Beyond empirical risk minimization. arXiv:1710.09412, 2017. URL http://arxiv.org/abs/1710. 09412. 9 6 A PPENDIX In our SamplePairing, we take the label from only one sample (label A in Figure 1) and discard the label from another (label B). Figure 7 shows the validation error with CIFAR-10 if we use both labels for each synthesized sample, i.e. with 0.5 assigned to each in the softmax target of two samples. From Figure 7, we can see that difference due to the use of one label or two labels was not significant. This result is consistent with what Huszár (2017) pointed out on mixup (Zhang et al. (2017)). 0.2 Validation error for CIFAR-10 lower is better validation set error rate 0.18 0.16 0.14 0.12 0.1 0.08 0.06 0 50 100 150 200 250 300 350 400 450 500 550 600 650 700 750 800 850 900 950 epoch without SamplePairing with SamplePairing with label from only one sample with SamplePairing with label from two samples Figure 7: Validation error rates for CIFAR-10 when using lebels from both samples. 10
1cs.CV
On kernel design for regularized LTI system identification ⋆ Tianshi Chen arXiv:1612.03542v3 [cs.SY] 31 Jul 2017 School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen, 518172, China, (e-mail: [email protected]). Abstract There are two key issues for the kernel-based regularization method: one is how to design a suitable kernel to embed in the kernel the prior knowledge of the LTI system to be identified, and the other one is how to tune the kernel such that the resulting regularized impulse response estimator can achieve a good bias-variance tradeoff. In this paper, we focus on the issue of kernel design. Depending on the type of the prior knowledge, we propose two methods to design kernels: one is from a machine learning perspective and the other one is from a system theory perspective. We also provide analysis results for both methods, which not only enhances our understanding for the existing kernels but also directs the design of new kernels. Key words: System identification, regularization methods, kernel methods, kernel design, prior knowledge. 1 Introduction Among diverse system identification problems, the linear time-invariant (LTI) system identification is a classical and fundamental problem. As well-known, an LTI system is uniquely characterized by its impulse response, and thus the LTI system identification is equivalent to its impulse response estimation that could be ill-conditioned in practice. So to tackle the LTI system identification, one needs to first find a way to make the ill-conditioned problem well-conditioned. Then one faces the core issue of system identification, i.e., how to construct a model estimator able to achieve a good biasvariance tradeoff, or equivalently, to suitably balance the adherence to the data and the model complexity. There are different routes to handle these two issues. The ⋆ Abridged and preliminary results of this paper was presented in the 19th IFAC World Congress, Cape Town, South Africa, 2014, the European Research Network on System Identification (ERNSI) workshop, Ostend, Belgium, 2014, and the 17th IFAC Symposium on System Identification, Beijing, China, 2015. This work is supported by the Thousand Youth Talents Plan funded by the central government of China, the Shenzhen Projects Ji-20170189 and Ji-20160207 funded by Shenzhen Science and Technology Innovation Council, the President’s grant under contract No. PF. 01.000249 and the Start-up grant under contract No. 2014.0003.23 funded by the Chinese University of Hong Kong, Shenzhen, as well as by a research grant for junior researchers under contract No. 2014-5894, funded by Swedish Research Council. Preprint submitted to Automatica most widely used route is to adopt instead a parametric model structure with a finite number of parameters. The so-called maximum likelihood/prediction error method (ML/PEM) is one method along this route. It has optimal asymptotic properties and is the current standard method to LTI system identification. It first postulates a parametric model structure, e.g., a rational transfer function, then forms the prediction error criterion, and finally obtains the model estimator by minimizing the prediction error criterion; see e.g., [1,2]. The model complexity of the parametric model structure is governed by the number of parameters and tuned in a discrete manner. The bias-variance tradeoff issue is handled by cross validation or model structure selection criteria such as Akaike’s information criterion (AIC), Bayesian information criterion (BIC), and etc, which correspond to combinatorial optimization problems; see e.g., [1, Chapter 16]. However, these techniques are not as reliable as expected when the data is short and/or has low signal-tonoise ratio; see e.g., [3,4]. Another route is to adopt regularization by adding an extra regularization term in the estimation criterion. The kernel-based regularization method (KRM) proposed in the seminal paper [5] and further developed in [6,3,7] is one method along this route. It first proposes a kernel parameterized by some hyper-parameters for the impulse response, then estimates these hyper-parameters with certain methods, and finally obtains the estimate of the impulse response by minimizing a regularized least squares criterion with the regularization term in quadratic form and the regularization matrix defined 1 August 2017 tails. This finding leads to the machine learning method to design general kernels: design the rank-1 kernel and the stationary kernel to account for the decay and the varying rate of the impulse response, respectively. through the kernel; see [4] for a recent survey. While the impulse response model is used, the underlying model structure is determined by the kernel. The model complexity is governed by the hyper-parameters of the kernel, and tuned in a continuous manner by e.g., the empirical Bayes method, Stein’s unbiased risk estimator [4,8,9] and etc., which correspond to non-convex but non-combinatorial optimization problems. To develop the system theory method, we recall the general guideline to design a kernel in [3] that is to let the kernel mimic the behavior of the optimal kernel [3, Thm. 1] and [4, Prop. 19]. Moreover, the prior knowledge for the impulse response, or equivalently, the LTI system to be identified, shall be made use of, since the optimal kernel depends on the true impulse response. Following this guideline and employing the multiplicative uncertainty configuration in robust control, see e.g. [20], we design the simulation induced (SI) kernel. In particular, the prior knowledge is embedded in the nominal model, the uncertainty is assumed to be stable and finally, the multiplicative uncertainty configuration is used to take into account both the nominal model and the uncertainty and is simulated with an impulsive input to get the SI kernel. Then we make analysis for SI kernels in terms of stability, maximum entropy property, and Markov property, with the SS and DC kernels as examples. In particular, we give conditions under which the SI kernel is stable, solves a suitably defined entropy maximization problem, and induces a Gaussian Markov process. The maximum entropy interpretation enhances our understanding about a kernel, and the Markov property of a kernel ensures that the inverse of the kernel matrix is banded and this special structure can be exploited to derive more stable and efficient implementation for the KRM, see e.g., [21,18]. The route to adopt regularization is by no means new, see e.g., [10], [11], [1, p. 504-505] and also [12] for a historic review, but no important progress along this route has been reported until [5]. The major obstacle is that it was unclear whether or not it is possible to design the regularization to embed the prior knowledge of the LTI system to be identified. The intriguing finding disclosed by the KRM is that when considering impulse response estimation problem, it is possible to design a regularization in quadratic form or equivalently a kernel to embed the prior knowledge of the impulse response of the LTI system to be identified. So far several kernels have been invented to embed various prior knowledge, e.g., [5,6,3,7,13,14,15,16,17,18,19] and some analysis results of the corresponding kernels have been derived, e.g., [5,3,7,13,14,15,16,17,18]. Still, there lack systematic ways to design kernels to embed in the kernel the prior knowledge of the impulse response of the LTI system to be identified. In this paper, we try to develop systematic ways to design kernels. Clearly, this issue relates to the type of the prior knowledge. Interestingly, even for the same impulse response estimation problem, users with different background may come up with different types of prior knowledge because they may treat the impulse response in different ways. For instance, users from machine learning may treat the impulse response as a function, whose amplitude varies with a certain rate and decays exponentially to zero in the end; users from signals and systems may associate the impulse response with an LTI system that is stable and may be overdamped, underdamped, has multiple distinct time constants and resonant frequencies, and etc. Accordingly, we provide two methods to design kernels to embed the corresponding type of prior knowledge from a machine learning perspective and from a system theory perspective, respectively. The remaining part of this paper is organized as follows. In Section 2, the KRM is recapped. The machine learning and system theory methods to design kernels are introduced in Section 3 and 4, respectively. Then a case study is provided in Section 5 to demonstrate how to design kernels from the proposed two methods to model impulse responses with damped oscillation. Finally, this paper is concluded in Section 6 with a take-home message. The proofs of all propositions and theorems are given in the Appendix. 2 To develop the machine learning method, we first point out a common feature of the two most widely used single kernels, i.e., the stable spline (SS) kernel in [5] and the diagonal-correlated (DC) kernel in [3], that they belong to the class of the so-called amplitude modulated locally stationary (AMLS) kernel. The AMLS kernel is a multiplication of two kernels: a rank-1 kernel and a stationary kernel. It has a neat implication: the zero mean Gaussian process with the AMLS kernel as the covariance function can be seen as an amplitude modulated (by the rank-1 kernel) zero mean Gaussian processes with the stationary kernel as covariance function; see Section 3 for de- LTI System Identification with Kernel-based Regularization Method 2.1 Impulse Response Estimation Consider a single-input-single-output, causal and LTI system described by y(t) = (g ∗ u)(t) + v(t), t = Ts , 2Ts , · · · , N Ts , (1) where t is the time index, y(t), u(t), v(t) ∈ R and g(t) ∈ R are the measured output, input, disturbance, and impulse response of the LTI system at time t, respectively, 2 inite kernel k(t, s; θ) 1 with t, s ∈ X, where for the DT case, X = N and for the CT case, X = {t|t ≥ 0}, and θ ∈ Rm is a hyper-parameter vector that contains the parameters used to parameterize the kernel, and then solves the following regularized least squares problem: (g∗u)(t) is the convolution between the impulse response g(·) and the input u(·) evaluated at time t, and Ts is the sampling period and for convenience chosen to be 1. The system (1) represents both discrete-time (DT) system with t = 1, 2, · · · , and continuous-time system (CT) with t ≥ 0. In particular, we have (g ∗ u)(t) = ( P∞ τ =1 g(τ )u(t R∞ 0 − τ ), DT, g(τ )u(t − τ )dτ, CT, ĝ(t) = arg min g∈Hk (2) Kernel-based Regularization Method a(t, s; θ) = (k(t, ·; θ) ∗ u)(s), At,s (θ) = (a(·, s; θ) ∗ u)(t) As well-known [10], [1, p. 504-505], straightforward impulse response estimation, i.e., g N X t=1 (3) We will discuss the issue of kernels in the next subsections. For the time being, we assume that a suitable kernel k(t, s; θ) has been designed, but its hyper-parameter θ is left to be determined. The current most widely used method to determine θ is the so-called empirical Bayes method [23]. It first embeds the regularization in a Bayesian framework, and then estimates θ and possibly also the noise variance σ 2 by maximizing the marginal likelihood p(Y |η), where Y ∈ RN with y(t) being its tth element, and η could be θ or the concatenation of θ and σ 2 . Specifically, we define A(θ) ∈ RN ×N with its (t, s)th element At,s (θ) defined by The goal of LTI system identification is to estimate the impulse response g(t) as well as possible given the data y(t), u(t) with t = 1, 2, · · · , N for the DT case and y(t) with t = 1, 2, · · · , N and u(t) with t ≥ 0 for the CT case. minimize t=1 (y(t) − (g ∗ u)(t))2 + γkgk2Hk , where kgkHk is the norm of g in Hk , and γ > 0 is a regularization parameter and controls the tradeoff between PN the data fit t=1 (y(t) − (g ∗ u)(t))2 and the regularization term kgk2Hk . where the unmeasured portions of u(t) are set to zero. Moreover, the system (1) is assumed to be stable, i.e., g ∈ ℓ1 for the DT case and g ∈ L1 for the CT case, where ℓ1 denotes the space of absolutely convergent sequences and L1 denotes the space of absolutely Lebesgue integrable functions on t ≥ 0, and the disturbance v(t) is assumed to be a white Gaussian noise with zero mean and variance σ 2 and independent of u(t). 2.2 N X and moreover, we let Σ(η) = A(θ) + σ 2 IN , where IN is the N -dimensional identity matrix. Then we get (y(t) − (g ∗ u)(t))2 minimize Y T Σ(η)−1 Y + log det Σ(η), η∈Γ where Γ is a constraint set where we search for η. When an estimate of η is obtained, the solution to (3) is given by the representer theorem [4, Theorem 3]: could be an ill-conditioned problem in practice and one way to overcome this problem is to adopt regularization. Moreover, the recent progresses for KRM [5,6,3,7] show that if the regularization is well designed and tuned, the resulting regularized impulse response estimator can also achieve a good bias-variance tradeoff. ĝ(t) = N X ĉs a(t, s; θ), (4) s=1 To introduce the KRM, we first recall the definition of the positive semidefinite kernel and its associated reproducing kernel Hilbert space (RKHS). Let (X, d) be a metric space with d being its metric. A function k : X × X → R is called a positive Pmsemidefinite kernel, if it is symmetric and satisfies i,j=1 ai aj k(xi , xj ) ≥ 0 for any finite set of points {x1 , · · · , xm } ⊂ X and {a1 , ..., am } ⊂ R. As well-known from e.g., [22], to every positive semidefinite kernel k there corresponds to one and only one class of functions with a unique determined inner product in it, leading to the so-called reproducing kernel Hilbert space (RKHS) Hk with k as the reproducing kernel. where ĉs is the sth element of ĉ = (A(θ) + σ 2 IN )−1 Y . 2.3 Existing Single Kernels So far the two mostly widely used single kernels are the stable spline (SS) kernel [5] and the diagonal/correlated (DC) kernel [3]. The SS kernel is defined as 1 k SS (t, s; θ) = c exp(−β(t + s) − β max{t, s}) 2 1 − c exp(−3β max{t, s}), θ = [c β]T , c, β ≥ 0, (5) 6 1 The KRM first introduces a suitable positive semidef- 3 Sometimes the dependence of k(t, s; θ) on θ is ignored. in [13, Lemma 8]. More generally, the designed kernel should guarantee that its associated RKHS Hk is a subspace of ℓ1 or L1 and a kernel that has such property is said to be stable [13,4]. Sufficient and necessary conditions for a kernel to be stable exist and are given below. and the DC kernel is defined as k DC (t, s; θ) = cλ(t+s)/2 ρ|t−s| , θ = [c λ]T (6) k TC (t, s; θ) = c min(λt , λs ), θ = [c λ ρ]T ( |ρ| ≤ 1, DT c ≥ 0, 0 ≤ λ < 1, 0 ≤ ρ ≤ 1, CT (7) Lemma 2.2 ([24,13]) A positive semidefinite kernel k is stable if and only if where the TC √ kernel is a special case of the DC kernel with ρ = λ and is also called the first order stable spline kernel. DT: CT: P∞ P∞ s=1 | R∞ R∞ 0 0 t=1 k(t, s)l(t)| < ∞, ∀ l(t) ∈ ℓ∞ k(t, s)l(t)dt ds < ∞, ∀ l(t) ∈ L∞ (10) Remark 2.1 It is worth to note that for ρ < 0 and |t − s| 6∈ N, ρ|t−s| is complex and thus k DC (t, s; θ) with ρ < 0 is not well defined for the CT case. where L∞ and ℓ∞ denote the space of bounded functions on R≥0 and bounded sequences, respectively. 2.4 Corollary 2.1 ([13,4]) A positive semidefinite kernel k is stable if Optimal Kernel and Stable Kernel For the KRM, the optimal kernel in the sense of minimizing the mean square error (MSE) exists [3,4] and motivates a general guideline to design a kernel. To state this result, we assume that the data has been generated by (1) for a true impulse response g 0 (t) and we let ḡ 0 and ĝ¯ to represent any finite dimensional vector obtained by sampling g 0 (t) and its estimate ĝ(t) at the same arbitrary time instants. Then the following result holds. DT: CT: 2.5 Lemma 2.1 (Optimal kernel, [3,4]) Letting γ = σ . Then for the KRM, the MSE matrix (8) k opt (t, s) = g 0 (t)g 0 (s), (9) where E is the mathematical expectation, is minimized by the kernel t, s ∈ X (11) Kernel Design Hereafter, we focus on the problem of kernel design. The problem is stated as follows: for the given prior knowledge of the impulse response to be identified, our goal is to design a kernel such that the prior knowledge is embedded in the kernel. The answer should depend on the type of the prior knowledge. We will consider two types of prior knowledge and discuss how to design kernels accordingly from two perspectives: a machine learning perspective and a system theory perspective. 2   MSE(k) , E (ĝ¯ − ḡ 0 )(ĝ¯ − ḡ 0 )T , P∞ t=1 k(t, s)| < ∞, s=1 | R∞ R∞ 0 k(t, s)dt ds < ∞. 0 P∞ It should be noted that the LTI system (1) is assumed to be stable, meaning that g ∈ ℓ1 or L1 becomes our first prior knowledge. In this regard, Theorem 2.2 becomes a rule that the designed kernel should obey. in the sense that MSE(k)−MSE(k opt ) is positive semidefinite for any positive semidefinite kernel k. The optimal kernel k opt cannot be applied in practice as it depends on the true impulse response g 0 (t). However, it motivates a general guideline to design a kernel: let the kernel mimic the behavior of the optimal kernel, and moreover, the prior knowledge of the true impulse response should be used in the design of the kernel. Remark 2.2 Other than stability, the cases where the impulse response or the corresponding LTI system is known to have relative degree, to be monotonic, smooth and to have delay, have been discussed in [13] and in particular, sufficient and/or necessary conditions for a kernel to have such properties are given. For instance, if a CT kernel k is m-times continuously differentiable, then every function h ∈ Hk is m-times continuously differentiable [25, Corollary 4.36, p. 131], [13, Lemma 5]. For instance, if the LTI system is known to be stable, i.e., g ∈ ℓ1 or L1 , then the designed kernel k should reflect this, and a necessary condition to satisfy is that k(t, t) should tend to 0 as t goes to infinity. This observation basically rules out the possibility to model the impulse response of stable LTI systems with stationary kernels 2 and a rigorous proof for this has been given 3 A Machine Learning Perspective We first show that both the SS kernel and the DC kernel belong to the class of the so-called amplitude modulated locally stationary (AMLS) kernel. Accordingly, we propose to treat the impulse response as a function, whose 2 Recall that a kernel k(t, s) with t, s ∈ X is said to be stationary if k(t, s) is a function of t − s for any t, s ∈ X. 4 • The stationary kernel k c (t − s) in (13) accounts for the varying rate of the function. Note that part (b) shows that k c (t − s) is the correlation coefficient for g(t), which implies that amplitude varies with a certain rate and decays exponentially to zero in the end, and moreover, design AMLS kernels to model the impulse response. 3.1 Amplitude Modulated Locally Stationary Kernels E(g(t) − g(s))2 = (b(t))2 + (b(s))2 − 2b(t)b(s)k c (t − s). Recall that a kernel k(t, s) is said to be a locally stationary (LS) kernel in the sense of Silverman [26] if   t+s d k(t, s) = k k c (t − s), t, s ∈ X (12) 2 The above equation shows that for any fixed t, s ∈ X, as k c (t − s) varies from 1 to −1, (g(t) − g(s))2 tends to become larger, that is, g(s) tends to vary more quickly away from g(t). This observation also holds for h(t) as k c (t − s) is also the correlation coefficient for h(t). • The rank-1 kernel k d (t, s) in (13) account for the change of the amplitude of the function. Note that part (c) shows that the amplitude of g(t) is modulated by the factor b(t). If h(t) does not converge to 0 as t goes to ∞, then a suitable b(t) can be chosen such that g(t) does. where k d ≥ 0 and k c is a stationary kernel 3 . Motivated by the LS kernel, we introduce a kernel suitable for modeling impulse response, which is called the amplitude modulated locally stationary (AMLS) kernel. Definition 3.1 A kernel k(t, s) is said to be an amplitude modulated locally stationary kernel if k(t, s) = k d (t, s)k c (t − s), k d (t, s) = b(t)b(s), k c (0) = 1, t, s ∈ X, (13) Interestingly, both the SS and DC kernels can be put in the form of (13). Setting λ = exp(−β/2) and using the equality max{t, s} = (t + s + |t − s|)/2 yields that the SS kernel (5) is rewritten as where b(t) > 0 is bounded and k c is a stationary kernel. It can be proved that the AMLS kernels have the following properties (proof given in the Appendix). k SS (t, s; c, λ) = cλ3(t+s) Proposition 3.1 Consider the AMLS kernel (13). Then the following results hold:   1 |t−s| 1 3|t−s| . λ − λ 2 6 (15) Then we identify, for the SS kernel (15), c 3(t+s) c 3 1 λ , k (t − s) = λ|t−s| − λ3|t−s| , 3 2 2 (16) and for the DC kernel (6), (a) k d (t, s) is a rank-1 kernel 4 and moreover satisfy q k d (t, s) = k d (t, t)k d (s, s). (14) k d (t, s) = (b) Let g(t) be a stochastic process with zero mean and the AMLS kernel as the covariance function. Then k c (t − s) is the correlation coefficient between g(t) and g(s). (c) Let h(t) be a stochastic process with zero mean and k c (t − s) as the covariance function. Then the stochastic process g(t) , b(t)h(t) has zero mean and the AMLS kernel as its covariance function. 1 k d (t, s) = cλ 2 (t+s) , k c (t − s) = ρ|t−s| . (17) Moreover, one can prove the following result (proof given in the Appendix). Proposition 3.2 The SS kernel (15) and the DC kernel (6) are AMLS kernels. Now we demonstrate for the SS and DC kernels the role of the rank-1 kernel k d and the stationary kernel k c . Remark 3.1 Since k c (t−s) is the correlation coefficient and k c (0) = 1, then k c (t − s) is bounded and moreover, |k c (t − s)| ≤ 1 for any t, s ∈ X. Example 3.1 As seen from the left panel of Fig. 1, 1 1 as λ changes from 0.9 2 to 0.5 2 , the realizations of the DT zero mean Gaussian process with k c (t − s; [c, λ]T ) in (16) as the covariance function varies more quickly, 1 1 because k c (1; [1, 0.9 2 ]T ) > k c (1; [1, 0.5 2 ]T ). Similarly, as ρ changes from 0.99, to 0 and to −0.99, the realizations of the DT zero mean Gaussian process with k(t − s; [1, 0.9, ρ]T ) in (17) varies more quickly, and especially for the case with ρ = −0.99, the realization tends to change its sign at the next time instant. The above observations carry over to the right panel of Fig. 1. Finally, For a function estimation problem, if a zero mean Gaussian processes with the AMLS kernel as the covariance function is chosen to model the function, then Proposition 3.1 has the following implications: 3 Clearly, if kd is a positive constant, then the LS kernel reduces to a stationary kernel. 4 A kernel k(t, s) with t, s ∈ X is said to be a rank-1 kernel if for any ti , si ∈ X, i = 1, . . . , n and for any n ∈ N, the kernel matrix K, defined by Ki,j = k(ti , tj ), is a rank-1 matrix. 5 3.2.1 0.2 0.04 0 0.02 -0.2 0 0 20 40 60 80 100 0 0.5 20 0 10 -0.5 20 40 60 80 100 0 20 40 60 80 100 0 20 40 60 80 100 0 20 40 60 80 100 ×10 An important class of stationary kernels is the isotropic stationary (IS) kernel. Recall that a stationary kernel k c (t − s) is said to be an IS kernel if it depends on |t − s|. IS kernels have been studied extensively in the literature in statistics and machine learning, see e.g. [27, Section 4.2.1]. There are many choices of IS kernels that could be used instead of the ones in (16) and (17). -3 0 0 20 40 60 80 100 0.2 0.1 0.1 0.05 0 Most of the IS kernels introduced in [27, pages 83 -88] decay monotonically w.r.t. |t−s| and are always positive. For example, the squared exponential (SE) kernel and the Matèrn class of kernels: 0 0 20 40 60 80 100 0.5 0.2 0 0 -0.5 -0.2 0 20 40 60 80 100 0.2 0.2 0 0 -0.2 2 k c (r) = e−βr , β > 0, “SE”,  √ ν  21−ν  √ k c (r) = β 2νr K ν β 2νr , Γ(ν) β > 0, ν > 0“Matèrn”, -0.2 0 20 40 60 80 100 0 20 40 60 80 100 Fig. 1. Realizations of the DT zero mean Gaussian processes with the SS kernel (15) and the DC kernel (6) as covariance function. For each row, the left panel shows the realizations of the DT zero mean Gaussian process with the IS kernel kc (t − s) as covariance function and the right panel shows the realization of the DT zero mean Gaussian process with the SS or DC kernel as covariance function. The corresponding realizations for the SS kernel (15) are shown in the top 1 1 two rows, which correspond to c = 1 and λ = 0.9 2 , 0.5 2 , respectively. The corresponding realizations for the DC kernel (6) are shown in the bottom three rows, which correspond to c = 1, λ = 0.9 and ρ = 0.99, 0, −0.99, respectively. where r = |t − s|, Γ(·) is the Gamma function and K ν is a modified Bessel function with order ν. There are IS kernels that do not decay monotonically, can take negative values, and can have the form of damped oscillation w.r.t. |t − s|. For example, the kernel in [27, p. 89], [28]: k c (r) = c(αr)−ν Jν (αr), α > 0, ν ≥ −1/2, (18a) where r = |t − s|, c is a scalar such that k c (0) = 1, and Jν (·) is the Bessel function of the first kind with order ν. The kernel (18a) is defined for any r ≥ 0 and can thus be used for both CT and DT impulse response estimation. In particular, for ν = −1/2 and ν = 1/2, the kernel (18a) takes the following form the realizations on the left panel of Fig. 1 do not go to zero for large t but the realizations on the right panel do, because of k d (t, s). Remark 3.2 Recall from Remark 2.1 that the DC kernel (6) with ρ < 0 is only defined for the DT case but not for the CT case. Now we see that the DC kernel is not good to model quickly varying impulse responses for the CT case, which is also true for the SS kernel (15). k c (r) = cos(αr), α > 0, sin(αr) k c (r) = , α > 0. αr 3.2.2 3.2 Stationary Kernel k c (t − s) Construct AMLS Kernels for Regularized Impulse Response Estimation (18b) (18c) Rank-1 Kernel k d (t, s) The design of k d (t, s) is equivalent to that of the strictly positive function b(t) in (13). The bottom line is that b(t) should ensure that the designed AMLS kernel (13) is stable, i.e, Hk is a subspace of ℓ1 or L1 . Our following result gives a characterization of the stability of the AMLS kernel (proof given in the Appendix). Proposition 3.2 and its implications on the role of the rank-1 kernel k d and the stationary kernel k c suggest a machine learning method to design kernels for regularized impulse response estimation. If the impulse response is treated as a function and the prior knowledge is about its decay and varying rate, then AMLS kernels can be designed by choosing suitable rank-1 kernel k d and stationary kernel k c to account for the decay and varying rate of the impulse response, respectively. Proposition 3.3 Consider the AMLS kernel (13). Then the following results hold. (a) If b(t) ∈ ℓ1 for the DT case, and b(t) ∈ L1 for the CT case, then the AMLS kernel (13) is stable. 6 (b) Assume that there exists a sequence of positive numbers λi and linearly independent functions φi (t) defined on X such that c k (t − s) = ∞ X G0 (q) G4 (q) λi φi (t)φi (s), G(q) i=1 t, s ∈ X, λi > 0, i = 1, · · · , ∞, Fig. 2. The block diagram for the multiplicative uncertainty paradigm in robust control. The single-input-single-output system G(q) = G0 (q)(1 + G△ (q)) consists of two parts: the nominal part G0 (q) and the uncertainty part G△ (q), where q is the forward shift operator and the differential operator for the DT and CT case, respectively. The real-valued signals δ(t), ū(t) and g(t) are the impulsive input, the input of G0 (q) and the output of G(q), respectively. (19) where the convergence is absolute and uniform on Y1 × Y2 with Y1 , Y2 being any compact subsets of X. If the AMLS kernel (13) is stable, then there exists no ǫ > 0 such that b(t) ≥ ǫ for all t ∈ X. Since the b(t) in (16) and (17) are exponential decay functions and clearly satisfy b(t) ∈ ℓ1 or L1 , the SS and DC kernels are stable by Proposition 3.3. accordingly the ECLS kernel [15] instead of the AMLS kernel. The price to pay is that the role of k d and k c would become obscure and in particular, k d would not describe the decay rate and k c would not be the correlation coefficient of the underlying Gaussian process. Remark 3.3 It is reasonable to check wether the condition (19) is too strong to be satisfied. In fact, the series expansion (19) can be obtained by Mercer’s Theorem [29,30,31]. For instance, a sufficient condition for (19) to hold is given in [31]. To state this result, we define the kernel section of k c at a fixed s ∈ X as ksc , k c (t − s) and we let L2 (X, R µ) denote the space of functions f : X → R such that X |f (t)|2 dµ(t) < ∞, where µ is a nondegenerate Boreal measure on X. Then (19) holds if k c (t − s) is continuous, ksc ∈ L2 (X, µ) and Z Z (k c (t − s))2 dµ(t)dµ(s) < ∞. (20) X g(t) ū(t) δ(t) 4 A System Theory Perspective Instead of simply treating the impulse response as a function, we now associate the impulse response with an LTI system which is stable and may be overdamped, underdamped, have multiple distinct time constants and resonant frequencies, and etc., and our goal is to design kernels to embed this kind of prior knowledge. X 4.1 It is easy to check that many stationary kernels satisfy the above sufficient condition, e.g., the SE kernel and the k c in (16) and (17). Sketch of The idea Suppose that the prior knowledge of an LTI system is embedded in a stochastic process g(t) that is used to model the corresponding impulse response. Then following the guideline to design kernels in Section 2.4 that is to mimic the behavior of the optimal kernel (9), we should design the kernel as Remark 3.4 It follows from (A.6) that if there exists an ǫ > 0 such that |h(t)| ≥ ǫ for all t ≥ 0, then b(t) ∈ L1 , implying that b(t) ∈ L1 is also necessary for the stability of the AMLS kernel (13). The above observations show that under the assumption that the AMLS kernel (13) is stable, the result we can draw on the properties of b(t) is determined by the property of Hkc . k(t, s) = Cov(g(t), g(s)), (21) where Cov(g(t), g(s)) is the covariance between g(t) and g(s). Now the problem of kernel design becomes “how to embed the prior knowledge of an LTI system in a stochastic process g(t) that is used to model the corresponding impulse response”? Remark 3.5 The reason why we force b(t) > 0 for t ∈ X is because for a kernel in the form of k(t, s) = k d (t, s)k c (t − s), we expect the two kernels k d and k c have somewhat independent role. As shown above, this idea eases the kernel design and the corresponding analysis. If this idea is not taken, then we can design more general b(t) and even more general k d . For instance, we could allow b(t) to be arbitrary real-valued function and we could also allow k d to be the more general exponentially convex (EC) kernel 5 and design A natural way to tackle the above question is by using simulation. To this goal, it is useful to employ the multiplicative uncertainty configuration in robust control, see e.g., [20], as shown in Fig. 2. Here, the nominal model G0 (q) is used to embed the prior knowledge on the LTI system to be identified, the uncertainty G△ (q) is assumed to be stable and finally, the multiplicative uncertainty configuration is used to take into account both the nominal model and the uncertainty, and is simulated with an impulsive input to get a zero-mean Gaussian 5 For the LS kernel (12), if kd is also a kernel, then kd is called an exponentially convex (EC) kernel [32] and in this case k is called an exponentially convex locally stationary (ECLS) kernel [26]. 7 δ(t)+ l(t), we obtain the simulation induced (SI) kernel: δ(t) w(t) l(t) b(t) z(t + 1) = Az(t) + Bδ(t) + Bl(t) z(t + 1) = Az(t) + Bδ(t) + Bb(t)w(t), ż(t) = Az(t) + Bδ(t) + Bb(t)w(t), g(t) = Cz(t) + Dδ(t) + Db(t)w(t), z(0) ∼ N (0, Q) g(t) z(t) _ = Az(t) + Bδ(t) + Bl(t) g(t) = Cz(t) + Dδ(t) + Dl(t) z(0) ∼ N (0; Q) Fig. 3. The block diagram for the SI kernel (24). k SI (t, s) = Cov(g(t), g(s)), process to model the impulse response g(t). This idea leads to the system theory method to design kernels and we call such kernels the simulation induced (SI) kernels. k SI (t, s) = CAt Q(As )T C T + D2 b(t)b(s)δ(t − s) s−1 X δ(t − k)b(k)B T (As−1−k )T C T + Db(t) + Db(s) G (q) : t ∈ X, b(k)2 CAt−1−k BB T (As−1−k )T C T (25a) For the CT case with D = 0, it is k SI (t, s) = CeAt Q(eAs )T C T + Z min{t,s} C b2 (τ )eA(t−τ ) BB T (eA(s−τ ) )T dτ C T (25b) 0 Remark 4.2 It should be noted that both DT and CT cases are considered in (22) and (24). For the CT case, (24b) could be more rigorously written as an Itô stochastic differential equation (SDE) as in [14, eq. (9)]. However, we decide to take the same point of view as in [40] to use (24b) instead in order to save the space for the introduction of SDE stuff, which is only used to derive (25b). (22a) (22b) (22c) (22d) Remark 4.3 The SI kernels (25) may or may not have closed form expressions. The related computational difficulty and cost depend on whether or not the SI kernels (25) have closed form expressions. If they do, then the computation would be easier and similar to the SS and DC kernels. If they do not, the computation of the hyperparameter estimate and the regularized impulse response estimate would become more demanding. In this regard, the particle filtering based technique for nonlinear statespace model identification in [41] could be adopted. However, the technique in [41] cannot be applied trivially as the measurement output (1) for the state space model (24) does not depend on the current state z(t) solely but also the past state due to the presence of convolution. More details will be reported in an independent paper. Since the uncertainty G△ (q) is stable, the simplest way to model the impulse response of G△ (q) with a stochastic process l(t), is to have l(t) = b(t)w(t), δ(s − k)b(k)B T (At−1−k )T C T k=0 where A, B, C, D, and Q have compatible dimensions, ū(t) and g(t) are the input and output of G0 (q), respectively. In what follows, we will use the quintuple (A, B, C, D, Q) to represent the state-space model (22). G△ (q) : X + More specifically, the prior knowledge is embedded in G0 (q) or equivalently, in its state-space model z(t + 1) = Az(t) + B ū(t) ż(t) = Az(t) + B ū(t) z(0) ∼ N (0, Q) g(t) = Cz(t) + Dū(t) k=0 t−1 X k=0 min{t,s}−1 Simulation Induced Kernel 0 (24e) whose block diagram is shown in Fig. 3. From linear system theory, e.g., [39], the formal expression of the SI kernel (24) is available. For the DT case, it is Remark 4.1 It is worth to note that the problem of marrying system identification and robust control is not new and has been studied over two decades in the system identification community, see e.g., [33,34]. Both the additive uncertainty configuration and the multiplicative uncertainty configuration have been used and many results have been obtained, see e.g., [35,33,34,36,37,38]. In particular, [35,33,36,37,38] used the nominal model G0 (q) and the uncertainty G△ (q) to represent a model estimate and the corresponding model error, respectively. Here the nominal model G0 (q) and the uncertainty G△ (q) are used to embed the prior knowledge of the LTI system and describe the corresponding uncertainty, respectively. 4.2 (24a) (24b) (24c) (24d) (23) where w(t) is a white Gaussian noise with zero mean and unit variance (independent of z(0)), and b(t) > 0 and b(t) ∈ ℓ1 or L1 for the DT and CT case, respectively. Clearly, l(t) is a zero mean Gaussian process with the AMLS kernel b(t)b(s)δ(t − s) as the covariance function, where δ(·) is the Dirac Delta function and the AMLS kernel b(t)b(s)δ(t − s) is stable by Proposition 3.3. Note that g(t) in (24) is a Gaussian process with the impulse response of the LTI system (A, B, C, D, Q) as its mean and the SI kernel k SI (t, s) as its covariance Finally, we simulate the system G(q) in Fig. 2 with the impulsive input δ(t) and noting (22), (23) and ū(t) = 8 The DC kernel is in the form of (24) with function. If δ(t) is set to 0 in (24), g(t) in (24) is a zero mean Gaussian process with the SI kernel k SI (t, s) as its covariance function. In what follows, when considering kernel design, we will set δ(t) to zero for convenience. 1 1 c A = −α − β, B = 1, C = (2α) 2 , Q = , 4 2α β 1 D = 0, b(t) = c 2 e− 4 t . (30) Interestingly, the AMLS kernel (13) is closely related with the SI kernel (24), and in fact many AMLS kernels such as the SS and DC kernels can be put in the form of (24) and are thus SI kernels. To state this result, recall that the power spectral density of k c (t − s), denoted by Ψ(ω), is defined as Ψ(ω) = ( P+∞ c −iωτ , τ =−∞ k (τ )e c −iωτ k (τ )e dτ, −∞ R +∞ DT, CT. Proposition 4.2 enhances our understanding about the SS and DC kernels and in particular, the prior knowledge embedded in the two kernels from a system theory perspective is as follows: 1) For the SS kernel, the corresponding nominal model G0 (q) in Fig. 2 is a second order system. For the DC kernel, the corresponding nominal model G0 (q) is a first order system. For both the SS and DC kernels and for the CT case, G0 (q) has negative real poles corresponding to overdamped impulse responses. For the DT case, the two poles for the SS kernel are real positive and correspond to impulse response without oscillation, and the pole for the DC kernel can be positive or negative (depending on ρ) and corresponds to impulse response without or with oscillation. The pole for the TC kernel is positive (equal to λ) and corresponds to impulse response without oscillation. 2) For both the SS and DC kernels, the decay rate of the impulse response of the uncertainty G△ (q) in Fig. 2 are all described by exponential decay functions. (26) Proposition 4.1 Consider the AMLS kernel (13). Assume that k d (t, s) = cλt+s with c ≥ 0 and 0 ≤ λ < 1and Ψ(ω) is a proper rational function of eiω or cos(ω) for the DT case, and ω for the CT case, respectively. Then the AMLS kernel (13) can be put in the form of (24) and thus is SI kernel. Proposition 4.2 Consider the SS kernel (15) and the DC kernel (6). Then the following results hold: • For the DT case, let q p 1 + λ2 − 1 + λ2 + λ4 , q p b̄ = 1 + λ2 + 1 + λ2 + λ4 . ā = Remark 4.4 It is worth to note that to study the link between a kernel and its state-space model realization has a long history, see e.g., [42,40]. This link is important because it opens the body of a kernel from a system theory perspective and accordingly helps to understand the underlying behavior of a kernel. Then the SS kernel is in the form of (24) with A = λ3 " λ 0 0 λ3 # ,B = " λ3 λ3 # c ,Q = 3 " 1 1 1−λ2 1−λ4 1 1 1−λ4 1−λ6 # 4.3 r (1 − λ2 )3 h ā+b̄λ −λ2 (ā+b̄λ3 ) i C= 1−λ2 1−λ2 r 2  2 3 (1 − λ ) c  12 3t λ . , b(t) = D = b̄ 2 3 For the SI kernel (25), we provide the following sufficient condition to guarantee its stability. (27) Proposition 4.3 Consider the SI kernel (25). The DC kernel is in the form of (24) with • For the DT case, assume that A has distinct eigenvalues and moreover, A is stable, i.e., A has all eigenvalues strictly inside the unit circle. Assume further that c A = λ ρ, B = λ , C = ρ(1 − ρ2 ) , Q = , 1 − ρ2 1 1 t D = (1 − ρ2 ) 2 , b(t) = c 2 λ 2 . (28) 1 2 1 2 1 2 t b(t) ≤ c̄|λ̄| 2 • For the CT case, let λ = exp(−β/2) and ρ = exp(−α). Then the SS kernel is in the form of (24) with − 23 β 1 # (31a) for some c̄ > 0, where λ̄ is the eigenvalue of A with the largest modulus. Then the SI kernel (25a) is stable. • For the CT case, assume that A has distinct eigenvalues and moreover A is stable, i.e., A has all eigenvalues with strictly negative real parts. Assume further that " # c 3β1 3 0 ,B = ,Q = A= 1 3 − 34 β 2 − 72 β 0 4β 1 i  c  12 h 1 3 3 (29) C = 3 2 β 2 0 , D = 0, b(t) = e− 2 βt . 3 " Stability of SI kernels " # 0 1 b(t) ≤ c̄e− 2 |Re(λ̄)|t 9 (31b) where Cov(z̄(0)) is the covariance matrix of z(0) and V(f (t)) is the variance of f (t). • For the case D = 0, assume that CB 6= 0 and define for some c̄ > 0, where λ̄ is the eigenvalue of A with the largest real part and Re(λ̄) is the real part of λ̄. Then the SI kernel (25b) is stable. Pt−2 ḡ(t) − CAt z̄(0) − k=0 CAt−1−k Bb(k)f (k) f (t − 1) = CBb(t − 1) ḡ(t) ∈ R, z̄(0) ∈ Rn , t = 0, · · · , s − 1 (34) Remark 4.5 The conditions (31) are sufficient but not necessary. For instance, consider the DT case. The SS kernel (27) satisfies (31a) but the DC kernel (28) does not. It is possible to derive a slower upper bound for b(t). Another intension to have Proposition 4.3 is to give some guidelines about the relations between b(t), A and the stability of SI kernel: in order to guarantee stability of the SI kernel, the impulse response of the uncertainty G△ (q) (23), i.e., b(t) should decay a bit faster than the slowest mode of the nominal model G0 (q). 4.4 Then for any s ∈ N, the Gaussian process g(t) in (24) is the solution to the MaxEnt problem z̄(0),ḡ(t) Since the prior knowledge is never complete, it is worth to note Jaynes’s maximum entropy (MaxEnt) rationale [43] to derive from incomplete prior knowledge the optimal statistical prior distribution. Jaynes’s idea is to formulate a MaxEnt problem with respect to the prior, and then solve the problem to obtain the optimal prior. The constraints of the problem describes the prior knowledge (in the MaxEnt sense) of the underlying stochastic process (the system) to be identified. Interestingly, the SI kernel lends itself easily to a MaxEnt interpretation, leading to a new facet to understand the underlying behavior of the SI kernel. Corollary 4.1 For any s ∈ N, the zero mean Gaussian process g(t) with the DC kernel (6) defined on N × N as its covariance is the solution to the MaxEnt problem ḡ(t) subject to V(ḡ(t) − λ maximize ḡ(t) CAt−1−k Bb(k)f (k) Db(t) ḡ(t) ∈ R, z̄(0) ∈ Rn , t = 0, 1, · · · , s (32) k=0 Remark 4.7 By using Corollary 4.1 and the trick in [17, Theorem 2], it is possible to derive a more concise proof for [18, Proposition IV.1] which shows that, the fact that the DC kernel has tridiagonal inverse can be given a MaxEnt covariance completion interpretation. Then for any s ∈ N, the Gaussian process g(t) in (24) is the solution to the MaxEnt problem subject to E(z̄(0)) = 0, E(ḡ(t)) = 0, Cov(z̄(0)) = Q, V(f (t)) = 1, t = 0, · · · , s H(ḡ(0), ḡ(1), · · · , ḡ(s)) subject to E(ḡ(t)) = 0, t = 0, · · · , s, V(ḡ(0)) = c, V(ḡ(t) − λḡ(t − 1)) = c(1 − λ)λt , t = 1, · · · , s (37) which is different from the MaxEnt interpretation in [17]. It shall be noted that both interpretation are correct but derived in different ways: the MaxEnt problems are different but have the same optimal solution. Pt−1 H(z̄(0), ḡ(0), ḡ(1), · · · , ḡ(s)) ρḡ(t − 1)) = c(1 − ρ2 )λt , t = 1, · · · , s (36) Remark 4.6 When ρ = λ1/2 , the DC kernel (6) becomes the TC kernel (7). For the TC kernel defined on N × N, (36) becomes • For the case D 6= 0, define z̄(0),ḡ(t) E(ḡ(t)) = 0, t = 0, · · · , s, V(ḡ(0)) = c, 1/2 Proposition 4.4 Consider the SI kernel (24) with (25a). maximize H(ḡ(0), ḡ(1), · · · , ḡ(s)) maximize Recall that the differential entropy H(X) of a real-valued continuous random variable X is defined as H(X) = R − S p(x) log p(x)dx, where p(x) is the probability density function of X and S is the support set of X. Then we prove the next MaxEnt interpretation of SI kernels 6 . ḡ(t) − CAt z̄(0) − (35a) subject to E(z̄(0)) = 0, E(ḡ(t)) = 0, Cov(z̄(0)) = Q, V(f (t)) = 1, t = 0, · · · , s − 1 (35b) Maximum Entropy Property of SI Kernels f (t) = H(z̄(0), ḡ(1), · · · , ḡ(s)) maximize (33a) Remark 4.8 The CT case is not discussed here because according to our best knowledge the entropy is not well defined for CT stochastic processes. (33b) 4.5 Markov Property of SI Kernels 6 Let X1 , X2 be two jointly distributed random variables. Then the joint differential entropy of H([X1 , X2 ]T ) is simply written as H(X1 , X2 ) below. As shown in [44,19,18,17], the kernel matrix of DC kernel (6) has tridiagonal inverse. Here, we further show that 10 the Gaussian process with the DC kernel as its covariance function is also a Markov process with order 1 and moreover, we are able to design SI kernels which correspond to more general Gaussian Markov processes and have banded 7 inverses of their kernel matrices. 2 100 4 6 50 First, recall from e.g., [27, Appendix B] that a Gaussian Markov process is a stochastic process that is both a Gaussian process and a Markov process. A well-known instance is the DT autoregressive process of order p: x(t + 1) = p−1 X 10 p−1 X k=0 a(t, k)x(t − k) + b(t)w(t) 1 1 t+1 2 w(t + 1) G0 (q) = 10 b̄q , (q + a1 )(q + a2 ) (41) Remark 4.10 The Markov property of a kernel and its associated special structure (the banded inverse of the kernel matrix) can be used to develop numerically more stable and efficient implementations for this kernel based regularization method, see e.g., [18, Section 5]. (39) Remark 4.11 The CT case is not discussed here because according to [27, p. 217], regular sampling of a CT Gaussian Markov process entropy in general would not lead to a DT Gaussian Markov process. That is to say, even if a CT SI kernel with Markov property is constructed, its corresponding kernel matrix evaluated on the sampling instants may not have banded matrix inverse. Remark 4.9 Interestingly, (39) can also be derived from (36), i.e., from the MaxEnt property of the DC kernel. It is possible to construct more general SI kernels with Markov property. Proposition 4.6 Consider the DT SI kernel (24) with (A, B, C, D) being a realization of G0 (q) which is an nth order DT system q n−1 b̄ , q n + a1 q n−1 + · · · + an 8 where b̄ ∈ R and |ai | < 1, i = 1, 2. We consider the inverse of the kernel matrix K defined by Ki,j = k SI (i, j) with i, j = 1, . . . , 10. By Proposition 4.6, K −1 should be a 2-band matrix, which is confirmed by Fig. 4. and thus a Markov process with order 1, and moreover, its kernel matrix has a 1-band matrix inverse. G0 (q) = 6 Example 4.1 Consider the DT SI kernel (24) with (A, B, C, D) being a realization of G0 (q), which is a 2nd order DT system having two stable real poles, i.e., (38b) Proposition 4.5 Consider a zero mean DT Gaussian process g(t) with the DC kernel (6) as its covariance. Then g(t) with t ∈ N can be put in the form of 1 4 Fig. 4. Scaled image of K −1 in Example 4.1. When generating K, we choose b̄ = 1, a1 = 0.5, a2 = 0.9, b(t) = 0.8t , and Q = I2 . The image is drawn by using imagesc in MATLAB, where the colder the color the smaller the element of K −1 . where t ∈ N, x(t), a(t, k), b(t) ∈ R, x(0) is Gaussian distributed and assumed to be independent of w(t), a zero mean white Gaussian noise with unit variance. The stochastic process (38) is a Markov process with order p since x(t + p + 1) only depends on x(t + p), · · · , x(t + 1) given the history x(s) with s ≤ t + p. g(t + 1) = λ 2 ρg(t) + (1 − ρ2 ) 2 c 2 λ 0 2 a(t, k)x(t − k) + b(t + 1)w(t + 1) (38a) k=0 or, x(t + 1) = 8 5 A Case Study: Impulse Response with Damped Oscillation In this section, we consider the estimation of impulse responses with damped oscillation and demonstrate how to design kernels from the proposed two perspectives. (40) where b̄, a1 , . . . , an ∈ R. Then the Gaussian process g(t) in (24) with any b(t) > 0 and positive semidefinite Q is also a Markov process with order n and thus the SI kernel has an n-band matrix inverse. 5.1 The Machine Learning Perspective As shown in Section 3, the machine learning perspective treats the impulse response as a function, and designs AMLS kernels with the rank-1 kernel and the stationary kernel to account for the decay and varying rate of the impulse response, respectively. Now we show that by further exploiting the rank-1 kernel or the stationary kernel, we can design AMLS kernels capable to embed For illustration, we consider an example. 7 A real symmetric matrix A with dimension n > m + 1 is called an m−band matrix if Ai,j = 0 for |i − j| > m. 11 5.2 5 The System Theory Perspective 2 0 0 -5 -2 0 20 40 60 80 100 5 0 20 40 60 80 100 0 20 40 60 80 100 0 20 40 60 80 100 As shown in Section 4, the system theory perspective associates the impulse response with an LTI system, and designs SI kernels with the nominal model to embed the prior knowledge on the LTI system. Now we show that by choosing the nominal model to be a second order LTI system with a pair of complex conjugate poles, we design a SI kernel capable to model impulse responses with damped oscillation. 1 0 0 -5 -1 0 20 40 60 80 100 5 2 0 0 -5 -2 0 20 40 60 80 100 2 2 0 0 -2 More specifically, we choose the transfer function of the nominal model G0 (q) in Fig. 2 to be -2 0 20 40 60 80 100 0 2 2 0 0 -2 20 40 60 80 100 G0 (s) = -2 0 20 40 60 80 100 0 20 40 60 80 A= " (42) k t+s (t, s) = cλ 5.3.1 (43a) 1 h i , C = 1 0 , D = 0. Numerical Simulation Test Data-bank The way in [45] is used to generate the test systems and data bank. In particular, we first generate 200 test systems with strong oscillation: [cos(ωt) + 1 + ǫ] × [cos(ωs) + 1 + ǫ]ρ|t−s| , ,B = " # 0 To illustrate that the AMLS kernls (43) and the SI kernel (45) are capable to model LTI systems with strong oscillation, we consider the following numerical example. where c > 0, 0 ≤ λ < 1, ω ≥ 0, and ǫ > 0 is a tiny number to ensure that b(t) > 0 for t ∈ X. The above idea leads to the following two kernels, respectively: AMLS-2Od −α2 − β 2 −2α # e2(α−γ) min{t,s} cos(2β min{t, s} − φ − β(t + s))],   2(α − γ) . (45) φ = arccos 4β 2 + 4(α − γ)2 5.3 k AMLS-2Os (t, s) = cλt+s cos(α|t − s|), 1 k SI-2Od (t, s) = e−α(t+s) [cos(βt) cos(βs) α α2 + 1 + sin(β(t + s)) + sin(βt) sin(βs)] β β2 e−α(t+s) cos(β(t − s))(e2(α−γ) min{t,s} − 1) + 4β 2 (α − γ) −α(t+s) e p × [cos(φ + β(t + s))− + 2 2β 4β 2 + 4(α − γ)2 To have oscillation behavior in the AMLS kernel, we can choose to have it either in the stationary kernel or in the rank-1 kernel, i.e., b(t). For example, we can choose b(t) as an exponential decay function, i.e., b(t) = cλt and then choose (18b) as the stationary kernel, because (18b) has oscillation behavior. Or we can choose the stationary kernel in (17) and b(t) as an exponential decay function with oscillation, i.e., b(t) = c λ [cos(ωt) + 1 + ǫ], 0 Finally, setting Q = I2 and b(t) = e−γt with γ > 0 yields that the SI kernel (25b) takes the form: the extra prior knowledge that the impulse response has damped oscillation. t (44) where ωp 0 > 0 and 0 ≤ ξ < 1. By setting α = w0 ξ and β = w0 1 − ξ 2 , a state space model for (44) is described by (A, B, C, D) with 100 Fig. 5. Realizations of DT zero mean Gaussian process with AMLS kernels (43). For each row, the left panel shows the realizations of the DT zero mean Gaussian process with the IS kernel kc (t − s) as covariance function and the right panel shows the realization of the DT zero mean Gaussian process with the AMLS kernel as covariance function. The top three rows correspond to the AMLS kernel (43b) with c = 1, 1 λ = 0.9 2 , ω = 0.2π and ρ = 0.99, 0, −0.99, respectively. The bottom two rows correspond to the AMLS kernel (43a) with 1 c = 1, λ = 0.9 2 and α = π, 0.2π, respectively. 1 2 1 s2 + 2w0 ξs + w02 (43b) G(q) = Fig. 5 illustrates that the AMLS kernels (43) are capable to describe functions with damped oscillation behavior. 12 Nr +1 q + 0.99 X Gi (q) q i=1 (46) where 100 90 q + 0.9 Gi (q) = Ki , i = 1, . . . , Nr , (q − pi )(q − p∗i ) 80 70 60 and GNr +1 (q) is a 4th order system randomly generated by the function drmodel in MATLAB with its poles inside the disk of radius 0.95. The parameters Nr , pi , Ki are randomly generated as follows: Nr ∼ U[3, 8], Ki ∼ π U[2, 10], pi = ρi ej[φ0 + 2Nr (i−1)] with φ0 ∼ U[0, π2 ] and ρi ∼ U[0.8, 0.99]. 50 40 30 20 10 0 1 For each of the 200 DT systems (46), we generated the test data as follows. The function idinput in MATLAB is used to generate a random Gaussian input u(t) with normalized band [0, 0.95] and length 210. The chosen DT system is simulated with u(t) to get the noise-free output G(q)u(t), and G(q)u(t) is then perturbed by a white Gaussian noise, whose standard deviation is equal to U[0.5, 1] times the standard deviation of G(q)u(t). The following model fit is used to measure how good the estimated impulse response is: fit = 100 1 − "P 100 Pk=1 100 k=1 # 12  100 X  , ḡ 0 = 1 gk0 100 |gk0 − ḡ 0 |2 |gk0 − ĝk |2 The AMLS kernels (43) and the SI kernel (45) are compared with the TC kernel (7), the DC kernel (6) and the SS kernel (15) enriched with a second order parametric part proposed in [6] and denoted by SSp below. 6 The simulation result is summarized below. The average model fits for the tested kernels are shown below: TC DC SSp AMLS-2Os AMLS-2Od SI-2Od 47.5 50.0 50.9 48.4 49.7 53.3 6 Conclusion Kernel methods or regularization methods to estimate the impulse response of a linear time invariant systems is a most useful relatively recent addition to the techniques of system identification. Earlier results have demonstrated that important improvements in estimation quality can be achieved with kernels devised in a more or less ad hoc way. In this contribution, we have focused on systematic mechanisms and design concepts for how to construct kernels that are capable of adjusting its hyperparameters to capture the unknown system’s properties in useful ways. The two main avenues to such thinking have been a machine learning perspective focusing on function properties of the impulse response and a system theory perspective focusing on the LTI system that produces the impulse response. This has lead The distribution of the model fits are shown in Fig. 6. 5.3.3 5 Remark 5.1 To embed the prior knowledge such as multiple distinct time constants and multiple resonant frequencies, we proposed to use the multiple kernel introduced in [7] where the multiple kernel is a conic combination of some fixed kernels. The fixed kernels can be instances of the SS, TC, DC and SI kernels (24) evaluated on a grid in their hyper-parameter space. The interested readers are referred to [7] for more details. k=1 where gk0 and ĝk are the true impulse response and its estimate at the kth time instant, respectively. Avg. Fit 4 better than the TC kernel in both the average accuracy and robustness and it is just a bit worse than the DC kernel in the average accuracy. The AMLS kernel (43a) works not very well, though it has better average accuracy than the TC kernel. One possible explanation why the SI kernel (45) is best to model impulse response with strong oscillation is that the prior knowledge embedded in the SI kernel (45) is closest to the truth. This may be true because it makes use of the prior knowledge from a system theory perspective directly by choosing the nominal model to be a second order system with a pair of complex conjugate poles. Simulation Results  3 Fig. 6. Boxplot of the model fits for the TC, DC, SSp, AMLS-2Os, AMLS-2Od and SI-2Od kernels [from left to right]. The six kernels have 5, 3, 3, 3, 4, and 3 fits smaller than zero, respectively, which are not shown in the boxplot for better display. In this way, we generate 200 test DT systems and for each system a data set with 210 data points. 5.3.2 2 Findings For the test systems and data bank, we have the following findings. The SI kernel (45) is best among all the tested kernels in both the average accuracy and robustness and thus is best to model systems with strong oscillation. The AMLS kernel (43b) works well as it is 13 References to understanding and insights into general properties of the earlier suggested methods, e.g. that the so called DC and SS kernels (derived from more ad hoc thinking) belong to the class of amplitude modulated locally stationary kernels (Proposition 3.2) and that they are simulation induced from certain LTI systems (Proposition 4.2). They are also related to maximum entropy optimal choices (Proposition 4.4) which is a valuable feature. [1] L. Ljung. System Identification - Theory for the User. Prentice-Hall, Upper Saddle River, N.J., 2nd edition, 1999. [2] T. Söderström and P. Stoica. System Identification. PrenticeHall Int., London, 1989. [3] T. Chen, H. Ohlsson, and L. Ljung. On the estimation of transfer functions, regularizations and Gaussian processes Revisited. Automatica, 48:1525–1535, 2012. [4] G. Pillonetto, F. Dinuzzo, T. Chen, G. De Nicolao, and L. Ljung. Kernel methods in system identification, machine learning and function estimation: A survey. Automatica, 50(3):657–682, 2014. The take-home message of this contribution is as follows. The issue of kernel design should relate to the type of the prior knowledge and different types of prior knowledge should lead to different ways to design the corresponding kernels. Here, a machine learning perspective and a system theory perspective are introduced accordingly: [5] G. Pillonetto and G. De Nicolao. A new kernel-based approach for linear system identification. Automatica, 46(1):81–93, 2010. [6] G. Pillonetto, A. Chiuso, and G. De Nicolao. Prediction error identification of linear systems: a nonparametric Gaussian regression approach. Automatica, 47(2):291–305, 2011. • Machine Learning perspective: If the impulse response is treated as a function and the prior knowledge is on its decay and varying rate, then we can design the amplitude modulated locally stationary (AMLS) kernel. In particular, we design a rank-1 kernel and a stationary kernel to account for the decay and varying rate of the impulse response, respectively. Moreover, by further exploiting the rank-1 kernel or the stationary kernel, it is possible to design AMLS kernels capable to embed more general prior knowledge. • System Theory perspective: If the impulse is associated with an LTI system and the prior knowledge is that the LTI system is stable and may be overdamped, underdamped, have multiple distinct time constants and resonant frequencies and etc., then we can design the simulation induced (SI) kernel. In particular, the nominal model is used to embed the prior knowledge, the uncertainty is assumed to be stable and finally, the multiplicative uncertainty configuration is used to take into account both the nominal model and the uncertainty, and is simulated with an impulsive input to get the SI kernel or equivalently the zero-mean Gaussian process to model the impulse response. [7] T. Chen, M. S. Andersen, L. Ljung, A. Chiuso, and G. Pillonetto. System identification via sparse multiple kernel-based regularization using sequential convex optimization techniques. IEEE Transactions on Automatic Control, (11):2933–2945, 2014. [8] Gianluigi Pillonetto and Alessandro Chiuso. Tuning complexity in regularized kernel-based regression and linear system identification: The robustness of the marginal likelihood estimator. Automatica, 51:106 – 117, 2015. [9] B. Mu, T. Chen, and L. Ljung. Tuning of hyperparameters for fir models – an asymptotic theory. In Proceedings of the IFAC 2017 World Congress, page under review, Toulouse, France., 2017. [10] A. N. Tikhonov and V. Y. Arsenin. Solutions of Ill-posed Problems. Winston/Wiley, Washington, D.C., 1977. [11] J Sjöberg, T McKelvey, and L Ljung. On the use of regularization in system identification. In Proceedings of the IFAC 2012 World Congress, pages 381–386, Sydney, Australia., 1993. [12] A. Chiuso. Regularization and Bayesian learning in dynamical systems: Past, present and future. Annual Reviews in Control, 41:24 – 38, 2016. [13] F. Dinuzzo. Kernels for linear time invariant system identification. SIAM Journal on Control and Optimization, 53(5):3299–3317, 2015. Finally, finding a suitable kernel structure is only one leg of the kernel-based regularization method. Tuning its hyperparameters regardless of structure is the other main topic. This has been discussed in some detail e.g. in [4] and [8]. Some related new asymptotic results are recently presented in [9]. [14] Tianshi Chen and Lennart Ljung. Constructive state-space model induced kernels for regularized system identification. In 19th IFAC World Congress, pages 1047–1052, Cape town, South Africa, 2014. [15] T. Chen and L. Ljung. On kernel structure for regularized system identification (i): a machine learning perspective. In Proceedings of the IFAC Symposium on System Identification, pages 1035–1040, Beijing, China., 2015. [16] T. Chen and L. Ljung. On kernel structure for regularized system identification (ii): a system theory perspective. In Proceedings of the IFAC Symposium on System Identification, pages 1041–1046, Beijing, China., 2015. Acknowledgements [17] Tianshi Chen, Tohid Ardeshiri, Francesca P. Carli, Alessandro Chiuso, Lennart Ljung, and Gianluigi Pillonetto. Maximum entropy properties of discrete-time first-order stable spline kernel. Automatica, 66:34 – 38, 2016. The authors would like to thank Prof. Lennart Ljung for his suggestions and comments at the early stage of this project. The authors also would like to thank Prof. Gianluigi Pillonetto, Prof. Alessandro Chiuso, Prof. Håkan Hjalmarsson, Dr. John Latarie and Dr. Giulio Bottegal for their helpful comments. [18] F. P. Carli, T. Chen, and L. Ljung. Maximum entropy kernels for system identification. IEEE Transactions on Automatic Control, 2017. 14 [19] A. Marconato, M. Schoukens, and J. Schoukens. Filter-based regularisation for impulse response modelling. IET Control Theory & Applications, to appear 2016. [41] T. B. Schön, A. Wills, and B. Ninness. System identification of nonlinear state-space models. Automatica, 47(1):39–49, January 2011. [20] K. Zhou, J. C. Doyle, and K. Glover. Robust and Optimal Control. Prentice-Hall, Englewood Cliffs, NJ, 1996. [42] K. J. Åström. Introduction to stochastic control theory. Academic Press, New York and London, 1970. [21] T. Chen and L. Ljung. Implementation of algorithms for tuning parameters in regularized least squares problems in system identification. Automatica, 49:2213–2220, 2013. [43] E. T Jaynes. On the rationale of maximum-entropy methods. Proceedings of the IEEE, 70(9):939–952, 1982. [44] F. P. Carli. On the maximum entropy property of the firstorder stable spline kernel and its implications. In IEEE Multi-Conference on Systems and Control, pages 409–414, Nice/Antibes, France, 2014. [22] Nachman Aronszajn. Theory of reproducing kernels. Transactions of the American mathematical society, pages 337–404, 1950. [23] Gianluigi Pillonetto and Alessandro Chiuso. Tuning complexity in regularized kernel-based regression and linear system identification: The robustness of the marginal likelihood estimator. Automatica, 58:106–117, 2015. [45] A. Chiuso, T. Chen, L. Ljung, and G. Pillonetto. On the design of multiple kernels for nonparametric linear system identification. In Proceedings of the IEEE Conference on Decision and Control, pages 3346–3351, Los Angeles, CA., 2014. [24] Claudio Carmeli, Ernesto De Vito, and Alessandro Toigo. Vector valued reproducing kernel hilbert spaces of integrable functions and mercer theorem. Analysis and Applications, 4(04):377–408, 2006. [46] Marc G Genton. Classes of kernels for machine learning: a statistics perspective. The Journal of Machine Learning Research, 2:299–312, 2002. [25] Ingo Steinwart and Andreas Christmann. Support vector machines. Springer Science & Business Media, New York, 2008. [47] Theodoros Evgeniou, Massimiliano Pontil, and Tomaso Poggio. Regularization networks and support vector machines. Advances in computational mathematics, 13(1):1– 50, 2000. [26] R Silverman. Locally stationary random processes. Information Theory, IRE Transactions on, 3(3):182–187, 1957. [48] F. Cucker and S. Smale. On the mathematical foundations of learning. American Mathematical Society, 39(1):1–49, 2002. [27] C. E. Rasmussen and C. K. I. Williams. Gaussian Processes for Machine Learning. MIT Press, Cambridge, MA, 2006. [49] T. M. Cover and J. A. Thomas. Elements of information theory. John Wiley & Sons, 2012. [28] Akira Moiseevich Yaglom. Correlation theory of stationary and related random functions. Springer, 1987. [50] A. P. Dempster. Covariance selection. Biometrics, 28(1):157– 175, 1972. [29] James Mercer. Functions of positive and negative type, and their connection with the theory of integral equations. Philosophical transactions of the royal society of London. Series A, containing papers of a mathematical or physical character, pages 415–446, 1909. Proof of Proposition 3.1 [30] Harry Hochstadt. Integral equations. John Wiley & Sons, 1973. Part (a). For any n ∈ N and for any ti ∈ X, i = 1, . . . , n, let b̄ be the column vector containing b(t1 ), . . . , b(tn ) in d = order. Then the kernel matrix K d defined by Ki,j d d T d k (ti , tj ) is rewritten as K = b̄b̄ . Clearly, K is positive semidefinite, and moreover rank(K d ) = 1. So k d (t, s) is a rank-1 kernel by definition. The identity (14), Part (b) and Part (c) can be verified in a straightforward way. [31] Hongwei Sun. Mercer theorem for RKHS on noncompact sets. Journal of Complexity, 21(3):337–349, 2005. [32] Michel Loève. Probability theory, vol. II. Graduate texts in mathematics, 1978. [33] Brett Ninness and Graham C. Goodwin. Estimation of model quality. Automatica, 31(12):1771 – 1797, 1995. [34] L. Ljung. Model validation and model error modeling. In B. Wittenmark and A. Rantzer, editors, The strm Symposiium on Control, pages 15 –42, Lund, Sweden, Aug 1999. Studentlitteratur. Proof of Proposition 3.2 [35] G. C. Goodwin, M. Gevers, and B. Ninness. Quantifying the error in estimated transfer functions with application to model order selection. IEEE Trans. Automatic Control, 37(7):913–929, 1992. We give the proof for the CT case with X = {t|t ≥ 0}. The results for the DT case with X = N hold by noting that the DT kernel is the CT kernel restricted to N. [36] G. C. Goodwin, J. H. Braslavsky, and M. M. Seron. Non-stationary stochastic embedding for transfer function estimation. Automatica, 38:47–62, 2002. From (16) and (17), we see the proof will be done if it can be shown that the kernels k c (t − s) in (16) and (17) are stationary kernels. To show this, note from e.g. [27, page 85] that e−β|t−s| with β > 0 is called the exponential kernel and belongs to the class of Matérn covariance functions with order 1/2. So it remains to show k c (t − s) in (16) is also a kernel. Note that the exponential kernel is an isotropic stationary (IS) kernel (see Section 3.2.1 for its definition). Below we show that k c (t − s) in (16) is actually also an IS kernel. As shown in [46], the spectral [37] Wolfgang Reinelt, Andrea Garulli, and Lennart Ljung. Comparing different approaches to model error modeling in robust identification. Automatica, 38(5):787 – 803, 2002. [38] Model Error Modeling and Stochastic Embedding, volume 48, Beijing, China, 2015. [39] C. Chen. Linear system theory and design. Oxford University Press, New York, 3 edition, 1999. [40] Torkel Glad and Lennart Ljung. Control theory: Multivariable and nonlinear methods. Taylor & Francis, 2000. 15 representation of an IS kernel k c (t, s) takes the form of Z ∞ c cos(ω|t − s|)F (dω) (A.1) k (t, s) = Noting (19) and by Lemma A.1, we have Hkc = 0 where F is any nondecreasing bounded function. For the exponential kernel e−β|t−s| with β > 0, (A.1) is satisfied with the spectral density k(t, s) = 3 2 3β = 4π ω2) − 1 2 Hk = ! ≥ 0, Z We give the proof for the CT case with X = {t|t ≥ 0}. The proof for the DT case with X = N can be derived in a similar way. R∞ Part (a). Assume that b(t) ∈ L1 , i.e., 0 b(t)dt < ∞. Since |k c (t − s)| ≤ 1 for any t, s ≥ 0. Then from Z ∞ Z ∞ Z ∞ Z ∞ k(t, s)dt ds ≤ b(s)ds b(t)dt < ∞, Z 0 (A.3) ( g|g = ∞ X µi ρ i , ∞ X µ2 i i=1 i=1 λi ) <∞ . (A.4) (A.5) ∞ |g(t)|dt = Z 0 ∞ b(t)|h(t)|dt < ∞, (A.6) ∞ |g(t)|dt = Z ∞ 0 b(t)|h(t)|dt ≥ ǫ Z ∞ 0 |h(t)|dt = ∞, Proof of Proposition 4.1 Lemma A.1 [47, p. 16], [48, p. 37] Assume that k̄(t, s) with t, s ∈ X is a positive semidefinite kernel and moreover, there exists a sequence of positive numbers νi and linearly independent functions ψi (t) such that k̄(t, s) = P ∞ i=1 νi ψi (t)ψi (s), where the convergence is absolute and uniform on Y1 × Y2 with Y1 , Y2 being any compact subsets of X. Then ) ( ∞ ∞ X X µ2i <∞ µi ψi , Hk̄ = g|g = ν i=1 i i=1 To prove the result, we need a lemma. Lemma A.2 [42,40] Consider a zero mean stationary Gaussian process h(t) with covariance function k c (t − s). Assume that k c (t − s) has rational power spectral density Ψ(ω) 8 . Then the following results hold: • For the DT case, there exists a rational function G which has all poles inside the unit circle and all zeros inside or on the unit circle such that P∞ and for any f1 , f2 ∈ Hk̄ with f1 = i=1 ci ψi and f2 = P ∞ i=1 di ψi , the inner product over Hk̄ is defined as i=1 λi ρi (t)ρi (s), ρi (t) = b(t)φi (t), which contradicts with (A.6). This completes the proof. Part (b). Assume that the AMLS kernel (13) is stable, i.e., Hk ⊂ L1 . We need a lemma to prove the result. νi ∞ X Since k c is not stable, Hkc * L1 and there exists h ∈ Hkc but h ∈ / L1 . For such h, if there exits an ǫ > 0 such that b(t) ≥ ǫ for all t ≥ 0, then 0 ∞ X ci di (A.2) where the equality follows from (A.5) and h ∈ Hkc is the function associated with g ∈ Hk . and by Corollary 2.1, the AMLS kernel (13) is stable. hf, giHk̄ = <∞ . Since Hk ⊂ L1 , for any g ∈ Hk , g ∈ L1 , i.e., 0 0 λi Hk = {g|g(t) = b(t)h(t), t ≥ 0, h ∈ Hkc }. Proof of Proposition 3.3 0 i=1 i=1 ) By (A.4) and (A.2), we have ∀ω Therefore, k c (t−s) in (16) is an IS kernel. This completes the proof. 0 µi φi , i and by Lemma A.1, we have ω2) 1 1 − 3β β 2 2 2 (2) + ω ( 2 ) + ω2 h|h = ∞ X µ2 i=1 So k c (t − s) in (16) with λ = exp(−β/2) satisfies (A.1) with a well defined spectral density described by 3 2β 3β 2 π(( 2 ) + ∞ X Then from (19), the AMLS kernel (13) is rewritten as β f (ω) = . π(β 2 + ω 2 ) 1 2β β 2 π(( 2 ) + ( Ψ(ω) = G(eiω )G(e−iω ) 8 (A.7) Check the statement of Theorem 4.1 for the definition of rational power spectral density. . 16 where | · | denotes the modulus of a complex number. Moreover, let the quintuple (Ā, B̄, C̄, D̄, Q̄) be a state space realization of G(eiω ), i.e., G(eiω ) = C̄(eiω Idim(Ā) − Ā)−1 B̄ + D̄, where dim(Ā) is the dimension of Ā and Idim(Ā) is the identity matrix with dimension dim(Ā). Then the stationary Gaussian process h(t) has the following state space representation Proof of Proposition 4.2 We only sketch the proof for the SS kernel and the proof for the DC kernel can be derived in a similar way. For the DT case, the IS kernel k c (t − s) in (16) has the power spectral density x(t + 1) = Āx(t) + B̄w(t), x(0) ∼ N (0, Q̄) (A.8a) h(t) = C̄x(t) + D̄w(t) (A.8b) Ψ(ω) = τ =−∞ (A.8c) • For the CT case, there exists a rational function G which has all poles in the left half plane and all zeros in the left half plane or on the imaginary axis such that Ψ(ω) = G(iω)G(−iω). By spectral factorization technique, we have Ψ(ω) = G(eiω )G(eiω ) with (A.9) G(e ) = (āe−iω + b̄) (1 − λ2 )3 . 2 (1 − λe−iω )(1 − λ3 e−iω ) For the CT case, the IS kernel k c (t − s) has the power spectral density (A.10a) (A.10b) Ψ(ω) = Z +∞ −∞ where w(t) is the zero mean white Gaussian noise with unit power spectral density and Q̄ is the solution of the Lyapunov equation ĀQ̄ + Q̄ĀT + B̄ B̄ T = 0 r iω Moreover, let the quintuple (Ā, B̄, C̄, D̄, Q̄) be a state space realization of G(iω), i.e., G(iω) = C̄(iωIdim Ā − Ā)−1 B̄+ D̄. Then the stationary Gaussian process h(t) has the following state space representation ẋ(t) = Āx(t) + B̄w(t), x(0) ∼ N (0, Q̄) h(t) = C̄x(t) + D̄w(t) k c (τ )e−iωτ 3 1 − λ2 1 − λ6 1 = − −iω iω 3 −iω 2 (1 − λe )(1 − λe ) 2 (1 − λ e )(1 − λ3 eiω ) (1 − λ2 )3 2 + 2λ2 + λ(e−iω + e−iω ) = −iω 2 (1 − λe )(1 − λeiω )(1 − λ3 e−iω )(1 − λ3 eiω ) (āe−iω + b̄)(āeiω + b̄) (1 − λ2 )3 = −iω 2 (1 − λe )(1 − λeiω )(1 − λ3 e−iω )(1 − λ3 eiω ) where w(t) is the zero mean white Gaussian noise with unit variance and Q̄ is the solution of the Lyapunov equation Q̄ = ĀQ̄ĀT + B̄ B̄ T +∞ X   3 − 1 β|τ | 1 − 3 β|τ | −iwτ 2 2 e dτ − e e 2 2 1 3 32 β 2 = 1 (iω + 2 β)(iω + 23 β) (A.10c) 2 , |G(iω)|2 . From the realization theory of linear systems, see e.g., [39], we can derive the corresponding state-space model representation of the IS kernel k c (t − s), based on which and by using the argument in the end of the proof of Proposition 4.1, we derive (27) and (29), respectively. Proof: For the DT case, the first part is a result of the Spectral Factorization Theorem [42, Theorem 3.1 in Chapter 4] and the second part is a result of the Representation Theorem [42, Theorem 3.2 in Chapter 4] and [40, Theorem 5.3 and Equation (5.92)]. For the CT case, the first part is a result of the Spectral Factorization Theorem [42, Theorem 5.1 in Chapter 4] and the second part is a result of the Representation Theorem [42, Theorem 5.2 in Chapter 4] and [40, Theorem 5.3]. ♦. Proof of Proposition 4.3 For the DT case, note that there exists l > 0 such that |CAt Q(As )T C T | ≤ l|λ̄|t+s , 1 2 t+s For the DT case, let z(t) = c λt x(t). Then simple calculation shows that the AMLS kernel (13) with k d (t, s) = cλt+s is in the form of (24) with A = λĀ, B = λB̄, 1 C = C̄, D = D̄, Q = cQ̄ and b(t) = c 2 λt . For the 1 CT case, let z(t) = c 2 e−βt x(t) with λ = e−β . Then simple calculation shows that the AMLS kernel (13) with k d (t, s) = cλt+s is in the form of (24) with A = Ā − βIdim Ā , B = B̄, C = C̄, D = D̄, Q = cQ̄ and 1 b(t) = c 2 e−βt . |D2 b(t)b(s)δ(t − s)| ≤ l|λ̄| 2 , s−1 X t+s |Db(t) δ(t − k)b(k)B T (As−1−k )T C T | ≤ l|λ̄| 2 , k=0 min{t,s}−1 X b(k)2 CAt−1−k BB T (As−1−k )T C T k=0 ≤ l(|λ̄|t+s + |λ̄|t+s−min{t,s} ). 17 P∞ P∞ Then it is easy to show t=1 s=1 k SI (t, s) < ∞, and thus the SI kernel (25a) is stable by Corollary 2.1. (33) is equivalently rewritten as maximize For the CT case, note that there exists l > 0 such that z̄(0),f (t) H(z̄(0), f (0), f (1), · · · , f (s)) (A.12a) subject to E(z̄(0)) = 0, E(f (t)) = 0, Cov(z̄(0)) = Q, V(f (t)) = 1, t = 0, · · · , s. (A.12b) |CeAt Q(eAs )T C T | ≤ le−|Re(λ̄)|(t+s) , Z min{t,s} C b2 (τ )eA(t−τ ) BB T (eA(s−τ ) )T dτ C T 0 Note that the constraints in (A.12) are separable with respect to z̄(0), f (t), t = 0, · · · , s, and that H(z̄(0), f (0), f (1), · · · , f (s)) is maximized if z̄(0), f (0), f (1), · · · , f (s) are independent with each other. Therefore, (A.12) is equivalent to ≤ l(e−|Re(λ̄)|(t+s) + e−|Re(λ̄)|(t+s−min{t,s}) ). R∞R∞ Then it is easy to show 0 0 k SI (t, s) dtds < ∞, and thus the SI kernel (25b) is stable by Corollary 2.1. maximize Proof of Proposition 4.4 H(z̄(0)) z̄(0) subject to E(z̄(0)) = 0, Cov(z̄(0)) = Q We only give the proof for the case D 6= 0 and the proof for the case (b) is similar and thus omitted. and for t = 0, · · · , s, By chain rule, the differential entropy in (33) becomes maximize H(f (t)) H(z̄(0), ḡ(0), ḡ(1), · · · , ḡ(s)) = H(z̄(0)) + H(ḡ(0)|z̄(0)) s X + H(ḡ(t)|z̄(0), ḡ(0), · · · , ḡ(t − 1)) (A.11) f (t) subject to E(f (t)) = 0, V(f (t)) = 1 t=1 It is well known that multivariate normal distribution maximizes the differential entropy over all distributions with the same covariance, see e.g., [49, Theorem 8.6.5]. Then we have the optimal solution to (A.12) is that z̄(0) ∼ N (0, Q) and f (t) ∼ N (0, 1), t = 0, · · · , s, and moreover, z̄(0), f (0), f (1), · · · , f (s) are independent with each other. Finally, (32) implies P t−1−k ḡ(t) = CAt z̄(0)+ t−1 Bb(k)f (k)+Db(t)f (t), k=0 CA same as g(t) in (25a). This completes the proof. Note from (32) that H(ḡ(0)|z̄(0)) = H(f (0)Db(0) + C z̄(0)|z̄(0)) = H(f (0)Db(0)|z̄(0)) = H(f (0)|z̄(0)) + log |Db(0)| where the first equation follows because translation does not change the differential entropy and the second equation follows because of the scaling property of differential entropy. Analogously, we have Proof of Corollary 4.1 H(ḡ(t)|z̄(0), ḡ(0), · · · , ḡ(t − 1)) = H(ḡ(t)|z̄(0), f (0), · · · , f (t − 1)) = H(f (t)Db(t)|z̄(0), f (0), · · · , f (t − 1)) = H(f (t)|z̄(0), f (0), · · · , f (t − 1)) + log |Db(t)| From Proposition 4.2, the DC kernel is a SI kernel with A, B, C, D, Q, b(t) given in (28), which implies that Theorem 4.4 holds for the DC kernel. Comparing (32) with (36) shows that the proof is completed if we can show Therefore, (A.11) is rewritten as H(z̄(0), ḡ(0), ḡ(1), · · · , ḡ(s)) = H(z̄(0)) + H(f (0)|z̄(0)) s s X X + H(f (t)|z̄(0), f (0), · · · , f (t − 1)) + log |Db(t)| t=1 = H(z̄(0), f (0), f (1), · · · , f (s)) + Cov(z̄(0)) = Q t=0 V(ḡ(0)) = c, V(f (t)) = 1 =⇒ V(ḡ(t) − λ1/2 ρḡ(t − 1)) = c(1 − ρ2 )λt , t = 1, · · · , s (A.13) t=0 s X =⇒ log |Db(t)| The first line of (A.13) is straightforward. In what follows, we consider the second line of (A.13). Clearly, the results holds for the case either λ = 0 or ρ = 0. So we further consider below the case where λ 6= 0 and ρ 6= 0. Since the second term in the above equation is independent of z̄(0) and f (t), t = 0, · · · , s, the MaxEnt problem 18 It is easy to see that for t = 0, . . . , s − 1, ḡ(t + 1) = ACAt z̄(0) + A t−1 X with order 1. Finally, the result that the kernel matrix of the DC kernel has a 1-band matrix inverse follows from Lemma A.3. CAt−1−k Bb(k)f (k) k=0 Proof of Proposition 4.6 + ACA−1 Bb(t)f (t) + Db(t + 1)f (t + 1) t−1 X = ACAt z̄(0) + A CAt−1−k Bb(k)f (k) By using the realization of G0 (q) in controllable canonical form, the DT SI kernel (24) is written as follows: k=0 + ADb(t)f (t) + Db(t + 1)f (t + 1) = Aḡ(t) + Db(t + 1)f (t + 1) z(t + 1) = where the second equality holds because CA−1 B = D. Therefore (A.13) holds, which completes the proof. g(t + 1) = −b̄ (a) For any t ∈ N and k > p, x(t) and x(t + k) are conditionally independent given x(s) with s 6= t, s 6= t + k and s ∈ N. (b) Let i1 < i2 < · · · < in with n > p + 1 be any strictly increasing subsequence taken from N. Then the covariance matrix of [x(i1 ) · · · x(in )]T is a pband matrix. 1 1 t 1 1 1 t g(t) = ρ(1 − ρ2 ) 2 z(t) + (1 − ρ2 ) 2 c 2 λ 2 w(t). n X ai zi (t) + b̄b(t)w(t) (A.15) i=1 Therefore, (A.15) becomes g(t + 1) = − n X i=1 ai g(t − i + 1) + b̄b(t)w(t) which is in the form of (38b) with order n. Thus the Gaussian process g(t) in (24) is a Markov process with order n and the fact that the kernel has an n-band matrix inverse follows from Lemma A.3. (A.14) Note from Proposition 4.2 that g(t) can be written in the following form 1 # b̄zi (t) = g(t − i + 1), i = 1, · · · , n where x, y ∈ R, z ∈ Rn and K ∈ R(n+2)×(n+2) . Then for a given z, x, y are conditionally independent if and only if (K −1 )1,2 = (K −1 )2,1 = 0, where (K −1 )i,j denote the (i, j)th element of K −1 . Therefore, Part (b) follows from the above observation and part (a). ♦ z(t + 1) = λ 2 ρz(t) + λ 2 c 2 λ 2 w(t), z(0) ∼ N (0, 1 z(t) where zi (t) is the ith element of z(t). Note that Proof: Part (a) follows from the pth order Markov property of x(t) and the fact that w(t) is white Gaussian noise. To prove Part (b), recall from e.g., [50] that, for Gaussian random variables, the zeros in the inverse of the covariance matrix indicate conditional independence of the two corresponding elements conditioned on the remaining ones. To be specific, consider a Gaussian random variable with mean m and covariance matrix K: ∼ N (m, K), 0n×1 From the above equation, we have Lemma A.3 Consider the pth order Gaussian Markov process (38). Then the following results hold: iT In " # b(t)w(t) 0n×1 i h g(t) = b̄ 0 0 · · · 0 z(t), z(0) ∼ N (0, Q). We need a lemma to prove this result. xy z −a1 · · · − an−1 −an + Proof of Proposition 4.5 h " c ) 1 − ρ2 which implies that (39) holds. Clearly, (39) is in the form of (38a) with p = 1 and thus g(t) is a Markov process 19
3cs.SY
Meta Inverse Reinforcement Learning via Maximum Reward Sharing for Human Motion Analysis arXiv:1710.03592v2 [cs.AI] 12 Oct 2017 Kun Li1 , Joel W. Burdick1 Abstract— This work handles the inverse reinforcement learning (IRL) problem where only a small number of demonstrations are available from a demonstrator for each highdimensional task, insufficient to estimate an accurate reward function. Observing that each demonstrator has an inherent reward for each state and the task-specific behaviors mainly depend on a small number of key states, we propose a meta IRL algorithm that first models the reward function for each task as a distribution conditioned on a baseline reward function shared by all tasks and dependent only on the demonstrator, and then finds the most likely reward function in the distribution that explains the task-specific behaviors. We test the method in a simulated environment on path planning tasks with limited demonstrations, and show that the accuracy of the learned reward function is significantly improved. We also apply the method to analyze the motion of a patient under rehabilitation. (a) (b) (c) (d) I. I NTRODUCTION Inverse reinforcement learning (IRL) [1] algorithms estimate a reward function that explains the motions demonstrated by an operator or other agents on a task described by a Markov Decision Process (MDP) [2]. The recovered reward function can be used by a robot to replicate the demonstrated task [3], or by an algorithm to analyze the demonstrator’s preference [4]. Therefore, IRL algorithms can make multitask robot control simpler by alleviating the need to explicitly set a cost function for each task, and make robot friendlier by personalizing services based on the recovered condition and preference of the operator. The accuracy of the recovered function depends heavily on the ratio of visited states in the demonstrations to the whole state space, because the demonstrator’s motion policy can be estimated more accurately if every state is repeatedly visited. However, the ratio is low for many useful applications, since they usually have huge or high-dimensional state spaces, while the demonstrations are relatively rare for each task. For example, in a path planning task on a mild 100 ∗ 100 grid, the demonstrator chooses paths based on the destination, but may not move to the same destination hundreds of times in practice. For robot manipulation tasks based on ordinary 640 ∗ 480 ∗ 3 RGB images, east task specifies a final result, but it is expensive to repeat each task millions of times. For human motion analysis, it is physically improbable to follow an instruction thousands of times in the huge state space of human poses. Therefore, it is difficult to estimate an accurate reward function for a single task with limited data. *This work was supported by the National Institutes of Health, NIBIB. Li and Joel W. Burdick are with Department of Mechanical and Civil Engineering, California Institute of Technology, Pasadena, CA 91125, USA [email protected] 1 Kun Fig. 1: Different behaviors under different goal states and goal rewards: Figure 1a and Figure 1b share the same goal state, but the goal reward of Figure 1b is larger than Figure 1a.Figure 1c and Figure 1d share the same goal state, but the goal reward of Figure 1d is larger than Figure 1c. Five trajectories are plotted in each figure, where red dots denote the starting point and black dots denote the ending point. In practice, usually multiple tasks can be observed from the same demonstrator, and the problem of rare demonstrations can be handled by combining data from all tasks, hence the meta-learning problem. Existing solutions mainly classification problems, like using the data from all tasks to learn an optimizer for each task, using the data from all tasks to learn a metric space where a single task can be more accurate with limited data, using the data from all tasks to learn a good initialization or a good initial parameter for each task, etc. Some of these methods are applicable to inverse reinforcement learning problems, but they mainly consider transfer of motion policy. In many IRL applications, we observe that a demonstrator usually has an inherent reward for each state, materialized as the innate state preferences of a human, the hardwaredependent cost function of a robot, the default structure of an environment, etc. For a given task, the demonstrators are usually reluctant to drastically change the inherent reward function to complete the task; instead, they alter the innate reward function minimally to generate a task-specific reward function and plan the motion. For example, in path planning, the C-space of a mobile robot at home rarely changes, and the robot’s motion depends on the goal state; in human motion analysis, the costs of different poses are mostly invariant, while the actual motion depends on the desired directions. Based on this observation, we propose a meta inverse reinforcement learning algorithm by maximizing the shared rewards among all tasks. We model the reward function for each task as a probabilistic distribution conditioned on an inherent baseline function, and estimate the most likely reward function in the distribution that explains the observed task-specific demonstrations. We review existing IRL and meta-learning algorithms in Section II, and then introduce the proposed method in Section III. We show a simulated experiments for evaluation and a real-world experiment for application in Section IV, with conclusions in Section V. II. R ELATED W ORKS The idea of inverse optimal control is proposed by Kalman [5], white the inverse reinforcement learning problem is firstly formulated in [1], where the agent observes the states resulting from an assumingly optimal policy, and tries to learn a reward function that makes the policy better than all alternatives. Since the goal can be achieved by multiple reward functions, this paper tries to find one that maximizes the difference between the observed policy and the second best policy. This idea is extended by [6], in the name of max-margin learning for inverse optimal control. Another extension is proposed in [3], where the purpose is not to recover the real reward function, but to find a reward function that leads to a policy equivalent to the observed one, measured by the amount of rewards collected by following that policy. Since a motion policy may be difficult to estimate from observations, a behavior-based method is proposed in [7], which models the distribution of behaviors as a maximumentropy model on the amount of reward collected from each behavior. This model has many applications and extensions. For example, [8] considers a sequence of changing reward functions instead of a single reward function. [9] and [10] consider complex reward functions, instead of linear one, and use Gaussian process and neural networks, respectively, to model the reward function. [11] considers complex environments, instead of a well-observed Markov Decision Process, and combines partially observed Markov Decision Process with reward learning. [12] models the behaviors based on the local optimality of a behavior, instead of the summation of rewards. [13] uses a multi-layer neural network to represent nonlinear reward functions. Another method is proposed in [14], which models the probability of a behavior as the product of each state-action’s probability, and learns the reward function via maximum a posteriori estimation. However, due to the complex relation between the reward function and the behavior distribution, the author uses computationally expensive Monte-Carlo methods to sample the distribution. This work is extended by [15], which uses sub-gradient methods to simplify the problem. Another extensions is shown in [16], which tries to find a reward function that matches the observed behavior. For motions involving multiple tasks and varying reward functions, methods are developed in [17] and [18], which try to learn multiple reward functions. Most of these methods need to solve a reinforcement learning problem in each step of reward learning, thus practical large-scale application is computationally infeasible. Several methods are applicable to large-scale applications. The method in [1] uses a linear approximation of the value function, but it requires a set of manually defined basis functions. The methods in [10], [19] update the reward function parameter by minimizing the relative entropy between the observed trajectories and a set of sampled trajectories based on the reward function, but they require a set of manually segmented trajectories of human motion, where the choice of trajectory length will affect the result. Besides, these methods solve large-scale problems by approximating the Bellman Optimality Equation, thus the learned reward function and Q function are only approximately optimal. In our previous work, we proposed an approximation method that guarantees the optimality of the learned functions as well as the scalability to large state space problems [20]. To learn a model from limited data, meta learning algorithms are developed. A survey of different work is given in [21], viewing meta-learner as a way to improve biases for base-learners. The method in [22] uses neural memory machine to do the meta learning. The method in [23] minimizes the representations. The method in [24] learns by gradient descent. The method [25] learns optimizers. Meta learning algorithms are also applied to reinforcement learning problems. The method in [26] tunes meta parameters for reinforcement learning, learning rate for TD learning, action selection trade-off, and discount factor. The method in [27] uses one network to play multiple games. The method in [28] trains reinforcement learning with slower rl. The method in [29] learns a good initial parameter that reaches optimal parameters with limited gradient descent. Meta learning in inverse reinforcement learning focuses on imitation learning, like one-shot imitation learning[30]. III. M ETA I NVERSE R EINFORCEMENT L EARNING A. Meta Inverse Reinforcement Learning We assume that an agent needs to handle multiple tasks in an environment, denoted by {Ti |i = 1, NT }, where Ti denotes the ith task and NT denotes the number of tasks. We describe a task Ti as a Markov Decision Process, consisting of the following variables: • Si = {s}, a set of states • Ai = {a}, a set of actions a • Pi,ss′ , a state transition function that defines the probability that state s becomes s′ after action a. Ri = {ri (s)}, a reward function that defines the immediate reward of state s. • γi , a discount factor that ensures the convergence of the MDP over an infinite horizon. For a task Ti , the agent performs a set of demonstrations ζi = {ζi, j | j = 1, · · · , Nζi }, represented by Nζi sequences of state-action pairs: • ζi, j = {(sti, j , ati, j )|t = 0, · · · , Nζi, j }, where Nζi, j denotes the length of the jth sequence ζi, j . Given the observed sequences ζ = {ζi |i = 1, · · · , NT } for the NT tasks, inverse reinforcement learning algorithms try to recover a reward function ri (s) for each task. Our key observation in multi-task IRL is that the demonstrator has an inherent reward function rb (s), generating a baseline reward for each state in all tasks. To complete the ith task, the agent generates a reward function ri (s) from a distribution P(ri |rb ) conditioned on rb (s) to plan the motion. Therefore, the motion ζi is generated as: P(ζi |ri )P(ri |rb ) For the ith task, we want to find the most likely ri (s) sampled from P(ri |rb ) that explains the demonstration ζi . Assuming all the tasks are independent from each other, the following joint distribution is formulated: where θi denotes the parameter of VR function. The function value of a state is named as VR value. Substituting Equation (4) into Bellman Optimality Equation, the optimal Q function is given as: Q∗i (s, a) = Vi∗ (s) = max The reward functions can be found via maximumlikelihood estimation: NT , ri (s)) + L(ri (s), rb (s)) ∑ |Li (ζi{z } | {z } rb (s),r1 (s),··· ,rT (s)∈F min i=1 IRL loss (1) reward sharing loss where F denotes a function space, Li (ζi , ri (s)) is the negative loglikelihood of P(ζi |ri ), and L(ri (s), rb (s)) is the negative loglikelihood P(ri |rb ). B. Loss for Inverse Reinforcement Learning While many solutions exist for the inverse reinforcement learning problem, we adopt the solution based on function approximation developed in our earlier work [20] to handle the practical high-dimensional state spaces. The core idea of the method is to approximate the Bellman Optimality Equation [2] with a function approximation framework. The Bellman Optimality Equation is given as: Vi∗ (s) = max a∈A Q∗i (s, a) = ∗ ′ ′ a Pi,ss ′ [ri (s ) + γ ∗ Vi (s )], ∑ ′ s |s,a ∗ ′ ′ a ′ Pi,ss ′ [ri (s ) + γ ∗ max Qi (s , a )]. ′ ∈A a s′ |s,a ∑ (2) (3) ′ a ′ f i (s , θi ), ∑ Pi,ss a∈A ′ s |s,a (6) and the reward function can be computed as: ri (s) = fi (s, θi ) − γ ∗ max ′ a ′ f i (s , θi ). ∑ Pi,ss a∈A ′ s |s,a (7) This framework avoids solving the Bellman Optimality Equation. Besides, this formulation can be generalized to other extensions of Bellman Optimality Equation by replacing the max operator with other types of Bellman backup operators. For example, V ∗ (s) = log ∑a∈A exp Q∗ (s, a) is used in the maximum-entropy method[7]; V ∗ (s) = 1k log ∑a∈A exp k ∗ Q∗ (s, a) is used in Bellman Gradient Iteration [31]. To apply this framework to IRL problems, this work chooses a motion model p(a|s) based on the optimal Q function Q∗i (s, a) [14]: P(a|s) = i=1 (5) the optimal value function is given as: NT ∏ P(ζi |ri )P(ri |rb ) a ′ ′ f i (s , θi ), ∑ Pi,ss s′ |s,a expb ∗ Q∗i (s, a) , ∑ã∈A exp b ∗ Q∗i (s, ã) (8) where b is a parameter controlling the degree of confidence in the agent’s ability to choose actions based on Q values. Other models can also be used, like p(a|s) = exp(Q(s, a) − V (s)) in [7]. Assuming the approximation function is a neural network, the parameter θi = {w, b}-weights and biases, the negative log-likelihood of P(ζi |θi ) is given by: Li (θi ) = − ∑ (b ∗ Q∗i (s, a) − log ∑ exp b ∗ Q∗i (s, â)), (9) (s,a)∈ζi â∈A where the optimal Q function is given by Equation (5). After estimating the parameter θi , the value function and reward function can be computed with Equation (4), (6), and (7). C. Loss for Reward Sharing Since the demonstrator makes minimal changes to adapt the inherent reward function rb (s) into task-specific one ri (s), we model the distribution as: P(ri (s)|rb (s)) ∝ exp(D(ri (s), rb (s)))) where D(ri (s), rb (s))) measures the difference between ri (s) and rb (s). Thus the loss function for reward sharing is given as: L(ri (s), rb (s)) = log Z − D(ri (s), rb (s))) It is computationally prohibitive to solve in high-dimensional state spaces. But with a parameterized VR function, we describe the summation of the reward function and the discounted optimal value function as: where log Z is the partition function and remains the same for all ri (s). We test several functions as D(ri (s), rb (s))). The first choice is L2 loss, where fi (s, θi ) = ri (s) + γ ∗ Vi∗ (s), D(ri (s), rb (s)) = ||{ri (s) − rb (s)}|| (4) Algorithm 1 Meta IRL 1: 2: 3: 4: 5: 6: 7: 8: 9: Data: ζ , S, A, P, γ , b, α Result: reward value R[S] create variable θb = {W, b} for a neural network create variable θi = {W, b}, i = 1, · · · , T for each task initialize θb , θi = {W, b}, i = 1, · · · , T while Not converging do update θb , θi = {W, b}, i = 1, · · · , T based on optimization (1) end while compute and return all Ri [S] where {ri (s)− rb (s)} denotes the set of differences, evaluated on the full state space or only the visited states. The second choice is Huber loss with δ = 1, a differentiable approximation of the L1 loss popular in sparse models: ( 1 2 a for |a| ≤ δ , , Lδ (a) = 2 δ (|a| − 21 δ ), otherwise, each task, the agent demonstrates ten trajectories, where the length of a trajectory depends on how many steps to reach the goal state. We evaluate the proposed method with different reward sharing loss functions under different number of tasks and different number of trajectories. The evaluated loss functions include no reward sharing, reward sharing with standard deviation, information entropy, L2 loss, and huber loss. The number of tasks ranges from 1 to 16, and for each task, the number of trajectories ranges from 1 to 10. The learning rate is 0.01, with Adam optimizer. The accuracy of a reward is computed as the correlation coefficient between the learned reward function and the ground truth one. The results are shown in Figure 2. The result shows that the meta learning step can significantly improve the accuracy of reward learning, among which the huber loss function leads to the best performance in average. L2 loss and standard deviation have similar performance, not surprisingly. However, the information entropy has a really bad performance. B. Motion Analysis and D(ri (s), rb (s)) = ∑ L1 (ri (s) − rb (s)). s The third choice is standard deviation: D(ri (s), rb (s)) = stdev({ri (s) − rb (s)}) The fourth choice is information entropy, after converting {ri (s) − rb (s)} into a probabilistic distribution with sofmax function: D(ri (s), rb (s)) = entropy(so f tmax({ri (s) − rb (s)})) With the loss function for IRL and reward sharing, the reward functions can be learned via gradient method. The algorithm is shown in Algorithm 1. IV. E XPERIMENTS A. Path Planning We consider a path planning problem on an uneven terrain, where an agent can observe the whole terrain to find the optimal paths from random starting points to arbitrary goal points, but a mobile robot can only observe the agent’s demonstrations to learn how to plan paths. Given a starting point and a goal point, an optimal path depends solely on the costs to move across the terrain. To learn the costs, we formulate a Markov Decision Process for each goal point, where a state denotes a small region of the terrain and an action denotes a possible movement. The reward of a state equals to the negative of the cost to move across the corresponding region, while the goal state has an additional reward to attract movements. In this work, we create a discretized terrain with several hills, where each hill is defined as a peak of cost distribution and the costs around each hill decay exponentially, and the true cost of a region is the summation of the costs from all hills. Ten worlds are randomly generated, and in each world, ten tasks are generated, each with a different goal state. For During rehabilitation, a patient with spinal cord injuries sits on a box, with a flat plate force sensor mounted on box to capture the center-of-pressure (COP) of the patient during movement. Each experiment is composed of two sessions, one without transcutaneous stimulation and one with stimulation. The electrodes configuration and stimulation signal pattern are manually selected by the clinician [32]. In each session, the physician gives eight (or four) directions for the patient to follow, including left, forward left, forward, forward right, right, right backward, backward, backward left, and the patient moves continuously to follow the instruction. The physician observes the patient’s behaviors and decides the moment to change the instruction. Six experiments are done, each with two sessions. The COP trajectories in Figure 3 denote the case with four directional instructions; Figure 4, 5, 6, 7, and 8 denote the sessions with eight directional instructions. The COP sensory data from each session is discretized on a 100×100 grid, which is fine enough to capture the patient’s small movements. The problem is formulated into a MDP, where each state captures the patient’s discretized location and velocity, and the set of actions changes the velocity into eight possible directions. The velocity is represented with a two-dimensional vector showing eight possible velocity directions. Thus the problem has 80000 states and 8 actions, and each action is assumed to lead to a deterministic state. To learn the reward function from the observed trajectories based on the formulated MDP, we use the coordinate and velocity direction of each grid as the feature, and learn the reward function parameter from each set of data after segmentation based on peak detection on distances from the origin. The function approximator is a neural network with three hidden layers and [100, 50, 25] nodes. The huber loss function is used in reward sharing, and the result is show in Table I. Experiments with 1 tasks 0.55 Experiments with 3 tasks Experiments with 2 tasks 0.50 Experiments with 4 tasks 0.5 0.20 2 3 4 5 6 7 Number of Trajectories 8 9 0.10 10 1 2 3 4 (a) 1 task 0.3 no sharing stdev entropy huber l2 0.2 0.1 3 4 5 6 7 Number of Trajectories 8 9 Mean Correlation with the Ground Truth 0.3 no sharing stdev entropy huber l2 0.2 0.1 1 2 3 4 5 6 7 Number of Trajectories 8 9 0.2 0.1 3 4 5 6 7 Number of Trajectories 8 9 0.4 0.3 no sharing stdev entropy huber l2 0.1 1 2 3 no sharing stdev entropy huber l2 0.2 0.1 2 3 4 5 6 7 Number of Trajectories 8 9 (m) 13 tasks 10 Mean Correlation with the Ground Truth 0.3 1 4 2 3 no sharing stdev entropy huber l2 0.2 2 3 4 5 6 7 Number of Trajectories 4 5 6 7 Number of Trajectories 8 9 10 Experiments with 8 tasks 0.6 8 9 0.5 0.4 0.3 no sharing stdev entropy huber l2 0.2 0.1 10 1 2 3 4 5 6 7 Number of Trajectories 8 9 10 (h) 8 tasks Experiments with 11 tasks Experiments with 12 tasks 0.6 5 6 7 Number of Trajectories 8 9 0.5 0.4 0.3 no sharing stdev entropy huber l2 0.2 0.1 10 1 2 3 0.4 0.3 no sharing stdev entropy huber l2 0.2 0.1 2 3 4 5 6 7 Number of Trajectories 5 6 7 Number of Trajectories 8 9 0.4 0.3 no sharing stdev entropy huber l2 0.2 0.1 10 1 2 3 8 9 10 0.4 0.3 no sharing stdev entropy huber l2 0.2 0.1 2 (n) 14 tasks 3 4 5 6 7 Number of Trajectories 5 6 7 Number of Trajectories 8 9 10 Experiments with 16 tasks 0.6 0.5 1 4 (l) 12 tasks Experiments with 15 tasks 0.6 0.5 1 4 0.5 (k) 11 tasks Experiments with 14 tasks 0.6 0.4 1 (d) 4 tasks 0.3 (j) 10 tasks 0.5 0.1 10 0.4 0.7 0.2 Experiments with 13 tasks no sharing stdev entropy huber l2 0.2 0.6 (i) 9 tasks 0.6 9 0.3 (g) 7 tasks 0.5 10 8 Experiments with 7 tasks 1 Mean Correlation with the Ground Truth no sharing stdev entropy huber l2 Mean Correlation with the Ground Truth 0.3 5 6 7 Number of Trajectories 0.1 0.6 0.4 4 0.5 10 Experiments with 10 tasks 0.7 0.5 2 3 (f) 6 tasks Experiments with 9 tasks 1 2 0.6 0.4 10 0.6 Mean Correlation with the Ground Truth 1 0.4 (c) 3 tasks 0.5 (e) 5 tasks 0.7 0.1 10 Mean Correlation with the Ground Truth Mean Correlation with the Ground Truth 0.4 2 9 Experiments with 6 tasks 0.6 0.5 1 8 no sharing stdev entropy huber l2 0.2 (b) 2 tasks Experiments with 5 tasks 0.6 5 6 7 Number of Trajectories Mean Correlation with the Ground Truth 1 no sharing stdev entropy huber l2 0.20 0.15 Mean Correlation with the Ground Truth no sharing stdev entropy huber l2 0.25 0.3 Mean Correlation with the Ground Truth 0.30 0.30 0.25 0.4 Mean Correlation with the Ground Truth 0.35 0.40 0.35 8 9 10 Mean Correlation with the Ground Truth 0.40 Mean Correlation with the Ground Truth 0.45 Mean Correlation with the Ground Truth Mean Correlation with the Ground Truth 0.50 Mean Correlation with the Ground Truth 0.5 0.45 0.5 0.4 0.3 no sharing stdev entropy huber l2 0.2 0.1 1 (o) 15 tasks 2 3 4 5 6 7 Number of Trajectories 8 9 10 (p) 16 tasks Fig. 2: The result with five reward sharing loss functions on 16 tasks with at most 10 demonstrations for each task in 10 environment. TABLE I: Evaluation of the learned rewards: ”forward” etc. denote the instructed direction; item name”1u” denotes the patient id ”1”, with ”u” denoting unstimulated session and ”s” denoting stimulated sessions. The table shows the correlation coefficient between the ideal reward and the recovered reward. 1u 1s 2u 2s 3u 3s 4u 4s 5u 5s 6u 6s forward 0.411741 0.200355 0.161595 -0.0310265 0.362801 -0.265834 0.301472 -0.104719 0.360293 -0.212823 -0.0416432 -0.157148 backward 0.257564 0.486723 -0.17814 -0.0803484 -0.2995 0.146516 -0.281474 0.0930068 -0.311692 0.0414435 0.0570847 0.178879 left 0.0691989 0.129839 0.153376 0.0474505 0.245916 0.379665 0.377787 0.327783 -0.253715 0.0908994 0.210028 0.0880393 right -0.210216 0.436533 -0.16767 -0.00146299 -0.178778 -0.272437 -0.320403 -0.229091 0.260426 -0.124174 -0.104113 -0.0718817 top left top right bottom left bottom right 0.162906 0.0442916 0.386421 0.138805 0.410212 0.175432 0.0863029 0.00414109 0.0363181 -0.102579 0.105993 0.0874981 0.0148849 -0.2683 -0.119599 -0.161819 0.495134 -0.107462 -0.0672399 -0.298918 -0.0211192 0.00668849 -0.00335653 0.212331 0.136309 0.323862 -0.38137 0.122018 0.0704143 0.307328 -0.220457 0.0742221 -0.385605 0.00301386 -0.306677 -0.0521654 -0.140836 0.0453461 -0.00392284 0.171319 origin 0.49016 0.207188 0.156034 0.0726437 0.0507719 -0.182916 0.171433 -0.202197 -0.160687 0.145686 0.190253 0.359168 Fig. 3: Patient 1 under four directional instructions: ”unstimulated motion” means that the patient moves without transcutaneous stimulations, while ”stimulated motion” represents the motion under stimulations. Fig. 6: Patient 4 under eight directional instructions: ”unstimulated motion” means that the patient moves without transcutaneous stimulations, while ”stimulated motion” represents the motion under stimulations. Fig. 4: Patient 2 under eight directional instructions: ”unstimulated motion” means that the patient moves without transcutaneous stimulations, while ”stimulated motion” represents the motion under stimulations. Fig. 7: Patient 5 under eight directional instructions: ”unstimulated motion” means that the patient moves without transcutaneous stimulations, while ”stimulated motion” represents the motion under stimulations. Fig. 5: Patient 3 under eight directional instructions: ”unstimulated motion” means that the patient moves without transcutaneous stimulations, while ”stimulated motion” represents the motion under stimulations. Fig. 8: Patient 6 under eight directional instructions: ”unstimulated motion” means that the patient moves without transcutaneous stimulations, while ”stimulated motion” represents the motion under stimulations. It shows that the patient’s ability to following instructions vary among different directions, and the values will assist physicians to design the stimulating signals. V. C ONCLUSIONS This work proposes a solution to learn an accurate reward function for each task with limited demonstrations but from the same demonstrator, by maximizing the shared rewards among different tasks. We proposed several loss functions to maximize the shared reward, and compared their accuracies in a simulated environment. It shows that huber loss has the best performance. In future work, we will apply the proposed method to imitation learning. R EFERENCES [1] A. Y. Ng and S. Russell, “Algorithms for inverse reinforcement learning,” in in Proc. 17th International Conf. on Machine Learning, 2000. [2] R. S. Sutton and A. G. Barto, Reinforcement learning: An introduction. MIT press Cambridge, 1998, vol. 1, no. 1. [3] P. Abbeel and A. Y. Ng, “Apprenticeship learning via inverse reinforcement learning,” in Proceedings of the twenty-first international conference on Machine learning. ACM, 2004, p. 1. [4] B. Najafi, K. Aminian, A. Paraschiv-Ionescu, F. Loew, C. J. Bula, and P. Robert, “Ambulatory system for human motion analysis using a kinematic sensor: monitoring of daily physical activity in the elderly,” IEEE Transactions on biomedical Engineering, vol. 50, no. 6, pp. 711–723, 2003. [5] R. Kalman and M. M. C. B. D. R. I. for Advanced Studies. Center for Control Theory, When is a Linear Control System Optimal?., ser. RIAS technical report. Martin Marietta Corporation, Research Institute for Advanced Studies, Center for Control Theory, 1963. [6] N. D. Ratliff, J. A. Bagnell, and M. A. Zinkevich, “Maximum margin planning,” in Proceedings of the 23rd international conference on Machine learning. ACM, 2006, pp. 729–736. [7] B. D. Ziebart, A. Maas, J. A. Bagnell, and A. K. Dey, “Maximum entropy inverse reinforcement learning,” in Proc. AAAI, 2008, pp. 1433–1438. [8] Q. P. Nguyen, B. K. H. Low, and P. Jaillet, “Inverse reinforcement learning with locally consistent reward functions,” in Advances in Neural Information Processing Systems, 2015, pp. 1747–1755. [9] S. Levine, Z. Popovic, and V. Koltun, “Nonlinear inverse reinforcement learning with gaussian processes,” in Advances in Neural Information Processing Systems 24, J. Shawe-Taylor, R. S. Zemel, P. L. Bartlett, F. Pereira, and K. Q. Weinberger, Eds. Curran Associates, Inc., 2011, pp. 19–27. [10] C. Finn, S. Levine, and P. Abbeel, “Guided cost learning: Deep inverse optimal control via policy optimization,” arXiv preprint arXiv:1603.00448, 2016. [11] J. Choi and K.-E. Kim, “Inverse reinforcement learning in partially observable environments,” Journal of Machine Learning Research, vol. 12, no. Mar, pp. 691–730, 2011. [12] S. Levine and V. Koltun, “Continuous inverse optimal control with locally optimal examples,” arXiv preprint arXiv:1206.4617, 2012. [13] M. Wulfmeier, P. Ondruska, and I. Posner, “Deep inverse reinforcement learning,” arXiv preprint arXiv:1507.04888, 2015. [14] D. Ramachandran and E. Amir, “Bayesian inverse reinforcement learning,” in Proceedings of the 20th International Joint Conference on Artifical Intelligence, ser. IJCAI’07. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2007, pp. 2586–2591. [15] G. Neu and C. Szepesvári, “Apprenticeship learning using inverse reinforcement learning and gradient methods,” arXiv preprint arXiv:1206.5264, 2012. [16] K. Mombaur, A. Truong, and J.-P. Laumond, “From human to humanoid locomotionan inverse optimal control approach,” Autonomous robots, vol. 28, no. 3, pp. 369–383, 2010. [17] C. Dimitrakakis and C. A. Rothkopf, “Bayesian multitask inverse reinforcement learning,” in European Workshop on Reinforcement Learning. Springer, 2011, pp. 273–284. [18] J. Choi and K.-E. Kim, “Nonparametric bayesian inverse reinforcement learning for multiple reward functions,” in Advances in Neural Information Processing Systems, 2012, pp. 305–313. [19] A. Boularias, J. Kober, and J. R. Peters, “Relative entropy inverse reinforcement learning,” in International Conference on Artificial Intelligence and Statistics, 2011, pp. 182–189. [20] K. Li and J. W. Burdick, “Large-scale inverse reinforcement learning via function approximation for clinical motion analysis,” arXiv preprint arXiv:1707.09394, 2017. [21] R. Vilalta and Y. Drissi, “A perspective view and survey of metalearning,” Artificial Intelligence Review, vol. 18, no. 2, pp. 77–95, 2002. [22] A. Santoro, S. Bartunov, M. Botvinick, D. Wierstra, and T. Lillicrap, “Meta-learning with memory-augmented neural networks,” in International conference on machine learning, 2016, pp. 1842–1850. [23] B. Hariharan and R. Girshick, “Low-shot visual recognition by shrinking and hallucinating features,” arXiv preprint arXiv:1606.02819, 2016. [24] M. Andrychowicz, M. Denil, S. Gomez, M. W. Hoffman, D. Pfau, T. Schaul, and N. de Freitas, “Learning to learn by gradient descent by gradient descent,” in Advances in Neural Information Processing Systems, 2016, pp. 3981–3989. [25] D. Ha, A. Dai, and Q. V. Le, “Hypernetworks,” arXiv preprint arXiv:1609.09106, 2016. [26] N. Schweighofer and K. Doya, “Meta-learning in reinforcement learning,” Neural Networks, vol. 16, no. 1, pp. 5–9, 2003. [27] E. Parisotto, J. L. Ba, and R. Salakhutdinov, “Actor-mimic: Deep multitask and transfer reinforcement learning,” arXiv preprint arXiv:1511.06342, 2015. [28] Y. Duan, J. Schulman, X. Chen, P. L. Bartlett, I. Sutskever, and P. Abbeel, “Rl2: Fast reinforcement learning via slow reinforcement learning,” arXiv preprint arXiv:1611.02779, 2016. [29] C. Finn, P. Abbeel, and S. Levine, “Model-agnostic meta-learning for fast adaptation of deep networks,” arXiv preprint arXiv:1703.03400, 2017. [30] Y. Duan, M. Andrychowicz, B. Stadie, J. Ho, J. Schneider, I. Sutskever, P. Abbeel, and W. Zaremba, “One-shot imitation learning,” arXiv preprint arXiv:1703.07326, 2017. [31] K. Li and J. W. Burdick, “Bellman Gradient Iteration for Inverse Reinforcement Learning,” ArXiv e-prints, Jul. 2017. [32] S. Harkema, Y. Gerasimenko, J. Hodes, J. Burdick, C. Angeli, Y. Chen, C. Ferreira, A. Willhite, E. Rejc, R. G. Grossman et al., “Effect of epidural stimulation of the lumbosacral spinal cord on voluntary movement, standing, and assisted stepping after motor complete paraplegia: a case study,” The Lancet, vol. 377, no. 9781, pp. 1938–1947, 2011.
2cs.AI
An Adaptive Amoeba Algorithm for Shortest Path Tree Computation in Dynamic Graphs Xiaoge Zhang a,f , Qi Liub,c,g , Yong Hud , Felix T. S. Chane , Sankaran Mahadevanf , Zili Zhanga ,g , Yong Deng a,f* arXiv:1311.0460v1 [cs.NE] 3 Nov 2013 a School of Computer and Information Science, Southwest University, Chongqing 400715, China; b Department of Biomedical Informatics, Medical Center, Vanderbilt University, Nashiville, 37235, USA; c School of Life Sciences and Biotechnology, Shanghai Jiao Tong University, Shanghai, 200030, China; d Institute of Business Intelligence and Knowledge Discovery, Guangdong University of Foreign Studies, Guangzhou 510006, China; e Department of Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hung Hum, Kowloon, Hong Kong f School of Engineering, Vanderbilt University, Nashiville, 37235, USA g These authors contribute equally * Correspondence and requests for materials should be addressed to Y. D. ([email protected]) This paper presents an adaptive amoeba algorithm to address the shortest path tree (SPT) problem in dynamic graphs. In dynamic graphs, the edge weight updates consists of three categories: edge weight increases, edge weight decreases, the mixture of them. Existing work on this problem solve this issue through analyzing the nodes influenced by the edge weight updates and recompute these affected vertices. However, when the network becomes big, the process will become complex. The proposed method can overcome the disadvantages of the existing approaches. The most important feature of this algorithm is its adaptivity. When the edge weight changes, the proposed algorithm can recognize the affected vertices and reconstruct them spontaneously. To evaluate the proposed adaptive amoeba algorithm, we compare it with the Label Setting algorithm and Bellman-Ford algorithm. The comparison results demonstrate the effectiveness of the proposed method. The shortest path tree problem (SPT) is one of the basic network optimization problems and it is a variance of the shortest path problem (SPP), which has been widely used in many fields, such as multicast routing,1 Route Information Protocol (RIP),2 wireless network,3 network design,4, 5 IS-IS,6 and complex networks.7–9 Its objective is to find the set of edges which connect all the nodes in the network so that the sum of the edge lengths from the source to the other nodes is minimized. As the SPT problem is frequently as subproblem when solving many combinatorial and network optimization problems, many researchers payed their attention to this problem.10, 11 In practical environment, the network is changing with time. It lead to the occurence of the variance of SPTs named Dynamic Shortest Path (DSP) problem. Assume G (V,  E, ω) be a simple network and the edge  ′ ′ weights in this network are nonnegative numbers. Let G V, E, ω be another network obtained from G in ′ ′ which some edge weights change. Suppose Ts and Ts are the SPTs rooted at s in G and G . The DSP problem is ′ to compute Ts from Ts . Many methods have been proposed to deal with this problem. For example, the classical Dijkstra algorithm12 and Bellman algorithm solve this problem through recalculating the SPTs whenever there is a change to edge weights. Due to the high computational time, it cannot meet the requirement of the emergent accidents. After the idea of using an SPTs update program which only reconstruct on the affected vertices proposed by Frigioni13 appeared, many dynamic SPTs approaches have implemented this concept into realworld applications10, 11 to reduce the computational time. They have divided the edge weight updates into three categories: edge weight increase, edge weight decreases, the mixture of them. For the edge updates belonging to different categories, various operations are processed. The main feature of these approaches is recognize the affected vertices, such as the intelligent semidynamic DSP algorithm named BallString in,14 the fully dynamic algorithm called DynamicSWSF-FP proposed in.15 However, the above algorithms have obvious disadvantages. When the scale of the network becomes very big or the weights of multiple edges decrease while that of other multiple edges increase, the procedure analyzing the affected vertices will become very complex. Secondly, from the practical viewpoint, this will cost lots of time. Especially in recent years, the networks with big scale become more and more. This may still cause long latency and unnecessary overheads. As a consequence, it is meaningful to explore new methods to handle the SPTs problem. Recently, a large amoeboid organism, the plasmodium of Physarum polycephalum, has been shown to be capable of solving many graph theoretical problems,16–19 including finding the shortest path,20–23 network design,24–26 population migration27 and others.28–32 Moreover, this organism has been shown to be able to form networks with features comparable to or better than the Tokyo rail network.18 In addition, Baumgarten has proved the mass of mold will eventually convergence to the shortest path of the network that the mold lies on.17 Inspired by this intelligent organism, a path finding mathematical model has been established.33 To the best of knowledge, the amoeba model is not used to deal with SPTs by now. In what follows, based on the amoeba model, an adaptive amoeba appraoch to SPTs in dynamic graphs is presented. The main characteristic of the propose method is its adaptivity. More specially, the algorithm can recognize the affected vertices and reconstruct them spontaneously. Those unaffected nodes will not be computed again. We will introduce how to implement amoeba model to deal with SPTs in the following sections. Results System Environment and Data Sets. In order to evaluate the performance of the proposed method, we introduce the experimental environment and the problem instance generator is presented. Besides, the performance of our algorithm is compared with the Label Setting algorithm34 and Bellman-Ford algorithm.35 The proposed adaptive amoeba algorithm for shortest path tree in dynamic graphs is tested on networks with random and varying topologies through computer simulations using Matlab on an Intel Pentium Dual-Core E5700 processor (3.00 GHz) with 2 GB of RAM under Windows Seven. The random directed graphs can be generated using the erdos.renyi.game function of the igraph package in R language (for details, please refer to http://igraph.sourceforge.net/doc/R/erdos.renyi.game.html). The weight for an edge is randomly generated ranging from 1 to 1000. The data for random graph is shown in Table 1. Performance Indicators. In each testing graph, the first node in the random generated graph is denoted as the source node. Then, a set λ of edges is randomly selected to decrease or increase their edge weights. If both the increased case and the decreased case associated with the edge weights appear in the network, we denote λ as mixed. In this paper, we pay attention to the CPU runtime for each algorithm. In order to examine the efficiency of the presented method, the following parameters are taken into consideration. • Graph size (graphsize). It denotes the size of the network. We will focus on how the CPU runtime changes with the change of network size. • Ratio of updated edges (rue). This parameter represents the percentage of updated edges occupied in the whole network. For instance, in a network with 1000 edges, when 100 edges get their weight updated, then we will say rue is 0.1. • Ratio of changed weight (rcw ). This variable reflects the degree of the changed weight which is decreased or increased from its original value. As for this parameter, in the increased case, the rcw for the edge weight ranges from 1 to a large number 10. For example, assume the original weight value associated with the edge is 100. If the parameter rcw is 1, the updated weight for this edge will be 200. In the decreased case, the rcw for the edge weight ranges from 0 to 0.9. In order to evaluate the performance of the proposed method, we compare it with modified Dijkstra algorithm. We will show how the parameter rue affects the investigated algorithms. For the following computational results, the program is run for 10 times for each instance. Edge Weight Increases. For the increase case, Fig. 1 shows the influence of rue on the networks with different sizes when the parameter rue changes from 0.1 to 0.6 (here, the parameter rcw is set a constant value 0.1). As can be seen in Fig. 1, in the increase cases, regardless of the change of the parameter rue, the CPU time of all the three algorithms remain constant. On the other hand, considering CPU runtime, the Bellman-Ford algorithm has less computational time than the Label Setting algorithm in the four networks. The proposed adaptive amoeba algorithm outperforms when compared with the Label Setting algorithm and Bellman-Ford algorithm. The reason for this phenomenon is due to the change of the edge weights. When the weights associated with the edge change, the proposed adaptive amoeba algorithm can recognize the affected vertices and reconstruct them spontaneously. However, for the Label Setting Algorithm and Bellman-Ford Algorithm, it must reconstruct the whole network, which consumes more time. As a result, there is a big gap between the CPU runtime of the proposed method and that of Label Setting algorithm and Bellman-Ford algorithm. Label Setting Algorithm 4 Bellman−Ford Algorithm Adaptive Amoeba Algorithm graphsize=500 graphsize=1000 30 3.5 CPU Time/SPT (s) CPU Time/SPT (s) 25 3 2.5 2 1.5 20 15 10 1 0.5 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 5 0.1 0.6 0.15 0.2 0.25 300 100 250 80 60 40 20 0 0.1 0.35 rue 0.4 0.45 0.5 0.55 0.6 0.45 0.5 0.55 0.6 graphsize=2000 120 CPU Time/SPT (s) CPU Time/SPT (s) graphsize=1500 0.3 200 150 100 50 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 0.6 0 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 Figure 1. Comparison in edge weight increases when the parameter rue changes from 0.1 to 0.6 (here, the parameter rcw is set a constant value 0.1) In what follows, we focus on how the change of the parameter rcw affects the CPU runtime of the different algorithms in the increase case. As shown in Fig. 2, it shows the influence of the parameter rcw on the three algorithms’ computational time when the parameter rcw changes from 0.1 to 0.6 (here, the parameter rue is set a constant value 0.2). As we can see, the parameter rcw has different influences on the three algorithms. For the Label Setting algorithm and Bellman-Ford algorithm, the computational time remains relatively constant, which is shown as straight lines in Fig. 2. On the contrary, for the proposed adaptive amoeba algorithm, it is influenced strongly by the parameter rcw, especially when the graph size is greater than 1500. From Fig. 2, it can be seen that the CPU runtime of the presented method becomes more and more with the increase of parameter rcw. The reason lies that when the parameter rcw becomes bigger and bigger, the edge length is increased a lot from its original value. As a result, most of the paths in the SPT need to be recomputed. Although the CPU time of the proposed adaptive amoeba algorithm increases a lot, it is still less than that of the Label Setting algorithm and Bellman-Ford algorithm. In summary, in the increase case, the change of the parameter rue has little influence on these algorithms. The adaptive amoeba algorithm proposed in this paper has the least CPU runtime when dealing with the networks 5 graphsize=500 Label Setting Algorithm Bellman−Ford Algorithm Adaptive Amoeba Algorithm graphsize=1000 35 30 CPU Time/SPT (s) CPU Time/SPT (s) 4 3 2 25 20 15 10 1 5 0 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 0 0.1 0.6 0.15 0.2 0.25 300 100 250 80 60 40 20 0 0.1 0.35 rue 0.4 0.45 0.5 0.55 0.6 0.45 0.5 0.55 0.6 graphsize=2000 120 CPU Time/SPT (s) CPU Time/SPT (s) graphsize=1500 0.3 200 150 100 50 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 0.6 0 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 Figure 2. Comparison in edge weight increases when the parameter rcw changes from 0.1 to 0.6 (here, the parameter rue is set a constant value 0.2) with different sizes. On the contrary, the change of the parameter rcw has great influence on the CPU runtime of the proposed method. The CPU runtime of the presented method becomes bigger with the increase of parameter rcw. Edge Weight Decreases. Similarly, in the decrease case, we have observed the influence of the two parameters on the CPU runtime of the above three algorithms. Figs. 3 and 4 show the experimental results, when the parameters rue, rcw change respectively. As can be seen in Fig. 3, the parameters are set the same as that of the edge weight increases. From Fig. 3, it can be concluded that, in the decrease case, when the parameter rue changes from 0.1 to 0.6, the CPU runtime of the three algorithms fluctuates slightly in the networks with different sizes. In other words, the parameter rcw has very little effect on the computational efficiency of these algorithms. The proposed method has obvious advantage over the Label Setting algorithm and Bellman-Ford algorithm when dealing with the SPT in dynamic graphs. As shown in Fig. 4, when the parameter rcw changes from 0.1 to 0.6, the CPU runtime of the proposed method fluctuates strongly. When rcw increases from 0.1 to 0.6, the CPU runtime for the adaptive amoeba algorithm deteriorates rapidly. In the network with graph size equal to 500, 1500, 2000, when rcw reaches 0.6, it can be observed that the performance of the Label Setting algorithm and Bellman-Ford algorithm outperform compared to the proposed method. It can be observed that when rcw is less than a certain threshold value, the proposed method has better performance. The threshold value varies with the size of a graph. When rcw is bigger than 0.4, it is more appropriate to adopt the Label Setting algorithm and Bellman-Ford algorithm. The reason why the performance of the proposed algorithm gets worse when rcw is bigger than the threshold value is that more edges are influenced, and more time is spent to reconstruct the SPT and reallocate the flux associated with each edge in the amoeba algorithm. In summary, in the decreased case, the situation is similar to that of the increased case. The parameter rcw has different effect with that of parameter rue. Besides, the performance of the adaptive amoeba algorithm 5 Label Setting Algorithm Bellman−Ford Algorithm Adaptive Amoeba Algorithm graphsize=500 graphsize=1000 35 30 CPU Time/SPT (s) CPU Time/SPT (s) 4 3 2 25 20 15 10 1 5 0 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 0 0.1 0.6 0.15 0.2 0.25 300 100 250 80 60 40 0.4 0.45 0.5 0.55 0.6 0.45 0.5 0.55 0.6 200 150 100 20 0 0.1 0.35 rue graphsize=2000 120 CPU Time/SPT (s) CPU Time/SPT (s) graphsize=1500 0.3 50 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 0 0.1 0.6 0.15 0.2 0.25 0.3 0.35 rue 0.4 Figure 3. Comparison in edge weight decreases when the parameter rue changes from 0.1 to 0.6 (here, the parameter rcw is set a constant value 0.1) 5 graphsize=500 Label Setting Algorithm Bellman−Ford Algorithm Adaptive Amoeba Algorithm graphsize=1000 35 30 CPU Time/SPT (s) CPU Time/SPT (s) 4 3 2 25 20 15 10 1 5 0 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 0 0.1 0.6 0.15 0.2 0.25 graphsize=1500 0.4 0.45 0.5 0.55 0.6 0.45 0.5 0.55 0.6 1200 1000 CPU Time/SPT (s) 200 CPU Time/SPT (s) 0.35 rue graphsize=2000 250 150 100 50 0 0.1 0.3 800 600 400 200 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 0.6 0 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 Figure 4. Comparison in edge weight increases when the parameter rcw changes from 0.1 to 0.6 (here, the parameter rue is set a constant value 0.2) gets worse when rcw is more than a threshold value. As a consequence, it is appropriate to carry out different algorithms according to the specific value of this parameter. Mixed Edge Weight Changes. In the mixed case, both the increased case and the decreased case share the same percentage in the total ratio of updated edges. Simply speaking, suppose there are 200 edges in the network whose weights change, then 100 of them increase their edge weights while the left 100 edges’ weights decrease. As for the parameter rcw, it is implemented for both the increased case and the decreased case. It is to say suppose rcw is 0.1, then half of the randomly selected edges will increase their weights by 10 percentages while the left edges will decrease their weights by 10 percentages. graphsize=500 5 graphsize=1000 Label Setting Algorithm Bellman−Ford Algorithm Adaptive Amoeba Algorithm 30 25 CPU Time/SPT (s) CPU Time/SPT (s) 4 3 2 1 0 0.1 20 15 10 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 5 0.1 0.6 0.15 0.2 0.25 graphsize=1500 0.3 0.35 rue 0.4 0.45 0.5 0.55 0.6 0.45 0.5 0.55 0.6 graphsize=2000 300 100 250 80 CPU Time/SPT (s) CPU Time/SPT (s) 90 70 60 50 200 150 100 40 50 30 20 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 0.6 0 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 Figure 5. Comparison in mixed change of the edge weight when the parameter rue changes from 0.1 to 0.6 (here, the parameter rcw is set a constant value 0.1) Fig. 5 shows the CPU runtime of the three algorithms when the parameter rue changes from 0.1 to 0.6. Similarly, it has slight influence like in the increased and decreased cases. Obviously, the adaptive amoeba algorithm outperforms when compared with the other algorithms. As for the change of parameter rcw, Fig. 6 displays the computational results of the three algorithms. It can be concluded that the Label Setting algorithm and Bellman-Ford algorithm remain constant, regardless of the changed weights. For the adaptive amoeba algorithm, it fluctuates greatly when rcw changes. As can be seen in Fig. 6, when the rcw is less than 0.5, the proposed method outperforms certainly than the other two algorithms. When rcw reaches 0.6 and the graph size reaches 2000, the CPU runtime of the presented algorithm has spent more time than the other two algorithms. In the four sub figures, the results are not consistent. It is due to the difference of the network topology. Every time, the affected edges are randomly selected, which may lead to different influences on the network. In one word, similar to the increased and decreased case, the parameter rue affect the CPU runtime a little while rcw playing an important role regarding the CPU runtime. Discussion In this paper, we investigated the previous algorithms used to deal with SPT problem in dynamic graphs. These algorithms solving SPT problem with edge updates by identifying the affected nodes and reconstruct the 5 Label Setting Algorithm Bellman−Ford Algorithm Adaptive Amoeba Algorithm graphsize=500 graphsize=1000 35 30 CPU Time/SPT (s) CPU Time/SPT (s) 4 3 2 25 20 15 10 1 5 0 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 0 0.1 0.6 0.15 0.2 0.25 graphsize=1500 0.3 0.35 rue 0.4 0.45 0.5 0.55 0.6 0.45 0.5 0.55 0.6 graphsize=2000 120 220 200 100 CPU Time/SPT (s) CPU Time/SPT (s) 180 80 60 40 160 140 120 100 80 20 60 0 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 0.45 0.5 0.55 0.6 40 0.1 0.15 0.2 0.25 0.3 0.35 rue 0.4 Figure 6. Comparison in mixed change of the edge weight when the parameter rcw changes from 0.1 to 0.6 (here, the parameter rue is set a constant value 0.2) shortest path among these nodes. However, when these algorithms are faced with the network with big scale, on the one hand, this procedure becomes very complicated. On the other hand, it cost much time. In order to address the above problems, we proposed a fully adaptive amoeba algorithm for solving SPT in dynamic graphs. The efficiency of the presented algorithm is demonstrated by implementing it in all the edge updates including the increase, decrease, mixed change of the edge weight. In order to evaluate the performance of the proposed method, we conducted experiments on randomly generated graphs, in terms of the CPU execution time. Moreover, we compared our algorithm with the existing algorithms, such as the Label Setting algorithm, BellmanFord algorithm. The purpose of the experiment is to obverse how these algorithms behave for different graph sizes and various mixes of changed edges. We randomly generate four graphs with different sizes: 500, 1000, 1500, 2000. We evaluate the performance of the three algorithms according to three factors: graphsize, ratio of updated edges (rue), ratio of changed weight (rcw ). For the increased case, the change of the parameter rue has little influence on these algorithms while the change of the parameter rcw has great influence on the CPU runtime of the proposed method. For the decreased case, the influence of parameter rue is similar to that of the increased case. On the other hand, the performance of the adaptive amoeba algorithm gets worse when rcw is more than a threshold value. As for the other left algorithms, they are slightly influenced by parameter rcw. For the mixed change of the edge weights, the influences of parameters rue and rcw on the computational time are consistent with that of the increased and decreased cases. We conclude the following for the above three algorithms. For the increased case, decreased case, and mixed change case, in spite of the ratio of updated edges, the proposed method has the best overall performance. On the contrary, when the parameter rcw changes, it is appropriate to carry out different algorithms according to the specific value of rcw. Methods Physarum Polycephalum Inspired Shortest Path Finding Model. Physarum Polycephalum is a large, single-celled amoeboid organism forming a dynamic tubular network connecting the discovered food sources during foraging. The mechanism of tube formation can be described as: tubes thicken in a given direction when shuttle streaming of the protoplasm persists in that direction for a certain time. It implies positive feedback between flux and tube thickness, as the conductance of the sol is greater in a thicker channel. With this mechanism, a mathematical model illustrating the shortest path finding has been constructed.33 Suppose the shape of the network formed by the Physarum is represented by a graph, in which a plasmodial tube refers to an edge of the graph and a junction between tubes refers to a node. Two special nodes labeled as N1 , N2 act as the starting node and ending node respectively. The other nodes are labeled as N3 , N4 , N5 , N6 etc. The edge between node Ni and Nj is expressed as Mij . The parameter Qij denotes the flux through tube Mij from node Ni to Nj . Regard the flow along the tube as an approximately poiseuille flow, the flux Qij can be expressed as: Qij = Dij (pi − pj ) Lij (1) where pi is the pressure at the node Ni , Dij is the conductivity of the tube Mij , Lij is its length. By considering that the inflow and outflow must be balanced, we have: X Qij = 0(j 6= 1, 2) For the source node N1 and the sink node N2 the following two equations hold X Qi1 + I0 = 0 (2) (3) i X Qi2 − I0 = 0 (4) i where I0 is the flux flowing from the source node and I0 is a constant value here. In order to describe such an adaptation of tubular thickness we assume that the conductivity Dij changes over time according to the flux Qij . The following equation for the evolution of Dij (t) can be used d Dij = f (|Qij |) − rDij dt (5) where r is a decay rate of the tube. It can be obtained that the equation implies that the conductivity ends to vanish if there is no flux along the edge, while it is enhanced by the flux. The f is monotonically increasing continuous function satisfying f (0) = 0. Then the network poisson equation for the pressure can be obtained from the Eq. (8-4) as follows:  f or j = 1,  +1 X Dij −1 f or j = 2, (pi − pj ) =  Lij i 0 otherwise (6) By setting p2 =0 as a basic pressure level, all pi can be determined by solving Eq. (6) and Qij can also be obtained. In this paper, f (Q) = |Q| is used. With the flux calculated, the conductivity can be derived, where Eq. (7) is used instead of Eq. (5), adopting the functional form f (Q) = |Q|. n+1 n Dij − Dij n+1 = |Q| − Dij δt (7) The amoeba model is modified to solve SPTs in dynamic graphs. The algorithm is composed of three parts. First of all, the amoeba model is extended to solve the shortest path in the directed networks. Then a modified model is presented to handle SPTs in static directed networks. Finally, we analyze the changing trend of the amoeba algorithm is applied to deal with SPTs in dynamic graphs. Shortest Path Problem in Directed Network. It is observed that the original amoeba model can only handle the shortest path problem (SPP) in the undirected network according to.16, 20, 33 As a result, we need to extend its application field to directed networks by modifying the original model. Let G = (N, E, L) be a directed network, where N denotes a set of n nodes, E denotes an edge set with m directed edges, and L denotes a weight set for E. Given a source node s and a sink node t, the directed shortest path problem can be defined as how to find a path from s to t, which only consists of directed edges of E, with the minimum sum of weights on the edges. The original amoeba model is designed to solve the shortest path problem in the undirected graphs. For the directed graphs, the following equations are constructed according to the Kirchhoff’s laws:    +1 f or i = s X  Dij Dji −1 f or i = t (pi − pj ) = (8) +  Lij Lji j∈N 0 otherwise where s denotes the starting node, t denotes the ending node, Lij is the length of the edge Mij , Dij is the conductivity of the edge Mij . In the directed graphs, Mij is different from that of the undirected networks. Here, Mij denotes the tube starting from node i to node j. As a result, the way that Dij is initialized in the directed graphs is different from that in the undirected networks. If Mij ∈ E, then Dij = 1. Otherwise, Dij = 0. In what follows, the flux Qij of every edge can be obtained. The direction of the edge is related with the pressure of each node. Naturally, the flux starts at the node with high pressure and ends at the node with low pressure. In the directed graphs, in order to keep the direction of each edge, the following check procedure is inevitable. Assume there is an edge Mij starting from node i and ending at node j. If the pressure pj is larger than pi , it means the flux is flowing from node j to node i, which is opposite with the direction of the edge in the directed graph. Once the phenomenon is found, then the flux needs to be cut off. As a consequence, we change the flux of this edge Qij to be 0. Next, the following Eq. (9) for the evolution of Dij (t) can be summarized. As can be seen, the changing process of D is continuous. In the process of the algorithm, a discrete procedure is applied as shown in Eq. (10). The general flow of the proposed method is detailed in Table 2. dDij (t) = dt Dij (n + 1) =   Qij (t) − Dij (t) pi (t) ≥ pj (t) −Dij (t) pi (t) < pj (t) (Qij (n) − Dij (n)) ∗ ∆t + Dij (n) pi (n) ≥ pj (n) (0 − Dij (n)) ∗ ∆t + Dij (n) pi (n) < pj (n) (9) (10) where ∆t is the time interval, 0 < ∆t < 1. There are several possible solutions to decide when to stop execution of Algorithm 1, such as the maximum number of iterations is arrived, conductivity of each tube converges to 0 or 1, flux through each tube remains unchanged, etc. In this paper, when the conductivity matrix changes between the current iteration and the N P N P n−1 n ≤ δ, where δ is a threshold), then the program Dij − Dij previous iteration very little (in other words, i=1 j=1 will stop. Proofs of Physarum Polycephalum Model in Directed Networks. In undirected graphs, the model is able to converge to an equilibrium state and Baumgarten17 has proved its stability . In directed graphs, a lot of our experiments have shown that, it will also convergence to an equilibrium state in directed networks and the process of the convergence is similar to that of the undirected graphs. In this section, we prove that all the flux flowing from s to t consists of the shortest path in the directed networks when the network reaches the equilibrium state. First of all, the following parameters are defined: F (t): F (t) is one set of edges whose Qij is non-negative number at time t. Let F = lim F (t). t→∞ B (t): B (t) is another set of edges whose Qij is is negative number at time t. Let B = lim B (t). t→∞ uij (t): uij (t) is the pressure difference between node i and node j at time t. uij (t) = pi (t) − pj (t). Let uij = lim uij (t). t→∞ lemma 3.1. For any directed edge Mij , lim (Qij (t) − Dij (t)) = 0. t→∞ Proof When t goes to a infinite number, the network reaches stable. As a result, for any Mij , lim t→∞ According to Eq. (9), it can be seen that: ( lim (Qij (t) − Dij (t)) = 0 t→∞ lim Dij (t) = 0 t→∞ When j ∈ B, lim Qij (t) = lim t→∞ t→∞ Dij (t)uij (t) Lij dDij (t) dt = 0. Mij ∈ F Mij ∈ B = 0. Lemma 3.1 is established. lemma 3.2. For any Mij , if lim Qij (t) 6= 0, then Mij ∈ F and ue = Le . t→∞ Proof According to lemma 3.1, if lim Qij (t) 6= 0, then lim Dij (t) = lim Qij (t) 6= 0. t→∞ t→∞ t→∞ Based on Eq. (8), it can be seen that uij = Lij > 0 and Mij ∈ F . Lemma 3.2 is established. lemma 3.3. If Mij ∈ F , then uij ≤ Lij . Proof According to lemma 3.2, when lim Qij (t) 6= 0, lemma 3.3 is established. t→∞ When lim Qij (t) = 0 and Mij ∈ F , then lim Dij (t) = 0, ∃T, ∀t > T, t→∞ t→∞ dDij (t) dt < 0. Thus, Mij ∈ F (t). According to Eq. (9), we can obtain Qij (t) < Dij (t). According to Eq. (8), it can be seen uij (t) < Lij . In summary, uij ≤ Lij . Therefore, lemma 3.3 is established. lemma 3.4. When the model reaches the equilibrium state: (i) All the flow converges to some paths from s to t. (ii) These directed paths have the same path length and their length is equal to ust . (iii) These directed paths have the shortest path length. Proof (i) According to lemma 3.1 and lemma 3.2, in the equilibrium state, the directions of all the edges are in accordance with the flow directions. Consequently, the flow converges to the paths existing in the directed graph G. (ii) Assume v is one directed path Pwhich the flow converges to, Lv is the length of v. According to lemma 3.2, P Lij = Lv . uij = there are ust = Mij ∈v Mij ∈v P (iii) Assume v is one path from s to t, it is known to us that ust = uij . For any edge Mij , if uij ≥ 0, Mij ∈v then Mij ∈ F . According to lemma P 3.3, uij ≤ Lij . If uij < 0, it is obviously seen that uij ≤ Lij . P Lij = Lv . It means that all the other paths’ length is not less than uij ≤ Consequently, ust = Mij ∈v Mij ∈v ust . Incorporating with (ii), these paths are the shortest ones. Based on the above proofs, lemma 3.4 is established. Shortest Path Tree Problem in Directed Networks. The above algorithm can only compute the shortest path between two nodes at a time. Assume there are N nodes in the network, if we want to construct the shortest path tree, the algorithm must be run for N − 1 times. However, this will consume lots of time. In this section, after we modify the above model further, the shortest path tree can be constructed by running the algorithm one time. In what follows, the modified model used to find the shortest path tree is introduced. In the original amoeba model, there are only one starting node s and one ending node t in it. If there are one starting node s and all the other nodes are the ending nodes, the Kirchhoffs laws can be transformed as below: X  Dij Lij i Dji + Lji  (pi − pj ) =  +1 −1 N −1 f or j = s f or j 6= s (11) The general flow of the modified model used to construct SPTs rooted at node s are shown in Table 3. By this way, SPT can be constructed through running the program once. K  G    E  F      H    I       S    R E Q L F          H  I O N J      (a) An SPT Ts rooted at node s. In this figure, the vertex are represented by letters and the numbers along the arcs denote the path length. The arrow from the tail to the head means the direction of the edge.     M   V N J   O   G    P K   V P     S  M    R Q  L (b) The SPTs rooted at node s constructed by the adaptive amoeba algorithm for shortest path tree Figure 7. The amoeba algorithm for SPT Example 0.1. In order to illustrate the algorithm shown in Table 3, an example is shown in Fig. 7(a). There are 16 nodes in this network. In this example, the amoeba model is applied to construct SPT rooted at node s. According to Algorithm 2, first of all, initialize the parameters, such as the length matrix L, the initial conductivity matrix D, the initial pressure matrix Q etc. Then, according to Eq. (11), the pressure of each node can be obtained during the first iteration. In turn, the flux of each node can be computed according to Eq. (8). Next, the conductivity matrix during the following iteration can be constructed based on Eq. (7). This procedure will continue until the flux of each arc do not change any more. Fig. 8 shows the flux variation of each edge during different iterations in the graph shown in Fig. 7(a) using the adaptive amoeba model. As we can see, the flux of some edges converges to 0 during the iterations. Those edges whose flux are not equal to zero constitutes the following graph shown in Fig. 7(b). 1 0.9 0.8 0.7 Flux Edge(c,g) Edge(S,c) 0.6 Edge(S,b) 0.5 Edge(S,d) Edge(d,h) Edge(g,j) Edge(g,k) Edge(b,f) 0.4 0.3 0.2 0.1 0 0 10 20 30 40 50 60 Iteration Figure 8. Flux variation during different iterations in the graph shown in Fig. 7(a) using the adaptive amoeba model. Fig. 7(b) shows the SPTs rooted at vertex s. The trees represented by the edges in blue color are consistent with the result in.10 The edges with red color appear in the adaptive amoeba algorithm, but not in.10 The reason lies that there are more than one shortest paths between the rooted node s and nodes e, k. For example, the length of the path S → b → e is equal to that of the path S → b → f → e. Similarly, the length of path S → d → h → k is equal to that of S → c → g → k. This is the first advantage of our presented method. The edge weight change can be divided into three categories: increase only, decrease only, the mixture of them. In this section, the adaptive amoeba algorithm for SPTs in dynamic graphs will be analyzed from the three perspectives. Edge Weight Increase. As shown in Fig. 9(a), the weights of edges (c, g) and (g, j) are increased. For traditional approaches to SPT in dynamic graphs, such as DynDijkInc, MBallString 10 etc, firstly, these methods locates all locally affected vertices and reconstruct the shortest path between these affected nodes. In this example, the vertices g, k, o, p, i, n are affected, which are shown in blue circles in Fig. 9(a). For the above methods, when the scale of the network become very big, on the one hand, the process to locate the affected nodes become very complex. On the other hand, it costs much time. For the adaptive amoeba algorithm proposed in this paper, the following Fig. 10 displays the changing trend of the flux existing in each edge. P K  G   V     E F         H    I        R  E Q  F         H  I O N     J    L (a) An SPT rooted at node S. In this example, the length of edge (c, g) is increased by 2 and the length of edge (g, j) is increased by 3. The changed edges are denoted by red dotted arrows.   S  M   V N J  O   G   P K   S  M    R Q  L (b) The SPT after the increase of the edge weights. Figure 9. The SPT with edge weight increase As can be seen in Fig. 10, the red doted line divides the whole process into two parts. The first part is the changing trend of the flux associated with each edge before the edge weights change. The second part illustrates how the flux associated with every edge change after the increase of edge weights. During the iteration process, 1 0.9 0.8 0.7 Edge(S,c) Edge(S,b) Flux 0.6 Edge(d,h) Edge(c,g) Edge(g,k) Edge(g,j) 0.5 Edge(f,j) Edge(b,f) Edge(S,d) 0.4 0.3 0.2 0.1 0 0 50 100 150 Iteration Part 1 200 250 Part 2 Figure 10. The changing trend of the flux when the length of edge (c, g) is increased by 2 and the length of edge (g, j) is increased by 3 the flux of the edge (g, j) decreases to 0 while that of the edge (f, j) become one of the edges constructing SPT. This example shows the adaptivity of the presented algorithm. It can recognize the affected vertices and reconstruct them spontaneously after the increase of the edge weights. Fig. 9(b) displays the SPT after the increase of the edge weights and the result is consistent with that of.10 Edge Weight Decrease. Given a graph shown in Fig. 11(a), there are a source vertex S, an SPT rooted at node S. The weights of edge (c, g) and edge (g, j) are decreased by 3, 1 respectively. Different from the increase case, the locally affected nodes can be predicted. In the decrease case, the traditional algorithms such as DynDijkstra, MBallString recognize the all affected heads and then recompute the shortest path among the affected heads. When the network becomes very big, the traditional algorithms are faced with the same problems mentioned in the increase case. For the adaptive amoeba algorithm, the following Fig. 12 illustrates the changing trend of the flux of each edge when the edge weights decrease. P K  G   V    E  F           H  I        R  E Q    S  M   V N J  O   G   P K  F         H  I   L (a) An SPT rooted at node S. In this example, the length of edge (c, g) is decreased by 3 and the length of edge (g, j) is decreased by 1. The changed edges are denoted by red dotted arrows. N   O  J    S  M    R Q  L (b) The SPT after the decrease of the edge weights. Figure 11. The SPT with edge weight decrease As can be seen in Fig. 12, the whole process can be separated into two procedures by the red dotted line: the part before edge weight decrease, the part after edge weight decrease. It can be seen that the flux associated with every edge changes when the edge weights decrease. All the edges can be divided into 2 categories: the edges which is not influenced by the edge weights decrease, such as edges (k, p) and (b, e) shown in Fig. 12 belongs to the first category; the second category includes the edges that are influence by the edge weights decrease, such as edges (h, k), (S, d), (S, c) etc. From Fig. 12, it can be concluded that the adaptive amoeba algorithm have the 1 0.9 0.8 Edge(S,b) 0.7 Flux Edge(c,g) Edge(b,f) Edge(h,k) 0.6 Edge(S,c) Edge(g,k) Edge(k,p) Edge(b,e) Edge(d,h) Edge(g,j) 0.5 Edge(S,d) 0.4 0.3 0.2 0.1 0 0 20 40 60 80 Iteration Part 1 100 120 140 Part 2 Figure 12. The changing trend of the flux when the length of edge (c, g) is decreased by 3 and the length of edge (g, j) is decreased by 1 advantage of recognizing all the affected vertices spontaneously over traditional algorithms such as DynDijkstra, MBallString. Fig. 11(b) displays SPT after the edge weights decrease and the result is the same as that of.10 Mixed Edge Weight Changes. In Fig. 13(a), the weights of the following edges updates: edge (c, g) is decreased by 1, the weight of edge (g, j) is increased by 3, and the weight of edge (f, i) is decreased by 8. Based on this example, we will pay attention to the changing trend of the flux associated with each edge in the adaptive amoeba algorithm when both the decrease and increase of the edges appear in the graph. P K  G    V   E  F         H  I         R  E Q  L (a) An SPT rooted at node S. In this example, the weight of edge (c, g) is decreased by 1, the weight of edge (g, j) is increased by 3, and the weight of edge (f, i) is decreased by 8. The changed edges are denoted by red dotted arrows.   S  M   V N J   O   G    P K  F   N         H  I O  J     S  M    R Q   L (b) The SPT after the update of the edge weights. Figure 13. The SPT with mixed edge weight changes As can be seen in Fig. 14, the changing trend of the flux associated with every edge is shown. Several edges such as edge (h, k) disappear from the SPT while edges (f, i) and (i, n) become the elements constructing SPT after the update of edge weight. The other edges such as edges (k, p) and (b, e) are not affected by the update of the edge weight. Fig. 13(b) gives the final SPT after the update of the edge weights. From Fig. 13(b), it can be concluded that the amoeba algorithm can distinguish all the nodes adaptively. In summary, all the edge updates including the increase, decrease, mixed change of the edge weight can be handled efficiently by the adaptive amoeba algorithm. 1 0.9 0.8 0.7 Edge(S,b) Flux 0.6 0.5 Edge(S,c) Edge(g,j) Edge(b,f) Edge(k,p) Edge(g,k) Edge(d,h) Edge(h,k) Edge(c,g) Edge(S,d) Edge(j,n) Edge(b,e) Edge(i,n) 0.4 0.3 0.2 0.1 0 0 20 40 Part 1 60 80 100 120 Iteration 140 160 180 Part 2 Figure 14. The changing trend of the flux associated with each edge when the length of edge (c, g) is decreased by 1, the length of edge (g, j) is increased by 3, and the weight of edge (f, i) is decreased by 810 Acknowledgment All the authors of the cited papers for providing their network data. The work is partially supported by Chongqing Natural Science Foundation, Grant No. CSCT, 2010BA2003, National Natural Science Foundation of China, Grant No. 61174022, 61364030, National High Technology Research and Development Program of China (863 Program) (No.2013AA013801), the Fundamental Research Funds for the Central Universities, Grant No. XDJK2012D009. 1. Bauer, F., Varma, A. Distributed algorithms for multicast path setup in data networks. IEEE/ACM Trans. Networking 4, 181–191 (1996). 2. Rescigno, A. Optimally balanced spanning tree of the star network. IEEE Trans. Comput. 50, 88–91 (2001). 3. Zhao, M., Yang, Y. Bounded relay hop mobile data gathering in wireless sensor networks. IEEE Trans. Comput. 61, 265–277 (2012). 4. Wang, P., Hunter, T., Bayen A.M., Schechtner, K., González M.C. Understanding road usage patterns in urban areas. Sci. Rep. 2 (2012). 5. Barthelemy, M., Bordin, P., Berestycki, H., Gribaudi, M. Self-organization versus top-down planning in the evolution of a city. Sci. Rep. 3 (2013). 6. Perlman, R. A comparison between two routing protocols: OSPF and IS-IS. IEEE Network 5, 18–24 (1991). 7. Estrada, E., Vargas-Estrada, E. How peer pressure shapes consensus, leadership, and innovations in social groups. Sci. Rep. 3 (2013). 8. Wei, D.J. et al. Box-covering algorithm for fractal dimension of weighted networks. Sci. Rep. 3 (2013). 9. Szell, M., Sinatra, R., Petri, G., Thurner, S., Latora, V. Understanding mobility in a social petri dish. Sci. Rep. 2 (2012). 10. Chan, E., Yang, Y. Shortest path tree computation in dynamic graphs. IEEE Trans. Comput. 58, 541–557 (2009) 11. Chen, H., Tseng, P. A low complexity shortest path tree restoration scheme for IP networks. IEEE Commun. Lett. 14, 566–568 (2010). 12. Dijkstra, E. A note on two problems in connection with graphs. Numerische Mathematik 1, 269C271 (1959). 13. Frigioni, D., Marchetti-Spaccamela, A., Nanni, U. Incremental algorithms for the single-source shortest path problem. Foundation of Software Technology and Theoretical Computer Science 14, 113–124 (1994). 14. Narváez, P., Siu, K., Tzeng, H. New dynamic spt algorithm based on a ball-and-string model. IEEE/ACM Trans. Networking 9, 706–718 (2001). 15. Nguyen, S., Pallottino, S., Scutella, M.G. A new dual algorithm for shortest path reoptimization. Transportation and Network Analysis: Current Trends: Miscellanea in honor of Michael Florian 63, 221–221 (2002). 16. Tero, A., Kobayashi, R., Nakagaki, T. Physarum solver: A biologically inspired method of road-network navigation. Physica A 363, 115–119 (2006). 17. Baumgarten, W., Ueda, T., Hauser, M. Plasmodial vein networks of the slime mold physarum polycephalum form regular graphs. Phys. Rev. E 82, 046113 (2010). 18. Tero, A. et al. Rules for biologically inspired adaptive network design. Science Signalling 327, 439 (2010). 19. Watanabe, S., Tero, A., Takamatsu, A., Nakagaki, T. Traffic optimization in railroad networks using an algorithm mimicking an amoeba-like organism, physarum plasmodium. BioSystems 105, 225–232 (2011). 20. Nakagaki, T. et al. Minimum-risk path finding by an adaptive amoebal network. Phys. Rev. Lett. 99, 068104 (2007). 21. Adamatzky, A., Prokopenko, M. Slime mould evaluation of australian motorways. Int. J. Parallel Emergent Distrib. Syst. 27, 275–295 (2012). 22. Zhang, X. et al. Solving 0-1 knapsack problems based on amoeboid organism algorithm. Appl. Math. Comput. 219, 9959–9970 (2013) 23. Zhang, X., Zhang, Z., Zhang, Y., Wei, D., Deng, Y. Route selection for emergency logistics management: A bio-inspired algorithm. Saf. Sci. 54, 87–91. 24. Gunji, Y.P., Shirakawa, T., Niizato, T., Haruna, T. Minimal model of a cell connecting amoebic motion and adaptive transport networks. J. Theor. Biol. 253, 659–667 (2008). 25. Adamatzky, A., Martı́nez, G.J., Chapa-Vergara, S.V., Asomoza-Palacio, R., Stephens, C.R. Approximating mexican highways with slime mould. Natural Computing 10, 1195–1214 (2011). 26. Adamatzky, A., de Oliveira, P.P. Brazilian highways from slime molds point of view. Kybernetes 40, 1373–1394 (2011). 27. Adamatzky, A. The worlds colonization and trade routes formation as imitated by slime mould. Int. J. Bifurcation Chaos 22 (2012). 28. Adamatzky, A. Growing spanning trees in plasmodium machines. Kybernetes 37, 258–264 (2008). 29. Aono, M., Hara, M., Aihara, K., Munakata, T. Amoeba-based emergent computing: combinatorial optimization and autonomous meta-problem solving. International Journal of Unconventional Computing 6, 89–108 (2010). 30. Jones, J. Characteristics of pattern formation and evolution in approximations of physarum transport networks. Artificial Life 16, 127–153 (2010). 31. Aono, M., Zhu, L., Hara, M. Amoeba-based neurocomputing for 8-city traveling salesman problem. International Journal of Unconventional Computing 7, 463–480 (2011). 32. Shirakawa, T., Yokoyama, K., Yamachiyo, M., Gunji, Y.P., Miyake, Y. Multi-scaled adaptability in motility and pattern formation of the physarum plasmodium. International Journal of Bio-Inspired Computation 4, 131–138 (2012). 33. Tero, A., Kobayashi, R., Nakagaki, T. A mathematical model for adaptive transport network in path finding by true slime mold. J. Theor. Biol. 244, 553–564 (2007). 34. Meyer, U. Average-case complexity of single-source shortest-paths algorithms: lower and upper bounds. Journal of Algorithms 48, 91–134 (2003). 35. Nguyen, U.T., Xu, J. Multicast routing in wireless mesh networks: Minimum cost trees or shortest path trees? IEEE Commun. Mag. 45, 72–77 (2007). Table 1. The related parameters of the erdos.renyi.game function. In this function, the parameter p denotes the probability for drawing an edge between two arbitrary vertices. Dataset dataset dataset dataset dataset 1 2 3 4 Number of Nodes p Number of Edges 500 1000 1500 2000 0.0200 0.0100 0.0060 0.0050 5000 9921 13475 19903 Table 2. Adaptive Amoeba Algorithm(L, V, E) for Directed Networks // L is an N × N matrix, Lij denotes the length between node i and node j // V denote the set of nodes, E denotes the set of edges // s is the starting node, t is the ending node Dij ← (0, 1] (∀i, j = 1, 2, . . . , N ∧ Lij 6= 0) Qij ← 0 (∀i, j = 1, 2, . . . , N ) pi ← 0 (∀i = 1, 2, . . . , N ) count ← 1 repeat pt ← 0 // the pressure at the ending node t Calculate the pressure of every node using Eq. (8)    +1 f or j = s X  Dij Dji −1 f or j = t (pi − pj ) = +  Lij Lji i 0 otherwise Qij ← Dij × (pi − pj )/Lij // Using Eq. (8) if Qij < 0 then Qij = 0 end if Dij ← Qij + Dij // Using Eq. (7) count ← count + 1 until a termination criterion is met Author contributions X. Z., Q. L., Z. Z. designed and performed research. X. Z. wrote the paper. Y. H. performed the computation. S. M., F. T.S. C. and Y. D. analyzed the data. All authors discussed the results and commented on the manuscript. Additional information Competing financial interests: The authors declare no competing financial interests. Table 3. Adaptive Amoeba Algorithm(L, V, E) for Shortest Path Tree // L is an N × N matrix, Lij denotes the length between node i and node j // V denote the set of nodes, E denotes the set of edges // s is the root node Dij ← (0, 1] (∀i, j = 1, 2, . . . , N ∧ Lij 6= 0) Qij ← 0 (∀i, j = 1, 2, . . . , N ) pi ← 0 (∀i = 1, 2, . . . , N ) count ← 1 repeat Calculate the pressure of every node using Eq. (11)   X  Dij +1 f or j = s Dji (pi − pj ) = + −1 f or j 6= s Lij Lji N−1 i Qij ← Dij × (pi − pj )/Lij // Using Eq. (8) if Qij < 0 then Qij = 0 end if Dij ← Qij + Dij // Using Eq. (7) count ← count + 1 until a termination criterion is met
9cs.NE
arXiv:1602.01952v2 [math.GR] 26 Feb 2017 A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES DANIEL J. WOODHOUSE Abstract. We consider a finitely generated virtually abelian group G acting properly and without inversions on a CAT(0) cube complex X. We prove that G stabilizes a finite dimensional CAT(0) subcomplex Y ⊆ X that is isometrically embedded in the combinatorial metric. Moreover, we show that Y is a product of finitely many quasilines. The result represents a higher dimensional generalization of Haglund’s axis theorem. 1. Introduction A CAT(0) cube complex X is a cell complex that satisfies two properties: it is a geodesic metric space satisfying the CAT(0) comparison triangle condition, and each n-cell is isometric to [0, 1]n . We will call this metric the CAT(0) metric dX and refer to [2] for a comprehensive account. A hyperplane Λ ⊆ X is the subset of points equidistant between two adjacent vertices. Despite the brevity of this definition, hyperplanes are better understood via their combinatorial definition, and the reader is urged to consult the literature; see [10] [7] [12] for the required background. There also exists an alternative metric on the 0-cubes of X, that we will refer to as the combinatorial metric dcX , sometimes referred to as the ℓ1 -metric. The combinatorial distance between two 0-cubes is the length of the shortest combinatorial path in X joining the 0-cubes. Equivalently, the combinatorial distance between two 0-cubes is the number of hyperplanes in X separating them. We will always assume that a group G acting on a CAT(0) cube complex preserves its cell structure and maps cubes isometrically to cubes. A group G acts without inversions if the stabilizer of a hyperplane also stabilizes each complementary component. The requirement that the action be without inversions is not a serious restriction as G acts without inversions on the cubical subdivision. A connected CAT(0) cube complex X is a quasiline if it is quasiisometric to R. The rank of a virtually abelian group commensurable to Zn is n. The goal of this paper will be the following theorem: Theorem 4.3. Let G be virtually Zn . Suppose G acts properly and without inversions on a CAT(0) cube complex X. Then G stabilizes a finite dimensional subcomplex Y ⊆ X that is isometrically embedded in the combinatorial metric, and 1 A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 2 Qm Y ∼ = i=1 Ci , where each Ci is a cubical quasiline and m ≥ n. Moreover, StabG (Λ) is a codimension-1 subgroup for each hyperplane Λ in Y . Note that Y will not in general be a convex subcomplex. Corollary 1.1. Let A be a finitely generated virtually abelian group acting properly on a CAT(0) cube complex X. Then A acts metrically properly on X. Corollary 1.2. Let G be a finitely generated group acting properly on a CAT(0) cube complex X. Then virtually Zn subgroups are undistorted in G. Let g be an isometry of X, and let x ∈ X. The displacement of g at x, denoted τx (g), is the distance dX (x, gx). The translation length of g, denoted τ (g), is inf{τx (g) | x ∈ X}. Similarly, if x is a 0-cube of X, we can define the combinatorial displacement of g at x, denoted τxc (g), as dcX (x, gx) and the combinatorial translation length, denoted τ c (g), is inf{τxc (g) | x ∈ X}. Note that τ , and τ c are conjugacy invariant. An isometry g of a CAT(0) space is semisimple if τx (g) = τ (g) for some x ∈ X, and G acts semisimply on a CAT(0) space X if each g ∈ G is semisimple. If a virtually Zn group G acts metrically properly by semisimple isometries on a CAT(0) space X, then the Flat Torus Theorem [2] provides a G-invariant, convex, flat En ⊆ X. A group acting on a CAT(0) cube complex does not, in general, have to do so semisimply. See [1] for examples of non-semisimple isometries in Thompson’s group F acting on an infinite dimensional CAT(0) cube complex. Alternatively, in [6] a free-by-cyclic group G is shown not to permit a semisimple action on a CAT(0) space. Yet in [13] it is shown that G does act freely on a CAT(0) cube complex. Thus Theorem 4.3 can be applied to such actions, whereas the classical Flat Torus Theorem cannot. A virtually abelian subgroup is highest if it is not virtually contained in a higher rank abelian subgroup. If G is a highest virtually abelian subgroup of a group acting properly and cocompactly on a CAT(0) cube complex X, then G cocompactly stabilizes a convex subcomplex Y which is a product of quasilines, as above [14]. However, this theorem fails without the highest hypothesis. Moreover, most actions do not arise in the above fashion. Despite the fact that the Flat Torus Theorem will not hold under the hypotheses of Theorem 4.3, we can deduce the following: Corollary 4.4. Let G be virtually Zn . Suppose G acts properly and without inversions on a CAT(0) cube complex X. Then G cocompactly stabilizes a subspace F ⊆ X homeomorphic to Rn such that for each hyperplane Λ ⊆ X, the intersection Λ ∩ F is either empty or homeomorphic to Rn−1 . A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 3 The initial motivation for Theorem 4.3 and Corollary 4.4 was to resolve the following question posed by Wise. Although we have not found a combinatorial flat, Corollary 4.4 is perhaps better suited to applications (see [15]). Problem 1.3. Let Z2 act freely on a CAT(0) cube complex Y . Does there exists a Z2 -equivariant map F → Y where F is a square 2-complex homeomorphic to R2 , and such that no two hyperplanes of F map to the same hyperplane in Y ? A combinatorial geodesic axis for g is a g-invariant, isometrically embedded, subcomplex γ ⊆ X with γ ∼ = R. Note that γ realizes the minimal combinatorial translation length of g. Theorem 4.3 is a high dimensional generalization of Haglund’s combinatorial geodesic axis theorem. Haglund’s proof involved an argument by contradiction, exploiting the geometry of hyperplanes. We reprove the result in Section 5 by using the dual cube complex construction of Sageev. The results are further support for Haglund’s slogan “in CAT(0) cube complexes the combinatorial geometry is as nice as the CAT(0) geometry”. The following is an application of Theorem 4.3, and the argument is inspired by the solvable subgroup theorem [2]. Note that since we do not require that the action of G on a CAT(0) cube complex be semisimple the following is not covered by the solvable subgroup theorem. Corollary 1.4. Let H be virtually Zn , and let φ : H → H be an injection with φ 6= φi for all i > 1. Then G = hH, t | t−1 ht = φ(h) : h ∈ Hi cannot act properly on a CAT(0) cube complex. Proof. Suppose that G acts properly on a CAT(0) cube complex X. After subdividing X we can assume that G acts without inversions. As H is finitely generated, there exists an a in the finite generating set such that φi (a) 6= a for all i ∈ N, otherwise φi = φ for some i, contradicting our hypothesis. Thus, |{φi (a)}| = ∞. By Theorem 4.3 there is an H-equivariant isometrically embedded subcomplex Y ⊆ X Qm such that Y ∼ = i=1 Ci where each Ci is a cubical quasiline. As Y is isometrically embedded in X in the combinatorial metric, the combinatorial translation length τ c (φi (a)) is the same in Y as it is in X. The set {τ c (φi (a))}i∈N must be unbounded since the action of H on Y is proper and Y is locally finite. However, since τ c is conjugacy invariant in G, we conclude that τ c (φi (a)) = τ c (φj (a)) for all i, j ∈ N. Thus, we arrive at the contradiction that {τ c (φi (a))}i∈N is both bounded and unbounded.  However, we have the following example of a solvable group which does act freely on a CAT(0) cube complex. A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 4 Example 1.5. Let H = ha1 , a2 , . . . | [ai , aj ] : i 6= ji. Note that H is the fundamental group of the nonpositively curved cube complex Y obtained from a 0-cube v, and 1-cubes e1 , e2 , e3 . . . with n-cubes inserted for every cardinality n collection of 1cubes to create an n-torus. One should think of Y as an infinite cubical torus. The oriented loop ei represents the element ai . Let φ : H → H be the monomorphism such that φ(ai ) = ai+1 . Let G = H∗φ = ht, a1 , a2 , . . . | [ai , aj ] : i 6= j , t−1 ai t = ai+1 i be the associated ascending HNN extension. Note that G is generated by a1 and t. There is a graph of spaces X obtained by letting Y be the vertex space and Y × [0, 1] be the edge space and identifying (v, 1) and (v, 0) with v, and the 1-cube ei × {1} with ei and ei × {0} with ei+1 . Note that X is nonpositively curved, and therefore G = π1 X acts freely on e the universal cover of X. the CAT(0) cube complex X, Acknowledgements: I would like to thank Daniel T. Wise, Mark F Hagen, Jack Button, Piotr Przytycki, and Dan Guralnik. 2. Dual Cube Complexes ← − − → Let S be a set. A wall Λ = { Λ , Λ } in S is a partition of S into two disjoint, ← − − → nonempty subsets. The subsets Λ , Λ are the halfspaces of Λ. A wall Λ separates x, y ∈ S if they belong to distinct halfspaces of Λ. Let K ⊆ S. A wall Λ intersects ← − → − K if K nontrivially intersects both Λ and Λ . Let W be a set of walls in S, then (S, W) is a wallspace if for all x, y ∈ S, the number of walls separating x and y is finite. If Λ intersects K, then the restriction of Λ to K, is the wall in K determined ← − − → by Λ K = { Λ ∩ K, Λ ∩ K}. In this paper duplicate walls are not permitted in W. Let H be the set of halfspaces of corresponding to W. Example 2.1. Let X be a CAT(0) cube complex, and let Λ ⊆ X be a hyperplane in X. The complement X − Λ has two components, therefore defining a wall in X ← − → − such that Λ is an open halfspace not containing Λ, and Λ is a closed halfspace ← − − → containing Λ. Note that Λ ⊔ Λ = X. Let L(Λ) and R(Λ) denote the maximal ← − → − subcomplexes contained in Λ and Λ respectively. Note that L(Λ) and R(Λ) are convex subcomplexes. Let W be the set of walls determined by the hyperplanes in X. Then (X, W) is the wallspace associated to X. Note that we are using Λ to denote both the hyperplane and the wall corresponding to the hyperplane. ← − − → A function c : W → H is a 0-cube if c[Λ] ∈ { Λ , Λ } and the following two conditions are satisfied: (1) For all Λ1 , Λ2 ∈ W the intersection c[Λ1 ] ∩ c[Λ2 ] is nonempty. A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 5 (2) For all x ∈ S, the set {Λ ∈ W | x ∈ / c[Λ]} is finite. The dual cube complex C(S, W) is the connected CAT(0) cube complex obtained by letting the union of all 0-cubes be the 0-skeleton. Two 0-cubes c1 6= c2 are endpoints of a 1-cube if c1 [Λ] = c2 [Λ] for all but precisely one Λ ∈ W. An n-cube is then inserted wherever there is the 1-skeleton of an n-cube. The hyperplanes in C(S, W) are identified naturally with the walls in W. A proof of the fact that C(S, W) is in fact a CAT(0) cube complex can be found in [9]. A point x ∈ S determines a 0-cube cx defined such that x ∈ cx [Λ] for all Λ ∈ W. Condition (1) holds immediately since x ∈ cx [Λ] for all Λ ∈ W. Condition (2) holds for cx , since if y ∈ S a wall Λ does not separate x and y, we can deduce that y ∈ cx [Λ], hence all but finitely many Λ satisfy y ∈ cx [Λ]. Such 0-cubes are called the canonical 0-cubes. Lemma 2.2. Let X be a CAT(0) cube complex. Let W be a set of walls obtained from the hyperplanes in X. Let Z be a connected subcomplex of X, and let WZ ⊆ W be the subset of walls intersecting Z. Let V be walls in WZ restricted to Z. Then (Z, V) is a wallspace and C(Z, V) embeds in C(X, W) isometrically in the combinatorial metric. Proof. We first claim that the map WZ → V is an injection. Suppose that Λ1 , Λ2 ∈ WZ are distinct walls. As Λ1 , Λ2 intersects Z, and since Z is connected, there are 1-cubes e1 , e2 in Z that are dual to the hyperplanes corresponding to Λ1 , Λ2 . Therefore, both 0-cubes in e1 belong in a single halfspace of Λ2 Z , so Λ1 Z 6= Λ2 Z . We construct a map φ : C(Z, V) → C(X, W) on the 0-skeleton first. Let c be a 0-cube in C(Z, V). We let φ(c) ∈ C(X, W) be the uniquely defined 0-cube such that φ(c)[Λ] ⊇ c[Λ Z ] for Λ Z ∈ V, and φ(c)[Λ] ⊇ Z for Λ ∈ W − WZ . To verify that φ(c) is a 0-cube, first observe that φ(c)[Λ1 ]∩φ(c)[Λ2 ] is nonempty since Λ1 Z ∩Λ2 Z ⊆ X. Secondly, if x ∈ X we need to show that x ∈ φ(c)[Λ] for all but finitely many Λ ∈ W. Choose z ∈ Z, then z ∈ c[Λ Z ] for all Λ Z ∈ V − {Λ1 Z , . . . , Λk Z }, hence z ∈ φ(c)[Λ] for all Λ ∈ WZ − {Λ1 , . . . , Λk }. Let {Λk+1 , . . . , Λk+ℓ } be the set of walls in W separating x and z. Then x ∈ φ(c)[Λ] for all Λ ∈ W − {Λ1 , . . . Λk+ℓ }. The 0-cubes are embedded since if c1 6= c2 , there exists Λ Z ∈ V such that c1 [Λ Z ] 6= c2 [Λ Z ], hence φ(c1 )[Λ] 6= φ(c2 )[Λ]. If c1 , c2 are adjacent 0-cubes in C(Z, V), then c1 [Λ Z ] = c2 [Λ Z ] for all Λ Z ∈ V, with the exception of precisely one wall Λ̂ . Therefore, we can deduce that φ(c1 )[Λ] = φ(c2 )[Λ] for all walls in W, with Z the precise exception of Λ̂. Therefore, the 1-skeleton of C(Z, V) embeds in C(X, W), which is sufficient for φ to extend to an embedding of the entire cube complex. A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 6 Consider C(Z, V) as a subcomplex of C(X, W). The set of hyperplanes in C(Z, V) embeds into the set of hyperplanes in C(X, W). To see that C(Z, V) is an isometrically embedded subcomplex, let z1 , z2 be 0-cubes in Z and γ be a geodesic combinatorial path in C(Z, V) joining them. Each hyperplane dual to γ in C(Z, V) intersects γ precisely once, and since the hyperplanes in C(Z, V) inject to hyperplanes in C(X, W), it is geodesic there as well.  Given a wall Λ associated to a hyperplane in X we let N (Λ) denote the carrier of Λ, by which we mean the union of all cubes intersected by Λ. The following Lemma decribes what is called the restriction quotient in [3]. Lemma 2.3. Let S be a set and let W be a set of walls of S. Let G be a group acting on (S, W). Let V ⊆ W be a G-invariant subset. Then there is a G-equivariant function φ : C(S, W)0 → C(S, V)0 . Moreover, φ−1 (z) is nonempty for all 0-cubes z in C(S, V). Proof. Let c be a 0-cube in C(S, W). Let φ(c)[Λ] = c[Λ] for Λ ∈ V. It is immediate that φ is G-equivariant. To verify φ(c)[Λ] is a 0-cube in C(S, V) first note that φ(c1 )[Λ1 ] ∩ φ(c2 )[Λ2 ] 6= ∅ for all Λ1 , Λ2 ∈ V, since c1 [Λ1 ] ∩ c2 [Λ2 ] 6= ∅ for all Λ1 , Λ2 ∈ W. Secondly, for all x ∈ S observe that x ∈ φ(c)[Λ] for all but finitely many Λ ∈ V. Indeed, this is true for all but finitely many Λ ∈ W. To see that φ−1 (z) is non-empty for all 0-cubes z in C(S, V) we determine a 0cube x in C(S, W) such that φ(x) = z. Fix s ∈ S. Let x[Λ] = z[Λ] for Λ ∈ V. − → → − Suppose that Λ ∈ W − V. If Λ ⊇ z[Λ′ ] for some Λ′ ∈ V let x[Λ] = Λ . Similarly if ← − Λ ⊇ z[Λ′ ]. Otherwise, if Λ intersects z[Λ′ ] for all Λ′ ∈ V then let s ∈ x[Λ]. To verify that x is a 0-cube, consider the following cases to show x[Λ1 ] ∩ x[Λ2 ] 6= ∅ for Λ1 , Λ2 ∈ W. If Λ1 , Λ2 ∈ V then x[Λ1 ] ∩ x[Λ2 ] = z[Λ1 ] ∩ z[Λ2 ] 6= ∅. Suppose that Λ1 ∈ W − V and x[Λ1 ] ⊆ z[Λ′1 ] for some Λ′1 ∈ V. If Λ2 ∈ V, then x[Λ1 ] ∩ x[Λ2 ] ⊇ z[Λ′1 ] ∩ z[Λ2 ] 6= ∅. If Λ2 ∈ W − V and x[Λ2 ] ⊆ z[Λ′2 ] for some Λ′2 ∈ V then x[Λ1 ] ∩ x[Λ2 ] ⊆ z[Λ′1 ] ∩ z[Λ′2 ] 6= ∅. If Λ2 intersects z[Λ] for all Λ ∈ V, then x[Λ1 ] ∩ x[Λ2 ] ⊇ z[Λ′1 ] ∩ x[Λ2 ] 6= ∅. Finally if both s ∈ x[Λ1 ] and x[Λ2 ], then their intersection will contain at least s. Finally, we verify that for s′ ∈ S there are only finitely many Λ ∈ W such that s′ ∈ / x[Λ]. Suppose, by way of contradiction, that there is an infinite subset of walls {Λ1 , Λ2 , . . .} ⊆ W such that s′ ∈ / x[Λi ] for all i ∈ N. We can assume, by excluding at most finitely many walls, that each Λi ∈ W − V. Similarly, by excluding finitely many walls, we can assume that Λi does not separate s and s′ . Therefore, s ∈ / x[Λi ] ′ ′ for i ∈ N. Therefore, by construction of x, there exist Λi ∈ V such that z[Λi ] ⊆ x[Λi ], which implies that s′ ∈ / z[Λ′i ]. There are infinitely many distinct Λ′i , as otherwise A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 7 there is a Λ′ ∈ V such that z[Λ′ ] ⊆ x[Λi ] for infinitely many i, which would imply that infinitely many Λi separate s′ from an element in the complement of z[Λ′ ]. Therefore, infinitely many distinct walls Λ′i ∈ V have s′ ∈ / z[Λ′i ], contradicting that z is a 0-cube in C(S, V).  3. Minimal Zn -invariant convex subcomplexes The following is Theorem 2 from [5]. As this paper is written in Russian, we give a proof in Appendix A based on the work in [8] as well as stating the definition of codimension-1. Theorem 3.1 (Gerasimov [5]). Let G be a finitely generated group that acts on a CAT(0) cube complex X without a fixed point or inversions. Then there is a hyperplane in X that is stabilized by a codimension-1 subgroup of G. The goal of this section is to prove the following: Lemma 3.2. Let G be a finitely generated group acting without fixed point or inversions on a CAT(0) cube complex X. There exists a minimal, G-invariant, convex subcomplex Xo ⊆ X such that Xo contains only finitely many hyperplane orbits, and every Xo hyperplane stabilizer is a codimension-1 subgroup of G. Proof. Since G is finitely generated, by taking the convex hull of a G-orbit we obtain a G-invariant convex subcomplex Xo ⊆ X containing finitely many G-orbits of hyperplanes. Assume that Xo is a minimal such subcomplex in terms of the number of hyperplane orbits. Let (Xo , W) be the wallspace obtained from the hyperplanes in Xo . Suppose that StabG (Λ) is not a codimension-1 subgroup of G for some Λ ∈ W. Let GΛ ⊆ W be the G-orbit of Λ. By Lemma 2.3 there is an G-invariant map φ : Xo0 → C(Xo , GΛ)0 . Since StabG (Λ) is not commensurable to a codimension-1 subgroup, Theorem 3.1 implies that there is a fixed 0-cube x in C(Xo , GΛ). Lemma 2.3 then implies that T ← − φ−1 (x) is non-empty. Assuming that φ−1 (x) ⊆ Λ , then the intersection g∈G gL(Λ) contains a proper, convex, G-invariant subcomplex of Xo , with one less hyperplane orbit. This contradicts the minimality of Xo .  The following Corollary follows since all codimension-1 subgroups of a rank n virtually abelian group are of rank (n − 1). Corollary 3.3. Let G be a rank n, virtually abelian group acting without fixed point or inversions on a CAT(0) cube complex X. Then there exists a minimal, G-invariant, convex subcomplex Xo ⊆ X such that Xo contains only finitely many hyperplane orbits, and every hyperplane stabilizer is a rank (n − 1) subgroup of G. A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 8 4. Proof of Main Theorem Definition 4.1. Regard R as a CAT(0) cube complex whose 0-skeleton is Z. Let g be an isometry of X. A geodesic combinatorial axis for g is a g-invariant subcomplex homeomorphic to R that embeds isometrically in X. Definition 4.2. Let (M, d) be a metric space. The subspaces N1 , N2 ⊆ M are coarsely equivalent if each lies in an r-neighbourhood of the other for some r > 0. Theorem 4.3. Let G be virtually Zn . Suppose G acts properly and without inversions on a CAT(0) cube complex X. Then G stabilizes a finite dimensional subcomplex Y ⊆ X that is isometrically embedded in the combinatorial metric, and Qm Y ∼ = i=1 Ci , where each Ci is a cubical quasiline and m ≥ n. Moreover, StabG (Λ) is a codimension-1 subgroup for each hyperplane Λ in Y . Proof. By Corollary 3.3 there is a minimal, non-empty, convex subcomplex Xo ⊆ X stabilized by G, containing finitely many hyperplane orbits, and StabilizerG (Λ) is a rank (n − 1) subgroup of G, for each hyperplane Λ ⊆ Xo . Let S = {g1 , . . . , gr } be a generating set for G. Let x ∈ Xo be a 0-cube. Let Υ be the Cayley graph of G with respect to S. Let φ : Υ → Xo be a G-equivariant map that sends vertices to vertices, and edges to combinatorial paths or vertices in Xo . Let Q = φ(Υ). As G acts properly on X, and cocompactly on Υ, the graph Q is quasiisometric to G. Let WQ be the set of hyperplanes intersecting Q, and let (Q, WQ ) be the associated wallspace. By Lemma 2.2 we know that C(Q, WQ ) is an isometrically embedded subcomplex of Xo . Fix a proper action of G on Rn , and let q : Q → Rn be a G-equivariant quasiisometry. Note that StabilizerG (Λ) is a quasiisometrically embedded subgroup of G, for all Λ ∈ WQ . Thus q(Λ ∩ Q) is ← − coarsely equivalent to a codimension-1 affine subspace H ⊆ Rn . Moreover, q( Λ ∩ Q) → − and q( Λ ∩ Q) are coarsely equivalent to the halfspaces of H. Let n > 0. Since there are finitely many orbits of hyperplanes in Xo , there are only finitely many commensurability classes of stabilizers. Therefore, we may F partition WQ as the disjoint union m i=1 Wi where each Wi contains all walls with commensurable stabilizers. For each Λi ∈ Wi let q(Λi ∩ Q) be coarsely equivalent to a codimension-1 affine subspace Hi ⊆ Rn , stabilized by StabilizerG (Λi ). If i 6= j then Hi and Hj are nonparallel affine subspaces, and therefore Λi and Λj will intersect in Q. Therefore, every wall in Wi intersects every wall in Wj if i 6= j, and thus Qm C(Q, WQ ) ∼ = i=1 C(Q, Wi ). Finally, we show that C(Q, Wi ) is a quasiline for each 1 ≤ i ≤ m. As G permutes Q ′ the factors in m i=1 C(Q, Wi ), there is a finite index subgroup G 6 G that preserves each factor. For each i, the stabilizers StabG (Λ) are commensurable for all Λ ∈ A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 9 Wi . Therefore, there is a cyclic subgroup Zi that is not virtually contained in any StabG (Λ) and thus acts freely on C(Q, Wi ). As the stabilizers of Λ ∈ Wi are commensurable, all q(Λ ∩ Q) will be quasi-equivalent to parallel codimension-1 affine subspaces of Rn , which implies that only finitely many Zi -translates of Λ can pairwise intersect. As there are finitely many Zi -orbits of Λ in Wi , there is an upper bound on the number of pairwise intersecting hyperplanes in Wi . Thus, there are finitely many Zi -orbits of maximal cubes in C(Q, Wi ), which implies that C(Q, Wi ) is CAT(0) cube complex quasiisometric to R.  We can now prove Corollary 4.4. Corollary 4.4. Let G be virtually Zn . Suppose G acts properly and without inversions on a CAT(0) cube complex X. Then G cocompactly stabilizes a subspace F ⊆ X homeomorphic to Rn such that for each hyperplane Λ ⊆ X, the intersection Λ ∩ F is either empty or homeomorphic to Rn−1 . Proof. By Theorem 4.3 there is a G-equivariant, isometrically embedded, subcomQ plex Y ⊆ X, such that Y = m i=1 Ci , where each Ci is a quasiline, and StabG (Λ) is a codimension-1 subgroup. Considering Y with the CAT(0) metric, note that Y is a complete CAT(0) metric space in its own right, and G acts semisimply on Y . By the Flat Torus Theorem [2] there is an isometrically embedded flat F ⊆ Y . Note that F ⊆ X is not isometrically embedded. As StabG (Λ) is a codimension-1 subgroup of G for each hyperplane Λ in X, the intersection Λ ∩ F = (Λ ∩ Y ) ∩ F is either empty or, as F ⊆ Y is isometrically embedded, the hyperplane intersection is an isometrically embedded copy of Rn−1 .  5. Haglund’s Axis The goal of this section is to reprove the following result of Haglund as a consequence of Corollary 4.4. Theorem 5.1 (Haglund [7]). Let G be a group acting on a CAT(0) cube complex without inversions. Every element g ∈ G either fixes a 0-cube of G, or stabilizes a combinatorial geodesic axis. Proof. As finite groups don’t contain codimension-1 subgroups, Theorem 3.1 implies that if g is finite order then it fixes a 0-cube. Suppose that G does not fix a 0-cube, then hgi must act properly on X. By Corollary 4.4, there is a line L ⊂ X stabilized by G, that intersects each hyperplane at most once at a single point in L. Let WL be the set of hyperplanes intersecting L. Note that the intersection points of the walls in WL with L is locally finite subset. A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 10 Fix a basepoint p ∈ L that doesn’t belong to a hyperplane intersecting L, and let x be the canonical 0-cube corresponding to p. Let Λ1 , . . . , Λk be the set of hyperplanes ← − separating p and gp, and assume that p ∈ Λ i . Reindex the hyperplanes such that ← − ← − ← − Λ 1 ∩ L ⊆ Λ 2 ∩ L ⊆ · · · ⊆ Λ k ∩ L. The ordering of the hyperplanes separating p and gp determines a combinatorial geodesic joining x and gx of length k, where the i-th edge is a 1-cube dual to Λi . This can be extended hgi-equivariantly, to obtain a combinatorial geodesic axis Lc , since each hyperplanes intersects Lc at most once.  Appendix A. Codimension-1 Subgroups Definition A.1. Let G be a finitely generated group. Let Υ denote the Cayley graph of G with respect to some finite generating set. A subgroup H 6 G is codimension-1 if K/Υ has more than one end. Let ⊕ denote the operation of symmetric difference. A subset A ⊆ G is H-finite if A ⊆ HF where F is some finite subset of G. We will use the following equivalent formulation (see [11]) of codimension-1: A subgroup H ≤ G is a codimension-1 subgroup if there exists some A ⊆ G such that (1) A = HA, (2) A is H-almost invariant, that is to say that A⊕ Ag is H-finite for any g ∈ G. (3) A is H-proper, that is to say that neither A nor G − A is H-finite. We will reprove the following theorem from [5] using techniques from [8]. Theorem A.2. Let G be a finitely generated group acting on a CAT(0) cube complex X without edge inversions or fixing a 0-cube. Then the stabilizer of some hyperplane in X is a codimension-1 subgroup of G. Proof. Suppose that no hyperplane stabilizer is a codimension-1 subgroup of G. We will find a 0-cube fixed by G. Let H denote the set of hyperplanes in X. We can assume that X has finitely many G-orbits of hyperplanes after possibly passing to the convex hull of a single 0-cube orbit in X. If x, y are 0-cubes in X, then let ∆(x, y) ⊆ H denote the hyperplanes separating x and y. Note that dcX (x, y) = |∆(x, y)|. Let Λ1 , . . . , Λn be a minimal set of representatives of those orbits. Let ← − Hi = StabG (Λi ) and Ai = {g ∈ G | gx0 ∈ Λ i }. We can verify that Ai satisfies the first two criteria in Definition A.1. (1): It is immediate that Ai = Hi Ai , as G doesn’t invert the hyperplanes in X. A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 11 (2): Let xor denote the exclusive or. For f ∈ G we can deduce that Ai ⊕ Ai f is Hi -finite: ← − ← − g ∈ Ai ⊕ Ai f ⇐⇒ gx0 ∈ Λ i xor gf −1 x0 ∈ Λ i ← − ← − ⇐⇒ x0 ∈ g−1 Λ i xor f −1 x0 ∈ g −1 Λ i ⇐⇒ g ∈ G such that g −1 Λi separates x0 and f −1 x0 . As (X, H) is a wallspace, there are only finitely many g ∈ G such that g−1 Λi separates x0 and f −1 x0 . If g1 Λi , . . . , gk Λi are the translates then Ai + Ai f = {g1 , . . . , gk }Hi which implies almost Hi -invariant. Therefore, Ai cannot be Hi -proper, for any i, as we have assumed that none of the Hi are codimension-1. This means that Ai is Hi -finite so Ai ⊆ Hi Fi where Fi ⊆ G is finite. Claim. dX (x0 , f x0 ) < 2 maxi (|Fi |) for all f ∈ G. Proof. gΛi ∈ ∆(x0 , f x0 ) ⇐⇒ x0 [gΛi ] 6= f x0 [gΛi ] ← − ← − ⇐⇒ x0 ∈ g Λ i xor f x0 ∈ g Λ i ← − ← − ⇐⇒ g −1 x0 ∈ g Λ i xor g −1 f x0 ∈ g Λ i ⇐⇒ g −1 ∈ Ai xor g−1 ∈ Af −1 ⇐⇒ g −1 ∈ Ai + Ai f −1 As the final set is covered by 2|Fi | translates of Hi , we can deduce that there are at most 2|Fi | hyperplanes in ∆(x0 , f x0 ).  Thus, we can conclude that the G-orbit of x0 is a bounded set. If G has a finite orbit in X, then the convex hull of the orbit is a compact, finite dimensional, complete CAT(0) cube complex, and we can apply Corollary II.2.8 (1) from [2] to find a fixed point p. As p is in the interior of some n-cube that is fixed by G, and since G doesn’t invert hyperplanes we can deduce that G fixes a 0-cube in that cube. If the G-orbits in X are infinite, then their convex hull may not be complete, so the above argument will not hold. Let C(H) denote the connected cube, a graph with vertices given by functions c : H → {0, 1} with finite support, and edges that join a pair of distinct vertices if and only if they differ on precisely one hyperplane. A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 12 Fix a 0-cube x0 . Then there is an embedding φ : X 1 ֒→ C(H) that maps the 0-cube x to cx where  1 if x[Λ] 6= x [Λ] 0 cx (Λ) = 0 if x[Λ] = x0 [Λ] A hyperplan Λ ∈ H separates two vertices c1 , c2 in C(H) if c1 (Λ) 6= c2 (Λ). Note that Λ separates 0-cubes x, y in X if and only if it separates φ(x) and φ(y). Therefore, we can define ∆(c1 , c2 ) for vertices in C(H) and conclude that if x, y are 0-cubes in X then ∆(x, y) = ∆(φ(x), φ(y)). This implies that φ is an isometric embedding in the combinatorial metric. We will show that a bounded orbit in X implies there is a fixed 0-cube in C(H) and then argue that we can go one step further and find a fixed 0-cube in X. Let ℓ2 (H) be the Hilbert Space of square summable functions s : H → R. There is an embedding ρ : C(H) → ℓ2 (H) given by ρ(c)(Λ) = c[Λ] It is straight forward to verify that kρ(c1 ) − ρ(c2 )k2 = dC(H) (c1 , c2 ). There is a G-action on ℓ2 (H) such that if s ∈ ℓ2 (H), Λ ∈ H, g ∈ G then  s(g−1 Λ) if cx0 (g−1 Λ) = cx0 (Λ) gs(Λ) = 1 − s(g−1 Λ) if cx (g−1 Λ) 6= cx (Λ) 0 0 It is again straight forward to verify that this action is by isometries, and that ρ is G-equivariant. As Gx0 is bounded, so is G(ρ ◦ φ(x0 )). It then follows that G has a fixed point in 2 ℓ (H) ([8] gives a proof and also cites Lemma 3.8 in [4]). Let s : H → R be the fixed point. For all g ∈ G we can deduce that s(gΛ) is either s(Λ) or 1 − s(Λ). Therefore s can only take two values on the hyperplanes in a single G-orbit. As s has to be square summable the two values have to be 0 and 1, and s can only take the value 1 on finitely many hyperplanes. Thus, s is the image of a point c in C(S). Let c ∈ C(S) be a G-invariant vetex which minimizes the distance to the image of 1 X in C(S). Let Z be a G-orbit of 0-cubes in X such that φ(Z) realize the minimal distance from c. Let V be the set of hyperplanes that intersect {c} ∪ V. Every hyperplane in V must intersect Z otherwise if F ⊆ V is the finite, G-invariant subset of hyperplanes A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 13 separating c from Z we can define a 0-cube c′ such that  c(Λ) if Λ ∈ /F c′ (Λ) = 1 − c(Λ′ ) if Λ ∈ F and deduce that c′ is G-invariant and is |F| closer to Z than c. Let z0 , z1 , z2 , . . . an enumeration of 0-cubes in Z. Each hyperplane separating z0 and z1 must lie in either ∆(z0 , c) or ∆(z1 , c). As z0 is minimal distance in X from c, the edges in X incident to z0 must be dual to hyperplanes not in ∆(z0 , c), and instead belongs to ∆(z1 , c). Therefore, the hyperplane Λ0 ∈ V dual to the first edge in a combinatorial geodesic joining z0 to z1 must lie in ∆(z1 , c). Similarly, there exists a hyperplane Λ1 dual to the first edge of the combinatorial geodesic in X joining z1 to z2 that belongs to ∆(z2 , c) but not ∆(z1 , c). Note that Λ1 cannot intersect Λ0 in X, otherwise Λ0 would be dual to an edge incident to z1 , which would imply that there exists a 0-cube in X adjacent to z1 that is closer to c. Therefore Λ0 , Λ1 separates z0 from z2 in X. Iterating this argument produces a sequence of disjoint hyperplanes Λ0 , Λ2 , Λ3 , . . . such that Λ0 , . . . , Λk separates z0 from zk+1 in X. This contradicts the hypothesis that Z is a bounded set in X.  References [1] Yael Algom-Kfir, Bronislaw Wajnryb, and Pawel Witowicz. A parabolic action on a proper, CAT(0) cube complex. J. Group Theory, 16(6):965–984, 2013. [2] Martin R. Bridson and André Haefliger. Metric spaces of non-positive curvature. SpringerVerlag, Berlin, 1999. [3] Pierre-Emmanuel Caprace and Michah Sageev. Rank rigidity for cat(0) cube complexes. Geometric And Functional Analysis, 21:851–891, 2011. 10.1007/s00039-011-0126-7. [4] Pierre de la Harpe and Alain Valette. La propriété (T ) de Kazhdan pour les groupes localement compacts. Number 175 in Astérisque. 1989. With an appendix by M. Burger. [5] V. N. Gerasimov. Semi-splittings of groups and actions on cubings. In Algebra, geometry, analysis and mathematical physics (Russian) (Novosibirsk, 1996), pages 91–109, 190. Izdat. Ross. Akad. Nauk Sib. Otd. Inst. Mat., Novosibirsk, 1997. [6] S. M. Gersten. The automorphism group of a free group is not a CAT(0) group. Proc. Amer. Math. Soc., 121(4):999–1002, 1994. [7] Frédéric Haglund. Isometries of CAT(0) cube complexes are semi-simple. pages 1–17, 2007. [8] Graham A. Niblo and Martin A. Roller. Groups acting on cubes and Kazhdan’s property (T). Proc. Amer. Math. Soc., 126(3):693–699, 1998. [9] Michah Sageev. Ends of group pairs and non-positively curved cube complexes. Proc. London Math. Soc. (3), 71(3):585–617, 1995. [10] Michah Sageev. Codimension-1 subgroups and splittings of groups. J. Algebra, 189(2):377–389, 1997. [11] Peter Scott. Ends of pairs of groups. J. Pure Appl. Algebra, 11(1-3):179–198, 1977/78. A GENERALIZED AXIS THEOREM FOR CUBE COMPLEXES 14 [12] Daniel T. Wise. From riches to raags: 3-manifolds, right-angled Artin groups, and cubical geometry, volume 117 of CBMS Regional Conference Series in Mathematics. Published for the Conference Board of the Mathematical Sciences, Washington, DC, 2012. [13] Daniel T. Wise. Cubular tubular groups. Trans. Amer. Math. Soc., 366(10):5503–5521, 2014. [14] Daniel T. Wise and Daniel J. Woodhouse. A cubical flat torus theorem and the bounded packing property. Isreal J. Math., pages 1–12. Accepted. [15] Daniel J. Woodhouse. Classifying virtually special tubular groups. 2015. In Preparation. E-mail address: [email protected]
4math.GR
arXiv:1712.01815v1 [cs.AI] 5 Dec 2017 Mastering Chess and Shogi by Self-Play with a General Reinforcement Learning Algorithm David Silver,1∗ Thomas Hubert,1∗ Julian Schrittwieser,1∗ Ioannis Antonoglou,1 Matthew Lai,1 Arthur Guez,1 Marc Lanctot,1 Laurent Sifre,1 Dharshan Kumaran,1 Thore Graepel,1 Timothy Lillicrap,1 Karen Simonyan,1 Demis Hassabis1 1 DeepMind, 6 Pancras Square, London N1C 4AG. ∗ These authors contributed equally to this work. Abstract The game of chess is the most widely-studied domain in the history of artificial intelligence. The strongest programs are based on a combination of sophisticated search techniques, domain-specific adaptations, and handcrafted evaluation functions that have been refined by human experts over several decades. In contrast, the AlphaGo Zero program recently achieved superhuman performance in the game of Go, by tabula rasa reinforcement learning from games of self-play. In this paper, we generalise this approach into a single AlphaZero algorithm that can achieve, tabula rasa, superhuman performance in many challenging domains. Starting from random play, and given no domain knowledge except the game rules, AlphaZero achieved within 24 hours a superhuman level of play in the games of chess and shogi (Japanese chess) as well as Go, and convincingly defeated a world-champion program in each case. The study of computer chess is as old as computer science itself. Babbage, Turing, Shannon, and von Neumann devised hardware, algorithms and theory to analyse and play the game of chess. Chess subsequently became the grand challenge task for a generation of artificial intelligence researchers, culminating in high-performance computer chess programs that perform at superhuman level (9, 13). However, these systems are highly tuned to their domain, and cannot be generalised to other problems without significant human effort. A long-standing ambition of artificial intelligence has been to create programs that can instead learn for themselves from first principles (26). Recently, the AlphaGo Zero algorithm achieved superhuman performance in the game of Go, by representing Go knowledge using deep convolutional neural networks (22, 28), trained solely by reinforcement learning from games of self-play (29). In this paper, we apply a similar but fully generic algorithm, which we 1 call AlphaZero, to the games of chess and shogi as well as Go, without any additional domain knowledge except the rules of the game, demonstrating that a general-purpose reinforcement learning algorithm can achieve, tabula rasa, superhuman performance across many challenging domains. A landmark for artificial intelligence was achieved in 1997 when Deep Blue defeated the human world champion (9). Computer chess programs continued to progress steadily beyond human level in the following two decades. These programs evaluate positions using features handcrafted by human grandmasters and carefully tuned weights, combined with a high-performance alpha-beta search that expands a vast search tree using a large number of clever heuristics and domain-specific adaptations. In the Methods we describe these augmentations, focusing on the 2016 Top Chess Engine Championship (TCEC) world-champion Stockfish (25); other strong chess programs, including Deep Blue, use very similar architectures (9, 21). Shogi is a significantly harder game, in terms of computational complexity, than chess (2, 14): it is played on a larger board, and any captured opponent piece changes sides and may subsequently be dropped anywhere on the board. The strongest shogi programs, such as Computer Shogi Association (CSA) world-champion Elmo, have only recently defeated human champions (5). These programs use a similar algorithm to computer chess programs, again based on a highly optimised alpha-beta search engine with many domain-specific adaptations. Go is well suited to the neural network architecture used in AlphaGo because the rules of the game are translationally invariant (matching the weight sharing structure of convolutional networks), are defined in terms of liberties corresponding to the adjacencies between points on the board (matching the local structure of convolutional networks), and are rotationally and reflectionally symmetric (allowing for data augmentation and ensembling). Furthermore, the action space is simple (a stone may be placed at each possible location), and the game outcomes are restricted to binary wins or losses, both of which may help neural network training. Chess and shogi are, arguably, less innately suited to AlphaGo’s neural network architectures. The rules are position-dependent (e.g. pawns may move two steps forward from the second rank and promote on the eighth rank) and asymmetric (e.g. pawns only move forward, and castling is different on kingside and queenside). The rules include long-range interactions (e.g. the queen may traverse the board in one move, or checkmate the king from the far side of the board). The action space for chess includes all legal destinations for all of the players’ pieces on the board; shogi also allows captured pieces to be placed back on the board. Both chess and shogi may result in draws in addition to wins and losses; indeed it is believed that the optimal solution to chess is a draw (17, 20, 30). The AlphaZero algorithm is a more generic version of the AlphaGo Zero algorithm that was first introduced in the context of Go (29). It replaces the handcrafted knowledge and domainspecific augmentations used in traditional game-playing programs with deep neural networks and a tabula rasa reinforcement learning algorithm. Instead of a handcrafted evaluation function and move ordering heuristics, AlphaZero utilises a deep neural network (p, v) = fθ (s) with parameters θ. This neural network takes the board position s as an input and outputs a vector of move probabilities p with components pa = P r(a|s) 2 for each action a, and a scalar value v estimating the expected outcome z from position s, v ≈ E[z|s]. AlphaZero learns these move probabilities and value estimates entirely from selfplay; these are then used to guide its search. Instead of an alpha-beta search with domain-specific enhancements, AlphaZero uses a generalpurpose Monte-Carlo tree search (MCTS) algorithm. Each search consists of a series of simulated games of self-play that traverse a tree from root sroot to leaf. Each simulation proceeds by selecting in each state s a move a with low visit count, high move probability and high value (averaged over the leaf states of simulations that selected a from s) according to the current neural network fθ . The search returns a vector π representing a probability distribution over moves, either proportionally or greedily with respect to the visit counts at the root state. The parameters θ of the deep neural network in AlphaZero are trained by self-play reinforcement learning, starting from randomly initialised parameters θ. Games are played by selecting moves for both players by MCTS, at ∼ π t . At the end of the game, the terminal position sT is scored according to the rules of the game to compute the game outcome z: −1 for a loss, 0 for a draw, and +1 for a win. The neural network parameters θ are updated so as to minimise the error between the predicted outcome vt and the game outcome z, and to maximise the similarity of the policy vector pt to the search probabilities π t . Specifically, the parameters θ are adjusted by gradient descent on a loss function l that sums over mean-squared error and cross-entropy losses respectively, (p, v) = fθ (s), l = (z − v)2 − π > log p + c||θ||2 (1) where c is a parameter controlling the level of L2 weight regularisation. The updated parameters are used in subsequent games of self-play. The AlphaZero algorithm described in this paper differs from the original AlphaGo Zero algorithm in several respects. AlphaGo Zero estimates and optimises the probability of winning, assuming binary win/loss outcomes. AlphaZero instead estimates and optimises the expected outcome, taking account of draws or potentially other outcomes. The rules of Go are invariant to rotation and reflection. This fact was exploited in AlphaGo and AlphaGo Zero in two ways. First, training data was augmented by generating 8 symmetries for each position. Second, during MCTS, board positions were transformed using a randomly selected rotation or reflection before being evaluated by the neural network, so that the MonteCarlo evaluation is averaged over different biases. The rules of chess and shogi are asymmetric, and in general symmetries cannot be assumed. AlphaZero does not augment the training data and does not transform the board position during MCTS. In AlphaGo Zero, self-play games were generated by the best player from all previous iterations. After each iteration of training, the performance of the new player was measured against the best player; if it won by a margin of 55% then it replaced the best player and self-play games were subsequently generated by this new player. In contrast, AlphaZero simply maintains a single neural network that is updated continually, rather than waiting for an iteration to complete. 3 Figure 1: Training AlphaZero for 700,000 steps. Elo ratings were computed from evaluation games between different players when given one second per move. a Performance of AlphaZero in chess, compared to 2016 TCEC world-champion program Stockfish. b Performance of AlphaZero in shogi, compared to 2017 CSA world-champion program Elmo. c Performance of AlphaZero in Go, compared to AlphaGo Lee and AlphaGo Zero (20 block / 3 day) (29). Self-play games are generated by using the latest parameters for this neural network, omitting the evaluation step and the selection of best player. AlphaGo Zero tuned the hyper-parameter of its search by Bayesian optimisation. In AlphaZero we reuse the same hyper-parameters for all games without game-specific tuning. The sole exception is the noise that is added to the prior policy to ensure exploration (29); this is scaled in proportion to the typical number of legal moves for that game type. Like AlphaGo Zero, the board state is encoded by spatial planes based only on the basic rules for each game. The actions are encoded by either spatial planes or a flat vector, again based only on the basic rules for each game (see Methods). We applied the AlphaZero algorithm to chess, shogi, and also Go. Unless otherwise specified, the same algorithm settings, network architecture, and hyper-parameters were used for all three games. We trained a separate instance of AlphaZero for each game. Training proceeded for 700,000 steps (mini-batches of size 4,096) starting from randomly initialised parameters, using 5,000 first-generation TPUs (15) to generate self-play games and 64 second-generation TPUs to train the neural networks.1 Further details of the training procedure are provided in the Methods. Figure 1 shows the performance of AlphaZero during self-play reinforcement learning, as a function of training steps, on an Elo scale (10). In chess, AlphaZero outperformed Stockfish after just 4 hours (300k steps); in shogi, AlphaZero outperformed Elmo after less than 2 hours (110k steps); and in Go, AlphaZero outperformed AlphaGo Lee (29) after 8 hours (165k steps).2 We evaluated the fully trained instances of AlphaZero against Stockfish, Elmo and the previous version of AlphaGo Zero (trained for 3 days) in chess, shogi and Go respectively, playing 100 game matches at tournament time controls of one minute per move. AlphaZero and the previous AlphaGo Zero used a single machine with 4 TPUs. Stockfish and Elmo played at their 1 The original AlphaGo Zero paper used GPUs to train the neural networks. AlphaGo Master and AlphaGo Zero were ultimately trained for 100 times this length of time; we do not reproduce that effort here. 2 4 Game White Black Win Draw Loss Chess AlphaZero Stockfish Stockfish AlphaZero 25 3 25 47 0 0 Shogi AlphaZero Elmo Elmo AlphaZero 43 47 2 0 5 3 Go AlphaZero AG0 3-day AG0 3-day AlphaZero 31 29 – – 19 21 Table 1: Tournament evaluation of AlphaZero in chess, shogi, and Go, as games won, drawn or lost from AlphaZero’s perspective, in 100 game matches against Stockfish, Elmo, and the previously published AlphaGo Zero after 3 days of training. Each program was given 1 minute of thinking time per move. strongest skill level using 64 threads and a hash size of 1GB. AlphaZero convincingly defeated all opponents, losing zero games to Stockfish and eight games to Elmo (see Supplementary Material for several example games), as well as defeating the previous version of AlphaGo Zero (see Table 1). We also analysed the relative performance of AlphaZero’s MCTS search compared to the state-of-the-art alpha-beta search engines used by Stockfish and Elmo. AlphaZero searches just 80 thousand positions per second in chess and 40 thousand in shogi, compared to 70 million for Stockfish and 35 million for Elmo. AlphaZero compensates for the lower number of evaluations by using its deep neural network to focus much more selectively on the most promising variations – arguably a more “human-like” approach to search, as originally proposed by Shannon (27). Figure 2 shows the scalability of each player with respect to thinking time, measured on an Elo scale, relative to Stockfish or Elmo with 40ms thinking time. AlphaZero’s MCTS scaled more effectively with thinking time than either Stockfish or Elmo, calling into question the widely held belief (4, 11) that alpha-beta search is inherently superior in these domains.3 Finally, we analysed the chess knowledge discovered by AlphaZero. Table 2 analyses the most common human openings (those played more than 100,000 times in an online database of human chess games (1)). Each of these openings is independently discovered and played frequently by AlphaZero during self-play training. When starting from each human opening, AlphaZero convincingly defeated Stockfish, suggesting that it has indeed mastered a wide spectrum of chess play. The game of chess represented the pinnacle of AI research over several decades. State-ofthe-art programs are based on powerful engines that search many millions of positions, leveraging handcrafted domain expertise and sophisticated domain adaptations. AlphaZero is a generic reinforcement learning algorithm – originally devised for the game of Go – that achieved superior results within a few hours, searching a thousand times fewer positions, given no domain 3 The prevalence of draws in high-level chess tends to compress the Elo scale, compared to shogi or Go. 5 A10: English Opening D06: Queens Gambit rmblkans 7 opopopop 6 0Z0Z0Z0Z 5 Z0Z0Z0Z0 4 0ZPZ0Z0Z 3 Z0Z0Z0Z0 2 PO0OPOPO 1 SNAQJBMR rmblkans 7 opo0opop 6 0Z0Z0Z0Z 5 Z0ZpZ0Z0 4 0ZPO0Z0Z 3 Z0Z0Z0Z0 2 PO0ZPOPO 1 SNAQJBMR 8 a b c d e f g 8 h w 20/30/0, b 8/40/2 a 1...e5 g3 d5 cxd5 Nf6 Bg2 Nxd5 Nf3 b c d e f g h w 16/34/0, b 1/47/2 A46: Queens Pawn Game rmblka0s opopopop 6 0Z0Z0m0Z 5 Z0Z0Z0Z0 4 0Z0O0Z0Z 3 Z0Z0ZNZ0 2 POPZPOPO 1 SNAQJBZR rmblka0s opopZpop 0Z0Zpm0Z 5 Z0Z0Z0Z0 4 0ZPO0Z0Z 3 Z0Z0Z0Z0 2 PO0ZPOPO 1 SNAQJBMR 8 8 7 7 a b c d e f g 6 h w 24/26/0, b 3/47/0 a 2...d5 c4 e6 Nc3 Be7 Bf4 O-O e3 b c d e f g h w 17/33/0, b 5/44/1 E61: Kings Indian Defence rmblka0s opopopZp 6 0Z0Z0mpZ 5 Z0Z0Z0Z0 4 0ZPO0Z0Z 3 Z0M0Z0Z0 2 PO0ZPOPO 1 S0AQJBMR rmblkans opo0Zpop 0Z0ZpZ0Z 5 Z0ZpZ0Z0 4 0Z0OPZ0Z 3 Z0Z0Z0Z0 2 POPZ0OPO 1 SNAQJBMR 8 7 7 a b c d e f g 6 h a 3...d5 cxd5 Nxd5 e4 Nxc3 bxc3 Bg7 Be3 b c d e f g h w 39/11/0, b 4/46/0 B50: Sicilian Defence rmblkans opZ0opop 0Z0o0Z0Z 5 Z0o0Z0Z0 4 0Z0ZPZ0Z 3 Z0Z0ZNZ0 2 POPO0OPO 1 SNAQJBZR rZblkans opZpopop 0ZnZ0Z0Z 5 Z0o0Z0Z0 4 0Z0ZPZ0Z 3 Z0Z0ZNZ0 2 POPO0OPO 1 SNAQJBZR 8 7 7 6 6 a b c d e f g h a 3.d4 cxd4 Nxd4 Nf6 Nc3 a6 f3 e5 b c d e f B40: Sicilian Defence rmblkans opZpZpop 0Z0ZpZ0Z 5 Z0o0Z0Z0 4 0Z0ZPZ0Z 3 Z0Z0ZNZ0 2 POPO0OPO 1 SNAQJBZR 7 6 6 c d e f g h a 3.d4 cxd4 Nxd4 Nc6 Nc3 Qc7 Be3 a6 b c d e f g h w 27/22/1, b 6/44/0 B10: Caro-Kann Defence rmblkans opZpopop 0ZpZ0Z0Z 5 Z0Z0Z0Z0 4 0Z0ZPZ0Z 3 Z0Z0Z0Z0 2 POPO0OPO 1 SNAQJBMR rmblka0s opopopop 0Z0Z0m0Z 5 Z0Z0Z0Z0 4 0Z0Z0Z0Z 3 Z0Z0ZNZ0 2 POPOPOPO 1 SNAQJBZR 8 7 7 6 6 a b c d e f g 4.Ba4 Be7 O-O Nf6 Re1 b5 Bb3 O-O A05: Reti Opening 8 h w 25/25/0, b 4/45/1 3.Bb5 e6 O-O Ne7 Re1 a6 Bf1 d5 rZblkans ZpopZpop pZnZ0Z0Z 5 ZBZ0o0Z0 4 0Z0ZPZ0Z 3 Z0Z0ZNZ0 2 POPO0OPO 1 SNAQJ0ZR 7 b h C60: Ruy Lopez (Spanish Opening) 8 a g w 11/39/0, b 3/46/1 8 w 17/31/2, b 3/40/7 3.Nc3 Nf6 e5 Nd7 f4 c5 Nf3 Be7 B30: Sicilian Defence 8 w 17/32/1, b 4/43/3 3.Nf3 d5 Nc3 Bb4 Bg5 h6 Qa4 Nc6 C00: French Defence 8 w 16/34/0, b 0/48/2 2...c6 Nc3 Nf6 Nf3 a6 g3 c4 a4 E00: Queens Pawn Game a 2.d4 d5 e5 Bf5 Nf3 e6 Be2 a6 b c d e f g h w 13/36/1, b 7/43/0 Total games: w 242/353/5, b 48/533/19 2.c4 e6 d4 d5 Nc3 Be7 Bf4 O-O Overall percentage: w 40.3/58.8/0.8, b 8.0/88.8/3.2 Table 2: Analysis of the 12 most popular human openings (played more than 100,000 times in an online database (1)). Each opening is labelled by its ECO code and common name. The plot shows the proportion of self-play training games in which AlphaZero played each opening, against training time. We also report the win/draw/loss results of 100 game AlphaZero vs. Stockfish matches starting from each opening, as either white (w) or black (b), from AlphaZero’s perspective. Finally, the principal variation (PV) of AlphaZero is provided from each opening. 6 Figure 2: Scalability of AlphaZero with thinking time, measured on an Elo scale. a Performance of AlphaZero and Stockfish in chess, plotted against thinking time per move. b Performance of AlphaZero and Elmo in shogi, plotted against thinking time per move. knowledge except the rules of chess. Furthermore, the same algorithm was applied without modification to the more challenging game of shogi, again outperforming the state of the art within a few hours. References 1. Online chess games database, 365chess, 2017. URL: https://www.365chess.com/. 2. Victor Allis. Searching for Solutions in Games and Artificial Intelligence. PhD thesis, University of Limburg, Netherlands, 1994. 3. Thomas Anthony, Zheng Tian, and David Barber. Thinking fast and slow with deep learning and tree search. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 4-9 December 2017, Long Beach, CA, USA, pages 5366–5376, 2017. 4. Oleg Arenz. Monte Carlo chess. Master’s thesis, Technische Universitat Darmstadt, 2012. 5. Computer Shogi Association. Results of the 27th world computer shogi championship. http://www2.computer-shogi.org/wcsc27/index_e.html. Retrieved November 29th, 2017. 6. J. Baxter, A. Tridgell, and L. Weaver. Learning to play chess using temporal differences. Machine Learning, 40(3):243–263, 2000. 7. Donald F. Beal and Martin C. Smith. Temporal difference learning for heuristic search and game playing. Inf. Sci., 122(1):3–21, 2000. 7 8. Donald F. Beal and Martin C. Smith. Temporal difference learning applied to game playing and the results of application to shogi. Theoretical Computer Science, 252(1–2):105–119, 2001. 9. M. Campbell, A. J. Hoane, and F. Hsu. Deep Blue. Artificial Intelligence, 134:57–83, 2002. 10. R. Coulom. Whole-history rating: A Bayesian rating system for players of time-varying strength. In International Conference on Computers and Games, pages 113–124, 2008. 11. Omid E David, Nathan S Netanyahu, and Lior Wolf. Deepchess: End-to-end deep neural network for automatic learning in chess. In International Conference on Artificial Neural Networks, pages 88–96. Springer, 2016. 12. Kunihito Hoki and Tomoyuki Kaneko. Large-scale optimization for evaluation functions with minimax search. Journal of Artificial Intelligence Research (JAIR), 49:527–568, 2014. 13. Feng-hsiung Hsu. Behind Deep Blue: Building the Computer that Defeated the World Chess Champion. Princeton University Press, 2002. 14. Hiroyuki Iida, Makoto Sakuta, and Jeff Rollason. Computer shogi. Artificial Intelligence, 134:121–144, 2002. 15. Norman P. Jouppi, Cliff Young, Nishant Patil, et al. In-datacenter performance analysis of a tensor processing unit. In Proceedings of the 44th Annual International Symposium on Computer Architecture, ISCA ’17, pages 1–12. ACM, 2017. 16. Tomoyuki Kaneko and Kunihito Hoki. Analysis of evaluation-function learning by comparison of sibling nodes. In Advances in Computer Games - 13th International Conference, ACG 2011, Tilburg, The Netherlands, November 20-22, 2011, Revised Selected Papers, pages 158–169, 2011. 17. John Knudsen. Essential Chess Quotations. iUniverse, 2000. 18. D. E. Knuth and R. W Moore. An analysis of alphabeta pruning. Artificial Intelligence, 6(4):293–326, 1975. 19. Matthew Lai. Giraffe: Using deep reinforcement learning to play chess. Master’s thesis, Imperial College London, 2015. 20. Emanuel Lasker. Common Sense in Chess. Dover Publications, 1965. 21. David N. L. Levy and Monty Newborn. How Computers Play Chess. Ishi Press, 2009. 22. Chris J. Maddison, Aja Huang, Ilya Sutskever, and David Silver. Move evaluation in Go using deep convolutional neural networks. In International Conference on Learning Representations, 2015. 8 23. Tony Marsland. Computer chess methods. In S. Shapiro, editor, Encyclopedia of Artificial Intelligence. John Wiley & sons, New York, 1987. 24. Raghuram Ramanujan, Ashish Sabharwal, and Bart Selman. Understanding sampling style adversarial search methods. In Proceedings of the 26th Conference on Uncertainty in Artificial Intelligence (UAI), 2010. 25. Tord Romstad, Marco Costalba, Joona Kiiski, et al. Stockfish: A strong open source chess engine. https://stockfishchess.org/. Retrieved November 29th, 2017. 26. A. L. Samuel. Some studies in machine learning using the game of checkers II - recent progress. IBM Journal of Research and Development, 11(6):601–617, 1967. 27. Claude E Shannon. Xxii. programming a computer for playing chess. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, 41(314):256–275, 1950. 28. David Silver, Aja Huang, Chris J. Maddison, Arthur Guez, Laurent Sifre, George van den Driessche, Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershelvam, Marc Lanctot, Sander Dieleman, Dominik Grewe, John Nham, Nal Kalchbrenner, Ilya Sutskever, Timothy Lillicrap, Madeleine Leach, Koray Kavukcuoglu, Thore Graepel, and Demis Hassabis. Mastering the game of Go with deep neural networks and tree search. Nature, 529(7587):484–489, January 2016. 29. David Silver, Julian Schrittwieser, Karen Simonyan, Ioannis Antonoglou, Aja Huang, Arthur Guez, Thomas Hubert, Lucas Baker, Matthew Lai, Adrian Bolton, Yutian Chen, Timothy Lillicrap, Fan Hui, Laurent Sifre, George van den Driessche, Thore Graepel, and Demis Hassabis. Mastering the game of go without human knowledge. Nature, 550:354– 359, 2017. 30. Wilhelm Steinitz. The Modern Chess Instructor. Edition Olms AG, 1990. 31. Sebastian Thrun. Learning to play the game of chess. In Advances in neural information processing systems, pages 1069–1076, 1995. 32. J. Veness, D. Silver, A. Blair, and W. Uther. Bootstrapping from game tree search. In Advances in Neural Information Processing Systems, pages 1937–1945, 2009. 9 Methods Anatomy of a Computer Chess Program In this section we describe the components of a typical computer chess program, focusing specifically on Stockfish (25), an open source program that won the 2016 TCEC computer chess championship. For an overview of standard methods, see (23). Each position s is described by a sparse vector of handcrafted features φ(s), including midgame/endgame-specific material point values, material imbalance tables, piece-square tables, mobility and trapped pieces, pawn structure, king safety, outposts, bishop pair, and other miscellaneous evaluation patterns. Each feature φi is assigned, by a combination of manual and automatic tuning, a corresponding weight wi and the position is evaluated by a linear combination v(s, w) = φ(s)> w. However, this raw evaluation is only considered accurate for positions that are “quiet”, with no unresolved captures or checks. A domain-specialised quiescence search is used to resolve ongoing tactical situations before the evaluation function is applied. The final evaluation of a position s is computed by a minimax search that evaluates each leaf using a quiescence search. Alpha-beta pruning is used to safely cut any branch that is provably dominated by another variation. Additional cuts are achieved using aspiration windows and principal variation search. Other pruning strategies include null move pruning (which assumes a pass move should be worse than any variation, in positions that are unlikely to be in zugzwang, as determined by simple heuristics), futility pruning (which assumes knowledge of the maximum possible change in evaluation), and other domain-dependent pruning rules (which assume knowledge of the value of captured pieces). The search is focused on promising variations both by extending the search depth of promising variations, and by reducing the search depth of unpromising variations based on heuristics like history, static-exchange evaluation (SEE), and moving piece type. Extensions are based on domain-independent rules that identify singular moves with no sensible alternative, and domaindependent rules, such as extending check moves. Reductions, such as late move reductions, are based heavily on domain knowledge. The efficiency of alpha-beta search depends critically upon the order in which moves are considered. Moves are therefore ordered by iterative deepening (using a shallower search to order moves for a deeper search). In addition, a combination of domain-independent move ordering heuristics, such as killer heuristic, history heuristic, counter-move heuristic, and also domain-dependent knowledge based on captures (SEE) and potential captures (MVV/LVA). A transposition table facilitates the reuse of values and move orders when the same position is reached by multiple paths. A carefully tuned opening book is used to select moves at the start of the game. An endgame tablebase, precalculated by exhaustive retrograde analysis of endgame positions, provides the optimal move in all positions with six and sometimes seven pieces or less. Other strong chess programs, and also earlier programs such as Deep Blue, have used very similar architectures (9,23) including the majority of the components described above, although 10 important details vary considerably. None of the techniques described in this section are used by AlphaZero. It is likely that some of these techniques could further improve the performance of AlphaZero; however, we have focused on a pure self-play reinforcement learning approach and leave these extensions for future research. Prior Work on Computer Chess and Shogi In this section we discuss some notable prior work on reinforcement learning in computer chess. NeuroChess (31) evaluated positions by a neural network that used 175 handcrafted input features. It was trained by temporal-difference learning to predict the final game outcome, and also the expected features after two moves. NeuroChess won 13% of games against GnuChess using a fixed depth 2 search. Beal and Smith applied temporal-difference learning to estimate the piece values in chess (7) and shogi (8), starting from random values and learning solely by self-play. KnightCap (6) evaluated positions by a neural network that used an attack-table based on knowledge of which squares are attacked or defended by which pieces. It was trained by a variant of temporal-difference learning, known as TD(leaf), that updates the leaf value of the principal variation of an alpha-beta search. KnightCap achieved human master level after training against a strong computer opponent with hand-initialised piece-value weights. Meep (32) evaluated positions by a linear evaluation function based on handcrafted features. It was trained by another variant of temporal-difference learning, known as TreeStrap, that updated all nodes of an alpha-beta search. Meep defeated human international master players in 13 out of 15 games, after training by self-play with randomly initialised weights. Kaneko and Hoki (16) trained the weights of a shogi evaluation function comprising a million features, by learning to select expert human moves during alpha-beta serach. They also performed a large-scale optimization based on minimax search regulated by expert game logs (12); this formed part of the Bonanza engine that won the 2013 World Computer Shogi Championship. Giraffe (19) evaluated positions by a neural network that included mobility maps and attack and defend maps describing the lowest valued attacker and defender of each square. It was trained by self-play using TD(leaf), also reaching a standard of play comparable to international masters. DeepChess (11) trained a neural network to performed pair-wise evaluations of positions. It was trained by supervised learning from a database of human expert games that was pre-filtered to avoid capture moves and drawn games. DeepChess reached a strong grandmaster level of play. All of these programs combined their learned evaluation functions with an alpha-beta search enhanced by a variety of extensions. An approach based on training dual policy and value networks using AlphaZero-like policy iteration was successfully applied to improve on the state-of-the-art in Hex (3). 11 MCTS and Alpha-Beta Search For at least four decades the strongest computer chess programs have used alpha-beta search (18, 23). AlphaZero uses a markedly different approach that averages over the position evaluations within a subtree, rather than computing the minimax evaluation of that subtree. However, chess programs using traditional MCTS were much weaker than alpha-beta search programs, (4, 24); while alpha-beta programs based on neural networks have previously been unable to compete with faster, handcrafted evaluation functions. AlphaZero evaluates positions using non-linear function approximation based on a deep neural network, rather than the linear function approximation used in typical chess programs. This provides a much more powerful representation, but may also introduce spurious approximation errors. MCTS averages over these approximation errors, which therefore tend to cancel out when evaluating a large subtree. In contrast, alpha-beta search computes an explicit minimax, which propagates the biggest approximation errors to the root of the subtree. Using MCTS may allow AlphaZero to effectively combine its neural network representations with a powerful, domain-independent search. Domain Knowledge 1. The input features describing the position, and the output features describing the move, are structured as a set of planes; i.e. the neural network architecture is matched to the grid-structure of the board. 2. AlphaZero is provided with perfect knowledge of the game rules. These are used during MCTS, to simulate the positions resulting from a sequence of moves, to determine game termination, and to score any simulations that reach a terminal state. 3. Knowledge of the rules is also used to encode the input planes (i.e. castling, repetition, no-progress) and output planes (how pieces move, promotions, and piece drops in shogi). 4. The typical number of legal moves is used to scale the exploration noise (see below). 5. Chess and shogi games exceeding a maximum number of steps (determined by typical game length) were terminated and assigned a drawn outcome; Go games were terminated and scored with Tromp-Taylor rules, similarly to previous work (29). AlphaZero did not use any form of domain knowledge beyond the points listed above. Representation In this section we describe the representation of the board inputs, and the representation of the action outputs, used by the neural network in AlphaZero. Other representations could have been used; in our experiments the training algorithm worked robustly for many reasonable choices. 12 Go Feature Chess Planes Feature Shogi Planes Feature Planes P1 stone P2 stone 1 1 P1 piece P2 piece Repetitions 6 6 2 P1 piece P2 piece Repetitions P1 prisoner count P2 prisoner count 14 14 3 7 7 Colour 1 Colour Total move count P1 castling P2 castling No-progress count 1 1 2 2 1 Colour Total move count 1 1 Total 17 Total 119 Total 362 Table S1: Input features used by AlphaZero in Go, Chess and Shogi respectively. The first set of features are repeated for each position in a T = 8-step history. Counts are represented by a single real-valued input; other input features are represented by a one-hot encoding using the specified number of binary input planes. The current player is denoted by P1 and the opponent by P2. The input to the neural network is an N × N × (M T + L) image stack that represents state using a concatenation of T sets of M planes of size N × N . Each set of planes represents the board position at a time-step t − T + 1, ..., t, and is set to zero for time-steps less than 1. The board is oriented to the perspective of the current player. The M feature planes are composed of binary feature planes indicating the presence of the player’s pieces, with one plane for each piece type, and a second set of planes indicating the presence of the opponent’s pieces. For shogi there are additional planes indicating the number of captured prisoners of each type. There are an additional L constant-valued input planes denoting the player’s colour, the total move count, and the state of special rules: the legality of castling in chess (kingside or queenside); the repetition count for that position (3 repetitions is an automatic draw in chess; 4 in shogi); and the number of moves without progress in chess (50 moves without progress is an automatic draw). Input features are summarised in Table S1. A move in chess may be described in two parts: selecting the piece to move, and then selecting among the legal moves for that piece. We represent the policy π(a|s) by a 8 × 8 × 73 stack of planes encoding a probability distribution over 4,672 possible moves. Each of the 8 × 8 positions identifies the square from which to “pick up” a piece. The first 56 planes encode possible ‘queen moves’ for any piece: a number of squares [1..7] in which the piece will be moved, along one of eight relative compass directions {N, N E, E, SE, S, SW, W, N W }. The next 8 planes encode possible knight moves for that piece. The final 9 planes encode possible 13 Chess Feature Shogi Feature Planes Queen moves Knight moves Underpromotions 56 8 9 Queen moves Knight moves Promoting queen moves Promoting knight moves Drop Total 73 Total Planes 64 2 64 2 7 139 Table S2: Action representation used by AlphaZero in Chess and Shogi respectively. The policy is represented by a stack of planes encoding a probability distribution over legal moves; planes correspond to the entries in the table. underpromotions for pawn moves or captures in two possible diagonals, to knight, bishop or rook respectively. Other pawn moves or captures from the seventh rank are promoted to a queen. The policy in shogi is represented by a 9 × 9 × 139 stack of planes similarly encoding a probability distribution over 11,259 possible moves. The first 64 planes encode ‘queen moves’ and the next 2 moves encode knight moves. An additional 64 + 2 planes encode promoting queen moves and promoting knight moves respectively. The last 7 planes encode a captured piece dropped back into the board at that location. The policy in Go is represented identically to AlphaGo Zero (29), using a flat distribution over 19 × 19 + 1 moves representing possible stone placements and the pass move. We also tried using a flat distribution over moves for chess and shogi; the final result was almost identical although training was slightly slower. The action representations are summarised in Table S2. Illegal moves are masked out by setting their probabilities to zero, and re-normalising the probabilities for remaining moves. Configuration During training, each MCTS used 800 simulations. The number of games, positions, and thinking time varied per game due largely to different board sizes and game lengths, and are shown in Table S3. The learning rate was set to 0.2 for each game, and was dropped three times (to 0.02, 0.002 and 0.0002 respectively) during the course of training. Moves are selected in proportion to the root visit count. Dirichlet noise Dir(α) was added to the prior probabilities in the root node; this was scaled in inverse proportion to the approximate number of legal moves in a typical position, to a value of α = {0.3, 0.15, 0.03} for chess, shogi and Go respectively. Unless otherwise specified, the training and search algorithm and parameters are identical to AlphaGo Zero (29). 14 Mini-batches Training Time Training Games Thinking Time Chess Shogi Go 700k 9h 44 million 800 sims 40 ms 700k 12h 24 million 800 sims 80 ms 700k 34h 21 million 800 sims 200 ms Table S3: Selected statistics of AlphaZero training in Chess, Shogi and Go. During evaluation, AlphaZero selects moves greedily with respect to the root visit count. Each MCTS was executed on a single machine with 4 TPUs. Evaluation To evaluate performance in chess, we used Stockfish version 8 (official Linux release) as a baseline program, using 64 CPU threads and a hash size of 1GB. To evaluate performance in shogi, we used Elmo version WCSC27 in combination with YaneuraOu 2017 Early KPPT 4.73 64AVX2 with 64 CPU threads and a hash size of 1GB with the usi option of EnteringKingRule set to NoEnteringKing. We evaluated the relative strength of AlphaZero (Figure 1) by measuring the Elo rating of each player. We estimate the probability that player a will defeat player b by a logistic function p(a defeats b) = 1+exp (celo1(e(b)−e(a)) , and estimate the ratings e(·) by Bayesian logistic regression, computed by the BayesElo program (10) using the standard constant celo = 1/400. Elo ratings were computed from the results of a 1 second per move tournament between iterations of AlphaZero during training, and also a baseline player: either Stockfish, Elmo or AlphaGo Lee respectively. The Elo rating of the baseline players was anchored to publicly available values (29). We also measured the head-to-head performance of AlphaZero against each baseline player. Settings were chosen to correspond with computer chess tournament conditions: each player was allowed 1 minute per move, resignation was enabled for all players (-900 centipawns for 10 consecutive moves for Stockfish and Elmo, 5% winrate for AlphaZero). Pondering was disabled for all players. Example games In this section we include 10 example games played by AlphaZero against Stockfish during the 100 game match using 1 minute per move. 15 White: Stockfish Black: AlphaZero 1. e4 e5 2. Nf3 Nc6 3. Bb5 Nf6 4. d3 Bc5 5. Bxc6 dxc6 6. 0-0 Nd7 7. Nbd2 0-0 8. Qe1 f6 9. Nc4 Rf7 10. a4 Bf8 11. Kh1 Nc5 12. a5 Ne6 13. Ncxe5 fxe5 14. Nxe5 Rf6 15. Ng4 Rf7 16. Ne5 Re7 17. a6 c5 18. f4 Qe8 19. axb7 Bxb7 20. Qa5 Nd4 21. Qc3 Re6 22. Be3 Rb6 23. Nc4 Rb4 24. b3 a5 25. Rxa5 Rxa5 26. Nxa5 Ba6 27. Bxd4 Rxd4 28. Nc4 Rd8 29. g3 h6 30. Qa5 Bc8 31. Qxc7 Bh3 32. Rg1 Rd7 33. Qe5 Qxe5 34. Nxe5 Ra7 35. Nc4 g5 36. Rc1 Bg7 37. Ne5 Ra8 38. Nf3 Bb2 39. Rb1 Bc3 40. Ng1 Bd7 41. Ne2 Bd2 42. Rd1 Be3 43. Kg2 Bg4 44. Re1 Bd2 45. Rf1 Ra2 46. h3 Bxe2 47. Rf2 Bxf4 48. Rxe2 Be5 49. Rf2 Kg7 50. g4 Bd4 51. Re2 Kf6 52. e5+ Bxe5 53. Kf3 Ra1 54. Rf2 Re1 55. Kg2+ Bf4 56. c3 Rc1 57. d4 Rxc3 58. dxc5 Rxc5 59. b4 Rc3 60. h4 Ke5 61. hxg5 hxg5 62. Re2+ Kf6 63. Kf2 Be5 64. Ra2 Rc4 65. Ra6+ Ke7 66. Ra5 Ke6 67. Ra6+ Bd6 0-1 White: Stockfish Black: AlphaZero 1. e4 e5 2. Nf3 Nc6 3. Bb5 Nf6 4. d3 Bc5 5. Bxc6 dxc6 6. 0-0 Nd7 7. c3 0-0 8. d4 Bd6 9. Bg5 Qe8 10. Re1 f6 11. Bh4 Qf7 12. Nbd2 a5 13. Bg3 Re8 14. Qc2 Nf8 15. c4 c5 16. d5 b6 17. Nh4 g6 18. Nhf3 Bd7 19. Rad1 Re7 20. h3 Qg7 21. Qc3 Rae8 22. a3 h6 23. Bh4 Rf7 24. Bg3 Rfe7 25. Bh4 Rf7 26. Bg3 a4 27. Kh1 Rfe7 28. Bh4 Rf7 29. Bg3 Rfe7 30. Bh4 g5 31. Bg3 Ng6 32. Nf1 Rf7 33. Ne3 Ne7 34. Qd3 h5 35. h4 Nc8 36. Re2 g4 37. Nd2 Qh7 38. Kg1 Bf8 39. Nb1 Nd6 40. Nc3 Bh6 41. Rf1 Ra8 42. Kh2 Kf8 43. Kg1 Qg6 44. f4 gxf3 45. Rxf3 Bxe3+ 46. Rfxe3 Ke7 47. Be1 Qh7 48. Rg3 Rg7 49. Rxg7+ Qxg7 50. Re3 Rg8 51. Rg3 Qh8 52. Nb1 Rxg3 53. Bxg3 Qh6 54. Nd2 Bg4 55. Kh2 Kd7 56. b3 axb3 57. Nxb3 Qg6 58. Nd2 Bd1 59. Nf3 Ba4 60. Nd2 Ke7 61. Bf2 Qg4 62. Qf3 Bd1 63. Qxg4 Bxg4 64. a4 Nb7 65. Nb1 Na5 66. Be3 Nxc4 67. Bc1 Bd7 68. Nc3 c6 69. Kg1 cxd5 70. exd5 Bf5 71. Kf2 Nd6 72. Be3 Ne4+ 73. Nxe4 Bxe4 74. a5 bxa5 75. Bxc5+ Kd7 76. d6 Bf5 77. Ba3 Kc6 78. Ke1 Kd5 79. Kd2 Ke4 80. Bb2 Kf4 81. Bc1 Kg3 82. Ke2 a4 83. Kf1 Kxh4 84. Kf2 Kg4 85. Ba3 Bd7 86. Bc1 Kf5 87. Ke3 Ke6 0-1 White: AlphaZero Black: Stockfish 1. Nf3 Nf6 2. c4 b6 3. d4 e6 4. g3 Ba6 5. Qc2 c5 6. d5 exd5 7. cxd5 Bb7 8. Bg2 Nxd5 9. 0-0 Nc6 10. Rd1 Be7 11. Qf5 Nf6 12. e4 g6 13. Qf4 0-0 14. e5 Nh5 15. Qg4 Re8 16. Nc3 Qb8 17. Nd5 Bf8 18. Bf4 Qc8 19. h3 Ne7 20. Ne3 Bc6 21. Rd6 Ng7 22. Rf6 Qb7 23. Bh6 Nd5 24. Nxd5 Bxd5 25. Rd1 Ne6 26. Bxf8 Rxf8 27. Qh4 Bc6 28. Qh6 Rae8 29. Rd6 Bxf3 30. Bxf3 Qa6 31. h4 Qa5 32. Rd1 c4 33. Rd5 Qe1+ 34. Kg2 c3 35. bxc3 Qxc3 36. h5 Re7 37. Bd1 Qe1 38. Bb3 Rd8 39. Rf3 Qe4 40. Qd2 Qg4 41. Bd1 Qe4 42. h6 Nc7 43. Rd6 Ne6 44. Bb3 Qxe5 45. Rd5 Qh8 46. Qb4 Nc5 47. Rxc5 bxc5 48. Qh4 Rde8 49. Rf6 Rf8 50. Qf4 a5 51. g4 d5 52. Bxd5 Rd7 53. Bc4 a4 54. g5 a3 55. Qf3 Rc7 56. Qxa3 Qxf6 57. gxf6 Rfc8 58. Qd3 Rf8 59. Qd6 Rfc8 60. a4 1-0 16 White: AlphaZero Black: Stockfish 1. d4 e6 2. Nc3 Nf6 3. e4 d5 4. e5 Nfd7 5. f4 c5 6. Nf3 Nc6 7. Be3 Be7 8. Qd2 a6 9. Bd3 c4 10. Be2 b5 11. a3 Rb8 12. 0-0 0-0 13. f5 a5 14. fxe6 fxe6 15. Bd1 b4 16. axb4 axb4 17. Ne2 c3 18. bxc3 Nb6 19. Qe1 Nc4 20. Bc1 bxc3 21. Qxc3 Qb6 22. Kh1 Nb2 23. Nf4 Nxd1 24. Rxd1 Bd7 25. h4 Ra8 26. Bd2 Rfb8 27. h5 Rxa1 28. Rxa1 Qb2 29. Qxb2 Rxb2 30. c3 Rb3 31. Ra8+ Rb8 32. Ra2 Rb3 33. g4 Ra3 34. Rb2 Kf7 35. Kg2 Bc8 36. Rb6 Ra6 37. Rb1 Ke8 38. Kg3 h6 39. Ng6 Ra3 40. Rb6 Bd7 41. g5 hxg5 42. Kg4 Bd8 43. Rb2 Bc8 44. Nxg5 Ra1 45. Nf3 Ra3 46. Be1 Ba5 47. Rf2 Ra1 48. Bd2 Bd8 49. Rh2 Ne7 50. Bg5 Nf5 51. Bxd8 Kxd8 52. Rb2 Rc1 53. Ngh4 Nxh4 54. Nxh4 Bd7 55. Rb8+ Bc8 56. Ng2 Rxc3 57. Nf4 Rc1 58. Ra8 Kd7 59. Kf3 Rc3+ 60. Kf2 Ke7 61. Kg2 Kf7 62. Ng6 Ke8 63. Ra1 Rc7 64. Kh3 Rf7 65. Kg4 Kd8 66. Nf4 Bd7 67. Ra7 Kc8 68. Kg3 Re7 69. Nd3 Kb8 70. Ra6 Bc8 71. Rb6+ Kc7 72. Rd6 Kb8 73. Nc5 g6 74. h6 Rh7 75. Nxe6 Rxh6 76. Nf4 Rh1 77. Nxd5 Rh3+ 78. Kf4 Rh4+ 79. Ke3 Rh3+ 80. Kd2 Bf5 81. Ne7 Rh2+ 82. Ke3 Bh3 83. Nxg6 Rh1 84. Nf4 Bg4 85. Rf6 Kc7 86. Nd3 Bd7 87. d5 Bb5 88. Nf4 Ba4 89. Kd4 Be8 90. Rf8 Rd1+ 91. Kc5 Rc1+ 92. Kb4 Rb1+ 93. Kc3 Bb5 94. Kd4 Ba6 95. Rf7+ 1-0 White: AlphaZero Black: Stockfish 1. d4 Nf6 2. c4 e6 3. Nf3 b6 4. g3 Bb7 5. Bg2 Be7 6. 0-0 0-0 7. d5 exd5 8. Nh4 c6 9. cxd5 Nxd5 10. Nf5 Nc7 11. e4 Bf6 12. Nd6 Ba6 13. Re1 Ne8 14. e5 Nxd6 15. exf6 Qxf6 16. Nc3 Nb7 17. Ne4 Qg6 18. h4 h6 19. h5 Qh7 20. Qg4 Kh8 21. Bg5 f5 22. Qf4 Nc5 23. Be7 Nd3 24. Qd6 Nxe1 25. Rxe1 fxe4 26. Bxe4 Rf5 27. Bh4 Bc4 28. g4 Rd5 29. Bxd5 Bxd5 30. Re8+ Bg8 31. Bg3 c5 32. Qd5 d6 33. Qxa8 Nd7 34. Qe4 Nf6 35. Qxh7+ Kxh7 36. Re7 Nxg4 37. Rxa7 Nf6 38. Bxd6 Be6 39. Be5 Nd7 40. Bc3 g6 41. Bd2 gxh5 42. a3 Kg6 43. Bf4 Kf5 44. Bc7 h4 45. Ra8 h5 46. Rh8 Kg6 47. Rd8 Kf7 48. f3 Bf5 49. Bh2 h3 50. Rh8 Kg6 51. Re8 Kf7 52. Re1 Be6 53. Bc7 b5 54. Kh2 Kf6 55. Re3 Ke7 56. Re4 Kf7 57. Bd6 Kf6 58. Kg3 Kf7 59. Kf2 Bf5 60. Re1 Kg6 61. Kg1 c4 62. Kh2 h4 63. Be7 Nb6 64. Bxh4 Na4 65. Re2 Nc5 66. Re5 Nb3 67. Rd5 Be6 68. Rd6 Kf5 69. Be1 Ke5 70. Rb6 Bd7 71. Kg3 Nc1 72. Rh6 Kd5 73. Bc3 Bf5 74. Rh5 Ke6 75. Kf2 Nd3+ 76. Kg1 Nf4 77. Rh6+ Ke7 78. Kh2 Nd5 79. Kg3 Be6 80. Rh5 Ke8 81. Re5 Kf7 82. Bd2 Ne7 83. Bb4 Nd5 84. Bc3 Ke7 85. Bd2 Kf6 86. f4 Ne7 87. Rxb5 Nf5+ 88. Kh2 Ke7 89. Ra5 Nh4 90. Bb4+ Kf7 91. Rh5 Nf3+ 92. Kg3 Kg6 93. Rh8 Nd4 94. Bc3 Nf5+ 95. Kxh3 Bd7 96. Kh2 Kf7 97. Rb8 Ke6 98. Kg1 Bc6 99. Rb6 Kd5 100. Kf2 Bd7 101. Ke1 Ke4 102. Bd2 Kd5 103. Rf6 Nd6 104. Rh6 Nf5 105. Rh8 Ke4 106. Rh7 Bc8 107. Rc7 Ba6 108. Rc6 Bb5 109. Rc5 Bd7 110. Rxc4+ Kd5 111. Rc7 Kd6 112. Rc3 Ke6 113. Rc5 Nd4 114. Be3 Nf5 115. Bf2 Nd6 116. Rc3 Ne4 117. Rd3 1-0 White: AlphaZero Black: Stockfish 1. d4 Nf6 2. Nf3 e6 3. c4 b6 4. g3 Be7 5. Bg2 Bb7 6. 0-0 0-0 7. d5 exd5 8. Nh4 c6 9. cxd5 Nxd5 10. Nf5 Nc7 11. e4 Bf6 12. Nd6 Ba6 13. Re1 Ne8 14. e5 Nxd6 15. exf6 Qxf6 16. Nc3 Bc4 17. h4 h6 18. b3 Qxc3 19. Bf4 Nb7 20. bxc4 Qf6 21. Be4 Na6 22. Be5 Qe6 23. Bd3 f6 24. Bd4 Qf7 25. Qg4 Rfd8 26. Re3 Nac5 27. Bg6 Qf8 28. Rd1 Rab8 29. Kg2 Ne6 30. Bc3 Nbc5 31. Rde1 Na4 32. Bd2 Kh8 33. f4 Qd6 34. Bc1 Nd4 35. Re7 f5 36. Bxf5 Nxf5 37. Qxf5 Rf8 38. Rxd7 Rxf5 39. Rxd6 Rf7 40. g4 Kg8 41. g5 hxg5 42. hxg5 Nc5 43. Kf3 Nb7 44. Rdd1 Na5 45. Re4 c5 46. Bb2 Nc6 47. g6 Rc7 48. Kg4 Nd4 49. Rd2 Rf8 50. Bxd4 cxd4 51. Rdxd4 Rfc8 52. Kg5 Rf8 53. Rd2 Rc6 54. Rd5 Rc7 55. f5 Rb7 56. a3 Rc7 57. a4 a6 58. Red4 Rcc8 59. Re5 Rc7 60. a5 Rc5 61. Rxc5 bxc5 62. Rd6 Ra8 63. Re6 Kf8 64. Rc6 Ke7 65. Kf4 Kd7 66. Rxc5 Rh8 67. Rd5+ Ke7 68. Re5+ Kd7 69. Re6 Rh4+ 70. Kg5 1-0 17 White: AlphaZero Black: Stockfish 1. d4 Nf6 2. c4 e6 3. Nf3 b6 4. g3 Bb7 5. Bg2 Bb4+ 6. Bd2 Bxd2+ 7. Qxd2 d5 8. 0-0 0-0 9. cxd5 exd5 10. Nc3 Nbd7 11. b4 c6 12. Qb2 a5 13. b5 c5 14. Rac1 Qe7 15. Na4 Rab8 16. Rfd1 c4 17. Ne5 Qe6 18. f4 Rfd8 19. Qd2 Nf8 20. Nc3 Ng6 21. Rf1 Qd6 22. a4 Rbc8 23. e3 Ne7 24. g4 Ne8 25. f5 f6 26. Nf3 Qd7 27. Qf2 Nd6 28. Nd2 Rf8 29. Qg3 Rcd8 30. Rf4 Nf7 31. Rf2 Rfe8 32. h3 Qd6 33. Nf1 Qa3 34. Rcc2 h5 35. Qc7 Qd6 36. Qxd6 Rxd6 37. Ng3 h4 38. Nh5 Ng5 39. Rf1 Kh7 40. Nf4 Rdd8 41. Kh2 Rd7 42. Bh1 Rd6 43. Ng2 g6 44. Nxh4 gxf5 45. gxf5 Rh8 46. Nf3 Kg7 47. Nxg5 fxg5 48. Rg2 Kf6 49. Rg3 Re8 50. Bf3 Rdd8 51. Be2 Rf8 52. Bg4 Nc8 53. Bf3 Rfe8 54. h4 Rh8 55. h5 Rhe8 56. Bg2 Ne7 57. h6 Rh8 58. Rh3 Rh7 59. Kg1 Ba8 60. Nd1 g4 61. Rh5 g3 62. Nc3 Ng8 63. Ne2 Rxh6 64. Nxg3 Rxh5 65. Nxh5+ Kf7 66. Kf2 Nf6 67. Nxf6 Kxf6 68. Rh1 c3 69. Rc1 Rh8 70. Rxc3 Kxf5 71. Rc7 Kf6 72. Bf3 Rg8 73. Rh7 Rg6 74. Bd1 Rg8 75. Rh6+ Ke7 76. Rxb6 Kd7 77. Rf6 Ke7 78. Rh6 Rg7 79. Rh8 Bb7 80. Rh5 Kd6 81. Rh3 Rf7+ 82. Ke1 Bc8 83. Rh6+ Kc7 84. Rc6+ Kb8 85. Rd6 Bb7 86. b6 Ba6 87. Rxd5 Rf6 88. Rxa5 Rxb6 89. Kd2 Bb7 90. Rb5 Rf6 91. Bb3 Kc7 92. Re5 Ba6 93. Kc3 Rf1 94. Bc2 Rh1 95. a5 Kd6 96. e4 Bf1 97. Rf5 Bg2 98. Rf4 Rc1 99. Kb2 Rh1 100. a6 1-0 White: AlphaZero Black: Stockfish 1. d4 Nf6 2. c4 e6 3. Nf3 b6 4. g3 Bb7 5. Bg2 Bb4+ 6. Bd2 Be7 7. Nc3 c6 8. e4 d5 9. e5 Ne4 10. 0-0 Ba6 11. b3 Nxc3 12. Bxc3 dxc4 13. b4 b5 14. Nd2 0-0 15. Ne4 Bb7 16. Qg4 Nd7 17. Nc5 Nxc5 18. dxc5 a5 19. a3 axb4 20. axb4 Rxa1 21. Rxa1 Qd3 22. Rc1 Ra8 23. h4 Qd8 24. Be4 Qc8 25. Kg2 Qc7 26. Qh5 g6 27. Qg4 Bf8 28. h5 Rd8 29. Qh4 Qe7 30. Qf6 Qe8 31. Rh1 Rd7 32. hxg6 fxg6 33. Qh4 Qe7 34. Qg4 Rd8 35. Bb2 Qf7 36. Bc1 c3 37. Be3 Be7 38. Qe2 Bf8 39. Qc2 Bg7 40. Qxc3 Qd7 41. Rc1 Qc7 42. Bg5 Rf8 43. f4 h6 44. Bf6 Bxf6 45. exf6 Qf7 46. Ra1 Qxf6 47. Qxf6 Rxf6 48. Ra7 Rf7 49. Bxg6 Rd7 50. Kf2 Kf8 51. g4 Bc8 52. Ra8 Rc7 53. Ke3 h5 54. gxh5 Kg7 55. Ra2 Re7 56. Be4 e5 57. Bxc6 exf4+ 58. Kxf4 Rf7+ 59. Ke5 Rf5+ 60. Kd6 Rxh5 61. Rg2+ Kf6 62. Kc7 Bf5 63. Kb6 Rh4 64. Ka5 Bg4 65. Bxb5 Ke7 66. Rg3 Bc8 67. Re3+ Kf7 68. Be2 1-0 White: AlphaZero, Black: Stockfish 1. d4 e6 2. e4 d5 3. Nc3 Nf6 4. e5 Nfd7 5. f4 c5 6. Nf3 cxd4 7. Nb5 Bb4+ 8. Bd2 Bc5 9. b4 Be7 10. Nbxd4 Nc6 11. c3 a5 12. b5 Nxd4 13. cxd4 Nb6 14. a4 Nc4 15. Bd3 Nxd2 16. Kxd2 Bd7 17. Ke3 b6 18. g4 h5 19. Qg1 hxg4 20. Qxg4 Bf8 21. h4 Qe7 22. Rhc1 g6 23. Rc2 Kd8 24. Rac1 Qe8 25. Rc7 Rc8 26. Rxc8+ Bxc8 27. Rc6 Bb7 28. Rc2 Kd7 29. Ng5 Be7 30. Bxg6 Bxg5 31. Qxg5 fxg6 32. f5 Rg8 33. Qh6 Qf7 34. f6 Kd8 35. Kd2 Kd7 36. Rc1 Kd8 37. Qe3 Qf8 38. Qc3 Qb4 39. Qxb4 axb4 40. Rg1 b3 41. Kc3 Bc8 42. Kxb3 Bd7 43. Kb4 Be8 44. Ra1 Kc7 45. a5 Bd7 46. axb6+ Kxb6 47. Ra6+ Kb7 48. Kc5 Rd8 49. Ra2 Rc8+ 50. Kd6 Be8 51. Ke7 g5 52. hxg5 1-0 White: AlphaZero, Black: Stockfish 1. Nf3 Nf6 2. d4 e6 3. c4 b6 4. g3 Bb7 5. Bg2 Be7 6. 0-0 0-0 7. d5 exd5 8. Nh4 c6 9. cxd5 Nxd5 10. Nf5 Nc7 11. e4 d5 12. exd5 Nxd5 13. Nc3 Nxc3 14. Qg4 g6 15. Nh6+ Kg7 16. bxc3 Bc8 17. Qf4 Qd6 18. Qa4 g5 19. Re1 Kxh6 20. h4 f6 21. Be3 Bf5 22. Rad1 Qa3 23. Qc4 b5 24. hxg5+ fxg5 25. Qh4+ Kg6 26. Qh1 Kg7 27. Be4 Bg6 28. Bxg6 hxg6 29. Qh3 Bf6 30. Kg2 Qxa2 31. Rh1 Qg8 32. c4 Re8 33. Bd4 Bxd4 34. Rxd4 Rd8 35. Rxd8 Qxd8 36. Qe6 Nd7 37. Rd1 Nc5 38. Rxd8 Nxe6 39. Rxa8 Kf6 40. cxb5 cxb5 41. Kf3 Nd4+ 42. Ke4 Nc6 43. Rc8 Ne7 44. Rb8 Nf5 45. g4 Nh6 46. f3 Nf7 47. Ra8 Nd6+ 48. Kd5 Nc4 49. Rxa7 Ne3+ 50. Ke4 Nc4 51. Ra6+ Kg7 52. Rc6 Kf7 53. Rc5 Ke6 54. Rxg5 Kf6 55. Rc5 g5 56. Kd4 1-0 18 Program Chess Shogi Go AlphaZero Stockfish Elmo 80k 70,000k 40k 16k 35,000k Table S4: Evaluation speed (positions/second) of AlphaZero, Stockfish, and Elmo in chess, shogi and Go. 19
2cs.AI
Toward Deeper Understanding of Neural Networks: The Power of Initialization and a Dual View on Expressivity arXiv:1602.05897v2 [cs.LG] 19 May 2017 Amit Daniely∗ Roy Frostig† Yoram Singer‡ May 23, 2017 Abstract We develop a general duality between neural networks and compositional kernels, striving towards a better understanding of deep learning. We show that initial representations generated by common random initializations are sufficiently rich to express all functions in the dual kernel space. Hence, though the training objective is hard to optimize in the worst case, the initial weights form a good starting point for optimization. Our dual view also reveals a pragmatic and aesthetic perspective of neural networks and underscores their expressive power. ∗ Email: [email protected] Email: [email protected]. Work performed at Google. ‡ Email: [email protected] † Contents 1 Introduction 1 2 Related work 2 3 Setting 3 4 Computation skeletons 4.1 From computation skeletons to neural networks . . . . . . . . 4.2 From computation skeletons to reproducing kernels . . . . . . 4 6 7 5 Main results 5.1 Incorporating bias terms . . . . . . . . . . . . . . . . . . . . . 9 11 6 Mathematical background 11 7 Compositional kernel spaces 13 8 The dual activation function 15 9 Proofs 20 9.1 Well-behaved activations . . . . . . . . . . . . . . . . . . . . . 20 9.2 Proofs of Thms. 2 and 3 . . . . . . . . . . . . . . . . . . . . . 23 9.3 Proofs of Thms. 4 and 5 . . . . . . . . . . . . . . . . . . . . . 26 10 Discussion 29 1 Introduction Neural network (NN) learning has underpinned state of the art empirical results in numerous applied machine learning tasks (see for instance [31, 33]). Nonetheless, neural network learning remains rather poorly understood in several regards. Notably, it remains unclear why training algorithms find good weights, how learning is impacted by the network architecture and activations, what is the role of random weight initialization, and how to choose a concrete optimization procedure for a given architecture. We start by analyzing the expressive power of NNs subsequent to the random weight initialization. The motivation is the empirical success of training algorithms despite inherent computational intractability, and the fact that they optimize highly non-convex objectives with potentially many local minima. Our key result shows that random initialization already positions learning algorithms at a good starting point. We define an object termed a computation skeleton that describes a distilled structure of feed-forward networks. A skeleton induces a family of network architectures along with a hypothesis class H of functions obtained by certain non-linear compositions according to the skeleton’s structure. We show that the representation generated by random initialization is sufficiently rich to approximately express the functions in H. Concretely, all functions in H can be approximated by tuning the weights of the last layer, which is a convex optimization task. In addition to explaining in part the success in finding good weights, our study provides an appealing perspective on neural network learning. We establish a tight connection between network architectures and their dual kernel spaces. This connection generalizes several previous constructions (see Sec 2). As we demonstrate, our dual view gives rise to design principles for NNs, supporting current practice and suggesting new ideas. We outline below a few points. • Duals of convolutional networks appear a more suitable fit for vision and acoustic tasks than those of fully connected networks. • Our framework surfaces a principled initialization scheme. It is very similar to common practice, but incorporates a small correction. • By modifying the activation functions, two consecutive fully connected layers can be replaced with one while preserving the network’s dual kernel. • The ReLU activation, i.e. x 7→ max(x, 0), possesses favorable properties. Its dual kernel is expressive, and it can be well approximated by random initialization, even when the initialization’s scale is moderately changed. • As the number of layers in a fully connected network becomes very large, its dual kernel converges to a degenerate form for any non-linear activation. • Our result suggests that optimizing the weights of the last layer can serve as a convex proxy for choosing among different architectures prior to training. This idea was advocated and tested empirically in [49]. 1 2 Related work Current theoretical understanding of NN learning. Understanding neural network learning, particularly its recent successes, commonly decomposes into the following research questions. (i) What functions can be efficiently expressed by neural networks? (ii) When does a low empirical loss result in a low population loss? (iii) Why and when do efficient algorithms, such as stochastic gradient, find good weights? Though still far from being complete, previous work provides some understanding of questions (i) and (ii). Standard results from complexity theory [28] imply that essentially all functions of interest (that is, any efficiently computable function) can be expressed by a network of moderate size. Biological phenomena show that many relevant functions can be expressed by even simpler networks, similar to convolutional neural networks [32] that are dominant in ML tasks today. Barron’s theorem [7] states that even two-layer networks can express a very rich set of functions. As for question (ii), both classical [10, 9, 3] and more recent [40, 22] results from statistical learning theory show that as the number of examples grows in comparison to the size of the network the empirical loss must be close to the population loss. In contrast to the first two, question (iii) is rather poorly understood. While learning algorithms succeed in practice, theoretical analysis is overly pessimistic. Direct interpretation of theoretical results suggests that when going slightly deeper beyond single layer networks, e.g. to depth two networks with very few hidden units, it is hard to predict even marginally better than random [29, 30, 17, 18, 16]. Finally, we note that the recent empirical successes of NNs have prompted a surge of theoretical work around NN learning [47, 1, 4, 12, 39, 35, 19, 52, 14]. Compositional kernels and connections to networks. The idea of composing kernels has repeatedly appeared throughout the machine learning literature, for instance in early work by Schölkopf et al. [51], Grauman and Darrell [21]. Inspired by deep networks’ success, researchers considered deep composition of kernels [36, 13, 11]. For fully connected two-layer networks, the correspondence between kernels and neural networks with random weights has been examined in [46, 45, 38, 56]. Notably, Rahimi and Recht [46] proved a formal connection (similar to ours) for the RBF kernel. Their work was extended to include polynomial kernels [27, 42] as well as other kernels [6, 5]. Several authors have further explored ways to extend this line of research to deeper, either fully-connected networks [13] or convolutional networks [24, 2, 36]. Our work sets a common foundation for and expands on these ideas. We extend the analysis from fully-connected and convolutional networks to a rather broad family of architectures. In addition, we prove approximation guarantees between a network and its corresponding kernel in our more general setting. We thus extend previous analyses that only applies to fully connected two-layer networks. Finally, we use the connection as an analytical tool to reason about architectural design choices. 2 3 Setting Notation. We denote vectors by bold-face letters (e.g. x), and matrices by upper case Greek letters (e.g. Σ). The 2-norm of x ∈ Rd is denoted by kxk. For functions σ : R → R we let q p R∞ x2 kσk := EX∼N (0,1) σ 2 (X) = √12π −∞ σ 2 (x)e− 2 dx . Let G = (V, E) be a directed acyclic graph. The set of neighbors incoming to a vertex v is denoted in(v) := {u ∈ V | uv ∈ E}. The d − 1 dimensional sphere is denoted Sd−1 = {x ∈ Rd | kxk = 1}. We provide a brief overview of reproducing kernel Hilbert spaces in the sequel and merely introduce notation here. In a Hilbert space H, we use a slightly non-standard notation HB for the ball of radius B, {x ∈ H | kxkH ≤ B}. We use [x]+ to denote max(x, 0) and 1[b] to denote the indicator function of a binary variable b. Input space. Throughout the paper we assume that each example is a sequence of n elements, each of which is represented as a unit vector. Namely, we fix n and take the input n space to be X = Xn,d = Sd−1 . Each input example is denoted, x = (x1 , . . . , xn ), where xi ∈ Sd−1 . (1) We refer to each vector xi as the input’s ith coordinate, and use xij to denote it jth scalar entry. Though this notation is slightly non-standard, it unifies input types seen in various domains. For example, binary features can be encoded by taking d = 1, in which case X = {±1}n . Meanwhile, images and audio signals are often represented as bounded and continuous numerical values—we can assume in full generality that these values lie in [−1, 1]. 1 To match setup  the πx  above, we embed [−1, 1] into the circle S , e.g. via the map x 7→ πx sin 2 , cos 2 . When each coordinate is categorical—taking one of d values—we can represent category j ∈ [d] by the unit vector ej ∈ Sd−1 . When d may be very large or the basic units exhibits some structure, such as when the input is a sequence of words, a more 0 concise encoding may be useful, e.g. as unit vectors in a low dimension space Sd where d0  d (see for instance Mikolov et al. [37], Levy and Goldberg [34]). Supervised learning. The goal in supervised learning is to devise a mapping from the input space X to an output space Y based on a sample S = {(x1 , y1 ), . . . , (xm , ym )}, where (xi , yi ) ∈ X × Y, drawn i.i.d. from a distribution D over X × Y. A supervised learning problem is further specified by an output length k and a loss function ` : Rk × Y → [0, ∞), and the goal is to find a predictor h : XP→ Rk whose loss, LD (h) := E(x,y)∼D `(h(x), y), is small. The empirical loss LS (h) := m1 m i=1 `(h(xi ), yi ) is commonly used as a proxy for the loss LD . Regression problems correspond to Y = R and, for instance, the squared loss `(ŷ, y) = (ŷ − y)2 . Binary classification is captured by Y = {±1} and, say, the zero-one loss `(ŷ, y) = 1[ŷy ≤ 0] or the hinge loss `(ŷ, y) = [1 − ŷy]+ , with standard extensions to the multiclass case. A loss ` is L-Lipschitz if |`(y1 , y) − `(y2 , y)| ≤ L|y1 − y2 | for all y1 , y2 ∈ Rk , y ∈ Y, and it is convex if `(·, y) is convex for every y ∈ Y. 3 Neural network learning. We define a neural network N to be a vertices weighted directed acyclic graph (DAG) whose nodes are denoted V (N ) and edges E(N ). The weight function will be denoted by δ : V (N ) → [0, ∞), and its sole role would be to dictate the distribution of the initial weights (see definition 3). Each of its internal units, i.e. nodes with both incoming and outgoing edges, is associated with an activation function σv : R → R. In this paper’s context, an activation can be any function that is square integrable with respect to the Gaussian measure on R. We say that σ is normalized if kσk = 1. The set of nodes having only incoming edges are called the output nodes. To match the setup of a supervised learning problem, a network N has nd input nodes and k output nodes, denoted o1 , . . . , ok . A network N together with a weight vector w = {wuv | uv ∈ E} defines a predictor hN ,w : X → Rk whose prediction is given by “propagating” x forward through the network. Formally, we define hv,w (·) to be the output of the subgraph of the node v as follows: for an input node v, hv,w outputs the corresponding coordinate in x, and for all other nodes, we define hv,w recursively as  P w h (x) . hv,w (x) = σv uv u,w u∈in(v) Finally, we let hN ,w (x) = (ho1 ,w (x), . . . , hok ,w (x)). We also refer to internal nodes as hidden units. The output layer of N is the sub-network consisting of all output neurons of N along with their incoming edges. The representation induced by a network N is the network rep(N ) obtained from N by removing the output layer. The representation function induced by the weights w is RN ,w := hrep(N ),w . Given a sample Pm S, a learning algorithm searches for 1 weights w having small empirical loss LS (w) = m i=1 `(hN ,w (xi ), yi ). A popular approach is to randomly initialize the weights and then use a variant of the stochastic gradient method to improve these weights in the direction of lower empirical loss. Kernel learning. A function κ : X × X → R is a reproducing kernel, or simply a kernel, if for every x1 , . . . , xr ∈ X , the r × r matrix Γi,j = {κ(xi , xj )} is positive semi-definite. Each kernel induces a Hilbert space Hκ of functions from X to R with a corresponding norm k · kHκ . A kernel and its corresponding space are normalized if ∀x ∈ X , κ(x, x) = 1. Given a convex loss function `, a sample S, and a kernel κ, a kernel learning algorithm finds a P 1 k function f = (f1 , . . . , fk ) ∈PHκ whose empirical loss, LS (f ) = m i `(f (xi ), yi ), is minimal among all functions with i kfi k2κ ≤ R2 for some R > 0. Alternatively, kernel algorithms minimize the regularized loss, LR S (f ) m k 1 X 1 X = `(f (xi ), yi ) + 2 kfi k2κ , m i=1 R i=1 a convex objective that often can be efficiently minimized. 4 Computation skeletons In this section we define a simple structure which we term a computation skeleton. The purpose of a computational skeleton is to compactly describe a feed-forward computation 4 S1 S2 S3 S4 Figure 1: Examples of computation skeletons. from an input to an output. A single skeleton encompasses a family of neural networks that share the same skeletal structure. Likewise, it defines a corresponding kernel space. Definition 1. A computation skeleton S is a DAG whose non-input nodes are labeled by activations. Though the formal definition of neural networks and skeletons appear identical, we make a conceptual distinction between them as their role in our analysis is rather different. Accompanied by a set of weights, a neural network describes a concrete function, whereas the skeleton stands for a topology common to several networks as well as for a kernel. To further underscore the differences we note that skeletons are naturally more compact than networks. In particular, all examples of skeletons in this paper are irreducible, meaning that for each two nodes v, u ∈ V (S), in(v) 6= in(u). We further restrict our attention to skeletons with a single output node, showing later that single-output skeletons can capture supervised problems with outputs in Rk . We denote by |S| the number of non-input nodes of S. Figure 1 shows four example skeletons, omitting the designation of the activation functions. The skeleton S1 is rather basic as it aggregates all the inputs in a single step. Such topology can be useful in the absence of any prior knowledge of how the output label may be computed from an input example, and it is commonly used in natural language processing where the input is represented as a bag-of-words [23]. The only structure in S1 is a single fully connected layer: 5 Terminology (Fully connected layer of a skeleton). An induced subgraph of a skeleton with r + 1 nodes, u1 , . . . , ur , v, is called a fully connected layer if its edges are u1 v, . . . , ur v. The skeleton S2 is slightly more involved: it first processes consecutive (overlapping) parts of the input, and the next layer aggregates the partial results. Altogether, it corresponds to networks with a single one-dimensional convolutional layer, followed by a fully connected layer. The two-dimensional (and deeper) counterparts of such skeletons correspond to networks that are common in visual object recognition. Terminology (Convolution layer of a skeleton). Let s, w, q be positive integers and denote n = s(q − 1) + w. A subgraph of a skeleton is a one dimensional convolution layer of width w and stride s if it has n + q nodes, u1 , . . . , un , v1 , . . . , vq , and qw edges, us(i−1)+j vi , for 1 ≤ i ≤ q, 1 ≤ j ≤ w. The skeleton S3 is a somewhat more sophisticated version of S2 : the local computations are first aggregated, then reconsidered with the aggregate, and finally aggregated again. The last skeleton, S4 , corresponds to the networks that arise in learning sequenceto-sequence mappings as used in translation, speech recognition, and OCR tasks (see for example Sutskever et al. [55]). 4.1 From computation skeletons to neural networks The following definition shows how a skeleton, accompanied with a replication parameter r ≥ 1 and a number of output nodes k, induces a neural network architecture. Recall that inputs are ordered sets of vectors in Sd−1 . Definition 2 (Realization of a skeleton). Let S be a computation skeleton and consider input coordinates in Sd−1 as in (1). For r, k ≥ 1 we define the following neural network N = N (S, r, k). For each input node in S, N has d corresponding input neurons with weight 1/d. For each internal node v ∈ S labeled by an activation σ, N has r neurons v 1 , . . . , v r , each with an activation σ and weight 1/r. In addition, N has k output neurons o1 , . . . , ok with the identity activation σ(x) = x and weight 1. There is an edge v i uj ∈ E(N ) whenever uv ∈ E(S). For every output node v in S, each neuron v j is connected to all output neurons o1 , . . . , ok . We term N the (r, k)-fold realization of S. We also define the r-fold realization of S as1 N (S, r) = rep (N (S, r, 1)). Note that the notion of the replication parameter r corresponds, in the terminology of convolutional networks, to the number of channels taken in a convolutional layer and to the number of hidden units taken in a fully-connected layer. Figure 2 illustrates a (5, 4)- and 5-realizations of a skeleton with coordinate dimension d = 2. The (5, 4)-realization is a network with a single (one dimensional) convolutional layer having 5 channels, stride of 2, and width of 4, followed by three fully-connected layers. The global replication parameter r in a realization is used for brevity; it is straightforward to extend results when the different nodes in S are each replicated to a different extent. 1 Note that for every k, rep (N (S, r, 1)) = rep (N (S, r, k)). 6 N (S, 5, 4) S N (S, 5) Figure 2: A (5, 4)-fold and 5-fold realizations of the computation skeleton S with d = 2. We next define a scheme for random initialization of the weights of a neural network, that is similar to what is often done in practice. We employ the definition throughout the paper whenever we refer to random weights. Definition 3 (Random weights). A random initialization of a neural network N is a multivariate Gaussian w = (wuv )uv∈E(N ) such that each weight wuv is sampled independently from a normal distribution with mean 0 and variance2 dδ(u)/δ(in(v)) if u is an input neuron and δ(u)/(kσu k2 δ(in(v))) otherwise. Architectures such as convolutional nets have weights that are shared across different edges. Again, it is straightforward to extend our results to these cases and for simplicity we assume no explicit weight sharing. 4.2 From computation skeletons to reproducing kernels In addition to networks’ architectures, a computation skeleton S also defines a normalized kernel κS : X × X → [−1, 1] and a corresponding norm k · kS on functions f : X → R. This norm has the property that kf kS is small if and only if f can be obtained by certain simple compositions of functions according to the structure of S. To define the kernel, we introduce a dual activation and dual kernel. For ρ ∈ [−1, 1], we denote by Nρ the multivariate Gaussian distribution on R2 with mean 0 and covariance matrix ρ1 ρ1 . Definition 4 (Dual activation and kernel). The dual activation of an activation σ is the function σ̂ : [−1, 1] → R defined as σ̂(ρ) = σ(X)σ(Y ) . E (X,Y )∼Nρ The dual kernel w.r.t. to a Hilbert space H is the kernel κσ : H1 × H1 → R defined as κσ (x, y) = σ̂(hx, yiH ) . 2 For U ⊂ V (N ) we denote δ(U ) = P u∈U δ(u). 7 Activation Identity x 2nd Hermite 2 −1 x√ 2 ReLU Step Exponential √ √ e Kernel ρ linear 2 ρ 2 [x]+ 2 1[x ≥ 0] x−2 Dual Activation 1 π 1 2 1 e √ + + + ρ 2 ρ π ρ e + + + Ref poly 1−ρ2 +(π−cos−1 (ρ))ρ ρ2 ρ4 + 24π + ... = 2π π π−cos−1 (ρ) ρ3 3ρ5 + 40π + . . . = 6π π ρ2 ρ3 ρ−1 + + . . . = e 2e 6e arccos1 [13] arccos0 [13] RBF [36] Table 1: Activation functions and their duals. Section 7 shows that κσ is indeed a kernel for every activation σ that adheres with the square-integrability requirement. In fact, any continuous µ : [−1, 1] → R, such that (x, y) 7→ µ(hx, yiH ) is a kernel for all H, is the dual of some activation. Note that κσ is normalized iff σ is normalized. We show in Section 8 that dual activations are closely related to Hermite polynomial expansions, and that these can be used to calculate the duals of activation functions analytically. Table 1 lists a few examples of normalized activations and their corresponding dual (corresponding derivations are in Section 8). The following definition gives the kernel corresponding to a skeleton having normalized activations.3 Definition 5 (Compositional kernels). Let S be a computation skeleton with normalized activations and (single) output node o. For every node v, inductively define a kernel κv : X × X → R as follows. For an input node v corresponding to the ith coordinate, define κv (x, y) = hxi , yi i. For a non-input node v, define ! P κ (x, y) u u∈in(v) . κv (x, y) = σ̂v |in(v)| The final kernel κS is κo , the kernel associated with the output node o. The resulting Hilbert space and norm are denoted HS and k · kS respectively, and Hv and k · kv denote the space and norm when formed at node v. As we show later, κS is indeed a (normalized) kernel for every skeleton S. To understand the kernel in the context of learning, we need to examine which functions can be expressed as moderate norm functions in HS . As we show in section 7, these are the functions obtained by certain simple compositions according to the feed-forward structure of S. For intuition, the following example contrasts two commonly used skeletons. Example 1 (Convolutional vs. fully connected skeletons). Consider a network whose activations are all ReLU, σ(z) = [z]+ , and an input space Xn,1 = {±1}n . Say that S1 is a skeleton comprising a single fully connected layer, and that S2 is one comprising a convolutional layer 3 For a skeleton S with unnormalized activations, the corresponding kernel is the kernel of the skeleton S obtained by normalizing the activations of S. 0 8 of stride 1 and width q = log0.999 (n), followed by a single fully-connected layer. (The skeleton S2 from Figure 1 is a concrete example of the convolutional skeleton with q = 2 and n = 4.) The kernel κS1 takes the form κS1 (x, y) = σ̂ (hx, yi/n). It is a symmetric kernel and therefore functions with small norm in HS1 are essentially low-degree polynomials. For instance, fix a bound R = n1.001 on the norm of the functions. In this case, the space HSR1 contains multiplication of one or two input coordinates. However, multiplication of 3 or more coordinates are no-longer in HSR1 . Moreover, this property holds true regardless of the choice of activation function. On the other hand, HSR2 contains functions whose dependence on adjacent input coordinates is far more complex. It includes, for instance, any function f : X → {±1} that is symmetric (i.e. f (x) = f (−x)) and that depends on q adjacent coordinates xi , . . . , xi+q . Furthermore, any sum of n such functions is also in HSR2 . 5 Main results We review our main results. Let us fix a compositional kernel S. There are a few upshots to underscore upfront. First, our analysis implies that a representation generated by a random initialization of N = N (S, r, k) approximates the kernel κS . The sense in which the result holds is twofold. First, with the proper rescaling we show that hRN ,w (x), RN ,w (x0 )i ≈ κS (x, x0 ). Then, we also show that the functions obtained by composing bounded linear functions with RN ,w are approximately the bounded-norm functions in HS . In other words, the functions expressed by N under varying the weights of the last layer are approximately bounded-norm functions in HS . For simplicity, we restrict the analysis to the case k = 1. We also confine the analysis to either bounded activations, with bounded first and second derivatives, or the ReLU activation. Extending the results to a broader family of activations is left for future work. Through this and remaining sections we use & to hide universal constants. Definition 6. An activation σ : R → R is C-bounded if it is twice continuously differentiable and kσk∞ , kσ 0 k∞ , kσ 00 k∞ ≤ kσkC. Note that many activations are C-bounded for some constant C > √ 0. In particular, most of the popular sigmoid-like functions such as 1/(1 + e−x ), erf(x), x/ 1 + x2 , tanh(x), and tan−1 (x) satisfy the boundedness requirements. We next introduce terminology that parallels the representation layer of N with a kernel space. Concretely, let N be a network whose representation part has q output neurons. Given weights w, the normalized representation √ Ψw is obtained from the representation RN ,w by dividing each output neuron v by kσv k q. The empirical kernel corresponding to w is defined as κw (x, x0 ) = hΨw (x), Ψw (x0 )i. We also define the empirical kernel space corresponding to w as Hw = Hκw . Concretely, Hw = {hv (x) = hv, Ψw (x)i | v ∈ Rq } , and the norm of Hw is defined as khkw = inf{kvk | h = hv }. Our first result shows that the empirical kernel approximates the kernel kS . 9 Theorem 2. Let S be a skeleton with C-bounded activations. Let w be a random initialization of N = N (S, r) with r≥ (4C 4 )depth(S)+1 log (8|S|/δ) . 2 Then, for all x, x0 , with probability of at least 1 − δ, |kw (x, x0 ) − kS (x, x0 )| ≤  . We note that if we fix the activation and assume that the depth of S is logarithmic, then the required bound on r is polynomial. For the ReLU activation we get a stronger bound with only quadratic dependence on the depth. However, it requires that  ≤ 1/depth(S). Theorem 3. Let S be a skeleton with ReLU activations. Let w be a random initialization of N (S, r) with depth2 (S) log (|S|/δ) . r& 2 Then, for all x, x0 and  . 1/depth(S), with probability of at least 1 − δ, |κw (x, x0 ) − κS (x, x0 )| ≤  . For the remaining theorems, we fix a L-Lipschitz loss ` : R × Y → [0, ∞). For a distribution D on X × Y we denote by kDk0 the cardinality of the support of the distribution. We note that log (kDk0 ) is bounded by, for instance, the number of bits used to represent an element in X × Y. We use the following notion of approximation. Definition 7. Let D be a distribution on X ×Y. A space H1 ⊂ RX -approximates the space H2 ⊂ RX w.r.t. D if for every h2 ∈ H2 there is h1 ∈ H1 such that LD (h1 ) ≤ LD (h2 ) + . Theorem 4. Let S be a skeleton with C-bounded activations. Let w be a random initialization of N (S, r) with   LRC|S| 4 4 4 depth(S)+1 L R (4C ) log δ r& . 4  √ Then, with√probability of at least 1−δ over the choices of w we have that Hw2R -approximates R HSR and HS 2R -approximates Hw . Theorem 5. Let S be a skeleton with ReLU activations and  . 1/depth(C). Let w be a random initialization of N (S, r) with   L4 R4 depth2 (S) log kDkδ0 |S| r& . 4 √ Then, with√probability of at least 1−δ over the choices of w we have that Hw2R -approximates R HSR and HS 2R -approximates Hw . 10 As in Theorems 2 and 3, for a fixed C-bounded activation and logarithmically deep S, the required bounds on r are polynomial. Analogously, for the ReLU activation the bound is polynomial even without restricting the depth. However, the polynomial growth in Theorems 4 and 5 is rather large. Improving the bounds, or proving their optimality, is left to future work. 5.1 Incorporating bias terms Our results can be extended to incorporate bias terms. Namely, in addition to the weights we can add a bias vector b = {bv | v ∈ V } and let each neuron compute the function P  hv,w,b (x) = σv w h (x) + b . uv u,w v u∈in(v) To do so, we extend the definition of random initialization and compositional kernel as follows: Definition 8 (Random weights with bias terms). Let 0 ≤ β ≤ 1. A β-biased random initialization of a neural network N is a multivariate Gaussian (b, w) = ((wuv )uv∈E(N ) , (bv )v∈V (N ) ) such that each weight wuv is sampled independently from a normal distribution with mean 0 and variance (1 − β)dδ(u)/δ(in(v)) if u is an input neuron and (1 − β)δ(u)/(kσu k2 δ(in(v))) otherwise. Finally, each bias term bv is sampled independently from a normal distribution with mean 0 and variance β. Definition 9 (Compositional kernels with bias terms). Let S be a computation skeleton with normalized activations and (a single) output node o, and let 0 ≤ β ≤ 1. For every node v, inductively define a kernel κβv : X × X → R as follows. For an input node v corresponding to the ith coordinate, define κβv (x, y) = hxi , yi i. For a non-input node v, define ! P β (x, y) κ u∈in(v) u +β . κβv (x, y) = σ̂v (1 − β) |in(v)| The final kernel κβS is κβo , the kernel associated with the output node o. Note that our original definitions correspond to β = 0. With the above definitions, Theorems 2, 3, 4 and 5 extend to the case when there exist bias terms. To simplify the notation, we focus on the case when there are no biases. 6 Mathematical background Reproducing kernel Hilbert spaces (RKHS). The proofs of all the theorems we quote here are well-known and can be found in Chapter 2 of [48] and similar textbooks. Let H be a Hilbert space of functions from X to R. We say that H is a reproducing kernel Hilbert space, abbreviated RKHS or kernel space, if for every x ∈ X the linear functional f 7→ f (x) is bounded. The following theorem provides a one-to-one correspondence between kernels and kernel spaces. 11 Theorem 6. (i) For every kernel κ there exists a unique kernel space Hκ such that for every x ∈ X , κ(·, x) ∈ Hκ and for all f ∈ Hκ , f (x) = hf (·), κ(·, x)iHκ . (ii) A Hilbert space H ⊆ RX is a kernel space if and only if there exists a kernel κ : X × X → R such that H = Hκ . The following theorem describes a tight connection between embeddings of X into a Hilbert space and kernel spaces. Theorem 7. A function κ : X × X → R is a kernel if and only if there exists a mapping Φ : X → H to some Hilbert space for which κ(x, x0 ) = hΦ(x), Φ(x0 )iH . In addition, the following two properties hold, • Hκ = {fv : v ∈ H}, where fv (x) = hv, Φ(x)iH . • For every f ∈ Hκ , kf kHκ = inf{kvkH | f = fv }. Positive definite functions. A function µ : [−1, 1] → R is positive definite (PSD) if there are non-negative numbers b0 , b1 , . . . such that ∞ X bi < ∞ and ∀x ∈ [−1, 1], µ(x) = ∞ X i=0 The norm of µ is defined as kµk := bi x i . i=0 pP i bi = p µ(1). We say that µ is normalized if kµk = 1 Theorem 8 (Schoenberg, [50]). A continuous function µ : [−1, 1] → R is PSD if and only if for all d = 1, 2, . . . , ∞, the function κ : Sd−1 × Sd−1 → R defined by κ(x, x0 ) = µ(hx, x0 i) is a kernel. The restriction to the unit sphere of many of the kernels used in machine learning applications corresponds to positive definite functions. An example is the Gaussian kernel,   kx − x0 k2 0 . κ(x, x ) = exp − 2σ 2 Indeed, note that for unit vectors x, x0 we have     kxk2 + kx0 k2 − 2hx, x0 i 1 − hx, x0 i 0 κ(x, x ) = exp − = exp − . 2σ 2 σ2 Another example is the Polynomial kernel κ(x, x0 ) = hx, x0 id . 12 Hermite polynomials. The normalized Hermite polynomials is the sequence h0 , h1 , . . . of orthonormal polynomials obtained by applying the Gram-Schmidt process to the sequence R∞ x2 1, x, x2 , . . . w.r.t. the inner-product hf, gi = √12π −∞ f (x)g(x)e− 2 dx. Recall that we define activations as square integrable functions w.r.t. the Gaussian measure. Thus, Hermite polynomials form an orthonormal basis to the space of activations. In particular, each activation σ can be uniquely described in the basis of Hermite polynomials, σ(x) = a0 h0 (x) + a1 h1 (x) + a2 h2 (x) + . . . , (2) where the convergence holds in `2 w.r.t. the Gaussian measure. This decomposition is called the Hermite expansion. Finally, we use the following facts (see Chapter 11 in [41] and the relevant entry in Wikipedia): r n x hn−1 (x) , (3) hn (x) − ∀n ≥ 1, hn+1 (x) = √ n+1 n+1 √ ∀n ≥ 1, h0n (x) = nh (x) (4) ( n−1 n ρ n=m E hm (X)hn (Y ) = where n, m ≥ 0, ρ ∈ [−1, 1] , (5) (X,Y )∼Nρ 0 n 6= m ( 0, if n is odd n hn (0) = , (6) √1 (−1) 2 (n − 1)!! if n is even n! where 7   n≤0 1 n!! = n · (n − 2) · · · 5 · 3 · 1 n > 0 odd .   n · (n − 2) · · · 6 · 4 · 2 n > 0 even Compositional kernel spaces We now describe the details of compositional kernel spaces. Let S be a skeleton with normalized activations and n input nodes associated with the input’s coordinates. Throughout the rest of the section we study the functions in HS and their norm. In particular, we show that κS is indeed a normalized kernel. Recall that κS is defined inductively by the equation, ! P 0 u∈in(v) κu (x, x ) 0 κv (x, x ) = σ̂v . (7) |in(v)| The recursion (7) describes a means for generating a kernel form another kernel. Since kernels correspond to kernel spaces, it also prescribes an operator that produces a kernel space from other kernel spaces. If Hv is the space corresponding to v, we denote this operator by   ⊕u∈in(v) Hu Hv = σ̂v . (8) |in(v)| 13 The reason for using the above notation becomes clear in the sequel. The space HS is obtained by starting with the spaces Hv corresponding to the input nodes and propagating them according to the structure of S, where at each node v the operation (8) is applied. Hence, to understand HS we need to understand this operation as well as the spaces corresponding to input nodes. The latter spaces are rather simple: for an input node v corresponding to the variable xi , we have that Hv = {fw | ∀x, fw (x) = hw, xi i} and kfw kHv = kwk. To understand (8), it is convenient to decompose it into two operations.P The first operation, κu (x,x0 ) , and the termed the direct average, is defined through the equation κ̃v (x, x0 ) = u∈in(v) |in(v)| ⊕ H u resulting kernel space is denoted Hṽ = u∈in(v) . The second operation, called the extension |in(v)| 0 according to σ̂v , is defined through κv (x, x ) = σ̂v (κ̃v (x, x0 )). The resulting kernel space is denoted Hv = σ̂v (Hṽ ). We next analyze these two operations. The direct average of kernel spaces. Let H1 , . . . , Hn be kernel spaces with kernels n κ1 , . . . , κn : X × X → R. Their direct average, denoted H = H1 ⊕···⊕H , is the kernel space n P n 1 0 0 corresponding to the kernel κ(x, x ) = n i=1 κi (x, x ). Lemma 9. The function κ is indeed a kernel. Furthermore, the following properties hold. 1. If H1 , . . . , Hn are normalized then so is H.  n 2. H = f1 +...+f | fi ∈ Hi n o n kf k2 +...+kf k2 n Hn 1 H f1 +...+fn 1 s.t. f = , f ∈ H 3. kf k2H = inf i i n n Proof. (outline) The fact that κ is a kernel follows directly from the definition of a kernel and the fact that an average of PSD matrices is PSD. Also, it is straight forward to verify item 1. We now proceed to items 2 and 3. By Theorem 7 there are Hilbert spaces G1 , . . . , Gn and mappings Φi : X → Gi such that κi (x, x0 ) = hΦi (x), Φi (x0 )iGi . Consider now the mapping   Φ1 (x) Φn (x) √ ,..., √ . Ψ(x) = n n It holds that κ(x, x0 ) = hΨ(x), Ψ(x0 )i. Properties 2 and 3 now follow directly form Thm. 7 applied to Ψ. The extension P of a kernel space. Let H be a normalized kernel space with a kernel κ. Let µ(x) = i bi xi be a PSD function. As we will see shortly, a function is PSD if and only if it is a dual of an activation function. The extension of H w.r.t. µ, denoted µ (H), is the kernel space corresponding to the kernel κ0 (x, x0 ) = µ(κ(x, x0 )). Lemma 10. The function κ0 is indeed a kernel. Furthermore, the following properties hold. 1. µ(H) is normalized if and only if µ is. 14 ( 2. µ(H) = span ) Y g | A ⊂ H, b|A| > 0 where span(A) is the closure of the span of A. g∈A 3. kf kµ(H) ( ) Q X g∈A kgkH XY p ≤ inf s.t. f = g, A ⊂ H b|A| A A g∈A Proof. (outline) Let Φ : X → G be a mapping from X to the unit ball of a Hilbert space G such that κ(x, x0 ) = hΦ(x), Φ(x0 )i. Define  p p p p Ψ(x) = b0 , b1 Φ(x), b2 Φ(x) ⊗ Φ(x), b3 Φ(x) ⊗ Φ(x) ⊗ Φ(x), . . . It is not difficult to verify that hΨ(x), Ψ(x0 )i = µ(κ(x, x0 )). Hence, by Thm. 7, κ0 is indeed a kernel. Verifying property 1 is a straightforward task. Properties 2 and 3 follow by applying Thm. 7 on the mapping Ψ. 8 The dual activation function The following lemma describes a few basic properties of the dual activation. These properties follow easily from the definition of the dual activation and equations (2), (4), and (5). Lemma 11. The following properties of the mapping σ 7→ σ̂ hold: P P (a) If σ = i ai hi is the Hermite expansion of σ, then σ̂(ρ) = i a2i ρi . (b) For every σ, σ̂ is positive definite. (c) Every positive definite function is a dual of some activation. (d) The mapping σ 7→ σ̂ preserves norms. (e) The mapping σ 7→ σ̂ commutes with differentiation. (f ) For a ∈ R, ac σ = a2 σ̂. (g) For every σ, σ̂ is continuous in [−1, 1] and smooth in (−1, 1). (h) For every σ, σ̂ is non-decreasing and convex in [0, 1]. (i) For every σ, the range of σ̂ is [−kσk2 , kσk2 ]. 2 (j) For every σ, σ̂(0) = EX∼N (0,1) σ(X) and σ̂(1) = kσk2 . We next discuss a few examples for activations and calculate their dual activation and kernel. Note that the dual of the exponential activation was calculated in [36] and the duals of the step and the ReLU activations were calculated in [13]. Here, our derivations are different and may prove useful for future calculations of duals for other activations. 15 The exponential activation. Consider the activation function σ(x) = Ceax where C > 0 2 is a normalization constant such that kσk = 1. The actual value of C is e−2a but it will not be needed for the derivation below. From properties (e) and (f) of Lemma 11 we have that, (σ̂)0 = σb0 = ac σ = a2 σ̂ . The the solution of ordinary differential equation (σ̂)0 = a2 σ̂ is of the form σ̂(ρ) = b exp (a2 ρ). 2 Since σ̂(1) = 1 we have b = e−a . We therefore obtain that the dual activation function is 2 ρ−a2 σ̂(ρ) = ea 2 (ρ−1) = ea . Note that the kernel induced by σ is the RBF kernel, restricted to the d-dimensional sphere, 2 (hx,x0 i−1) κσ (x, x0 ) = ea = e− a2 kx−x0 k2 2 . The Sine activation and the Sinh kernel. Consider the activation σ(x) = sin(ax). We iax −iax can write sin(ax) = e −e . We have 2i  σ̂(ρ) = E (X,Y )∼Nρ eiaX − e−iaX 2i  eiaY − e−iaY 2i    1 E eiaX − e−iaX eiaY − e−iaY 4 (X,Y )∼Nρ  ia(X+Y )  1 E e − eia(X−Y ) − eia(−X+Y ) + eia(−X−Y ) . = − 4 (X,Y )∼Nρ = − 1 2 Recall that the characteristic function, E[eitX ], when X is distributed N (0, 1) is e− 2 t . Since X + Y and −X − Y are normal variables with expectation 0 and variance of 2 + 2ρ, it follows that, E eia(X+Y ) = (X,Y )∼Nρ e−ia(X+Y ) = e− E a2 (2+2ρ) 2 . (X,Y )∼Nρ Similarly, since the variance of X − Y and Y − X is 2 − 2ρ, we get E eia(X−Y ) = (X,Y )∼Nρ eia(−X+Y ) = e− E a2 (2−2ρ) 2 . (X,Y )∼Nρ We therefore obtain that 2 (1−ρ) σ̂(ρ) = e−a 2 (1+ρ) − e−a 2 2 = e−a sinh(a2 ρ) . Hermite activations and polynomial kernels. From Lemma 11 it follows that the dual activation of the Hermite polynomial hn is ĥn (ρ) = ρn . Hence, the corresponding kernel is the polynomial kernel. 16 The normalized step activation. Consider the activation (√ 2 x>0 σ(x) = . 0 x≤0 To calculate σ̂ we compute the Hermite expansion of σ. For n ≥ 0 we let Z ∞ Z ∞ 2 x2 1 1 − x2 σ(x)hn (x)e dx = √ hn (x)e− 2 dx . an = √ π 0 2π −∞ Since h0 (x) = 1, h1 (x) = x, and h2 (x) = a2 we get the corresponding coefficients, 1 [σ(X)] = √ X∼N(0,1) 2 1 1 E [|X|] = √ = E [σ(X)X] = √ X∼N(0,1) π 2 X∼N(0,1) 1 1 = √ E [σ(X)(X 2 − 1)] = E [X 2 − 1] = 0 . 2 X∼N(0,1) 2 X∼N(0,1) a0 = a1 2 −1 x√ , 2 E x2 For n ≥ 3 we write gn (x) = hn (x)e− 2 and note that x2 gn0 (x) = [h0n (x) − xhn (x)] e− 2 √  x2 = nhn−1 (x) − xhn (x) e− 2 √ x2 = − n + 1 hn+1 (x)e− 2 √ = − n + 1 gn+1 (x) . Here, the second equality follows from (4) and the third form (3). We therefore get Z ∞ 1 an = √ gn (x)dx π 0 Z ∞ 1 g 0 (x)dx = −√ nπ 0 n−1   =0 z }| { 1 = √ gn−1 (0) − gn−1 (∞) nπ 1 = √ hn−1 (0) nπ  n−1 2 (n−2)!!  (−1) = √ √ nπ (n−1)! = 0 (−1) n−1 2 (n−2)!! √ πn! if n is odd if n is even 17 . The second equality follows from and the last equality follows from (6). Finally, from P(3) ∞ Lemma 11 we have that σ̂(ρ) = n=0 bn ρn where  ((n−2)!!)2  if n is odd  πn! 1 bn = 2 . if n = 0   0 if n is even ≥ 2  1 3 In particular, (b0 , b1 , b2 , b3 , b4 , b5 , b6 ) = 21 , π1 , 0, 6π , 0, 40π , 0 . Note that from the Taylor ex−1 pansion of cos−1 it follows that σ̂(ρ) = 1 − cos π (ρ) . The normalizedP ReLU activation. Consider the activation σ(x) = now write σ̂(ρ) = i bi ρi . The first coefficient is  b0 = √ 2 max(0, x). We 2  2 1 1 E σ(X) = E |X| = . X∼N(0,1) 2 X∼N(0,1) π To calculate the remaining coefficients we simply note that the derivative of the ReLU activation is the step activation and the mapping σ 7→ σ̂ commutes with differentiation. Hence, from the calculation of the step activation we get,  ((n−3)!!)2  if n is even  πn! bn = 12 . if n = 1   0 if n is odd ≥ 3  1 1 1 In particular, (b0 , b1 , b2 , b3 , b4 , b5 , b6 ) = π1 , 12 , 2π , 0, 24π , 0, 80π . We see that the coefficients corresponding to the degrees 0, 1, and 2 sum to 0.9774. The sums up to degrees 4 or 6 are 0.9907 and 0.9947 respectively. That is, we get an excellent approximation of less than 1% error with a dual activation of degree 4. The collapsing tower of fully connected layers. To conclude this section we discuss the case of very deep networks. The setting is taken for illustrative purposes but it might surface when building networks with numerous fully connected layers. Indeed, most deep architectures that we are aware of do not employ more than five consecutive fully connected layers. Consider a skeleton Sm consisting of m fully connected layers, each layer associated with the same (normalized) activation σ. We would like to examine the form of the compositional kernel as the number of layers becomes very large. Due to the repeated structure and activation we have  κSm (x, y) = αm hx, yi n  m times z }| { where αm = σ̂ = σ̂ ◦ . . . ◦ σ̂ . m 18 Hence, the limiting properties of κSm can be understood from the limit of αm . In the case that σ(x) = x or σ(x) = −x, σ̂ is the identity function. Therefore αm (ρ) = σ̂(ρ) = ρ for all m and κSm is simply the linear kernel. Assume now that σ is neither the identity nor its negation. The following claim shows that αm has a point-wise limit corresponding to a degenerate kernel. Claim 1. There exists a constant 0 ≤ ασ ≤ 1 such that for all −1 < ρ < 1, lim αm (ρ) = ασ m→∞ Before proving the claim, we note that for ρ = 1, αm (1) = 1 for all m, and therefore limm→∞ αm (1) = 1. For ρ = −1, if σ is anti-symmetric then αm (−1) = −1 for all m, and in particular limm→∞ αm (−1) = −1. In any other case, our argument can show that limm→∞ αm (−1) = ασ . P i Proof. Recall that σ̂(ρ) = ∞ i=0 bi ρ where the bi ’s are non-negative numbers that sum to 1. By the assumption that σ is not the identity or its negation, b1 < 1. We first claim that there is a unique ασ ∈ [0, 1] such that ∀x ∈ (−1, ασ ) , σ̂(ρ) > ρ and ∀x ∈ (ασ , 1) , ασ < σ̂(ρ) < ρ (9) To prove (9) it suffices to prove the following properties. (a) σ̂(ρ) > ρ for ρ ∈ (−1, 0) (b) σ̂ is non-decreasing and convex in [0, 1] (c) σ̂(1) = 1 (d) the graph of σ̂ has at most a single intersection in [0, 1) with the graph of f (ρ) = ρ If the above properties hold we can take ασ to be the intersection point or 1 if such a point does not exist. We first show (a). For ρ ∈ (−1, 0) we have that σ̂(ρ) = b0 + ∞ X i=1 i bi ρ ≥ b0 − ∞ X i bi |ρ| > − i=1 ∞ X bi |ρ| ≥ −|ρ| = ρ . i=1 Here, the third inequality follows form the fact that b0 ≥ 0 and for all i, −bi |ρ|i ≥ −bi |ρ|. Moreover since b1 < 1, one of these inequalities must be strict. Properties (b) and (c) follows from Finally, to show (d), we note that the second derivative of σ̂(ρ) − ρ is P Lemma 11. i−2 which is non-negative in [0, 1). Hence, σ̂(ρ) − ρ is convex in [0, 1] and in i≥2 i(i − 1)bi ρ particular intersects with the x-axis at either 0, 1, 2 or infinitely many times in [0, 1]. As we assume that σ̂ is not the identity, we can rule out the option of infinitely many intersections. Also, since σ̂(1) = 1, we know that there is at least one intersection in [0, 1]. Hence, there are 1 or 2 intersections in [0, 1] and because one of them is in ρ = 1, we conclude that there is at most one intersection in [0, 1). 19 Lastly, we derive the conclusion of the claim from equation (9). Fix ρ ∈ (−1, 1). Assume first that ρ ≥ ασ . By (9), αm (ρ) is a monotonically non-increasing sequence that is lower bounded by ασ . Hence, it has a limit ασ ≤ τ ≤ ρ < 1. Now, by the continuity of σ̂ we have   σ̂(τ ) = σ̂ lim αm (ρ) = lim σ̂(αm (ρ)) = lim αm+1 (ρ) = τ . m→∞ m→∞ m→∞ Since the only solution to σ̂(ρ) = ρ in (−1, 1) is ασ , we must have τ = ασ . We next deal with the case that −1 < ρ < ασ . If for some m, αm (ρ) ∈ [ασ , 1), the argument for ασ ≤ ρ shows that ασ = limm→∞ αm (ρ). If this is not the case, we have that for all m, αm (ρ) ≤ αm+1 (ρ) ≤ ασ . As in the case of ρ ≥ ασ , this can be used to show that αm (ρ) converges to ασ . 9 Proofs 9.1 Well-behaved activations The proof of our main results applies to activations that are decent, i.e. well-behaved, in a sense defined in the sequel. We then show that C-bounded activations as well as the ReLU activation are decent. We first need to extend the definition of the dual activation and kernel to apply to vectors in Rd , rather than just Sd . We denote by M+ the collection of 2 × 2 positive semi-define matrices and by M++ the collection of positive definite matrices. Definition 10. Let σ be an activation. Define the following, σ̄ : M2+   kxk2 hx, yi → R , σ̄(Σ) = E σ(X)σ(Y ) , kσ (x, y) = σ̄ . hx, yi kyk2 (X,Y )∼N(0,Σ) We underscore the following properties of the extension of a dual activation. (a) The following equality holds,   1 ρ σ̂(ρ) = σ̄ ρ 1 (b) The restriction of the extended kσ to the sphere agrees with the restricted definition. (c) The extended dual activation and kernel are defined for every activation σ such that for all a ≥ 0, x 7→ σ(ax) is square integrable with respect to the Gaussian measure. (d) For x, y ∈ Rd , if w ∈ Rd is a multivariate normal distribution with zero mean vector and identity covariance matrix, then kσ (x, y) = E σ(hw, xi)σ(hw, yi) . w Denote Mγ+  := Σ11 Σ12 Σ12 Σ22   ∈ M+ | 1 − γ ≤ Σ11 , Σ22 ≤ 1 + γ 20 . Definition 11. A normalized activation σ is (α, β, γ)-decent for α, β, γ ≥ 0 if the following conditions hold. (i) The dual activation σ̄ is β-Lipschitz in Mγ+ with respect to the ∞-norm. (ii) If (X1 , Y1 ), . . . , (Xr , Yr ) are independent samples from N (0, Σ) for Σ ∈ Mγ+ then     Pr 2 σ(X )σ(Y ) r i i i=1 − σ̄(Σ) ≥  ≤ 2 exp − 2 . Pr r 2α Lemma 12 (Bounded activations are decent). Let σ : R → R be a C-bounded normalized activation. Then, σ is (C 2 , 2C 2 , γ)-decent for all γ ≥ 0. Proof. It is enough to show that the following properties hold. 1. The (extended) dual activation σ̄ is 2C 2 -Lipschitz in M++ w.r.t. the ∞-norm. 2. If (X1 , Y1 ), . . . , (Xr , Yr ) are independent samples from N (0, Σ) then    Pr  r2 i=1 σ(Xi )σ(Yi ) − σ̄(Σ) ≥  ≤ 2 exp − 4 Pr r 2C From the boundedness of σ it holds that |σ(X)σ(Y )| ≤ C 2 . Hence, the second property follows directly from Hoeffding’s bound. We next prove the first part. Let z = (x, y) and φ(z) = σ(x)σ(y). Note that for Σ ∈ M++ we have Z z> Σ−1 z 1 φ(z)e− 2 dz . σ̄(Σ) = p 2π det(Σ) R2 Thus we get that, " p # p 1 1 −1 −1 > −1 det(Σ)Σ − det(Σ)(Σ zz Σ ) z> Σ−1 z 2 φ(z) 2 e− 2 dz det(Σ) R2 Z  z> Σ−1 z 1 1 p = φ(z) Σ−1 − Σ−1 zz> Σ−1 e− 2 dz 2 2π det(Σ) R2 ∂ σ̄ 1 = ∂Σ 2π Let g(z) = e− z> Σ−1 z 2 Z . Then, the first and second order partial derivatives of g are z> Σ−1 z ∂g = −Σ−1 ze− 2 ∂z  −1  − z> Σ−1 z ∂ 2g −1 > −1 2 = −Σ + Σ zz Σ e . ∂ 2z We therefore obtain that, ∂ σ̄ 1 =− p ∂Σ 4π det(Σ) 21 Z φ R2 ∂ 2g dz . ∂ 2z By the product rule we have ∂ σ̄ 1 1 =− p ∂Σ 2π det(Σ) 2 Z R2  2  1 ∂ φ ∂ 2φ gdz = − E (X, Y ) ∂ 2z 2 (X,Y )∼N(0,Σ) ∂ 2 z We conclude that σ̄ is differentiable in M++ with partial derivatives that are point-wise 2 bounded by C2 . Thus, σ̄ is 2C 2 -Lipschitz in M+ w.r.t. the ∞-norm. We next show that the ReLU activation is decent. Lemma 13 (ReLU is decent). There exists √ a constant αReLU ≥ 1 such that for 0 ≤ γ ≤ 1, the normalized ReLU activation σ(x) = 2 max(0, x) is (αReLU , 1 + o(γ), γ)-decent. Proof. The measure concentration property follows from standard concentration bounds for sub-exponential random variables (e.g. [53]). It remains to show that σ̄ is (1+o(γ))-Lipschitz in Mγ+ . We first calculate an exact expression for σ̄. The expression was already calculated in [13], yet we give here a derivation for completeness. Claim 2. The following equality holds for all Σ ∈ M2+ ,   p Σ12 σ̄(Σ) = Σ11 Σ22 σ̂ √ . Σ11 Σ22 Proof. Let us denote Σ̃ = 1 √ Σ12 Σ11 Σ12 √ Σ12 Σ11 Σ12 1 ! . By the positive homogeneity of the ReLU activation we have σ̄ (Σ) = E σ(X)σ(Y ) (X,Y )∼N(0,Σ)     X Y E σ √ σ √ (X,Y )∼N(0,Σ) Σ11 Σ22     p = Σ11 Σ22 E σ X̃ σ Ỹ (X̃,Ỹ )∼N(0,Σ̃)   p Σ12 = . Σ11 Σ22 σ̂ √ Σ11 Σ22 p = Σ11 Σ22 which concludes the proof. For brevity, we henceforth drop the argument from σ̄(Σ) and use the abbreviation σ̄. In order to show that σ̄ is (1 + o(γ))-Lipschitz w.r.t. the ∞-norm it is enough to show that for every Σ ∈ Mγ+ we have, k∇σ̄k1 = ∂ σ̄ ∂ σ̄ ∂ σ̄ + + ≤ 1 + o(γ) . ∂Σ12 ∂Σ11 ∂Σ22 22 (10) First, Note that ∂ σ̄/∂Σ11 and ∂ σ̄/∂Σ22 have the same sign, hence, k∇σ̄k1 = ∂ σ̄ ∂ σ̄ ∂ σ̄ + + . ∂Σ12 ∂Σ11 ∂Σ22 Next we get that, ∂ σ̄ ∂Σ22 ∂ σ̄ ∂Σ12 r   Σ12 Σ22 σ̂ √ − Σ11 Σ11 Σ22 r   1 Σ11 Σ12 = σ̂ √ − 2 Σ22 Σ11 Σ22   Σ12 0 = σ̂ √ . Σ11 Σ22 1 ∂ σ̄ = ∂Σ11 2 r   Σ12 Σ22 Σ12 0 √ σ̂ √ Σ11 Σ11 Σ22 Σ11 Σ22 r   1 Σ11 Σ12 Σ12 0 √ σ̂ √ 2 Σ22 Σ11 Σ22 Σ11 Σ22 1 2 We therefore get that the 1-norm of ∇σ̄ is,       Σ12 Σ12 Σ12 Σ12 1 Σ11 + Σ22 0 0 σ̂ √ σ̂ √ + σ̂ √ −√ . k∇σ̄k1 = √ 2 Σ11 Σ22 Σ11 Σ22 Σ11 Σ22 Σ11 Σ22 Σ11 Σ22 Σ11 +Σ22 The gradient of 12 √ at (Σ11 , Σ22 ) = (1, 1) is (0, 0). Therefore, from the mean value Σ11 Σ22 Σ11 +Σ22 1√ theorem we get, 2 Σ11 Σ22 = 1 + o(γ). Furthermore, σ̂, σ̂ 0 and √ΣΣ1112Σ22 are bounded by 1 in absolute value. Hence, we can write,       Σ12 Σ12 Σ12 Σ12 0 0 σ̂ √ + σ̂ √ −√ + o(γ) . k∇σ̄k1 = σ̂ √ Σ11 Σ22 Σ11 Σ22 Σ11 Σ22 Σ11 Σ22 Finally, if we let t = √ Σ12 , Σ11 Σ22 we can further simply the expression for ∇σ̄, k∇σ̄(Σ)k1 = |σ̂(t) − tσ̂ 0 (t)| + |σ̂ 0 (t)| + o(γ) √ cos−1 (t) 1 − t2 +1− + o(γ) . = π π √ −1 Finally, the proof is obtained from the fact that the function f (t) = 1−t + 1 − cos π (t) π satisfies 0 ≤ f (t) ≤ 1 for every t ∈ [−1, 1]. Indeed, it is simple to verify that f (−1) = 0 and f (1) = 1. Hence, it suffices to show that f 0 is non-negative in [−1, 1] which is indeed the case since, r 1 1−t 1 1−t 0 f (t) = √ = ≥ 0. π 1 − t2 π 1+t 9.2 2 Proofs of Thms. 2 and 3 We start by an additional theorem which serves as a simple stepping stone for proving the aforementioned main theorems. 23 Theorem Pd−1 i 14. Let S be a skeleton with (α, β, γ)-decent activations, 0 <  ≤ γ, and Bd = i=0 β . Let w be a random initialization of the network N = N (S, r) with   2 2 2α Bdepth(S) log 8|S| δ . r≥ 2  Then, for every x, y with probability of at least 1 − δ, it holds that |κw (x, y) − κS (x, y)| ≤  . Before proving the theorem we show that together with Lemmas 12 and 13, Theorems 2 and 3 follow from Theorem 14. We restate them as corollaries, prove them, and then proceed to the proof of Theorem 14. Corollary 15. Let S be a skeleton with C-bounded activations. Let w be a random initialization of N = N (S, r) with   4 depth(S)+1 (4C ) log 8|S| δ r≥ . 2  Then, for every x, y, w.p. ≥ 1 − δ, |κw (x, y) − κS (x, y)| ≤  . Proof. From Lemma 12, for all γ > 0, each activation is (C 2 , 2C 2 , γ)-decent. By Theorem 14, it suffices to show that  2 depth(S)−1 X 2 2 C2  (2C 2 )i  ≤ (4C 4 )depth(S)+1 . i=0 The sum of can be bounded above by, depth(S)−1 X i=0 (2C 2 )i = (2C 2 )depth(S) − 1 (2C 2 )depth(S) ≤ . 2C 2 − 1 C2 Therefore, we get that,  2 depth(S)−1 X 2 2C 4 (4C 4 )depth(S) 2 C2  (2C 2 )i  ≤ ≤ (4C 4 )depth(S)+1 , 4 C i=0 which concludes the proof. 24 Corollary 16. Let S be a skeleton with ReLU activations, and w a random initialization of 8|S| depth2 (S) log( δ ) 1 N (S, r) with r ≥ c1 . For all x, y and  ≤ min(c2 , depth(S) ), w.p. ≥ 1 − δ, 2 |κw (x, y) − κS (x, y)| ≤  Here, c1 , c2 > 0 are universal constants. Proof. From Lemma 13, each activation is (αReLU , 1 + o(), )-decent. By Theorem 14, it is enough to show that depth(S)−1 X (1 + o())i = O(depth(S)) . i=0 This claim follows from the fact that (1 + o())i ≤ eo()depth(S) as long as i ≤ depth(S). Since we assume that  ≤ 1/depth(S), the expression is bounded by e for sufficiently small . We next prove Theorem 14. Proof. (Theorem 14) For a node u ∈ S we denote by Ψu,w : X → Rr the normalized representation of S’s sub-skeleton rooted at u. Analogously, κu,w denotes the empirical kernel of that network. When u is the output node of S we still use Ψw and κw for Ψu,w and κu,w . Given two fixed x, y ∈ X and a node u ∈ S, we denote     κu,w (x, x) κu,w (x, y) κu (x, x) κu (x, y) u u Kw = , K = κu,w (x, y) κu,w (y, y) κu (x, y) κu (y, y) P P v v v∈in(u) K v∈in(u) Kw ←u ←u , K = . Kw = |in(u)| |in(u)| For a matrix K ∈ M+ and a function f : M+ → R, we denote     K11 K11 f (K) f K11 K11  p    f (K) =  K22 K22  f (K) f K22 K22 Note that Ku = σ̄up (K←u ). We say that a node u ∈ S, is well-initialized if u kKw − K u k∞ ≤  Bdepth(u) . Bdepth(S) (11) Here, we use the convention that B0 = 0. It is enough to show that with probability of at least ≥ 1 − δ all nodes are well-initialized. We first note that input nodes are well-initialized u by construction since Kw = Ku . Next, we show that given that all incoming nodes for a certain node are well-initialized, then w.h.p. the node is well-initialized as well. Claim 3. Assume that all the nodes in in(u) are well-initialized. Then, the node u is wellδ initialized with probability of at least 1 − |S| . 25 u Proof. It is easy to verify that Kw is the empirical covariance matrix of r independent ←u variables distributed according to (σ(X), σ(Y )) where (X, Y ) ∼ N (0, Kw ). Given the assumption that all nodes incoming to u are well-initialized, we have, P P v v K w v∈in(v) K v∈in(v) ←u ←u − kKw − K k∞ = |in(v)| |in(v)| ∞ X 1 v v kKw − K k∞ (12) ≤ |in(v)| v∈in(v) ≤  Bdepth(u)−1 . Bdepth(S) ←u Further, since  ≤ γ then Kw ∈ Mγ+ . Using the fact that σu is (α, β, γ)-decent and that 8|S| 2 2α2 Bdepth(S) log( δ ) δ r≥ , , we get that w.p. of at least 1 − |S| 2  u ←u kKw − σ̄up (Kw )k∞ ≤  Bdepth(S) . (13) Finally, using (12) and (13) along with the fact that σ̄ is β-Lipschitz, we have u u kKw − Ku k∞ = kKw − σ̄up (K←u )k∞ u ←u ←u ≤ kKw − σ̄up (Kw )k∞ + kσ̄up (Kw ) − σ̄up (K←u )k∞  ←u + β kKw − K←u k∞ ≤ Bdepth(S) Bdepth(u)−1 Bdepth(u)  + β =  . ≤ Bdepth(S) Bdepth(S) Bdepth(S) We are now ready to conclude the proof. Let u1 , . . . , u|S| be an ordered list of the nodes in S in accordance to their depth, starting with the shallowest nodes, and ending with the output node. Denote by Aq the event that u1 , . . . , uq are well-initialized. We need to show qδ . that Pr(A|S| ) ≥ 1 − δ. We do so using an induction on q for the inequality Pr(Aq ) ≥ 1 − |S| Indeed, for q = 1, . . . , n, uq is an input node and Pr(Aq ) = 1. Thus, the base of the induction δ hypothesis holds. Assume that q > n. By Claim (3) we have that Pr(Aq |Aq−1 ) ≥ 1 − |S| . Finally, from the induction hypothesis we have,    δ (q − 1)δ qδ Pr(Aq ) ≥ Pr(Aq |Aq−1 ) Pr(Aq−1 ) ≥ 1 − 1− ≥1− . |S| |S| |S| 9.3 Proofs of Thms. 4 and 5 Theorems 4 and 5 follow from using the following lemma combined with Theorems 2 and 3. When we apply the lemma, we always focus on the special case where one of the kernels is constant w.p. 1. 26 Lemma 17. Let D be a distribution on X × Y, ` : R × Y → R be an L-Lipschitz loss, δ > 0, and κ1 , κ2 : X × X → R be two independent random kernels sample from arbitrary distributions. Assume that the following properties hold. • For some C > 0, ∀x ∈ X , κ1 (x, x), κ2 (x, x) ≤ C. 2  δ • ∀x, y ∈ X , Prκ1 ,κ2 (|κ1 (x, y) − κ2 (x, y)| ≥ ) ≤ δ̃ for δ̃ < c2 C 2 log 2 ( 1δ ) where c2 > 0 is a universal constant. √ Then, w.p. ≥ 1 − δ over√the choices of κ1 , κ2 , for every f1 ∈ HκM1 there is f2 ∈ Hκ22M such that LD (f2 ) ≤ LD (f1 ) + 4LM . To prove the above lemma, we state another lemma below followed by a basic measure concentration result. d ∗ d Lemma 18. Let Pmx1 , . . . , xm ∈ R , w ∈ R and  > 0. There are weights α1 , . . . , αm such that for w := i=1 αi xi we have, P ∗ • L(w) := m1 m i=1 |hw, xi i − hw , xi i| ≤  P kw∗ k2 • i |αi | ≤  • kwk ≤ kw∗ k Proof. Denote M = kw∗ k, C = maxi kxi k, and yi = hw∗ , xi i. Suppose that we run stochastic gradient decent on the sample {(x1 , y1 ), . . . , (xm , ym )} w.r.t. the loss L(w), with learning rate η = C2 , and with projections onto the ball of radius M . Namely, we start with w0 = 0 and at each iteration t ≥ 1, we choose at random it ∈ [m] and perform the update, ( wt−1 − ηxit hwt−1 , xit i ≥ yit w̃t = wt−1 + ηxit hwt−1 , xit i < yit ( w̃t kw̃t k ≤ M wt = M w̃t kw̃t k > M kw̃t k 2 2 After T = M2C iterations the loss in expectation would be at most  (see for instance 2 2 Chapter 14 in [53]). In particular, there exists a sequence of at most M2C gradient steps that attains a solution w with L(w) ≤ . Each update adds or subtracts C2 xi from the current solution. Hence w can be written as a weighted sum of xi ’s where the sum of each 2 coefficient is at most T C2 = M . Theorem 19 (Bartlett and Mendelson [8]). Let D be a distribution over X ×Y, ` : R×Y → R a 1-Lipschitz loss, κ : X × X → R a kernel, and , δ > 0. Let S = {(x1 , y1 ), . . . , (xm , ym )} M 2 maxx∈X κ(x,x)+log( 1δ ) be i.i.d. samples from D such that m ≥ c where c is a constant. Then, 2 with probability of at least 1 − δ we have, ∀f ∈ HκM , |LD (f ) − LS (f )| ≤  . 27 √ Proof. (of Lemma 17) By rescaling `, we can assume w.l.o.g that L = 1. Let 1 = M and S = {(x1 , y1 ), . . . , (xm , ym )} ∼ D be i.i.d. samples which are independent of the choice of CM 2 log( 1δ ) C log( 1δ ) κ1 , κ2 . By Theorem 19, for a large enough constant c, if m = c = c , then 2   w.p. ≥ 1 − δ 2 1 over the choice of the samples we have, √ ∀f ∈ HκM1 ∪ Hκ22M , |LD (f ) − LS (f )| ≤ 1 Now, if we choose c2 = 2c12 then w.p. ≥ 1 − m2 δ̃ ≥ 1 − and the kernel), we have that δ 2 (14) (over the choice of the examples ∀i, j ∈ [m], |κ1 (xi , xj ) − κ2 (xi , xj )| <  . (15) In particular, w.p. ≥ 1 − δ (14) and (15) hold and therefore it suffices to prove the conclusion of the theorem under these conditions. Indeed, let Ψ1 , Ψ2 : X → H be two mapping from X to a Hilbert space H so that κi (x, y) = hΨ Ψi (y)i. Let f1 ∈ HκM1 . By lemma 18 there Pi (x), m are α1 , . . . , αm so that for the vector w = i=1 α1 Ψ1 (xi ) we have m 1 X |hw, Ψ1 (xi )i − f1 (xi )| ≤ 1 , kwk ≤ M , m i=1 and m X (16) M2 |αi | ≤ . (17) 1 i=1 P Consider the function f2 ∈ H2 defined by f2 (x) = m i=1 α1 hΨ2 (xi ), Ψ2 (x)i. We note that kf2 k2Hk 2 ≤ m X 2 αi Ψ2 (xi ) i=1 = ≤ m X i,j=1 m X αi αj κ2 (xi , xj ) αi αj κ1 (xi , xj ) +  i,j=1 m X |αi αj | i,j=1 m X 2 = kwk +  !2 |αi | i=1 ≤ M2 +  M4 = 2M 2 . 21 Denote by f˜1 (x) = hw, Ψ1 (x)i and note that for every i ∈ [m] we have, |f˜1 (xi ) − f2 (xi )| = m X ≤  αj (κ1 (xi , xj ) − κ2 (xi , xj )) j=1 m X |αi | ≤  i=1 28 M2 = 1 . 1 Finally, we get that, LD (f2 ) ≤ LS (f2 ) + 1 m 1 X = ` (f2 (xi ), yi ) + 1 m i=1 m  1 X ˜ ≤ ` f1 (xi ), yi + 1 + 1 m i=1 m 1 X ≤ ` (f1 (xi ), yi ) + |f˜1 (xi ) − f1 (xi )| + 21 m i=1 m ≤ 1 X ` (f1 (xi ), yi ) + 31 m i=1 ≤ LS (f1 ) + 31 ≤ LD (f1 ) + 41 , which concludes the proof. 10 Discussion Role of initialization and training. Our results surface the question of the extent to which random initialization accounts for the success of neural networks. While we mostly leave this question for future research, we would like to point to empirical evidence supporting the important role of initialization. First, numerous researchers and practitioners demonstrated that random initialization, similar to the scheme we analyze, is crucial to the success of neural network learning (see for instance [20]). This suggests that starting from arbitrary weights is unlikely to lead to a good solution. Second, several studies show that the contribution of optimizing the representation layers is relatively small [49, 26, 44, 43, 15]. For example, competitive accuracy on CIFAR-10, STL-10, MNIST and MONO datasets can be achieved by optimizing merely the last layer [36, 49]. Furthermore, Saxe et al. [49] show that the performance of training the last layer is quite correlated with training the entire network. The effectiveness of optimizing solely the last layer is also manifested by the popularity of the random features paradigm [46]. Finally, other studies show that the metrics induced by the initial and fully trained representations are not substantially different. Indeed, Giryes et al. [19] demonstrated that for the MNIST and CIFAR-10 datasets the distances’ histogram of different examples barely changes when moving from the initial to the trained representation. For the ImageNet dataset the difference is more pronounced yet still moderate. The role of architecture. By using skeletons and compositional kernel spaces, we can reason about functions that the network can actually learn rather than merely express. This may explain in retrospect past architectural choices and potentially guide future choices. Let us consider for example the task of object recognition. It appears intuitive, and is supported by visual processing mechanisms in mammals, that in order to perform object recognition, 29 the first processing stages are confined to local receptive fields. Then, the result of the local computations are applied to detect more complex shapes which are further combined towards a prediction. This processing scheme is naturally expressed by convolutional skeletons. A two dimensional version of Example 1 demonstrates the usefulness of convolutional networks for vision and speech applications. The rationale we described above was pioneered by LeCun and colleagues [32]. Alas, the mere fact that a network can express desired functions does not guarantee that it can actually learn them. Using for example Barron’s theorem [7], one may claim that visionrelated functions are expressed by fully connected two layer networks, but such networks are inferior to convolutional networks in machine vision applications. Our result mitigates this gap. First, it enables use of the original intuition behind convolutional networks in order to design function spaces that are provably learnable. Second, as detailed in Example 1, it also explains why convolutional networks perform better than fully connected networks. The role of other architectural choices. In addition to the general topology of the network, our theory can be useful for understanding and guiding other architectural choices. We give two examples. First, suppose that a skeleton S has a fully connected layer with the dual activation σ̂1 , followed by an additional fully connected layer with dual activation σ̂2 . It is straightforward to verify that if these two layers are replaced by a single layer with dual activation σ̂2 ◦ σ̂1 , the corresponding compositional kernel space remains the same. This simple observation can be useful in potentially saving a whole layer in the corresponding networks. The second example is concerned with the ReLU activation, which is one of the most common activations used in practice. Our theory suggests a somewhat surprising explanation for its usefulness. First, the dual kernel of the ReLU activation enables expression of non-linear functions. However, this property holds true for many activations. Second, Theorem 3 shows that even for quite deep networks with ReLU activations, random initialization approximates the corresponding kernel. While we lack a proof at the time of writing, we conjecture that this property holds true for many other activations. What is then so special about the ReLU? Well, an additional property of the ReLU is being positive homogeneous, i.e. satisfying σ(ax) = aσ(x) for all a ≥ 0. This fact makes the ReLU activation robust to small perturbations in the distribution used for initialization. Concretely, if we multiply the variance of the random weights by a constant, the distribution of the generated representation and the space Hw remain the same up to a scaling. Note moreover that training algorithms are sensitive to the initialization. Our initialization is very similar to approaches used in practice, but encompasses a small “correction”, in the form of a multiplication by a small constant which depends on the activation. For most activations, ignoring this correction, especially in deep networks, results in a large change in the generated representation. The ReLU activation is more robust to such changes. We note that similar reasoning applies to the max-pooling operation. 30 Future work. Though our formalism is fairly general, we mostly analyzed fully connected and convolutional layers. Intriguing questions remain, such as the analysis of max-pooling and recursive neural network components from the dual perspective. On the algorithmic side, it is yet to be seen whether our framework can help in understanding procedures such as dropout [54] and batch-normalization [25]. Beside studying existing elements of neural network learning, it would be interesting to devise new architectural components inspired by duality. More concrete questions are concerned with quantitative improvements of the main results. In particular, it remains open whether the dependence on 2O(depth(S)) can be made polynomial and the quartic dependence on 1/, R, and L can be improved. In addition to being interesting in their own right, improving the bounds may further underscore the effectiveness of random initialization as a way of generating low dimensional embeddings of compositional kernel spaces. Randomly generating such embeddings can be also considered on its own, and we are currently working on design and analysis of random features a la Rahimi and Recht [45]. Acknowledgments We would like to thank Yossi Arjevani, Elad Eban, Moritz Hardt, Elad Hazan, Percy Liang, Nati Linial, Ben Recht, and Shai Shalev-Shwartz for fruitful discussions, comments, and suggestions. References [1] A. Andoni, R. Panigrahy, G. Valiant, and L. Zhang. Learning polynomials with neural networks. In Proceedings of the 31st International Conference on Machine Learning, pages 1908–1916, 2014. [2] F. Anselmi, L. Rosasco, C. Tan, and T. Poggio. Deep convolutional networks are hierarchical kernel machines. arXiv:1508.01084, 2015. [3] M. Anthony and P. Bartlet. Neural Network Learning: Theoretical Foundations. Cambridge University Press, 1999. [4] S. Arora, A. Bhaskara, R. Ge, and T. Ma. Provable bounds for learning some deep representations. In Proceedings of The 31st International Conference on Machine Learning, pages 584–592, 2014. [5] F. Bach. Breaking the curse of dimensionality with convex neural networks. arXiv:1412.8690, 2014. [6] F. Bach. On the equivalence between kernel quadrature rules and random feature expansions. 2015. [7] A.R. Barron. Universal approximation bounds for superposition of a sigmoidal function. IEEE Transactions on Information Theory, 39(3):930–945, 1993. 31 [8] P. L. Bartlett and S. Mendelson. Rademacher and Gaussian complexities: Risk bounds and structural results. Journal of Machine Learning Research, 3:463–482, 2002. [9] P.L. Bartlett. The sample complexity of pattern classification with neural networks: the size of the weights is more important than the size of the network. IEEE Transactions on Information Theory, 44(2):525–536, March 1998. [10] E.B. Baum and D. Haussler. What size net gives valid generalization? Neural Computation, 1(1):151–160, 1989. [11] L. Bo, K. Lai, X. Ren, and D. Fox. Object recognition with hierarchical kernel descriptors. In Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on, pages 1729–1736. IEEE, 2011. [12] J. Bruna and S. Mallat. Invariant scattering convolution networks. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(8):1872–1886, 2013. [13] Y. Cho and L.K. Saul. Kernel methods for deep learning. In Advances in neural information processing systems, pages 342–350, 2009. [14] A. Choromanska, M. Henaff, M. Mathieu, G. Ben Arous, and Y. LeCun. The loss surfaces of multilayer networks. In AISTATS, pages 192–204, 2015. [15] D. Cox and N. Pinto. Beyond simple features: A large-scale feature search approach to unconstrained face recognition. In Automatic Face & Gesture Recognition and Workshops (FG 2011), 2011 IEEE International Conference on, pages 8–15. IEEE, 2011. [16] A. Daniely. Complexity theoretic limitations on learning halfspaces. In STOC, 2016. [17] A. Daniely and S. Shalev-Shwartz. Complexity theoretic limitations on learning DNFs. In COLT, 2016. [18] A. Daniely, N. Linial, and S. Shalev-Shwartz. From average case complexity to improper learning complexity. In STOC, 2014. [19] R. Giryes, G. Sapiro, and A.M. Bronstein. Deep neural networks with random gaussian weights: A universal classification strategy? arXiv preprint arXiv:1504.08291, 2015. [20] X. Glorot and Y. Bengio. Understanding the difficulty of training deep feedforward neural networks. In International conference on artificial intelligence and statistics, pages 249–256, 2010. [21] K. Grauman and T. Darrell. The pyramid match kernel: Discriminative classification with sets of image features. In Tenth IEEE International Conference on Computer Vision, volume 2, pages 1458–1465, 2005. [22] M. Hardt, B. Recht, and Y. Singer. Train faster, generalize better: Stability of stochastic gradient descent. arXiv:1509.01240, 2015. 32 [23] Z.S. Harris. Distributional structure. Word, 1954. [24] T. Hazan and T. Jaakkola. Steps toward deep kernel methods from infinite neural networks. arXiv:1508.05133, 2015. [25] S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv:1502.03167, 2015. [26] K. Jarrett, K. Kavukcuoglu, M. Ranzato, and Y. LeCun. What is the best multi-stage architecture for object recognition? In Computer Vision, 2009 IEEE 12th International Conference on, pages 2146–2153. IEEE, 2009. [27] P. Kar and H. Karnick. Random feature maps for dot product kernels. arXiv:1201.6530, 2012. [28] R.M. Karp and R.J. Lipton. Some connections between nonuniform and uniform complexity classes. In Proceedings of the twelfth annual ACM symposium on Theory of computing, pages 302–309. ACM, 1980. [29] M. Kearns and L.G. Valiant. Cryptographic limitations on learning Boolean formulae and finite automata. In STOC, pages 433–444, May 1989. [30] A.R. Klivans and A.A. Sherstov. Cryptographic hardness for learning intersections of halfspaces. In FOCS, 2006. [31] A. Krizhevsky, I. Sutskever, and G.E. Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097–1105, 2012. [32] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11):2278–2324, 1998. [33] Y. LeCun, Y. Bengio, and G. Hinton. Deep learning. Nature, 521(7553):436–444, 2015. [34] O. Levy and Y. Goldberg. Neural word embedding as implicit matrix factorization. In Advances in Neural Information Processing Systems, pages 2177–2185, 2014. [35] R. Livni, S. Shalev-Shwartz, and O. Shamir. On the computational efficiency of training neural networks. In Advances in Neural Information Processing Systems, pages 855–863, 2014. [36] J. Mairal, P. Koniusz, Z. Harchaoui, and Cordelia Schmid. Convolutional kernel networks. In Advances in Neural Information Processing Systems, pages 2627–2635, 2014. [37] T. Mikolov, I. Sutskever, K. Chen, G.S. Corrado, and J. Dean. Distributed representations of words and phrases and their compositionality. In NIPS, pages 3111–3119, 2013. 33 [38] R.M. Neal. Bayesian learning for neural networks, volume 118. Springer Science & Business Media, 2012. [39] B. Neyshabur, R. R Salakhutdinov, and N. Srebro. Path-SGD: Path-normalized optimization in deep neural networks. In Advances in Neural Information Processing Systems, pages 2413–2421, 2015. [40] B. Neyshabur, N. Srebro, and R. Tomioka. Norm-based capacity control in neural networks. In COLT, 2015. [41] R. O’Donnell. Analysis of boolean functions. Cambridge University Press, 2014. [42] J. Pennington, F. Yu, and S. Kumar. Spherical random features for polynomial kernels. In Advances in Neural Information Processing Systems, pages 1837–1845, 2015. [43] N. Pinto and D. Cox. An evaluation of the invariance properties of a biologicallyinspired system for unconstrained face recognition. In Bio-Inspired Models of Network, Information, and Computing Systems, pages 505–518. Springer, 2012. [44] N. Pinto, D. Doukhan, J.J. DiCarlo, and D.D. Cox. A high-throughput screening approach to discovering good forms of biologically inspired visual representation. PLoS Computational Biology, 5(11):e1000579, 2009. [45] A. Rahimi and B. Recht. Random features for large-scale kernel machines. In NIPS, pages 1177–1184, 2007. [46] A. Rahimi and B. Recht. Weighted sums of random kitchen sinks: Replacing minimization with randomization in learning. In Advances in neural information processing systems, pages 1313–1320, 2009. [47] I. Safran and O. Shamir. On the quality of the initial basin in overspecified neural networks. arxiv:1511.04210, 2015. [48] S. Saitoh. Theory of reproducing kernels and its applications. Longman Scientific & Technical England, 1988. [49] A. Saxe, P.W. Koh, Z. Chen, M. Bhand, B. Suresh, and A.Y. Ng. On random weights and unsupervised feature learning. In Proceedings of the 28th International Conference on Machine Learning (ICML-11), pages 1089–1096, 2011. [50] I.J. Schoenberg et al. Positive definite functions on spheres. Duke Mathematical Journal, 9(1):96–108, 1942. [51] B. Schölkopf, P. Simard, A. Smola, and V. Vapnik. Prior knowledge in support vector kernels. In Advances in Neural Information Processing Systems 10, pages 640–646. MIT Press, 1998. 34 [52] H. Sedghi and A. Anandkumar. Provable methods for training neural networks with sparse connectivity. arXiv:1412.2693, 2014. [53] S. Shalev-Shwartz and S. Ben-David. Understanding Machine Learning: From Theory to Algorithms. Cambridge University Press, 2014. [54] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov. Dropout: A simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research, 15(1):1929–1958, 2014. [55] I. Sutskever, O. Vinyals, and Q.V. Le. Sequence to sequence learning with neural networks. In Advances in neural information processing systems, pages 3104–3112, 2014. [56] C.K.I. Williams. Computation with infinite neural networks. pages 295–301, 1997. 35
2cs.AI
1 Centralized versus Decentralized Infrastructure Networks arXiv:1510.08792v1 [physics.soc-ph] 29 Oct 2015 Paul D. H. Hines, Senior Member, IEEE, Seth Blumsack, Member, IEEE, and Markus Schläpfer Abstract—While many large infrastructure networks, such as power, water, and natural gas systems, have similar physical properties governing flows, these systems tend to have distinctly different sizes and topological structures. This paper seeks to understand how these different size-scales and topological features can emerge from relatively simple design principles. Specifically, we seek to describe the conditions under which it is optimal to build decentralized network infrastructures, such as a microgrid, rather than centralized ones, such as a large highvoltage power system. While our method is simple it is useful in explaining why sometimes, but not always, it is economical to build large, interconnected networks and in other cases it is preferable to use smaller, distributed systems. The results indicate that there is not a single set of infrastructure cost conditions under which optimally-designed networks will have highly centralized architectures. Instead, as costs increase we find that average network sizes increase gradually according to a power-law. When we consider the reliability costs, however, we do observe a transition point at which optimally designed networks become more centralized with larger geographic scope. As the losses associated with node and edge failures become more costly, this transition becomes more sudden. I. I NTRODUCTION One of the key goals of the United States and its allies during the United States/NATO conflict in Afghanistan was the improvement of infrastructure, particularly electricity infrastructure, in order to build good will among the Afghan people. One of these major infrastructure projects was the upgrade of the Kajaki Hydroelectric plant from 33 to 51 MW, a project designed to bring additional power to Kandahar, about 80 km to the southeast. However, moving the necessary heavy equipment from Kandahar to Kajaki through hostile territory proved to be one of the most difficult and costly operations of the Afghanistan conflict [1]. And in the end (at least as of late 2015) the project was never completed because it proved impossible to move the concrete necessary to complete the project. At around the same time, the U.S. Agency for International Development (USAID) embarked on a less ambitious project to install several smaller (10 MW) diesel power plants in the outskirts of Kandahar. These plants are more expensive P.H. was supported by NSF awards ECCS-1254549 and DGE-1144388, and DTRA award HDTRA110-1-0088. S.B. acknowledges support from NSF award CNS-1331761. M.S. was supported by the Army Research Office Minerva Programme (grant no. W911NF-12-1-0097). P. Hines is with the University of Vermont, School of Engineering and Complex Systems Center, Burlington, USA, [email protected] S. Blumsack is with Penn State University, University Park PA, USA, [email protected] M. Schläpfer is with the Santa Fe Institute, Santa Fe, USA, [email protected] to operate given that they require diesel fuel, but because they were built close to the city, they were not nearly as complicated to install and continue to provide relatively reliable power for residents in that portion of the city [1]. While there are many factors that contributed to the demise of the Kajaki Hydroelectric plant and the relative success of the more distributed diesel plants, it seems reasonable to ask whether a solution that is less reliant on long-distance transmission is, under these particular conditions, fundamentally better. More generally, one might surmise that there exist general conditions under which decentralized solutions are fundamentally better. But what are those conditions? Consider a second example: water distribution networks. In the United States alone there are more than 150,000 public drinking water networks that serve at least 25 people [2]. In contrast, there are only 3 power networks: the Eastern, Western, and Texas interconnections. Why is it that in the case of drinking water, smaller, more decentralized networks seem to be optimal, whereas for electric power, larger systems that span continents seem to be preferable? Both systems have similar physical properties that govern flows. Both systems transport largely interchangeable goods: one electron is as good as another, just as one water molecule is as good as another (given appropriate standards for cleanliness). However, these two systems have fundamentally different size scales. A drinking water system serves, on average, 2000 people. A power network serves, on average, 100,000,000 people. Motivated by these, and many other, examples, this paper seeks to identify conditions under which it may be preferable to build and maintain large, centralized, interconnected infrastructure networks, versus constructing smaller, decentralized networks that effectively operate independently from one another. Large infrastructure systems are designed to deliver services in a way that balances a variety of potentially conflicting objectives including economic cost, environmental impact and reliability. These fundamental trade-offs become particularly challenging when societies face the potential for rapid infrastructure transitions. This paper is motivated by two such distinct global infrastructure transitions. The first transition is the growing push toward decentralized electric energy systems in more developed countries. The energy infrastructures in most industrialized countries have evolved into complex network structures [3]. However the growing movement toward the use of microgrids is a push back toward small, relatively independent systems [4]. The historical case for large interconnected systems (economies of scale in generation and transmission) and increased redundancy through interconnection is being challenged by falling costs 2 for distributed power generation [5], increased interest in smart micro-grids, and the insight that distributed systems may offer improved local reliability in some cases [6]. The second transition is the rapid growth of infrastructure, including electric power, in less developed countries [7]. Prior work has argued that for political, geographic and economic reasons, the greenfield build-out of highly interconnected electric power infrastructure may not be desirable in developingnation contexts, particularly in locations that are subject to elevated levels of stress [8]. While the contexts for infrastructure decisions in moredeveloped and less-developed nations differ, the basic question remains the same—given the need to build out power generation and delivery systems either incrementally (as in more-developed countries) or as a greenfield project (closer to the case for many less-developed nations), what mix of smallscale versus large-scale system architectures will best balance cost and reliability goals? Under what assumptions about cost, reliability and other factors would it be more advantageous to make either incremental or greenfield investments in decentralized system architecture? This paper seeks to understand the conditions under which the transformation of large-scale systems into multiple smaller-scale systems, or the greenfield construction of multiple smaller-scale systems to serve a large geographic area, would yield improvements in cost and other measures of performance. Our work is fundamentally concerned with the optimal planning of networks that deliver services or otherwise provide connectivity over physical space. As such, we model a single planner making optimal resource decisions, as distinct from game-theoretic approaches of network generation or the literature in random generation of synthetic networks [9], [10]. While this topic has been of interest to geographers since the 1960s [11], [12], spatial network design has emerged only more recently as an area of scientific research [13]. Many applications of spatial network analysis focus on traffic or transportation networks [14], [13], [15], [16], [17] or physical infrastructures that deliver information, such as the internet or mobile telephony [13], [18]. Others find that the constraints of geographic space can dramatically change the implications found in abstract network models [19], [20]. Research on the spatial aspects of network design or performance, as distinct from data-driven empirical investigations of spatial network structure, has largely focused in two areas. The first is how the cost of adding edges or otherwise connecting nodes in space influences network structure and design choices [13], [21]. The second strand utilizes known or theoretical spatial properties of networks to understand their performance in the case of attacks, failures or other contingency events [6], [17], [22]. We build on this extensive body of work, and add to its relevance for electrical networks, in two ways. The first is to embed some most salient properties of electric power networks (namely Kirchhoff’s Current Law) into the type of cost-driven spatial network design problem discussed in [13] and [21]. These properties are important for electric power networks specifically because while expansion costs may be straightforward to parametrize in terms of spatial distance, actual network flows are not so simply represented. Further, production costs in real electrical networks are heterogeneous by technology and in space, because of regional variations in resource endowments and technology choices. The second is to consider a design objective that incorporates the costs of network operation, network expansion, and network (un)reliability. While joint planning and operations models have been devised for incremental expansion decisions [23], [24], and for optimal topology control applications (e.g., [25], [26]), our approach is different in its consideration of a flexible greenfield infrastructure build problem that does not, for example, restrict infrastructure expansion options to predefined paths or represent branches as binary integer variables. The utility in our approach is for the discovery of more general principles describing the optimal geographic scope of network design. II. O PTIMAL I NFRASTRUCTURE N ETWORK D ESIGN Consider a system planner who has the task of designing (or modifying) an infrastructure system to provide a particular infrastructure product (water, natural gas, electricity, etc.) for a set of a set of n locations (towns, buildings, etc.). Each location i has some known demand, di , for the product and also has the ability to produce this product locally with an incremental production cost, ci , that varies with geography. In order to satisfy the demand at node i one can either produce locally at a cost of ci per unit, or build an interconnection to some nearby node, with the intention of satisfying di at a cost that is less than ci . Given a model of this sort we can ask a number of important questions. Under what conditions is it optimal to produce locally, rather than building interconnections? If the goal of the planner is to minimize overall cost, what type of network would one want to build? Should one build many small networks or one large one? Should the planner build a meshed network that allows redundancy, or a radial network that provides only one path between sources and sinks? In this section we introduce two relatively simple optimization models that allow one to address questions of this sort. Both models use a “greenfield” approach, in which we seek to find the optimal network configuration that satisfies the total demand for a particular infrastructure product, given a set of objectives and constraints. A. Basic model To start, we assume that each of the n locations is a vertex (v ∈ V ) that has coordinates xv , yv in some 2d space, demand dv , a per unit production cost of cv and a maximum potential production capacity gv . In addition we assume that there is a maximum feasible set of undirected edges e ∈ E that one might choose to build. For example one might allow into E all possible vertex pairs, thus allowing at most n(n − 1) edges. The cost of building any one particular edge ei↔j depends on two factors: the length of the edge q lei↔j = (xi − xj )2 + (yi − yj )2 (1) 3 and the cost of one unit length and one unit capacity of edge construction, w. Given these input data, the following formulation allows one to compute an “optimal” infrastructure network design. X √ X `e fe (2a) min cv gv + w n f ,f ,g v∈V e∈E s.t. 0 ≤ gv ≤ gv , ∀v fe ≥ 0, ∀e − fe ≤ fe ≤ fe , ∀e g − d = E| f (2b) (2c) (2d) (2e) where fe and fe are the undirected flow capacity and actual directed flow on √ edge e, gv is the actual amount of production at vertex v, w n is an interconnection cost parameter (cost per-unit length·capacity), and E is an m × n edge matrix with 1 and -1 on the rows indicating the two endpoints for each of m edges in the maximum feasible network. Our objective (2a) is to minimize the combined cost of production c| g and interconnection `| f , while satisfying constraints (2b)-(2e). Constraint (2b) defines locational production limits; (2c) ensures that we do not build negative quantities of interconnection capacity; (2d) constrains flows to be less than the chosen flow limits; and (2e) ensures that the net flow into and out of each vertex must be zero. It is important to note that the cost function (2a) is designed so that both the production and the edge construction cost terms grow linearly with n. In order to implement this, we first observe that (at least for the case of uniformly distributed node locations, see Sec. III-A) edge lengths `e fall with n according to: `e ∼ n−1/2 . As a result, ensuring linear √ growth n, thus of the edge cost term requires that we multiply by √ producing the term w0 = w n. Implied in this formulation are a number of important assumptions. First, we assume that interconnections can be built at any size scale and that construction costs scale linearly with the capacity of the edge. It is certainly possible to think of particular examples, such as transmission line construction, where costs are “lumpy,” such that building a 1 MW transmission line is more than 1/100 of the cost of building a 100 MW transmission line. However, if we consider that the edge might be either a large transmission line or a small distribution line, this assumption is not as obviously incorrect. And modeling lumpiness of this sort would require knowledge about the details of a particular infrastructure system at a particular place and time. In this paper we are more interested to identify general trends that appear in optimal infrastructure designs. Second, formulation (2) models a single snapshot of demand, whereas all real infrastructure systems have demand that varies in time. As a result the production cost term cv and the interconnection cost term w meld together the capital and operating costs associated with supplying the demand dv . Finally, we make the assumption that nodes do not include any storage, leading us to include constraint (2e), which is equivalent to Kirchhoff’s Current Law. Since our model aims to represent the long-term average operating pattern of a network, rather than short-term time-domain details, we argue that this assumption provides at least some insight, even for networks that do include some storage in them, such as water networks. Clearly, if one were wanting to design a particular infrastructure at a particular place and time, one would want to relax these assumptions and model additional details. However, this paper focuses on general trends that appear in optimal network designs. B. Considering reliability An obvious limitation in the formulation above is the complete disregard of reliability. In reality, reliability has an enormous role in the design of infrastructure systems. In a power system, for example, electric utilities frequently argue (in their rate-case filings) that the construction of a new transmission line is justified purely on reliability grounds. It is thus useful to understand what impact reliability considerations have on the topological structure of infrastructure networks. In order to model the impact of reliability we add a third term to our objective function (2a) to capture the cost of (un)reliability. In addition, we separate the production cost term to include separate terms for capital and operating costs, since one will sometimes want to build surplus production capacity to prepare for plausible component failures. With these additions to the objective and the associated constraints we get the following formulation. X √ X min (cv gv + kv gv ) + w n f e le f,f ,g,g v∈V e∈E r X | + 1 ∆d(p) n (3a) p∈P s.t. 0 ≤ gv ≤ gv , ∀v 0 ≤ |fe | ≤ fe , ∀e g − d = E| f ∆gv (pv ) = −gv , ∀v ∈ {1 . . . n} ∆fe (pe ) = −fe , ∀e ∈ {1 . . . m} |fe + ∆fe (p)| ≤ fe , ∀p ∈ P, ∀e ∈ E 0 ≤ gv + ∆gv (p) ≤ gv , ∀p ∈ P, ∀v ∈ V dv ≤ ∆dv (p) ≤ 0, ∀p ∈ P, ∀v ∈ V (g + ∆g(p)) − (d + ∆d(p)) = E| (f + ∆f (p)) (3b) (3c) (3d) (3e) (3f) (3g) (3h) (3i) (3j) In this formulation, (3a) is the modified objective, which now includes the reliability term. In this term, r is the reliability cost parameter that allows us to adjust the relative importance of reliability and ∆d(p) is the change (loss) of demand that results from perturbation p, which is one of the set of all perturbations, P . Eqns. (3b) and (3d) are equivalent to (2b)-(2e) in (2). Eqs. (3e) and (3f) cause specific node, pv , and edge, pe , failures that together make up the set of all perturbations, P , by forcing the production or flow to be zero for the appropriate edge/perturbation combination. While this approach could be used to model many different types of failures, here we consider P to be the set of all single component (either production unit or edge) outages. Eq. (3g) ensures that all flows are below edge capacities, after all 4 A 1 B 160 0.9 140 0.8 0.7 120 0.6 100 0.5 80 0.4 60 0.3 40 0.2 0.1 0 20 0 Fig. 1. Illustrative results for random placement of “towns” on a 2d plane. Panel A shows an initial, maximum feasible graph for a n = 200 network, with node colors indicating the production cost, cv , at each “town.” Panel B shows the optimal network configuration, after solving (2a)-(2e) for w = 0.001, with node colors indicating the amount of production at each node, gv , and edge thicknesses indicating the flow capacity. This optimal network has two connected components and thus an average component size of < ns >= n/2 = 100. perturbations. As a result there are m(n + m) constraints of this type within the formulation. Similarly, (3h) constrains production at every node after each perturbation (a total of n(m + n) constraints), to be below the chosen production capacities for each node. Eq. (3i) ensures that demand can only decrease, and only up to the total demand at node v, as a result of each p. Finally, (3j) enforces a nodal supply/demand balance after each perturbation. This forces the formulation to compute production, demand loss, and flow patterns that obey Kirchhoff’s Current Law for each disturbance in P . As a whole this formulation allows us to observe how network size and structure changes as we increase the relative importance of reliability. If r = 0, demand losses are effectively deemed irrelevant, and the problem will produce results that essentially identical to those obtained from 2. On the other hand, as r increases we hypothesize that networks are likely to become more meshed (rather than tree-like) and more likely to include surplus production capacity. It is not obvious, ex ante, how r will impact optimal network sizes. On the one hand, small, local networks will be more robust to edge failures and thus may be more optimal when reliability is very important. On the other hand, large interconnected systems provide a high level of redundancy, which also has tremendous value. In the sections that follow we explore this tradeoff. III. R ESULTS Here we explore the structural properties of the networks that emerge from formulations (2) and (3), under a variety of different cost and reliability assumptions. Section III-A explores the case of nodes distributed uniformly within a 2d square, ignoring reliability cost. Section III-B extends this to the reliability case and Sec. III-C applies our approach to data from the country of Senegal. A. Uniform distribution of load, ignoring reliability Consider the case of n nodes randomly located within a 1×1 2d square, such that each node location xv and yv is a uniform random variable in [0, 1]. Each of these nodes has a production cost cv that is also a uniform random variable in [0, 1] and a demand dv = 1. The set of feasible edges that we might decide to build (the feasible graph E) comes from initially setting E to be a modified form of the random geometric graph [27]. In this case, rather than connecting each node to nodes that lie within a fixed radius, for each node i an edge is added to connect from i to i’s k nearest (Euclidian) neighbors, while avoiding the addition of duplicate edges. Because it is possible that j is one of i’s k nearest neighbors, but i is not one of j’s k nearest neighbors, the resulting E has an average degree that is slightly larger than k. If one were to set k ≥ n − 1 the result would be the full graph of n(n − 1)/2 possible edges. However, optimizing over the full graph makes the resulting problem computationally impractical for all but the smallest problems. Instead the results in this section come from the (somewhat arbitrary) choice of k = 5. Figure 1 illustrates the application of this approach to a system with n = 200 nodes and w = 10−3 . From this figure a few observation can be made. First, we see that the algorithm tends to produce tree-like graphs in which the number of edges in each connected component, ms , is one less than the number of nodes in that component ns . The reason for this is fairly straightforward: creating a loop means that there are redundant paths between node pairs. Given a network with a loop, P can always reduce the edge-construction √ one cost term w n e∈E `e fe by removing one edge in the loop, without loss of functionality. As a result the graphs that result from (2) are always treelike, with precisely ms = ns − 1 edges in each component. Secondly, we see that there are 5 two connected components in the optimal network and thus an average of < ns >= n/2 = 100 nodes per component. In this illustration the two least-expensive production nodes had costs of cv1 = 0.0003 and cv2 = 0.0046, with the less expensive node supplying the larger sub-component. While it would have been feasible to connect the two components with a fairly short additional edge, supplying the whole network from the less expensive node v1 would have required building additional capacity along the spidery path from v1 to v2 . Doing so would have cost more than the additional cost of supplying the second component from the more expensive unit, a cost of ns2 (cv2 − cv1 ) = 0.149. For comparison purposes, the cost of building a length `e = 1 edge that could supply √ the whole of the 35 node second component would be 35w n = 0.495. Given that this approach can determine “optimal” network sizes, it is natural to ask how those network sizes change as the cost of building network infrastructure changes. For example, as w increases one might expect to see a relatively sudden phase transition from optimal networks that span the entire network to optimal networks with many small, decentralized sub-systems. In order to investigate this further and understand the cost conditions under which centralized, or decentralized, networks are optimal, we performed the following experiment. For several values of n, we computed optimal infrastructure networks using (2) over a range of w from 10−4 to 1. For each value of w we re-initialized the random node locations, the feasible network E and production costs cv , and computed the optimal network configuration using (2) 200 times. Then we recorded the mean size of the connected components < ns > over the 200 optimal networks. Mean component size, < ns > 1000 n n n n = = = = 100 200 500 1000 100 10 1 10−4 10−3 0.01 0.1 1 Interconnection cost, w Fig. 2. Mean connected component sizes as a function of the interconnection cost parameter w. For each of the four different network sizes considered, we find that component sizes scale approximately as w−2/3 . Figure 2 shows the resulting relationship between the edge construction cost, w and optimal component sizes. As one would expect, as network construction costs increase the size of the optimal network decreases. However, what is somewhat surprising is that the change from large networks to small networks does not occur suddenly as does the first-order phase transition from a solid ice to liquid water. Instead, this transition occurs gradually over several orders of magnitude in w. In fact, fitting the data in Figure 2 to a power-law distribution indicates that mean component sizes fall as < ns >∼ w−0.648 ∼ w−2/3 . (4) B. Uniform distribution of load, with reliability Next we turn our attention to understanding how the results described above change after modeling reliability costs as in (3). As in the simple model, we consider nodes scattered uniformly on a 2d plane. Also as before, we assume that each location has an overall production cost that is a uniform random variable in [0, 1], however unlike in the simple model we assume that this cost is split evenly between marginal and capital costs, cv and kv . Here we restrict our attention to the case of networks with n = 100 nodes, since solving (3) for larger systems leads to prohibitively large solution times. First we show a few illustrative results for a n = 50 node network (see Fig. 3) that clearly show the importance of reliability to network structure. For small values of r the solutions are nearly identical to what we get from the simple model: treelike network that satisfy demand with no redundancy. However as r increases, we find a (rather sudden) transition to meshed networks that include substantial supply redundancy. For the example in Fig. 3, the system P builds a network with total generation capacity equal to v∈V gv = 82.2, much more than what is needed to supply the 50 nodes in the system. Next we computed optimal networks for several different values of the reliability parameter r and interconnection costs w for 100 nodes networks For each value of w and r the random variables (xv , yv and cv ) were re-initialized 100 times in order to minimize variance.1 Figure 4 shows the resulting mean component sizes for various values of w and r. For w ≤ 0.001 and w ≥ 0.1 the network sizes do not change substantially with r. However for the intermediate case w = 0.01 we see a sudden jump in optimal network size as r passes 0.01. For small r the optimal size is around 20 nodes, whereas as reliability becomes more important the optimal network size increases toward the size of the network. We also see a more sensitive relationship between component sizes and w as r increases. For example, Fig. 4B shows that for r = 1 optimal network sizes suddenly decrease from full networks < ns >= n to relatively small ones < ns >∼ = 4, as w increases above 0.03. Not only do the optimal network sizes change, but the level of redundancy also changes with r and w. One way to measure the level of redundancy is by the number of edges constructed in the optimal network. In the tree-like networks that result from the simple model there are always fewer than n edges. But, as shown in Fig. 4, as r increases the number of edges in the optimal networks also increase, frequently quite suddenly. 1 A few of these cases failed to solve, which means that a few of the results are averaged over fewer than 100 trials 6 A r=0.1 1 0.9 B r=1 25 C 40 35 0.8 20 0.7 30 0.6 15 0.5 25 20 0.4 10 15 0.3 10 0.2 5 5 0.1 0 0 0 Fig. 3. Illustrating the impact of adding reliability to the optimal network construction formulation. Panel A shows the full feasible network E, with colors indicating production costs cv . Panel B shows the optimal network for w = 0.01 and r = 0.1, which is identical to the tree-like network that results from the simple model. Panel C shows the optimal network for w = 0.01 and r = 1, which shows the emergence of a meshed topology and substantial supply w = 0.0001 redundancy.w Colors = 0.001 in panels B and C indicate the amount of production capacity at each node. Number of edges built Mean component size, < ns > w = 0.01 w = 0.1 w=1 10 3 A B C D r r r r r 10 2 = 0.0001 = 0.001 = 0.01 = 0.1 =1 10 1 10 0 10 3 w w w w w = 0.0001 = 0.001 = 0.01 = 0.1 =1 r r r r r = 0.0001 = 0.001 = 0.01 = 0.1 =1 10 2 10 1 -4 10 10 -3 10 -2 10 -1 Reliability cost, r 10 0 10 -4 10 -3 10 -2 10 -1 10 0 Interconnection cost, w Fig. 4. Statistical results from the reliability model. Panels A and B show mean component sizes as a function of the reliability cost and interconnection cost parameters, r and w. Panels C and D show the average number of edges in the optimal network, also as a function of r and w. C. Senegal application As a real-world case study, we applied the infrastructure network design model to the geographic distribution of cities and rural towns in Senegal. About half of the countries’ population still has no access to electricity, and the electrification rate in rural areas is as low as 28% [28]. In contrast to Senegal’s electric power grid, the mobile communication infrastructure is highly developed, with 1666 mobile phone towers distributed across the country and a mobile phone penetration rate of almost 100%. This allows for the use of data from the mobile communication system as a robust prediction for the geographic distribution of electricity needs, see [28] for technical details. Data on the mobile phone infrastructure has been made available by ORANGE / SONATEL within the framework of the D4D Challenge [29]. Figure 5A depicts both the existing electricity infrastructure and the location of the mobile phone towers. In order to use data from the communication system to model demand for electricity, we first partitioned the country into a rectangular grid with cell size 5km × 5km. Following the approach in [28] we then used the number of cell phone towers that are located in each grid cell as a proxy for the relative electricity demand within that cell. Note that for the purpose of our analysis we are not interested in estimating absolute demand, but rather the relative amount of electricity that might be consumed in a particular location. The center points of the grid cells were used as locations xv , yv for the load nodes. As with the uniformly distributed vertices, we randomly assigned production costs to each node in the network, using the load locations described above, using uniform random variables over [0, 1]. Figure 5B shows the result of applying the basic optimization model (2) for the case of w = 0.01. Interestingly, without reliability constraints, our model produces tree-like networks that i) are similar in structure to what we found with randomly distributed vertices in Sec III-A and ii) closely resemble the tree-like topology of the existing electricity grid in Senegal. Moreover, we find that the scaling of optimal component sizes clearly follows the behavior previously (4) for synthetically generated load points (see Fig. 5C). This suggests that the power law decay in optimal network sizes is largely robust to changes in the geographic distribution of load locations. IV. C ONCLUSIONS This paper presents results from a model of optimal infrastructure network design for electric power production and delivery, with which we aimed to better understand the conditions under which electricity production and delivery were best managed through a highly connected network with large geographic reach, versus more localized networks with less global connectivity. Several interesting observations emerged. First we find, unsurprisingly, that as network construction costs 7 B 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 C Mean component size, < ns > A 103 10 2 10 1 0.2 0.1 0 100 -4 10 10-3 10-2 10-1 100 101 Interconnection cost, w Fig. 5. Application of the optimal network design model to the geographic distribution of electricity demand centers in Senegal. Panel A shows the existing high and medium voltage network together with the geographic distribution of the mobile phone towers (adopted from [28]). Panel B shows the optimal network for w = 0.01, given random production costs and ignoring reliability. Panel C shows the mean component size versus interconnection cost, w. increase the optimal size of infrastructure networks decreases and the local provision of electrical services becomes preferable. In the case where cost is the primary network design objective and reliability is not important, we unsurprisingly find that optimal topologies always have tree structure. More surprising, however, is the decrease in optimal network size occurs gradually, over several orders of magnitude in our network cost parameter, w. More specifically, we find that optimal network sizes decrease with the power-law ∼ w−2/3 . This same scaling property appears both in the random graphs that we generated for simulation purposes and when we apply our infrastructure design model to a spatial distribution of demand centers taken from data from the country of Senegal. This suggests that when cost is the most important design criterion there is no single optimal size for infrastructure networks, but rather that different sizes are likely to be optimal for different locations. The distinction between which type of network architecture (local or global) is “better” is not clear. We do find that this gradual scaling becomes a more sudden transition once reliability is added to the network design objectives. When the failure to supply demand after vertex or edge outages is deemed costly (large r), the optimal network is a single interconnected system that spans the entire network for a wide range of values for infrastructure costs w, and then a small increase in w causes the optimal network size to be small. Also, as the importance of reliability increases, the optimal network topology transitions from being a tree, in which there are no duplicate paths, to a meshed system with substantial redundancy. While the model that we used to reach these conclusions is simple, the results have important implications that may yield insight into difficult global problems such as the expansion of infrastructure in less developed countries and the potential transition from large power networks to smaller microgrids. R EFERENCES 1 G. Zorpette, “Re-engineering Afghanistan,” IEEE Spectrum, vol. 48, pp. 30–43, 30 September 2011. [2] “Factoids: Drinking water and ground water statistics for 2007,” tech. rep., US Environmental Protection Agency, March 2008. [3] E. Cotilla-Sanchez, P. D. H. Hines, C. Barrows, and S. Blumsack, “Comparing the topological and electrical structure of the North American electric power infrastructure,” IEEE Systems Journal, vol. 6, no. 4, 2012. [4] R. Lasseter, “Smart distribution: Coupled microgrids,” Proceedings of the IEEE, vol. 99, pp. 1074 – 1082, June 2011. [5] “Distributed generation energy technology capital costs,” tech. rep., National Energy Technology Laboratory, 2013. [6] H. Zerriffi, H. Dowlatabadi, and A. Farrell, “Incorporating stress in electric power systems reliability models,” Energy Policy, vol. 35, no. 1, pp. 61–75, 2007. [7] A. Zvoleff, A. S. Kocaman, W. T. Huh, and V. Modi, “The impact of geography on energy infrastructure costs,” Energy Policy, vol. 37, no. 10, pp. 4066–4078, 2009. [8] H. Zerriffi, Rural electrification: Strategies for distributed generation. Springer Science & Business Media, 2010. [9] A. Fabrikant, A. Luthra, E. Maneva, C. Papadimitriou, and S. Shenker, “On a network creation game,” in Proceedings of the Twenty-second Annual Symposium on Principles of Distributed Computing, PODC ’03, pp. 347–351, 2003. [10] Z. Wang, A. Scaglione, and R. Thomas, “Generating statistically correct random topologies for testing smart grid communication and control networks,” IEEE Trans. Smart Grid, vol. 1, pp. 28–39, June 2010. [11] K. Kanskey, Structure of transportation networks: relationships between network geometry and regional characteristics. University of Chicago Press, 1960. [12] P. Haggett and R. Chorley, Network analysis in geography. St. Martin’s Press, 1969. [13] M. T. Gastner and M. E. Newman, “The spatial structure of networks,” The European Physical Journal B - Condensed Matter and Complex Systems, vol. 49, pp. 247–252, Jan 2006. [14] W. Garrison, “Connectivity in the interstate highway system,” Papers in Regional Science, vol. 6, no. 1, pp. 121–137, 1960. [15] M. Kurant and P. Thiran, “Extraction and analysis of traffic and topologies of transportation networks,” Phys. Rev. E, vol. 74, p. 036114, Sep 2006. [16] S. Chan, R. Donner, and S. Lämmer, “Urban road networks – spatial networks with universal geometric features?,” The European Physical Journal B, vol. 84, no. 4, pp. 563–577, 2011. [17] S. Wilkinson, S. Dunn, and M. Shu, “The vulnerability of the European air traffic network to spatial hazards,” Natural Hazards, vol. 60, no. 3, p. 036114, 2012. [18] R. Lambiotte, V. Blondel, C. de Kerchove, E. Huens, C. Prieur, Z. Smoreda, and P. V. Dooren, “Geographical dispersal of mobile [1] 8 [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] communication networks,” Physica A: Statistical Mechanics and its Applications, vol. 387, pp. 5317 – 5325, 2008. M. Barthelemy, “Spatial networks,” Physics Reports, vol. 499, no. 1–3, pp. 1 – 101, 2011. A. Bashan, Y. Berezin, S. V. Buldyrev, and S. Havlin, “The extreme vulnerability of interdependent spatially embedded networks,” Nature Physics, vol. 9, pp. 667–672, 10 2013. M. Barthelemy, “Spatial networks,” Physics Reports, vol. 499, pp. 1– 101, Apr 2011. T. C. McAndre, C. M. Danforth, and J. P. Bagrow, “Robustness of spatial micronetworks,” Phys. Rev. E, vol. 91, p. 042813, Apr 2015. C. Unsihuay-Vila, J. Marangon-Lima, A. de Souza, J. Perez-Arriaga, and P. Balestrassi, “A model to long-yerm, multiarea, multistage, and integrated expansion planning of electricity and natural gas systems,” IEEE Trans. Power Systems, vol. 25, no. 2, pp. 1154–1168, 2010. C. B. Sanchez, R. Bent, S. Backhaus, S. Blumsack, H. Hijazi, and P. van Hentenryck, “Convex optimization for joint expansion planning of natural gas and power systems,” in 49th Hawai’i Int’l. Conf. Sys. Sci., pp. 1–10, Jan 2016. E. Fisher and a. M. F. R. O’Neill, “Optimal transmission switching,” IEEE Trans. Power Systems, vol. 23, pp. 1346–1355, Aug 2008. K. Hedman, M. Ferris, R. O’Neill, E. Fisher, and S. Oren, “Cooptimization of generation unit commitment and transmission switching with n-1 reliability,” IEEE Trans. Power Systems, vol. 25, pp. 1052– 1063, May 2010. J. Dall and M. Christensen, “Random geometric graphs,” Physical Review E, vol. 66, no. 1, p. 016121, 2002. E. Martinez-Cesena, P. Mancarella, M. Ndiaye, and M. Schläpfer, “Using mobile phone data for electricity infrastructure planning,” arXiv preprint arXiv:1504.03899, 2015. “Data For Development (D4D) Senegal Challenge.” http://www.d4d. orange.com. Accessed: 2015-08-30. ACKNOWLEDGEMENT The authors gratefully acknowledge the hospitality of the Santa Fe Institute in Santa Fe, NM, USA, where Hines and Blumsack were sabbatical visitors in 2014-2015 and where much of this work was completed. The authors would also like to acknowledge Christa Brelsford, Luis Bettencourt, and participants at the Santa Fe Institute workshop, “Reinventing the Grid” for helpful suggestions and discussions. AUTHOR BIOGRAPHIES Paul D. H. Hines (S‘96,M‘07,SM‘14) received the Ph.D. in Engineering and Public Policy from Carnegie Mellon University in 2007 and M.S. (2001) and B.S. (1997) degrees in Electrical Engineering from the University of Washington and Seattle Pacific University, respectively. He is currently an Associate Professor in the School of Engineering, and the L. Richard Fisher professor of electrical engineering, at the University of Vermont. Formerly he worked at the U.S. National Energy Technology Laboratory, the U.S. Federal Energy Regulatory Commission, Alstom ESCA, and for Black and Veatch. He currently serves as the chair of the Green Mountain Section of the IEEE, as the vice-chair of the IEEE PES Working Group on Cascading Failure, and as an Associate Editor for the IEEE Transactions on Smart Grid. He is a National Science Foundation CAREER award winner. Seth Blumsack (M ‘06) received the Ph.D. in Engineering and Public Policy from Carnegie Mellon University in 2006, the M.S. degree in Economics from Carnegie Mellon in 2003 and the B.A. degree in Mathematics and Economics from Reed College in 1998. He is currently an Associate Professor in the John and Willie Leone Family Department of Energy and Mineral Engineering at The Pennsylvania State University, Chair of the Energy Business and Finance program and is the John T. Ryan, Jr. Fellow in the College of Earth and Mineral Sciences. Markus Schläpfer received the Ph.D. in Mechanical and Process Engineering (2010) and the M.S. in Environmental Engineering (2003), both from ETH Zurich. He is currently a Postdoctoral Fellow at the Santa Fe Institute and a Research Affiliate at MIT’s Senseable City Lab.
3cs.SY
Submitted to the Annals of Statistics arXiv:1803.07793v1 [math.ST] 21 Mar 2018 HIGH-DIMENSIONAL COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS WITH APPLICATION TO SPHERICAL TEST By Jiang Hu∗,¶ , Weiming Li†,k , ‡,∗∗ Zhi Liu and Wang Zhou§,†† Key Laboratory for Applied Statistics of MOE & Northeast Normal University¶ , Shanghai University of Finance and Economicsk , University of Macau & UM Zhuhai Research Institute∗∗ and National University of Singapore†† This paper discusses fluctuations of linear spectral statistics of high-dimensional sample covariance matrices when the underlying population follows an elliptical distribution. Such population often possesses high order correlations among their coordinates, which have great impact on the asymptotic behaviors of linear spectral statistics. Taking such kind of dependency into consideration, we establish a new central limit theorem for the linear spectral statistics in this paper for a class of elliptical populations. This general theoretical result has wide applications and, as an example, it is then applied to test the sphericity of elliptical populations. 1. Introduction. Large-scale statistical inference develops rapidly in the last two decades. This type of inference often relies on spectral statistics of certain random matrices in high-dimensional frameworks, where both the dimension p of the observations and the sample size n tend to infinity. Recall that a linear spectral statistic (LSS) (Bai and Silverstein, 2010) of a p × p ∗ Jiang Hu’s research is partially supported by NSFC (No. 11771073) and the Fundamental Research Funds for the Central Universities. † Weiming Li’s research is partially supported by NSFC (No. 11401037), MOE Project of Humanities and Social Sciences, No. 17YJC790057, and Program of IRTSHUFE. ‡ Zhi Liu’s research is supported by FDCT127/2016/A3 of Macau and NSFC (No.11401607). § Wang Zhou’s research is partially supported by the MOE Tier 2 grant MOE2015-T22-039 (R-155-000-171-112) at the National University of Singapore. MSC 2010 subject classifications: Primary 62H15; secondary 62H10 Keywords and phrases: Covariance matrix, High-dimensional data, Elliptical distribution, Sphericity test. 1 2 J. HU ET AL. Hermitian random matrix Rn is of the form Z p 1X f (λi ) = f (x)dF Rn (x), (1.1) p i=1 where λ1 , . . . , λp P are the p eigenvalues of Rn , f is a function defined on R, and F Rn = (1/p) pi=1 δλi is called the spectral distribution (SD) of Rn . Here δa denotes the Dirac measure at the point a. In Ledoit and Wolf (2002) and Schott (2007), most test statistics are actually LSSs of sample covariance matrices. Bai et al. (2009) made systematic corrections to several classical likelihood ratio tests to overcome the effect of high-dimension using LSSs of sample covariance matrices and F-matrices. Later, Bai et al. (2015) derived the CLT for LSSs of a high-dimensional Beta matrix, which can be broadly used in multivariate statistical analysis, such as testing the equality of several covariance matrices, multivariate analysis of variance, and canonical correlation analysis, see Anderson (2003). Most recently, based on an LSS of regularized canonical correlation matrices, Yang and Pan (2015) proposed a test for the independence between two large random vectors. Gao et al. (2017) applied LSSs of sample correlation matrices to the complete independence test for p random variables and the equivalence test for p factor loadings in a factor model. Clearly, it is of great interests to investigate the behaviors of LSSs under various circumstances. Specifically, let x1 , . . . , xn be n observations of x ∈ Rp , whose mean is zero and covariance matrix is Σ. The sample covariance matrix is n Bn = 1X xj x′j . n j=1 Our attention in this paper is focused on the asymptotic properties of LSSs of Bn . The earliest study on this problem dates back to Jonsson (1982), who obtained the central limit theorem (CLT) for LSSs of Bn by assuming the population to be standard multivariate normal. A remarkable breakthrough was done in Bai and Silverstein (2004), where the population is allowed to be a linear transform of a vector of independent and identically distributed (i.i.d.) random variables, i.e., (1.2) x = Az. Here A ∈ Rp×p is a non-random transformation matrix with rank(A) = p, and z = (z1 , . . . , zp )′ with i.i.d. zi ’s satisfying (1.3) E(z1 ) = 0, E(z12 ) = 1 and E(z14 ) = 3. COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 3 The fourth moment condition was later extended by Pan and Zhou (2008) to E(z14 ) < ∞. Though these assumptions are fairly weak, their requirement of linearly dependent structure in (1.2) still excludes a lot of important distributions. In particular, it excludes almost all distributions from the elliptical family (Fang and Zhang, 1990). Elliptical distributions were originally introduced by Kelker (1970) to generalize the multivariate normal distributions. A random vector x with zero mean follows an elliptical distribution if and only if it has a stochastic representation (Fang and Zhang, 1990): (1.4) x = ξAu, where the matrix A ∈ Rp×p is non-random with rank(A) = p, ξ ≥ 0 is a scalar variable representing the radius of x, and u ∈ Rp is the random direction, which is independent of ξ and uniformly distributed on the unit sphere S p−1 in Rp , denoted by u ∼ U (S p−1 ) in the sequel. This family of distributions has been widely applied in many areas, such as statistics, economics and finance, which can describe fat (or light) tails and tail dependence among components of a population, see Fang and Zhang (1990) and Gupta et al. (2013). Evidently such distributions with high order correlations can not be modeled by the linear transform model in (1.2). A question raised immediately is that how the nonlinear dependency affects the asymptotic behaviors of LSSs in high-dimensional frameworks? Indeed, Bai and Zhou (2008) proved that the SD F Bn of Bn converges to a common generalized Marčenko-Pastur law almost surely if, for any sequence of symmetric matrices {Cp } with bounded spectral norm, (1.5) V ar(x′ Cp x) = o(p2 ) as p, n → ∞. This condition is also sharp for the convergence, see Li and Yao (2017) for an example. What is more, this condition holds for a list of well known elliptical distributions, such as multivariate normal distributions, multivariate Pearson type II distributions, power exponential distributions, and a more general family of multivariate Kotz-type distributions (Kotz, 1975), see Section 2 for more details. However, the limit of SD is not enough for many procedures of statistical inference, such as confidence interval and hypothesis testing. Therefore, in this paper, we will explore the fluctuations of LSSs of Bn , when the population belongs to elliptical distributions that satisfy the condition (1.5). Compared with the pioneer work of Bai and Silverstein (2004), the main difficulty of the current study lies in the fact that both the radius ξ and direction u introduce nonlinear dependence to the coordinates of the population x, which can not be handled through 4 J. HU ET AL. the same way as they did for the linearly dependent structure. Technically, we are facing the following three challenges. First, for paying the cost of dropping linearly dependent structure, we have to add more moment condi√ tions on ξ, because the finite fourth moment of ξ/ p is no longer sufficient for the nonlinear dependence case (see (2.5)). This is totally different from the linearly dependent structure case. Second, we need to figure out how the dependence of the entries of ξu influences the fluctuations of LSSs of Bn (see Remark 2.3). Third, we have to extend many fundamental conclusions in the independent case (Bai and Silverstein (2004)) to accommodate our non-linearly dependent structure; see Lemma A.1-A.4 for example. The structure of this paper is as follows. Firstly in Section 2, we set up a new CLT for LSSs of Bn under elliptical distributions satisfying (1.5). Then in Section 3, based on the derived results, we theoretically investigate the problem of sphericity test for covariance matrices. This is done by discussing a John’s-type test from Tian et al. (2015) for general alternative models and a likelihood ratio test from Onatski et al. (2013) for spiked covariances under arbitrary elliptical distributions. For illustration, the John-type test is applied to analyze a dataset of weekly stock returns in Section 4. Technical proofs of the main results are gathered in Section 5. Some supporting lemmas are postponed to Appendix. The paper has also an on-line supplementary file which includes the following materials: (i) CLT for general moment LSSs; (ii) simulations regarding the John-type test; (iii) Proofs of some lemmas. 2. High-dimensional theory for eigenvalues of Bn . This section investigates asymptotic behaviors of the eigenvalues of Bn , referred as sample eigenvalues. We begin with proposing an equivalent condition of (1.5) under the settings of the elliptical model in (1.4). Lemma 2.1. Suppose that a p-dimensional random vector x has a stochastic form x = ξAu as defined in (1.4) with the radius ξ normalized as E(ξ 2 ) = p. If the spectral norm of Σ = AA′ is uniformly bounded in p, then the following two conditions are equivalent: a) V ar(x′ Cp x) = o(p2 ), b) E(ξ 4 ) = p2 + o(p2 ), as p → ∞, where {Cp } is any sequence of symmetric matrices with bounded spectral norm. Remark 2.1. The fourth moment condition b) together with the normalization E(ξ 2 ) = p characterize the class of elliptical distributions discussed in this paper. For the normal case, the squared radius ξ 2 ∼ χ2p and thus COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 5 E(ξ 2 ) = p and E(ξ 4 ) = p2 + 2p. In general, the typical order of E(ξ 4 ) is p2 + τ p + o(p) with τ ≥ 0 a constant. Hence a specific elliptical distribution can be recognized by evaluating the ratio (2.1) E(ξ 4 )/E 2 (ξ 2 ) = 1 + τ /p + o(p−1 ), as p → ∞. We note that the parameter τ has a non-negligible effect on the limiting distributions of LSSs of Bn , see Theorem 2.2. The proof of Lemma 2.1 is given in the supplementary material (Hu et al., 2017). In the following we provide three examples of elliptical family satisfying the condition (2.1). Some commonly seen elliptical distributions are also checked and the results are summarized in Table 1. Example 2.1. A p-dimensional centered multivariate Pearson type II distribution has a density function (2.2)  β −1 1  2 , f (x) = cp |Σp |− 2 1 − x′ Σ−1 p x where cp = π −p/2 Γ[(β + p)/2]/Γ(β/2) and β > 0. The stochastic representa1/2 tion of such a distribution is x = ξΣp u, where ξ 2 follows the distribution Beta(p/2, β/2), see Fang and Zhang (1990). Therefore, we have E(ξ 4 )/E 2 (ξ 2 ) = 1 + 2β/(p2 + βp + 2p), which verifies the condition in (2.1) with τ = 0. Example 2.2. The family of Kotz-type distributions introduced by Kotz (1975) is an important class of elliptical distributions, which includes normal distributions, exponential power distributions, and double exponential distribution as special cases. The density function of a centered Kotz-type random variable x is k−1   s 1  exp −β x′ Σ−1 , (2.3) f (x) = cp |Σp |− 2 x′ Σ−1 p x p x where cp = sβ α π −p/2 Γ(p/2)Γ(α) with α = (k−1+p/2)/s > 0 and (β, s) > 0. 1/2 s Write x = ξΣp u. The 2s power of the radius is ξ 2s = [x′ Σ−1 p x] which has the characteristic function Z Z s it[x′ Σ−1 itξ 2s p x] f (x)dx ∝ eitx xα−1 e−βx dx, (2.4) E(e ) = cp e 6 J. HU ET AL. where the seconded integral is derived by polar coordinates transformation. This characteristic function implies that ξ 2s follows the Gamma distribution Gamma(α, β). Simple calculations reveal that Γ(α + 2/s)Γ(α) 1 E(ξ 4 ) = = 1 + 2 + o(α−1 ), 2 2 2 E (ξ ) Γ (α + 1/s) s α which verifies the condition in (2.1) with τ = 2/s. For the mentioned three special cases, their details are presented in the 2-4th rows of Table 1. P Example 2.3. Let x = ξAu with ξ 2 = pj=1 yj2 independent of u, where (yj ) is a sequence of i.i.d. random variables with E(y12 ) = 1 and E(y14 ) = µ4 < ∞. Then it is simple to check that E(ξ 2 ) = p and E(ξ 4 ) = p2 + (µ4 − 1)p which verifies the condition in (2.1) with τ = µ4 − 1. We should note that the condition (2.1) excludes some elliptical distributions, such as multivariate student-t distributions and normal scale mixtures, as shown in the 5-6th rows of Table 1. Indeed, sample eigenvalues from these distributions do not obey the generalized Marčenko-Pastur law (El Karoui, 2009; Li and Yao, 2017), which are then out of the scope of this paper. Table 1 Some elliptical distributions and their verification of the condition (2.1). The notation “⊥ ⊥” in the last row denotes independence. x = ξAu ∈ Rp Normal Double exponential Exponential power Student-t Distribution of ξ ξ 2 ∼ χ2p ξ ∼ Gamma(p, 1)  p 1 ξ 2s ∼ Gamma 2s ,2 ξ 2 /p ∼ F (p, v), v > 4 E(ξ 4 )/E 2 (ξ 2 ) 1 + p2 4p+6 1 + p(p+1) 2 1 + sp + o(p−1 ) 2 + 2(v−2) 1 + v−4 p(v−4) Normal scale mixture ξ 2 = w · v, w⊥ ⊥v, v ∼ χ2p 1 + V ar(w) E 2 (w) + 2 2 E(w ) p E 2 (w) Condition (2.1) Holds (τ = 2). Holds (τ = 4). Holds (τ = 2s ). Not hold. Not hold. Now we are ready to investigate the asymptotic properties of sample eigenvalues in high-dimensional frameworks, under the following assumptions. Assumption (a). Both the sample size n and dimension p tend to infinity in such a way that cn := p/n → c ∈ (0, ∞). Assumption (b). There are two independent arrays of i.i.d. random variables (uj )j≥1 , u1 ∼ U (S p−1 ), and (ξj )j≥1 satisfying for some τ ≥ 0 and COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 7 ε > 0, (2.5) E(ξ12 ) = p, E(ξ14 ) = p2 + τ p + o(p) and E ξ12 − p √ p 2+ε < ∞, such that for each p and n the observation vectors can be represented as xj = ξj Auj , where A is a p × p matrix. Assumption (c). The spectral distribution Hp of the matrix Σ := AA′ weakly converges to a probability distribution H, as p → ∞, referred as Population Spectral Distribution (PSD). Moreover, the spectral norm of the sequence (Σ) is uniformly bounded in p. In the sequel, for any function G of bounded variation on the real line, its Stieltjes transform is defined by Z 1 (2.6) dG(λ), z ∈ C \ SG , m(z) = λ−z where SG stands for the support of G. Then we have the following theorems. Theorem 2.1. Suppose that Assumptions (a)-(c) hold. Then, almost surely, the empirical spectral distribution F Bn converges weakly to a probability distribution F c,H , whose Stieltjes transform m = m(z) is the only solution to the equation Z 1 (2.7) dH(t) , z ∈ C+ , m= t(1 − c − czm) − z in the set {m ∈ C : −(1 − c)/z + cm ∈ C+ } where C+ ≡ {z ∈ C : ℑ(z) > 0}. Remark 2.2. Theorem 2.1 follows from Lemma 2.1 and Theorem 1.1 in Bai and Zhou (2008), and thus we omit its proof here. Let m = m(z) be the Stieltjes transform of F c,H = cF c,H + (1 − c)δ0 . Then Equation (2.7) can be re-expressed as Z t 1 (2.8) z = − +c dH(t) , z ∈ C+ , m 1 + tm which is the so-called Silverstein equation (Silverstein, 1995). Let F cn ,Hp be the distribution defined by (2.7) with the parameters (c, H) replaced by (cn , Hp ) and denote Gn = F Bn − F cn ,Hp . We next study the fluctuation of centralized LSSs with form Z Z f (x)dGn (x) = f (x)d[F Bn (x) − F cn ,Hp (x)], where f is a function on the real line. 8 J. HU ET AL. Theorem 2.2. Suppose that Assumptions (a)-(c) hold. Let f1 , . . . , fk be functions analytic on an open interval containing   √ 2 √ 2 Σ Σ (2.9) lim inf λmin δ(0,1) (c)(1 − c) , lim sup λmax (1 + c) . p→∞ p→∞ Then the random vector  Z Z f1 (x)dGn (x), . . . , fk (x)dGn (x) p converges weakly to a Gaussian vector (Xf1 , . . . , Xfk ), with mean function Z I 1 c(m′ (z)t)2 EXf = − dH(t)dz f (z) 2πi C1 m(z)(1 + tm(z))3 Z I τ −2 (zm(z) + 1)m′ (z)t − dH(t)dz f (z) 2πi C1 (1 + tm(z))2 and covariance function I I f (z1 )g(z2 )m′ (z1 )m′ (z2 ) dz1 dz2 (m(z1 ) − m(z2 ))2 C1 C2 Z Z + c(τ − 2) xf ′ (x)dF (x) xg ′ (x)dF (x), 1 Cov (Xf , Xg ) = − 2 2π (f, g ∈ {f1 , · · · , fk }), where the contours C1 and C2 are non-overlapping, closed, counter-clockwise orientated in the complex plane, and each enclosing the support of the limiting spectral distribution F c,H . Remark 2.3. When the population is normal, or rather τ = 2, this theorem coincides with the main result in Bai and Silverstein (2004). It implies that the high order correlation among the components of the population affects both the limiting mean vectors and the covariance matrices of LSSs by additive quantities proportional to τ − 2. This factor can be further decomposed into two parts, τ and −2, which correspond respectively to the effect from the radius ξ and that from the direction u (considering the case ξ 2 ≡ p). It’s interesting to see that these two kinds of dependency have opposite effects and they may cancel each other for normal population. R As an application of Theorem 2.2, we consider β̂nj = xj dF Bn (x), j = 1, 2, the first two moments of sample eigenvalues. Theorem 2.2 implies       β̂ − βn1 D v1 ψ11 ψ12 p n1 − →N , (2.10) , v2 ψ12 ψ22 β̂n2 − βn2 9 COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS where the parameters possess explicit expressions as 2 βn2 = γn2 + cn γn1 , βn1 = γn1 , ψ11 = 2cγ2 + c(τ − 2)γ12 , v1 = 0, 2 v2 = cγ2 + c(τ − 2)γ1 , ψ12 = 4cγ3 + 4c γ1 γ2 + 2c(τ − 2)γ1 (cγ12 + γ2 ), ψ22 = 8cγ4 + 4c2 γ22 + 16c2 γ1 γ3 + 8c3 γ12 γ2 + 4c(τ − 2)(cγ12 + γ2 )2 , R R where γnj = tj dHp (t) and γj = tj dH(t) for j ≥ 1. For LSSs of higher order moments, explicit formulas of their limiting means and covairances are discussed in the supplementary material (Hu et al., 2017). 0 2 4 −2 0 2 4 4 2 −4 −4 −4 (p,n)=(400,200) 0 Sample Quantiles 0 Sample Quantiles 2 4 (p,n)=(400,200) −2 0 Sample Quantiles −4 −2 0 −4 −2 0 2 4 −4 −2 0 2 4 Theoretical Quantiles Theoretical Quantiles Theoretical Quantiles ^ QQ Plot for normalized βn1 ^ QQ Plot for normalized βn2 ^ QQ Plot for normalized βn1 ^ QQ Plot for normalized βn2 0 2 4 −4 −2 0 2 Theoretical Quantiles 4 4 0 Sample Quantiles 2 (p,n)=(400,200) −4 −2 0 Sample Quantiles −4 −4 −2 Theoretical Quantiles −2 0 Sample Quantiles 0 −2 −4 −4 (p,n)=(400,200) 2 4 (p,n)=(200,400) 2 4 (p,n)=(200,400) −2 Sample Quantiles −2 −4 −2 ^ QQ Plot for normalized βn2 Theoretical Quantiles 2 4 −4 Sample Quantiles (p,n)=(200,400) 2 4 (p,n)=(200,400) ^ QQ Plot for normalized βn1 −2 ^ QQ Plot for normalized βn2 2 4 ^ QQ Plot for normalized βn1 −4 −2 0 2 Theoretical Quantiles 4 −4 −2 0 2 4 Theoretical Quantiles Fig 1. Normal QQ-plots for normalized β̂n1 and√β̂n2 from 10,000 independent replications. Upper panels: ξ ∼ k1 Gamma(p, 1) with k1 = 1/ p + 1. Lower panels: ξ 2 ∼ k2 Beta(p/2, 2) with k2 = p + 4. The dimensional settings are (p, n, c) = (200, 400, 0.5), (400, 200, 2). We conduct a small simulation experiment to examine the fluctuations of β̂n1 and β̂n2 . In the experiment, the PSD Hp is fixed at Hp = 0.5δ1 + 0.5δ2 . The distribution of ξ is selected as (1) ξ ∼ k1 Gamma(p, 1) with k1 = √ 1/ p + 1 and (2) ξ 2 ∼ k2 Beta(p/2, 2) with k2 = p + 4, which correspond the CLT with τ = 4 and τ = 0, respectively. The factors k1 and k2 are 10 J. HU ET AL. selected to satisfy E(ξ 2 ) = p. The dimensional settings are (p, n, c) = (200, 400, 0.5), (400, 200, 2) and the number of independent replications √ is ψ11 10, 000. Normal QQ-plots for normalized statistics, i.e. p( β̂ − β )/ n1 n1 √ and [p(β̂n1 − βn1 ) − v2 ]/ ψ22 , are displayed in Figure 1. Their asymptotic standard normality is well confirmed in all studied cases. 3. Testing for high-dimensional spherical distributions. 3.1. John’s test and its extension. In this section, we revisit the sphericity test for covariance matrices in high-dimensional frameworks. For this particular test probelm, the underlying population can follow arbitrary elliptical distribution, which may violate the condition in (1.5). The sphericity test on the covariance matrix Σ is H 0 : Σ = σ 2 Ip (3.1) v.s. H1 : Σ 6= σ 2 Ip , where σ 2 is an unknown scalar parameter. When the dimension p is fixed, for normal populations, John (1972) proposed a locally most powerful invariant test statistic to deal with the sphericity hypothesis based on the spectrum of sample covariance matrices. Due to its concise form and broad applicability, this kind of test is quite favorable for high dimensional situations and has been extensively studied in recent years. See, for example, Ledoit and Wolf (2002), Wang and Yao (2013), Tian et al. (2015) for the linear transform model in (1.2), while Zou et al. (2014) and Paindaveine and Verdebout (2016) for the elliptical model in (1.4). In particular, the test statistic in Tian et al. (2015) synthesizes the first four moments of sample eigenvalues, by which it gains extra powers for spike-like alternative covariance matrices. However this statistic is not valid for general elliptical populations (Li and Yao, 2017). Hence, we next develop an analogue test procedure with the help of the theoretical results in Section 2, and then compare it numerically with that from Paindaveine and Verdebout (2016). Since the hypotheses in (3.1) are only concerned with the shape component of Σ, by convention, we transform the original samples into the so-called spatial-sign samples, that is, x̌j := √ pxj /||xj || = √ pAuj /||Auj ||, j = 1, . . . , n. Therefore, testing the sphericity of Σ can now be converted to testing the identity of Σ̌ = E(x̌1 x̌′1 ). P This inference can be realized by constructing spectral statistics of B̌n = nj=1 x̌j x̌′j /n. Specifically, let αnj = p−1 tr(Σ̌j ) and β̌nj = p−1 tr(B̌nj ), COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 11 j = 0, 1, 2, . . . . By verifying the condition in (1.5) for x̌1 , one may conclude that Theorem 2.1 also holds for (Σ̌, B̌n ) with all conditions on ξ removed. Then, similar to Tian et al. (2015), from the fact that β̌n1 ≡ 1, one may obtain estimators of αn2 and αn4 as α̌n2 = β̌n2 − cn , α̌n4 = β̌n4 − 4cn β̌n3 − 2cn (β̌n2 )2 + 10c2n β̌n2 − 5c3n , respectively, and two simple statistics for the sphericity test as T1 = α̌n2 − 1 and T2 = α̌n4 − 1. Moreover, their joint null distribution is directly from (2.10) with τ = 0. Theorem 3.1. Suppose that Assumptions (a)–(c) [removing the moment conditions in (2.5)] hold. Under the null hypothesis, D n (T1 , T2 ) − → N2 (µ, Ω), where µ = (−1, −6 + c) and the covariance matrix Ω = (ωij ) with ω11 = 4, ω12 = 24, and ω22 = 8(18 + 12c + c2 ). The two statistics T1 and T2 , together with their null distributions, provide two test procedures for the identity of Σ̌ (thus the sphericity of Σ). The test statistic T1 agrees with that in Paindaveine and Verdebout (2016), where its null asymptotic distribution is proved to be universal whenever min{n, p} → ∞. For the case where the population mean is unknown, see Zou et al. (2014). The test statistic T2 is new. Compared with T1 , it is more sensitive to extreme eigenvalues of Σ̌ and thus can serve as a complement of T1 . Parallel to Tian et al. (2015), a joint statistic of T1 and T2 can be constructed as ( ) nT1 + 1 nT2 + 6 − cn Tm = max , ,p 2 8(18 + 12cn + c2n ) where the two original statistics are both standardized according to their asymptotic null distributions. Theorem 3.2. Suppose that Assumptions (a)–(c) [removing the moment conditions in (2.5)] hold and let δp = ptr(Σ2 )/tr2 (Σ) − 1. (i) Under the null hypothesis, for any x ∈ R,  2  Z x Z x u − 2ρuv + v 2 1 p exp − P (Tm ≤ x) → dudv, 2(1 − ρ2 ) −∞ −∞ 2π 1 − ρ2 p where ρ = 6/ 2(18 + 12c + c2 ). 12 J. HU ET AL. (ii) Under the alternative hypothesis, if nδp → ∞ then the power of the test Tm goes to 1 as (n, p) → ∞. The asymptotic null distribution of Tm is an immediate consequence of Theorem 3.1. The consistency of Tm can be proved by showing either the consistency of T1 or T2 . As the consistency of T1 has been given in Zou et al. (2014), we omit its proof. We have run a simulation experiment for the tests T1 , T2 , and Tm to check their finite-sample properties under similar model settings as in Tian et al. (2015). The results show that all the three tests have satisfactory empirical sizes and powers. In addition, compared with T1 and T2 , the test Tm exhibits its robustness against different types of alternative models, see the supplementary material Hu et al. (2017). 3.2. Sphericity test under spiked alternative model. The sphericity test Tm applies to general alternative models. However, its consistency requires nδp → ∞ which excludes the well-known spiked covariance model (Johnstone, 2001). For the simplest spiked model, the covariance matrix can be expressed as Σ = σ 2 (Ip + hvv ′ ) where σ 2 and Ip are as before, h is a constant, and v is a unit vector in Rp . Both h and v are unknown parameters. Thus the sphericity hypotheses in (3.1) reduce to (3.2) H0 : h = 0 v.s. H1 : h > 0. It’s obvious that Tm will asymptotically fail to reject such alternatives since nδp → 0. What’s more, this testing problem will become more dif√ ficult but attractive when the signal h falls below the threshold c, see Berthet and Rigollet (2013); Onatski et al. (2013, 2014); Donoho and Jin (2015), and references therein. Hence, applying the CLT for LSSs under elliptical distributions, we discuss a test procedure for (3.2) proposed by Onatski et al. (2013), which was built under normal populations. In Onatski et al. (2013), the authors discussed a likelihood ratio test based on the joint distribution of sample eigenvalues from normal populations. This √ test was especially designed for the local alternative H1 : h ∈ (0, c) and the employed statistic was approximated by a special LSS. In our settings, this LSS can be formulated as Z Z B̌n (3.3) TLR (s) = ln(z(s) − x)dF (z) − ln(z(s) − x)dF cn ,δ1 (x), where s ∈ (0, s̄) is a testing parameter and z(s) = (1 + s)(cn + s)/s. The √ √ upper bound s̄ of s is chosen as s̄ = cn for h ∈ [0, cn ] and s̄ = h−1 cn for COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 13 √ h ∈ ( cn , ∞) such that z(s) is larger than the limit of λmax (B̌n ), the largest sample eigenvalues. Applying Theorem 2.2, one may get the asymptotic distribution of TLR (s) under general elliptical distributions. Theorem 3.3. Suppose that Assumptions (a)–(c) [removing the moment conditions in (2.5)] hold. Under the null hypothesis, for any fixed s ∈ (0, s̄), D pTLR (s) − → N (µs , σs2 ), (3.4) where the respective mean and variance functions are µs = 1 ln(1 − c−1 s2 ) + c−1 s2 and σs2 = −2 ln(1 − c−1 s2 ) − 2c−1 s2 . 2 The proof of Theorem 3.3 is given in the supplementary material (Hu et al., 2017). Given a value of s ∈ (0, s̄) and a significance level α ∈ (0, 1), the test TLW (s) rejects H0 if pTLW (s) < σs Φ−1 (α) + µs , where Φ(x) denotes the standard normal distribution function. Unlike Onatski et al. (2013), the theoretical power of this test is not available at present since pTLR (s) is not a likelihood ratio statistic in elliptical distributions. Another reason is that Theorem 2.2 is inapplicable to this situation since the spatial-sign sample is not anymore elliptically distributed under H1 . Let’s take a step back and only consider the testing problem in elliptical distributions satisfying (2.1). For simplicity, we assume σ is known and set σ = 1, so that the test TLR (s) is still valid by simply substituting the sample covairance Bn into B̌n , i.e., Z Z Bn e TLR (s) = ln(z(s) − x)dF (z) − ln(z(s) − x)dF cn ,δ1 (x), whose asymptotic distribution under both the null and alternative hypotheses is described in the following theorem. Theorem 3.4. Suppose that Assumptions (a)–(c) hold. Let h0 be the true value of h and σ = 1, then for any fixed s ∈ (0, s̄), D pTeLR (s) − → N (µ̃s (h0 ), σ̃s2 ), (3.5) where the respective mean and variance functions are 1 ln(1 − c−1 s2 ) + (1 − τ /2)c−1 s2 + ln(1 − c−1 sh), 2 σ̃s2 = −2 ln(1 − c−1 s2 ) − (2 − τ )c−1 s2 . µ̃s (h) = 14 J. HU ET AL. This theorem is a direct conclusion of Theorem 2.2. It proof is similar to that of Theorem 3.3 and we thus omit it here. From Theorem 3.4, the power function of TeLW (s) is   µ̃s (h0 ) − µ̃s (0) −1 e PH1 (TLW (s) reject H0 ) = Φ Φ (α) − , h0 > 0. σ̃s For normal populations (τ = 2), this power function reaches its maximum at s = h0 , which agrees with (5.1) in Proposition 9 of Onatski et al. (2013). In general, the maximizer may not locate at h0 . An interesting case is τ = 0, for which the power function tends to 1 as s → 0+ . This is from the fact that µ̃s (h0 ) − µ̃s (0) = −c−1 sh0 + o(s) and σs2 = 2c−2 s4 + o(s4 ). At this time, TeLW (s) will successfully detect any positive h0 as long as s is close to zero. 4. An empirical study. For illustration, we apply the test procedure based on Tm to analyze weekly returns of the stocks from S&P 500. The tests TLR and T̃LR are not included in this analysis since there is a lack of evidence to fit the data using the simplest spiked model. According to The North American Industry Classification System (NAICS), which is used by business and government to classify business establishments, the 500 stocks can be divided into 20 sectors. Nine of them are removed from our analysis since their numbers of stocks are all less than 10. The remaining 11 sectors as well as their numbers of stocks are listed in Table 2. Usually the stocks Table 2 Number of stocks in each NAICS Sectors. Sector Number of stocks 1 30 2 32 3 189 4 17 5 36 6 14 7 37 8 65 9 14 10 17 11 11 in the same sector are correlated, and the stocks in different sectors are uncorrelated. So it is expected that the weekly returns of stocks in the same sector are not spherically distributed, and it is interesting to see if the weekly returns of stocks in different sectors are spherically distributed. In the following, we apply Tm to stocks in the same sector and stocks in different sectors respectively. The original data are the closing prices or the bid/ask average of these stocks for the trading days in the first half of 2013, i.e., from 1 January 2013 to 30 June 2013, with total 124 trading days. This dataset is downloadable COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 15 from the Center for Research in Security Prices Daily Stock in Wharton Research Data Services. The testing model is established as follows. Denote pl as the number of stocks in the lth sector, uij (l) as the price of the ith stock in the lth sector on Wednesday of the jth week. The reason that we choose Wednesday’s price here is to avoid the weekend effect in stock market. Thus we get 22 returns for each stock. In order to meet the condition of the proposed test, the original data uij (l) should be transformed by logarithmic difference, which is a very commonly used procedure in finance. There are a number of theoretical and practical advantages of using logarithmic returns. One of them is that the sequence of logarithmic returns are independent of each other for big time scales (e.g. ≥ 1 day, see Rama (2001)). Denote xij (l) = ln(ui(j+1) (l)/uij (l)), j = 1, . . . , 21 and X(l) = (xij (l))pl ×n , where n = 21 is the sample size. Now applying Tm to the dataset X(l), l = 1, . . . , 11, respectively, we obtain 11 p-values, which are all below 10−9 . Therefore, we have strong evidence to believe that stocks in the same sector are not spherically distributed. This is consistent with our intuition. Next, we consider stocks in different sectors. Specifically, we choose one stock from each sector to make up a group of 11 cross-sectoral stocks and then test whether these stocks are spherically distributed. Because there are about 9.79 × 1015 different groups, we just randomly draw 1,000,000 groups from them to analyze. It turns out that the largest p-value is 0.3889, 231 p-values are bigger than 0.05, and 69 p-values are bigger than 0.1. These results again demonstrate that, when the number of stocks is not very small, it is hard to say weekly logarithmic returns for the stocks are spherically distributed. It is also very interesting to analyze these spherically distributed stocks in different sectors, which have almost the same variances. 5. Proof of Theorem 2.2. The proof of Theorem 2.2 relies on analyzing the resolvent of the sample covariance matrix Bn and the general strategy follows the approach in Bai and Silverstein (2004). Also see Bai et al. (2015) and Gao et al. (2017) for recent developments. However, as we are dealing with the new model equipped with nonlinear dependency, all technical steps of implementing this strategy have to be updated, or at least revalidated. They are presented in this section. 5.1. Sketch of the proof of Theorem 2.2. Let v0 > 0 be arbitrary, xr any number greater than the right end point of interval (2.9), and xl any negative number if the left end point of (2.9) is zero, otherwise choose xl ∈ √ 2 (0, lim inf p→∞ λΣ min (1 − c) ). Let Cu = {x ± iv0 : x ∈ [xl , xr ]} and define a 16 J. HU ET AL. contour C (5.1) C = {x + iv : x ∈ {xr , xl }, v ∈ [−v0 , v0 ]} ∪ Cu . By definition, this contour encloses a rectangular region in the complex plane containing the support of the LSD F c,H . Denote by mn (z) and mF cn ,Hp (z) the Stieltjes transforms of the ESD F Bn and the LSD F cn ,Hp , respectively. Their companion Stieltjes transforms are given by mn (z) = − 1 − cn + cn mn (z) z and mF cn ,Hp (z) = − 1 − cn + cn mF cn ,Hp (z). z With these notation, we define an empirical process on C as     Mn (z) = p mn (z) − mF cn,Hp (z) = n mn (z) − mF cn ,Hp (z) , z ∈ C. Since fℓ , ℓ = 1, . . . , k, in Theorem 2.2 are analytic on an open region containing the interval (2.9) (thus analytic on the region enclosed by C), by Cauchy’s integral formula, we have for any k complex numbers a1 , . . . , ak , k X paℓ ℓ=1 Z I k X aℓ fℓ (x)dGn (x) = − fℓ (z)Mn (z)dz, 2πi C ℓ=1 when all sample eigenvalues fall in the interval (xl , xr ), which is correct with overwhelming probability. In order to remove the small probability event that some sample eigenvalues fall outside the interval, we need a truncated cn (z). Specifically, let {εn } be a sequence version of Mn (z), denoted by M decreasing to zero satisfying εn > n−a for some a ∈ (3/4, 1). The truncated cn (z) for z = x + iv ∈ C is given by process M   z ∈ Cn , Mn (z) −1 c (5.2) Mn (z) = Mn (x + in εn ) x ∈ {xl , xr }, v ∈ [0, n−1 εn ],   Mn (x − in−1 εn ) x ∈ {xl , xr }, v ∈ [−n−1 εn , 0], where Cn = Cu ∪ {x ± iv : x ∈ {xl , xr }, v ∈ [n−1 εn , v0 ]}, cn (z) agrees with Mn (z), is a regularized set of C excluding a on which M small segment near the real line. Then we have Lemma 5.1. any ℓ > 0, Under the same assumptions in Theorem 2.2, we have for I fℓ Mn (z)dz = C Z Cn cn (z)dz + op (1). fℓ (z)M COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 17 The proof of this lemma will be put in the supplementary material, Hu et al. (2017). Hence, Theorem 2.2 follows by similar arguments on Pages 562-563 in Bai and Silverstein (2004) and the following Lemma. cn (·) conLemma 5.2. Under Assumptions (a)-(c), the random process M verges weakly to a two-dimensional Gaussian process M (·) with the mean function Z Z c(m′ (z)t)2 dH(t) (zm(z) + 1)m′ (z)tdH(t) (5.3) EM (z) = + (τ − 2) m(z)(1 + tm(z))3 (1 + tm(z))2 and covariance function Cov (M (z1 ), M (z2 )) = (5.4) where z, z1 , z2 ∈ C. 2 2m′ (z1 )m′ (z2 ) − 2 (m(z1 ) − m(z2 )) (z1 − z2 )2   τ −2 + m(z1 ) + z1 m′ (z1 ) m(z2 ) + z2 m′ (z2 ) , c The proof of this lemma is the main task of this section and can be achieved by four steps as described below. Notice that in the proof we will use several inequalities frequently, which are presented as lemmas in Appendix. We will show how and where to use these lemmas in the following. Write for z ∈ Cn , cn (z) = p[mn (z) − Emn (z)] + p[Emn (z) − m cn,Hp (z)] M F := Mn(1) (z) + Mn(2) (z). Step 1: Truncation and of ξ. This step regularizes the variPn rescaling 2 Au u′ A′ /n such that {ξ } have proper ables {ξj } in Bn = ξ j j j j=1 j bound for finite (n, p) while maintaining the limiting distribution of the LSSs. Compared with the proof in Bai and Silverstein (2004), this result is entirely new since their model doesn’t include a radius variable at all. Moreover, our key inequalities (Lemmas A.2-A.4) are all built on this regularization and thus their proofs have to be updated to accommodate the elliptical model. (1) Step 2: Finite dimensional convergence of Mn (z) in distribution. This step finds the joint limiting distribution of an r-dimensional vec (1) tor Mn (zℓ ) 1≤ℓ≤r by the martingale CLT. Lemmas A.2 and A.3 are used to simplify the expression of the martingale difference and verify Lindeberg’s condition, respectively. The (limiting) covariance function 18 J. HU ET AL. is calculated based on Lemma A.1 with the help of Lemma A.3. A new finding here is that the nonlinear dependency comes up with an extra term in the covariance function (Lemma A.1), which results in a novel procedure of proving the convergence of this term. (1) Step 3: Tightness of Mn (z) on Cn . This step presents the basic idea for establishing the tightness. A key element is the uniform boundedness of E||(Bn − zI)−q || for q > 0 which is derived by Lemma A.4. By virtue of this and Lemmas A.2-A.4, the tightness can be verified following similar arguments in Bai and Silverstein (2004). (2) Step 4: Convergence of Mn (z). This final step mainly calculates (2) the limit of Mn (z), the limiting mean function of the LSSs. Akin to deriving the covariance function in Step 2, the nonlinear effect again brings an additional quantity to the mean function. Hence, most work in this part is to handle this new quantity. Note that Lemma A.4 is useful in this step to obtain several convergence results and uniform boundedness on Cn . These detailed four steps are presented in the next subsection. We note that (1) (2) when simplifying Mn (z) and Mn (z), one more straightforward method is used (see (5.11) and (5.32) respectively), which are different from Bai and Silverstein (2004). 5.2. Truncation and rescaling of the ξ-variable. From the moment con√ dition E|(ξ12 − p)/ p|2+ε < ∞ for some ε > 0 in Assumption (b), we can choose a sequence of δn > 0 such that δn → 0, δn n1/2 → ∞, δn−2 p−1 E[(ξ12 − p)2 I{|ξ12 −p|≥δnp} ] → 0. Pn ′ ˆ Let B̂n = j=1 x̂j x̂j /n where x̂j = ξ̂j Auj with ξj = ξj I{|ξj2 −p|<δn p} . We then have (5.5) (5.6) P (B̂n 6= Bn ) ≤ nP (|ξ12 − p| ≥ δn p) ≤ δn−2 np−2 E[(ξ12 − p)2 I{|ξ12 −p|≥δn p} ] → 0. P Define B̃n = nj=1 x̃j x̃′j /n where x̃j = ξ̃j Auj with ξ˜j = ξ̂j /σn and σn2 = E(ξ̂12 )/p. By the assumptions in (5.5), |1 − σn2 | = E(ξ12 /p − 1)I{|ξ12 −p|≥δn p} + EI{|ξ12 −p|≥δn p} (5.7) ≤ δn−1 (1 + δn−1 )p−2 E(ξ12 − p)2 I{|ξ12 −p|≥δn p} = o(p−1 ). Therefore we have E(ξ̃12 ) = p and E(ξ̃14 ) =  1  4 4 = p2 + τ p + o(p). E(ξ ) − Eξ I 2 −p|≥δ p} 1 1 {|ξ n 1 σn4 COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 19 On the other hand, write uj = zj /||zj || where, and in the following zj ∼ N (0, Ip ) and k · k denotes the spectral norm for a matrix, or L2 norm for a vector. By the strong law of large numbers, for any fixed 0 < η < 1, we have max{||zj ||2 /p : j = 1, . . . , n} ≥ 1 − η holds almost surely for large p. Hence we have for large p, ||B̃n || = n n (1 + δn ) 1X 1 X ξ̃j2 /p ′ ′ Azj zj A ≤ zj z′j ||Σ|| n ||zj ||2 /p (1 − η)σn2 n j=1 j=1 n almost surely. Thus, from Yin et al. (1988), we know that lim supn λB̃ max (and √ B̂ n similarly lim supn λmax ) are almost surely bounded by lim supp ||Σ||(1+ c)2 . Let G̃n (x) and Ĝn (x) be the analogues of Gn (x) with the matrix Bn replaced by B̃n and B̂n , respectively. From the arguments in Bai and Silverstein (2004) and (5.7), we can get for f (x, z) = 1/(x − z) (z ∈ C), almost surely, p2 Z f (x)dĜn (x) − ≤ 4K 2 p q X j=1 Z n λB̂ j − 2 f (x)dG̃n (x) q  ≤ p X j=1 2 B̃n  n K|λB̂ j − λj | 2 X p   B̂n B̃n n λB̃ λ + λ j j j j=1 n 1X B̃k 2 B̂n (x̂j − x̃j )′ (x̂j − x̃j ) ≤ 4K p(λmax + λmax ) n j=1 B̃k n = 4K 2 p(λB̂ max + λmax ) (1 − σn2 )2 tr(B̂n ) → 0, σn2 (1 + σn2 ) where K is an upper bound of |fx′ (x, z)|. As a consequence of this and (5.6), Z Z Mn (z) = p f (x)dGn (x) = p f (x)dG̃n (x) + op (1). R Therefore, we only need to find the limiting distribution of f (x)dG̃n (x). For simplicity, we still use Bn , xj , ξj instead of B̃n , x̃j , ξ˜j , respectively, and assume that   (5.8) ∀j, |ξj2 − p| < δn p, E ξ12 = p, E ξ14 = p2 + τ p + o(p), in the sequel. 20 J. HU ET AL. (1) 5.3. Finite dimensional convergence of Mn (z) in distribution. We will show in this part that for any positive integer r and any complex numbers z1 , . . . , zr ∈ Cn , the random vector [Mn(1) (z1 ), . . . , Mn(1) (zr )] converges to a 2r-dimensional Gaussian vector. Because of Assumption (c), without loss of generality, we may assume kΣk ≤ 1 for all p. We will denote by K any constant appearing in inequalities and it may take different values at different places. We first define some quantities which are frequently used in the sequel: √ rj = (1/ n)xj , D(z) = Bn − zI, Dj (z) = D(z) − rj rj′ , 1 Dij (z) = D(z) − ri ri′ − rj rj′ , εj (z) = rj′ Dj−1 (z)rj − trΣDj−1 (z), n 1 1 , ζj (z) = rj′ Dj−2 (z)rj − trΣDj−2 (z), βj (z) = ′ n 1 + rj Dj−1 (z)rj 1 1 , bn (z) = . β̄j (z) = −1 −1 −1 1 + n trΣDj (z) 1 + n EtrΣDj−1 (z) Note that, for any z = u + iv ∈ C+ , the last three quantities are bounded in absolute value by |z|/v. Moreover, D −1 (z) and Dj−1 (z) satisfy D −1 (z) − Dj−1 (z) = −Dj−1 (z)rj rj′ Dj−1 (z)βj (z). (5.9) From Lemma 2.6 in Silverstein and Bai (1995), for any p × p matrix B, |tr(D −1 (z) − Dj−1 (z))B| ≤ (5.10) ||B|| . v Let E0 (·) denote expectation, and Ej (·) the conditional given the σ-field generated by r1 , . . . , rj . Using the martingale decomposition, we can express (1) Mn (z) as n n h i X X (Ej − Ej−1 )tr D −1 (z) − Dj−1 (z) (Ej − Ej−1 )trD −1 (z) = j=1 j=1 =− n X j=1 (Ej − Ej−1 )βj (z)rj′ Dj−2 rj n X d log(βj (z)/β̄j (z)) (Ej − Ej−1 ) = , dz j=1 where the second equality uses the identity (5.9). By the fact that βj (z) = β̄j (z) − β̄j (z)βj (z)εj (z) = β̄j (z) − β̄j2 εj (z) + β̄j2 (z)βj (z)ε2j (z), COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 21 we have (5.11) Mn(1) (z) n d X (Ej − Ej−1 ) log[1 − β̄j (z)εj (z) + β̄j (z)βj (z)ε2j (z)]. = dz j=1 Notice that for all j > 0 and any z ∈ Cn , β̄j (z)εj (z) and β̄j (z)βj (z)ε2j (z) are almost surely away from 1 when n is large enough. In addition, by Lemma A.2 and Burkholder’s inequality (Lemma 2.1 in Bai and Silverstein (2004)), we have E n X j=1 2 (Ej − Ej−1 )β̄j (z)βj (z)ε2j (z) = O(δn2 ) → 0. Therefore, applying Taylor expansion, Mn(1) (z) = − =− n d X (Ej − Ej−1 )β̄j (z)εj (z) + op (1) dz d dz j=1 n X Ej (β̄j (z)εj (z)) + op (1). j=1 For any ǫ > 0, n 2 d 1 X d E Ej εj (z)β̄j (z) E Ej εj (z)β̄j (z) I(|Ej d εj (z)β̄j (z)|≥ǫ) ≤ 2 dz dz ǫ dz j=1 j=1   n |z|8 p4 E|εj (z)|4 K X |z|4 E|ζj (z)|4 ≤ + ε2 v4 v 16 n4 n X j=1 which tends to zero according to Lemma A.3, and thus Lindeberg’s condition is verified. Therefore, from the martingale CLT (Theorem 35.12 Billingsley (1) (1995)), the random vector (Mn (zj )) tends to a 2r-dimensional zero-mean Gaussian vector (M (zj )) with covariance function Cov(M (z1 ), M (z2 )) being (5.12) lim n→∞ n X j=1  ∂2 Ej−1 Ej εj (z1 )β̄j (z1 ) · Ej εj (z2 )β̄j (z2 ) , ∂z1 ∂z2 provided that this limit exits in probability. The same argument in page 571 of Bai and Silverstein (2004) implies that it suffices to show (5.13) n X j=1 Ej−1 2 Y k=1 Ej β̄j (zk )εj (zk ) 4 22 J. HU ET AL. converges in probability. In addition, by the martingale decomposition, 2 2 −2 E|β̄j (z) − bn (z)| =|bn (z)| n n X −1 E β̄1 (z) (Ek − Ek−1 )tr(D1−1 (z) − D1k (z)) k=2 4 −6 −1 (5.14) ≤K|z| v n , where the inequality is from (5.10).Thus it is sufficient to study the convergence of (5.15) bn (z1 )bn (z2 ) n X Ej−1 (Ej εj (z1 )Ej εj (z2 )) , j=1 whose second mixed partial derivative yields the limit of (5.12). Applying Lemma A.1, we know that   Eξ 4 2Eξ 4 (5.16) (5.15) = n − 1 T1 + T2 , p(p + 2) p(p + 2) where T1 = bn (z1 )bn (z2 ) n 1 X tr[ΣEj Dj−1 (z1 )]tr[ΣEj Dj−1 (z2 )], n3 j=1 n 1 X tr[ΣEj Dj−1 (z1 )ΣEj Dj−1 (z2 )]. T2 = bn (z1 )bn (z2 ) 2 n j=1 We note that the statistic T2 has the same form as Equation (2.8) in Bai and Silverstein (2004), which has been handled under their model. Following their calculations and using Lemmas A.2-A.3 instead, one may get i.p. T2 −−→ (5.17) Z 0 a(z1 ,z2 ) 1 dz, 1−z where a(z1 , z2 ) = Z m(z1 )m(z2 )(z1 − z2 ) cm(z1 )m(z2 )t2 dH(t) =1+ , (1 + tm(z1 ))(1 + tm(z2 )) m(z2 ) − m(z1 ) and (5.18) m′ (z1 )m′ (z2 ) ∂ 2 T2 i.p. 1 −−→ − . ∂z1 ∂z2 (m(z1 ) − m(z2 ))2 (z1 − z2 )2 2 COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 23 Now we derive the limit of T1 and its second mixed partial derivative, which is new compared with the linear transform model. Denote −1 βij (z) = (1 + ri′ Dij (z)ri )−1 , −1 b1 (z) = (1 + n−1 EtrΣD12 (z))−1 . By similar proofs of (5.14) and Equation (4.3) of Bai and Silverstein (1998), one may get |b1 (z) − bn (z)| ≤ Kn−1 and |bn (z) − Eβ1 (z)| ≤ Kn−1/2 , respectively. Also, by Equation (2.2) of Silverstein (1995) and discussions in Section 5 of Bai and Silverstein (1998), we obtain Eβ1 (z) = −zEmn (z) and |Emn (z) − mF cn,Hp (z)| ≤ Kn−1 , respectively. Therefore, we get |b1 (z) + zmF cn ,Hp (z)| ≤ Kn−1/2 . (5.19) With the quantity b1 (z), we define a nonrandom matrix L(z) for the purpose of replacing Dj (z) in T1 , L(z) = −zI + n−1 b1 (z)Σ, n which satisfies (5.20) ||L(z)||−1 ≤ 1 + p/(nv) |b−1 |b−1 1 (z)| 1 (z)| ≤ . ≤ −1 ℑ(z) v ℑ(zb1 (z)) −1 By the identity ri′ Dj−1 (z) = βij (z)ri′ Dij (z), we get their difference (5.21) Dj−1 (z) − L−1 (z) = b1 (z)R1 (z) + R2 (z) + R3 (z), where R1 (z) = − R2 (z) = − X i6=j X i6=j −1 L−1 (z)(ri ri′ − n−1 Σ)Dij (z), −1 (βij (z) − b1 (z))L−1 (z)ri ri′ Dij (z), R3 (z) = − n−1 b1 (z)L−1 (z)Σ X i6=j  −1 Dij (z) − Dj−1 (z) . For any p × p (nonrandom) matrix M , from (5.10), (5.20), and Lemma A.3, we get −1 −1 E|trR1 (z)M | ≤nE 1/2 |r1′ D12 (z)M L−1 (z)r1 − n−1 trΣD12 (z)M L−1 (z)|2 (1 + p/(nv)) (5.22) , ≤n1/2 K||M || v2 24 J. HU ET AL. 2 −1 M L−1 (z)r1 E|trR2 (z)M | ≤nE 1/2 (|β12 (z) − b1 (z)|2 )E 1/2 r1′ D12 |z|2 (1 + p/(nv)) , v5 |z|(1 + p/(nv)) |trR3 (z)M | ≤ ||M || . v3 ≤n1/2 K||M || (5.23) (5.24) Hence, plugging (5.21) into T1 and applying the inequalities (5.19), (5.22)(5.24), we have 2 Y trEj Dj−1 (zk )Σ = k=1 2 Y trL−1 (zk )Σ + Q1 (z1 , z2 ) k=1 Z 2 Y tdHp (t) 1 + Q2 (z1 , z2 ), =p zk 1 + tmF cn ,Hp (zk ) 2 k=1 where E|Qk (z1 , z2 )| ≤ Kn3/2 , k = 1, 2. We thus get T1 = 2 Y mF cn ,Hp (zk ) k=1 Z 2 cn tdHp (t) i.p. Y + op (1) −−→ (1 + zk m(zk )) 1 + tmF cn ,Hp (zk ) k=1 whose second mixed partial derivative is (5.25) i.p. ∂ 2 T1 /(∂z1 ∂z2 ) −−→ (m(z1 ) + z1 m′ (z1 ))(m(z2 ) + z2 m′ (z2 )). The result in (5.25) can be obtained by Vitali’s convergence theorem (Lemma 2.3 in Bai and Silverstein (2004)). Collecting results in (5.16), (5.18) and (5.25), we finally get Cov(M (z1 ), M (z2 )) =(m(z1 ) + z1 m′ (z1 ))(m(z2 ) + z2 m′ (z2 )) + 2m′ (z1 )m′ (z2 )/(m(z1 ) − m(z2 ))2 − 2/(z1 − z2 )2 , which completes the proof of Step 1. (1) (1) 5.4. Tightness of Mn (z). The tightness of Mn (z) can be established by verifying the moment condition (12.51) of Billingsley (1968), i.e., (5.26) sup n,z1 ,z2 ∈Cn E|Mn(1) (z1 ) − Mn(1) (z2 )|2 /|z1 − z2 |2 < ∞. By the martingale decomposition and the equality mn (z1 ) − mn (z2 ) = (z1 − z2 )p−1 tr(D −1 (z1 )D −1 (z2 )), 25 COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS to show (5.26), it is sufficient to prove the absolute second moment of n X (Ej − Ej−1 )tr[D −1 (z1 )D −1 (z2 )] j=1 is bounded uniformly. We first show the uniformly boundedness of E||D −q (z)|| on C for any fixed q > 0. Note that D −1 (z) is bounded on z ∈ Cu . While for z ∈ Cl ∪ Cr , applying Lemma A.4 with suitable large s, we have uniformly E||D −1 (z)||q ≤ K + 1 n P (||Bn || > ηr or λB min < ηl ) ≤ K + o(1), vq √ 2 √ where lim supp ||Σ||(1 + c)2 < ηr < xr and xl < ηl < lim inf p λΣ min (1 − c) . Analogously E||Dj−1 (z)||q has the same order, and we thus get −1 (z)||q } ≤ Kq . max{E||D −1 (z)||q , E||Dj−1 (z)||q , E||Dij (5.27) Then, (5.26) can be obtained by the same procedure in Section 3 of Bai and Silverstein (2004), applying Lemmas A.2-A.4 together with (5.27). We omit the details. (2) (2) 5.5. Convergence of Mn (z). Next we will show that for z ∈ Cn , {Mn (z)} converges to (5.3), is bounded and forms a uniformly equicontinuous family. We first introduce some auxiliary results, which can be verified by applying Lemma A.4 in our theoretical framework through a similar proof of the same statements in Bai and Silverstein (2004). First of all, we note that (5.28) sup |Emn (z) − m(z)| → 0 and z∈Cn sup ||V −1 (z)|| < ∞, n,z∈Cn where V (z) = Emn (z)Σ + I. Then, for any nonrandom p × p matrix M , (5.29) E|trD −1 (z)M − EtrD −1 (z)M |2 ≤ K||M ||2 . Next, there exists a number θ ∈ (0, 1) such that for all n large enough (5.30) sup cn z∈Cn Z (tEmn (z))2 dHp (t) < θ. (1 + tEmn (z))2 Lastly, from (4.12) of Bai and Silverstein (2004) and (5.2) in Bai and Silverstein (1998), we have that (5.31) Mn(2) (z) = −  1− R mF cn ,Hp (z)Qn (z) cn Emn (z)m cn ,Hp (z)t2 dHp (t) F (1+tEmn (z))(1+tm cn ,Hp (z)) F , 26 J. HU ET AL. where  Qn (z) =n cn Z  dHp (t) + zcn Emn (z) 1 + tEmn (z)  =nEβ1 (z) r1′ D1−1 (z)V −1 (z)r1 − n−1 EtrV −1 (z)ΣD −1 (z) . (5.32) From (5.30) and an analog inequality involving mF cn ,Hp (z), the denominator of (5.31) is bounded away from zero. Therefore, we need only to study the limit of Qn (z) for z ∈ Cn . For simplicity, we suppress the variable z from expressions in the sequel when there is no confusion. Let ̺1 := ̺1 (z) = r1′ D1−1 r1 − (1/n)EtrΣD1−1 . By the equality β1 = bn − bn β1 ̺1 = bn − b2n ̺1 + b2n β1 ̺21 , (5.33) (1) (2) (3) we have Qn = Qn + Qn + Qn , where −1 −1 Q(1) Σ − trV −1 ΣD −1 ), n = bn E(trD1 V 2 ′ −1 −1 Q(2) r1 − n−1 trD1−1 V −1 Σ), n = −nbn E̺1 (r1 D1 V  2 2 ′ −1 −1 Q(3) r1 − n−1 EtrV −1 ΣD −1 . n = nbn Eβ1 ̺1 r1 D1 V (1) For Qn , apply (5.9) and (5.33) again, EtrV −1 Σ(D1−1 − D −1 ) = Eβ1 r1′ D1−1 V −1 ΣD1−1 r1 =bn n−1 EtrD1−1 V −1 ΣD1−1 − bn Eβ1 ̺1 r1′ D1−1 V −1 ΣD1−1 r1 . (5.34) By Lemma (A.2), Hölder’s inequality and the fact that r1′ D1−1 V −1 ΣD1−1 r1 , bn and β1 are all bounded for z ∈ Cn , the second term in Equation (5.34) (3) is o(1). Analogously, we can get that Qn = o(1). Together with applying (1) Lemma A.1 to Qn , we finally obtain that   Eξ 4 2 −1 − 1 EtrD1−1 ΣEtrD1−1 V −1 Σ Q n = − bn n p(p + 2)   2Eξ 4 2 −1 − bn n − 1 EtrD1−1 V −1 ΣD1−1 Σ + o(1) p(p + 2) 2 (4) 2 (5) := − (τ − 2)c−1 n bn Qn − bn Qn + o(1), (5.35) (4) (5) where Qn = n−2 EtrD −1 ΣEtrD −1 V −1 Σ and Qn = n−1 EtrD −1 V −1 ΣD −1 Σ. (5) The limit of Qn can be obtained by a similar approach to deriving (4.13)(4.22) in Bai and Silverstein (2004). It turns out that  −1 Z Z t2 dHp (t) cn (tEmn )2 dHp (t) (5.36) Q(5) + o(1). = 1 − c n n z2 (1 + tEmn )3 (1 + tEmn )2 COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 27 (4) The quantity Qn is new under the elliptical model. To study its limit, similar to (5.21), we approximate the matrix D −1 (z) by L̃ = −zI + bn Σ. Notice that bn = Eβ1 + O(n−1/2 ) = −zEmn + O(n−1/2 ) → −zm, as n → ∞. By (5.28), it follows that L̃ is nonsingular and ||L̃−1 || is bounded. Then, analogous to (5.21)-(5.24), we have (5.37) D −1 − L̃−1 = bn R̃1 + R̃2 + R̃3 , where (5.38) (5.39) |EtrR̃1 M | ≤ n1/2 K, |EtrR̃2 M | ≤ n1/2 K(E||M ||4 )1/4 , |trR̃3 M | ≤ K(E||M ||2 )1/2 for any p × p nonrandom matrix M with bounded norm. From (5.37)-(5.38), we have that Z tdHp (t) cn −1 −1 (5.40) + o(1), n EtrD Σ = − z 1 + tEmn Z tdHp (t) cn (5.41) + o(1), n−1 EtrD −1 V −1 Σ = − z (1 + tEmn )2 Equations (5.40) and (5.41) imply that Z Z tdHp (t) c2n tdHp (t) (4) + o(1). (5.42) Qn = 2 z 1 + tEmn (1 + tEmn )2 Combining (5.31), (5.35), (5.36) and (5.42), we finally get  Z Z tmF cn ,Hp dHp (t) tm2n dHp (t) (2) Mn (z) = (τ − 2)cn 1 + tEmn (1 + tEmn )2  −1  Z 2 Z t mF cn ,Hp m2n dHp (t) (tEmn )2 dHp (t) + cn 1 − cn (1 + tEmn )3 (1 + tEmn )2  −1 Z Emn mF cn ,Hp t2 dHp (t) × 1 − cn + o(1) (1 + tEmn )(1 + tmF cn ,Hp ) Z Z (m′ t)2 dH(t) (zm + 1)m′ tdH(t) + c , →(τ − 2) 2 (1 + tm) m(1 + tm)3 where m′ = m′ (z) denotes the derivative of m(z) with respective to z. The boundedness and uniform equicontinuity for z ∈ Cn can be verified directly following the arguments on Pages 592-593 of Bai and Silverstein (2004). So we omit them here. Then, the proof of Theorem 2.2 is complete. 28 J. HU ET AL. APPENDIX A: APPENDIX These lemmas can be viewed as extensions of independent cases. Their proofs are postponed to the supplementary material (Hu et al., 2017). Lemma A.1. Let x = ξu where ξ and u are defined in Assumption (b). Then, for any p × p complex matrices C and C̃, (A.1)  Eξ 4  E(x′ Cx−trC)(x′ C̃x−trC̃) = trCtrC̃ + trC C̃ ′ + trC C̃ −trCtrC̃. p(p + 2) Lemma A.2. Let x = ξu where ξ satisfies (5.8), independent of u ∼ U (S p−1 ), then for any p × p complex matrix C and q ≥ 2, E|x′ Cx − trC|q ≤ K||C||q δnq−2 pq−1 , (A.2) where K is a positive constant depending only on q. √ Lemma A.3. Let r = ξu/ n where ξ satisfies (5.8), independent of u ∼ U (S p−1 ). Then, for any nonrandom p × p matrix Ck , k = 1, . . . , q1 and C̃l , l = 1, . . . , q2 , q1 , q2 ≥ 0, ! q1 q2 q1 q2 Y Y Y Y −(1∧q2 ) (q2 −2)∨0 ′ ′ −1 ≤ Kn δn ||Ck || ||C̃l ||, E r Ck r (r C̃l r − n trC̃l ) k=1 k=1 l=1 l=1 where K is a positive constant depending on q1 and q2 . Lemma A.4. Suppose (5.8) holds. Then, for any positive s, P (||Bn || > ηr ) = o(n−s ), √ whenever ηr > lim supp→∞ ||Σ||(1 + c)2 . If 0 < lim inf p→∞ λΣ min I(0,1] (c) then, −s n P (λB min < ηl ) = o(n ), √ 2 whenever 0 < ηl < lim inf p→∞ λΣ min I(0,1) (c)(1 − c) . ACKNOWLEDGEMENT The authors are grateful to Prof. Zhidong Bai for discussions on the innovation of high-dimensional elliptical models, and to Prof. Jianfeng Yao for discussions on spiked covariance models. They also would like to thank the editors and referees whose careful and detailed comments have led to great improvements of the manuscript. COVARIANCE MATRICES IN ELLIPTICAL DISTRIBUTIONS 29 REFERENCES Anderson, T. W. (2003). An introduction to multivariate statistical analysis, 3rd. ed., John Wiley & Sons, Hoboken, NJ. Bai, Z. D., Jiang, D. D., Yao, J. F., and Zheng, S. R. (2009). Corrections to LRT on large-dimensional covariance matrix by RMT. Ann. Statist., 37, 3822–3840. Bai, Z. D., Hu, J., Pan, G. M., and Zhou, W. (2015). Convergence of the empirical spectral distribution function of Beta matrices. Bernoulli, 21, 1538–1574. Bai, Z. D. and Silverstein, J. W. (2004). CLT for linear spectral statistics of largedimensional sample covariance matrices. Ann. Probab., 32, 553–605. Bai, Z. D. and Silverstein, J. W. (1998). No eigenvalues outside the support of the limiting spectral distribution of large dimensional random matrices. Ann. Probab., 26, 316–345. Bai, Z. D., Silverstein, J. W. (2010). Spectral analysis of large dimensional random matrices, 2nd. ed., Springer, New York. Bai, Z. D., Zhou, W. (2008). Large sample covariance matrices without independence structures in columns. Statist. Sinica, 18, 425–442. Berthet, Q. and Rigollet, P. (2013). Optimal detection of sparse principal components in high dimension. Ann. Statist. 41, 1780-1815. Billingsley, P. (1968). Convergence of Probability Measures. Wiley, New York. Billingsley, P. (1995). Probability and Measure, 3rd. ed., Wiley, New York. Donoho, D. and Jin, J. S. (2015). Higher Criticism for Large-Scale Inference, Especially for Rare and Weak Effects. Statistical Science, 30, 1–25. El Karoui, N. (2009). Concentration of measure and spectra of random matrices: Applications to correlation matrices, elliptical distributions and beyond. Ann. Appl. Probab., 19, 2362-2405. Fang, K. T., Zhang, Y. T. (1990). Generalized multivariate analysis. Springer-Verlag, Berlin; Science Press, Beijing. Gao, J. T., Han, X., Pan, G. M., and Yang, Y. R. (2017). High dimensional correlation matrices: the central limit theorem and its applications. J. Roy. Stat. Soc. Ser. B, 79, 677–693. Gupta, A. K., Varga, T., Bodnar, T. (2013). Elliptically contoured models in statistics and portfolio theory, 2nd. ed., Springer, New York. Hu, J., Li, W.M., Liu, Z. and Zhou W. Supplementary material to “High-dimensional covariance matrices in elliptical distributions with application to spherical test”. John, S., (1972). The distribution of a statistic used for testing sphericity of normal distributions. Biometrika, 59, 169–173. Jonsson, D. (1982). Some limit theorems for the eigenvalues of a sample covariance matrix. J. Multivariate Anal., 12, 1–38. Johnstone, I. M. (2001). On the distribution of the largest eigenvalue in principal components analysis. Ann. Statist., 29, 295–327. Kelker, D. (1970). Distribution theory of spherical distributions and a location-scale parameter generalization. Sankhyā Ser. A, 32, 419–430. Kotz, S. (1975). “Multivariate Distributions at a Cross-Road”, in Statistical Distributions in Scientific Work, 1, 247–270. Ledoit, O. and Wolf, M. (2002). Some hypothesis tests for the covariance matrix when the dimension is large compared to the sample size. Ann. Statist., 30, 1081–1102. Li, W. M. and Yao, J. F. (2017). On structure testing for component covariance matrices of a high-dimensional mixture. J. Roy. Stat. Soc. Ser. B, to appear. Onatski, A., Moreira, M. J., and Hallin, M. (2013). Asymptotic power of sphericity tests for high-dimensional data. Ann. Statist., 41, 1204–1231. 30 J. HU ET AL. Onatski, A., Moreira, M. J., and Hallin, M. (2014). Signal detection in high dimension: The multispiked case. Ann. Statist., 42, 225–254. Pan, G. M. and Zhou, W. (2008). Central limit theorem for signal-to-interference ratio of reduced rank linear receiver. Ann. Appl. Probab., 18, 1232–1270. Paindaveine, D. and Verdebout, T. (2016) On high-dimensional sign tests. Bernoulli, 22, 1745–1769. Rama, C. (2001). Empirical properties of asset returns: stylized facts and statistical issues. Quant. Finance, 1, 223-236. Schott, J. R. (2007). A test for the equality of covariance matrices when the dimension is large relative to the sample size. Comput. Statist. Data Anal., 51, 6535–6542. Silverstein, J. W. (1995). Strong convergence of the empirical distribution of eigenvalues of large-dimensional random matrices. J. Multivariate Anal., 55, 331–339. Silverstein, J. W. and Bai, Z. D. (1995). On the empirical distribution of eigenvalues of a class of large dimensional random matrices. J. Multivariate Anal., 54, 175–192. Tian, X. T., Lu, Y. T., and Li, W. M. (2015). A robust test for sphericity of high dimensional covariance matrices. J. Multivariate Anal., 141, 217–227. Wang, Q. W. and Yao, J. F. (2013). On the sphericity test with large-dimensional observations. Electronic Journal of Statistics, 7, 2164–2192. Yang, Y. R. and Pan, G. M. (2015). Independence test for high dimensional data based on regularized canonical correlation coefficients. Ann. Statist., 43, 467–500. Yin, Y. Q., Bai, Z. D., and Krishnaiah, P. R. (1988). On limit of the largest eigenvalue of the large dimensional sample covariance matrix. Probab. Theory Related Fields, 78, 509–521. Zou, C. L., Peng, L. H., Feng, L., and Wang, Z. J. (2014). Multivariate-sign-based highdimensional tests for sphericity. Biometrika, 101, 229–236. KLASMOE and School of Mathematics & Statistics School of Statistics and Management Northeast Normal University Shanghai University of Finance and Economics Changchun China 130024 Shanghai China 200433 E-mail: [email protected] E-mail: [email protected] Faculty of Science and Technology Department of Statistics and Applied Probability University of Macau National University of Singapore Macau China Singapore 117546 E-mail: [email protected] E-mail: [email protected]
10math.ST
arXiv:cs/0702131v1 [cs.CE] 22 Feb 2007 AICA: a New Pair Force Evaluation Method for Parallel Molecular Dynamics in Arbitrary Geometries Graham B. Macpherson ∗ and Jason M. Reese a Department of Mechanical Engineering, University of Strathclyde, Glasgow, G1 1XJ, UK Abstract A new algorithm for calculating intermolecular pair forces in Molecular Dynamics (MD) simulations on a distributed parallel computer is presented. The Arbitrary Interacting Cells Algorithm (AICA) is designed to operate on geometrical domains defined by an unstructured, arbitrary polyhedral mesh, which has been spatially decomposed into irregular portions for parallelisation. It is intended for nano scale fluid mechanics simulation by MD in complex geometries, and to provide the MD component of a hybrid MD/continuum simulation. AICA has been implemented in the open-source computational toolbox OpenFOAM, and verified against a published MD code. Key words: molecular dynamics, nano fluidics, hybrid simulation, intermolecular force calculation, parallel computing PACS: 31.15.Qg, 47.11.Mn 1 Introduction and Motivation 1.1 MD Simulation in Arbitrary Geometries Simulations of nano scale liquid systems can provide insight into many naturallyoccurring phenomena, such as the action of proteins that mediate water transport across biological cell membranes [1]. They may also facilitate the design ∗ Corresponding author. Email addresses: [email protected] (Graham B. Macpherson), [email protected] (Jason M. Reese). Preprint submitted to arXiv 6 December 2017 of future nano devices and materials (e.g. high-throughput, highly selective filters or lab-on-a-chip components). The dynamics of these very small systems are dominated by surface interactions, due to their large surface area to volume ratios. However, these surface effects are often too complex and material-dependent to be treated by simple phenomenological parameters [2] or by adding ‘equivalent’ fluxes at the boundary [3]. Direct simulation of the fluid using molecular dynamics (MD) presents an opportunity to model these phenomena with minimal simplifying assumptions. Some MD fluid dynamics simulations have been reported [4–8], but MD is prohibitively computationally costly for simulations of systems beyond a few tens of nanometers in size. Fortunately, the molecular detail of the full flowfield that MD simulations provide is often unnecessary; in liquids, beyond 5–10 molecular diameters (. 3nm for water) from a solid surface the continuumfluid approximation is valid and the Navier-Stokes equations with bulk fluid properties may be used [2, 9, 10]. Hybrid simulations have been proposed [11– 14] to simultaneously take advantage of the accuracy and detail provided by MD in the regions that require it, and the computational speed of continuum mechanics in the regions where it is applicable. An example application of this technique is shown schematically in figure 1, where a complex molecule is being electrokinetically transported into a nanochannel for separation and identification [15]. Only the complex molecule, its immediately surrounding solvent molecules, and selected near-wall regions require an MD treatment; the remainder of the fluid (comprising the vast majority of the volume) may be simulated by continuum mechanics. A hybrid simulation would allow the effect of different complex molecules, solvent electrolyte composition, channel geometry, surface coatings and electric field strengths to be analysed, at a realistic computational cost. In order to produce a useful, general simulation tool for hybrid simulations, the MD component must be able to model complex geometrical domains. This capability does not exist in currently available MD codes: domains are simple shapes, usually with periodic boundaries. The most important, computationally demanding, and difficult aspect of any MD simulation is the calculation of intermolecular forces. This paper describes an algorithm that is capable of calculating pair force interactions in arbitrary, unstructured mesh geometries that have been parallelised for distributed computing by spatial decomposition. 1.2 Neighbour Lists are Unsuitable The conventional method of MD force evaluation in distributed parallel computation is to use the cells algorithm to build ‘neighbour lists’ for interacting 2 pairs with the ‘replicated molecule’ method of providing interactions across periodic boundaries and interprocessor boundaries, where the system has been spatially partitioned [16–18]. The spatial location of molecules in MD is dynamic, and hence not deducible from the data structure that contains them. A neighbour list defines which pairs of molecules are within a certain distance of each other, and as such need to interact via intermolecular forces. Neighbour lists are unsuitable when considering systems of arbitrary geometry, that may have been divided into irregular and complex mesh segments using standard mesh partitioning techniques (see, for example, figure 2) for two reasons: (1) Interprocessor molecule transfers: A molecule may cross an interprocessor boundary at any point in time (even part of the way through a timestep), at which point it should be deleted from the processor it was on and an equivalent molecule created on the processor on the other side of the boundary. Given that neighbour lists are constructed as lists of array indices, references or pointers to the molecule’s location in a data structure, deleting a molecule would invalidate this location and require searching to remove all mentions of it. Likewise, creating a molecule would require the appropriate new pair interactions to be identified. Clearly this is not practical. It is conventional to allow molecules to ‘stray’ outside of the domain controlled by a processor and carry out interprocessor transfers (deletions and creations) during the next neighbour list rebuild. This is only possible when the spatial region associated with a processor can be simply defined by a function relating a position in space to a particular cell on a particular processor (i.e. a uniform, structured mesh, representing a simple domain). In a geometry where the space in question is defined by a collection of individual cells of arbitrary shape, this is not possible. For example the location the molecule has ‘strayed’ to may be on the other side of a solid wall on the neighbour processor, or across another interprocessor boundary. For the molecule to end up unambiguously in the correct place, interprocessor transfers must happen as molecules cross a face. (2) Spatially resolved flow properties: MD simulations used for flow studies must be able to spatially resolve fluid mechanic and thermodynamic fields. This is achieved by accumulating and averaging measurements of the properties of molecules in individual cells of the same mesh that defines the geometry. If a molecule is allowed to stray outside of the domain controlled by a processor, as above, then it would not be unambiguous and automatic which cell’s measurement the molecule should contribute to. 3 While both of these problems could be mitigated by, for example, working out which cell a molecule outside the domain should be in on another processor and sending its information, doing so would result in an inelegant and inflexible arrangement with each additional simulation feature (i.e. a different measured variable or class of intermolecular potential) requiring special treatment. We have, therefore, developed a new algorithm which is of comparable computational cost to neighbour lists, but designed to be powerful and generic for simulation in arbitrary geometries. As will be shown, neighbour lists also have some unfavourable features that could be improved upon. 2 Arbitrary Interacting Cells Algorithm (AICA) 2.1 Replicated Molecule Periodicity and Parallelisation When parallelising an MD calculation, the spatial domain of the simulation is decomposed and each processor is given responsibility for a single region [16]. Molecules are, of course, able to cross the boundaries between these regions and therefore need to be communicated from one processor to the next. Processors also communicate when carrying out intermolecular force calculations, in which molecules close to processor boundaries need to be replicated on their neighbours to provide interactions. This process is illustrated in figure 3. Periodic boundaries also require information about molecules that are not adjacent physically in the domain (see figure 4), these required interactions can also be constructed by creating copies of molecules outside the boundary. It is possible to handle processor and periodic boundaries in exactly the same way, since they have the same underlying objective: molecules near to the edge of a region need to be copied either between processors or to other locations on the same processor at every timestep to provide interactions. This is a useful feature because decomposing a mesh for parallelisation will often turn a periodic boundary into a processor boundary. The issue is how to efficiently identify which molecules need to be copied, and to which location, because this set continually changes as the molecules move. 2.2 Interacting Cell Identification The new Arbitrary Interacting Cells Algorithm (AICA) we propose here is an extension of the Conventional Cells Algorithm (CCA) [16]. In the CCA, a simple (usually cuboid) simulation domain is subdivided into equally sized 4 cells. For computational and theoretical reasons, intermolecular potentials do not extend to infinity; they are assigned a cut-off radius, rcut , beyond which they are set to zero. The minimum dimension of the CCA cells must be greater than rcut , so that all molecules in a particular cell interact with all other molecules in their own cell and with those in their nearest neighbour cells (i.e. those they share a face, edge or vertex with — 26 in 3D). AICA uses the same type of mesh as would be used in Computational Fluid Dynamics (CFD) to define the geometry of a region. There are no restrictions on cell size, shape or connectivity. Each cell has a unique list of other cells that it is to interact with, this list is known as the Direct Interaction List (DIL) for the Cell In Question (CIQ). It is constructed by searching the mesh to create a set of cells that have at least one vertex within a distance of rcut from any of the vertices of the CIQ, see figure 5. The DILs are established prior to the start of simulation and are valid throughout because the spatial relationship of the cells is fixed, whereas the set of molecules they contain is dynamic. In a similar way to the CCA, at every timestep a molecule in a particular cell calculates its interactions with the other molecules in that cell and consults the cell’s DIL to find which other cells contain molecules it should interact with. Information is required to be maintained stating which cell a molecule is in — this is straightforward and computationally cheap. The construction of the DILs and accessing molecules is done in such a way as to not double-count interactions, similarly to the CCA. For example, if cells A and B need to interact, cell B will be on cell A’s DIL, but cell A will not be on cell B’s DIL. When a molecule in cell A interacts with one in cell B the molecule in cell B will receive the inverse of the force vector calculated to be added to the molecule in cell A, because the pair forces are reciprocal, i.e. fab = −fba . It is possible in rare cases for small errors to be caused by this algorithm: small slices of volume in cells may not be identified for interaction (see figure 6). The errors introduced will be slight because the relative volume not accounted for will be very small: in figure 6, only when molecules are in both the indicated regions of each cell will either miss out on an interaction, and the intermolecular potential will be small at this distance. A small guard distance could be added to rcut when constructing the DIL to reduce this error. This is less of a problem in good quality meshes, e.g. hexahedral rather than tetrahedral cells. 2.2.1 Referred Molecules and Cells Replicated molecule parallelisation and periodic boundaries are handled in the same way using referred cells (see figure 5) and referred molecules. 5 Referred molecule: A copy of a real molecule that has been placed in a region outside a periodic or processor boundary in order to provide the correct intermolecular interaction with molecules inside the domain. A referred molecule holds only its own position and id (i.e. identification of which type of molecule it is for heterogenous simulations). Referred molecules are created and discarded at each timestep, and do not report any information back to their source molecules. Therefore if molecule j on processor 1 needs to interact with molecule k on processor 2, a separate referred molecule will be created on each processor. Referred cell: Referred cells define a region of space and hold a collection of referred molecules. Each referred cell knows • which real cell in the mesh (on which processor) is its source; • the required transformation to refer the positions and orientations of the real molecules in the source cell to the referred location (see below for the details of how cells and molecules are referred); • the positions of all of its own vertices. These are the positions of the vertices of the source cell which have been transformed by the same referring transform as the referred molecules it contains; • which real cells are in range of this particular referred cell and hence require intermolecular interactions to be calculated. This is constructed once at the start of the simulation in the same way as the DIL for real-real cell interactions — the vertices of the real cells in the portion of mesh on the same processor as the referred cell are searched, those with at least one vertex in range of any vertex of the referred cell are found. 2.2.2 Referring Transformations A spatial transformation is required to refer a cell across a periodic or processor boundary. Figure 7 shows the most general case of a cell being referred across a separated, non-parallel boundary, where, α0 = Cell with a face on one side of the boundary. β 0 = Cell with a face on the other side of the boundary, coupled to α0 α1 = Cell α0 referred across the boundary. C = Cell centre. n = Face normal unit vector. Sα0 β 0 = Cβ 0 − Cα0 . Position shift from Cα0 to Cβ 0 . Rα0 β 0 = Tensor required to rotate −n̂α0 to n̂β 0 , given by, 6 Rα0 β 0 nα × nβ = − (nα · nβ ) I + (1 + nα · nβ ) |nα × nβ | !2 + nα nβ − nβ nα , (1) where I is the identity tensor. The absolute position, P′ , of a molecule has been transformed across a boundary (with its containing cell) from its original position, P is required. To derive the P → P′ transform, first the position of P relative to centre of the coupled face on α0 is given as, P − Cα0 . (2) Then this vector is rotated by the transformation tensor defined by the source and destination coupled face normals, Rα0 β 0 · (P − Cα0 ). (3) The rotated position is transformed back to global coordinates, Cα0 + Rα0 β 0 · (P − Cα0 ), (4) and then shifted by the relative separation of the coupled face centres, i.e. P′ = Cα0 + Sα0 β 0 + Rα0 β 0 · (P − Cα0 ), = Cα0 + Cβ 0 − Cα0 + Rα0 β 0 · (P − Cα0 ), = Cβ 0 − Rα0 β 0 · Cα0 + Rα0 β 0 · P. (5) The result is the same if the point is shifted by Sα0 β 0 prior to rotation by Rα0 β 0 around Cβ 0 . The final position of P′ is the same if any coupled face centre/face normal pair on the boundary is used. Therefore, all cells and all molecules referred across a particular boundary may use the transformation derived from one cell. This result can be used to transform the positions of all of the molecules in a source cell to their correct position in a referred cell. Molecules being referred also operate on their own rotationally dependant properties (e.g. angular orientation) using the rotation tensor. This transformation is suitable for multiple periodic boundaries and arbitrary mesh decompositions where existing referred cells must be re-referred by other boundaries. This creates the 7 cell relationships across edges, corners, and also on non-neighbouring processors. See Appendix B for an example. Cell re-referring is achieved by writing equation (5) as a generic transform, P′ = y + R · P, (6) y = Cβ 0 − Rα0 β 0 · Cα0 , R = Rα0 β 0 . (7) (8) where, If y and R are the transformations required to move P to P′ , then transforming P′ to P′′ using y′ and R′ gives, P′′ = y′ + R′ · P′ , = y′ + R′ · y + R′ · R · P, = y′⋆ + R′⋆ · P, (9) reduced to the generic form by defining, y′⋆ = y′ + R′ · y, R′⋆ = R′ · R. (10) (11) Further re-referrals can be reduced to a single transform in a predictable way, with only a single vector/tensor pair required to be stored by the referred cell at any stage. Any number of cell referring transformations may be made sequentially, but the resulting transformation takes the initial source position (P) and directly transforms it to the final destination, regardless of, and without having to intermediately visit, the other referred locations along the way. 2.3 Intermolecular Force Calculation Algorithm Details At the start of the simulation, the DIL for each cell are created, referred cells are created and they determine which real cells they must supply interactions 8 to. Details of how these are constructed can be found in Appendix A. Cells requiring to be referred need not be on processors sharing a boundary with their destination processor, i.e. AICA must be able to identify interactions between non-neighbouring processors. However, when constructing the referred cells, processors may only communicate across interprocessor faces, i.e. with neighbours only. The geometry of the system is defined by a 3D, static, unstructured mesh. A cell’s position in the data structure, hence its index, does not imply anything about its physical location or connectivity. Therefore, the ability to handle arbitrary geometries comes from deducing locally which cells are in range to interact. The same net force on any molecule will be calculated irrespective of cell size and shape (except in rare instances, see section 2.2). The total intermolecular force acting upon a molecule is calculated at each timestep by considering two types of interactions. Real-Real interactions occur between a molecule and others on the same processor. Real-Referred interactions occur between real molecules and referred molecules arising from the other side of a processor or periodic boundary. Referred molecules do not need to calculate interactions between themselves, because every referred molecule is a copy of a real molecule elsewhere, and as such will receive all of its real-real and real-referred interactions in-situ. 2.3.1 Real-Real Molecule Force Calculation At each time step, the real molecules on each processor calculate their intermolecular interactions as follows: for all cells, denoted I { for all molecules in cell I, denote mol k { for all cells in cell I’s DIL, denote cell J { for all molecules in cell J, denote mol l { calculate intermolecular force, Fkl, between mol k and mol l. Add Fkl to mol k, add Flk = -Fkl to mol l. } } for all molecules in cell I, denote mol k’ { if index of, or pointer to, mol k’ > mol k 9 then calculate intermolecular force, Fkk’, between mol k and mol k’. Add Fkk’ to mol k, add -Fkk’ to mol k’. } } } Comparison of the index, or pointer to molecules in the same cell, mol k’ > mol k, means that interactions between molecules in the same cell are not double counted and a molecule does not calculate an interaction with itself. The order of comparison is not important, as long as all pairs are covered, so using mol k’ < mol k as a condition would work equally well. 2.3.2 Real-Referred Molecule Force Calculation At each timestep all real cells which are the source cell of one or more referred cells send the position and id of all of the molecules they contain to the appropriate referred cell on the appropriate processor. The destination referred cells perform the appropriate position and orientation transformation when the molecules are received. These referred molecules calculate their intermolecular interactions with real molecules as follows: for all referred cells, denoted M { for all referred molecules in referred cell M, denote mol q { for all real cells that referred cell M interacts with, denote cell N { for all real molecules in cell N, denote mol p { calculate intermolecular force, Fpq, between mol p and mol q. Add Fpq to mol p. } } } } 2.4 Prediction of Computational Speed The following analysis determines whether or not AICA is practical, by predicting its computational cost relative to that of the CCA and Neighbour List Algorithm (NLA). 10 Assuming a system of approximately uniform density, the volume of space around a particular molecule to be interrogated by a particular algorithm will be directly proportional to the number of pair interactions to be evaluated, which is itself directly proportional the computational cost per timestep. For a given cut off radius, rcut , the volume associated with a particular algorithm is: Ideal: Evaluating the minimum possible number of pairs is equivalent to a sphere of radius rcut , 4 3 Videal = πrcut . (12) 3 However, it is not possible to design an algorithm that only evaluates the ideal case because the relative spatial arrangement of molecules is not known in advance from one timestep to the next. CCA: The volume encompassed by the CCA depends on the cell size — it is minimum when cells are cubic with side length rcut . The volume of the cell containing the molecule in question, plus that of its 26 neighbours is encompassed, giving 3 . (13) VCCA = 27rcut NLA: The neighbour list for a particular molecule includes all molecule interaction pairs within a sphere of radius rcut plus a guard distance ∆R [16]. It is constructed using the CCA, where the cells must be at least rcut + ∆R in size, and has a lifetime of L timesteps before invalidation. Therefore, each timestep that the neighbour list is used for must absorb a fraction of the CCA cost required to construct the list — the shorter the lifetime of the neighbour list, the more costly the NLA becomes. Therefore, 4 27 VN LA = π (rcut + ∆R)3 + (rcut + ∆R)3 . (14) 3 L AICA: The volume encompassed by AICA is the total volume of all cells which have at least one vertex within rcut of any vertex of the cell containing the molecule in question, plus the volume of this cell. This depends on the local topology of the mesh. As a simple example, consider a uniform mesh of cubes of side length w. A piecewise function, Nc (rcut /w) has been derived to count the number of cubes, each of volume w 3 , that have at least one corner within a distance of rcut /w of a corner of a central cube (which is included). In this case, VAICA = Nc (rcut /w)w 3. (15) These volumes are plotted on figure 8 with w/rcut as the independent variable, lower values of w/rcut representing a finer mesh for a given cut-off radius. AICA is costlier than the CCA or NLA in coarse meshes, however, when w . 0.4rcut (see inset for detail) AICA has a similar computational cost to the NLA, for 11 the chosen representative values of L and ∆R. The discontinuities in VAICA are due to the steps in Nc (rcut /w) which arise when a threshold is crossed and another ‘layer’ of cubes is required. While real meshes in complex geometries will not comprise uniform cubes, this result demonstrates that AICA can be of comparable speed to the NLA, and gives an indication of the required refinement. As the mesh becomes finer, the set of cells selected to interact with the cell at the centre becomes an increasingly accurate approximation of the ideal sphere, this can be seen in the VAICA function, which asymptotically approaches Videal as w/rcut → 0. Note that, in this example, AICA and the CCA are equivalent when w/ccut = 1 because their cells are the same size. 2.4.1 Neighbour List Lifetime Prediction The computational cost of the neighbour list algorithm depends on the number of timesteps a neighbour list remains valid for — a quantity whose dependence on simulation properties can be predicted. For a given number of molecules, N, of mass m, in equilibrium at a temperature T , there is a probability of 1/N that a molecule in the system will be travelling with a velocity vN . It is therefore likely that at every timestep there will be one molecule travelling at, or close to this velocity. Given that a neighbour list is invalidated when the cumulative sum of maximum displacements in the system exceeds a fixed threshold (usually 0.5∆R, half the guard radius [16]), finding the number of timesteps required for a molecule travelling at vN to cover this distance gives an estimate of the lifetime of the list. Finding vN by equating the Maxwellian velocity distribution to 1/N, where T , m and vN are in reduced MD units [19] (see figure 9): 4π  m 2πT 3 2  2 vN e −mv 2 N 2T  = 1 . N (16) The high speed solution is, vN = v  u u 2T u t− W−1 − m 1 4N s  2πT  , m (17) where W−1 is the secondary real branch of the Lambert W function. Therefore, L, the number of timesteps (of length ∆t) a neighbour list is valid for, is given by 12 L=  0.5∆R . ∆tvN  (18) This lifetime reduces with increasing temperature and system size, as shown in figure 10, resulting in a higher computational cost for the NLA. At higher temperatures, vN is higher because the velocity distribution covers a higher molecular speed range. In systems comprising more molecules, it is more probable that at least one molecule will be travelling at a given speed in the upper region of the distribution, therefore vN is also higher. The cost of AICA is not sensitive to either of these parameters, therefore it becomes increasingly attractive in large systems (> 106 molecules) where neighbour list lifetimes are low. 3 Implementation and Verification AICA has been implemented in OpenFOAM [20, 21], which is an open source C++ library intended for continuum mechanics simulation of user-defined physics (primarily used for CFD) in arbitrary, unstructured geometries. The AICA MD code has been built using OpenFOAM’s lagrangian particle tracking library, which has been used to track particles in solution, droplets in combusting diesel sprays and to perform DSMC simulations [22]. The AICA algorithm must show that it produces the correct results, assessed by momentum and energy conservation and the behaviour of average potential and kinetic energy, in three ways: (1) The code must produce the same results as another (validated) MD code. For these purposes the other code is an in-house MD code which has been validated against those supplied in [16]. (2) The results for the AICA MD code must be the same whether it is run on one processor as a serial calculation, or run in parallel on many distributed CPUs. (3) The topology of the underlying mesh must not make any difference to the results. The serial/parallel test case for AICA is shown in figure 11. The test mesh is decomposed into 24 portions, the three examples shown are not regular shapes and the cells are nonuniform in size (the mesh is graded in each direction). While this test mesh is structured, the algorithm makes no use of this fact, so a mesh comprising cells of any size, shape or connectivity would produce the same result. This case will therefore demonstrate the independence of the AICA from the form of the geometry used. 13 Figures 12, 13 and 14 show the average kinetic (KE), potential (PE) and total (TE) energy per molecule for a system containing 27000 Lennard Jones molecules, starting in a simple cubic lattice at a temperature of 120K. No equilibration or thermostat has been applied. Results for the in-house code, the AICA code in serial on a PC and the AICA code decomposed and run on 24 processors of a cluster show that the KE and PE graphs follow very similar trends to the in-house code. The simulations do not follow exactly the same trajectory because the velocities in the systems are initialised by random numbers, which are different between the two codes. This is likely to account for the slight (0.0025%) difference in average TE. The serial and parallel tests use the same initial velocity configuration and each value for KE, PE and TE are the same to better than 1 part in 1012 . Momentum is conserved in both serial and parallel tests to approximately 1 part in 1016 . Given that the serial and parallel results are exactly the same, the AICA must be creating the correct referred cells and molecules, and calculating realreferred interactions perfectly, even with the relatively complex decomposed portions of the mesh. A comparison of how the computational speed changes with mesh refinement, compared to the predictions in section 2.4, and further tests of how the AICA performance scales in parallel will appear in a future publication. 4 Conclusions Our Arbitrary Interacting Cell Algorithm (AICA) has been described, which is a new way of calculating pair forces in a molecular dynamics simulation, carried out on an arbitrary unstructured mesh that has been spatially decomposed to run in parallel. The algorithm is expected to achieve a similar computational speed to the neighbour list method, but does not suffer from the identified degradations in performance that neighbour lists experience in large systems and at high temperatures. AICA has been implemented in the OpenFOAM code, and produces the same results when a system is simulated in serial, or in parallel on a mesh decomposed into irregular shapes on 24 processors. The exchange of intermolecular force information across interprocessor boundaries must therefore be correct. Currently this algorithm deals only with short ranged pair forces. Future developments will include rigid and flexible polyatomic molecules, and long-range electrostatic forces. A hybrid MD/continuum implementation in OpenFOAM is currently under development. OpenFOAM is ideal for incorporating polar fluids and electrokinetic actuation, which feature in envisioned applications, because it is able to simulate electromagnetic, magnetohydrodynamic and fluid 14 mechanic continuum fields on the same mesh that AICA operates with. 5 Acknowledgements The authors would like to thank Chris Greenshields and Matthew Borg of Strathclyde University (UK), and Henry Weller and Mattijs Janssens of OpenCFD Ltd. (UK) for useful discussions. This work is funded in the UK by Strathclyde University and the Miller Foundation, and through a Philip Leverhulme Prize for JMR from the Leverhulme Trust. 15 References [1] P. Agre, The aquaporin water channels, Proceedings of the American Thoracic Society 3 (1) (2006) 5–13. [2] J. Koplik, J. R. Banavar, Continuum deductions from molecular hydrodynamics, Annual Review of Fluid Mechanics 27 (1995) 257–292. [3] H. Brenner, V. Ganesan, Molecular wall effects: are conditions at a boundary “boundary conditions”?, Physical Review E 61 (6) (2000) 6879–6897. [4] D. Hirshfeld, D. Rapaport, Molecular dynamics simulation of Taylor-Couette vortex formation, Physical Review Letters 80 (24) (1998) 5337–5340. [5] D. Rapaport, E. Clementi, Eddy formation in obstructed fluid flow: a moleculardynamics study, Physical Review Letters 57 (6) (1986) 695–698. [6] K. Travis, B. Todd, D. Evans, Poiseuille flow of molecular fluids, Physica A 240 (1-2) (1997) 315–27. [7] K. Travis, B. Todd, D. Evans, Departure from Navier-Stokes hydrodynamics in confined liquids, Physical Review E 55 (4) (1997) 4288–95. [8] T. Qian, X.-P. Wang, Driven cavity flow: from molecular dynamics to continuum hydrodynamics, Multiscale Modeling and Simulation 3 (4) (2005) 749–763. [9] T. Becker, F. Mugele, Nanofluidics: viscous dissipation in layered liquid films, Physical Review Letters 91 (2003) 166104. [10] H. Okumura, D. M. Heyes, Comparisons between molecular dynamics and hydrodynamics treatment of nonstationary thermal processes in a liquid, Physical Review E 70 (6) (2004) 061206. [11] R. Delgado-Buscalioni, P. V. Coveney, Hybrid molecular-continuum fluid dynamics, Philosophical Transactions of the Royal Society London 362 (1821) (2004) 1639–1654. [12] G. Wagner, E. G. Flekkøy, Hybrid computations with flux exchange, Philosophical Transactions of the Royal Society London 362 (1821) (2004) 1655– 1665. [13] X. B. Nie, S. Y. Chen, W. E, M. O. Robbins, A continuum and molecular dynamics hybrid method for micro- and nano-fluid flow, Journal of Fluid Mechanics 500 (2004) 55–64. [14] T. Werder, J. H. Walther, P. Koumoutsakos, Hybrid atomistic-continuum method for the simulation of dense fluid flows, Journal of Computational Physics 205 (1) (2005) 373–390. [15] S. Pennathur, J. G. Santiago, Electrokinetic transport in nanochannels. 2. experiments, Analytical Chemistry 77 (21) (2005) 6782–6789. 16 [16] D. C. Rapaport, The Art of Molecular Dynamics Simulation, 2nd ed., Cambridge University Press, 2004. [17] W. Smith, Molecular dynamics on hypercube parallel computers, Computer Physics Communications 62 (2–3) (1991) 229—248. [18] D. Rapaport, Multi-million particle molecular dynamics. II. Design considerations for distributed processing, Computer Physics Communications 62 (2–3) (1991) 217–228. [19] M. Allen, D. Tildesley, Computer simulation of liquids, Oxford University Press, 1987. [20] H. G. Weller, G. Tabora, H. Jasak, C. Fureby, A tensorial approach to computational continuum mechanics using object-oriented techniques, Computers in Physics 12 (1998) 620–631. [21] OpenFOAM, www.openfoam.org. [22] J. Allen, T. Hauser, foamDSMC: An object oriented parallel DSMC solver for rarefied flow applications, in: 45th AIAA Aerospace Sciences Meeting and Exhibit, Reno, Nevada, 2007. 17 A Cell Interactions Building interaction lists and identifying and creating referred cells is allowed to be computationally expensive (within reason) because it will only happen once at the beginning of the MD simulation. Accessing the information, however, must be as fast as possible because it will happen at every timestep. Cell interactions are based on the largest cut-off radius of any intermolecular potential in a heterogenous system, r̂cut . It is possible to have different interaction lists when potentials with substantially different cut-off radii are used. A.1 Building DILs To create each real cell’s DIL, a non double counting loop through all cells is used, where the cells are accessed by an index (i or j) running 0 → k − 1, where there are k cells in the portion of mesh on the processor in question, i.e. for cells, denote cell i, starting i = 0, while i < k-1 { for cells, denote cell j, starting j = i+1, while j < k { calculate magnitude of spatial separation of all vertices of cell i with all vertices of cell j. if any separation distance is less than the maximum cut off radius, add cell j to cell i’s DIL. } } For example, if there are k = 5 cells, the array index runs from 0 → 4: i j 0 1, 2, 3, 4 1 2, 3, 4 2 3, 4 3 4 All cell combinations have been created once, i.e. when i = 2, j = 1 would produce the 2–1 combination, which is already identified as 1–2. This non double counting procedure means that some cells will have few or no other 18 cells in their DIL, however, as long as the correct cell pair is created in one of the cell’s DIL, this is not an issue. It is also designed so that a cell does not end up on its own DIL, the interactions between molecules in the same cell are handled separately. A.2 Creating Referred Cells Coupled patches are the basis of periodic and interprocessor communication for creating referred cells. Patches, in general, are a collection of cell faces representing a mesh boundary of some description — they may provide solid surfaces, inlets, outlets, symmetry planes, periodic planes, or interprocessor connections. Coupled patches provide two surfaces; whatever exits one enters the other and vice versa. Two types are used in AICA: • Periodic patches on a single processor are arranged into two halves, each half representing one of the coupled periodic surfaces. When a molecule crosses a face on one surface, it is wrapped around to the corresponding position on the corresponding face on the other surface. • Processor patches provide links between portions of the mesh on different processors, one half of the patch is on each processor. When a molecule crosses a face on one surface, it is moved to the corresponding position on the corresponding face on the other surface, on the other processor. Decomposing a mesh for parallelisation will often require a periodic patch to be changed to a processor patch. The surfaces of coupled patches may have any relative orientation, and may be spatially separated as long as the face pairs on each surface correspond to each other. This allows them to also be used as a ‘recycling’ surface in a flow simulation — whatever exits from an outlet is reintroduced at an inlet, with the option of scaling the molecule’s properties, e.g. temperature and pressure. A.2.1 Create Patch Segments. In the decomposed portion of the mesh on each processor, each processor and periodic patch should be split into segments, such that: • faces on a processor that were internal to the mesh prior to decomposition end up on a segment; • faces on a processor patch that were on separate periodic patches on the undecomposed mesh end up on different segments. These segments are further split such that faces that were on different halves of the periodic patch on the undecomposed mesh end up on different segments; • faces on different halves of a periodic patch end up on different segments. 19 Each segment must produce a single vector/tensor transformation pair (see section 2.2.2) which will be applied to all cells referred across it. A.2.2 Cell Referring Iterations. For each patch segment: (1) Find all real and existing referred cells in range (with at least one vertex within a distance of r̂cut ) of at least one vertex of the faces comprising the patch segment. (2) Refer or re-refer this set of cells across the boundary defined by the patch segment using its transformation, see section 2.2.2. In the case of a segment of periodic boundary, this creates new referred cells on the same processor. For a segment of a processor patch, these cells are communicated to, and created on the neighbouring processor. Before creating any new referred cell a check is carried out to ensure that it is not • a duplicate referred cell, one that has been created already by being referred across a different segment; • a referred cell trying to be duplicated on top of a real cell, i.e. a cell being referred back on top of itself. If the proposed cell for referral would create a duplicate of an existing referred cell, or end up on top of a real cell, then it is not created. To be a duplicate, the source processor, source cell and the vector part of the transformation (see section 2.2.2) must be the same for the two cells (note, the vector part of transformation for a real cell is zero by definition). A single run of these steps will usually not produce all of the required referred cells. They are repeated until no processor adds a referred cell in a complete evaluation of all segments, meaning all possible interactions are accounted for. In iterations after the first, in step 1 it is enough to only search for referred cells in range of the faces on the patch segment, because the real cells will not have changed, and would all be duplicates. The final configuration of referred cells does not depend on the order of patch segment evaluation. Appendix B contains an example of the results of the cell referring process. B Example Construction of Referred Cells Figures 15 and 16 show the start and end points of the cell referring operation on a mesh that has been decomposed to run in parallel. The example is in 2D for clarity but the process is exactly the same in 3D. In this example the number of referred cells created far exceeds the number 20 of real cells, which would lead to much costly interprocessor communication. This is because the mesh has been made deliberately small relative to r̂cut to demonstrate as many features of the algorithm as possible and to be practical to understand. In realistic systems, the mesh portions would be significantly bigger than r̂cut and the referred cells would form a relatively thin ‘skin’ around each portion. Decomposition of the mesh should preferably be carried out to minimise the number of cells that need to be referred, and to ensure that the vast majority of the intermolecular interactions happen between real-real molecule pairs; in this way the communication cost is minimised. 21 Solid MD Region Flow Nanochannel Complex molecule Fig. 1. Schematic of an application of a hybrid MD/continuum simulation: complex molecules being transported into a nano channel. Only the complex molecules, regions near them and regions near solid surfaces need an MD treatment, the remaining volume can be simulated with continuum mechanics. 22 Fig. 2. Example of a molecular dynamics flow simulation in a complex nano channel. The mesh is decomposed into five irregular portions, four of which are shown as shaded blocks, the molecules contained in the fifth portion are shown. 23 A r cut Copied molecules Processor 1 Processor 2 Fig. 3. Domain decomposition. Molecule A must calculate intermolecular force contributions from all other molecules within its cut-off radius, rcut . When the domain has been decomposed, some of these molecules may lie on a different processor. In this case, copies of the appropriate molecules from processor 2 are made on processor 1. 24 B r cut Copied molecules Fig. 4. Periodic boundaries. Molecule B must calculate intermolecular force contributions from all other molecules within rcut . Some of those molecules may be on a periodic image of the system, and as such, in implementation terms, will reside on the other side of the domain. Serial calculations in simple geometries typically use the minimum image convention [16, 19], but this is not suitable for parallelisation. 25 11 00 00 11 00 11 00 11 00 11 00 11 00 11 00 11 0000 1111 0000 1111 11 00 0000 1111 0000 1111 00 11 rcut 1111 0000 0000 1111 0000 1111 0000 1111 11 00 00 11 00 11 00 11 00 11 00 11 00 11 00 11 Fig. 5. Interacting cell identification using unstructured triangular cells to demonstrate insensitivity to mesh topology. The spatial domain (main square section comprising the real cells) is periodic top-bottom and left-right. Real cells within rcut that interact with the CIQ (dark) are shaded in grey. The required referred cells are hatched in alternate directions according to which boundary they have been referred across. Realistic systems would be significantly larger compared to rcut than shown here. 26 B A rcut Fig. 6. Errors caused by cut-off radius searching from vertices only. An arc of radius rcut drawn from the indicated vertex on cell A intersects a face of cell B, therefore, molecules near this vertex should interact with molecules in the shaded region. Similarly, an arc of radius rcut drawn from the indicated face on cell B encompasses the small shaded region of cell A. The cell searching algorithm will not, however, identify cells A and B as needing to interact because none of their vertices lie within rcut of each other. 27 α0 Cα0 P Sα0 β 0 β0 −nα0 Cβ 0 α1 Rα0 β 0 nα0 P′ nβ 0 Fig. 7. A molecule at point P is referred across the boundary (heavy line) to P′ by a transformation defined by the face center/face normal vectors of the faces of cells α0 and β 0 on the boundary. The mesh is rigid, so all points of cell α1 have the same relative spatial relationship as α0 . The vertices of referred cell α1 are calculated by the same process. 28 90 V/rcut3 ∝ Computational Cost 80 70 20 15 60 10 50 0.2 40 0.3 0.4 30 VAICA VCCA VNLA, L = 5, ∆R = 0.16rcut VNLA, L = 10, ∆R = 0.16rcut Videal 20 10 0 0.2 0.4 0.6 w/rcut 0.8 1 Fig. 8. Predicted computational cost of new AICA using cubic cells, compared with conventional algorithms. ∆R = 0.16rcut derived from typical values for liquid density simulation rcut = 2.5, ∆R = 0.4 [16]. 29 Probability 1/N Velocity Magnitude vN Fig. 9. Maxwellian velocity distribution. Finding velocities corresponding to a probability of 1/N , where N is the number of molecules in the system. There are two real, positive solutions — the high speed one is vN , the quantity of interest. 30 Predicted number of timesteps of neighbourList validity 12 T=1 T = 1.5 T = 2.5 11 10 9 8 7 6 5 4 102 103 104 105 Number of molecules, N (m = 1, ∆R = 0.4, ∆t = 0.005) 106 Fig. 10. Variation of estimated neighbour list lifetime with typical simulation parameters for a Lennard Jones fluid [16]. T, m, ∆R and ∆t are in reduced MD units. 31 Fig. 11. Mesh for the serial vs. parallel test; note the grading of cells. The serial test uses the whole mesh (wireframe) and the parallel test decomposes the mesh into 24 portions (3 of which have been shown). 32 Average kinetic energy per molecule (reduced units) 1.5 1.4 1.407 1.3 1.404 1.2 1.401 1.1 1.398 1 1.395 80 0.9 100 120 140 24 processor parallel, cluster Serial, PC In house code 0.8 0.7 0 50 100 150 200 250 300 350 400 Timestep Fig. 12. Verification of kinetic energy results. Serial and parallel results are identical, see inset. 33 Average potential energy per molecule (reduced units) -3.4 -4.123 -3.6 -4.126 -4.129 -3.8 -4.132 -4.135 -4 80 -4.2 100 120 140 24 processor parallel, cluster Serial, PC In house code -4.4 0 50 100 150 200 250 300 350 400 Timestep Fig. 13. Verification of potential energy results. Serial and parallel results are identical, see inset. 34 Average total energy per molecule (reduced units) -2.7285 -2.73029 -2.729 -2.73031 -2.73033 -2.7295 -2.73035 -2.73037 -2.73 80 -2.7305 100 120 140 24 processor parallel, cluster Serial, PC In house code -2.731 0 50 100 150 200 250 300 350 400 Timestep Fig. 14. Verification of total energy results. Serial and parallel results are identical, see inset. 35 Processor 0 Processor 1 Processor 2 Fig. 15. An arbitrary unstructured mesh, which is periodic top-bottom and left-right. It is decomposed into 3 irregular portions for parallel processing as marked. 36 Real cell Referred cell Source on processor 0 11111 00000 00000 11111 00000 11111 00000 11111 00000 11111 00000 11111 Referred cell Source on processor 1 Referred cell Source on processor 2 0000 1111 0000 00001111 1111 0000 1111 11111 00000 0000 1111 0000 1111 00000 11111 0000 1111 0000 1111 00001111 1111 0000 1111 00000 11111 0000 0000 1111 0000 1111 00000 11111 0000 1111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 00000 11111 00001111 1111 0000 00000 11111 0000 1111 1111 0000 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 Processor 0 1111 0000 0000 1111 00000 11111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 00000 11111 00000 11111 00000 11111 0000 1111 00000 11111 00000 11111 00000 11111 00000 11111 00000 11111 00000 11111 00000 11111 Processor 1 0000 0000 1111 0000 111111111 0000 00000 11111 00000 11111 0000 1111 00000 11111 000001111 00001111 0000001111 111111 00001111 0000 1111 0000 1111 0000 1111 0000 1111 00000 11111 00000 11111 0000 1111 0000 1111 00000 11111 0000 1111 000000 111111 0000 1111 0000 1111 0000 1111 00000 11111 00000 11111 000000 111111 0000 1111 00000 11111 00000 11111 0000 1111 00000 11111 0000 1111 0000001111 111111 0000 0000 1111 0000 1111 0000 1111 00000 11111 00000 11111 000000 111111 00000 11111 00000 11111 0000 1111 0000 1111 00000 11111 000000 111111 000000 111111 0000 1111 000000 111111 0000 1111 0000 1111 0000 1111 0000 1111 00000 11111 00000 11111 00000 11111 0000 1111 00000 11111 00000 11111 000000 111111 00000 11111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 000000 111111 0000 1111 00000 11111 0000 1111 000000 111111 000000 111111 0000 1111 0000 1111 0000 1111 00000 11111 00000 11111 00000 11111 0000 1111 00000 11111 000000 111111 00000 11111 00000 11111 00000 11111 0000 1111 0000 1111 0000 1111 000000 111111 00000 11111 00000 11111 00000 11111 0000 1111 000000 111111 00000 11111 00000 11111 0000 1111 00000 11111 00000 11111 000000 111111 000000 111111 00000 11111 00000 11111 00000 11111 0000 1111 0000 1111 000000 111111 00000 11111 00000 11111 000000 111111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 000 111 00000 11111 00000 11111 00000 11111 000000 111111 00000 11111 0000 1111 0000 1111 00000 11111 00000 11111 00000 11111 111111 000000 000 111 00000 11111 00000 11111 00000 11111 00000 11111 0000 1111 1111 0000 000000 111111 0000 1111 00000 11111 00000 11111 00000 11111 000000 111111 000 111 00000 11111 00000 11111 00000 11111 0000 1111 000000 111111 00000 11111 00000 11111 000000 111111 00000 11111 000000 111111 000000 111111 0000 1111 000000 111111 00000 11111 000000 111111 000000 111111 0000 1111 00000 11111 000000 111111 000000 111111 0000 1111 000 111 00000 11111 000000 111111 000 111 00000 11111 000000 111111 000 111 00000 11111 000000 111111 000 111 00000 11111 000000 111111 00000 11111 000000 111111 00000 11111 000000 111111 00000 11111 00000 11111 0000001111 111111 0000 00000 11111 00000 11111 00000 11111 00000 11111 0000 1111 00000 11111 000000 111111 0000 1111 00000 11111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 00000 11111 000000 111111 000000 111111 0000 1111 00000 11111 00000 11111 00000 11111 00000 11111 000000 111111 0000 1111 00000 11111 00000 11111 0000 1111 00000 11111 000000 111111 0000 1111 0000 1111 000000 111111 00000 11111 00000 11111 00000 11111 00000 11111 000000 111111 0000 1111 00000 11111 00000 11111 0000 1111 00000 11111 000000 111111 00000 11111 00000 11111 000000 111111 0000 1111 000000 111111 0000 1111 0000 1111 00000 11111 00000 11111 00000 11111 0000 1111 000000 111111 0000 1111 00000 11111 00000 11111 00000 11111 0000 1111 0000 1111 000000 111111 00000 11111 00000 11111 0000 1111 000000 111111 000 111 000000 111111 000000 111111 00000 11111 00000 11111 00000 11111 00000 11111 0000 1111 000000 111111 0000 1111 00000 11111 00000 11111 0000 1111 000000 111111 000 111 00000 11111 00000 11111 00000 11111 000000 111111 00000 11111 00000 11111 000000 111111 0000 1111 000 111 000 111 00000 11111 00000 11111 00000 11111 000000 111111 00000 11111 00000 11111 000000 111111 0000 1111 000 111 000 111 00000 11111 000000 111111 000000 111111 000000 111111 00000 11111 00000 11111 000 111 00000 11111 00000 11111 000000 111111 000000 111111 000000 111111 000 111 00000 11111 00000 11111 000000 111111 000000 111111 0000 1111 000000 111111 0000 1111 000 111 000 111 00000 11111 00000 11111 000000 000000 111111 000000 111111 0000111111 1111 0000 1111 000 111 00000 11111 00000 11111 000000 111111 0000 1111 00000 11111 000000 111111 0000 1111 000 111 00000 11111 0000 1111 00000 11111 000000 111111 0000 1111 00000 11111 000000 111111 000 111 Processor 2 00000 11111 0000 1111 0000 1111 00000 11111 000 111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 00001111 1111 0000 1111 000 111 0000 1111 0000 1111 00000 11111 0000 00000 11111 0000 1111 00000 11111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 00000 11111 00000 11111 0000 1111 0000 1111 00000 11111 0000 1111 00000 11111 0000 1111 Fig. 16. The final configuration of referred cells around the portions of the mesh in figure 15 on each processor. A circle of radius r̂cut drawn from any vertex of a real cell would be fully encompassed by other real or referred cells, thereby providing all molecules in that cell with the appropriate intermolecular interactions, either across a periodic boundary or from another processor. Note that many cells are referred several times; for example, the source cell marked with ⋆ on processor 2 is referred to processors 0 and 1 twice on each. 37
5cs.CE
Homological vanishing for the Steinberg representation arXiv:1704.08344v3 [math.AT] 27 Nov 2017 Avner Ash Andrew Putman∗ Steven V Sam† November 20, 2017 Abstract For a field k, we prove that the ith homology of the groups GLn (k), SLn (k), Sp2n (k), SOn,n (k), and SOn,n+1 (k) with coefficients in their Steinberg representations vanish for n ≥ 2i + 2. 1 Introduction Let G be a connected reductive group over a field k. A basic geometric object associated to G(k) is its Tits building. By definition, this is the simplicial complex TG (k) whose i-simplices are increasing sequences 0 ( P0 ( · · · ( Pi ( G(k) of parabolic k-subgroups of G(k). Letting r be the semisimple k-rank of G, the complex TG (k) is (r −1)-dimensional, and the Solomon–Tits theorem [Br1, Theorem IV.5.2] says that in fact TG (k) is homotopy equivalent to a wedge of (r − 1)-dimensional spheres. Letting R be a commutative ring, the Steinberg representation of G(k) over R, denoted StG (k; R), is e H r−1 (TG (k); R). This is one of the most important representations of G(k); for instance, if G is any of the classical groups in Theorem 1.1 below (e.g. G = SLn ) and k is a finite field of characteristic p, then StG (k; C) is the unique irreducible representation of G(k) whose dimension is a positive power of p (see [MalZ], which proves this aside from three small cases that must be checked by hand). See [H] for a survey of many results concerning the Steinberg representation. The twisted homology groups Hi (G(k); StG (k; R)) play an interesting role in algebraic K-theory; see [Q, Theorem 3]. If G(k) is a finite group of Lie type, then StG (k; k) is a projective G(k)-module (see [H]), and thus the homology groups Hi (G(k); StG (k; k)) all vanish. However, it is definitely not the case that StG (k; R) is projective for a general commutative ring R, and if k is an infinite field then StG (k; k) need not be projective. Our main theorem says that nevertheless for the classical groups, the homology groups Hi (G(k); StG (k; R)) always vanish in a stable range. Theorem 1.1. Let Gn be either GLn , SLn , Sp2n , SOn,n , or SOn,n+1 . Then for all fields k and all commutative rings R, we have Hi (Gn (k); StGn (k; R)) = 0 for n ≥ 2i+2. Furthermore, there exists a surjection Hi (G2i (k); StG2i (k; R)) → Hi (G2i+1 (k); StG2i+1 (k; R)). ∗ † AP is supported in part by NSF grants DMS-1255350 and DMS-1737434. SS is supported in part by NSF grant DMS-1500069. 1 Remark 1.2. When char(k) = 2, the groups SOn,n (k) and SOn,n+1 (k) in Theorem 1.1 are to be taken naively as the stabilizers of appropriate quadratic forms (see §2.1 below); we ignore the Dickson invariant. Theorem 1.1 (and its proof) is motivated by the following conjecture of Church–Farb– Putman. Recall that Borel–Serre [BoSe] proved that the virtual cohomological dimension of   n SLn (Z) is 2 . n Conjecture 1.3 ([CFaP, Conjecture 2]). We have H( 2 )−i (SLn (Z); Q) = 0 for n ≥ i + 2. In other words, the rational cohomology of SLn (Z) vanishes in codimension i as long as n is sufficiently large. Conjecture 1.3 was proved for i = 0 by Lee–Szczarba [LSz] and for i = 1 by Church–Putman [CP]. It is open for i ≥ 2. To connect Conjecture 1.3 to Theorem 1.1, recall that Borel–Serre [BoSe] proved that SLn (Z) satisfies a version of Poincaré–Lefschetz duality called virtual Bieri–Eckmann duality. This duality involves a “dualizing module” that measures the “homology at infinity”. In our situation, that dualizing module is the Steinberg representation StSLn (Q; Q) and we have n H( 2 )−i (SLn (Z); Q) = Hi (SLn (Z); StSLn (Q; Q)). Conjecture 1.3 is thus equivalent to the following conjecture, which resembles Theorem 1.1 for Gn = SLn . Conjecture 1.4. We have Hi (SLn (Z); StSLn (Q; Q)) = 0 for n ≥ i + 2. Remark 1.5. The proofs by Lee–Szczarba [LSz] and Church–Putman [CP] of special cases of Conjecture 1.3 both start by translating things into the language of Conjecture 1.4. We now briefly describe our proof of Theorem 1.1. As we will discuss in §3 below, there is a natural inclusion StGn−1 (k; R) → StGn (k; R). This induces a stabilization map Hi (Gn−1 (k); StGn−1 (k; R)) → Hi (Gn (k); StGn (k; R)). (1.1) We will show in §3 that to prove that Hi (Gn (k); StGn (k; R)) = 0 for large n, it is enough to prove the seemingly weaker assertion that (1.1) is a surjection for large n. This idea was first introduced by Church–Farb–Putman [CFaP] as a strategy for proving Conjecture 1.4. It was also noticed by Ash in unpublished work. The surjectivity of (1.1) is a weak form of homological stability. There is an enormous literature on homological stability theorems. The basic technique underlying most results in the subject goes back to unpublished work of Quillen. In [Dw], Dwyer used these ideas to prove a twisted homological stability theorem for GLn (k) with quite general coefficient systems. This work was later generalized by van der Kallen [VdK] and very recently by Randal-Williams–Wahl [RaWiWa], whose results cover all the classical groups in Theorem 1.1. Unfortunately, the Steinberg representation does not satisfy the conditions in any of these known theorems. Indeed, these theorems are general enough that if it did, then this would quickly lead to a proof of Conjecture 1.4. Nevertheless, we are able to use some delicate properties of the Steinberg representation to jury-rig the Quillen machine such that it works to prove that (1.1) is surjective for large n. 2 Remark 1.6. Homological stability for a sequence of groups and homomorphisms X1 → X2 → · · · states that the induced maps Hi (Xn ) → Hi (Xn+1 ) are isomorphisms for n ≫ 0. L Alternatively, we can think of each map as “multiplication by t” and give n Hi (Xn ) the structure of a R[t]-module, where R denotes our coefficient ring. At least when R is a field, this isomorphism would be a consequence of finite generation. In our setting, with homology twisted by the Steinberg representation, one should instead think of this map as “multiplication by t” where t is a generator for the exterior algebra in one variable R[t]/t2 , so that the groups Hi being 0 for n ≫ 0 would again be a consequence of finite generation. At least when k is a finite field of size q and R is the field of complex numbers, this is consistent with the idea that GLn (Fq ) is a q-analogue of the symmetric group and the Steinberg representation is the q-analogue of its sign representation, which is made more precise via their connection to symmetric functions, see [Mac, §§I.7, IV.4]. Outline. We begin in §2 with some background and notation. Next, in §3 we reduce Theorem 1.1 to an appropriate homological stability theorem. We then prove a key isomorphism in §4. We prove Theorem 1.1 in §5. This proof depends on a calculation which we perform in §6. Convention regarding the empty set. If X is the empty set and R is a commutative e (X; R) = R. With this convention, if the semisimple k-rank of G is ring, then we define H −1 0, then StG (k; R) = R with the trivial G(k)-action. Acknowledgments. The second author would like to thank Thomas Church and Benson Farb for many inspiring conversations concerning Conjectures 1.3 and 1.4. 2 Background and notation This section contains some background information and notation needed in the remainder of the paper. It consists of two subsections: §2.1 introduces some distinguished parabolic subgroups, and §2.2 gives some background about the Steinberg representations. Throughout this section, k is a field and Gn is either GLn , SLn , Sp2n , SOn,n , or SOn,n+1 . 2.1 Parabolic and stabilizer subgroups Our proof of Theorem 1.1 depends on a careful study of various subgroups of Gn (k). In this section, we will introduce notation for these subgroups: a certain parabolic subgroup PGℓn (k), its unipotent radical UGℓn (k), a Levi component LGℓn (k) of PGℓn (k), and another subgroup FGℓn (k) that lies in PGℓn (k) and fixes certain vectors. General and special linear groups. Assume first that Gn is either GLn or SLn . The group Gn (k) thus acts on the vector space kn , and the k-parabolic subgroups of Gn (k) are the stabilizers of flags of subspaces of kn . Let (~a1 , . . . ,~an ) be the standard basis for kn . For 3 1 ≤ ℓ ≤ n, the group PGℓn (k) is defined to be the Gn (k)-stabilizer of the flag 0 ( h~a1 , . . . ,~aℓ i. The group UGℓn (k) is the subgroup of PGℓn (k) consisting of all M ∈ PGℓn (k) that act as the identity on both h~a1 , . . . ,~aℓ i and kn /h~a1 , . . . ,~aℓ i. The group LGℓn (k) is defined to be the PGℓn (k)-stabilizer of the flag 0 ( h~aℓ+1 , . . . ,~an i. If Gn = GLn then LGℓn (k) is the subgroup GLℓ (k) × GLn−ℓ (k) of Gn , while if Gn = SLn then LGℓn (k) is the subgroup of GLℓ (k) × GLn−ℓ (k) consisting of matrices of determinant 1. Finally, define FGℓn (k) = {M ∈ Gn (k) | M(~aj ) = ~aj for 1 ≤ j ≤ ℓ}. We thus have FGℓn (k) ⊂ PGℓn (k). Symplectic groups. Now assume that Gn = Sp2n . Letting ω(·, ·) be the standard symplectic form on k2n , the group Gn (k) is the subgroup of GLn (k) consisting of elements that preserve ω(·, ·). The k-parabolic subgroups of Gn (k) are the Gn (k)-stabilizers of flags of isotropic subspaces of k2n , that is, subspaces on which ω(·, ·) vanishes identically. Let (~a1 , . . . ,~an , ~b1 , . . . , ~bn ) be the standard symplectic basis for k2n , so ω(~aj ,~aj ′ ) = ω(~bj , ~bj ′ ) = 0 and ω(~aj , ~bj ′ ) = δjj ′ for 1 ≤ j, j ′ ≤ n, where δjj ′ is the Kronecker delta function. For 1 ≤ ℓ ≤ n, the group PGℓn (k) is defined to be the Gn (k)-stabilizer of the isotropic flag 0 ( h~a1 , . . . ,~aℓ i. The group UGℓn (k) is the subgroup of PGℓn (k) consisting of all M ∈ PGℓn (k) that act as the identity on both h~a1 , . . . ,~aℓ i and h~a1 , . . . ,~aℓ i⊥ /h~a1 , . . . ,~aℓ i = h~a1 , . . . ,~aℓ ,~aℓ+1 , ~bℓ+1 , . . . ,~an , ~bn i/h~a1 , . . . ,~aℓ i. The group LGℓn (k) is defined to be the PGℓn (k)-stabilizer of the isotropic flag 0 ( h~b1 , . . . , ~bℓ i. The group LGℓn (k) is thus isomorphic to GLℓ (k) × Gn−ℓ (k). Finally, define FGℓn (k) = {M ∈ Gn (k) | M(~aj ) = ~aj for 1 ≤ j ≤ ℓ}. We thus have FGℓn (k) ⊂ PGℓn (k). 4 Orthogonal groups. Finally, assume that Gn is either SOn,n or SOn,n+1 . For an appropriate m, the group Gn (k) is then the subgroup of SLm (k) consisting of elements that preserve a quadratic form q(·) on km : • If Gn = SOn,n , then let m = 2n and let (~a1 , . . . ,~an , ~b1 , . . . , ~bn ) be the standard basis for km . The group Gn (k) is the SLm (k)-stabilizer of the quadratic form q(·) on km defined via the formula  q n  X cj~aj j=1   + dj~bj  = n X (cj , dj ∈ k). cj d j j=1 • If Gn = SOn,n+1, then let m = 2n + 1 and let (~a1 , . . . ,~an , ~b1 , . . . , ~bn , ~e) be the standard basis for km . The group Gn (k) is the SLm (k)-stabilizer of the quadratic form q(·) on km defined via the formula  q λ~e + n  X j=1   cj~aj + dj~bj  = λ2 + n X cj d j (cj , dj , λ ∈ k). j=1 In both cases, the k-parabolic subgroups of Gn (k) are the Gn (k)-stabilizers of flags of isotropic subspaces of km , that is, subspaces on which q(·) vanishes identically. For 1 ≤ ℓ ≤ n the group PGℓn (k) is defined to be the Gn (k)-stabilizer of the isotropic flag 0 ( h~a1 , . . . ,~aℓ i. For Gn = SOn,n , the group UGℓn (k) is the subgroup of PGℓn (k) consisting of all M ∈ PGℓn (k) that act as the identity on both h~a1 , . . . ,~aℓ i and h~a1 , . . . ,~aℓ i⊥ /h~a1 , . . . ,~aℓ i = h~a1 , . . . ,~aℓ ,~aℓ+1 , ~bℓ+1 , . . . ,~an , ~bn i/h~a1 , . . . ,~aℓ i, while if Gn = SOn,n+1, then the group UGℓn (k) is the subgroup of PGℓn (k) consisting of all M ∈ PGℓn (k) that act as the identity on both h~a1 , . . . ,~aℓ i and h~a1 , . . . ,~aℓ i⊥ /h~a1 , . . . ,~aℓ i = h~a1 , . . . ,~aℓ ,~aℓ+1 , ~bℓ+1 , . . . ,~an , ~bn , ~ei/h~a1 , . . . ,~aℓ i. The group LGℓn (k) is defined to be the PGℓn (k)-stabilizer of the isotropic flag 0 ( h~b1 , . . . , ~bℓ i. The group LGℓn (k) is thus isomorphic to GLℓ (k) × Gn−ℓ (k). Finally, define FGℓn (k) = {M ∈ Gn (k) | M(~aj ) = ~aj for 1 ≤ j ≤ ℓ}. We thus have FGℓn (k) ⊂ PGℓn (k). 5 2.2 Facts about the Steinberg representation Let R be a commutative ring. The following theorem of Reeder [Re] will play an important role in our proof of Theorem 1.1. Theorem 2.1 ([Re, Proposition 1.1]). Let G be a connected reductive group defined over a field k, let PG(k) be a k-parabolic subgroup of G(k), and let LG(k) be a Levi component of PG(k). Then there exists an LG(k)-equivariant map G(k) StLG (k; R) −→ ResLG(k) StG (k; R) such that the induced map PG(k) G(k) IndLG(k) StLG (k; R) → ResPG(k) StG (k; R) is an isomorphism. Remark 2.2. The map in Theorem 2.1 is not unique; for instance, it can be post-composed with any element of the unipotent radical of PG(k). The paper [Re] contains a specific construction of this map, and whenever we refer to the map in Theorem 2.1 we mean the one constructed in [Re]. We wish to apply this to the distinguished parabolic subgroups PGℓn (k) that we introduced in §2.1. To do this, we need to identify StLGℓn (k; R). Lemma 2.3. Let Gn be either GLn , SLn , Sp2n , SOn,n , or SOn,n+1 . Then for all fields k and all commutative rings R, we have StLGℓn (k; R) = StGLℓ (k; R) ⊗ StGn−ℓ (k; R) for 1 ≤ ℓ ≤ n. Proof. For Gn 6= SLn , this follows from the decomposition LGℓn (k) = GLℓ (k) × Gn−ℓ (k). For Gn = SLn , we instead have that LGℓn (k) is the subgroup of GLℓ (k) × GLn−ℓ (k) consisting of matrices of determinant 1. The lemma in this case follows from two facts: • There is a bijection between k-parabolic subgroups of GLn−ℓ (k) and SLn−ℓ (k), and thus an SLn−ℓ (k)-equivariant isomorphism between StGLn−ℓ (k; R) and StSLn−ℓ (k; R). • There is a bijection between k-parabolic subgroups of GLℓ (k) × GLn−ℓ (k) and LGℓn (k), and thus an LGℓn (k)-equivariant isomorphism between StGLℓ (k; R) ⊗ StGLn−ℓ (k; R) and StLGℓn (k; R). Both of these bijections come from taking intersections. These two results allow us to make the following definition. Definition 2.4. Let Gn be either GLn , SLn , Sp2n , SOn,n , or SOn,n+1 . Also, let k be a field and R be a commutative ring. For 1 ≤ ℓ ≤ n, the Reeder product map is the map StGLℓ (k; R) ⊗ StGn−ℓ (k; R) −→ StGn (k; R) obtained by combining Lemma 2.3 and Theorem 2.1. 6 Remark 2.5. Identifying StGLℓ (k; R) ⊗ StGn−ℓ (k; R) with its image in StGn (k; R) under the Reeder product map, one way of viewing Theorem 2.1 is that it asserts that StGn (k; R) = M u · (StGLℓ (k; R) ⊗ StGn−ℓ (k; R)). u∈UGℓn (k) We will also need the following lemma, which is precisely the case i = 0 of Theorem 1.1. It generalizes [LSz, Theorem 4.1]. Recall that if G is a group and M is a G-module, then the coinvariants MG are the largest quotient of M on which G acts trivially. The coinvariants MG are isomorphic to H0 (G; M). Lemma 2.6. Let Gn be either GLn , SLn , Sp2n , SOn,n , or SOn,n+1 . Then for all fields k and all commutative rings R, we have (StGn (k; R))Gn (k;R) = 0 for n ≥ 2. Proof. Theorem 2.1 implies that Gn (k) PG2 (k) IndLG2n(k) StGL2 (k; R) ⊗ StGn−2 (k; R) ∼ = ResPG 2 (k) StGn (k; R). n n It is thus enough to prove that (StGL2 (k; R) ⊗ StGn−2 (k; R))LG2n (k) = 0. Whatever Gn is, the group LG2n (k) contains the subgroup SL2 (k) × 1. It is thus enough to prove that (StGL2 (k; R))SL2 (k) = 0. This is an easy exercise using the fact that e (T (k); R) = H e (P1 (k); Q), StGL2 (k; R) = H 0 2 0 where P1 (k) is the projective line over k, regarded as a discrete set of points. For details, see [LSz, Theorem 4.1]. 3 Reduction to stability Let Gn be either GLn , SLn , Sp2n , SOn,n , or SOn,n+1. Let k be a field and R be a commutative ring. In this section, we reduce Theorem 1.1 to an appropriate homological stability theorem. Fix some i ≥ 0 and some n ≥ 2. The stabilization map for Hi (Gn−1 (k); StGn−1 (k; R)) is the map (3.1) Hi (Gn−1 (k); StGn−1 (k; R)) → Hi (Gn (k); StGn (k; R)) induced by the following two maps: • The group homomorphism Gn−1 (k) → Gn (k) obtained as follows. The group LG1n (k) is a subgroup of GL1 (k) × Gn−1 (k) that contains the subgroup 1 × Gn−1 (k). In fact, LG1n (k) = GL1 (k) × Gn−1 (k) except when Gn = SLn . We can thus define a homomorphism Gn−1 (k) → Gn (k) via the composition Gn−1 (k) = 1 × Gn−1 (k) ֒→ LG1n (k) ֒→ Gn (k). 7 • The map StGn−1 (k; R) → StGn (k; R) that equals the composition StGn−1 (k; R) ∼ = R ⊗ StGn−1 (k; R) ∼ = StGL1 (k; R) ⊗ StGn−1 (k; R) → StGn (k; R), where the final arrow is the Reeder product map. Here we are using the convention regarding the empty set discussed at the end of the introduction which implies that StGL1 (k; R) = R; this convention is compatible with Theorem 2.1. The main result of this section is then as follows. Lemma 3.1. Let Gn be either GLn , SLn , Sp2n , SOn,n , or SOn,n+1 . Let k be a field and let R be a commutative ring. Assume that the stabilization map (3.1) is a surjection for n ≥ N. Then Hi (Gn (k); StGn (k; R)) = 0 for n ≥ N + 1. Proof. Consider n ≥ N + 1. By assumption, the map Hi (Gn−2 (k); StGn−2 (k; R)) → Hi (Gn (k); StGn (k; R)) (3.2) obtained by iterating the stabilization map twice is surjective. It is thus enough to show that the image of this map is 0. We can factor this map as Hi (Gn−2 (k); StGn−2 (k; R)) → Hi (Gn−2 (k); StGL2 (k; R) ⊗ StGn−2 (k; R)) → Hi (Gn (k); StGn (k; R)). Regard SL2 (k) as a subgroup of Gn (k) via the composition SL2 (k) = SL2 (k) × 1 ֒→ LG2n (k) ֒→ Gn (k). The subgroup SL2 (k) of Gn (k) commutes with the image of Gn−2 (k) in Gn (k) under the map used to define (3.2). Inner automorphisms act trivially on homology, even with twisted coefficients; see [Br2, Proposition III.8.1]. It follows that to show that the image of (3.2) is 0, it is enough to prove that (StGL2 (k; R) ⊗ StGn−2 (k; R))SL2 (k) = 0. This is equivalent to (StGL2 (k; R))SL2 (k) = 0, which is one case of Lemma 2.6. 4 The stabilizer subgroups This section constructs an isomorphism (Lemma 4.1 below) that will play a fundamental role in our proof of Theorem 1.1. Let Gn be either GLn , SLn , Sp2n , SOn,n , or SOn,n+1. Let k be a field and R be a commutative ring. Fix some 1 ≤ ℓ ≤ n. There is a map G (k) Hi (1 × Gn−ℓ (k); StGLℓ (k; R) ⊗ StGn−ℓ (k; R)) → Hi (FGℓn (k); ResFGn ℓ (k) StGn (k; R)). n induced by the following two maps: 8 (4.1) • The inclusion map 1 × Gn−ℓ (k) → FGℓn (k). Here we are regarding FGℓn (k) as a subgroup of PGℓn (k) that contains 1 × Gn−ℓ (k) ⊂ LGℓn (k) ⊂ PGℓn (k). • The Reeder product map StGLℓ (k; R) ⊗ StGn−ℓ (k; R) → StGn (k; R). Our main result is as follows. Lemma 4.1. Let k be a field, let R be a commutative ring, let 1 ≤ ℓ ≤ n, and let i ≥ 0. Then the map (4.1) is an isomorphism. Proof. Shapiro’s Lemma [Br2, Proposition III.6.2] gives an isomorphism Hi (1 × Gn−ℓ (k); StGLℓ (k; R) ⊗ StGn−ℓ (k; R)) FGℓ (k) ∼ = Hi (FGℓn (k); Ind1×Gn n−ℓ (k) StGLℓ (k; R) ⊗ StGn−ℓ (k; R)). Below we will prove that there is an isomorphism FGℓ (k) G (k) Ind1×Gnn−ℓ (k) StGLℓ (k; R) ⊗ StGn−ℓ (k; R) ∼ = ResFGn ℓ (k) StGn (k; R). n (4.2) of FGℓn (k)-representations. Combined with the above, this will yield an isomorphism between the left and right hand sides of (4.1) which is easily seen to be the map in (4.1). It remains to construct the isomorphism (4.2). Since FGℓn (k) ⊂ PGℓn (k), we can restrict the isomorphism given by Theorem 2.1 and Lemma 2.3 to obtain an isomorphism G (k) PGℓ (k) PGℓ (k) ResFGℓn(k) IndLGℓn(k) StGLℓ (k; R) ⊗ StGn−ℓ (k; R) ∼ = ResFGn ℓ (k) StGn (k; R). n n n (4.3) The unipotent radical of PGℓn (k) is contained in FGℓn (k). This implies that there is a single (FGℓn (k), LGℓn (k))-double coset in PGℓn (k). Also, FGℓn (k) ∩ LGℓn (k) = Gn−ℓ (k). The double coset formula [Br2, Proposition III.5.6b] therefore implies that the left side of (4.3) is canonically isomorphic to FGℓ (k) LGℓ (k) FGℓ (k) Ind1×Gn n−ℓ (k) Res1×Gnn−ℓ (k) StGLℓ (k; R)⊗StGn−ℓ (k; R) = Ind1×Gnn−ℓ (k) StGLℓ (k; R)⊗StGn−ℓ (k; R), as desired. The following alternate version of Lemma 4.1 will be useful. Corollary 4.2. Let k be a field, let R be a commutative ring, let 1 ≤ ℓ ≤ n, and let i ≥ 0. Then there exists an isomorphism G (k) StGLℓ (k; R) ⊗ Hi (Gn−ℓ (k); StGn−ℓ (k; R)) ∼ = Hi (FGℓn (k); ResFGn ℓ (k) StGn (k; R)). n Proof. Since StGLℓ (k; R) is a free R-module, we have StGLℓ (k; R) ⊗ Hi (Gn−ℓ (k); StGn−ℓ (k; R)) ∼ = Hi (1 × Gn−ℓ (k); StGLℓ (k; R) ⊗ StGn−ℓ (k; R)). The corollary now follows from Lemma 4.1. We will also need an explicit inverse G (k) Hi (FGℓn (k); ResFGn ℓ (k) StGn (k; R)) → Hi (1 × Gn−ℓ (k); StGLℓ (k; R) ⊗ StGn−ℓ (k; R)) n to the isomorphism (4.1). The map (4.4) will be induced by the following two maps: 9 (4.4) • The homomorphism FGℓn (k) → 1 × Gn−ℓ (k) obtained by restricting the projection PGℓn (k) → LGℓn (k) to FGℓn (k). • The map StGn (k; R) → StGLℓ (k; R) ⊗ StGn−ℓ (k; R) which equals the composition StGn (k; R) = M  u · StGLℓ (k; R) ⊗ StGn−ℓ (k; R)  u∈UGℓn (k) → StGLℓ (k; R) ⊗ StGn−ℓ (k; R), where the first equality comes from a combination of Theorem 2.1 and Lemma 2.3 (see Remark 2.5) and the last arrow takes u · x ∈ u · (StGLℓ (k; R) ⊗ StGn−ℓ (k; R)) to x ∈ StGLℓ (k; R) ⊗ StGn−ℓ (k; R). We will call this map the Reeder projection map. It is clear that these define a map of the form (4.4). The following lemma says that this is an inverse to (4.1). Lemma 4.3. Let k be a field, let R be a commutative ring, let 1 ≤ ℓ ≤ n, and let i ≥ 0. Then the map (4.4) is an inverse to the map (4.1). Proof. Immediate from the fact that the compositions 1 × Gn−ℓ (k) → FGℓn (k) → 1 × Gn−ℓ (k) and StGLℓ (k; R) ⊗ StGn−ℓ (k; R) → StGn (k; R) → StGLℓ (k; R) ⊗ StGn−ℓ (k; R) of the maps used to define (4.1) and (4.4) equal the identity. 5 Vanishing This section is devoted to the proof of Theorem 1.1. The actual proof is in §5.3. This is preceded by two sections of preliminaries. 5.1 Equivariant homology In our proof of Theorem 1.1, we will need some basic facts about equivariant homology. A basic reference is [Br2, Chapter VII.7]. Let G be a group, let X be a semisimplicial set on which G acts, let R be a ring, and let M be an R[G]-module. Let EG be a contractible semisimplicial set on which G acts freely and let BG = EG/G, so BG is a classifying space for G. Denote by EG ×G X the quotient of EG × X by the diagonal action of G. This is known as the Borel construction. The homotopy type of EG ×G X does not depend on the choice of EG. The projection EG ×G X → EG/G = BG induces a homomorphism π1 (EG ×G X) → π1 (BG) = G. Via this homomorphism, we can regard M as a local coefficient system on EG ×G X. The G-equivariant homology groups of X with coefficients in M, denoted HG ∗ (X; M), are the homology groups of EG ×G X with respect to the local coefficient system M. 10 Lemma 5.1. If X is ℓ-connected, then the above map EG ×G X → EG/G = BG induces G ∼ an isomorphism HG i (X; M) = Hi (G; M) for 0 ≤ i ≤ ℓ and a surjection Hℓ+1 (X; M) → Hℓ+1 (X; M). Proof. The group G acts freely on EG × X and EG × X is ℓ-connected. Viewing EG × X as a CW-complex, we can make EG × X contractible by adding cells of dimension at least (ℓ + 2). We conclude that there exists a classifying space for G whose (ℓ + 1)-skeleton equals the (ℓ + 1)-skeleton of EG ×G X. The lemma follows. Our main tool for understanding HG ∗ (X; M) is the following spectral sequence, which is constructed in [Br2, Equation VII.7.7]. Lemma 5.2. For all p ≥ 0, let Σp be a set containing exactly one representative for each orbit of the action of G on the p-simplices of X. For σ ∈ Σp , let Gσ be the stabilizer of σ. Then there is a first quadrant spectral sequence 1 Ep,q = M G Hq (Gσ ; ResG Gσ M) =⇒ Hp+q (X; M). σ∈Σp Remark 5.3. In [Br2, Equation VII.7.7], the action of Gσ on M is twisted by an “orientation character”; however, this is unnecessary in our situation, since we are working with semisimplicial sets rather than ordinary simplicial complexes (the point being that in the geometric realization, the setwise stabilizer of a simplex stabilizes the simplex pointwise). 5.2 Complexes of partial bases Let k be a field and let Gn be either GLn , SLn , Sp2n , SOn,n , or SOn,n+1 . To prove Theorem 1.1, we will need to construct a highly connected space CGn (k) on which Gn (k) acts. The definition of this complex is as follows. • If Gn = GLn or Gn = SLn , then define CGn (k) to be the complex of partial bases for kn , i.e. the semisimplicial complex whose ℓ-simplices are ordered sequences [~v0 , . . . , ~vℓ ] of linearly independent elements of kn . • If Gn = Sp2n or Gn = SOn,n or Gn = SOn,n+1 and km is the vector space upon which Gn (k) acts (so m is either 2n or 2n + 1), then define CGn (k) to be the complex of partial isotropic bases for km , i.e. the semisimplicial complex whose ℓ-simplices are ordered sequences [~v0 , . . . , ~vℓ ] of linearly independent elements of km that span an isotropic subspace. The following theorem summarizes the properties of CGn (k). Theorem 5.4. Let k be a field and let Gn be either GLn , SLn , Sp2n , SOn,n , or SOn,n+1 . The following then hold. 1. The group Gn (k) acts transitively on the ℓ-cells of CGn (k) for all 0 ≤ ℓ < n − 1. 2. The space CGn (k) is f (n)-connected where f (n) is given by: (a) f (n) = n − 2 if Gn is either GLn or SLn , (b) f (n) = n−3 2 if Gn is either Sp2n , SOn,n , or SOn,n+1. 11 Proof. The first assertion is well known (and also holds for ℓ = n−1 except when Gn = SLn ). As for the second, Maazen proved in his thesis [Maa] that CGn (k) is (n − 2)-connected for Gn = GLn and Gn = SLn . See [VdK] for a published proof of a more general result. Friedrich proved in [Fr, Theorem 3.23] that CGn (k) is n−3 -connected for Gn = Sp2n and Gn = SOn,n 2 and Gn = SOn,n+1 (for Sp2n and SOn,n , this was proven earlier in [MiVdK, Theorem 7.3]). To apply the cited result of Friedrich to our situation, we need the fact that the unitary stable rank of a field is 1 (see, e.g., [MiVdK, Example 6.5]). 5.3 The proof of Theorem 1.1 Let us first recall the statement of the theorem. Let Gn be either GLn , SLn , Sp2n , SOn,n , or SOn,n+1 . Also, let k be a field and R be a commutative ring. Our goal is to prove that Hi (Gn (k); StGn (k; R)) = 0 for n ≥ 2i + 2 and that there exists a surjection Hi (G2i (k); StG2i (k; R)) → Hi (G2i+1 (k); StG2i+1 (k; R)). (5.1) Of course, this surjection will be induced by the stabilization map defined in §3. The proof is by induction on i. We begin with the base case i = 0. Lemma 2.6 says that H0 (Gn (k); StGn (k; R)) = 0 for n ≥ 2, so we only need to show that the map (5.1) is a surjection for i = 0. For the domain, G0 (k) is the trivial group. By our convention regarding the empty set discussed at the end of the introduction, we thus have StG0 (k; R) = R, and hence Hi (G0 (k); StG0 (k; R)) = R. To simplify the codomain, we have several cases. • G1 = GL1 or G1 = SO1,1 . In fact, these groups are isomorphic and are commutative, so StG1 (k; R) = R in these cases and (5.1) is an isomorphism. • G1 = SL1 . The group SL1 is the trivial group and thus StG1 (k; R) = R and (5.1) is an isomorphism. • G1 = Sp2 ∼ = SL2 or G1 = SO2,1 ∼ = PSL2 . These groups have isomorphic Steinberg representations and the action of SL2 (k) on StSL2 (k; R) factors through PSL2 (k). This case thus follows from Lemma 2.6, which says that H0 (SL2 (k); StSL2 (k; R)) = 0. This completes the base case. Assume now that i > 0 and that the desired result is true for all smaller values of i. We will prove that the stabilization map Hi (Gn−1 (k); StGn−1 (k; R)) → Hi (Gn (k); StGn (k; R)) (5.2) is surjective for n ≥ 2i + 1. Lemma 3.1 will then imply that Hi (Gn (k); StGn (k; R)) = 0 for n ≥ 2i + 2, and the theorem will follow. Fix some n ≥ 2i + 1 and let km be the standard vector space representation of Gn (k) (so m is either n, 2n, or 2n + 1). Let {~a1 , . . . ,~an } be the vectors in km such that FGℓn (k) = {M ∈ Gn (k) | M(~aj ) = ~aj for 1 ≤ j ≤ ℓ} for 1 ≤ ℓ ≤ n. Combining the second conclusion of Theorem 5.4 with Lemma 5.1, we have a surjection G (k) (5.3) Hi n (CGn (k); StGn (k; R)) → Hi (Gn (k); StGn (k; R)). G (k) We will analyze Hi n (CGn (k); StGn (k; R)) using the spectral sequence from Lemma 5.2. To calculate its E 1 -page, observe that the first conclusion of Theorem 5.4 says that Gn (k) 12 acts transitively on the p-simplices of CGn (k) for 0 ≤ p < n − 1. The stabilizer of the (p − 1)-simplex [~a1 , . . . ,~ap ] is FGpn (k), so the spectral sequence in Lemma 5.2 has G (k) n 1 Ep,q = Hq (FGp+1 n (k); ResFGp+1 (k) StGn (k; R)), n (5.4) for 0 ≤ p < n − 1. We will prove that all of the terms on the p + q = i line of the E ∞ -page of our spectral ∞ sequence vanish except for possibly the term E0,i . To do this, consider p, q ≥ 0 with p + q = i and p ≥ 1. The case p = 1 and n = 2i + 1 is exceptional and must be treated separately. To avoid getting bogged down here, we postpone this calculation until §6 below, where it appears as Lemma 6.1.1 We thus can assume that either p ≥ 2 or that n ≥ 2i + 2. Since n ≥ 2i + 1, we certainly 1 have p < n − 1, so Ep,q is in the regime where the above description of the E 1 -page holds. Applying Corollary 4.2 to (5.4), we see that 1 Ep,q = StGLp+1 (k; R) ⊗ Hq (Gn−p−1(k); StGn−p−1 (k; R)). To see that this vanishes, it is enough to show that Hq (Gn−p−1(k); StGn−p−1 (k; R)) = 0. This is a consequence of our inductive hypothesis; to see that it applies, observe that if p ≥ 2 then n − p − 1 ≥ (2i + 1) − p − 1 = 2(p + q) − p = 2q + p ≥ 2q + 2, while if p = 1 and n ≥ 2i + 2 then n − p − 1 ≥ (2i + 2) − 1 − 1 = 2(p + q) = 2q + 2. 1 ∞ This implies that Ep,q = 0, and thus that Ep,q = 0. The p + q = i line of the E ∞ -page of our spectral sequence thus only has a single ∞ potentially nonzero entry, namely E0,i , and this is a quotient of G (k) 1 E0,i = Hi (FG1n (k); ResFGn 1 (k) StGn (k; R)). n G (k) This entry thus surjects onto Hi n tion (5.3), we obtain a surjection (CGn (k); StGn (k; R)). Combining this with the surjec- G (k) Hi (FG1n (k); ResFGn 1 (k) StGn (k; R)) −→ Hi (Gn (k); StGn (k; R)). n (5.5) Examining the construction of our spectral sequence in [Br2, Chapter VII.7], it is easy to see that this comes from the map induced by the inclusion FG1n (k) ֒→ Gn (k). Combining (5.5) with the isomorphism ∼ G (k) = Hi (Gn−1 (k); StGn−1 (k; R)) − → Hi (FG1n (k); ResFGn 1 (k) StGn (k; R)) n given by the ℓ = 1 case of Corollary 4.2, we conclude that (5.2) is a surjection, as desired. 1 This exceptional case could be avoided at the cost of only proving that Hi (Gn ; StGn (k; R)) = 0 for n ≥ 3i + 2 instead of for n ≥ 2i + 2. 13 6 Killing the exceptional term in the spectral sequence This section is devoted to proving the vanishing result postponed from the proof of Theorem 1.1 in §5.3. The notation in this section is thus identical to that in §5.3: • Gn is either GLn , SLn , Sp2n , SOn,n , or SOn,n+1 . • k is a field and R is a commutative ring. • i > 0 and n = 2i + 1 (the only case that remained in that section). • km is the standard vector space representation of Gn (k) (so m is either n, 2n, or 2n+1). • {~a1 , . . . ,~an } is the set of vectors in km such that FGℓn (k) = {M ∈ Gn (k) | M(~aj ) = ~aj for 1 ≤ j ≤ ℓ} for 1 ≤ ℓ ≤ n. G (k) r • Ep,q is the spectral sequence from Lemma 5.2 converging to Hi n (CGn (k); StGn (k; R)). What we must prove is as follows. Lemma 6.1. Let the notation be as above, and assume that the stabilization map Hi−1 (Gn−3 (k); StGn−3 (k; R)) → Hi−1 (Gn−2 (k); StGn−2 (k; R)) (6.1) 1 1 ∞ is surjective. Then the differential E2,i−1 → E1,i−1 is surjective, and thus E1,i−1 = 0. The proof of Lemma 6.1 is divided into five sections: 1 1 • In §6.1, we give an explicit form for the differential E2,i−1 → E1,i−1 . • In §6.2, we translate that explicit form into one involving the stabilization map (6.1). • In §6.3, we summarize what remains to be proved. • In §6.4, we give some needed background information about apartments. • In §6.5, we finish off the proof of Lemma 6.1. 6.1 Identifying the differential 1 The notation is as in the beginning of §6. In this section, we identify the differential E2,i−1 → 1 1 E1,i−1 . Since n = 2i + 1 and i > 0, we have 1 < n − 1, so E1,i−1 is as described in (5.4), i.e. G (k) 1 ∼ E1,i−1 = Hi−1 (FG2n (k); ResFGn 2n (k) StGn (k; R)). 1 If i = 1, then we do not have 2 < n − 1, so in this case E2,i−1 is not as described in (5.4). The issue is that Gn (k) might not act transitively on the 2-simplices of CGn (k) (this is actually 1 only a problem for Gn = SLn ). However, for all values of i it is still the case that E2,i−1 contains G (k) Hi−1 (FG3n (k); ResFGn 3 (k) StGn (k; R)) n 1 1 as a summand. The restriction of the differential E2,i−1 → E1,i−1 to this summand is a map G (k) G (k) ∂ : Hi−1 (FG3n (k); ResFGn 3 (k) StGn (k; R)) −→ Hi−1 (FG2n (k); ResFGn 2 (k) StGn (k; R)). n n To prove Lemma 6.1, it is enough to prove that ∂ is surjective. 14 (6.2) We can describe ∂ using the recipe described in [Br2, Chapter VII.8]. Recall that FG3n (k) is the Gn (k)-stabilizer of the ordered sequence of vectors σ = [~a1 ,~a2 ,~a3 ]. For 1 ≤ m ≤ 3, let σm be the ordered sequence obtained by deleting ~am from σ and let (Gn (k))σm denote the Gn (k)-stabilizer of σm . We then have ∂ = ∂1 − ∂2 + ∂3 , where ∂m is the composition G (k) Hi−1 (FG3n (k); ResFGn 3 (k) StGn (k; R)) n ′ ∂m G (k) −→ Hi−1 ((Gn (k))σm ; Res(Gnn (k))σm StGn (k; R)) ∂ ′′ G (k) m −→ Hi−1 (FG2n (k); ResFGn 2 (k) StGn (k; R)) n of the following two maps. ′ • ∂m is the map induced by the inclusion FG3n (k) ֒→ (Gn (k))σm . • Define κm ∈ Gn (k) as follows. First, κ3 = id. For m ∈ {1, 2}, we do the following. – If Gn = GLn or Gn = SLn , then κm ∈ SLn (k) is the map kn → kn that takes ~am to ~a3 , takes ~a3 to −~am , and fixes all the other basis vectors. – If Gn = Sp2n or Gn = SOn,n or Gn = SOn,n+1, then κm ∈ Gn (k) is the map km → km defined as follows. Let ~b1 , . . . , ~bn be the standard basis vectors for km that pair with the ~aj (there is one additional standard basis vector if Gn = SOn,n+1 ). Then κm takes ~am to ~a3 , takes ~a3 to −~am , takes ~bm to ~b3 , takes ~b3 to −~bm , and fixes all the other basis vectors. ′′ Then ∂m is induced by the map (Gn (k))σm → FG2n (k) that takes g ∈ (Gn (k))σm to κm gκ−1 m and the map StGn (k; R) → StGn (k; R) that takes x ∈ StGn (k; R) to κm (x) ∈ StGn (k; R). We remark that easier choices of κm (without the signs) could be used for Gn 6= SLn , but we chose the ones above to make our later formulas more uniform. This is summarized in the following lemma. Lemma 6.2. Let the notation be as above. Then the map ∂ in (6.2) equals ∂1 − ∂2 + ∂3 , where ∂m is induced by the map FG3n (k) → FG2n (k) defined via the formula (g ∈ FG3n (k)) g 7→ κm gκ−1 m and the map StGn (k; R) → StGn (k; R) defined via the formula x 7→ κm (x) 6.2 (x ∈ StGn (k; R)). Bringing in the stabilization map The notation is as in the beginning of §6. Fix some 1 ≤ m ≤ 3, and let ∂m and κm be as in Lemma 6.2. Applying the isomorphism in Corollary 4.2 to the domain and codomain of ∂m , we obtain a homomorphism ∂bm : StGL3 (k; R) ⊗ Hi−1 (Gn−3 (k); StGn−3 (k; R)) → StGL2 (k; R) ⊗ Hi−1 (Gn−2 (k); StGn−2 (k; R)). Our goal in this section is to prove that ∂bm is the tensor product of the stabilization map Hi−1 (Gn−3 (k); StGn−3 (k; R)) → Hi−1 (Gn−2 (k); StGn−2 (k; R)) 15 (6.3) with the map ζm : StGL3 (k; R) → StGL2 (k; R) defined as follows. Let {~a1 ,~a2 ,~a3 } be the b 3 = id ∈ SL3 (k), and for m ∈ {1, 2} let κ b m ∈ SL3 (k) be the standard basis for k3 . Let κ element that takes ~am to ~a3 , takes ~a3 to −~am , and fixes all the other basis vectors. Then ζm is the composition b κm StGL3 (k; R) −→ StGL2 (k; R) ⊗ StGL1 (k; R) ∼ StGL3 (k; R) −→ = StGL2 (k; R), where the second arrow is the Reeder projection map (see §4) and the final isomorphism comes from the fact that StGL1 (k; R) = R. The main result of this section is then as follows. Lemma 6.3. Let the notation be as above. Then ∂bm is the tensor product of ζm with the stabilization map (6.3). Proof. By construction, ∂bm equals the composition StGL3 (k; R) ⊗ Hi−1 (Gn−3 (k); StGn−3 (k; R)) ∼ = −→ Hi−1 (1 × Gn−3 (k); StGL3 (k; R) ⊗ StGn−3 (k; R)) ∼ = −→ Hi−1 (FG3n (k); StGn (k; R)) ∂ m −→ Hi−1 (FG2n (k); StGn (k; R)) ∼ = −→ Hi−1 (1 × Gn−2 (k); StGL2 (k; R) ⊗ StGn−2 (k; R)) ∼ = −→ StGL2 (k; R) ⊗ Hi−1 (Gn−2 (k); StGn−2 (k; R)) where the various maps are as follows: • The first and last arrows use the fact that StGL3 (k; R) and StGL2 (k; R) are free Rmodules (cf. the proof of Corollary 4.2). • The second arrow is the map described in Lemma 4.1, that is, the map induced by the inclusion 1 × Gn−3 (k) ֒→ FG3n (k) and the Reeder product map StGL3 (k; R) ⊗ StGn−3 (k; R) → StGn (k; R). • The third arrow is the map ∂m described in Lemma 6.2, that is, the map induced by the map FG3n (k) → FG2n (k) given by conjugation by κm and the map StGn (k; R) → StGn (k; R) induced by κm . • The fourth arrow is the map described in Lemma 4.3, that is, the map induced by the projection FG2n (k) → 1 × Gn−2 (k) together with the Reeder projection map StGn (k; R) → StGL2 (k; R) ⊗ StGn−2 (k; R). We must show that this composition equals the indicated tensor product of maps. This will take some work. Define Ψ to be the composition StGL3 (k; R) ⊗ StGn−3 (k; R) −→ StGn (k; R) κ m −→ StGn (k; R) −→ StGL2 (k; R) ⊗ StGn−2 (k; R), 16 where the first map is the Reeder product map and the last map is the Reeder projection map. Also, define Φ to be the composition StGL3 (k; R) ⊗ StGn−3 (k; R) −→ StGL2 (k; R) ⊗ StGL1 (k; R) ⊗ StGn−3 (k; R) −→ StGL2 (k; R) ⊗ StGn−2 (k; R), where the maps are as follows: • The first map is the tensor product of the Reeder projection map StGL3 (k; R) → StGL2 (k; R) ⊗ StGL1 (k; R) and the identity map StGn−3 (k; R) → StGn−3 (k; R). • The second map is the tensor product of the identity map StGL2 (k; R) → StGL2 (k; R) and the Reeder product map StGL1 (k; R) ⊗ StGn−3 (k; R) → StGn−2 (k; R). b m ⊗ id). By the above, it is enough to prove that Ψ = Φ ◦ (κ ′ Define Ψ to be the composition StGL3 (k; R) ⊗ StGn−3 (k; R) −→ StGn (k; R) −→ StGL2 (k; R) ⊗ StGn−2 (k; R), where the first map is the Reeder product map and the second map is the Reeder projection b m ⊗ id). We thus see that it is enough to map. From its definition, we see that Ψ = Ψ′ ◦ (κ ′ prove that Ψ = Φ. Define U = UGL23 (k) to be the unipotent radical of the parabolic subgroup PGL23 (k) of GL3 (k) (despite the bad notation, this is not the projective general linear group). Using Theorem 2.1 as in Remark 2.5, we see that StGL3 (k; R) = M u · (StGL2 (k; R) ⊗ StGL1 (k; R)) . u∈U Consider u ∈ U and x ∈ StGL2 (k; R) and y ∈ StGL1 (k; R) and z ∈ StGn−3 (k; R). Examining the definition of Ψ′ , we see that Ψ′ ((u · (x ⊗ y)) ⊗ z) = x ⊗ (y ⊗ z) , where y ⊗ z ∈ StGL1 (k; R) ⊗ StGn−3 (k; R) is identified with an element of StGn−2 (k; R) using the Reeder product map. But this equals Φ ((u · (x ⊗ y)) ⊗ z), as desired. 6.3 Summary of where we are The notation is as in the beginning of §6. Recall that Lemma 6.1 asserts that the differential 1 1 b m be as in §6.2. Define E2,i−1 → E1,i−1 is surjective. Let ∂ be as in §6.1. Also, let ζm and κ ζ : StGL3 (k; R) → StGL2 (k; R) via the formula ζ = ζ1 − ζ2 + ζ3 . Combining Lemmas 6.2 and 6.3, we see that to prove Lemma 6.1, it is enough to show that the map StGL3 (k; R) ⊗ Hi−1 (Gn−3 (k); StGn−3 (k; R)) → StGL2 (k; R) ⊗ Hi−1 (Gn−2 (k); StGn−2 (k; R)) obtained as the tensor product of ζ and the stabilization map Hi−1 (Gn−3 (k); StGn−3 (k; R)) → Hi−1 (Gn−2 (k); StGn−2 (k; R)) is surjective. One of the assumptions in Lemma 6.1 is that this stabilization map is surjective. To prove that lemma, it is thus enough to prove the following. Lemma 6.4. Let the notation be as above. Then ζ is surjective. 17 v0 v2 v3 − B0 v1 v3 v0 + B1 v2 v0 v1 − B2 v3 v1 = v 1 B3 v0 v3 v2 v2 Figure 1: As we illustrate here in the case n = 3, the apartment classes corresponding to the Bi can be placed on the boundary of an n-dimensional simplex such that their simplices cancel in pairs. In the picture, the vertices labeled with the vectors ~vi are taken to the lines spanned by the ~vi while the unlabeled vertices are taken to the 2-dimensional subspaces spanned by the vectors on their two neighbors. 6.4 Apartments Before we prove Lemma 6.4, we need to discuss some background material on the Steinberg representation. Unlike the previous sections, in this section n ≥ 1 is arbitrary. Recall that e StGLn (k; R) = H n−2 (TGLn (k); R), where TGLn (k) is the Tits building associated to GLn (k). This building can be described as the simplicial complex whose r-simplices are flags 0 ( V0 ( · · · ( Vr ( k n of nonzero proper subspaces of kn . The Solomon–Tits theorem [Br1, Theorem IV.5.2] says that the R-module StGLn (k; R) is spanned by apartment classes, which are defined as follows. Consider an n × n matrix B with entries in kn none of whose columns are identically 0. Let (~v1 , . . . , ~vn ) be the columns of B. Let Sn be the simplicial complex whose r-simplices are chains 0 ( I0 ( · · · ( Ir ( {1, . . . , n}. The complex Sn is isomorphic to the barycentric subdivision of the boundary of an (n − 1)simplex; in particular, Sn is homeomorphic to an (n − 2)-sphere. There is a simplicial map f : Sn → TGLn (k) defined via the formula f (I) = h~vi | i ∈ Ii (∅ ( I ( {1, . . . , n}). The apartment class corresponding to B, denoted B , is the image of the fundamental class e e e [Sn ] ∈ H n−2 (Sn ; R) = R under the map f∗ : Hn−2 (Sn ; R) → Hn−2 (TGLn (k); R) = StGLn (k; R). Remark 6.5. We have B invertible. = 0 if the ~vi do not form a basis for kn , i.e. if B is not Permuting the columns of B changes B by the sign of the permutation, and multiplying a column of B by a nonzero scalar does not change B . The apartment classes also satisfy the following more interesting relation. 18 Lemma 6.6. Let k be a field, let R be a commutative ring, and let n ≥ 2. Let B be an n × (n + 1)-matrix with entries in k. Assume that none of the columns of B are identically 0. Ordering the columns of B from 0 to n, for 0 ≤ m ≤ n let Bm be the result of deleting the mth column from B. Then B0 − B1 + B2 − · · · + (−1)n Bn = 0. Proof. The simplices forming the apartment classes Bi cancel in pairs; see Figure 1. The Solomon–Tits theorem [Br1, Theorem IV.5.2] gives the following basis for StGLn (k; R). Theorem 6.7 (Solomon–Tits). Let k be a field, let R be a commutative ring, and let n ≥ 1. Then StGLn (k; R) is a free R-module on the basis consisting of all B such that B is an upper unitriangular matrix in GLn (k). 6.5 The proof of Lemma 6.4 We finally prove Lemma 6.4, which as discussed in §6.3 suffices to prove Lemma 6.1. First, b m be as in §6.2. Define we recall its statement. For 1 ≤ m ≤ 3, let ζm and κ ζ : StGL3 (k; R) → StGL2 (k; R) via the formula ζ = ζ1 − ζ2 + ζ3 . Our goal is to prove that ζ is surjective. Before we do that, we introduce some formulas. Let π : StGL3 (k; R) → StGL2 (k; R) be the composition ∼ = StGL2 (k; R), StGL3 (k; R) −→ StGL2 (k; R) ⊗ StGL1 (k; R) −→ where the first arrow is the Reeder projection map and the second arrow comes from the fact that StGL1 (k; R) = R. From its definition, we see that 1 x y 1 x π( 0 1 z ) = 0 1 0 0 1 for all x, y, z ∈ k. What is more, for all 3×3 matrices B none of whose columns are identically 0 we have b 1 (B)) − π(κ b 2 (B)) + π(κ b 3 (B)). ζ( B ) = π(κ b m act on B via matrix multiplication. Here the κ We now turn to proving that ζ is surjective. Consider a ∈ k, and set Aa = 1 a . 0 1 19 By Theorem 6.7, it is enough to prove that Aa ∈ Im(ζ). We have 1 a 0 1 a 0 0 0 −1 1 a 0 ζ( 0 1 0 ) = π( 0 1 0 ) − π( 0 0 −1 ) + π( 0 1 0 ) 0 0 1 0 1 0 1 a 0 0 0 1 −1 0 0 1 0 a 1 a 0 = π(− 0 1 0 ) − π(− 0 −1 0 ) + π( 0 1 0 ) 0 a 1 0 0 1 0 0 1 1 a 0 1 0 a 1 0 0 = π(− 0 1 0 ) − π(− 0 1 0 ) + π( 0 1 0 ) 0 0 1 0 0 1 0 a 1 (6.4) 1 0 0 1 a 1 0 , + = −π( 0 1 0 ) + 0 1 0 1 0 a 1 where the second equality uses the fact that permuting the columns of a matrix changes the associated apartment by the sign of the permutation and the third equality uses the fact that multiplying a column by a nonzero scalar does not change the associated apartment. If a = 0, then the right hand side of (6.4) simplifies to − 1 0 1 0 1 0 1 0 = A0 , = + + 0 1 0 1 0 1 0 1 so A0 ∈ Im(ζ). Assume now that a 6= 0. Plugging the matrix   1 0 0 0   0 1 1 0 0 0 a 1 into Lemma 6.6, we get the relation 1 0 0 1 0 0 1 0 0 0 0 0 0= 1 1 0 − 0 1 0 + 0 1 0 − 0 1 1 0 0 a 0 0 1 0 a 1 0 a 1 1 0 0 1 0 0 1 0 0 = 0 − 0 1 0 + 0 1 0 − 0 1 a−1 , 0 a 1 0 0 1 0 0 1 where the equality uses the fact that the columns of the first matrix are not linearly independent and the fact that multiplying a column of a matrix by a nonzero scalar does not change the associated apartment. Plugging this relation into (6.4), we see that the right hand side of (6.4) equals   1 0 0 1 0 0 1 a 1 0  + − π( 0 1 0 ) − π( 0 1 a−1 ) + 0 1 0 1 0 0 1 0 0 1 =− 1 0 1 0 1 0 1 a + + + 0 1 0 1 0 1 0 1 =A0 + Aa . 20 Since we have already seen that A0 ∈ Im(ζ), we deduce that Aa ∈ Im(ζ), as desired. References [BoSe] [Br1] [Br2] [CFaP] [CP] [Dw] [Fr] [H] [LSz] [Maa] [Mac] [MiVdK] [MalZ] [Q] [RaWiWa] [Re] [VdK] A. Borel and J.-P. Serre, Corners and arithmetic groups, Comment. Math. Helv. 48 (1973), 436–491. K. S. Brown, Buildings, Springer, New York, 1989. K. S. Brown, Cohomology of groups, corrected reprint of the 1982 original, Graduate Texts in Mathematics, 87, Springer, New York, 1994. T. Church, B. Farb and A. Putman, A stability conjecture for the unstable cohomology of SLn Z, mapping class groups, and Aut(Fn ), in Algebraic topology: applications and new directions, 55–70, Contemp. Math., 620, Amer. Math. Soc., Providence, RI, arXiv:1208.3216v3. T. Church and A. Putman, The codimension-one cohomology of SLn Z, Geom. Topol., to appear, arXiv:1507.06306v3. W. G. Dwyer, Twisted homological stability for general linear groups, Ann. of Math. (2) 111 (1980), no. 2, 239–251. N. Friedrich, Homological Stability of automorphism groups of quadratic modules and manifolds, preprint 2016, arXiv:1612.04584v2. J. E. Humphreys, The Steinberg representation, Bull. Amer. Math. Soc. (N.S.) 16 (1987), no. 2, 247–263. R. Lee and R. H. Szczarba, On the homology and cohomology of congruence subgroups, Invent. Math. 33 (1976), no. 1, 15–53. H. Maazen, Homology stability for the general linear group, thesis, University of Utrecht, 1979. I. G. Macdonald, Symmetric Functions and Hall Polynomials, second edition, Oxford Mathematical Monographs, Oxford, 1995. B. Mirzaii, W. van der Kallen, Homology stability for unitary groups, Doc. Math. 7 (2002), 143–166. G. Malle and A. Zalesski, Prime power degree representations of quasi-simple groups, Archiv. Math. 77 (2001), 461–468. D. Quillen, Finite generation of the groups Ki of rings of algebraic integers, in Algebraic K-theory, I: Higher K-theories (Proc. Conf., Battelle Memorial Inst., Seattle, Wash., 1972), 179–198. Lecture Notes in Math., 341, Springer, Berlin. O. Randal-Williams and N. Wahl, Homological stability for automorphism groups, preprint 2015, arXiv:1409.3541v3. M. Reeder, The Steinberg module and the cohomology of arithmetic groups, J. Algebra 141 (1991), no. 2, 287–315. W. van der Kallen, Homology stability for linear groups, Invent. Math. 60 (1980), no. 3, 269–295. Avner Ash Department of Mathematics Boston College Chestnut Hill, MA 02467-3806 [email protected] Andrew Putman Department of Mathematics University of Notre Dame 279 Hurley Hall Notre Dame, IN 46556 [email protected] 21 Steven V Sam Department of Mathematics University of Wisconsin 480 Lincoln Dr. Madison, WI 53706-1325 [email protected]
4math.GR
A STUDY ON SPLAY TREES∗ LUÍS M. S. RUSSO† arXiv:1511.03148v1 [cs.DS] 10 Nov 2015 Abstract. We study the dynamic optimality conjecture, which predicts that splay trees are a form of universally efficient binary search tree, for any access sequence. We reduce this claim to a regular access bound, which seems plausible and might be easier to prove. This approach may be useful to establish dynamic optimality1 . Key words. Data Structures, Binary Search Trees, Splay Trees, Dynamic Optimality, Competitive Analysis, Amortized Analysis AMS subject classifications. 68P05, 68P10, 05C05, 94A17, 68Q25, 68P20, 68W27, 68W40, 68Q25 1. Introduction. Binary search trees (BSTs) are ubiquitous in computer science. Their relevance is well established, both in theory and in practise. Figure 1 illustrates this data structure. The numbers in the nodes represent the keys. If read left to right, the keys form an ordered sequence, shown bellow the tree. This property can be used to efficiently determine if a given number exists in the tree. If we want to check if the tree contains the number 0.55 we can start by comparing this value with the one at the root, 0.56. Since the number we are searching for is larger than 0.56, the search continues in the left sub-tree, i.e., it proceeds to the node containing 0.40, thus discarding all the sub-tree to the right. It is the process of eliminating a large portion of its search space that makes BSTs efficient. 0.56 0.40 0.58 0.35 0.21 0.51 0.87 0.41 0.52 0.85 0.21 < 0.35 < 0.40 < 0.41 < 0.51 < 0.52 < 0.56 < 0.58 < 0.85 < 0.87 Fig. 1. Binary search tree containing keys from [0, 1]. As the search goes through the tree it will eventually reach the node containing 0.52, at which point it becomes apparent that 0.55 is not present in the structure. In fact this search concludes that no number in the open interval ]0.52, 0.56[ exists in the ∗ This work was supported by national funds through Fundação para a Ciência e a Tecnologia (FCT) with reference UID/CEC/50021/2013 and DataStorm EXCL/EEI-ESS/0257/2012. † INESC-ID and the Department of Computer Science and Engineering, Instituto Superior Técnico, Universidade de Lisboa ([email protected]). 1 This draft version, as it exists immediately prior to editing and production by the Publisher will be posted on the noncommercial pre-print server arXiv.org, in accordance with SIAM’s Consent to Publish. 1 2 TEX PRODUCTION tree. This is the only valid conclusion. Even though the search passed through nodes 0.40 and 0.51 it would not be valid to conclude that no number in ]0.40, 0.51[ exists, because 0.41 is on the tree. Hence whenever a search fails we still obtain information from the data structure. In particular we obtained the numbers in the tree that are the successor (0.56) and the predecessor (0.52) of 0.55. Consider how the shape of the tree affects the performance of the queries. If we are computing a single, isolated, query, we may want to guarantee that, at each node, the size of the left and right sub-trees is roughly the same. Note that we never know which sub-tree a given search will choose. If both sub-trees have the same size at least half the search space is discarded at each step. Alternatively we could impose that the tree does not contain long branches, since a search might have to traverse all of it. Either way, some policy must be used to main a tree shape that reduces the search time. Determining “good” tree shapes is a complex task, specially when we consider a sequence of queries, instead of a single query. Moreover, must of the time, this sequence is not known a priori. If a sequence of a couple million queries searches for 0.21 in half of them and only once for 0.85, then it might be better to keep 0.21 at the root and leave 0.85 on the longest existing branch. We would expect such a shape to reduce the overall time. Hence a balanced tree is important if we need to answer several essentially distinct queries. On the other hand if the queries are strongly biased towards a specific region of the keys maintaining certain branches shorter than the rest might be necessary. Several strategies are known to maintain efficient BST shapes, see Knuth [18] for an introduction to the subject. In this paper we focus on the approach used by splay trees [24]. Our goal is to show that this approach is optimal, in the sense that no other strategy can be asymptotically faster than splay trees. Notice that splay trees dynamically alter their structure as they process queries. Hence we assume that any other BST can do the same. Figure 2 illustrates the tree that results from accessing 0.21 on a splay tree. Our main contribution is the following: • We, almost, show that splay trees are dynamically optimal. This means that no other BST is asymptotically faster than splay trees, no matter what is the structure of the query sequence or the re-shaping policy it uses. This property was conjectured to be true, over 30 years ago [24]. Our proof depends on a regular access property, which we deem plausible and conjecture to be true, see Section 3. At this time we do not have a proof of this property. 2. The Problem. The introduction exemplified how a BST can be used to maintain a finite set K of, keys, elements of a universe set X. In our example X is Q. Our goal is to maintain a data structure such that given a fraction x from Q we can determine if x is in K, or not. We refer to these operations as queries. A query is successful it x does belong to K and unsuccessful otherwise. Several efficient data structures exist for this problem, depending on which resources are critical and on which extra operations are necessary. For our example we also want map behaviour. This means that the elements of K contain information. Whenever x does exist in K we also want to access the associated information. The two major classes of data structures that can be used in this scenario are trees and hashes. The set Q is, in general, referred to as the key universe and the associated 3 USING SIAM’S LATEX MACROS 0.21 0.56 0.35 0.58 0.40 0.87 0.51 0.41 0.85 0.52 0.21 < 0.35 < 0.40 < 0.41 < 0.51 < 0.52 < 0.56 < 0.58 < 0.85 < 0.87 Fig. 2. After splaying 0.21. y x A x C Zig y A B B C A < x < B < y < C A < x < B < y < C Fig. 3. Zig operation. information is referred to as the value set. In this paper we omit this latter set. Contrary to hashes, BSTs rely on the order relation among the elements of the universe. In Q we have for example that (1/4) < (1/2). Hence BSTs can efficiently determine successors and predecessors. The successor of x in K is min{y ∈ C|x < y}. To simplify the analysis we do not consider unsuccessful queries, i.e., we assume that all the queries find elements in K. An unsuccessful query for x can be modelled by two successful ones, one for the successor and one for the predecessor. In general BSTs support inserting and removing elements from K, but we also do not study those operations. The re-structuring policy of splay trees consists in moving the accessed nodes, and the nodes in the respective path, upwards towards the root. The precise operations are shown in Figures 3, 4 and 5, where the node containing x is the one being accessed. The configuration before the access is represented on the left and the structure after the access on the right. Accesses when x is on the right sub-tree are obtained by symmetry. To compare splay trees with any other BST we assume that the other BST works in the following way. Besides the tree itself there is a cursor that moves between nodes. An algorithm on a BST may perform any of the following operations: 4 TEX PRODUCTION z y x A x D y A Zig Zig C z B B C A < x < B < y < C < z < D D A < x < B < y < C < z < D Fig. 4. Zig Zig operation. x z y y D Zig Zag x A A z B C D A < y < B < x < C < z < D B C A < y < B < x < C < z < D Fig. 5. Zig Zag operation. Compare the key at the cursor with the current search value. Move the cursor to an adjacent node, left child, right child or parent. Rotate the node upwards. The Zig operation is a rotation of node x, (Figure 3). To perform a search in a BST the cursor starts at the root and performs a sequence of the previous operations. The result of the search is the node for which a comparison with x was equal. This node may, or may not, be the last one in the sequence. At the end of a search the cursor must return to the root, those moves are accounted for. In this model we allow for constant extra information at each node, such as colour for red-black trees or height for AVL trees. The intention is to forbid dynamic memory blocks, which could be used to implement hashing. Hence only a fixed constant amount of information can be added to a node. Other BST models exist, that can be shown to be within a constant factor of the one we consider [29]. Among all BSTs we focus on the one that achieves the best performance for a query sequence. This means choosing the tree after knowing the complete query sequence, in other words, offline. We refer to this optimal tree as T . We do not count compare operations and therefore assume that they cost 0. For the optimal tree we count the number of moves and rotations, but for the splay tree we only count the number of moves. This avoids having to carry around a factor of 2 or 3, which would result from counting rotations and or comparisons. 3. Analysis Overview. In this section we overview the main techniques in the analysis and describe our new potential function. USING SIAM’S LATEX MACROS 5 Amortized analysis. The analysis is amortized, meaning that the time a splay operation takes is not accounted per si, but considering preceding and succeeding operations [28]. Therefore the amount of time an operation requires can be partially shifted to some other operation in the sequence. The resulting time is known as the amortized time. The most common way to transform the total sum into an equivalent telescopic sum is to associate a “potential” value to each state of the data structure D, the value Φ(D). The amortized cost of an operation is then defined as ĉ = c + Φ(D′ ) − Φ(D), were c is the actual cost and Φ(D′ ) the potential after the operation is performed. Summing the previous equations over all m queries, and using the fact that P  it is a telescopic P sum, we obtain a global relation 1≤i≤m ci = 1≤i≤m ĉi −Φ(Dm ). In this equation Φ(Dm ) represents the potential after the sequence, which might be a negative number. The value Φ(D0 ) represents the potential at the beginning and it was omitted because it is assumed to be 0. This is a classical tool in the analysis of splay trees. We present a new potential function. This function is chosen so that the structure of the optimal tree gets transferred into the splay tree. Restricted Accesses. After bounding the amortized cost of accesses in S we proceed to amortize the cost of rotations in T . Such rotations alter Φ(D) and therefore most be accounted for. To obtain a constant bound on this variation we introduce extra, organizing splays, in S. The amortized time to compute these extra splays will depend on the depth of the node we are rotating in T . Therefore if T performs two rotations in a row we need to count the node depth twice. To obtain a valid bound we force T to move its cursor back to the root after performing a rotation. We also further impose that T may not access nodes of depth 3 or more. Although these restrictions seem harsh we show that, with a linear slowdown factor, it is possible to force the optimal sequence to respect them, Lemma 4.3. Organizing Splays. Splay trees do not know the full sequence of queries in advance, fortunately the analysis does. This means that in the analysis it is possible to verify if the structure of the splay tree is adequate for the upcoming queries. We optimize the tree structure by adding extra organizing splays. These splays introduce the logic dependency on a regular access. The regular access statement is the following: Conjecture 3.1 (Regular Access). Let c1 +. . .+cm be the total cost of a sequence of m splay operations and c′1 + . . . + c′m+e the cost of performing the same sequence of splay operations, augmented with e extra splays anywhere. Then c1 + . . . + cm = O(c′1 + . . . + c′m+e ). This conjecture basically states that computing more splays takes longer. We assumed this property in our reasoning, until it became evident that it was not trivial to establish. Our proof relies precisely on this property because the extra splays are used to optimize the tree for future accesses. We will now define the potential function Φ and give an overview of the results that we prove in Section 4. T denotes the optimal tree. To every node v of T we assign a weight wT (v) = 1/4dT (v) , where dT (v) is the depth of v, i.e., the distance to the root. The root itself has depth 0, its children have depth 1 and so on. For each node we add up all the weights of its sub-tree, including wT (v) itself, the resulting sum is denoted sT (v). The rank rT (v) is computed as log(sT (v)). The potential of 6 TEX PRODUCTION tree T is given by the following sum: P (T ) = X rT (v) v∈T Let us consider the trees in Figure 6. We have that wT (a) = wT (c) = 1/16, wT (b) = wT (e) = 1/4 and wT (d) = 1. The resulting r values are rT (a) = rT (c) = log(1/42 ) = −4, rT (e) = −2, rT (b) = log(1/4 + 1/8) = log(3/8) and rT (d) = log(1 + 1/2 + 1/8) = log(13/8). Hence the total potential of T is P (T ) = rT (b) + rT (d) − 10. We use S to denote the splay tree. There is a one to one relation between the nodes of these trees, because both trees share the same key values. For any node v, of T , its correspondent in S is f (v), by correspondent we mean that v and f (v) store the same key value. This correspondence is used to transfer the weight values from T to S, more precisely set w(f (v)) = wT (v). We omit the S subscript to simplify notation. The values of w, s and r that do not have a subscript refer to S. Moreover we also omit the function f and assume instead that v in S means f (v). Hence the previous relation will be written as w(v) = wT (v). The values s(v) and P (S) are computed as before. In general s(v) and sT (v) are not, necessarily, equal. See Figure 6. Likewise P (T ) and P (S) are also not, necessarily, equal. In fact we use Φ(D) = P (S) − P (T ) as our potential function. In our example we have that r(a) = rT (a), r(c) = rT (c), r(e) = rT (e), r(b) = rT (d) and r(d) = log(1 + 1/4 + 1/16) = log(21/16). Therefore Φ(D) = log(21/16) − log(3/8) = log(7/2). In the analysis we assume that S and T take turns. First S searches for x and T remains idle. Then T searches for the same x, while S remains idle. Hence whenever the structure of S changes P (S) changes, but P (T ) remains constant. However when the structure of T changes, both P (T ) and P (S) change. The structure of our argument is as follows: • We show that −n < Φ(Dm ), Lemma 4.2, where n is the number of keys. • We show that the amortized cost to splay a node v, in S, is at most O(1 + dT (v)), Lemma 4.3. • We show that whenever there is a rotation at node v in T we have ∆Φ = O(1), by splaying at most 3 nodes, whose depth in T is at most dT (v), Lemma 4.5. • We combine these results with a restricted optimal sequence, Lemma 4.3, and obtain an optimality result, Theorem 4.6. Thus we establish that if the optimal tree, with n nodes, needs R rotations and M moves to process a given query sequence then splay trees require O(n + R + M ) time, provided they have the regular access property. 4. The Details. In this section we fill in the details that are summarized in the previous section. This section is divided into three parts. We start by studying the properties of our potential function Φ. We then shift the focus to T and explain how to restrict the general access sequence to ensure that it respects certain desirable conditions. The last part presents bounds for the amortized costs of accessing elements in S and rotating nodes in T . We then combine these results to obtain an optimality result. 4.1. Properties of Φ. Let us start by analyzing the potential function Φ(D). We assume that the initial configuration of S and T is the same. Therefore P (S) = P (T ) and Φ(D0 ) = 0. USING SIAM’S LATEX MACROS 13/8 T d 3/8 1/4 b e 1/16 1/16 a w: 7 1 16 c  1 4 1 16  (1) 1 4  f c e 1/4 1/16 a d 21/16 1/16 b 13/8 S Fig. 6. Optimal tree T on top, splay tree T in the bottom, upside down. Example of computing Φ. The f function is illustrated by the dashed arrows. The weight values w are show in between the two trees. Inside the black rectangles we show the s values associated with the nodes. T T′ S n m e R M R′ , M ′ v, u t dT (v) w(v) s(v) r(v) = log(s(v)) wT (v), sT (v), rT (v) Φ(D) The optimal binary search tree. A restricted version of T . The splay tree. Number of nodes in T and S Number of queries in a sequence. Number of added organizing splays. Number of rotations in T Number of cursor moves in T Same as R and M , but in T ′ Nodes The root node The depth of node v in T Weight of node v Sum of the weights, in the sub-tree bellow v Rank for node v Weight, sum and rank in T Potential value for a given state of S and T Fig. 7. Symbol table. 8 TEX PRODUCTION Given that we are using base 2 logarithms it would be natural to use base (1/2) powers for the weights w and wT . Using (1/4) instead causes the amortized access cost to be twice as big. On the other hand we obtain some handy properties. Lemma 4.1. Let v be a node. The following bounds hold: (4.1) 0 ≤ w(v) for any v in T or S. (4.2) (4.3) w(v) ≤ 1 w(v) ≤ s(v) for any v in T or S. for any v in T or S. (4.4) (4.5) sT (v) < 2 × wT (v) s(v) < 2 only for v in T . for any v in T or S s(t′ ) = sT (t) (4.6) for the root t′ of S and t of T Proof. Inequalities (4.1) and (4.2), follow directly from our definition of weights. Inequality (4.3), follows from the definition of s and Inequality (4.1). Inequality (4.4) use a geometric series. For the nodes v in T the value sT (v) is a sum of powers of 1/4, which depends on the topology of tree. If T is a single branch then sT (v) < wT (v)(1 + (1/4) + (1/42 ) + . . . + (1/4j ) + . . .) < (4wT (v)/3). If T is perfectly balanced, this bound becomes even larger. In that case sT (v) < wT (v)(1 + 2 × (1/4) + 22 × (1/42 ) + . . . + 2j × (1/4j ) + . . .) < 2 × wT (v). In this case the bound comes from the geometric series of (1/2). Moreover the remaining cases will also be bounded by the geometric series of (1/2). Inequality (4.5) holds for T , because of inequalities (4.2) and (4.4). For S note that in general T cannot have more than 2d nodes with depth d and consequently S cannot have more that 2d nodes with weight (1/4d), hence we obtain the geometric series of (1/2) again. For equality (4.6) notice that the sums at the root contain all the weight values. Since these values are mapped from T to S they are globally the same and therefore so is their sum. In particular from Inequality (4.5) we deduce that r(t) ≤ 1, for the root t of S. Using potential functions that can assume negative values implies that the value of Φ(Dm ) becomes a term in the total time. Hence we bound this value. Lemma 4.2. The bound −n < Φ(D) holds for any configuration of S and T , where n is the number of keys. Proof. The following derivation establishes the result. (4.7) P (S) − P (T ) = Φ(D) X (4.8) log(w(v)) − P (T ) ≤ P (S) − P (T ) v∈S (4.9) X v∈S (4.10) log(w(v)) − X log(2wT (v)) < v∈T log(w(v)) − P (T ) X log(w(v)) − v∈S − X v∈T (4.11) X 1= v∈S −n = − X X log(2wT (v)) v∈T 1 v∈T To obtain Inequality (4.8) use Inequality (4.3), for all the terms of the sum in P (S). For Inequality (4.9) use Inequality (4.4) and apply logarithms and change signals. USING SIAM’S LATEX MACROS 9 Equation (4.10) follows from the same argument as Equation (4.6) and the fact that log(2wT (v)) = 1 + log(wT (v)). 4.2. Restricting T . Competing directly with T is fairly hard, partially because the sequence of accesses in T is completely free. For our purposes we need that the accesses in T respect the following properties: • When a node v is visited by the cursor or involved in a rotation its depth is less than 3, i.e., dT (v) < 3. • After a rotation the cursor moves back to the root. We refer to a sequence of nodes that respects these conditions as a restricted sequence. Let us show that given any access sequence of visited nodes in T it is possible to simulate it in another tree T ′ , so that the accesses in T ′ are restricted. By simulation we mean that the sequence visited by the cursor of T is a sub-sequence of the one visited by the cursor of T ′ . Naturally the simulation will be slower than the original sequence. Lemma 4.3. Any sequence of nodes visited by the cursor of T , consisting of M moves and R rotations, can be simulated by a restricted sequence of cursor moves on a tree T ′ with 4M + 3R moves and 2M + R rotations. Proof. Figure 8 illustrates the operations that we consider in this Lemma. Besides the same keys as T , the tree T ′ contains two extra keys, min and max, that are, respectively, smaller and larger than all the other keys in T . The simulation works by keeping the node at the cursor of T in the root of T ′ . We assume that the initial state of T and T ′ is almost alike. The same key is stored a the root. The children of T ′ are min and max. The left sub-tree of T is stored in the right child of min and the right sub-tree of T is stored in the left child of max. Shown at the top in Figure 8. Whenever the cursor of T moves down the corresponding node is moved up to the root of T ′ , the process is a ZigZag operation on T ′ , or ZagZig depending on which grand-child. Note that between the rotations of the ZigZag operation the cursor must return to the root to comply with the second condition of restricted sequences. These movements are underlined in the example. Hence every downward move in T originates 4 moves and 2 rotations in T ′ . This process transforms the trees in the top of Figure 8, to the trees in the middle. In this example the sequence of operations is: moveTo(min), moveTo(x), rotate(), moveTo(y), moveTo(x) rotate(). The cursor may also move upwards on the tree, hence reversing the previous move. In this case the sequence of operations would be: moveTo(y),rotate(), moveTo(x), moveTo(min), rotate(), moveTo(y). This requires 4 moves and 2 rotations. Therefore a move in T originates 4 moves and 2 rotations in T ′ . In this example the initial move was to y, because y is the child in T ′ that corresponds to he parent in T . To determine this property we could store, in T ′ the depth of the nodes in T . Only for the nodes in the leftmost and rightmost branches of T ′ , otherwise updated values would be hard to maintain. However it is not necessary to do so. Recall that T ′ is simulating T and T is the optimal tree, which does not need to consult the keys to know which move to perform, it only needs to behave as a BST. Therefore T ′ also does not need extra information. Whenever a rotation is performed in T the structure of T ′ must be adapted accordingly. Recall that a rotation on node v means that v is moved upwards. In Figure 8 the transition from the middle to the bottom shows how a rotation alters the structure of T ′ . In this case the sequence of moves is: moveTo(y), moveTo(max), 10 TEX PRODUCTION T T′ y y x A min z B C max x D A y min z B B C D x x A z C D y A max B z C D x x min y A z B C max y A D z B C D Fig. 8. Simulation of T (left) by T ′ (right). Initial configuration on top. The middle configuration represents the result of moving the cursor from node y to node x. The bottom configuration shows the result of performing a rotation on x, while in the middle configuration. rotate(), moveTo(x). Hence a rotation originates 3 moves and 1 rotation in T ′ . The general procedure is to move to y because it is the child of T ′ that corresponds to the parent of x in T , and move again in the same direction, in this case to max. This node is rotated upwards and the procedure finishes by returning to the cursor back to the root. Note that in Figure 8 the cursor of T is drawn close to the root. In general the structure of the upward path from the cursor of T to the root gets splitted into the leftmost and rightmost branches of T ′ , but the update procedure is essentially as explained. USING SIAM’S LATEX MACROS 11 In the following results we continue to use T , instead of T ′ , which simplifies the analysis. The tree T ′ is used only in Theorem 4.6. 4.3. Amortized Costs of S and T . Let us now bound the amortized time of splaying a node of S. Lemma 4.4. Splaying a node v takes at most 4 + 6dT (v), amortized time, where dT (v) is the depth of the corresponding node in T . Proof. The following derivation establishes this bound: (4.12) ĉi ≤ 1 + 3[r(t) − r(v)] (4.13) (4.14) < 1 + 3[1 − r(v)] = 4 − 3r(v) (4.15) ≤ 4 − 3 log(w(v)) (4.16) (4.17) = 4 − 3 log(1/4dT (v) ) = 4 + 6dT (v) Inequality (4.12) is the classic amortized access Lemma 5.1, see Section 5. Inequality (4.13) follows from (4.5) and recalling that r(t) = log(s(t)). Inequality (4.15) results from applying logarithms and switching signs to (4.3). The remaining equations use the definition of weight w and simplify the result. This Lemma shows that the amortized time to splay a node is slightly more than 6 times the time that it is necessary to access the corresponding node in T . Let us focus on the amortized cost of accessing nodes in T . Whenever T accesses a node there is no real cost for S. However if those accesses involve rotations in T then the value of Φ changes, which will constitute an amortized cost that S most account for. Lemma 4.5. Whenever a node v of T , with dT (v) < 3, gets rotated the bound ∆Φ ≤ 11 + log(11) holds, after, at most, 3 nodes of S are splayed. Each splayed node v ∗ has dT (v ∗ ) ≤ dT (v). Proof. Recall that in a rotation the node v moves upwards on the tree. We consider the cases when dT (v) = 1 and dT (v) = 2. The proof is illustrated in Figure 9, which shows the situation when dT (v) = 1, but from which we can infer properties that apply to all cases. The optimal tree T is represented on top and the splay tree S in the bottom, upside down. To simplify let us assume that these trees are only slightly different. Meaning that they share some structure. The nodes in sub-trees A, B and C are the same, but their shape is not necessarily equal. For example the descendants of node u are not, necessarily, the same. A fundamental observation for this proof is that almost all the nodes, in the trees, contribute 0 to the value ∆Φ. The only nodes that effectively contribute to ∆Φ belong to, at least, one the following categories: 1. Nodes that contain descendants from more than one of the sets A, B, C, either in S or T or both. Examples of these nodes are the ones containing x and y. Moreover some nodes a ∈ A, b ∈ B and c ∈ C may appear in S with this property. 2. Nodes for which the set of descendants is altered by the rotation in T . Only nodes x and y. Hence we are claiming that the nodes in A, B and C do not contribute to ∆Φ. Consider a node u, contained in the sub-tree A. Let wT (u) be the weight of u before the rotation and wT′ (u) be the weight after the rotation. Likewise we consider the sT , s′T , rT , rT′ values and the values s, s′ , r, r′ , over S. 12 TEX PRODUCTION y T x x C y A u B A rotate(x) B C u u u A A B C x S y B C x y Fig. 9. Variation of Φ with rotation on T. Let us account for the contribution of u to ∆Φ, i.e., r′ (u) − r(u) + rT (u) − rT′ (u) = log([s′ (u)/s(u)] × [sT (u)/s′T (u)]). Notice that w′ (u)/w(u) = 4, because the depth of u decreases in T . Likewise s′ (u)/s(u) = 4, because the same happens for all the elements in A. On the other hand sT (u)/s′T (u) = 1/4 because the order of the factors is reversed. Therefore the previous value is log(4/4) = 0. A similar reasoning holds for the elements in C. The nodes in B do not suffer potential variations and therefore contribute 0 to the overall variation. In this scenario the only nodes that contribute to ∆Φ are the ones that contain descendants from more than one of the A, B, C sets. In our simplification only x and y. However in the general case the nodes in sub-trees A, B and C have different relations in S and in T . Hence we need to be more precise as to what these nodes should be. The nodes in A are the descendants of x that are smaller than x. The nodes in B are the descendants of both x and y. The nodes in y are the descendants of y that are larger than y. To force these sets of nodes to be consistent between S and T we splay node x and node y in S, in this order. Now A and C contain the same nodes in S and T , but it may happen that some ZigZig operation pulls a node b upwards from B, so that it splits B and is in between the nodes x and y. In this case we must also count the contribution from b. Using an argument similar to the one above we can guarantee that s′ (b)/s(b) ≤ 4 and sT (b)/s′T (b) = 1 and therefore r′ (b) − r(b) + rT (b) − rT′ (b) ≤ 2 + 0 = 2. For the node containing x we also have that s′ (x)/s(x) ≤ 4, but sT (x)/s′T (x) is trickier, because s′T (x) now includes the extra terms related to wT′ (y) and s′T (C), these values are non-negative and therefore decrease the fraction sT (x)/s′T (x). Therefore the bound of 4 holds true. Hence for the node containing x we count another 4 units, as r′ (x) − r(x) + rT (x) − rT′ (x) ≤ 2 + 2 = 4. USING SIAM’S LATEX MACROS 13 For the node containing y we also have that s′ (y)/s(y) ≤ 4 but sT (y)/s′T (y) is again trickier. The following derivation obtains a bound. (4.18) (4.19) (4.20) (4.21) (4.22) (4.23) (4.24) wT (y) + sT (C) + sT (B) + wT (x) + sT (A) s′T (y) wT (y) + sT (C) + sT (B) wT (x) + sT (A) + = s′T (y) s′T (y) wT (x) + sT (A) ≤4+ s′T (y) wT (x) + sT (A) ≤4+ 1/4 (1/4) + sT (A) =4+ 1/4 (1/4) + (1/8) ≤4+ 1/4 ≤ 4 + 1.5 sT (y)/s′T (y) = Equations (4.18) and (4.19) are simple manipulations. Inequality (4.20) is our general bound of 4, for the fraction that does not change the descendants. Inequality (4.3) yields 1/4 = wT′ (y) ≤ s′T (y), which we use to establish Inequality (4.21). Inequality (4.23) follows from Inequality (4.4) that yields sT (A) ≤ 2 × 1/16 = 1/8. Therefore the total for y is r′ (y) − r(y) + rT (y) − rT′ (y) ≤ 2 + log(5.5) = 1 + log(11). Summing up, in this case we splayed two nodes and have to account for b, x and y, therefore ∆Φ ≤ 2 + 4 + (1 + log(11)) = 7 + log(11). Let us consider the case dT (v) = 2. This means that there is a node vr which is an ancestor of y, in T . Let us assume that vr is to the right of C. The case where the node is to the left of A is easier. It may happen that vr is inside C in S, in that case we splay vr . This splay operation may in turn split C by pulling up a node c. In total we splayed 3 nodes and have 5 nodes that may contribute to ∆Φ, the nodes b and c, that got pulled up, and the nodes x, y, vr . For node c we have a bound of 4, using the argument above, which holds because the descendants of c in T do not change. Hence r′ (c)−r(c)+rT (c)−rT′ (c) ≤ 2+2 = 4. Note that vr = t is the root of both S and T . Therefore we can can bound its variation by 0, instead of our pessimistic 4 value. For this node we have r′ (t) = rT′ (t) and r(t) = rT (t), by Equation (4.6). Hence in this case the total bound is ∆Φ ≤ 2 + 4 + 4 + (1 + log(11)) + 0 = 11 + log(11) Notice that all this splaying may change the ancestor relation between x and y in S. This may happen when there is no node b and we are pulling a node vℓ , to the left of A. This relation in S does not change the argument above, as both x and y are being pessimistically bounded in S. The crucial consequence of the extra splays is that the nodes in A, B and C are properly encapsulated, and the number of nodes whose descendants belong to more than one of these sets is limited. We can now prove our optimality result. Theorem 4.6. Consider a sequence of m queries, to a splay tree S with n + 2 keys, for which, a similar, optimal tree T uses R rotations and M cursor movements. Provided that splay trees have regular access, then the total number of operations performed by S is O(n + R + M ). 14 TEX PRODUCTION Proof. The proof is given by the following deduction: X 1≤i≤m (4.25) (4.26) (4.27) (4.28)  ci − k(n + 2) ≤ k   X 1≤i≤m+e  ℓ + c′i  − k(n + 2) = k (m + e)ℓ − (n + 2) +  ≤ k (m + e)ℓ + Φ(Dm ) + X 1≤i≤m+e X 1≤i≤m+e  = k (m + e)ℓ + Φ(Dm ) − Φ(D0 ) +  = k (m + e)ℓ + X 1≤i≤m+e   c′i   c′i  X 1≤i≤m+e  c′i  ĉ′i  (4.29) (4.30) ≤ k [(m + e)ℓ + (11 + log 11)R′ + (1 + 3)(4 + 6M ′ )] ≤ k [(m + 3R′ )ℓ + (11 + log 11)R′ + (1 + 3)(4 + 6M ′ )] (4.31) (4.32) = k [mℓ + 16 + (11 + 3ℓ + log 11)R′ + 24M ′ ] = k [mℓ + 16 + (11 + 3ℓ + log 11)(2M + R) + 24(4M + 3R)] (4.33) = k [mℓ + 16 + (118 + 6ℓ + 2 log 11)M + (83 + 3ℓ + log 11)R] The above deduction uses the restricted sequence over T ′ , instead of the original optimal sequence over T . We point out which of the results in the previous lemmas apply to T ′ . The values R′ and M ′ refer to the number of rotations and cursor movements in T ′ . We aim to bound the value on the left. The first inequality is our regular access conjecture. In here we are using explicit constants, k and ℓ, instead of the notation O, to determine the hidden factors. Equation (4.25) rearranges the sums. Equation (4.26) follows from Lemma 4.2. In Equation (4.27) we add the value Φ(D0 ) = 0, because we are assuming that the initial structure of S and T ′ is the same. Equation (4.28) follows from the telescopic nature of the definition of amortized costs. Inequality (4.29) follows from Lemmas 4.4 and 4.5. From Lemma 4.4 we conclude that the sum of the ĉ′i that corresponds to splay operations that answer queries is at most (4 + 6M ′ ), because T ′ must also move its cursor to those nodes and between any such nodes the cursor returns to the root. Therefore for T ′ to answer a query it most perform at least dT (v) cursor movements, where v is the node containing the key that corresponds to the query. To bound the sum of the ĉ′i that corresponds to the costs to update S, due to rotations in T ′ , we use Lemma 4.5. Note that we can apply this Lemma because of the first property of restricted sequences. The fixed cost yields the term (11 + log 11)R′ . The amortized cost of splaying, at most, 3 nodes of S is bounded by the term 3(4 + 6M ′ ). This bound holds because the second property of restricted sequences implies that T ′ must perform at least dT (v) cursor movements before rotating node v. This property states that after each rotation the cursor of T ′ returns to the root, see Section 4.2. USING SIAM’S LATEX MACROS 15 In Equation (4.30) we use the fact that e ≤ 3R′ , i.e., we use at most 3 extra splays for each rotation in T ′ . Equation (4.31) results by rearranging terms. In Equation (4.32) we use the bounds from Lemma 4.3. Equation (4.33) obtains the final bound, by rearranging terms. Let us now survey related work, so that we can discuss our result in context. 5. Related Work. This section describes splay trees and some previous results. These trees were proposed by Sleator and Tarjan [24] in 1985. An extensive up to date survey on dynamic optimally was given by Iacono [16]. There are several restricted optimally results for BSTs. Assuming Pm that the optimal BST is static than the best performance is the entropy O( i=1 fi log(m/fi )), where m is the total number of queries and fi is the number of queries for the ith key. Knuth presented the first algorithm to determine such an optimal tree [18]. This dynamic programming algorithm requires O(n2 ) time to determine the optimal tree. Kurt Mehlhorn obtained a faster, O(n) time algorithm, which approximates the optimal tree [21]. In the context of this paper this result would be referred to as statically optimal, because we are hiding factors into the O notation. Splay trees also obtain this kind of optimality and moreover do not need to know the fi values. Static optimality becomes the best upper bound when the keys in the query sequence are independent of each other. We are only interested in approximating dynamic optimality, i.e., using O notation and being a factor away from the optimal value, because it is expected that the exact problem is NP-Complete [7]. Even in this case the only BST that achieves the dynamic optimality bound, assumes free rotations and takes exponential time to select operations [3]. The good performance properties of splay trees are due to the access Lemma, which was establish in the paper on splay trees [24]. Here we repeat the original argument and highlight the fact that it follows from Jenssen’s Inequality [17]. Lemma 5.1 (Amortized Access). Splaying a node v to the root t takes at most 1 + 3[r(t) − r(v)], amortized time. Proof. Recall Figures 3, 4 and 5. When v is at the root, the bound is trivial. Hence let us focus on the last operation that is used to access v, which contains x in our figures. Zig In this case x is a child of y, which is at the root. The amortized cost is computed as follows: (5.1) (5.2) (5.3) ĉZig = 1 + r′ (x) + r′ (y) − r(x) − r(y) ≤ 1 + r′ (x) − r(x) ≤ 1 + 3[r′ (x) − r(x)] The only nodes that change rank are x and y. The Inequality (5.1) follows from the fact that r′ (y) ≤ r(y). On the other hand Inequality (5.2) is true because r(x) ≤ r′ (x). ZigZig In this case x, y and z change rank (5.4) ĉZigZig = 2 + r′ (x) + r′ (y) + r′ (z) − r(x) − r(y) − r(z) (5.5) (5.6) = 2 + r′ (y) + r′ (z) − r(x) − r(y) ≤ 2 + r′ (x) + r′ (z) − 2r(x) (5.7) ≤ 3[r′ (x) − r(x)] 16 TEX PRODUCTION Equation (5.5) follows from the fact that r′ (x) = r(z). Inequality (5.6) is true because r′ (y) ≤ r′ (x) and −r(y) ≤ −r(x). Inequality (5.7) reduces to proving that (r(x) + r′ (z))/2 ≤ r′ (x) − 1, this relation is known as Jensen’s inequality and it holds because the log function is concave. More explicitly the relation is the following:   log(s(x)) + log(s′ (z)) s(x) + s′ (z) ≤ log 2 2 ZigZag In this case x, y and z change rank. (5.8) ĉZigZag = 2 + r′ (x) + r′ (y) + r′ (z) − r(x) − r(y) − r(z) (5.9) (5.10) = 2 + r′ (y) + r′ (z) − r(x) − r(y) ≤ 2 + r′ (y) + r′ (z) − 2r(x) (5.11) (5.12) ≤ 2[r′ (x) − r(x)] ≤ 3[r′ (x) − r(x)] Equation (5.9) follows from the fact that r′ (x) = r(z). Inequality (5.10) is true because −r(y) ≤ −r(x). Inequality (5.11) is also Jensen’s inequality, in this case it reduces to (r′ (y) + r′ (z))/2 ≤ r′ (x) − 1. The Inequality (5.12) is true because r(x) ≤ r′ (x). Notice that in any access to S there is at most 1 Zig operation and several ZigZig and ZigZag. This justifies why it is important to omit the term 1 in the bound for the ZigZig and ZigZag operations. The overall bound is obtained by summing the bounds of the respective operations. This sum telescopes to the expression in the Lemma. A recent detailed study of this Lemma is available [4]. An important consequence of the splay operation is that most of the nodes in the splayed branch are moved upwards, i.e., their depth gets reduced, essentially in half. A detailed study on depth reduction was given by Subramanian [25]. Several good performance theorem follow from this Lemma: Static Optimality, obtaining the entropy bound we mentioned in the beginning of the Section. Static Finger, the performance of splay trees can be made to made dependent on the position of a given element of the key set X. Let f be the position of a certain element x in the ordered set X and |xi − f | the distance between that element and the element xi , the i-th element in the query sequence. Then Pm processing a sequence of queries with a splay tree takes O(n log n + m + i=1 log(|xi − f | + 1)). In fact splay trees have an even better better performance because the chosen element at position f can be made dynamic [6, 5], but this result requires a longer analysis. Working Set, meaning that recently accessed are quicker to access again. Let t(x) be the number of different items accessed before accessing x since the last time x was accessed, or since the beginning of the sequence if x was never accessed before. The the total time to process a sequence of queries is O(n log n + m + P m i=1 log(t(i) + 1)). An important consequence of this bound is that if the keys are assigned arbitrarily (but consistently) to unordered data, splay trees behave as dynamically optimal [15]. Unified bound, combining the best performance of the 3 previous bounds. Dedicated structures where designed to achieve an even better bound which uses USING SIAM’S LATEX MACROS 17 the dynamic finger bound [2], instead of the static version. Generalized versions of this bound, with tighter values for structured sequences where also proposed [14]. Another important performance bound is the sequential access, or scanning, bound, which states that accessing the n keys sequentially takes only O(n) time. This was initially established by Tarjan [27] with a factor of 9, the current best factor of 4.5 [11] was proven by Elmasry. Besides dynamic optimality Sleator and Tarjan [24] proposed the traversal conjecture, which remains unproven. It is similar to the sequential access but the key order is taken to be the preorder of another BST. Other open conjectures on splay trees include the Deque conjecture, which claims that splay trees can be used to implement a deque, with O(1) amortized time per operation [26, 23]. The split conjecture claims that deleting all the nodes of a splay tree takes O(n) time, in whatever order [20]. Studying binary search trees from a geometric point of view has yielded several important results [7]. It presented an online algorithm, which may yield dynamically optimal BSTs. This algorithm is referred to as greedy, and it was originally proposed as an offline algorithm [19, 22]. The first O(log n) performance bound, of this algorithm, was established by Fox [12]. The same authors proposed Tango trees which are O(log log n) competitive to the optimal BST [8]. This was the first structure to obtain a proven non-trivial competitive ratio. The worst case performance of these trees was further improved [10] to O(log n) per operation. The O(log log n) ratio was also proved for the chain-splay variation of splaying [13]. Another alternative to try and obtain, proven, dynamic optimality consists in combining BSTs. In [9] the authors show that given any constant number of online BST algorithms (subject to certain technical restrictions), there is an online BST algorithm that performs asymptotically as well on any sequence as the best input BST algorithm. Iacono [16] recently proposed another approach, the Weighted Majority Algorithm. This approach is proven to yield a dynamically optimal BST, provided any such data structure exists. A considerable amount of research as also gone into the study of lower bounds, i.e., formulating expressions that are smaller than R + M , i.e., the amount of operations required by T . The first lower bounds where established by Wilber [29]. These bounds where further improved by the geometric view of BSTs [7]. In this view accesses to nodes in a tree are drawn as points in the plane. One coordinate stores the ordered keys and the other coordinate represents time. We can then consider rectangles using these points as corners. Two rectangles rectangles are independent if their corners are outside their interception or in the boundary of the interception. An access sequence in a BST must respect any independent set of rectangles. Hence the maximum independent set of rectangles yields a lower bound for the number of visited nodes in a BST. The alternation lower and the funnel bounds can also be explained with the geometric view of BSTs. Moreover this latter bound is also related to the number of turns that it is necessary to move a key to root, with a procedure proposed by Allen and Munro [1]. 6. Conclusions and Further Work. In this paper we studied the dynamic optimality conjecture of splay trees, which 18 TEX PRODUCTION was proposed by the authors of these trees [24] and has stood for more than 30 years. During this time a vast amount of results and approaches have been proposed for this problem and related conjectures. Note that a proof of dynamic optimality would establish other conjectures. All this research has resulted in new data structures, several of which where proven to be (log log n) competitive. The results we present are a step forward. We reduced dynamic optimality to the regular access conjecture. This conjecture seems very plausible. On the other hand, if it is false that would also be a remarkable property. In the future we plan to research this conjecture. An exhaustive literature review may provide the necessary tools to solve it. We also plan to investigate if our potential function can be applied to the analysis of other dynamically optimal candidates, namely the greedy algorithm, combining BSTs or the weighted majority algorithm. REFERENCES [1] B. Allen and J. I. Munro, Self-organizing binary search trees, J. ACM, 25 (1978), pp. 526– 535. [2] M. Badoiu, R. Cole, E. D. Demaine, and J. Iacono, A unified access bound on comparisonbased dynamic dictionaries, Theor. Comput. Sci., 382 (2007), pp. 86–96. [3] A. Blum, S. Chawla, and A. Kalai, Static optimality and dynamic search-optimality in lists and trees, Algorithmica, 36 (2003), pp. 249–260. [4] P. Chalermsook, M. Goswami, L. Kozma, K. Mehlhorn, and T. Saranurak, Self-adjusting binary search trees: What makes them tick?, in Algorithms - ESA 2015 - 23rd Annual European Symposium, Patras, Greece, September 14-16, 2015, Proceedings, vol. 9294 of LNCS, Springer, 2015, pp. 300–312. [5] R. Cole, On the dynamic finger conjecture for splay trees. part II: The proof, SIAM Journal on Computing, 30 (2000), pp. 44–85. [6] R. Cole, B. Mishra, J. Schmidt, and A. Siegel, On the dynamic finger conjecture for splay trees. part I: Splay sorting log n-block sequences, SIAM Journal on Computing, 30 (2000), pp. 1–43. [7] E. D. Demaine, D. Harmon, J. Iacono, D. Kane, and M. Pǎtraşcu, The geometry of binary search trees, in Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009), New York, New York, January 4–6 2009, pp. 496–505. [8] E. D. Demaine, D. Harmon, J. Iacono, and M. Pǎtraşcu, Dynamic optimality—almost, SIAM Journal on Computing, 37 (2007), pp. 240–251. Special issue of selected papers from the 45th Annual IEEE Symposium on Foundations of Computer Science. [9] E. D. Demaine, J. Iacono, S. Langerman, and Ö. Özkan, Combining binary search trees, in Proceedings of the 40th International Colloquium on Automata, Languages and Programming (ICALP 2013), Riga, Latvia, July 8–12 2013, pp. 388–399. [10] J. Derryberry and D. D. Sleator, Skip-splay: Toward achieving the unified bound in the BST model, in Algorithms and Data Structures, 11th International Symposium, WADS 2009, Banff, Canada, August 21-23, 2009. Proceedings, vol. 5664 of LNCS, Springer, 2009, pp. 194–205. [11] A. Elmasry, On the sequential access theorem and deque conjecture for splay trees, Theoretical Computer Science, 314 (2004), pp. 459 – 466. [12] K. Fox, Upper bounds for maximally greedy binary search trees, in Algorithms and Data Structures - 12th International Symposium, WADS 2011, New York, NY, USA, August 15-17, 2011. Proceedings, vol. 6844 of LNCS, Springer, 2011, pp. 411–422. [13] G. F. Georgakopoulos, Chain-splay trees, or, how to achieve and prove -competitiveness by splaying, Information Processing Letters, 106 (2008), pp. 37 – 43. [14] J. Howat, J. Iacono, and P. Morin, The fresh-finger property, CoRR, abs/1302.6914 (2013). [15] J. Iacono, Key-independent optimality, Algorithmica, 42 (2005), pp. 3–10. [16] J. Iacono, In pursuit of the dynamic optimality conjecture, in Space-Efficient Data Structures, Streams, and Algorithms, vol. 8066 of LNCS, Springer Berlin Heidelberg, 2013, pp. 236– 250. [17] J. Jensen, Sur les fonctions convexes et les inégalités entre les valeurs moyennes, Acta Mathematica, 30 (1906), pp. 175–193. USING SIAM’S LATEX MACROS 19 [18] D. E. Knuth, The Art of Computer Programming, Volume 3: (2Nd Ed.) Sorting and Searching, Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, USA, 1998. [19] J. M. Lucas, Canonical forms for competitive binary search tree algorithms, Rutgers University, Department of Computer Science, Laboratory for Computer Science Research, 1988. [20] J. M. Lucas, On the competitiveness of splay trees: Relations to the union-find problem, On-line Algorithms, 7 (1992), pp. 95–124. [21] K. Mehlhorn, Nearly optimal binary search trees, Acta Informatica, 5 (1975), pp. 287–295. [22] J. I. Munro, On the competitiveness of linear search, in Algorithms-ESA 2000, Springer, 2000, pp. 338–345. [23] S. Pettie, Splay trees, davenport-schinzel sequences, and the deque conjecture, CoRR, abs/0707.2160 (2007). [24] D. D. Sleator and R. E. Tarjan, Self-adjusting binary search trees, J. ACM, 32 (1985), pp. 652–686. [25] A. Subramanian, An explanation of splaying, J. Algorithms, 20 (1996), pp. 512–525. [26] R. Sundar, On the deque conjecture for the splay algorithm, Combinatorica, 12 (1992), pp. 95– 124. [27] R. Tarjan, Sequential access in splay trees takes linear time, Combinatorica, 5 (1985), pp. 367– 378. [28] R. E. Tarjan, Amortized computational complexity, SIAM Journal on Algebraic Discrete Methods, 6 (1985), pp. 306–318. [29] R. E. Wilber, Lower bounds for accessing binary search trees with rotations, SIAM J. Comput., 18 (1989), pp. 56–67.
8cs.DS
LogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting Jason Qin, Denys Kim, Yumei Tung The AOLP Core Data Service, AOL, 22000 AOL Way Dulles, VA 20163 E-mail: j​ [email protected] ​ ​ Abstract—The information presented in this paper defines LogLog-Beta (LogLog-β). LogLog-β is a new algorithm for estimating cardinalities based on LogLog counting. The new algorithm uses only one formula and needs no additional bias corrections for the entire range of cardinalities, therefore, it is more efficient and simpler to implement. Our simulations show that the accuracy provided by the new algorithm is as good as or better than the accuracy provided by either of HyperLogLog or HyperLogLog++. In addition to LogLog-β we also provide another one-formula estimator for cardinalities based on order statistics, a modification of an algorithm described in Lumbroso’s work. Index Terms— Data analysis, Approximation algorithms, Data Mining. I. Introduction Cardinality estimation of a multiset has numerous applications in data management, data analysis, and data services, see papers [2][3][7][11][14][15], etc. Over the years, many cardinality estimation algorithms have been proposed and studied, especially the ones related to probabilistic counting [1][4][5][6][8][9][11][10][13][16][17]. In this paper we present a new algorithm related to a particular probabilistic counting family called LogLog Counting. LogLog Counting has been long studied: see the earlier ideas in Alon and Matias and Szegedy[1] and Flajolet[8], the basic LogLog and SuperLogLog algorithms in Duran and Flajolet[6], the popular HyperLogLog in Flajolet et al. [9], and the recent improvement HyperLogLog++ in Heule et al. [11]. The HyperLoglog algorithm in Flajolet et al. [9] serves as the foundation for our study. Our new algorithm, LogLog-β, can be regarded as a modification of the HyperLogLog. In this introduction we will briefly present the HyperLogLog algorithm. The remainder of the paper is organized as follows: section II details the new algorithm LogLog-β, section III gives some accuracy tests on LogLog-β, and section IV provides another one-formula only cardinality estimator and some further discussions on the two new algorithms. HyperLogLog algorithm in Flajolet et al. [9] has five major components: data randomization by a hash function, stochastic averaging and register vector generation, the raw estimation formula, the Linear Counting in Whang and Vander-Zanden and Taylor [16], and bias corrections. Let S be a multiset of data, M be a vector of size m with m = 2p with p = 4, 5, … , h be a hash function where the hash value is a 32 -bit array, let ρ be a function that maps a bit array to its number of leading zeros plus one, and αm be a parameter dependent of m (see [9]). HyperLogLog Algorithm: 1) Initialize M : M [i] = 0 for i = 0, 1, …, m − 1 2) Generate M : For each s∈S , let i be the integer formed by the left p bits of h(s) and w be the right 32 − p bits of h(s) , set M [i] = max⁡(M [i], ρ(w)) 3) Apply the raw formula: 2 E = m−1αmm−M[i] ∑ 2 (1) i=0 4) Apply Linear Counting if E≤ 52 m : E = mlog mz where z is the number of elements of M with value 0 . 1 32 5) Apply correction if E > 30 2 : E =− 232log (1 − 2E32 ) When using a 64-bit hash function, step 5 in above algorithm is no longer needed as long as the cardinality does not near 264 . In this paper we use 64-bit hash function in algorithms and simulations. The accuracy of cardinality estimation provided by formula (1) gets better when cardinality becomes larger (proved by Flajolet et al. [9]), but the accuracy from Linear Counting degenerates as cardinality increases. Therefore, loss of accuracy around switching point 5m 2 , defined in [9], is inevitable. A major improvement in HyperLogLog++[11] (in addition to using 64-bit hash and sparse representation) is provided a bias correction table for a range of cardinalities to boost the accuracy around the switching point. The bias correction table and correction range are m dependent and determined empirically based on the estimates offered by formula (1). In this paper HyperLogLog++ refers to the implementation without sparse representation. The new algorithm, LogLog-β, uses only one formula and needs neither bias corrections nor Linear Counting, and therefore implementation is simplified. Our simulations show the accuracy provided by the new algorithm is as good as or better than the accuracy provided by either of HyperLogLog or HyperLogLog++ (without sparse representation). 1 II. LogLog-β algorithm In [9] Flajolet et al. proved asymptotically that the raw formula (1) of HyperLogLog has a very low standard error ( 1.04 ). However the formula fails to provide good cardinality √m estimation for small or pre-asymptotic cardinalities. The main idea of the new algorithm, LogLog-β, is to modify the raw formula and to make it applicable to the entire range of cardinalities, from very small to very large. A. LogLog-β algorithm LogLog-β Algorithm: 1) Initialize M : Set M [i] = 0 for i = 0, 1, …, m − 1 2) Generate M : For each s∈S , let i be the integer formed by the left p bits of h(s) and w be the right 64-p bits of h(s) , set M [i] = max (M [i], ρ(w) ) 3) Apply the formula: E = αmm(m−z) (2) m−1 −M[i] β(m,z)+ ∑ 2 i=0 where z is the number of elements of M with value 0 and β(m, z) is a function of m and z . Clearly, formula (2) is a modification of formula (1) which replaces the numerator αmm2 with αmm(m − z) and adds a term β(m, z) to the denominator. Furthermore, formula (2) and (1) are identical when z = 0 and β(m, 0) = 0 . B. Function β(m, z) The function β(m, z) is a kind of bias minimizer and should go to 0 when z goes to 0. Therefore, for very large cardinalities, formula (2) is almost the same as formula (1). The ultimate goal is to find β(m, z) such that formula (2) could yield highly accurate estimations for the entire range of cardinalities. There are many ways to choose β(m, z), for example β(m, z) = β0(m)z , or β(m, z) = β0(m)z + β1(m)z2 + …. For the sake of convenience of discussion in this paper we limit β(m, z) to the following form: β(m, z) = β0(m)z + β1(m)zl + β2(m)zl2 + … + βk(m)zlk where zl = log (z + 1) , k≥0 , and β0(m) , β1(m) ,…, βk(m) are m dependent constants. Clearly β(m, z) = 0 when z = 0 . An implementation, based on Horner's rule, β(m, z) could be evaluated by a total of (k + 1) multiplications and k additions when zl is provided. C. Constants β0(m) , β1(m) ,…, βk(m) For given m , k , and a data set of cardinality c , under the best circumstances we expect β(m, z) = β̂(m, z) where m−1 β̂(m, z) = αmm(m−z) − ∑ 2−M [i] c i=0 If we randomly generate data sets with given cardinalities c1 , c2 , …, and cn (from very small to very large) and compute z and β̂(m, z) for each ci , then by solving a least 2 square problem min ||β(m, z) − β̂(m, z)||2 we shall be able to determine β0(m) , β1(m) ,…, βk(m) . In practice we pick cardinalities ci such that c1 < c2 < … < cn , equally distanced, with n≫k and z = 0 for some of the large cardinalities. Furthermore for each given ci , we compute the means of z and β̂(m, z) over many randomly generated data sets, then use the means to solve the least square problem. In our study we used MURMUR3-64 as the hash function and java.util.Random for generating data sets with given cardinalities. For example for p = 14 , m = 214 , we computed a few β(m, z) : β(m, z) = − 0.309142z + 13.733192zl − 8.636985zl2 + 1.328973zl3 β(m, z) = − 0.350308z + 3.949176zl − 6.403082zl2 + 3.289908zl3 − 0.643495zl4 + 0.051568zl5 The number of terms of β(m, z) should be used is determined by accuracy requirement: the larger k the better accuracy the algorithm provides. However, we cannot reach arbitrary accuracy by simply increasing k : the optimal accuracy that can be achieved is dictated by m , the size of vector M . In our study we found 3 to 7 to be a reasonable range for k . III. Accuracy tests of LogLog-β As long as β(m, z) is properly determined, the LogLog-β algorithm can provide estimation for different ranges of cardinalities with accuracy comparable to HyperLogLog++. Namely, formula (2) can perform as well as Linear Counting for small cardinalities and HyperLogLog Raw with bias correction for large and very large cardinalities. For completeness, we should determine β(m, z) and perform accuracy tests for each precision p ( m = 2p ). However, since the processes are quite similar, this paper only shows the tests for precision p = 14 ( m = 214 = 16384 ). For very large cardinalities the estimations by HyperLogLog, LogLog-β, and HyperLogLog++ are literally the same therefore cardinalities are limited to ≤200, 000 in accuracy tests. To determine β(m, z) for p = 14 , we computed the means of z and β̂(m, z) over 100 (the more the better) randomly generated data sets per cardinality for cardinalities from 1, 000 to 170, 000 in increments of 1, 000 . With k = 7 ( 8 terms) the function β(214, z) is − 0.370393914z + 0.070471823zl + 0.17393686zl2 + 0.16339839zl3 − 0.09237745zl4 + 0.03738027zl5 − 0.005384159zl6 + 0.00042419zl7 2 and it is used for p = 14 in all the accuracy tests in this study. By using above β(m, z) and any of the hash functions MURMUR3, MD5, and SHA, we found the test results of LogLog-β to be almost the same. Specifically, the function β(m, z) was ​calculated using one hash function could be used in LogLog-β in place of any other hash function as long as their hash values are uniformly distributed and well randomized. We chose MMURMUR3 for this study because of its performance. Both tests on the mean of relative errors and the mean of absolute values of relative errors for 500 randomly generated datasets per cardinality show that LogLog-β provides slightly better estimations than HyperLogLog and HyperLogLog++, especially for the cardinalities in the range of 10, 000 to 85, 000 , see Fig. 1 and Fig. 2. Please note that LogLog-β has better performance in terms of accuracy and stability over Linear Counting for almost all the small to mid-range cardinalities. Figure 3 shows the relative error of one randomly generated dataset per cardinality. Fig.1. The mean of relative errors of cardinality estimations for 500 randomly generated datasets per cardinality (the x -axis). Tested cardinalities are from 500 to 200, 000 in every 500 . Figure 4, 5, and 6 show the empirical histograms of cardinality estimations for 500 randomly generated datasets per cardinality with cardinality being 1,000; 50,000; and 100,000 respectively. Both HyperLogLog and HyperLogLog++ use the same formulas in Fig. 4 and 6: Linear Counting for cardinality = 1, 000 and formula (1) (with a minor bias correction for HyperLogLog++) for cardinality= 100, 000 . Therefore, the histograms corresponding to HyperLogLog and HyperLogLog++ are almost identical in Fig. 4 and 6. In both figures LogLog-β shows comparable or slightly better behaviors. In Figure 5 HyperLogLog, HyperLogLog++, and LogLog-β show different behaviors since HyperLogLog uses formula (1) and HyperLogLog++ uses both formula (1) and bias correction. Fig. 2. The mean of abs(relative errors) of cardinality estimations for 500 randomly generated datasets per cardinality (the x -axis). Tested cardinalities are from 500 to 200, 000 in every 500 . Fig. 3. The relative error of the cardinality estimation of one randomly generated dataset per cardinality (the x -axis). Tested cardinalities are from 500 to 200, 000 in every 500 . Fig. 4. The histogram of the cardinality estimations of 500 randomly generated datasets for cardinality 1, 000 . 3 Fig. 5. The histogram of the cardinality estimations of 500 randomly generated datasets for cardinality 50, 000 . IV. requires no regeneration of vectors M and it can be applied directly to the existing vectors. Therefore, switching to LogLog-β requires a very small effort and produces comparable or better results. The idea of replacing m2 by m(m − z) can be applied to other cardinality estimation algorithms as well. For example, we apply this idea to an unbiased optimal cardinality estimation algorithm proposed and studied in Lumbroso[13]. The algorithm, like HyperLogLog, performs well for very large cardinalities but depends on Linear Counting and bias corrections for small and pre-asymptotical cardinalities. The core algorithm in Lumbroso[13], without Linear Counting and bias correction, is described as follows: Let S , M , m , and p be the same as described in HyperLogLog algorithm, but h be a hash function with hash value in interval (0, 1), More discussions The formula (2) of algorithm LogLog-β requires two major changes compared to HyperLogLog Raw (1), and these two changes make the formula capable of covering the entire range of cardinalities with comparable or better accuracy. Replacing m2 with m(m − z), makes no difference for the very large cardinalities but has significant impact on the estimates of small and mid-range cardinalities. It forces the estimates to roughly align with the real cardinalities. The other change, adding a term β (m, z) to the denominator, further corrects the remaining error/bias. The combination of the two changes makes formula (2) work more accurately for the entire range of cardinalities. Both changes are essential, and the second change could have many variations and forms. Lumbroso's Core Algorithm: 1) Initialize M : Set M [i] = 1 for i = 1, …, m 2) Generate M : For each s∈S , set y = h(s) , i = ⌊ym⌋ + 1 , and M [i] = min (M [i], ym − ⌊ym⌋) 3) Apply the core formula: E = m(m−1) m ∑ M [i] (3) i=1 It is proved by Lumbroso[13] that the above algorithm yields optimal estimation for very large cardinalities. To make it work for small or mid-range cardinalities we substitute 1 in formula (3) with z which results in a new formula: E = m(m−z) m ∑ M [i] (4) i=1 Fig. 6. The histogram of the cardinality estimations of 500 randomly generated datasets for cardinality 100, 000 . where z is the number of M [i] with value 1. There is no need to add a correction term to the denominator in this case. The estimations provided by formula (4) are strikingly accurate for all ranges of cardinalities, especially for the small and mid-range cardinalities. In Figure 7 we show some test results on this new algorithm, called MMV (Mean of Minimum Values). Formula (2) of LogLog-β and formula (4) of MMV, derived from different approaches (counting vs. ordering), are deeply related (detailed study is in a separate paper). The term 2−M [i] of (2) could be regarded as an approximation of the term M [i + 1] of (4). For a given m both algorithms provide comparable accuracies, but LogLog-β requires less memory. In terms of implementation and computation complexity, LogLog-β offers more advantages: one formula for the entire range of cardinalities, a much simpler process flow, and no bias correction and lookup tables. Furthermore, for any existing implementations of HyperLogLog or HyperLogLog++ (without sparse representation), LogLog-β 4 Fig. 7. Cardinality estimations of 500 randomly generated datasets for each cardinality in every 500 from 500 to 200, 000 . References [1] N. Alon, Y. Matias, and M. Szegedy, “The space complexity of approximating the frequency moments,” in Journal of Computer and System Sciences 58 (1999), 137-147. [2] S. Acharya, P. B. Gibbons, V. Poosala, and S. Ramaswamy. “The aqua approximate query answering system,” in SIGMOD, pages 574-576, 1999. [3] P. Brown, P. J. Haas, J. Myllymaki, H. Pirahesh, B. Reinwald, and Y. Sismanis. “Toward automated large-scale information integration and discovery,” in Data Management in a Connected World, pages 161-180, 2005. [4] K. Beyer, P. J. Haas, B. Reinwald, Y. Sismanis, and R. Gemulla. “On synopses for distinct-value estimation under multiset operations,” in Proceedings of the 2007 ACM SIGMOD international conference on Management of data, pages 199-210. ACM, 2007. [5] R. Cohen, L. Katzir, A. Yehezkel. “A Unified scheme for generalizing cardinality estimators to sum aggregation,” in Inf. Process. Lett.(2014). [6] M. Durand and P. Flajolet, “LogLog counting of large cardinalities,” in Annual European Symposium on Algorithms (ESA03) (2003), G. Di Battista and U. Zwick, Eds., vol. 2832 of Lecture Notes in Computer Science, pp. 605-617. [7] C. Estan, G. Varghese, and M. Fisk. “Bitmap algorithms for counting active flows on high-speed links,” in IEEE/ACM Trans. Netw., 14(5):925-937, Oct. 2006. [8] P. Flajolet and G. Martin. “Probabilistic counting algorithms for data base applications,” in Journal of Computer and System Sciences, 31(2):182-209, 1985. [9] P. Flajolet, É. Fusy, O. Gandouet, and F. Meunier. “Hyperloglog: The analysis of a near-optimal cardinality estimation algorithm,” in Analysis of Algorithms (AOFA), pages 127-146, 2007. [10] S. Ganguly. “Counting distinct items over update streams,” in Theoretical Computer Science, 378(3):211-222, 2007. [11] S. Heule, M. Nunkesser, and A Hall. “HyperLogLog in Practice: Algorithmic Engineering of a State of The Art Cardinality Estimation Algorithm,” Google, Inc. [12] D. M. Kane, J. Nelson, and D. P. Woodruff. “An optimal algorithm for the distinct elements problem,” in PODS, pages 41-52, 2010. [13] J. Lumbroso. “An optimal cardinality estimation algorithm based on order statistics and its full analysis,” in DMTCS Proceedings 01 (2010), 489-504. [14] C. R. Palmer, P. B. Gibbons, and C. Faloutsos. “Anf: a fast and scalable tool for data mining in massive graphs,” in SIGKDD, pages 81-90, 2002. [15] P. G. Selinger, M. M. Astrahan, D. D. Chamberlin, R. A. Lorie, and T. G. Price. “Access path selection in a relational database management system,” in SIGMOD, pages 23-34, 1979. [16] K.-Y. Whang, B. Vander-Zanden, and H. Taylor. “A linear-time probabilistic counting algorithm for database applications,” in ACM Transactions on Database Systems 15, 2 (1990), 208-229. [17] Z. Bar-Yossef, T. Jayram, R. Kumar, D. Sivakumar, and L. Trevisan. “Counting distinct elements in a data stream,” in Randomization and Approximation Techniques in Computer Science, pages 1-10. Springer, 2002. 5
8cs.DS
THE SALLY MODULES OF IDEALS: A SURVEY arXiv:1612.06261v1 [math.AC] 19 Dec 2016 WOLMER V VASCONCELOS Abstract. The Sally module of a Rees algebra B relative to one of its Rees subalgebras A is a construct that can be used as a mediator for the trade-off of cohomological (e.g. depth) information between B and the corresponding associated graded ring for several types of filtrations. While originally devised to deal with filtrations of finite colength, here we treat aspects of these developments for filtrations in higher dimensions as well. Key Words and Phrases: Castelnuovo regularity, extremal Rees algebra, Hilbert function, Rees algebra, relation type, Sally module. Contents 1. Introduction 2. General Properties of Sally Modules 2.1. Dimension, depth and reduction number 2.2. Veronese subrings 2.3. The fiber of the Sally module 3. Dimension, Multiplicity and Euler Characteristics 3.1. The Hilbert series and dimension 3.2. Cohen–Macaulayness of the Sally module 3.3. Change of rings for Sally modules 3.4. Special fiber and reduction number 3.5. Multiplicity and reduction number 3.6. Sally questions 4. Equimultiple Ideals 4.1. Extended Hilbert function 4.2. Ideals of positive dimension 4.3. Cohen-Macaulayness 4.4. Ideals of positive dimension: non Cohen-Macaulay rings 4.5. j-multiplicities 5. Ideals of Dimension One 5.1. Generic complete intersections 5.2. Dimensions two and three 6. This and That 6.1. Multiplicity one 6.2. Normal filtration 6.3. Monomial ideals 7. Current issues 8. List of definitions and notation References 1 2 3 3 5 5 5 6 10 11 12 13 14 14 15 16 17 18 19 20 20 24 24 25 25 26 28 28 29 2 WOLMER V VASCONCELOS 1. Introduction The aim of this survey is to review some of the properties of Sally modules of ideals. For a Noetherian local ring (R, m) and an m-primary ideal I, these structures were introduced in [73] to give a quick access to some results of Judith Sally (see Section 3.6) connecting the depth properties of associated graded rings grI (R) to extremal values of their multiplicity e0 (I). They have since been used to refine this connection taking into account the roles of the higher Hilbert coefficients e1 (I) and e2 (I). Here we intend to visit the literature to discuss a representative set of these results with emphasis on some of the techniques. The more novel material are sought-after generalizations to a more general theory that applies to non Cohen-Macaulay rings or to filtrations defined by ideals of positive dimension. The latter are rather experimental in character. Let (R, m) be Noetherian local ring of dimension d > 0. Sally modules are defined in the context of Rees algebras and some of their finite extensions. One of its main classes arises as follows. Let J be an ideal of R and let F = {Ij , j ≥ 0}, I0 = R, be a multiplicative filtration of ideals. Consider the Rees algebras A = R[Jt] and P j B = j≥0 Ij t = R ⊕ B+ . Suppose that B is a finite extension of A. The Sally module SB/A of B relative to A is defined by the exact sequence of finitely generated A–modules (1) 0 → I1 A −→ B+ [+1] = M Ij tj−1 −→ SB/A = j≥1 M Ij+1 /I1 J j → 0. j≥1 The assumption is that Ij+1 = JIj for j ≫ 1, so that in particular J is a reduction of I1 . Some of the problems about these structures concern the following issues: • [Reduction number] The reduction number of B relative to A is defined to be X ABj }. r(B/A) = inf{n | B = j≤n • • • • • • We observe that SB/A = 0 if and only if r(B/A) ≤ 1. This condition is often referred as minimal multiplicity. [Dimension] What are the possible values of dim SB/A ? Note that for each x ∈ J, localizing at Rx gives that SA (B)x = 0, so that SA (B) is annihilated by a power of J and therefore dim SA (B) ≤ dim R. [Multiplicity] What are the possible values of multiplicity of SB/A espressed in Hilbert coefficients? [Cohen–Macaulayness] When is SB/A Cohen–Macaulay? [Regularity] There are known relationships ([71]) between the Castelnuovo regularity of the Rees algebra and that of the associated graded ring. We want to relate/extend comparisons to the Castelnuovo regularity of SB/A (if R is not Cohen-Macaulay). We would like to deal with these issues by relating them to some Hilbert functions associated to gr(B). One additional difficulty lies with the character of the ring R itself. This arises because the coefficients of these functions may be positive or negative, often depending on whether R is Cohen–Macaulay or not. [Existence] Which modules are Sally modules? THE SALLY MODULES OF IDEALS: A SURVEY 3 • [Independence] How independent of J are the properties of SJ (I)? • [a-invariant] Review its role • [Equations of the ideal] What are the relationships between SJ (I) and the defining equations of R[IT]? What if SJ (I) = 0? • [Non-primary ideals] Equimultiple, generically complete intersection, monomial Acknowledgments: We are thankful to several authors whose work motivated the writing of this survey. We apologize for unfinished discussions and invite readers to comment and suggestions. We are particularly grateful to Alberto Corso, Laura Ghezzi, Jooyoun Hong, Shiro Goto, Maria Evelina Rossi, Maria Vaz Pinto, Judy Sally, Aron Simis and Giuseppe Valla. 2. General Properties of Sally Modules 2.1. Dimension, depth and reduction number. One of its most useful properties as a conduit of cohomological information between a Rees algebra and the associated graded ring is the following ([73]). Throughout this section, (R, m) is a Noetherian local ring of dimension d and I is an m-primary ideal. Whenever required will assume that R has an infinite residue field. Cohen–Macaulay rings offer the most opportunities to exploit this notion. In the following (R, m) is a Cohen–Macaulay local ring, I is an m-primary ideal, J or Q denote minimal reductions of I, and A and B are Rees algebras as above. Proposition 2.1. Suppose R is a Cohen–Macaulay local ring of dimension d ≥ 1. If J is an ideal generated by a system of parameters then the following hold: (1) If SB/A = 0, then gr(B) is Cohen–Macaulay. (2) If SB/A 6= 0, then mR[JT ] is its only associated prime. (3) If SB/A 6= 0 then dim SB/A = d. (4) SB/A is Cohen–Macaulay if and only if depth gr(B) ≥ d − 1. (5) If depth gr(B) < d then depth SB/A = depth gr(B) + 1. (6) If SB/A 6= 0, then reg(SB/A ) = reg(gr(B)) = reg(B). (7) Furthermore if SB/A is Cohen-Macaulay, then reg(SB/A ) = reg(B) = rA (B) + 1. Proof. The assertions follow from computing the cohomology (see [43], [45], [71]) with respect to the maximal homogeneous ideal of A in the following exact sequences of finitely generated A–modules: 0 → I1 A∗ −→ A∗ −→ grJ (R) ⊗ R/I1 ≃ R/I1 [T1 , . . . , Tr ]∗ → 0, 0 → B+ −→ B −→ R∗ → 0, 0 → I1 A∗ −→ B+ [+1] −→ SB/A → 0, 0 → B+ [+1] −→ B −→ gr(B) → 0, where the modules tagged with ∗ are Cohen–Macaulay. Along with the shifts, they allow for a measure of pivoting in all the depth calculations (and their grading in the calculation of Castelnuovo regularity). For the proof of (2) and (3), in the third sequence above, 0 → I1 A −→ B+ [+1] −→ SB/A → 0, 4 WOLMER V VASCONCELOS I1 A is a maximal Cohen–Macaulay A-module, while B+ is torsion-free over A, that is, it has the condition S1 of Serre. It follows that if SA (B) 6= 0 then SA (B) has the condition S1 of Serre. Therefore p = mA is its only associated, in particular dim SA (B) = d. Additionally, if d ≥ 2 and B has the condition S2 of Serre then so does B+ , and consequently SA (B) has the condition S2 as well. ✷ One of our goals is to examine which parts of this formalism survive in case J is an ideal of positive dimension, and/or R is not Cohen–Macaulay. Corollary 2.2. ([27, Proposition 2.2]) Let A, B and p be as above. Then s0 (SA (B)) = λ(SA (B)p ). Furthermore, if s0 (SA (B)) = 1, then mSA (B) = 0. Proof. The general assertion is clear since p is the unique associated associated prime of SA (B) and A/p has multiplicity 1. On the other hand, if λ(SA (B)p ) = 1, we must have pSA (B)p = 0 and therefore pSA (B) = 0 since this module is either trivial or p would be its only associated prime, in which case s0 (SA (B)) ≥ 2. ✷ Corollary 2.3. Let (R, m) be a Noetherian local ring, let I be an m-primary ideal and J one of its minimal reductions. If for some integer s ≥ 1, JI s = IJ s , then dim SJ (I) = 0. Moreover if R is Cohen–Macaulay then I 2 = JI. Proof. The assertion means that the Sally module components I n+1 /J n I = 0 for n ≫ 0. Let n be an integer of the form n = a(s − 1) + 1 ≥ rJ (I). Then I n+1 = JI a(s−1)+1 = JI s I (a−1)(s−1) = J s−1 JI (a−1)(s−1)+1 = · · · = J a(s−1)+1 I = IJ n . The last assertion follows from Proposition 2.1(3). Alternatively, the assumption is that SJ (I) is annihilated by a power of (JT). Since by construction SJ (I) is also annihilated by a power of J, the assertion follows. ✷ Example 2.4. Let us consider some examples. • R = k[x, y]/x(x, y)2 , J = (y), I = (x, y). Then I 2 = (x2 , xy, y 2 ) 6= (xy, y 2 ) = JI mod x(x, y)2 , but I 2 J = J 2 I. • For positive integers d > r > 1, give an example of a ring with dim R = d with a Sally module with dim SJ (I) = r. • Adding variables to J and I, what happens to the Sally modules? Set S′ = R[x], L = (J, x), Q = (I, x). Then SQ (L) = SJ (I)[x]. • Let B = k[x, y, z], I = (x, y, z)3 and the system of parameters (x3 , y 3 , z 3 ). View I as the ideal of the subring B0 of B generated by the forms of degree ≥ 3. Now set Q0 = (x3 , y 3 , z 3 )B0 and Q = Q0 B. We have the equality SQ0 (I) = SQ (I) 6= 0. It follows that although B0 is not Cohen-Macaulay, the Sally module SQ0 (I) is Cohen-Macaulay. • Let (R, m) be a Cohen–Macaulay local ring and let p be an ideal of codimension g such that Rp is not a regular local ring. If J = (a1 , . . . , ag ) ⊂ p is a regular sequence, then for the link I = J : p, I 2 = JI ([9, Theorem 2.3]). In particular S(J; I) = 0. THE SALLY MODULES OF IDEALS: A SURVEY 5 2.2. Veronese subrings. Let I be an ideal with a reduction J = (a1 , . . . , ad ), I r+1 = JI r . For q > 0, Jq = (aq1 , . . . , aqd ) is a reduction of I q , then ([3], [44, Corollary 2.6], [53, Theorem 3.10]) r(I q ) ≤ max⌈1 + r(I) − 1 , 2⌉, q where ⌈ ⌉ is the integral part function. In particular, for q ≫ 0, the Sally module SB(q) /A(q) is a standard graded module. Proposition 2.5. If R is Cohen-Macaulay then for q larger than the postulation number of grI (R), e0 (A(q) ; B(q) ) = e2 (I). For a proof see Corollary 3.10(b). It would be interesting to compare two such Sally modules with respect to their dimensions, multiplicities and depth. 2.3. The fiber of the Sally module. The Sally module SB/A is a module over A = R[JT]. An important role here is that of the module FA (B) = SB/A ⊗A (A/(JT)) = r M In+1 /JIn , n≥1 which we call the its special fiber or simply the Sally fiber of SB/A . Here are some properties of FA (B): (1) There is a natural action of B on FA (B): For x = bs Ts ∈ Is Ts , x · (In+1 /JIn ) = xIn+1 + JIn+s /JIn+s ⊂ In+s+1 /JIn+s . For the filtration In = I n , I r+1 ⊂ JI r , in particular r = rA (B) ≤ λ(FA (B))+1. In the case of equality I n+1 /JI n ≃ R/m for all 1 ≤ n ≤ r − 1. We conjecture that in this case all I n are Ratliff-Rush closed! Check in [13]. This can be further refined by considering the action of Is Ts on FA (B)⊗R/m = F and benefit from Nakayama’s Lemma: rA (B) ≤ λ(F ) + 1. n its Ratliff-Rush closure. There is a natural (6) Let I n be an I-adic filtration and If mapping of Sally modules (2) (3) (4) (5) e n−1 . I n /IJ n−1 7→ Ifn /IJ If I = Ie this mapping is an embedding that is an isomorphism for n ≫ 0. (7) In this case the Hilbert polynomials agree so that in particular s0 (SB/A ) = ). s0 (SB/A e 3. Dimension, Multiplicity and Euler Characteristics We begin to develop the basic metrics to examine Sally modules with a focus on the determination of multiplicities. 6 WOLMER V VASCONCELOS 3.1. The Hilbert series and dimension. A basic calculation refines the relationship between the multiplicity and the dimension of the Sally module. Proposition 3.1. Let (R, m) be a Noetherian local ring of dimension d, I an mprimary ideal and Q one of its minimal reductions. Then dim SQ (I) = d if and only if sQ (I) 6= 0. More generally we have observed that dim SQ (I) ≤ d. This means that its Hilbert polynomial   d−1 X n+i−1 i n+1 n (−1) si λ(I /IQ ) = , d−i−1 0 where we denote sQ (I) = s0 . Finally observe Proposition 3.2. If SQ (I) 6= 0 then dim SQ (I) = d − min{i | si 6= 0}, or 0. Proposition 3.3. Let (R, m) be a Noetherian local ring of dimension d, I an mprimary ideal and Q one of its minimal reductions. Suppose that the corresponding Sally module SQ (I) has dimension d. Then its multiplicity satisfies sQ (I) ≤ e1 (I) − e1 (Q) − e0 (I) + λ(R/I). Proof. Let SQ (I) = exact sequences L n≥1 I n+1 /IQn be the Sally module of I relative to Q. From the 0 → I n+1 /IQn −→ R/IQn −→ R/I n+1 → 0 0 → Qn /IQn −→ R/IQn −→ R/Qn → 0 we obtain that λ(I n+1 /IQn ) = −λ(R/I n+1 ) + λ(R/Qn ) + λ(Qn /IQn ). (2) For n ≫ 0, we have   n+d−1 λ(I /IQ ) = sQ (I) + lower degree terms d−1     n+d n+d−1 n+1 λ(R/I ) = e0 (I) − e1 (I) + lower degree terms. d d−1 n+1 n Since e0 (Q) = e0 (I), for n ≫ 0 we have     n+d−1 n+d−2 λ(R/Qn ) = e0 (Q) − e1 (Q) + lower degree terms d d−1         n+d n+d−1 n+d−1 n+d−2 = e0 (Q) − − e1 (Q) − + ··· d d−1 d−1 d−2       n+d n+d−1 n+d−1 = e0 (I) − e0 (I) − e1 (Q) + lower degree terms d d−1 d−1 THE SALLY MODULES OF IDEALS: A SURVEY 7 Let G = grQ (R) ⊗ R/I. Then for n ≫ 0 we have   n+d−1 n n λ(Q /IQ ) = e0 (G) + lower degree terms. d−1 It follows that sQ (I) = e1 (I) − e0 (I) − e1 (Q) + e0 (G). But G is a homomorphic image of a polynomial ring R/I[T1 , . . . , Td ], so that e0 (G) ≤ λ(R/I), and we obtain the desired upper bound for sQ (I). ✷ In a minor refinement, write (2) as (3) λ(I n+1 /IQn ) = −λ(R/I n+1 ) + λ(R/Qn+1 ) − λ(Qn /Qn+1 ) + λ(Qn /IQn ). We now match the Hilbert coefficients: 0 = e0 (I) − e0 (Q) sQ (I) = s0 = e1 (I) − e1 (Q) + e0 (Q) + e0 (G) .. . si = ei+1 (I) − ei+1 (Q) + ei (Q) + ei (G), i ≥ 1. To apply Proposition 3.2 is simpler when ei (G) = 0 for i ≥ 1–and we treat two cases here. Another simplification is when the values of ei (Q), for i ≥ 1, are independent of I (Buchsbaum rings, to check). This highlights the fact that, unlike the Cohen–Macaulay case, several properties of SQ (I) [dimension, multiplicity] may depend on Q. Meanwhile we have Corollary 3.4. Let (R, m) be a Cohen-Macaulay local ring of dimension d ≥ 1, let I be an m-primary ideal and let Q be one of its minimal reductions generated by a regular sequence. Then (1) The Hilbert function of SQ (I) is independent of Q. (2) If d = 1, rQ (I) is independent of Q. More generally, the assertion holds if h(t) depth grI (R) ≥ d − 1. More precisely, if (1−t) d is the Hilbert series of SQ (I), then rQ (I) = deg h(t). Proof. (1) follows directly from the formula λ(I n+1 /IQn ) = −λ(R/I n+1 ) + λ(R/Qn ) + λ(Qn /IQn ), as the last two terms are respectively   d+n−1 λ(R/Q ) = e0 (I) , d   d+n−1 n n λ(Q /IQ ) = λ(R/I) . d−1 n (2) Let us consider a general observation first. From the definition of SQ (I), 0 → IR[QT] −→ IR[IT] −→ SQ (I) → 0, 8 WOLMER V VASCONCELOS we see that SQ (I) is a module over R[QT] and as such has the condition S1 of Serre. Considering the natural presentation of the polynomial ring A = R[t1 , . . . , td ] → R[QT], we view SQ (I) as a finite A-module. Of course the action of the variables depend on Q as does L the annihilator of SQ (I) as an R-module. Nevertheless as an A/LA-module SQ (I) keeps the condition S1 and therefore there is a form of degree 1 that induces an injective homomorphism on SQ (I). Consequently its Hilbert function is monotonically increasing. Let d = 1 now and suppose SQ (I) 6= 0 [otherwise there is no difficulty]: With A = R[t] the action of t : Sn−1 7→ Sn n+1 n is surjective if I = QI thus n ≥ rQ (I). Since this means that λ(I n /IQn−1 ) = n+1 n λ(I /IQ ), a condition that is independent of Q, This proves the assertion. SimiIar observations can be made if depth grI (R) ≥ d−1 since this means that SQ (I) is Cohen-Macaulay for each Q and therefore the reduction number rQ (I) is given by the degree of the h-polynomial minus one. ✷ A general result that also addresses the case when SQ (I) is Cohen-Macaulay is [70, Theorem 1.2]. Corollary 3.5. If R is Cohen-Macaulay then sQ (I) = e1 (I) − e0 (I) + λ(R/I), in particular the dimension, the depth and the multiplicity of SQ (I) are independent of Q. Proof. The assertions about the dimension and the depth follow from Proposition 2.1. ✷ Remark 3.6. Suppose F = {In } is a filtration Lso that the corresponding Rees algebra B is finite over A = R[QT]. Let SQ (B) = n≥1 In+1 /I1 Qn be the associated Sally module. The same calculation yield the formulas sQ (F) ≤ e1 (F) − e1 (Q) − e0 (Q) + λ(R/I1 ), and if R is Cohen–Macaulay sQ (F) = e1 (F) − e0 (Q) + λ(R/I1 ). Let us consider a mild generalization of these formulas. Corollary 3.7. Let (R, m) be a Noetherian local ring of dimension d, I an m-primary ideal and Q one of its minimal reductions. Suppose that dim SQ (I) = d. Let ϕ is the matrix of syzygies of Q. If Q is generated by a d-sequence and I1 (ϕ) ⊂ I, then sQ (I) = e1 (I) − e1 (Q) − e0 (I) + λ(R/I). Proof. Let G = grQ (R) ⊗ R/I. By the proof of Theorem 3.3, we have sQ (I) = e1 (I) − e0 (I) − e1 (Q) + e0 (G). Set S = R[T1 , . . . , Td ]. Since Q is generated by a d-sequence, the approximation complex 0 → Hd (Q) ⊗ S[−d] → · · · → H1 (Q) ⊗ S[−1] → H0 (Q) ⊗ S → grQ (R) → 0 THE SALLY MODULES OF IDEALS: A SURVEY 9 is acyclic ([33, Theorem 5.6]). By tensoring this complex by R/I, we get the exact sequence φ H1 (Q) ⊗ R/I ⊗ S[−1] −→ R/I ⊗ S −→ G → 0. Since I1 (ϕ) ⊂ I, the mapping φ is trivial so that e0 (G) = λ(R/I). ✷ Remark 3.8. One instance when I1 (ϕ) ⊂ I occurs if R is unmixed and I is integrally closed, according to [54, Proposition 3.1]. Corollary 3.9. Suppose (R, m) is an unmixed Buchsbaum local ring of dimension d. Let I be an m-primary integrally closed ideal and Q is one of its minimal reductions. If dim SQ (I) = d then the dimension and multiplicity of the Sally modules of I are independent of the chosen minimal reduction. Proof. By assumption SQ (I) 6= 0. Since e1 (Q) is independent of Q for Buchsbaum rings ([30]), SQ (I) is unchanged across all minimal reductions of I. In particular dim SQ (I) is also unchanged. ✷ The following classical inequalities for the Hilbert coefficients of primary ideals arises from this formula (see [13] for a detailed discussion). Corollary 3.10. Let (R, m) be a Cohen–Macaulay local ring of dimension d and let I be a m-primary ideal. Then (a) Northcott inequality [50] e1 (I) − e0 (I) + λ(R/I) ≥ 0. (b) Narita inequality [49] e2 (I) ≥ 0. Proof. For (a), one invokes the fact that for R Cohen-Macaulay, e1 (I) − e0 (I) + λ(R/I) is the multiplicity of SQ (I). For (b), we may assume that d = 2 and using a trick of J. Lipman to evaluate this multiplicity on I q for q larger than the postulation number of the Hilbert function of grI (R). We first consider the case for d = 2 and without great loss of generality take In = I n . Let     n+1 n n λ(R/I ) = e0 − e1 + e2 , n ≫ 0 2 1 be the Hilbert polynomial of I. Let q be an integer greater than the postulation number for this function. We have     n+1 n qn q n λ(R/I ) = λ(R/(I ) ) = f0 − f1 + f2 2 1     qn + 1 qn = e0 − e1 + e2 , n ≫ 0. 2 1 Comparing these two polynomials in n, gives f0 = q 2 e0 1 1 f1 = qe1 + q 2 e0 − qe0 2 2 f2 = e2 . Since the multiplicity s0 (I q ) of the Sally module of I q is given by s0 (I q ) = f1 − f0 + λ(R/I q ), 10 WOLMER V VASCONCELOS which by the equalities above yields e2 (I) = s0 (I q ), the multiplicity of the Sally module of I q . Thus e2 (I) is nonnegative and vanishes if and only if the reduction number of I q is less than or equal to 1. In dimension d > 2, we reduce R and I modulo a superficial element. ✷ 3.1.1. Maximal ideals. The dimension of Sally modules over non-Cohen-Macaulay local rings is hard to ascertain. We state a result of A. Corso ([7]) for maximal ideals. Theorem 3.11. [7, Theorem 2.1] Let (R, m) be a local Noetherian ring of dimension d > 0 with infinite residue field, and let Q be a minimal reduction of m. (a) The Sally module SQ (m) has dimension d if and only if e1 (m)−e0 (m)−e1 (Q)+1 is strictly positive. Otherwise, its dimension is d−inf{i | 1 ≤ i ≤ d−1, ei+1 (m)− ei (Q) − ei+1 (Q) 6= 0} or 0. (b) If R is a Buchsbaum ring, the Sally module SQ (m) has dimension d or 0. Remark 3.12. For m-primary ideals I 6= m, a similar description is not known, even for Buchsbaum rings. 3.2. Cohen–Macaulayness of the Sally module. As a motivation, it is worthwhile to point out one useful aspect of these modules. Under the conditions of (2.1), if I1 is m–primary there is a numerical test for the Cohen-Macaulayness of SB/A ([42]; see also [39]). It does not always require that R be Cohen-Macaulay. Theorem 3.13 (Huckaba test). If R is Cohen-Macaulay, the Sally module SB/A is Cohen–Macaulay if and only if X e1 (gr(B)) = λ(Ij /QIj−1 ). j≥1 Proof. Its brief proof, as in [39], goes as follows. First note that SB/A is an A–module annihilated by a power of Q, from which it follows that the generators of QT is a system of parameters. In the case of an m–primary ideal Q, the interpretation of this formula is e0 (SB/A ) = λ(SB/A ⊗ R[QT]/(QT)). In other words, χ1 (QT; SB/A ) = 0, and therefore SB/A is Cohen–Macaulay by Serre’s Theorem ([4, Theorem 4.7.10]) on Euler’s characteristics. ✷ Here is an important case that does not use this test. Theorem 3.14. [55, Corollary 3.8]. Let (R, m) be a Cohen–Macaulay local ring of dimension d. and let I be an m-primary ideal. If e0 (I) = λ(I/I 2 ) + (1 − d)λ(R/I) + 1 then depth (G) ≥ d − 1. In particular all the Sally modules of I are Cohen–Macaulay. Remark 3.15. The equations of the ideal I ([72]) are the the ideal of relations of a presentation ϕ 0 → L −→ C = R[T1 , . . . , Tn ] −→ R[IT] → 0. L L = j≥1 Lj is a graded ideal whose properties are independent of the presentation. For instance, the relation type of I, rel(I), is the maximum degree of a minimal set of homogeneous generators of L. If R is a Cohen–Macaulay local ring and I in m-primary, THE SALLY MODULES OF IDEALS: A SURVEY 11 then the Sally module SJ (I) impacts the relation type in a number of ways, for instance if SJ (I) is Cohen–Macaulay then rel(I) ≤ rJ (I) + 1, according to [70, Theorem 1.2]. Several questions can be raised if I is not m-primary. We will attempt to do this later. 3.2.1. Dimension one. Let (R, m) be a Cohen-Macaulay local ring of dimension one. By Proposition 2.1(iv), for each m-primary ideal I the Sally module S = SQ (I) is Cohen-Macaulay, and therefore by Theorem 3.13 X e1 (I) = λ(Ij /QIj−1 ). j≥1 Proposition 3.16. Let (R, m) be a Cohen–Macaulay local ring of dimension 1 and let I be an m-primary ideal. If Q = (a) is a minimal reduction of I then the corresponding Sally module S = SQ (I) has the following properties. Setting L = ann(I/Q), (i) S is Cohen-Macaulay. (ii) If s = r(I) ≥ 2, then e1 (I) = λ(R/L) + s−1 X λ(I j+1 /aI j ). j=1 (iii) If ν(I) = 2, then e1 (I) . λ(R/L) (iv) If ν(I) = r(I) = 2, then e1 (I) ≤ 2 · λ(R/L). r(I) ≥ Proof. (i), (ii): Since depth grI (R) ≥ d − 1, S is Cohen-Macaulay. (iii): If I = (a, b), I j+1 /QI j is cyclic and annihilated by L, so e1 (I) ≤ r(I) · λ(R/L). (iv): is a special case of (iii). ✷ 3.3. Change of rings for Sally modules. Let (R, m) be a Noetherian local ring of dimension d ≥ 1 and let f : R → S be a finite morphism. Suppose S is a Cohen– Macaulay ring locally of dimension d. For each m-primary ideal I with a minimal reduction Q, for each maximal ideal M of S the ideal ISM is MSM -primary and QSM is a minimal reduction. We define the Sally module of IS relative to QS in the same manner, M SQS (IS) = I n+1 S/IQn S. n≥1 SQS (IS) is a finitely generated graded grQ (R)-module. Its localization at M gives SQSM (ISM ). Consider the natural mapping M M ϕf : S ⊗R SQ (I) = I n+1 /IQn ⊗R S 7→ SQS (IS) = I n+1 S/IQn S. n≥1 n≥1 12 WOLMER V VASCONCELOS ϕf is a graded surjection from S ⊗R SQ (I) onto SQS (IS), which combined with a presentation Rb → S → 0, b = ν(S), gives rise to a homogeneous surjection of graded modules [SQ (I)]b 7→ SQS (IS). The following takes information from this construction into Proposition 2.1. It is a factor in our estimation of several reduction number calculations, according to [23]. Theorem 3.17 (Change of Rings Theorem). Let R, S, I, Q be as above. If S is CohenMacaulay then (1) If dim SQ (I) < d, then SQS (IS) = 0. (2) If s0 (IS) 6= 0, then dim SQ (I) = d. (3) If dim SQ (I) = d, then s0 (IS) ≤ b · s0 (I). We note that s0 (IS) is a multiplicity relative to R. It is a positive summation of local multiplicities, so each of these is also bounded. Proof. All the assertions follow from the surjection [SQ (I)]b → SQS (IS) and the vanishing property of Sally modules over Cohen-Macaulay rings (Proposition 2.1.2). ✷ Corollary 3.18. s0 (IS) ≤ b · s0 (I). Remark 3.19. It would be good to prove that the condition (3.17.2) is actually an equivalence. Question 3.20. Let S = k[x1 , . . . , xd ] and let G be a finite group of k-automorphisms of S. Set R = SG . [True or false?] For any ideal I of R of finite colength SQ (I) is [locally] either 0 or has dimension d. If Q is a minimal reduction of I, QS is a minimal reduction of IS. Suppose I 2 S = QIS. Extra remarks on change of rings. Suppose (R, d, m, I, Q) is as above and ϕ : R → S is an injective finite morphism. • We would like to prove dim SQ (I) = dim SQS (IS). Set C = S[QST] and consider the sequence of natural surjective homomophisms of B modules S ⊗R SQ (I) = S ⊗R B ⊗B SQ (I) → C ⊗B SQ (I) → SQS (IS). • Claim 1. dim C ⊗B SQ (I) = dim SQ (I): Let P be an associated prime ideal of SQ (I), as a B-module, with dim B/P = dim SQ (I). Localize at P . Let L ⊂ P BP be a system of parameters contained in the annihilator of SQ (I)P . It follows easily that CP /LCP ⊗B SQ (I)P 6= 0, and therefore C ⊗B SQ (I) has dimension dim B/P , as desired. • Claim 2. We will argue that dim SQ (I) = dim SQS (IS), as B-modules. 3.4. Special fiber and reduction number. Following [12] we study relationships between r(I) and the multiplicity f0 (I) of the special fiber F (I) = R[IT] ⊗ R/m of the Rees algebra of I. Let (R, m) be a Cohen–Macaulay local ring of dimension d ≥ 1, and let I be an m-primary ideal, let Q be a minimal reduction of I and let SQ (I) denote the Sally module of I relative to Q. Suppose I is minimally generated by s elements. We THE SALLY MODULES OF IDEALS: A SURVEY 13 can write I = (Q, b1 , . . . , bs−d ). Consider the exact sequence introduced in [12, Proof of 2.1] ϕ R[QT] ⊕ R[QT][−1]s−d −→ R[IT] −→ SQ (I)[−1] → 0, P where ϕ is the map defined by ϕ(f, a1 , . . . , as−d ) = f + j ai bj T. Tensoring this sequence with R/m yields the exact sequence (4) ϕ F (Q) ⊕ F (Q)[−1]s−d −→ F (I) −→ SQ (I)[−1] ⊗ R/m → 0. We make some observations about the relationship between s0 (I) and rQ (I) arising from this complex in special cases: • The exact sequence gives f0 (I) ≤ deg SQ (I) + ν(I) − d + 1 ≤ deg SQ (I) + ν(I) − d + 1. • If mSQ (I) = 0, f0 (I) ≤ s0 (I) + ν(I) − d + 1. If mSQ (I) 6= 0, dim(mSQ (I)) = d since mR[QT] is the only associated prime of SQ (I). Therefore deg SQ (I) < deg SQ (I) and thus f0 (I) ≤ s0 (I) + ν(I) − d. • Suppose I is an almost complete intersection. If mSQ (I) = 0, we are in a case similar to that treated in [23, Corollary 3.8]. Then F (I) is a hypersurface ring and rQ (I) + 1 = f0 (I) = s0 (I) + 2. To benefit from these bounds, we need information about F (I). For example, if I and Q are given by forms of the same degree, F (I) is an integral domain. Such conditions could be used in generalized versions of the classical Cayley-Hamilton theorem: Theorem 3.21. Let (R, m) be a Noetherian local ring, I an ideal and Q one of its minimal reductions. Then (1) rQ (I) ≤ νF (Q) (F (I)) − 1. (2) If F (I) satisfies the condition S1 of Serre, rQ (I) ≤ f0 (I) − 1. Proof. (1) is the standard Cayley-Hamilton theorem. The condition in (2) means that F (I) is a torsionfree graded module of rank f0 (I) over the polynomial ring F (Q). One then invokes [74, Proposition 9]. ✷ 3.5. Multiplicity and reduction number. The following result of M. E. Rossi ([56]) is the main motivation of our discussion here. Theorem 3.22. ([56, Corollary 1.5]) If (R, m) is a Cohen-Macaulay local ring of dimension at most 2, then for any m-primary ideal I with a minimal reduction Q, rQ (I) ≤ e1 (I) − e0 (I) + λ(R/I) + 1. Given that e1 (I) − e0 (I) + λ(R/I) is the multiplicity s0 (Q; I) of the Sally module SQ (I), we still consider: (1) If R is Cohen-Macaulay, [56] raised the question on whether in all dimensions rQ (I) ≤ s0 (Q; I) + 1, a fact observed in numerous cases. 14 WOLMER V VASCONCELOS (2) If R is not Cohen-Macaulay the expression for the multiplicity of SQ (I) is different [as seen in some cases above]. Nevertheless we do not have a failure for this bound for rQ (I). (3) If R is not Cohen-Macaulay this formula may require the addition, or multiplication, by a constant that expresses some defficiency d(R) of R being nonCohen-Macaulay, such as • rQ (I) ≤ d(R) · s0 (Q; I), or • rQ (I) ≤ s0 (Q; I) + d(R). 3.6. Sally questions. Let (R, m) be a Cohen–Macaulay local ring of dimension d. Denote the embedding dimension of R by n = ν(m) and e = e0 (m) its multiplicity. Sally series of questions grew out of an elementary observation of S. Abhyankar ([1]): n ≤ e + d − 1. This is proved by first assuming, harmlessly, that the residue field of R is infinite and modding out R by a minimal reduction Q of m. The inequality results from λ(m/Q) ≥ ν(m/Q), the fact that Q is generated by a subset of a minimal generating set of m and the interpretation of the multiplicity e as λ(R/Q). The task undertaken by Sally in a series of papers ([63, 64, 65, 66, 67]) was to examine the impact of extremal values of this inequality on the properties of the associated graded ring G = grm (R). Thus in [63] it is proved that if n = e + d − 1, then G is Cohen–Macaulay. In the next case, if n = e + d − 2 or n = e + d − 3, G is still Cohen–Macaulay if R is Gorenstein. If n = e + d − 2 numerous cases showed that G is not always Cohen–Macaulay but nevertheless that still depth G ≥ d − 1. That depth G ≥ d − 1 for all Cohen–Macaulay rings coalesced into a question that became known as the Sally Conjecture. It was independently resolved in the affirmative by M. E. Rossi and G. Valla ([59]) and H.-J. Wang ([79]). It should be pointed out that these developments have been greatly enhanced for more general filtrations in [62]. Another aspect muted here, for which this author apologizes, is the lack of a discussion of the Hilbert of function of G, which was of great interest to the authors mentioned above. 4. Equimultiple Ideals Let F be a multiplicative filtration and let A = R[QT] be a reduction of B. If Q is not m–primary, but still a complete intersemection, that is I1 is an equimultiple ideal, we would need an extended notion of Hilbert polynomial. Of course this requires an understanding of the relationship between the coefficients and the cohomology of SB/A . Let us outline two ways that might work out. The first uses an extended degree function ([76]), the other a generalized multiplicity. They are both focused on determining the multiplicity of SB/A . THE SALLY MODULES OF IDEALS: A SURVEY 15 4.1. Extended Hilbert function. We are just going to replace lengths by multiplicities. Let F = {In , I0 = R} be a filtration of ideals. Let deg(·) be a multiplicity function, possibly a Hilbert–Samuel multiplicity [usually denoted by e0 (I; ·)] Define n 7→ deg(R/In ), and set H(R; t) = X deg(R/In )tn , H(gr(B); t) = n≥1 X deg(In /In+1 )tn . n≥0 Proposition 4.1. Let Q be an ideal of codimension r. Then H(R; t) is a rational function of degree r + 1. Proof. Let p1 , . . . , ps be the minimal prime ideals of Q. Since Q is a reduction of I1 , they are also the minimal primes of height r of the ideals In . By the elementary additivity formula for multiplicities, X deg(R/In ) = (5) deg(R/pk )λ((R/In )pk ). 1≤k≤s The assertion follows because λ((R/In )pk ) is the Hilbert function of the localization of the filtration {In } in the local ring Rpk of dimension r. ✷ We note that when written out, the series X hk (t) , λ((In /In+1 )pk )tn = (1 − t)r hk (1) > 0. n≥0 We collect the first Hilbert coefficients of these localizations as X E0 (gr(B)) = deg(R/pk )e0 (gr(Bpk )) 1≤k≤s E1 (gr(B)) = X deg(R/pk )e1 (gr(Bpk )) 1≤k≤s which we make use of to write the corresponding Hilbert polynomial as     n+r−1 n+r−2 E0 (gr(B)) − E1 (gr(B)) + lower terms. r−1 r−2 The coefficients are integers and are called the extended Hilbert coefficients of gr(B). Now we use this technique to determine some properties of the corresponding Sally module SB/A in case Q is a complete intersection of codimension r and In = I n where I is an unmixed ideal. Note that if I is m-primary, E0 (gr(B)) = e0 (I) and E1 (gr(B)) = e1 (I). Proposition 4.2. Let R be a Cohen–Macaulay local ring of dimension d ≥ 1. If Q is a complete intersection and I is unmixed then SB/A = 0 or dim SB/A = d. In the latter case SB/A has the S1 property of Serre. Proof. Start by noticing that R[Qt] ⊗ R/I = R[Qt] ⊗ R/Q ⊗ R/I is a polynomial ring over R/I, and therefore has the condition S1 since I is unmixed. This means that IR[Qt] is a divisorial ideal of the Cohen-Macaulay ring A = R[Qt]. If SB/A 6= 0 and P ⊂ A is one of its associated primes of codimension at least 2, the exact sequence 0 → Hom(A/P, IA) = 0 −→ Hom(A/P, IB) = 0 −→ Hom(A/P, SB/A ) −→ Ext1A (A/P, IA) 16 WOLMER V VASCONCELOS leads to a contradiction since the last module vanishes as IA has the condition S2 of Serre. ✷ 4.2. Ideals of positive dimension. Let I be of dimension one and examine how SB/A is Cohen-Macaulay. [Set J = Q] In the exact sequence 0 → IR[QT ] −→ IR[IT ] −→ SQ (I) → 0, SQ (I) 6= 0 is Cohen-Macaulay means that depth IR[IT ] ≥ d, which from the basic sequences mean that depth R[IT ] ≥ d also [recall IR[QT ] is MCM R[QT ]-module. A maximal sop for SQ (I) is (QT, a), a a sop for R/Q. Reduction mod QT gives rise to the exact sequence 0 → IA ⊗A A/(QT ) −→ IR[IT ] ⊗A A/(QT ) −→ SQ (I) ⊗A A/(QT ) → 0. The last module is FQ (I) = r M I n+1 /QI n , r = rQ (I) n=1 must be Cohen-Macaulay over R/Q. In particular Proposition 4.3. rQ (I) ≤ deg FQ (I). Corollary 4.4. If SQ (I) is Cohen-Macaulay then deg SQ (I) = deg FQ (I). This gives a curious fact [probably trivial!] Proposition 4.5. For all n, I n /QI n−1 is a torsion free R/Q-module. Let us examine the possible extension to the case of an ideal Cohen-Macaulay ideal J of codimension two and deviation one, generically a complete intersection. This will imply that A = R[Jt] is Cohen-Macaulay. P The extended Hilbert series of SB/A , n≥2 deg(I n /IJ n−1 )tn , can be related to that of gr(B) by comparison of the exact sequences 0 → I n /IJ n−1 −→ R/IJ n−1 −→ R/I n → 0, and 0 → J n−1 /IJ n−1 = J n−1 /J n ⊗ R/I −→ R/IJ n−1 −→ R/J n−1 → 0 of modules of dimension d − r. These sequences give rise to the equalities deg(I n /IJ n−1 ) = deg(R/IJ n−1 ) − deg(R/I n ) deg(R/IJ n−1 ) = deg(J n−1 /IJ n−1 ) + deg(R/J n−1 ). They give for n ≥ 2, deg(I n /IJ n−1 ) = deg(J n−1 /IJ n−1 ) + deg(R/J n−1 ) − deg(R/I n )     n+r−2 n+r−2 = deg(R/I) + deg(R/J) r−1 r     n+r−1 n+r−1 − [E0 (gr(B)) − E1 (gr(B)) + lower terms]. r r−1 THE SALLY MODULES OF IDEALS: A SURVEY 17 In particular E0 (gr(B)) = deg(R/J) E1 (gr(B)) ≥ 0. We can also define an extended Hilbert function for the Sally module SB/A and the corresponding Hilbert polynomial     n+r−1 n+r−2 n n−1 deg(I /IJ ) = E0 (SB/A ) − E1 (SB/A ) + lower terms. r−1 r−2 The coefficient E0 (SB/A ) ≥ 0 but may vanish, that is this Hilbert polynomial could be of degree < r. Proposition 4.6. Let J be an unmixed ideal generated by a d-sequence with a CohenMacaulay Rees algebra. Then (1) E0 (SB/A ) = E1 (gr(B)) − deg(I/J). (2) E0 (SB/A ) = 0 if and only if dim SB/A < d. (3) If dim SB/A = d, E0 (SB/A ) = deg SB/A . Proof. To treat the vanishing of E0 (SB/A ), from the expression for the Hilbert polynomial of the filtration I n , X E0 (SB/A ) = E1 (gr(B)) − deg(I/J) = [e1 (gr(Bpk )) − λ(Ipk /Jpk )] deg(R/pk ) k = X deg SBpk /Apk deg(R/pk ). k Therefore E0 (SB/A ) = 0 if and only if the Sally modules at the localizations Rpk all vanish according to Proposition 2.1. ✷ Let us interpret these coefficients. Proposition 4.7. E0 (SB/A ) = deg SB/A . Proof. This follows from (5) and the general associativity formula for multiplicities ([48, Theorem 24.7]). ✷ 4.3. Cohen-Macaulayness. This allows to state the Cohen–Macaulay test for SB/A as follows: Theorem 4.8 (CM test for Sally modules). Suppose J is a complete intersection. Let a = {a1 , . . . , ad−r } be a multiplicity set of parameters for R/J, that is deg R/J = λ(R/(J, a)). If I1 is a Cohen–Macaulay ideal and SB/A 6= 0 then X E1 (gr(B)) ≤ λ(Ij /((a)Ij + JIj−1 )), j≥1 with equality if and only if SB/A is Cohen–Macaulay. It is important to keep in mind that Jt, a is a system of parameters for both gr(B) and SB/A . To explain this formulation, just note that the right-hand side is the sum of the multiplicity of the Cohen–Macaulay R/J–module I1 /J (recall that I1 is a Cohen– Macaulay ideal) plus λ(SB/A ⊗ A/(a, Jt)). One then invokes Serre’s Theorem. 18 WOLMER V VASCONCELOS To make it effective requires information about E1 (gr(B)), which is not an easy task. We will make observations about the following topics: Proposition 4.9. With B as above, let C be its integral closure. Then (1) B satisfies the condition R1 of Serre if and only if E1 (gr(B)) = E1 (gr(C)). (2) If J is m–primary, these conditions are equivalent to deg F (B) = deg F (C). 4.4. Ideals of positive dimension: non Cohen-Macaulay rings. Let (R, m) be a Noetherian local ring of dimension d > 0 that satisfies the condition Sr of Serre, r ≥ 1. For the study of Sally modules of ideals I with dim R/I > 0 we need an understanding of the Rees algebras of some of their reductions. Let us consider some special cases of equimultiple ideals. We make use of the techniques of [34, Theorems 6.1, 9.1 and 10.1]). (1) Q = (x1 , . . . , xq ) is a partial system of parameters and a d-sequence. Since Q is generated by a d-sequence, the approximation complex (set S = R[T1 , . . . , Tq ]) 0 → Hq (Q) ⊗ S[−d] → · · · → H1 (Q) ⊗ S[−1] → H0 (Q) ⊗ S → grQ (R) → 0 is acyclic ([33, Theorem 5.6]). As R has the condition Sr , Hj (Q) = 0 for j > q − r, which gives the estimate depth grQ (R) ≥ q − (q − r) = r. (2) By tensoring this complex by R/I, we get the exact sequence φ H1 (Q) ⊗ R/I ⊗ S[−1] −→ R/I ⊗ S −→ G = grQ (R) ⊗ R/I → 0. If I1 (ϕ) ⊂ I, the mapping φ is trivial so that G = R/I ⊗ S, which gives depth G ≥ q. (3) Now we look at the approximation complex 0 → Zq (Q) ⊗ S[−q] → · · · → Z1 (Q) ⊗ S[−1] → Z0 (Q) ⊗ S → R[QT] → 0, which is also acyclic. Here the Zi are the modules of cycles of the Koszul complex of Q. We have Zq = depth Zq−1 ≥ .. . depth Zi ≥ depth Z0 ≥ 0 r r − i + 1, r. i>q−r Depth chasing the exact sequence yields depth R[QT] ≥ r + 1, in all cases. This means that R[QT] satisfies Sr+1 . THE SALLY MODULES OF IDEALS: A SURVEY 19 (4) Suppose Q is a minimal reduction of I and consider the corresponding Sally module 0 → IR[QT] −→ IR[IT] −→ SQ (I) → 0. To get information about depth IR[QT], the exact sequence 0 → IR[QT] −→ R[QT] −→ G → 0, and (1) and (2) gives SQ (I) has the condition S1 or is zero. (5) If R[IT] has the condition S2 then so does SQ (I). (6) We need a version of Proposition 4.6 for ideals such as Q [which may be mixed]. (7) To approach a calculation of s0 (SQ (I)), consider the exact sequences 0 → I n+1 /IQn −→ R/IQn −→ R/I n+1 → 0, and 0 → Qn /IQn = Sn ⊗ R/I −→ R/IQn −→ R/Qn → 0 of modules of dimension ≤ 1. Applying the functor Hm (·) to these sequences, we get 0 → I n+1 /IQn −→ H0m (R/IQn ) −→ H0m (R/I n+1 ) → 0, and 0 → Sn ⊗ H0m (R/I) −→ H0m (R/IQn ) −→ H0m (R/Qn ) −→ Sn ⊗ H1m (R/I). 4.5. j-multiplicities. Let (R, m) be a Noetherian local ring, A a standard graded Ralgebra and M a finitely generated graded A-module. We can attach to H = H0m (M ) a Hilbert function n 7→ λ(Hn ), which we call the j–transform of M . Hilbert coefficients of Achilles-Manaresi polynomials. The corresponding Hilbert series and Hilbert polynomial will be still written as P (M ; t) and H(M ; t). We use a different notation for the coefficients of these functions:   r−1 X t+r−i−1 i (−1) ji (M ) , H(M ; t) = r−i−1 r = ℓ(M ). i=0 If r = 1 this polynomial does not provide for j1 (M ), so we use instead the function X n 7→ λ(Hk ). k≤n The coefficients ji (M ) are integers but unlike the usual case of an Artinian local R it is very hard to calculate being less directly related to M . In addition, some general relationships that are known to exist between the standard coefficients e0 , e1 , e2 , for instance, are not known. We illustrate one of these issues with a series of questions. Let R be a Noetherian local ring and let I = (x1 , . . . , xr ), r ≤ d = dim R, be an ideal generated by a partial system of parameters. Let G be the associated graded ring of I, G = grI (R). The module H = H0m (G) has dimension ≤ r. 20 WOLMER V VASCONCELOS 5. Ideals of Dimension One Our data is now the following kind: • R is Cohen–Macaulay of dimension d ≥ 1 • I1 is a Cohen-Macaulay equimultiple ideal of dimension 1, or • J is an aci and I is an ideal such that IR(J) is CM–HOW TO FIND SUCH? • Setting up the Hilbert function in case of low reduction number • Role of the Sally fiber Here is a specific problem: Suppose R = k[x, y, z] and J = (a, b) is a homogeneous complete intersection. We want to find I ⊂ J¯ such that IR[JT] is Cohen-Macaulay. For example, what if I is the integral closure itself? Of course, if R[IT] is Cohen-Macaulay [which is the case if J is monomial], then all powers I n are Cohen–Macaulay, by standard factors: grI (R) is Cohen– Macaulay of dimension 3 which the ideal mgrI (R) has height 1 since the analytic spread is 2 and thus m is not an associated prime of any component I n /I n+1 , then by induction get that m is not associated to any R/I n . If I is Cohen-Macaulay, get IR[JT] CM and the Sally module behaves as in the dimension zero case [m primary ideal]. The more interesting case is that of an aci J with I CM. In this case R[JT] is still CM, but not sure IR[JT] is CM. Need examples. 5.1. Generic complete intersections. Let R be a Cohen-Macaulay local ring of dimension d > 1 and I a Cohen-Macaulay ideal with dim R/I ≥ 1. We assume that I is not equimultiple. One special target is the set of prime ideals of dimension one of a regular local ring. Let I be an ideal that is a complete intersection on the punctured spectrum. If Q is a minimal reduction the Sally module SQ (I) has finite support and therefore has an ordinary Hilbert function. We do not know well how to express its Hilbert coefficients and use them to determine the properties of SQ (I). Let us assume dim R/I = 1, and let Q be a minimal reduction. We examine the Sally module SQ (I) under he assumption that I is generically a complete intersection. In this case Q is generated by a d-sequence and the approximation complex 0 → H1 (Q) ⊗ S[−1] −→ H0 (Q) ⊗ S −→ grQ (R) → 0 is exact (see [34, Theorem 9.1, 10.1]). Furthermore, by [34, Theorem 6.1], both grQ (R) and R[QT] are Cohen–Macaulay. Note that the Koszul homology module H1 (Q) is a Cohen-Macaulay module of dimension 1 and I · H1 (Q) = 0 since Ip = Qp at any of its minimal primes and Ip is generated by a regular sequence. It follows that if we reduce this complex by R/I we get the complex (6) 0 → H1 (Q) ⊗ S[−1] −→ R/I ⊗ S −→ grQ (R) ⊗ R/I → 0, that localization at the primes p shows it is acyclic. Proposition 5.1. Under these conditions we have: (1) grQ (R) and grQ (R) ⊗ R/I are Cohen-Macaulay. THE SALLY MODULES OF IDEALS: A SURVEY 21 (2) If the Sally module is nonzero then dim SQ (I) = d and has the condition S1 of Serre. Proof. The first assertion follows from the sequence (6), as the other modules are Cohen-Macaulay of dimension d + 1. Now consider the Sally module 0 → IR[QT] −→ IR[IT] −→ SQ (I) → 0. Since IR[QT] is a maximal Cohen-Macaulay module, SQ (I) = 0 or has the condition S1 of Serre. ✷ Remark 5.2. With greater generality, suppose R is a Gorenstein local ring and I is a Cohen-Macaulay ideal of codimension r and analytic deviation 1, that is a minimal reduction Q is generated by r + 1 elements. If I is a complete intersection on the punctured spectrum the same assertions about SQ (I) will hold. These Sally modules have properties akin to those of m-primary ideals. Corollary 5.3. Let R and I be as above. If dim SA (B) = d, then (1) p = mA is the only associated prime of SA (B). (2) The multiplicity of SA (B) satisfies e0 (SQ (I)) = λ(SQ (I)p ) ≤ r−1 X λ(I n+1 /QI n ), n=1 with equality if it is Cohen–Macaulay. Proof. Since SQ (I)q = 0 for q 6= m, SQ (I) is annihilated by a power of m. As it has the condition S1 , p is indeed its unique associated prime. As a consequence (QT) gives a system of parameters for SQ (I). In particular e0 (SQ (I)) ≤ r−1 X λ(I n+1 /QI n ), n=1 by Serre’s formula on Euler characteristics. ✷ Unfortunately neither the multiplicity nor the reduction number have estimates. Reduction number: Stuff below is not entirely well. Will return. To approach a calculation of s0 (SQ (I)), consider the exact sequences (7) (8) 0 → I n+1 /IQn −→ R/IQn −→ R/I n+1 → 0, 0 → Qn /IQn = Sn ⊗ R/I −→ R/IQn −→ R/Qn → 0 of modules of dimension ≤ 1. Applying the functor Hm (·) to these sequences, we get (9) 0 → I n+1 /IQn = H0m (I n+1 /IQn ) −→ H0m (R/IQn ) −→ H0m (R/I n+1 ) → 0, (10) 0 → Sn ⊗ H0m (R/I) = 0 −→ H0m (R/IQn ) −→ H0m (R/Qn ) −→ Sn ⊗ H1m (R/I). 22 WOLMER V VASCONCELOS We need to know about the growth of s(n) = λ(I n+1 /IQn ) a(n) = λ(H0m (R/Qn )) b(n) = λ(H0m (R/Qn+1 )) c(n) = λ(H0m (R/I n+1 )) d(n) = λ(H0m (R/IQn )) e(n) = λ(H0m (I n+1 /Qn+1 )) f (n) = λ(H0m (Qn /Qn+1 )) g(n) = λ(H0m (Qn /IQn )) by making use of the approximation complexes. These are for n ≫ 0 Hilbert polynomials of degree < d and their coefficients denoted in the usual manner. Let us see what numerical data can be extracted from them. (1) By local duality we have Hom(H1m (R/I), E) = R/I, where E is the injective envelope of R/m. (2) The first two sequences yield s0 = d0 − c0 < d0 except if and d0 ≤ a0 , and therefore s 0 ≤ a0 . (3) From the exact sequence 0 → H1 (Q) ⊗ S[−1] −→ H0 (Q) ⊗ S −→ grQ (R) → 0, we have H0m (H1 (Q))⊗S[−1] = 0 → H0m (H0 (Q))⊗S = I/Q⊗S → H0m (grQ (R)) → H1m (H1 (Q))⊗S[−1]. From which we have f0 ≥ λ(I/Q). (4) Meanwhile from 0 → Qn /Qn+1 −→ R/Qn+1 −→ R/Qn → 0 we have a 0 + f 0 ≥ b0 . (5) Let us exploit the coarse inequality s0 ≤ a0 in some special cases. Suppose R is a two-dimensional Gorenstein local ring. In this case we have the Z-complex ϕ 0 → Z1 ⊗ Sn−1 −→ Z0 ⊗ Sn −→ Qn → 0, which dualizing gives ϕ∗ 0 → (Qn )∗ −→ Z0∗ ⊗ S∗n −→ Z1∗ ⊗ S∗n−1 −→ Ext1 (Qn , R) = Ext2 (R/Qn , R) → 0. THE SALLY MODULES OF IDEALS: A SURVEY 23 Note how ϕ acts: If Q = (a, b) and (r, s) ∈ Z1 , that is ra + sb = 0, then ϕ(r, s) = rT1 + sT2 , and thus ϕ∗ (T∗1 )((r, s)h(T1 , T2 )) = T∗1 (rT1 + sT2 )h(T1 , T2 ) = rh(T1 , T2 ), and similar actions. This shows that coker ϕ = R/I1 (ϕ) ⊗ Sn−1 . (6) To sum up s0 ≤ a0 = λ(R/I1 (ϕ)). (7) This is incomplete: Must use the sequence 0 → B1 −→ Z1 −→ H1 → 0, dualize to get 0 → Z1∗ −→ B1∗ −→ R/I → 0 Special cases. Suppose ν(I) = d + 1 and consider the sequence (see (4)) ϕ F (Q) ⊕ F (Q)[−1] −→ F (I) −→ SQ (I)[−1] ⊗ R/m → 0. If mSQ (I) = 0, we examine the image of ϕ as in [23, Proposition 3.1]. We want to argue that ϕ is injective. It suffices to show that its image C in F (I) has rank 2. We begin by observing that F (Q) injects into F (I), so consider the exact sequence 0 → F (Q) −→ C −→ D → 0, where D= M (IQn−1 + mI n )/(Qn + mI n ). n≥1 We examine its Hilbert function, λ((IQn−1 + mI n )/(Qn + mI n )) for n >> 0 to show that dim D = d. First note that by assumption mSQ (I) = 0, that is mI n ⊂ IQn−1 for all n ≥ 2. Of course if I = (Q, a) it suffices to assume n = 2. We want to argue that mI n = mIQn−1 . This is embedded in the proof of the following ([23, Proposition 3.1]): Proposition 5.4. Let (R, m) be a Noetherian local ring with infinite residue field, I = (Q, a) is an ideal and Q is one of its minimal reductions. If for some integer n, λ(I n /QI n−1 ) = 1, then r(I) ≤ nν(m) − 1. Proof. Since Q is a minimal reduction of I, it is generated by a subset of the minimal  set of generators of I so if ν(Q) = r the expected number of generators of I n is r+n n . A lesser value for ν(I n ) would imply by [17, Theorem 1] that I n = JI n−1 for some minimal reduction J of I, and therefore r(I) ≤ n − 1.  n n−1 ) = 1, mI n ⊂ QI n−1 . Moreover, we Suppose that ν(I n ) = r+n n . Since λ(I /QI have mQI n−1 ⊂ mI n ⊂ QI n−1 ⊂ I n . Note that λ(mI n /mQI n−1 ) = λ(I n /mQI n−1 )−λ(I n /mI n ) = λ(I n /QI n−1 )+ν(QI n−1 )−ν(I n ) = 0. It follows that mI n = mQI n−1 . From the Cayley-Hamilton theorem we have (I n )s = (QI n−1 )(I n )s−1 , where s = ν(m). In particular I ns = QI ns−1 , as desired. ✷ 24 WOLMER V VASCONCELOS We return to the calculation of the dimension of D. Since mI n = mQn−1 I, we have λ((IQn−1 + mI n )/(Qn + mI n )) = λ(Qn−1 /(Qn + mI n )) − λ(Qn−1 /(IQn−1 + mI n )) = λ((Qn−1 /Qn ) ⊗ R/(Q + mI)) − λ((Qn−1 /Qn ) ⊗ R/I)   n+d−2 = λ(I/(Q + mI)) , d−1 which shows that D has dimension d and multiplicity λ(I/(Q + mI)) = 1. This concludes the proof that f0 (I) = 2 + s0 (SQ (I)). We are now ready for the main application of these calculations. Theorem 5.5. Let (R, m) be a Cohen-Macaulay local ring of dimension d and I a Cohen-Macaulay ideal of dimension 1. Suppose ν(I) = d + 1 and I is generically a complete intersection. Let Q be a minimal reduction of I and SQ (I) the associated Sally module. If mSQ (I) = 0 then F (I) is Cohen-Macaulay and depth SQ (I) ≥ d − 1. Proof. If the mapping ϕ is injective, in the exact sequence 0 → F (Q) ⊕ F (Q)[−1] −→ F (I) −→ SQ (I) → 0, F (I) is torsionfree over F (Q) since SQ (I) is also torsionfree over F (Q). The CohenMacaulayness of F (I) then follows as in Theorem 3.21(2). ✷ Remark 5.6. If ν(I) ≥ d + 2, • From mQI = mI 2 , we still have rQ (I) ≤ 2 · ν(m) − 1 • For ν(I) = d + 2 say, we have the complex F (Q) ⊕ F (Q)[−1]2 −→ F (I) −→ SQ (I) → 0, but how to determine the kernel? 5.2. Dimensions two and three. We will begin by illustrating with elementary examples. Example 5.7. Let R = k[x, y, z] and I = (x2 y, y 2 z, z 2 x, xzy). I is Cohen-Macaulay and generically a complete intersection. Q = (x2 y − xyz, y 2 z, z 2 x − xyz) is a minimal reduction of I and λ(I 2 /QI) = 1. Then rQ (I) ≤ 2 (actually rQ (I) = 2). Example 5.8. Let R be a regular local ring of dimension 3 and I a prime ideal of codimension two. Let Q be a minimal reduction of I. What can be said? • We may assume ν(Q) = 3, as otherwise I is a complete intersection. 6. This and That We will report briefly on the structure of Sally modules of small rank. THE SALLY MODULES OF IDEALS: A SURVEY 25 6.1. Multiplicity one. [13], [7], [27], [28], [29], [78] Theorem 6.1. [28, Theorem 1.2] Let (R, m) be a Cohen-Macaulay local ring of dimension d. If I is a m–primary ideal with a minimal reduction Q then the following three conditions are equivalent to each other. (1) e1 = e0 − λ(R/I) + 1. (2) mS = (0) and rankF (Q) (S) = 1. (3) S ≃ (X1 , X2 , . . . , Xc )F(Q) as graded R(Q)–modules for some 0 < c ≤ d, where {Xi }1≤i≤c are linearly independent linear forms of the polynomial ring F(Q). When this is the case, c = λ(I 2 /QI) and I 3 = QI 2 , and the following assertions hold true. (i) depth G ≥ d − c and depth R(Q) S = d − c + 1. (ii) depth G = d − c if c ≥ 2. (iii) Suppose c < d. Then       n+d n+d−1 n+d−c−1 n+1 λ(R/I ) = e0 − e1 + d d−1 d−c−1 for all n ≥ 0. Hence ei =  0 (−1)c+1 if i 6= c + 1 if i = c + 1 for 2 ≤ i ≤ d. (iv) Suppose c = d. Then λ(R/I n+1 ) = e0     n+d n+d−1 − e1 d d−1 for all n ≥ 1. Hence ei = 0 for 2 ≤ i ≤ d. This result is very similar to the assumptions and the consequences of the Sally conjecture. Corollary 6.2. In addition, if I is an almost complete intersection then the Sally module is Cohen-Macaulay. 6.2. Normal filtration. [10], [51], [52] Theorem 6.3. [52, Lemma 2.3] Let (R, m) be an analytically unramified local ring satisfying Serre conditionLS2 and let F = {In } be a filtration of ideals such that n codim I1 ≥ 2 and B = n≥0 In T is Noetherian. Then the integral closure of B in R[T] has the condition S2 . Theorem 6.4. [10, Theorem 2.5] Let (R, m) be an analytically umramified CohenMacaulay local ring of dimension d and infinite residue field and let I be an m primary ideal. If F = {In = I n } is the corresponding normal filtration, denote by B its Rees algebra and by S its Sally module. Then (1) If S 6= 0 then dim S = d. (2) If S 6= 0 then depth gr(B) ≥ depth S − 1. (3) If s0 (S) = 1 then S is Cohen-Macaulay. 26 WOLMER V VASCONCELOS Theorem 6.5. [51, Theorem 1.2] Let (A, m) be a Cohen-Macaulay local ring and I an m–primary ideal. Let Q be a minimal reduction of I and let R = A[It], T = A[Qt], G = grI (R), C = (I 2 R/I 2 T )(−1), B = T /mT. Assume that I is integrally closed. Then the following conditions are equivalent: (1) e1 (I) = e0 (I) − λA (A/I) + λA (I 2 /QI) + 1, (2) mC = (0) and rankB (C) = 1. (3) C ≃ (X1 , X2 , . . . , Xc )B(−1) as graded T –modules for some 1 ≤ c ≤ d, where X1 , . . . , Xc are linearly independent linear forms of the polynomial ring B. When this is the case, c = λA (I 3 /QI 2 ) and I 4 = QI 3 , and the following assertions hold true: (i) depth G ≥ d − c and depth T C = d − c + 1. (ii) depth G = d − c if c ≥ 2. (iii) Suppose c = 1 < d. Then HPI (n) = λA (A/I n+1 ) for all n ≥ 0 and   e1 (I) − e0 (I) + λA (A/I) + 1 if i = 2 1 if i = 3 and d ≥ 3 ei (I) =  0 if 4 ≤ i ≤ d. (iv) Suppose 2 ≤ c < d. Then HPI (n) = λA (A/I n+1 ) for all n ≥ 0 and   e1 (I) − e0 (I) + λA (A/I) if i = 2 0 if i 6= c + 1, c + 2, 3 ≤ i ≤ d ei (I) =  (−1)c+1 if i = c + 1, c + 2, 3 ≤ i ≤ d. (v) Suppose c = d. Then HPI (n) = λA (A/I n+1 ) for all n ≥ 2 and  e1 (I) − e0 (I) + λA (A/I) if i = 2, and d ≥ 2 ei (I) = 0 if 3 ≤ i ≤ d (vi) The Hilbert series HSI (z) is given by HSI (z) = λA (A/I) + (e0 (I) − λA (A/I) − λA (I 2 /QI) − 1)z + (λA (I 2 /QI) + 1)z 2 + (1 − z)c+1 z . (1 − z)d 6.3. Monomial ideals. Sally modules of monomial ideals are hard to construct in a manner that inherit the monomial structure. More precisely if I is a monomial ideal of R = k[x1 , . . . , xd ], its minimal reductions Q used in the definition of the Sally modules of I are rarely monomial. One should keep in mind that the point of using Q was to guarantee a good platform in R[QT] from which to examine R[IT]. Of course this requirement may be satisfied in other cases, that is without having for Q a minimal reduction. Let us illustrate with a special class of ideals. Monomial ideals of finite colength which are almost complete intersections have a very simple description. Let R = k[x1 , . . . , xd ] be a polynomial ring over a (possibly infinite) field and let J and I be R–ideals such that J = (xa11 , . . . , xadd ) ⊂ (J, xb11 · · · xbdd ) = I. This is the general form of almost complete intersections of R generated by monomials. X bi < 1. This inequality ensures Perhaps the most interesting cases are those where ai THE SALLY MODULES OF IDEALS: A SURVEY 27 that J is not a reduction of I. Let a d−1 − xadd , xb1d · · · xbdd ). Q = (xa11 − xadd , . . . , xd−1 Note that Q is a reduction of I: It is enough to observe that a a d−1 d−1 ) ∈ QI d−1 , + xd−1 (xadd )d = xadd (xadd − xa11 + xa11 ) · · · (xadd − xd−1 in particular rQ (I) ≤ d − 1. Let now B be the Rees algebra of the integral closure filtration {I¯n }. If A0 = R[QT] and A = R[IT], either of these defines a Sally module, SA0 (B) and SA (B), the latter carrying a monomial structure. While A0 is always Cohen–Macaulay, A is still often very amenable. Conjecture 6.6. Let I be a monomial ideal of k[x1 , . . . , xn ]. If I is an almost complete intersection of finite colength its Rees algebra R[IT] is almost Cohen–Macaulay. For d = 2 this comes from [57]. An important special case was settled in [6, Theorem 2.5]: Theorem 6.7. If ai = a and bi = b for all i, then R[IT] is almost Cohen-Macaulay. We will recall the artesanal method of [39] and examine in detail the case a = b = c = n ≥ 3 and α = β = γ = 1. We want to argue that R[IT] is almost Cohen–Macaulay. To benefit from the monomial generators in using Macaulay2 we set I = (xyz, xn , y n , z n ). Setting B = R[u, T1 , T2 , T3 ], we claim that L = (z n−1 u−xyT3 , y n−1 u−xzT2 , xn−1 u−yzT1 , z n T2 −y n T3 , z n T1 −xn T3 , y n T1 −xn T2 , y n−2 z n−2 u2 −x2 T2 T3 , xn−2 z n−2 u2 −y 2 T1 T3 , xn−2 y n−2 u2 −z 2 T1 T2 , xn−3 y n−3 z n−3 u3 −T1 T2 T3 ). We also want to show that these ideals define an almost Cohen–Macaulay Rees algebra. There is a natural specialization argument. Let X, Y and Z be new indeterminates and let B0 = B[X, Y, Z]. In this ring define the ideal L0 obtained by replacing in the list above of generators of L, xn−3 by X and accordingly xn−2 by xX, and so on; carry out similar actions on the other variables: L0 = (z 2 Zu−xyT3 , y 2 Y u−xzT2 , x2 Xu−yzT1 , z 3 ZT2 −y 3 Y T3 , z 3 ZT1 −x3 XT3 , y 3 Y T1 −x3 XT2 , yzY Zu2 − x2 T2 T3 , xzXZu2 − y 2 T1 T3 , xyXY u2 − z 2 T1 T2 , XY Zu3 − T1 T2 T3 ). Invoking Macaulay2 gives a (non-minimal) projective resolution φ4 φ3 φ2 φ1 10 22 0 → B40 −→ B17 0 −→ B0 −→ B0 −→ B0 −→ B0 /L0 → 0. We claim that the specialization X → xn−3 , Y → y n−3 , Z → z n−3 gives a projective resolution of L. (1) Call L′ the result of the specialization in B. We argue that L′ = L. (2) Inspection of the Fitting ideal F of φ4 shows that it contains (x3 , y 3 , z 3 , u3 , T1 T2 T3 ). From standard theory, the radicals of the Fitting ideals of φ2 and φ2 contain L0 , and therefore the radicals of the Fitting ideals of these mappings after specialization will contain the ideal (L1 ) of B, as L1 ⊂ L′ . 28 WOLMER V VASCONCELOS (3) Because (L1 ) has codimension 3, by the acyclicity theorem ([4, 1.4.13]) the complex gives a projective resolution of L′ . Furthermore, as proj. dim B/L′ ≤ 4, L′ has no associated primes of codimension ≥ 5. Meanwhile the Fitting ideal of φ4 having codimension ≥ 5, forbids the existence of associated primes of codimension 4. Thus L′ is unmixed. (4) Finally, if (L1 ) ⊂ L′ , as L′ is unmixed its associated primes are minimal primes of (L1 ), but by [39, Proposition 2.5(iii)], there are just two such, mB and L. Since L′ 6⊂ mB, L is its unique associated prime. Localizing at L gives the equality of L′ and L since L is a primary component of (L1 ). Let us sum up this discussion: Proposition 6.8. The Rees algebra of I(n, n, n, 1, 1, 1), n ≥ 3, is almost Cohen– Macaulay. Corollary 6.9. e1 (I(n, n, n, 1, 1, 1)) = 3(n + 1). Proof. Follows easily since e0 (I) = 3n2 , the colengths of the monomial ideals I and I1 (φ) directly calculated and rJ (I) = 2 so that e1 (I) = λ(I/J) + λ(I 2 /JI) = λ(I/J) + [λ(I/J) − λ(R/I1 (φ))] = (3n − 1) + 4. In particular we have s0 (I) = 4 for the multiplicity of the Sally module SQ (I). ✷ 7. Current issues We leave this as a reminder of unfinished business. • Veronese relations • Reduction mod superficial elements • j-coefficients of Sally modules • SQ (I) versus SQ (I) 8. List of definitions and notation Throughout (R, m) is a Noetherian local ring of dimension d > 0. • Multiplicative filtration of ideals: a sequence of ideals F = {Ij , j ≥ 0} such that I0 = R, Ij ⊂ Ij−1 and Ij Ik ⊂ Ij+k P • Rees algebra of a multiplicatice filtration: B = j≥0 Ij Tj = R ⊕ B+ ⊂ R[T] L • Associated graded ring of F: grF (R) = j≥0 Ij /Ij+1 • Reductions of a Rees algebra: a Rees subalgebra A = R[QT] ⊂ B such that B is finite over A • Reduction number: The reduction number of B relative to a Rees subalgebra A is X r(B/A) = inf{n | B = ABj } j≤n • Special fiber of a Rees algebra: F (B) = B ⊗R R/m • Sally module: The Sally module SB/A of B relative to the Rees subalgebra A = R[QT] is the A-module is defined by the exact sequence of finitely generated A–modules 29 THE SALLY MODULES OF IDEALS: A SURVEY 0 → I1 A −→ B+ [+1] = M Ij tj−1 −→ SB/A = j≥1 M Ij+1 /I1 Qj → 0 j≥1 • Special fiber of a Sally module: F (SA (B)) = SA (B)⊗A A/(QT) = r = r(B/A) Lr−1 j=1 Ij+1 /I1 Q References [1] S. Abhyankar, Local rings of high embedding dimension, American J. Math. 89 (1967), 1073–1079. [2] R. Achilles and M. Manaresi, Multiplicity for ideals of maximal analytic spread and intersection theory, J. Math. Kyoto Univ. 33 (1993), 1029-1046. [3] J. Backelin and R. Fröberg, Koszul algebras, Veronese subrings and rings with linear resolutions, Rev. Roumaine Math. Pure Appl. 30 (1985), 85–97. [4] W. Bruns and J. Herzog, Cohen–Macaulay Rings, Cambridge University Press, 1993. [5] W. Bruns and G. Restuccia, Canonical modules of Rees algebras, J. Pure & Applied Algebra 201 (2008), 189–203. [6] R. Burity, A. Simis and S. O. Tohaneanu, On a conjecture of Vasconcelos via Sylvester forms, J. Symbolic Computation, to appear. [7] A. Corso, Sally modules of m-primary ideals in local rings, Comm. Algebra 37 (2009), 4503–4515. [8] A. Corso, C. Huneke and W. V. Vasconcelos, On the integral closure of ideals, Manuscripta Math. 95 (1998), 331–347. [9] A. Corso and C. Polini, Links of prime ideals and their Rees algebras, J. Algebra 178 (1995), 224–238. [10] A. Corso, C. Polini and M. E. Rossi, Bounds on the normal Hilbert coefficients, Preprint, 2014, arXiv:1410.4233v1 [math.AC]. [11] A. Corso, C. Polini and W. V. Vasconcelos, Links of prime ideals, Math. Proc. Camb. Phil. Soc. 115 (1994), 431–436. [12] A. Corso, C. Polini and W. V. Vasconcelos, Multiplicity of the special fiber of blowups, Math. Proc. Camb. Phil. Soc. 140 (2006), 207–219. [13] A. Corso, C. Polini and M. Vaz Pinto, Sally modules and associated graded rings, Comm. Algebra 26 (1998), 2689–2708. [14] T. Cortadellas and C. D’Andrea, Rational plane curves parametrizable by conics, arXiv:1104.2782 [math.AG]. [15] D. Cox, J. W. Hoffman and H. Wang, Syzygies and the Rees algebra, J. Pure & Applied Algebra 212 (2008) 1787–1796. [16] A. V. Doria, H. Hassanzadeh and A. Simis, A characteristic free criterion of birationality, Advances in Math. 230 (2012), 390–413. [17] P. Eakin and A. Sathaye, Prestable ideals, J. Algebra 41 (1976), 439–454. [18] D. Eisenbud, Commutative Algebra with a view toward Algebraic Geometry, Springer, 1995. [19] C. Escobar, J. Martı́nez-Bernal and R. H. Villarreal, Relative volumes and minors in monomial subrings, Linear Algebra Appl. 374 (2003), 275–290. [20] H. Flenner, L. O’Carroll and W. Vogel, Joins and Intersections, Springer Monographs in Mathematics, New York, 1999. [21] L. Ghezzi, S. Goto, J. Hong, K. Ozeki, T.T. Phuong and W. V. Vasconcelos, Cohen–Macaulayness versus the vanishing of the first Hilbert coefficient of parameter ideals, J. London Math. Soc. 81 (2010), 679–695. [22] L. Ghezzi, S. Goto, J. Hong and W. V. Vasconcelos, Variation of Hilbert coefficients, Proc. Amer. Math. Soc. 141 (2013), 3037–3048. [23] L. Ghezzi, S. Goto, J. Hong and W. V. Vasconcelos, Sally modules and the reduction numbers of ideals, Nagoya Math. J., to appear. [24] L. Ghezzi, J. Hong and W. V. Vasconcelos, The signature of the Chern coefficients of local rings, Math. Research Letters 16 (2009), 279–289. [25] S. Goto, J. Hong and M. Mandal, The positivity of the first coefficients of normal Hilbert polynomials, Proc. Amer. Math. Soc. 139 (2011), 2399–2406. j, 30 WOLMER V VASCONCELOS [26] S. Goto, J. Hong and W. V. Vasconcelos, Hilbert polynomials of j-transforms, Math. Proc. Cambridge Math. Soc., to appear. [27] S. Goto, K. Nishida and K. Ozeki, Sally modules of rank one, Michigan Math. J. 57 (2008), 359–381. [28] S. Goto, K. Nishida and K. Ozeki, The structure of Sally modules of rank one, Math. Research Letters 15 (2008), 881–892. [29] S. Goto and K. Ozeki, The structure of Sally modules – towards a theory of non-Cohen-Macaulay cases, J. Algebra 324 (2010), 2129–2165. [30] S. Goto and K. Ozeki, Buchsbaumness in local rings possessing constant first Hilbert coefficients of parameters, Nagoya Math. J. 199 (2010), 95–105. [31] S. Goto and Y. Shimoda, Rees algebras of Cohen–Macaulay local rings, in Commutative Algebra, Lect. Notes in Pure and Applied Math. 68, Marcel Dekker, New York, 1982, 201–231. [32] D. Grayson and M. Stillman, Macaulay 2, a software system for research in algebraic geometry, 2006. Available at http://www.math.uiuc.edu/Macaulay2/. [33] J. Herzog, A. Simis and W. V. Vasconcelos, Approximation complexes of blowing-up rings, J. Algebra 74 (1982), 466–493. [34] J. Herzog, A. Simis and W. V. Vasconcelos, Approximation complexes of blowing-up rings.II, J. Algebra 82 (1983), 53–83. [35] J. Herzog, A. Simis and W. V. Vasconcelos, Koszul homology and blowing-up rings, in Commutative Algebra, Proceedings: Trento 1981 (S. Greco and G. Valla, Eds.), Lecture Notes in Pure and Applied Mathematics 84, Marcel Dekker, New York, 1983, 79–169. [36] J. Herzog, N. V. Trung and B. Ulrich, On the multiplicity of blow-up rings of ideals generated by d–sequences, J. Pure & Applied Algebra 80 (1992), 273–297. [37] J. Hong, A. Simis and W. V. Vasconcelos, The homology of two-dimensional elimination, J. Symbolic Computation 43 (2008), 275–292. [38] J. Hong, A. Simis and W. V. Vasconcelos, On the equations of almost complete intersections, Bull. Braz. Math. Soc. 43 (2012), 171-199. [39] J. Hong, A. Simis and W. V. Vasconcelos, Extremal Rees algebras, J. Commutative Algebra 5 (2013), 231–267. [40] J. Hong, A. Simis and W. V. Vasconcelos, Ideals generated by quadrics, J. Algebra 423 (2015), 177–189. [41] S. Huckaba, Reduction number for ideals of higher analytic spread, Math. Proc. Camb. Phil. Soc. 102 (1987), 49–57. [42] S. Huckaba, A d-dimensional extension of a lemma of Huneke’s and formulas for the Hilbert coefficients, Proc. Amer. Math. Soc. 124 (1996), 1393-1401. [43] C. Huneke, On the associated graded ring of an ideal, Illinois J. Math. 26 (1982), 121-137. [44] B. Johnston and D. Katz, On the relation type of large powers of an ideal, Mathematika 41 (1994), 209–214. [45] B. Johnson and D. Katz, Castelnuovo regularity and graded rings associated to an ideal, Proc. Amer. Math. Soc. 123 (1995), 727-734. [46] S. Morey and B. Ulrich, Rees algebras of ideals with low codimension, Proc. Amer. Math. Soc. 124 (1996), 3653–3661. [47] F. Muiños and F. Planas-Vilanova, The equations of Rees algebras of equimultiple ideals of deviation one, Proc. Amer. Math. Soc. 141 (2013), 1241–1254. [48] M. Nagata, Local Rings, Interscience, New York, 1962. [49] M. Narita, A note on the coefficients of Hilbert characteristic functions in semi-regular local rings, Proc. Cambridge Philos. Soc. 59 (1963), 269–275. [50] D. G. Northcott, A note on the coefficients of the abstract Hilbert function, J. London Math. Soc. 35 (1960), 209–214. [51] K. Ozeki and M. E. Rossi, The structure of the Sally module of integrally closed ideals, arXiv:1510.08292.v1 [math.AC]. [52] T. T. Phuong, Normal Sally modules of rank one, arXiv:1506.05210v1 [math.AC]. [53] F. Planas-Vilanova, On the module of effective relations of a standard algebra, Mathematical Proceedings Cambridge Math. Soc. 124 (1998), 215–229. THE SALLY MODULES OF IDEALS: A SURVEY 31 [54] L. J. Ratliff, Jr., Local quasi-unmixed Noetherian rings and ideals of the principal class, Pacific J. Math. 52 (1974), 185-205. [55] M. E. Rossi, Primary ideals with good associated graded ring, J. Pure & Applied Algebra 145 (2000), 75–90. [56] M. E. Rossi, A bound on the reduction number of a primary ideal, Proc. Amer. Math. Soc. 128 (2000), 1325–1332. [57] M. E. Rossi and I. Swanson, Notes on the behavior of the Ratliff-Rush filtration, Commutative Algebra (Grenoble/Lyon, 2001), 313–328, Contemp. Math., 331, Amer. Math. Soc., Providence RI, 2003. [58] M. E. Rossi and G. Valla, Cohen–Macaulay local rings of embedding dimension e + d − 3, Proc. London Math. Soc. 80 (2000), 107–126. [59] M. E. Rossi and G. Valla, On a conjecture of J. Sally, Comm. Algebra 24 (1996), 4249–4261. [60] M. E. Rossi and G. Valla, Cohen-Macaulay local rings of dimension two and an extended version of a conjecture of J. Sally, J. Pure & Applied Algebra 122 (1997) 293–311. [61] M. E. Rossi and G. Valla, Stretched m-primary ideals, Beiträge zur Algebra und Geometrie, Contributions to Algebra and Geometry 42 (2001), 103-122. [62] M. E. Rossi and G. Valla, Hilbert Functions of Filtered Modules, Lecture Notes of the Unione Matematica Italiana 9, Springer, 2010. [63] J. D. Sally, On the associated graded ring of a local Cohen–Macaulay ring, J. Math. Kyoto Univ. 17 (1977), 19–21. [64] J. D. Sally, Cohen–Macaulay local rings of maximal embedding dimension, J. Algebra 56 (1979), 168–183. [65] J. D. Sally, Good embedding dimensions for Gorenstein singularities, Math. Ann. 249 (1980), 95–106. [66] J. D. Sally, Tangent cones at Gorenstein singularities, Compositio Math. 40 (1980), 167–175. [67] J. D. Sally, Numbers of Generators of Ideals in Local Rings, Lecture Notes in Pure and Applied Mathematics 36, Marcel Dekker, New York, 1978. [68] A. Simis, Cremona transformations and some related algebras, J. Algebra 280 (2004), 162–179. [69] J. Stückrad and W. Vogel, Buchsbaum Rings and Applications, VEB Deutscher Verlag der Wissenschaften, Berlin, 1986. [70] N. V. Trung, Reduction exponent and degree bound for the defining equations of graded rings, Proc. Amer. Math. Soc. 101 (1987), 222–236. [71] N. V. Trung, The Castelnuovo regularity of the Rees algebra and associated graded ring, Trans. Amer. Math. Soc. 350 (1998), 2813–2832. [72] W. V. Vasconcelos, The equations of Rees algebras, J. reine angew. Math. 418 (1991), 189–218. [73] W. V. Vasconcelos, Hilbert functions, analytic spread and Koszul homology, A. M. S. Contemporary Mathematics 159 (1994), 401–422. [74] W. V. Vasconcelos, The reduction number of an algebra, Compositio Math. 104 (1996), 189–197. [75] W. V. Vasconcelos, Arithmetic of Blowup Algebras, London Math. Soc., Lecture Note Series 195, Cambridge University Press, 1994. [76] W. V. Vasconcelos, Integral Closure, Springer Monographs in Mathematics, New York, 2005. [77] W. V. Vasconcelos, The Chern coefficients of local rings, Michigan Math. J. 57 (2008), 725–744. [78] M. Vaz Pinto, Hilbert functions and Sally modules, J. Algebra 192 (1996), 504–523. [79] H.-J. Wang, On Cohen–Macaulay local rings with embedding dimension e + d − 2, J. Algebra 190 (1997), 226-240.
0math.AC
On Coordinate Minimization of Convex Piecewise-Affine Functions Tomáš Werner Dept. of Cybernetics, Faculty of Electrical Engineering, Czech Technical Univ. in Prague Research Report CTU–CMP–2017–05 arXiv:1709.04989v1 [math.OC] 14 Sep 2017 September 14, 2017 Abstract A popular class of algorithms to optimize the dual LP relaxation of the discrete energy minimization problem (a.k.a. MAP inference in graphical models or valued constraint satisfaction) are convergent message-passing algorithms, such as max-sum diffusion, TRW-S, MPLP and SRMP. These algorithms are successful in practice, despite the fact that they are a version of coordinate minimization applied to a convex piecewise-affine function, which is not guaranteed to converge to a global minimizer. These algorithms converge only to a local minimizer, characterized by local consistency known from constraint programming. We generalize max-sum diffusion to a version of coordinate minimization applicable to an arbitrary convex piecewise-affine function, which converges to a local consistency condition. This condition can be seen as the sign relaxation of the global optimality condition. 1 Introduction Coordinate minimization is an iterative method for unconstrained optimization, which in every iteration minimizes the objective function over a single variable while keeping the remaining variables fixed. For some functions, this simple method converges to a global minimum. This class includes differentiable convex functions [1, §2.7] and convex functions whose non-differentiable part is separable [25]. For general non-differentiable convex functions, the method need not converge to a global minimum. For large-scale non-differentiable convex optimization, coordinate minimization may be an acceptable option despite its inability to find a global minimum. An example is dual LP relaxations of some NPhard combinatorial optimization problems, such as discrete energy minimization [24, 8] (also known as MAP inference in graphical models [27] or valued constraint satisfaction [17, 26]) and also some other problems [23]. This dual LP relaxation leads to the unconstrained minimization of a convex piecewiseaffine function. A number of algorithms for solving this dual LP relaxation have been proposed. One class of algorithms, sometimes referred to as convergent message passing [27, 5, 6, 16], consists of various forms of (block-)coordinate minimization applied to various forms of the dual. Examples are max-sum diffusion [13, 20, 28, 29], TRW-S [9], MPLP [5, 22], and SRMP [10]. Besides these, several large-scale convex optimization methods converging to a global minimum have been applied to the problem, such as subgradient methods [21, 11], bundle methods [18], alternating direction method of multipliers [15], and adaptive diminishing smoothing [19]. For practical problems from computer vision, it was observed [8] that convergent message-passing methods converge faster than these global methods and their fixed points are often not far from global minima, especially for sparse instances. We ask whether convergent message-passing algorithms can be reformulated to become applicable to a wider class of non-differentiable convex functions than those arising from the above dual LP relaxations. In other words, whether these algorithms can be studied independently of any combinatorial optimization problems. In this paper, we make a step in this direction and generalize max-sum diffusion to an algorithm applicable to an arbitrary convex piecewise-affine function. Consider an objective function in the form of a pointwise maximum of affine functions. In this case, univariate minimizers in each iteration of coordinate minimization need not be unique and therefore some rule must be designed to choose a unique minimizer. We show that for a certain natural deterministic rule, fixed points of coordinate minimization can be poor. Imitating max-sum diffusion, we propose a better rule which we call the unique rule: in each iteration, minimize the maximum of only those 1 affine functions that depend on the current variable. With this rule, univariate minimizers are unique and fixed points of the algorithm satisfy a natural condition, the sign relaxation of the true optimality condition. This can be seen as a local consistency as used in constraint programming [2], which is known to characterize fixed points of many algorithms to solve the dual LP relaxation, namely message-passing algorithms [28, 29, 9, 10] and the algorithm [12, 3]. Little is known theoretically about convergence properties of message-passing algorithms. Although max-sum diffusion and TRW-S were always observed to converge to a fixed point, this was never proved. For finite-valued energy terms, it has been proved that every accumulation point of TRW-S and SRMP satisfy local consistency [9, 10]. Under the same assumption, a stronger result has been proved for max-sum diffusion [20]: a quantity that measures how much the local consistency condition is violated converges to zero (note, this is still a weaker result that convergence to a fixed point). Nothing is known theoretically about convergence rates of max-sum diffusion, TRW-S, MPLP and SRMP. We revisit the proof from [20] to show that, under a certain assumption, during coordinate minimization with the unique rule the above quantity converges to zero. In contrast to max-sum diffusion, we show there are objective functions for which the algorithm has no fixed point or even no point satisfying sign consistency. 2 Minimizing a Pointwise Maximum of Affine Functions Consider a function f : Rn → R that is a pointwise maximum of affine functions, i.e., f (x) = max(aTi x + bi ) i∈[m] (1) where a1 , . . . , am ∈ Rn and b1 , . . . , bm ∈ R, and we denote [m] = {1, . . . , m}. For brevity, we will further on abuse symbols ‘max’ and ‘argmax’ and denote, for y ∈ Rm , max y = max yi , (2a) i∈[m] argmax y = argmax yi = { i ∈ [m] | yi = max y }. (2b) i∈[m] Now function (1) can be written simply as f (x) = max(Ax + b), (3) where matrix A = (aij ) ∈ Rm×n has rows aT1 , . . . , aTm and b = (b1 , . . . , bm ) ∈ Rm . The well-known condition for a global minimum of a convex function f : Rn → R is that 0 ∈ ∂f (x). For function (1), the subdifferential reads ∂f (x) = conv{ ai | i ∈ argmax(Ax + b) }. (4) In more detail, the following holds: Proposition 1. For function f given by (1) it holds: • f is bounded from below iff 0 ∈ conv{a1 , . . . , am }. • x is a minimizer of f iff 0 ∈ conv{ ai | i ∈ argmax(Ax + b) }. • If f is bounded from below, it has a minimizer x such that 0 ∈ rint conv{ ai | i ∈ argmax(Ax + b) }. Proof. The minimization of function (1) can be written as the linear program min{ z | Ax + b ≤ z, x ∈ Rn , z ∈ R }. (5) The dual to this linear program reads max{ bT λ | λ ∈ Rm , λ ≥ 0, 1T λ = 1, AT λ = 0 }. (6) The primal (5) is always feasible. By strong duality, f is bounded from below iff the dual (6) is feasible. By complementary slackness, x and λ are both optimal iff λi = 0 for every i ∈ / argmax(Ax + b). If f is 2 bounded from below, by strict complementary slackness there exist optimal x and λ such that λi > 0 iff P i ∈ argmax(Ax + b). Note that AT λ = i∈[m] λi ai . Note that, for any k ∈ N and a1 , . . . , ak ∈ Rn , 0 ∈ conv{a1 , . . . , ak } 0 ∈ rint conv{a1 , . . . , ak } ⇐⇒ ⇐⇒ ∃λ ∈ Rk : λi ≥ 0, k ∃λ ∈ R : λi > 0, P P i λi = 1, i λi = 1, P P i λi ai = 0, (7a) i λi ai = 0. (7b) All three claims are now obvious. Proposition 2. A non-empty set { Ax | x ∈ Rn , Ax ≤ b } is bounded iff 0 ∈ rint conv{a1 , . . . , am }. Proof. As the set is non-empty, it is bounded iff the linear program min{ cT Ax | x ∈ Rn , Ax ≤ b } is bounded for every c ∈ Rm . This holds iff the dual linear program max{ −bT λ | AT (λ + c) = 0, λ ≥ 0 } is feasible for every c ∈ Rm . We show that ∀c ∈ Rm ∃λ ≥ 0: AT (λ + c) = 0 ⇐⇒ ∃λ′ > 0: AT λ′ = 0. (8) • To prove ⇒, take c = 1 and let λ ≥ 0 be such that AT (λ + c) = 0. Then set λ′ = λ + c = λ + 1. • To prove ⇐, set λ = αλ′ − c where α > 0 is arbitrary such that λ ≥ 0. Such α clearly exists. Note that λ′ can be multiplied by a positive scale to satisfy 1T λ′ = 1. By (7b), the right-hand statement in (8) is thus equivalent to 0 ∈ rint conv{a1 , . . . , am }. 3 Sign Relaxation of the Optimality Condition We said that deciding if x ∈ Rn is a minimizer of function (1) requires deciding if the convex hull of a finite set of vectors contains the origin. Deciding this condition for large problems may be infeasible. We define the sign relaxation of this condition which is cheaper to decide, obtained by considering only the signs of the vectors’ components and dropping their magnitudes. To describe the key idea, suppose that the convex hull of some vectors a1 , . . . , am ∈ Rn contains the origin, 0 ∈ conv{a1 , . . . , am }. That is, there are numbers λ1 , . . . , λm ≥ 0 such that X λi = 1, (9a) i∈[m] X λi aij = 0, j ∈ [n]. (9b) i∈[m] Let us relax these conditions, considering only the signs σi = sgn λi ∈ {0, 1} and sij = sgn aij ∈ {−1, 0, 1}. Equality (9a) implies that at least one of the numbers σ1 , . . . , σm equals 1. For each j ∈ [n], equality (9b) implies that the numbers σ1 s1j , . . . , σm smj either are all zero, or some are positive and some negative. One way to write this is as follows: ∃i ∈ [m]: σi = 1, ′ (∃i ∈ [m]: σi sij = −1) ⇔ (∃i ∈ [m]: σi′ si′ j = 1), (10a) j ∈ [n]. (10b) Thus, it is necessary for 0 ∈ conv{a1 , . . . , am } that there exist some σ1 , . . . , σm ∈ {0, 1} satisfying (10). This can be seen as a constraint satisfaction problem (CSP) [14, 4] with m binary variables and n + 1 constraints. This particular CSP class can be solved by enforcing (generalized) arc consistency [2]. Suppose that for some j, the signs s1j , . . . , smj are, say, all non-negative and some of them is positive. Then constraint (10b) enforces that for all i for which sij 6= 0 we have σi = 0. Repeating this for various coordinates j progressively sets some σi to zero. If finally σi = 0 for all i ∈ [n], constraint (10) is violated and the CSP has no solution. Otherwise, the CSP has a solution. 3 Since we believe that the described concept of sign relaxation might have a wider applicability in nondifferential convex optimization, we further develop it in more detail and greater generality than is needed in this paper. Namely, we consider the sign relaxation of the condition 0 ∈ conv X for any (not necessarily finite) set X ⊆ Rn . This is straightforward because the sign relaxation of this condition depends only on the set { sgn a | a ∈ X } ⊆ {−1, 0, 1}n which is finite. Here, for a vector a = (a1 , . . . , an ) ∈ Rn , we denoted sgn a = (sgn a1 , . . . , sgn an ) ∈ {−1, 0, 1}n . Theorem 3. Let X ⊆ Rn and a ∈ conv X. Then a ∈ rint conv(X ∩ F ) where F is the intersection of all faces of conv X that contain1 a. Proof. It can be shown that for any face F of conv X it holds that2 conv(X ∩ F ) = F . So it suffices to show that a ∈ rint F . For contradiction, suppose a is a relative boundary point of F . But every relative boundary point of a face is contained in some subface of the face, so F cannot be the intersection of all faces of conv X containing a. Definition 1. A set S ⊆ {−1, 0, 1}n is consistent in coordinate j ∈ [n] if it holds that ∃s ∈ S: sj = −1 ⇐⇒ ∃t ∈ S: tj = 1. (11) Set S is consistent if it is consistent in every coordinate j ∈ [n]. In particular, note that the sets ∅ and {0} (where 0 denotes the vector with n zeros) are consistent. Theorem 4. Let X ⊆ Rn . If 0 ∈ rint conv X, then the set { sgn a | a ∈ X } is consistent. Proof. Let 0 ∈ rint conv X. Then the projection of the set rint conv X onto each coordinate axis is either the set {0} or an interval containing zero as its interior point. Noting that projections commute with the convex hull operator, this means for every j ∈ [n] we have that ∃a ∈ X: aj < 0 ⇐⇒ ∃b ∈ X: bj > 0. (12) This is equivalent to condition (11) for the set { sgn a | a ∈ X }. Theorem 5. Let X ⊆ Rn . If 0 ∈ conv X, then the set { sgn a | a ∈ X } has a non-empty consistent subset. Proof. If 0 ∈ conv X, then by Theorem 3 there is Y ⊆ X such that 0 ∈ rint conv Y . Thus, by Theorem 4, the set { sgn a | a ∈ Y } is consistent. This set is non-empty and it is a subset of { sgn a | a ∈ X }. Theorem 5 gives a necessary condition for a set X ⊆ Rn to satisfy 0 ∈ conv X. This is what we called the sign relaxation of 0 ∈ conv X. This condition is of course not sufficient, e.g., for X = {(1, −2), (−2, 1)} the set { sgn a | a ∈ X } = {(1, −1), (−1, 1)} is consistent but 0 ∈ / conv X. Next we develop the concept of consistency closure, analogous to arc consistency closure [2]. Theorem 6. Let the sets S, T ⊆ {−1, 0, 1}n be consistent. Then the set S ∪ T is consistent. Proof. Let s ∈ S ∪ T , so s ∈ S or s ∈ T . Suppose s ∈ S. Suppose for some j ∈ [n] we have, say, sj < 0. As S is consistent, there is t ∈ S such that sj > 0. But t ∈ S ∪ T . Definition 2. The consistency closure of a set S ⊆ {−1, 0, 1}n is the greatest (with respect to partial ordering by inclusion) consistent subset of S, i.e., it is the union of all consistent subsets of S. We will denote it by cons S. Theorem 7. The cons operator satisfies the axioms of a closure operator, i.e., it is • intensive (cons S ⊆ S), 1 More precisely, it can be shown that Y = X ∩ F is the greatest (with respect to partial ordering by inclusion) subset of X such that a ∈ rint conv Y . 2 We omit the proof of this claim. The proof is obvious if X is finite and hence conv X is a convex polytope. For infinite X, recall [7] that a face of a convex set C is a convex set F ⊆ C such that every line segment from C whose relative interior has a non-empty intersection with F is contained in F . 4 • idempotent (cons cons S = cons S), • non-increasing (S ⊆ T =⇒ cons S ⊆ cons T ). Proof. Intensivity and idempotency are immediate from Definition 2. To show the non-increasing property, let S ⊆ T . By intensivity, we have cons S ⊆ T . But cons S is consistent, thus by Definition 2 it must be a subset of cons T . Definition 3. Enforcing consistency of a set S ⊆ {−1, 0, 1}n is the algorithm that repeats the following iteration: 1. choose an arbitrary coordinate j ∈ [n] in which S is not consistent, 2. remove from S all elements s such that sj 6= 0. If S is consistent, the algorithm stops. Theorem 8. Enforcing consistency of any set S ⊆ {−1, 0, 1}n yields cons S. Proof. The algorithm creates a sequence of sets S = S0 ⊃ S1 ⊃ · · · ⊃ SK , where SK is consistent and K is the number of iterations. This sequence is given recurrently by Sk = Sk−1 \ { s ∈ Sk−1 | sjk 6= 0 } where each jk ∈ [n] is such that Sk−1 is not consistent in coordinate jk . Let a set T ⊆ S be consistent. We show by induction that T ⊆ Sk for all k. Assume T ⊆ Sk−1 . Since Sk−1 is not consistent in coordinate jk , it follows from Definition 1 that sjk = 0 for every s ∈ T . Therefore T ⊆ Sk−1 \ { s ∈ Sk−1 | sjk 6= 0 } = Sk . We have shown that every consistent subset of S is contained in SK , which is itself consistent. This means that SK = cons S. To conclude, the sign relaxation of the condition 0 ∈ conv X is that cons{ sgn a | a ∈ X } = 6 ∅. 4 Coordinate Minimization Coordinate minimization of a function f : Rn → R is a method that, starting from an initial point x = (x1 , . . . , xn ), repeats the following iteration: 1. choose j ∈ [n], 2. choose x∗j ∈ argmin f (x), xj ∈R x∗j . 3. set xj ← Since the choices in the first two steps are not specified, this does not define a single algorithm but rather a class of algorithms (a ‘method’). Further on, we focus on applying coordinate minimization to functions of the form (1). For functions of the form (1), in Step 2 of coordinate minimization the univariate minimizer x∗j is in general not unique. Therefore, some rule must be adopted to choose a unique minimizer. Let us restrict ourselves to deterministic rules. We show that some rules can behave poorly. Consider the following rule: choose the element of the set argminxj ∈R f (x) that is nearest to xprev , the j-th variable from the j 3 previous iteration. We refer to this as the proximal rule . Example 1. Consider the function f (x1 , x2 , x3 ) = max{ x2 − x3 , x3 − x1 , x1 − x2 }, (13) which has minimum value 0, attained for any x1 = x2 = x3 . The point x = (x1 , x2 , x3 ) = (2, 1, 0) is fixed for coordinate minimization with the proximal rule, with value f (x) = max{1, −2, 1} = 1. The subdifferential at this point is ∂f (x) = conv X where X = {(0, 1, −1), (1, −1, 0)}. Using the algorithm from Definition 3 we find that cons{ sgn a | a ∈ X } = cons{(0, 1, −1), (1, −1, 0)} = ∅. Thus, point x does not satisfy the sign relaxation of the condition 0 ∈ ∂f (x). 3 This can be indeed seen as a proximal regularization of coordinate minimization: instead of function f we minimize the function g(x, y) = f (x) + µkx − yk2 for a small µ > 0. For this function, the univariate minimization would read argminxj ∈R (f (x1 , . . . , xn )+µ(xj −xprev )2 ), which has the unique minimizer given by the proximal rule. Cf. [1, Exercise 2.7.2]. j 5 Imitating max-sum diffusion, we propose a better rule, which we call the unique rule: in Step 2 of coordinate minimization, rather than minimizing the maximum of all affine functions, minimize the maximum of only those affine functions that depend on variable xj . That is, minimize the function φj (x) = max (aTi x + bi ) i|aij 6=0 (14) where maxi|aij 6=0 denotes maximization over all i ∈ [m] such that aij 6= 0. Further on, we will assume that the set { sgn ai | i ∈ [m] } is consistent. Under this assumption, for every j ∈ [n] and every x1 , . . . , xj−1 , xj+1 , . . . , xn ∈ R, the univariate function xj 7→ φj (x) has exactly one minimizer, x∗j . This minimizer is the unique solution of the equation max (aTi x + bi ) = max (aTi x + bi ). i|aij <0 i|aij >0 (15) To summarize, the iteration of the algorithm for coordinate j ∈ [n] adjusts variable xj to satisfy (15), keeping the other variables unchanged. A fixed point of the algorithm4 is a point x ∈ Rn that satisfies (15) for all j ∈ [n]. For functions in the form (1), coordinate minimization can be equivalently formulated in terms of the values y = Ax + b of the affine functions, i.e., instead of updating the numbers x1 , . . . , xn we update the numbers y1 , . . . , ym , while x1 , . . . , xn are no longer explicitly kept. We first set y = Ax + b, where x is the initial point, and then repeat the following iteration: 1. choose j ∈ [n], 2. choose x∗j ∈ argmin max(aij xj + yi ), xj ∈R i∈[m] aij x∗j 3. set yi ← + yi for all i ∈ [m]. Using the unique rule, in Step 2 we need to find the unique minimizer x∗j of the univariate function max (aij xj + yi ), which is the solution of the equation i|aij 6=0 max (aij xj + yi ) = max (aij xj + yi ). (16) max yi = max yi . (17) i|aij <0 i|aij >0 After the iteration, we thus have i|aij <0 i|aij >0 A fixed point of the algorithm is a point y ∈ { A(x + x′ ) + b | x′ ∈ Rn } that satisfies (17) for all j ∈ [n]. We introduce the following notations: • Mapping pj : Rm → Rm denotes the action of Steps 2 and 3 of coordinate minimization with the unique rule, formulated in terms of y. That is, for y ∈ Rm and j ∈ [n], pj (y) is computed as follows: find the solution x∗j of equation (16) and then set yi ← aij x∗j + yi for all i ∈ [m]. • Further on, we assume that coordinates j in Step 1 of coordinate minimization are visited in the cyclic order. Let p = pn ◦ pn−1 ◦ · · · ◦ p2 ◦ p1 denote the action of the algorithm for one cycle. • For k ∈ N, let pk = p ◦ · · · ◦ p (k-times) denote the action of the algorithm for k cycles. In this notation, y ∈ Rm is a fixed point of the algorithm iff pj (y) = y for every j ∈ [n], which holds iff p(y) = y. Next we give several examples of the algorithm’s behavior. Example 2. Recall that coordinate minimization is not guaranteed to find a global minimum of a function of the form (1) because it is not differentiable. An example is the function f (x1 , x2 ) = max{ x1 − 2x2 , x2 − 2x1 }, which is unbounded but any point x1 = x2 is fixed for coordinate minimization. At any such point we have 0∈ / ∂f (x1 , x2 ) = conv X where X = {(1, −2), (−2, 1)}. The set { sgn a | a ∈ X } = {(1, −1), (−1, 1)} is consistent. There is no difference between the proximal rule and unique rule, because univariate minimizers in Step 2 are unique. Coordinate minimization converges in one iteration. 4 Note, such a point is a Nash equilibrium for penalty functions φ1 , . . . , φn : Rn → R. 6 The unique rule is not worse than the proximal rule, in the sense that every fixed point of coordinate minimization with the unique rule is also a fixed point of coordinate minimization with the proximal rule. The following example shows that the unique rule is in fact strictly better. Example 3. Let us return to Example 1 and apply coordinate minimization with the unique rule to function (13). For j = 1, equation (16) reads −x1 + y2 = x1 + y3 with the solution x∗1 = (y2 − y3 )/2, thus y is updated as y2 ← −x∗1 + y2 = (y2 + y3 )/2 and y3 ← x∗1 + y3 = (y2 + y3 )/2. Similarly we derive the iterations for j = 2, 3. In summary, we have p1 (y1 , y2 , y3 ) = ( y1 , (y2 + y3 )/2, (y2 + y3 )/2 ), p2 (y1 , y2 , y3 ) = ( (y3 + y1 )/2, y2 , (y3 + y1 )/2 ), p3 (y1 , y2 , y3 ) = ( (y1 + y2 )/2, (y1 + y2 )/2, y3 ). We see that in every iteration, the algorithm takes a pair of the numbers y1 , y2 , y3 and replaces both of them with their average. For any initial y1 , y2 , y3 , the sequence (pk (y1 , y2 , y3 ))k∈N converges to the point with y1 = y2 = y3 = (y1 + y2 + y3 )/3, i.e., to a minimizer of function (13). The next example shows that there are functions for which coordinate minimization with the unique rule has no fixed point and even no point satisfying the sign-relaxed optimality condition. Example 4. Let f (x1 , x2 , x3 ) = max{ x1 − x2 − x3 , x1 + 4, x1 + x2 + x3 , −x1 + x2 + 2 }. (18) This function is not bounded from below. System (15), defining the fixed point condition, reads max{ x1 − x2 − x3 , x1 + 4, x1 + x2 + x3 } = −x1 + x2 + 2 max{ x1 + x2 + x3 , −x1 + x2 + 2 } = x1 − x2 − x3 x1 + x2 + x3 = x1 − x2 − x3 The third equation implies x2 + x3 = 0, thus the system simplifies to max{ x1 , x1 + 4, x1 } = −x1 + x2 + 2 max{ x1 , −x1 + x2 + 2 } = x1 The first equation simplifies to x1 + 4 = −x1 + x2 + 2, hence x2 = 2x1 + 2. Plugging this to the second equation gives a contradiction. This shows that the algorithm has no fixed point. We shall show that there is even no point x ∈ Rn such that cons{ sgn ai | i ∈ argmax(Ax + b) } = 6 ∅. For contradiction, suppose it is so. That is, there is x ∈ Rn and I ⊆ [m] such that the set { sgn ai | i ∈ I } is consistent and ∅ = 6 I ⊆ argmax(Ax + b). It can be checked that the only non-empty subset of [m] for which the set { sgn ai | i ∈ I } is consistent is I = [m]. But there is no x such that argmax(Ax + b) = [m], i.e., at which all four affine functions are active. How will the algorithm behave in this case? For the initial point (x1 , x2 , x3 ) = (0, 0, 0), the first three iterations of the algorithm are j x1 x2 x3 y 1 y 2 y 3 y 4 0 0 0 0 4 0 2 1 −1 0 0 −1 3 −1 3 2 −1 −2 0 1 3 −3 1 3 −1 −2 2 −1 3 −1 1 The resulting values of y are the initial values minus one. Every later cycle will again decrease them by one, therefore algorithm therefore will decrease y unboundedly. Example 5. Consider the function f (x1 , x2 , x3 ) = max{ x1 − x2 − x3 , x1 + 4, x1 + x2 + x3 , −x1 + x2 + 2, 0 }, (19) which differs from (18) only by the extra zero function. As shown in the previous example, the algorithm has no fixed point and the first four components of the vector y = (y1 , y2 , y3 , y4 , y5 ) will diverge. Since after a few iterations y1 , y2 , y3 , y4 become all negative but y5 remains zero, the set cons{ sgn ai | i ∈ argmax y } becomes non-empty. 7 The following theorem shows that every fixed point of coordinate minimization with the unique rule satisfies the sign relaxation of the condition 0 ∈ ∂f (x). Theorem 9. If (17) holds for every j ∈ [n], then the set { sgn ai | i ∈ argmax y } is consistent. Proof. For every j ∈ [n], (17) implies that ∃i ∈ argmax y: aij < 0 ⇐⇒ ∃i′ ∈ argmax y: ai′ j > 0. (20) Indeed, if the common value of both sides in (17) is equal to [less than] max y, both sides of (20) are true [false]. Condition (20) is equivalent to condition (11) for the set { sgn ai | i ∈ argmax y }. For an initial point y ∈ Rm , consider the sequence of vectors (pk (y))k∈N . Although we believe that, under some reasonably weak assumptions, this sequence converges to a fixed point, we are not able to prove this. Following [20], we formulate and prove a weaker result. For ǫ ≥ 0, let argmaxǫ y = { i ∈ [m] | yi + ǫ ≥ max y } (21) denote the set of ǫ-maximal components of a vector y ∈ Rm . We now define function e: Rm → R+ by e(y) = inf{ ǫ ≥ 0 | cons{ sgn ai | i ∈ argmaxǫ y } = 6 ∅ }. (22) This function measures how much point y violates the condition5 cons{ sgn ai | i ∈ argmax y } = 6 ∅, which is the sign relaxation of the condition 0 ∈ conv{ ai | i ∈ argmax y } = ∂f (x). Theorem 10. Let 0 ∈ rint conv{a1 , . . . , am }. Let y ∈ Rm . Then lim e(pk (y)) = 0. k→∞ Proof. In the appendix. 4.1 Sum of Maxima of Affine Functions We have applied coordinate minimization to pointwise maximum of affine functions (1). But what if we want to apply it to a convex piecewise-affine function in the form of a sum of pointwise maxima of affine function, i.e., X f (x) = max(aTij x + bij ), (23) j i where aij ∈ Rn and bij ∈ R. It turns out that minimizing function (23) can be easily transformed to minimizing a function (1). One way to do that is as follows. Theorem 11. For every α1 , . . . , αm ∈ R, 1 X αi = min max(αi + ui ). u1 +···+um =0 i∈[m] m (24) i∈[m] Proof. Clearly, at optimum all expressions under the maximum will have P P the same value. Let us denote this common value by b = αi + ui , so αi = b − ui . Now i αi = mb − i ui = mb. Using Theorem 11, minimizing function (23) can be transformed to minimizing the function g(x, u) = max(aTij x + bij + ui ) i,j P subject to i ui = 0. Minimization over u can be done in closed form, interlacing iterations of coordinate minimization over x. 5 In [20], ‘consistency’ means cons{ sgn ai | i ∈ argmax y } = 6 ∅, rather than consistency in the sense of our Definition 1. 8 A Proof of Theorem 10 A.1 Properties of the Algorithm Proposition 12. For every y ∈ Rm and j ∈ [n] we have max pj (y) ≤ max y. Proof. This just says that coordinate minimization never increase the objective function. For y ∈ Rm and z ∈ R, we denote I(y, z) = { i ∈ [m] | yi ≥ z }. (25) In particular, note that argmax y = I(y, max y) and argmaxǫ y = I(y, max y − ǫ). Proposition 13. Let y ∈ Rm and j ∈ [n]. • If the set { sgn ai | i ∈ I(y, max y) } is consistent in coordinate j, then I(pj (y), max y) = I(y, max y). • Otherwise, I(pj (y), max y) = I(y, max y) \ { i | aij 6= 0 }. Proof. Denote y ′ = pj (y) and α− = max yi , i|aij <0 α+ = max yi , α′ = max yi′ = max yi′ = max yi′ . i|aij >0 i|aij <0 i|aij 6=0 i|aij >0 It follows from the definition of pj that yi′ = yi for all i with aij = 0 and that α′ lies between α− and α+ . By Definition 1, the set { sgn ai | i ∈ I(y, max y) } is consistent in coordinate j iff ∃i ∈ I(y, max y): aij < 0 ⇐⇒ ∃i′ ∈ I(y, max y): ai′ j > 0. (26) Using the above observations, we see that: • If both sides of (26) are true, then α− = α+ = α′ , hence y ′ = y, hence I(y ′ , max y) = I(y, max y). • If both sides of (26) are false, then α− , α+ , α′ < max y. Hence yi , yi′ < max y for all i with aij 6= 0. Hence I(y ′ , max y) = I(y, max y). • If, say, the LHE of (26) is true and the RHS is false, then α− = max y and α+ , α′ < max y. Hence yi′ < max y for all i with aij 6= 0. Hence I(y ′ , max y) = I(y, max y) \ { i | aij 6= 0 }. Proposition 14. For every y ∈ Rm and every k ≥ m we have { sgn ai | i ∈ I(pk (y), max y) } = cons{ sgn ai | i ∈ I(y, max y) }. Proof. Proposition 13 shows that the algorithm in fact enforces consistency (see Definition 3) of the set { sgn ai | i ∈ I(pk (y), max y) }. Moreover, in every m iterations each coordinate is visited and hence the set shrinks unless it is already consistent. As the set initially has no more than m elements, after m applications of p the set stops shrinking and becomes consistent. Proposition 15. Let y ∈ Rm . (a) If cons{ sgn ai | i ∈ argmax y } = 6 ∅, then for every k ∈ N we have max pk (y) = max y. (b) If cons{ sgn ai | i ∈ argmax y } = 6 ∅, then the set { sgn ai | i ∈ argmax pm (y) } is consistent. (c) If cons{ sgn ai | i ∈ argmax y } = ∅, then max pm (y) < max y. Proof. By Proposition 12, for every k ∈ N we have max pk (y) ≤ max y. By (25) we have: • If I(pk (y), max y) 6= ∅, then max pk (y) = max y. • If I(pk (y), max y) = ∅, then max pk (y) < max y. Noting that argmax y = I(y, max y), the claims now follow from Proposition 14. 9 A.2 Continuity and Boundedness Proposition 16. Let a1 , . . . , am ∈ R be such that { sgn ai | i ∈ [m] } = {−1, 1}. Then the function ξ: Rm → R given by ξ(y) = ξ(y1 , . . . , ym ) = argmin max(ai x + yi ) (27) x∈R i∈[m] is continuous. Proof. On a neighborhood of any point y ∈ Rm , function ξ depends only on the coordinates for which the affine functions ai x + yi are active at y. Moreover, we can move the minimum to the origin without loss of generality. Therefore, to show that function (27) is continuous on Rm , it suffices to show that the function of the form (27) is continuous at the point y = 0. For any y ∈ Rm , ξ(y) is the x-coordinate of the intersection of the graphs of two affine functions ai x + yi and aj x + yj , one with negative and one with positive slope. Thus, ξ(y) = (yi − yj )/(aj − ai ) for some (i, j) such that ai < 0 and aj > 0. Therefore, kyk∞ ≤ δ =⇒ |yi − yj | 2 ≤ δ max max . a − a a − ai i|ai <0 j|aj >0 j i|ai <0 j|aj >0 j i |ξ(y)| ≤ max max This shows that function ξ is continuous at y = 0. Proposition 17. For every j ∈ [n], the map pj is continuous. Proof. Map pj is continuous because it is a composition of function ξ from Proposition 16 and the affine map yi 7→ aij xj + yi (as given by Step 3 of coordinate minimization). Proposition 18. Let 0 ∈ rint conv{a1 , . . . , am }. Let y ∈ Rn . Then the sequence (pk (y))k∈N is bounded. Proof. By Proposition 12, for every k we have pk (y) ≤ max y. The claim now follows from Proposition 2. Proposition 19. Let y, y ′ ∈ Rm , ǫ ≥ 0, δ ≥ 0, and ky − y ′ k∞ ≤ δ. Then argmaxǫ y ⊆ argmaxǫ+2δ y ′ . Proof. Let ky − y ′ k∞ ≤ δ, i.e., −δ ≤ yi − yi′ ≤ δ for every i. This implies −δ ≤ max y − max y ′ ≤ δ. By these inequalities, for every i we have the implication max y − yi ≤ ǫ =⇒ max y ′ − yi′ ≤ ǫ + 2δ. (28) By (21), this means that argmaxǫ y ⊆ argmaxǫ+2δ y ′ . Proposition 20. The function e is continuous. Proof. Let ky − y ′ k∞ ≤ δ. By (22), the set { sgn ai | i ∈ argmaxe(y) y } has a non-empty consistent subset. By Proposition 19, the set { sgn ai | i ∈ argmaxe(y)+2δ y ′ } has the same consistent subset, therefore e(y ′ ) ≤ e(y) + 2δ. Similarly we prove that e(y) ≤ e(y ′ ) + 2δ. Thus |e(y) − e(y ′ )| ≤ 2δ. Proposition 21. Let cons{sgn ai | i ∈ [m]} = 6 ∅. Then for every y ∈ Rn we have e(y) ≤ max y − min y. Proof. Let ǫ = max y −min y. Then clearly argmaxǫ y = [m], hence cons{ sgn ai | i ∈ argmaxǫ y } = 6 ∅. A.3 Convergence Using the preparations from §A.1 and §A.2, we now prove the main convergence result. We will do it by reformulating [20, Theorem 1]. Let q = pm denote m cycles of coordinate minimization. In this section, yk will denote a vector from Rm , rather than the k-th component of a vector y ∈ Rm . Sequences such as (yk )k∈N will be denoted in short as (yk ). Recall that an accumulation point of a sequence is the limit point of its convergent subsequence. Theorem 22. Let q: Rm → Rm be continuous. Let y ∈ Rm . Let the sequence (max q k (y)) be convergent. Then every accumulation point y ∗ of the sequence (q k (y)) satisfies max q(y ∗ ) = max y ∗ . 10 Proof. For brevity, denote yk = q k (y). Let y ∗ be an accumulation point of (yk ), thus lim yk(l) = y ∗ l→∞ (29) for some strictly increasing function k: N → N. Applying the continuous map q to equality (29) yields lim q(yk(l) ) = lim yk(l)+1 = q(y ∗ ), l→∞ l→∞ (30) where we used that q(yk(l) ) = yk(l)+1 . Now max y ∗ = lim max yk(l) = lim max yk = lim max yk(l)+1 = max q(y ∗ ). l→∞ k→∞ l→∞ (31) The first and last equality follow from applying the continuous function max : Rm → R (defined by (2a)) to equalities (29) and (30). The second and third equality hold because the sequence (max yk ) is convergent and thus every its subsequence converges to the same number. The following fact is well-known from analysis: Proposition 23. Let (ak ) be a bounded sequence. If every convergent subsequence of (ak ) converges to a point a, then the sequence (ak ) converges to a. Proof. Suppose (ak ) does not converge to a. Then for some ǫ > 0, for every k0 there is k > k0 such that kak − ak > ǫ. So there is a subsequence (bk ) such that kbk − ak > ǫ for all k. As (bk ) is bounded, by Bolzano-Weierstrass it has a convergent subsequence, (ck ). But (ck ) clearly cannot converge to a, a contradiction. Theorem 24. Let q: Rm → Rm and e: Rm → R be continuous such that, for every y ∈ Rm : 1. max q(y) ≤ max y, 2. max q(y) = max y implies e(y) = 0, 3. the sequences (q k (y)), (max q k (y)) and (e(q k (y))) are bounded. Then for every y ∈ Rm we have lim e(q k (y)) = 0. k→∞ Proof. Denote yk = q k (y). The sequence (max yk ) is bounded and non-increasing, therefore convergent. By Theorem 22, every accumulation point y ∗ of (yk ) satisfies max q(y ∗ ) = max y ∗ . This implies e(y ∗ ) = 0. By Proposition 23, now it suffices to show that every convergent subsequence of the sequence (e(yk )) converges to 0. So let (zk ) be a subsequence of (yk ) such that limk→∞ e(zk ) = e∗ . • If (zk ) is convergent, then y ∗ = limk→∞ zk is an accumulation point of (yk ), therefore e(y ∗ ) = 0. Applying the continuous function e to this limit yields e(y ∗ ) = limk→∞ e(zk ) = e∗ = 0. • If (zk ) is not convergent, by Bolzano-Weierstrass it has a convergent subsequence, (wk ). As (wk ) is also a subsequence of (yk ), by the above reasoning we have limk→∞ e(wk ) = 0. But because limk→∞ e(zk ) = e∗ , every subsequence of (e(zk )) converges to e∗ . As (wk ) is a subsequence of (zk ), this implies e∗ = 0. Theorem 24 implies Theorem 10. Indeed, map q is continuous because it is a composition of maps pj which are continuous by Proposition 17. Function e is continuous by Proposition 20. Condition 1 holds by Proposition 12 and Condition 2 by Proposition 15(c). The sequences (q k (y)) and (max q k (y)) are bounded by Proposition 18. The sequence (e(q k (y))) is bounded by Proposition 21. We remark that Theorem 24 has a wider applicability, to prove convergence to local consistency for several other message-passing algorithms. For that, the functions max, q and e need to be replaced by appropriate functions in these algorithms and they must satisfy the assumptions of he theorem. Acknowledgement This work has been supported by the Czech Science Foundation grant 16-05872S. 11 References [1] D. P. Bertsekas. Nonlinear Programming. Athena Scientific, Belmont, MA, 2nd edition, 1999. [2] C. Bessiere. Constraint propagation. In Handbook of Constraint Programming, chapter 3. Elsevier, 2006. [3] M. C. Cooper, S. de Givry, M. Sanchez, T. Schiex, M. Zytnicki, and T. Werner. Soft arc consistency revisited. Artificial Intelligence, 174(7-8):449–478, 2010. [4] E. Freuder and A. K. Mackworth. Constraint satisfaction: An emerging paradigm. In Handbook of Constraint Programming, chapter 2. Elsevier, 2006. [5] A. Globerson and T. Jaakkola. Fixing max-product: Convergent message passing algorithms for MAP LP-relaxations. In Neural Information Processing Systems, pages 553–560, 2008. [6] T. Hazan and A. Shashua. Convergent message-passing algorithms for inference over general graphs with convex free energies. In Conf. on Uncertainty in Artificial Intelligence, pages 264–273, 2008. [7] J. Hiriart-Urruty and C. Lemaréchal. Fundamentals of Convex Analysis. Grundlehren Text Editions. Springer, 2004. [8] J. H. Kappes, B. Andres, F. A. Hamprecht, C. Schnörr, S. Nowozin, D. Batra, S. Kim, B. X. Kausler, T. Kröger, J. Lellmann, N. Komodakis, B. Savchynskyy, and C. Rother. A comparative study of modern inference techniques for structured discrete energy minimization problems. Intl. J. of Computer Vision, 115(2):155–184, 2015. [9] V. Kolmogorov. Convergent tree-reweighted message passing for energy minimization. IEEE Trans. Pattern Analysis and Machine Intelligence, 28(10):1568–1583, 2006. [10] V. Kolmogorov. A new look at reweighted message passing. IEEE Trans. on Pattern Analysis and Machine Intelligence, 37(5), May 2015. [11] N. Komodakis, N. Paragios, and G. Tziritas. MRF energy minimization and beyond via dual decomposition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(3):531–552, 2011. [12] V. K. Koval and M. I. Schlesinger. Dvumernoe programmirovanie v zadachakh analiza izobrazheniy (Two-dimensional programming in image analysis problems). Automatics and Telemechanics, 8:149– 168, 1976. In Russian. [13] V. A. Kovalevsky and V. K. Koval. A diffusion algorithm for decreasing the energy of the max-sum labeling problem. Glushkov Institute of Cybernetics, Kiev, USSR. Unpublished, approx. 1975. [14] A. Mackworth. Constraint satisfaction. In Encyclopaedia of Artificial Intelligence, pages 285–292. Wiley, 1991. [15] A. L. Martins, M. A. T. Figueiredo, P. M. Q. Aguiar, N. A. Smith, and E. P. Xing. An augmented Lagrangian approach to constrained MAP inference. In Intl. Conf. on Machine Learning, pages 169–176, 2011. [16] T. Meltzer, A. Globerson, and Y. Weiss. Convergent message passing algorithms: a unifying view. In Conf. on Uncertainty in Artificial Intelligence, pages 393–401, 2009. [17] P. Meseguer, F. Rossi, and T. Schiex. Soft constraints. In Handbook of Constraint Programming, chapter 9. Elsevier, 2006. [18] B. Savchynskyy. A bundle approach to efficient MAP-inference by Lagrangian relaxation. In IEEE Conf. on Computer Vision and Pattern Recognition, pages 1688–1695, 2012. 12 [19] B. Savchynskyy, S. Schmidt, J. H. Kappes, and C. Schn orr. Efficient MRF energy minimization via adaptive diminishing smoothing. In Conf. on Uncertainty in Artificial Intelligence, pages 746–755, 2012. [20] M. I. Schlesinger and K. Antoniuk. Diffusion algorithms and structural recognition optimization problems. Cybernetics and Systems Analysis, 47:175–192, 2011. [21] M. I. Schlesinger and V. V. Giginjak. Solving (max,+) problems of structural pattern recognition using equivalent transformations. Upravlyayushchie Sistemy i Mashiny (Control Systems and Machines), Kiev, Naukova Dumka, 1 and 2, 2007. In Russian, English translation available on www. [22] D. Sontag, D. K. Choe, and Y. Li. Efficiently searching for frustrated cycles in MAP inference. In Conf. on Uncertainty in Artificial Intelligence, pages 795–804, Corvallis, Oregon, 2012. [23] P. Swoboda, J. Kuske, and B. Savchynskyy. A dual ascent framework for lagrangean decomposition of combinatorial problems. In The IEEE Conference on Computer Vision and Pattern Recognition, July 2017. [24] R. Szeliski, R. Zabih, D. Scharstein, O. Veksler, V. Kolmogorov, A. Agarwal, M. Tappen, and C. Rother. A comparative study of energy minimization methods for Markov random fields. In Eur. Conf. on Computer Vision, pages II: 16–29, 2006. [25] P. Tseng. Convergence of a block coordinate descent method for nondifferentiable minimization. J. Optim. Theory Appl., 109(3):475–494, June 2001. [26] S. Živný. The Complexity of Valued Constraint Satisfaction Problems. Cognitive Technologies. Springer, 2012. [27] M. J. Wainwright and M. I. Jordan. Graphical models, exponential families, and variational inference. Foundations and Trends in Machine Learning, 1(1-2):1–305, 2008. [28] T. Werner. A linear programming approach to max-sum problem: A review. IEEE Trans. Pattern Analysis and Machine Intelligence, 29(7):1165–1179, July 2007. [29] T. Werner. Revisiting the linear programming relaxation approach to Gibbs energy minimization and weighted constraint satisfaction. IEEE Trans. Pattern Analysis and Machine Intelligence, 32(8):1474–1488, August 2010. 13
1cs.CV
Local Linearizability∗ Andreas Haas1 , Thomas A. Henzinger2 , Andreas Holzer3 , Christoph M. Kirsch4 , Michael Lippautz1 , Hannes Payer1 , Ali Sezgin5 , Ana Sokolova4 , and Helmut Veith6,7 arXiv:1502.07118v4 [cs.PL] 24 Jun 2016 1 2 3 4 5 6 7 Google Inc. IST Austria, Austria University of Toronto, Canada University of Salzburg, Austria University of Cambridge, UK Vienna University of Technology, Austria Forever in our hearts Abstract The semantics of concurrent data structures is usually given by a sequential specification and a consistency condition. Linearizability is the most popular consistency condition due to its simplicity and general applicability. Nevertheless, for applications that do not require all guarantees offered by linearizability, recent research has focused on improving performance and scalability of concurrent data structures by relaxing their semantics. In this paper, we present local linearizability, a relaxed consistency condition that is applicable to container-type concurrent data structures like pools, queues, and stacks. While linearizability requires that the effect of each operation is observed by all threads at the same time, local linearizability only requires that for each thread T, the effects of its local insertion operations and the effects of those removal operations that remove values inserted by T are observed by all threads at the same time. We investigate theoretical and practical properties of local linearizability and its relationship to many existing consistency conditions. We present a generic implementation method for locally linearizable data structures that uses existing linearizable data structures as building blocks. Our implementations show performance and scalability improvements over the original building blocks and outperform the fastest existing container-type implementations. 1998 ACM Subject Classification D.3.1 [Programming Languages]: Formal Definitions and Theory—Semantics; E.1 [Data Structures]: Lists, stacks, and queues; D.1.3 [Software]: Programming Techniques—Concurrent Programming Keywords and phrases (concurrent) data structures, relaxed semantics, linearizability 1 Introduction Concurrent data structures are pervasive all along the software stack, from operating system code to application software and beyond. Both correctness and performance are imperative for concurrent data structure implementations. Correctness is usually specified by relating concurrent executions, admitted by the implementation, with sequential executions, admitted by the sequential version of the data structure. The latter form the sequential specification of the data structure. This relationship is formally captured by consistency conditions, such as linearizability, sequential consistency, or quiescent consistency [25]. Linearizability [26] is the most accepted consistency condition for concurrent data structures due to its simplicity and general applicability. It guarantees that the effects of all ∗ This paper is an extended version of [17] licensed under Creative Commons License CC-BY Leibniz International Proceedings in Informatics Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany XX:2 Local Linearizability operations by all threads are observed consistently. This global visibility requirement imposes the need of extensive synchronization among threads which may in turn jeopardize performance and scalability. In order to enhance performance and scalability of implementations, recent research has explored relaxed sequential specifications [23, 40, 2], resulting in well-performing implementations of concurrent data structures [2, 18, 23, 28, 38, 6]. Except for [27], the space of alternative consistency conditions that relax linearizability has been left unexplored to a large extent. In this paper, we explore (part of) this gap by investigating local linearizability, a novel consistency condition that is applicable to a large class of concurrent data structures that we call container-type data structures, or containers for short. Containers include pools, queues, and stacks. A fine-grained spectrum of consistency conditions enables us to describe the semantics of concurrent implementations more precisely, e.g., we show in our appendix that work stealing queues [35] which could only be proven to be linearizable wrt pool are actually locally linearizable wrt double-ended queue. Local linearizability is a (thread-)local consistency condition that guarantees that insertions per thread are enq(1) deq(2) T1 observed consistently. While linearizability requires enq(2) deq(1) T2 a consistent view over all insertions, we only require that projections of the global history—so called thread- The thread-induced history of thread T1 induced histories—are linearizable. The induced his- is enclosed by a dashed line while the thread-induced history of thread T2 is tory of a thread T is a projection of a program exe- enclosed by a solid line. cution to the insert-operations in T combined with all remove-operations that remove values inserted by T irFigure 1 Local Linearizability respective of whether they happen in T or not. Then, the program execution is locally linearizable iff each thread-induced history is linearizable. Consider the example (sequential) history depicted in Figure 1. It is not linearizable wrt a queue since the values are not dequeued in the same order as they were enqueued. However, each thread-induced history is linearizable wrt a queue and, therefore, the overall execution is locally linearizable wrt a queue. In contrast to semantic relaxations based on relaxing sequential semantics such as [23, 2], local linearizability coincides with sequential correctness for single-threaded histories, i.e., a single-threaded and, therefore, sequential history is locally linearizable wrt a given sequential specification if and only if it is admitted by the sequential specification. Local linearizability is to linearizability what coherence is to sequential consistency. Coherence [22], which is almost universally accepted as the absolute minimum that a shared memory system should satisfy, is the requirement that there exists a unique global order per shared memory location. Thus, while all accesses by all threads to a given memory location have to conform to a unique order, consistent with program order, the relative ordering of accesses to multiple memory locations do not have to be the same. In other words, coherence is sequential consistency per memory location. Similarly, local linearizability is linearizability per local history. In our view, local linearizability offers enough consistency for the correctness of many applications as it is the local view of the client that often matters. For example, in a locally linearizable queue each client (thread) has the impression of using a perfect queue—no reordering will ever be observed among the values inserted by a single thread. Such guarantees suffice for many e-commerce and cloud applications. Implementations of locally linearizable data structures have been successfully applied for managing free lists in the design of the fast and scalable memory allocator scalloc [5]. Moreover, except for fairness, locally linearizable queues guarantee all properties required from Dispatch Queues [1], a common concurrency programming mechanism on mobile devices. A. Haas et al. In this paper, we study theoretical and practical properties of local linearizability. Local linearizability is compositional—a history over multiple concurrent objects is locally linearizable iff all per-object histories are locally linearizable (see Thm. 12) and locally linearizable container-type data structures, including queues and stacks, admit only “sane” behaviours— no duplicated values, no values returned from thin air, and no values lost (see Prop. 4). Local linearizability is a weakening of linearizability for a natural class of data structures including pools, queues, and stacks (see Sec. 4). We compare local linearizability to linearizability, sequential, and quiescent consistency, and to many shared-memory consistency conditions. Finally, local linearizability leads to new efficient implementations. We present a generic implementation scheme that, given a linearizable implementation of a sequential specification S, produces an implementation that is locally linearizable wrt S (see Sec. 6). Our implementations show dramatic improvements in performance and scalability. In most cases the locally linearizable implementations scale almost linearly and even outperform state-ofthe-art pool implementations. We produced locally linearizable variants of state-of-the-art concurrent queues and stacks, as well as of the relaxed data structures from [23, 28]. The latter are relaxed in two dimensions: they are locally linearizable (the consistency condition is relaxed) and are out-of-order-relaxed (the sequential specification is relaxed). The speedup of the locally linearizable implementation to the fastest linearizable queue (LCRQ) and stack (TS Stack) implementation at 80 threads is 2.77 and 2.64, respectively. Verification of local linearizability, i.e. proving correctness, for each of our new locally linearizable implementations is immediate, given that the starting implementations are linearizable. 2 Semantics of Concurrent Objects The common approach to define the semantics of an implementation of a concurrent data structure is (1) to specify a set of valid sequential behaviors—the sequential specification, and (2) to relate the admissible concurrent executions to sequential executions specified by the sequential specification—via the consistency condition. That means that an implementation of a concurrent data structure actually corresponds to several sequential data structures, and vice versa, depending on the consistency condition used. A (sequential) data structure D is an object with a set of method calls Σ. We assume that method calls include parameters, i.e., input and output values from a given set of values. The sequential specification S of D is a prefix-closed subset of Σ∗ . The elements of S are called D-valid sequences. For ease of presentation, we assume that each value in a data structure can be inserted and removed at most once. This is without loss of generality, as we may see the set of values as consisting of pairs of elements (core values) and version numbers, i.e. V = E × N. Note that this is a technical assumption that only makes the presentation and the proofs simpler, it is not needed and not done in locally linearizable implementations. While elements may be inserted and removed multiple times, the version numbers provide uniqueness of values. Our assumption ensures that whenever a sequence s is part of a sequential specification S, then, each method call in s appears exactly once. An additional core value, that is not an element, is empty. It is returned by remove method calls that do not find an element to return. We denote by Emp the set of values that are versions of empty, i.e., Emp = {empty} × N. I Definition 1 (Appears-before Order, Appears-in Relation). Given a sequence s ∈ Σ∗ in which each method call appears exactly once, we denote by ≺s the total appears-before order over method calls in s. Given a method call m ∈ Σ, we write m ∈ s for m appears in s.  Throughout the paper, we will use pool, queue, and stack as typical examples of containers. We specify their sequential specifications in an axiomatic way [24], i.e., as sets of XX:3 XX:4 Local Linearizability (1) (2) (3) (4) (5) ∀i, j ∈ {1, . . . , n}. s = m1 . . . mn ∧ mi = mj ⇒ i = j ∀x ∈ V. r(x) ∈ s ⇒ i(x) ∈ s ∧ i(x) ≺s r(x) ∀e ∈ Emp. ∀x ∈ V. i(x) ≺s r(e) ⇒ r(x) ≺s r(e) ∀x, y ∈ V. i(x) ≺s i(y) ∧ r(y) ∈ s ⇒ r(x) ∈ s ∧ r(x) ≺s r(y) ∀x, y ∈ V. i(x) ≺s i(y) ≺s r(x) ⇒ r(y) ∈ s ∧ r(y) ≺s r(x) Table 1 The pool axioms (1), (2), (3); the queue order axiom (4); the stack order axiom (5) axioms that exactly define the valid sequences. I Definition 2 (Pool, Queue, & Stack). A pool, queue, and stack with values in a set V have the sets of methods ΣP = {ins(x), rem(x) | x ∈ V } ∪ {rem(e) | e ∈ Emp}, ΣQ = {enq(x), deq(x) | x ∈ V } ∪ {deq(e) | e ∈ Emp}, and ΣS = {push(x), pop(x) | x ∈ V } ∪ {pop(e) | e ∈ Emp}, respectively. We denote the sequential specification of a pool by SP , the sequential specification of a queue by SQ , and the sequential specification of a stack by SS . A sequence s ∈ Σ∗P belongs to SP iff it satisfies axioms (1) - (3) in Table 1—the pool axioms—when instantiating i() with ins() and r() with rem(). We keep axiom (1) for completeness, although it is subsumed by our assumption that each value is inserted and removed at most once. Specification SQ contains all sequences s that satisfy the pool axioms and axiom (4)—the queue order axiom—after instantiating i() with enq() and r() with deq(). Finally, SS contains all sequences s that satisfy the pool axioms and axiom (5)—the stack order axiom—after instantiating i() with push() and r() with pop().  We represent concurrent executions via concurrent histories. An example history is shown in Figure 1. Each thread executes a sequence of method calls from Σ; method calls executed by different threads may overlap (which does not happen in Figure 1). The real-time duration of method calls is irrelevant for the semantics of concurrent objects; all that matters is whether method calls overlap. Given this abstraction, a concurrent history is fully determined by a sequence of invocation and response events of method calls. We distinguish method invocation and response events by augmenting the alphabet. Let Σi = {mi | m ∈ Σ} and Σr = {mr | m ∈ Σ} denote the sets of method-invocation events and method-response events, respectively, for the method calls in Σ. Moreover, let I be the set of thread identifiers. Let ΣIi = {mki | m ∈ Σ, k ∈ I} and ΣIr = {mkr | m ∈ Σ, k ∈ I} denote the sets of method-invocation and -response events augmented with identifiers of executing threads. For example, mki is the invocation of method call m by thread k. Before we proceed, we mention a standard notion that we will need in several occasions. I Definition 3 (Projection). Let s be a sequence over alphabet Σ and M ⊆ Σ. By s|M we denote the projection of s on the symbols in M , i.e., the sequence obtained from s by removing all symbols that are not in M .  I Definition 4 (History). A (concurrent) history h is a sequence in (ΣIi ∪ ΣIr )∗ where (1) no invocation or response event appears more than once, i.e., if h = m1 . . . mn and mh = mk∗ (x) and mj = ml∗ (x), for ∗ ∈ {i, r}, then h = j and k = l, and (2) if a response event mkr appears in h, then the corresponding invocation event mki also appears in h and mi ≺h mr .  I Example 5. A queue history (left) and its formal representation as a sequence (right): T1 T2 enq(2) deq(1) enq(1) enq(2)1i enq(1)2i enq(2)1r deq(1)1i enq(1)2r deq(1)1r A. Haas et al. A history is sequential if every response event is immediately preceded by its matching invocation event and vice versa. Hence, we may ignore thread identifiers and identify a sequential history with a sequence in Σ∗ , e.g., enq(1)enq(2)deq(2)deq(1) identifies the sequential history in Figure 1. A history h is well-formed if h|k is sequential for every thread identifier k ∈ I where h|k denotes the projection of h on the set {mki | m ∈ Σ} ∪ {mkr | m ∈ Σ} of events that are local to thread k. From now on we will use the term history for well-formed history. Also, we may omit thread identifiers if they are not essential in a discussion. A history h determines a partial order on its set of method calls, the precedence order: I Definition 6 (Appears-in Relation, Precedence Order). The set of method calls of a history h is M (h) = {m | mi ∈ h}. A method call m appears in h, notation m ∈ h, if m ∈ M (h). The precedence order for h is the partial order <h such that, for m, n ∈ h, we have that m <h n iff mr ≺h ni . By <kh we denote <h|k , the subset of the precedence order that relates pairs of method calls of thread k, i.e., the program order of thread k.  We can characterize a sequential history as a history whose precedence order is total. In particular, the precedence order <s of a sequential history s coincides with its appears-before order ≺s . The total order for history s in Fig. 1 is enq(1) <s enq(2) <s deq(2) <s deq(1). I Definition 7 (Projection to a set of method calls). Let h be a history, M ⊆ Σ, MiI = {mki | m ∈ M, k ∈ I}, and MrI = {mkr | m ∈ M, k ∈ I}. Then, we write h|M for h|(MiI ∪ MrI ).  Note that h|M inherits h’s precedence order: m <h|M n ⇔ m ∈ M ∧ n ∈ M ∧ m <h n A history h is complete if the response of every invocation event in h appears in h. Given a history h, Complete(h) denotes the set of all completions of h, i.e., the set of all complete histories that are obtained from h by appending missing response events and/or removing pending invocation events. Note that Complete(h) = {h} iff h is a complete history. A concurrent data structure D over a set of methods Σ is a (prefix-closed) set of concurrent histories over Σ. A history may involve several concurrent objects. Let O be a set of concurrent objects with individual sets of method calls Σq and sequential specifications Sq for each object q ∈ O. A history h over O is a history over the (disjoint) union of method S calls of all objects in O, i.e., it has a set of method calls q∈O {q.m | m ∈ Σq }. The added prefix q. ensures that the union is disjoint. The projection of h to an object q ∈ O, denoted by h|q, is the history with a set of method calls Σq obtained by removing the prefix q. in every method call in h|{q.m | m ∈ Σq }. I Definition 8 (Linearizability [26]). A history h is linearizable wrt the sequential specification S if there is a sequential history s ∈ S and a completion hc ∈ Complete(h) such that (1) s is a permutation of hc , and (2) s preserves the precedence order of hc , i.e., if m <hc n, then m <s n. We refer to s as a linearization of h. A concurrent data structure D is linearizable wrt S if every history h of D is linearizable wrt S. A history h over a set of concurrent objects O is linearizable wrt the sequential specifications Sq for q ∈ O if there exists a linearization s of h such that s|q ∈ Sq for each object q ∈ O.  3 Local Linearizability Local linearizability is applicable to containers whose set of method calls is a disjoint union Σ = Ins ∪ Rem ∪ DOb ∪ SOb of insertion method calls Ins, removal method calls Rem, dataobservation method calls DOb, and (global) shape-observation method calls SOb. Insertions (removals) insert (remove) a single value in the data set V or empty; data observations return XX:5 XX:6 Local Linearizability a single value in V ; shape observations return a value (not necessarily in V ) that provides information on the shape of the state, for example, the size of a data structure. Examples of data observations are head(x) (queue), top(x) (stack), and peek(x) (pool). Examples of shape observations are empty(b) that returns true if the data structure is empty and false otherwise, and size(n) that returns the number of elements in the data structure. Even though we refrain from formal definitions, we want to stress that a valid sequence of a container remains valid after deleting observer method calls: S | (Ins ∪ Rem) ⊆ S. (1) There are also containers with multiple insert/remove methods, e.g., a double-ended queue (deque) is a container with insert-left, insert-right, remove-left, and remove-right methods, to which local linearizability is also applicable. However, local linearizability requires that each method call is either an insertion, or a removal, or an observation. As a consequence, set is not a container according to our definition, as in a set ins(x) acts as a global observer first, checking whether (some version of) x is already in the set, and if not inserts x. Also hash tables are not containers for a similar reason. Note that the arity of each method call in a container being one excludes data structures like snapshot objects. It is possible to deal with higher arities in a fairly natural way, however, at the cost of complicated presentation. We chose to present local linearizability on simple containers only. We present the definition of local linearizability without shape observations here and discuss shape observations in Appendix A. I Definition 9 (In- and out-methods). Let h be a container history. For each thread T we define two subsets of the methods in h, called in-methods IT and out-methods OT of thread T , respectively: IT = {m | m ∈ M (h|T ) ∩ Ins} OT = {m(a) ∈ M (h) ∩ Rem | ins(a) ∈ IT } ∪ {m(e) ∈ M (h) ∩ Rem | e ∈ Emp} ∪ {m(a) ∈ M (h) ∩ DOb | ins(a) ∈ IT }.  Hence, the in-methods for thread T are all insertions performed by T . The out-methods are all removals and data observers that return values inserted by T . Removals that remove the value empty are also automatically added to the out-methods of T as any thread (and hence also T ) could be the cause of “inserting” empty. This way, removals of empty serve as means for global synchronization. Without them each thread could perform all its operations locally without ever communicating with the other threads. Note that the out-methods OT of thread T need not be performed by T , but they return values that are inserted by T . I Definition 10 (Thread-induced History). Let h be a history. The thread-induced history hT is the projection of h to the in- and out-methods of thread T , i.e., hT = h| (IT ∪ OT ).  I Definition 11 (Local Linearizability). A history h is locally linearizable wrt a sequential specification S if (1) each thread-induced history hT is linearizable wrt S, and (2) the thread-induced histories hT form a decomposition of h, i.e., m ∈ h ⇒ m ∈ hT for some thread T . A data structure D is locally linearizable wrt S if every history h of D is locally linearizable wrt S. A history h over a set of concurrent objects O is locally linearizable wrt the sequential specifications Sq for q ∈ O if each thread-induced history is linearizable over O and the thread-induced histories form a decomposition of h, i.e., q.m ∈ h ⇒ q.m ∈ hT for some thread T .  Local linearizability is sequentially correct, i.e., a single-threaded (necessarily sequential) history h is locally linearizable wrt a sequential specification S iff h ∈ S. Like linearizabil- A. Haas et al. XX:7 ity [25], local linearizability is compositional. The complete proof of the following theorem and missing or extended proofs of all following properties can be found in Appendix B. I Theorem 12 (Compositionality). A history h over a set of objects O with sequential specifications Sq for q ∈ O is locally linearizable iff h|q is locally linearizable wrt Sq for every q ∈ O. Proof (Sketch). The property follows from the compositionality of linearizability and the fact that (h|q)T = hT |q for every thread T and object q. J The Choices Made. Splitting a global history into subhistories and requiring consistency for each of them is central to local linearizability. While this is common in shared-memory consistency conditions [22, 31, 32, 3, 16, 4, 20], our study of local linearizability is a first step in exploring subhistory-based consistency conditions for concurrent objects. We chose thread-induced subhistories since thread-locality reduces contention in concurrent objects and is known to lead to high performance as confirmed by our experiments. To assign method calls to thread-induced histories, we took a data-centric point of view by (1) associating data values to threads, and (2) gathering all method calls that insert/return a data value into the subhistory of the associated thread (Def. 9). We associate data values to the thread that inserts them. One can think of alternative approaches, for example, associate with a thread the values that it removed. In our view, the advantages of our choice are clear: First, by assigning inserted values to threads, every value in the history is assigned to some thread. In contrast, in the alternative approach, it is not clear where to assign the values that are inserted but not removed. Second, assigning inserted values to the inserting thread enables eager removals and ensures progress in locally linearizable data structures. In the alternative approach, it seems like the semantics of removing empty should be local. An orthogonal issue is to assign values from shape observations to threads. In Appendix A, we discuss two meaningful approaches and show how local linearizability can be extended towards shape and data observations that appear in insertion operations of sets. Finally, we have to choose a consistency condition required for each of the subhistories. We chose linearizability as it is the best (strong) consistency condition for concurrent objects. 4 Local Linearizability vs. Linearizability We now investigate the connection between local linearizability and linearizability. I Proposition 1 (Lin 1). In general, linearizability does not imply local linearizability. Proof. We provide an example of a data structure that is linearizable but not locally linearizable. Consider a sequential specification SNearlyQ which behaves like a queue except when the first two insertions were performed without a removal in between—then the first two elements are removed out of order. Formally, s ∈ SNearlyQ iff (1) s = s1 enq(a)enq(b)s2 deq(b)s3 deq(a)s4 where s1 enq(a)enq(b)s2 deq(a)s3 deq(b)s4 ∈ SQ and s1 ∈ {deq(e) | e ∈ Emp}∗ for some a, b ∈ V , or (2) s ∈ SQ and s 6= s1 enq(a)enq(b)s2 for s1 ∈ {deq(e) | e ∈ Emp}∗ and a, b ∈ V . The example below is linearizable wrt SNearlyQ . However, T1 ’s induced history enq(1)enq(2)deq(1)deq(2) is not. T1 T2 enq(1) enq(2) deq(3) enq(3) deq(2) deq(1) J The following condition on a data structure specification is sufficient for linearizability to imply local linearizability and is satisfied, e.g., by pool, queue, and stack. XX:8 Local Linearizability T1 T2 i(1) r(empty) i(2) r(2) r(1) Figure 2 LL, not SC (Pool, Queue, Stack) T1 T2 i(1) r(1) r(empty) Figure 3 SC, not LL (Pool, Queue, Stack) I Definition 13 (Closure under Data-Projection). A seq. specification S over Σ is closed under data-projection 1 iff for all s ∈ S and all V 0 ⊆ V , s|{m(x) ∈ Σ | x ∈ V 0 ∪ Emp} ∈ S.  For s = enq(1)enq(3)enq(2)deq(3)deq(1)deq(2) we have s ∈ SNearlyQ , but s|{enq(x), deq(x) | x ∈ {1, 2} ∪ Emp} ∈ / SNearlyQ , i.e., SNearlyQ is not closed under data-projection. I Proposition 2 (Lin 2). Linearizability implies local linearizability for sequential specifications that are closed under data-projection. Proof (Sketch). The property follows from Definition 13 and Equation (1). J There exist corner cases where local linearizability coincides with linearizability, e.g., for S = ∅ or S = Σ∗ , or for single-producer/multiple-consumer histories. We now turn our attention to pool, queue, and stack. I Proposition 3. The seq. specifications SP , SQ , and SS are closed under data-projection. Proof (Sketch). Let s ∈ SP , V 0 ⊆ V , and let s0 = s| ({ins(x), rem(x) | x ∈ V 0 ∪ Emp}). Then, it suffices to check that all axioms for pool (Definition 2 and Table 1) hold for s0 . J I Theorem 14 (Pool & Queue & Stack, Lin). For pool, queue, and stack, local linearizability is (strictly) weaker than linearizability. Proof. Linearizability implies local linearizability for pool, queue, and stack as a consequence of Proposition 2 and Proposition 3. The history in Figure 2 is locally linearizable but not linearizable wrt pool, queue and stack (after suitable renaming of method calls). J Although local linearizability wrt a pool does not imply linearizability wrt a pool (Theorem 14), it still guarantees several properties that ensure sane behavior as stated next. I Proposition 4 (LocLin Pool). Let h be a locally linearizable history wrt a pool. Then: 1. No value is duplicated, i.e., every remove method appears in h at most once. 2. No out-of-thin-air values, i.e., ∀x ∈ V. rem(x) ∈ h ⇒ ins(x) ∈ h ∧ rem(x)6<h ins(x). 3. No value is lost, i.e., ∀x ∈ V. ∀e ∈ Emp. rem(e) <h rem(x) ⇒ ins(x) 6<h rem(e) and ∀x ∈ V. ∀e ∈ Emp. ins(x) <h rem(e) ⇒ rem(x) ∈ h ∧ rem(e)6<h rem(x). Proof. By direct unfolding of the definitions. J Note that if a history h is linearizable wrt a pool, then all of the three stated properties hold, as a consequence of linearizability and the definition of SP . 5 Local Linearizability vs. Other Relaxed Consistency Conditions We compare local linearizability with other classical consistency conditions to better understand its guarantees and implications. 1 The same notion has been used in [7] under the name closure under projection. A. Haas et al. XX:9 Sequential Consistency (SC). A history h is sequentially consistent [25, 30] wrt a sequential specification S, if there exists a sequential history s ∈ S and a completion hc ∈ Complete(h) such that (1) s is a permutation of hc , and (2) s preserves each thread’s program order, i.e., if m <Th n, for some thread T , then m <s n. We refer to s as a sequential witness of h. A data structure D is sequentially consistent wrt S if every history h of D is sequentially consistent wrt S. Sequential consistency is a useful consistency condition for shared memory but it is not really suitable for data structures as it allows for behavior that excludes any coordination between threads [39]: an implementation of a data structure in which every thread uses a dedicated copy of a sequential data structure without any synchronization is sequentially consistent. A sequentially consistent queue might always return empty in one (consumer) thread as the point in time of the operation can be moved, e.g., see Figure 3. In a producerconsumer scenario such a queue might end up with some threads not doing any work. I Theorem 15 (Pool, Queue & Stack, SC). For pool, queue, and stack, local linearizability is incomparable to sequential consistency. J Figures 2 and 3 give example histories that show the statement of Theorem 15. In contrast to local linearizability, sequential consistency is not compositional [25]. (Quantitative) Quiescent Consistency (QC & QQC). Like linearizability and sequential consistency, quiescent consistency [13, 25] also requires the existence of a sequential history, a quiescent witness, that satisfies the sequential specification. All three consistency conditions impose an order on the method calls of a concurrent history that a witness has to preserve. Quiescent consistency uses the concept of quiescent states to relax the requirement of preserving the precedence order imposed by linearizability. A quiescent state is a point in a history at which there are no pending invocation events (all invoked method calls have already responded). In a quiescent witness, a method call m has to appear before a method call n if and only if there is a quiescent state between m and n. Method calls between two consecutive quiescent states can be ordered arbitrarily. Quantitative quiescent consistency [27] refines quiescent consistency by bounding the number of reorderings of operations between two quiescent states based on the concurrent behavior between these two states. The next result about quiescent consistency for pool is needed to establish the connection between quiescent consistency and local linearizability. I Proposition 5. A pool history h satisfying 1.-3. of Prop. 4 is quiescently consistent. J From Prop. 4 and 5 follows that local linearizability implies quiescent consistency for pool. I Theorem 16 (Pool, Queue & Stack, QC). For pool, local linearizability is (strictly) stronger than quiescent consistency. For queue and stack, local linearizability is incomparable to quiescent consistency. J Local linearizability also does not imply the stronger condition of quantitative quiescent consistency. Like local linearizability, quiescent consistency and quantitative quiescent consistency are compositional [25, 27]. For details, please see Appendix D. Consistency Conditions for Distributed Shared Memory. There is extensive research on consistency conditions for distributed shared memory [3, 4, 8, 16, 20, 22, 30, 31, 32]. In Appendix E, we compare local linearizability against coherence, PRAM consistency, processor consistency, causal consistency, and local consistency. All these conditions split a history into subhistories and require consistency of the subhistories. For our comparison, XX:10 Local Linearizability T1 T2 ins(1) ins(2) head(2) head(1) head(2) head(1) Figure 4 Problematic shared-memory history. we first define a sequential specification SM for a single memory location. We assume that each memory location is preinitialized with a value vinit ∈ V . A read-operation returns the value of the last write-operation that was performed on the memory location or vinit if there was no write-operation. We denote write-operations by ins and read-operations by head. Formally, we define SM as SM = {head(vinit )}? · {ins(v)head(v)i | i ≥ 0, v ∈ V }? . Note that read-operations are data observations and the same value can be read multiple times. For brevity, we only consider histories that involve a single memory location. In the following, we summarize our comparison. For details, please see Appendix E. While local linearizability is well-suited for concurrent data structures, this is not necessarily true for the mentioned shared-memory consistency conditions. On the other hand, local linearizability appears to be problematic for shared memory. Consider the locally linearizable history in Figure 4. There, the read values oscillate between different values that were written by different threads. Therefore, local linearizability does not imply any of the shared-memory consistency conditions. In Appendix E, we further show that local linearizability is incomparable to all considered shared-memory conditions. 6 Locally Linearizable Implementations In this section, we focus on locally linearizable data structure implementations that are generic as follows: Choose a linearizable implementation of a data structure Φ wrt a sequential specification SΦ , and we turn it into a (distributed) data structure called LLD Φ that is locally linearizable wrt SΦ . An LLD implementation takes several copies of Φ (that we call backends) and assigns to each thread T a backend ΦT . Then, when thread T inserts an element into LLD Φ, the element is inserted into ΦT , and when an arbitrary thread removes an element from LLD Φ, the element is removed from some ΦT eagerly, i.e., if no element is found in the attempted backend ΦT the search for an element continues through all other backends. If no element is found in one round through the backends, then we return empty. I Proposition 6 (LLD correctness). Let Φ be a data structure implementation that is linearizable wrt a sequential specification SΦ . Then LLD Φ is locally linearizable wrt SΦ . Proof. Let h be a history of LLD Φ. The crucial observation is that each thread-induced history hT is a backend history of ΦT and hence linearizable wrt SΦ . J Any number of copies (backends) is allowed in this generic implementation of LLD Φ. If we take just one copy, we end up with a linearizable implementation. Also, any way of choosing a backend for removals is fine. However, both the number of backends and the backend selection strategy upon removals affect the performance significantly. In our LLD Φ implementations we use one backend per thread, resulting in no contention on insertions, and always attempt a local remove first. If this does not return an element, then we continue a search through all other backends starting from a randomly chosen backend. LLD Φ is an implementation closely related to Distributed Queues (DQs) [18]. A DQ is a (linearizable) pool that is organized as a single segment of length ` holding ` backends. DQs come in different flavours depending on how insert and remove methods are distributed A. Haas et al. across the segment when accessing backends. No DQ variant in [18] follows the LLD approach described above. Moreover, while DQ algorithms are implemented for a fixed number of backends, LLD Φ implementations manage a segment of variable size, one backend per (active) thread. Note that the strategy of selecting backends in the LLD Φ implementations is similar to other work in work stealing [35]. However, in contrast to this work our data structures neither duplicate nor lose elements. LLD (stack) implementations have been successfully applied for managing free lists in the fast and scalable memory allocator scalloc [5]. The guarantees provided by local linearizability are not needed for the correctness of scalloc, i.e., the free lists could also use a weak pool (pool without a linearizable emptiness check). However, the LLD stack implementations provide good caching behavior when threads operate on their local stacks whereas a weak pool would potentially negatively impact performance. We have implemented LLD variants of strict and relaxed queue and stack implementations. None of our implementations involves observation methods, but the LLD algorithm can easily be extended to support observation methods. For details, please see App. F.4. Finally, let us note that we have also experimented with other locally linearizable implementations that lacked the genericity of the LLD implementations, and whose performance evaluation did not show promising results (see App. G). As shown in Sec. 4, a locally linearizable pool is not a linearizable pool, i.e., it lacks a linearizable emptiness check. Indeed, LLD implementations do not provide a linearizable emptiness check, despite of eager removes. We provide LL+ D Φ, a variant of LLD Φ, that provides a linearizable emptiness check under mild conditions on the starting implementation Φ (see App. F.1 for details). Experimental Evaluation. All experiments ran on a uniform memory architecture (UMA) machine with four 10-core 2GHz Intel Xeon E7-4850 processors supporting two hardware threads (hyperthreads) per core, 128GB of main memory, and Linux kernel version 3.8.0. We also ran the experiments without hyper-threading resulting in no noticeable difference. The CPU governor has been disabled. All measurements were obtained from the artifactevaluated Scal benchmarking framework [12, 19, 11], where you can also find the code of all involved data structures. Scal uses preallocated memory (without freeing it) to avoid memory management artifacts. For all measurements we report the arithmetic mean and the 95% confidence interval (sample size=10, corrected sample standard deviation). In our experiments, we consider the linearizable queues Michael-Scott queue (MS) [34] and LCRQ [36] (improved version [37]), the linearizable stacks Treiber stack (Treiber) [42] and TS stack [14], the k-out-of-order relaxed k-FIFO queue [28] and k-Stack [23] and linearizable well-performing pools based on distributed queues using random balancing [18] (1-RA DQ for queue, and 1-RA DS for stack). For each of these implementations (but the pools) we provide LLD variants (LLD LCRQ, LLD TS stack, LLD k-FIFO, and LLD k-Stack) and, when possible, LL+ D variants (LL+ D MS queue and LL+ D Treiber stack). Making the pools locally linearizable is not promising as they are already distributed. Whenever LL+ D is achievable for a data structure implementation Φ we present only results for LL+ D Φ as, in our workloads, LLD Φ and LL+ D Φ implementations perform with no visible difference. We evaluate the data structures on a Scal producer-consumer benchmark where each producer and consumer is configured to execute 106 operations. To control contention, we add a busy wait of 5µs between operations. This is important as too high contention results in measuring hardware or operating system (e.g., scheduling) artifacts. The number of threads ranges between 2 and 80 (number of hardware threads) half of which are producers and half consumers. To relate performance and scalability we report the number of data XX:11 million operations per sec (more is better) Local Linearizability 26 24 22 20 18 16 14 12 10 8 6 4 2 0 MS LCRQ k-FIFO LL+D MS LLD LCRQ LLD k-FIFO 1-RA DQ 2 10 20 30 40 50 60 70 80 number of threads “queue-like” data structures million operations per sec (more is better) XX:12 26 24 22 20 18 16 14 12 10 8 6 4 2 0 Treiber TS Stack k-Stack LL+D Treiber LLD TS Stack LLD k-Stack 1-RA DS 2 10 20 30 40 50 60 70 80 number of threads “stack-like” data structures Figure 5 Performance and scalability of producer-consumer microbenchmarks with an increasing number of threads on a 40-core (2 hyperthreads per core) machine structure operations per second. Data structures that require parameters to be set are configured to allow maximum parallelism for the producer-consumer workload with 80 threads. This results in k = 80 for all k-FIFO and k-Stack variants (40 producers and 40 consumers in parallel on a single segment), p = 80 for 1-RA-DQ and 1-RA-DS (40 producers and 40 consumers in parallel on different backends). The TS Stack algorithm also needs to be configured with a delay parameter. We use optimal delay (7µs) for the TS Stack and zero delay for the LLD TS Stack, as delays degrade the performance of the LLD implementation. Figure 5 shows the results of the producer-consumer benchmarks. Similar to experiments performed elsewhere [14, 23, 28, 36] the well-known algorithms MS and Treiber do not scale for 10 or more threads. The state-of-the-art linearizable queue and stack algorithms LCRQ and TS-interval Stack either perform competitively with their k-out-of-order relaxed counter parts k-FIFO and k-Stack or even outperform and outscale them. For any implementation Φ, LLD Φ and LL+ D Φ (when available) perform and scale significantly better than Φ does, even slightly better than the state-of-the-art pool that we compare to. The best improvement show LLD variants of MS queue and Treiber stack. The speedup of the locally linearizable implementation to the fastest linearizable queue (LCRQ) and stack (TS Stack) A. Haas et al. implementation at 80 threads is 2.77 and 2.64, respectively. The performance degradation for LCRQ between 30 and 70 threads aligns with the performance of fetch-and-inc—the CPU instruction that atomically retrieves and modifies the contents of a memory location— on the benchmarking machine, which is different on the original benchmarking machine [36]. LCRQ uses fetch-and-inc as its key atomic instruction. 7 Conclusion & Future Work Local linearizability splits a history into a set of thread-induced histories and requires consistency of all such. This yields an intuitive consistency condition for concurrent objects that enables new data structure implementations with superior performance and scalability. Local linearizability has desirable properties like compositionality and well-behavedness for container-type data structures. As future work, it is interesting to investigate the guarantees that local linearizability provides to client programs along the line of [15]. Acknowledgments This work has been supported by the National Research Network RiSE on Rigorous Systems Engineering (Austrian Science Fund (FWF): S11402-N23, S11403-N23, S11404-N23, S11411N23), a Google PhD Fellowship, an Erwin Schrödinger Fellowship (Austrian Science Fund (FWF): J3696-N26), EPSRC grants EP/H005633/1 and EP/K008528/1, the Vienna Science and Technology Fund (WWTF) trough grant PROSEED, the European Research Council (ERC) under grant 267989 (QUAREM) and by the Austrian Science Fund (FWF) under grant Z211-N23 (Wittgenstein Award). References 1 2 3 4 5 6 7 8 9 10 URL: https://developer.apple.com/library/ios/documentation/General/ Conceptual/ConcurrencyProgrammingGuide/OperationQueues/OperationQueues. html. Y. Afek, G. Korland, and E. Yanovsky. Quasi-Linearizability: Relaxed Consistency for Improved Concurrency. In OPODIS, pages 395–410, 2010. M. Ahamad, R.A. Bazzi, R. John, P. Kohli, and G. Neiger. The Power of Processor Consistency. In SPAA, pages 251–260, 1993. M. Ahamad, G. Neiger, J.E. Burns, P. Kohli, and P.W. Hutto. Causal memory: definitions, implementation, and programming. Distributed Computing, 9(1):37–49, 1995. M. Aigner, C. M. Kirsch, M. Lippautz, and A. Sokolova. Fast, multicore-scalable, lowfragmentation memory allocation through large virtual memory and global data structures. In OOPSLA, pages 451–469, 2015. D. Alistarh, J. Kopinsky, J. Li, and N. Shavit. The SprayList: A Scalable Relaxed Priority Queue. In PPoPP, pages 11–20, 2015. A. Bouajjani, M. Emmi, C. Enea, and J. Hamza. On Reducing Linearizability to State Reachability. In ICALP, pages 95–107, 2015. S. Burckhardt, A. Gotsman, H. Yang, and M. Zawirski. Replicated Data Types: Specification, Verification, Optimality. In POPL, pages 271–284, 2014. A. Cerone, A. Gotsman, and H. Yang. Parameterised Linearisability. In ICALP, pages 98–109, 2014. S. Chakraborty, T. A. Henzinger, A. Sezgin, and V. Vafeiadis. Aspect-Oriented Linearizability Proofs. Logical Methods in Computer Science, 11(1:20):1–33, 2015. XX:13 XX:14 Local Linearizability 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 POPL 2015 Artifact Evaluation Committee. POPL 2015 Artifact Evaluation. Accessed on 01/14/2015. URL: http://popl15-aec.cs.umass.edu/home/. Computational Systems Group, University of Salzburg. Scal: High-Performance MulticoreScalable Computing. URL: http://scal.cs.uni-salzburg.at. J. Derrick, B. Dongol, G. Schellhorn, B. Tofan, O. Travkin, and H. Wehrheim. Quiescent Consistency: Defining and Verifying Relaxed Linearizability. In FM, pages 200–214, 2014. M. Dodds, A. Haas, and C.M. Kirsch. A Scalable, Correct Time-Stamped Stack. In POPL, pages 233–246, 2015. I. Filipovic, P.W. O’Hearn, N. Rinetzky, and H. Yang. Abstraction for concurrent objects. Theor. Comput. Sci., 411(51-52):4379–4398, 2010. J.R. Goodman. Cache consistency and sequential consistency. University of WisconsinMadison, Computer Sciences Department, 1991. A. Haas, T.A. Henzinger, A. Holzer, C.M. Kirsch, M. Lippautz, H. Payer, A. Sezgin, A. Sokolova, and H. Veith. Local Linearizability for Concurrent Container-Type Data Structures. In CONCUR, 2016. A. Haas, T.A. Henzinger, C.M. Kirsch, M. Lippautz, H. Payer, A. Sezgin, and A. Sokolova. Distributed Queues in Shared Memory: Multicore Performance and Scalability through Quantitative Relaxation. In CF, 2013. A. Haas, T. Hütter, C.M. Kirsch, M. Lippautz, M. Preishuber, and A. Sokolova. Scal: A Benchmarking Suite for Concurrent Data Structures. In NETYS, pages 1–14, 2015. A. Heddaya and H. Sinha. Coherence, Non-coherence and Local Consistency in Distributed Shared Memory for Parallel Computing. Technical report, Computer Science Department, Boston University, 1992. S. Heller, M. Herlihy, V. Luchangco, M. Moir, W.N. Scherer, and N. Shavit. A Lazy Concurrent List-based Set Algorithm. In OPODIS, 2005. J.L. Hennessy and D.A. Patterson. Computer Architecture, Fifth Edition: A Quantitative Approach. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 5th edition, 2011. T.A. Henzinger, C.M. Kirsch, H. Payer, A. Sezgin, and A. Sokolova. Quantitative relaxation of concurrent data structures. In POPL, pages 317–328, 2013. T.A. Henzinger, A. Sezgin, and V. Vafeiadis. Aspect-Oriented Linearizability Proofs. In CONCUR, pages 242–256, 2013. M. Herlihy and N. Shavit. The Art of Multiprocessor Programming. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2008. M. Herlihy and J.M. Wing. Linearizability: A Correctness Condition for Concurrent Objects. ACM Trans. Program. Lang. Syst., 12(3):463–492, 1990. R. Jagadeesan and J. Riely. Between Linearizability and Quiescent Consistency - Quantitative Quiescent Consistency. In ICALP, pages 220–231, 2014. C.M. Kirsch, M. Lippautz, and H. Payer. Fast and Scalable, Lock-free k-FIFO Queues. In PaCT, pages 208–223, 2013. A. Kogan and E. Petrank. Wait-free queues with multiple enqueuers and dequeuers. In PPoPP, pages 223–234, 2011. L. Lamport. How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs. IEEE Trans. Comput., 28(9):690–691, September 1979. R.J. Lipton and J.S. Sandberg. PRAM: A Scalable Shared Memory. Technical Report Nr. 180, Princeton University, Department of Computer Science, 1988. R.J. Lipton and J.S. Sandberg. Oblivious memory computer networking, September 28 1993. CA Patent 1,322,609. M.M. Michael. Hazard Pointers: Safe Memory Reclamation for Lock-Free Objects. IEEE Trans. Parallel Distrib. Syst., 15(6):491–504, 2004. A. Haas et al. 34 35 36 37 38 39 40 41 42 M.M. Michael and M.L. Scott. Simple, fast, and practical non-blocking and blocking concurrent queue algorithms. In PODC, pages 267–275, 1996. M.M. Michael, M.T. Vechev, and V.A. Saraswat. Idempotent Work Stealing. In PPoPP, pages 45–54, 2009. A. Morrison and Y. Afek. Fast Concurrent Queues for x86 Processors. In PPoPP, pages 103–112, 2013. Multicore Computing Group, Tel Aviv University. Fast Concurrent Queues for x86 Processors. Accessed on 01/28/2015. URL: http://mcg.cs.tau.ac.il/projects/lcrq/. H. Rihani, P. Sanders, and R. Dementiev. MultiQueues: Simpler, Faster, and Better Relaxed Concurrent Priority Queues. CoRR, 2014. arXiv:1411.1209. A. Sezgin. Sequential Consistency and Concurrent Data Structures. CoRR, abs/1506.04910, 2015. N. Shavit. Data Structures in the Multicore Age. CACM, 54(3):76–84, March 2011. R.C. Steinke and J.G. Nutt. A Unified Theory of Shared Memory Consistency. J. ACM, 51(5):800–849, September 2004. R.K. Treiber. Systems Programming: Coping with Parallelism. Technical Report RJ-5118, IBM Research Center, 1986. XX:15 XX:16 Local Linearizability A Local Linearizability with Shape Observers There are two possible ways to deal with shape observers: treat them locally, in the threadinduced history of the performing thread, or treat them globally. While a local treatment is immediate and natural to a local consistency condition, a global treatment requires care. We present both solutions next. I Definition 17 (Local Linearizability LSO). A history h is locally linearizable with local shape observers (LSO) wrt a sequential specification S if it is locally linearizable according to Definition 11 with the difference that the in-methods (Definition 9) also contain all shape observers performed by thread T , i.e., IT = {m | m ∈ M (h|T ) ∩ (Ins ∪ SOb)}.  Global observations require more notation and auxiliary notions. Let sj for j ∈ J be a collection of sequences over alphabet Σ with pairwise disjoint sets of symbols M (sj ). A S sequence s is an interleaving of sj for j ∈ J if M (s) = j M (sj ) and s|M (sj ) = sj for all Q j ∈ J. We write j sj for the set of all interleavings of sj with j ∈ J. Given a history h and a method call m ∈ h, we write h≤m for the (incomplete) history that is the prefix of h up to and without mr , the response event of m. Hence, h≤m contains all invocation and response events of h that appear before mr . I Definition 18. Let S denote the sequential specification of a container D. A shape observer m in a history h has a witness if there exists a sequence s ∈ Σ∗ such that sm ∈ S Q and s ∈ T sT for some sT that is a linearization of the thread-induced history (h≤m )T .  Informally, the above definition states that a global shape observer m must be justified by a (global) witness. Such a global witness is a sequence that (1) when extended by m belongs to the sequential specification, and (2) is an interleaving of linearizations of the thread-induced histories up to m. I Definition 19 (Local Linearizability GSO). A history h is locally linearizable with global shape observers (GSO) wrt a sequential specification S if it is locally linearizable and each shape observer m ∈ SOb has a witness.  We illustrate the difference in the local vs. the global approach for shape observers with the following example. I Example 20. Consider the following queue history with global observer size() T1 T2 enq(1) enq(2) deq(1) size(n) where n is just a placeholder for a concrete natural number. For n = 0, the history h is locally linearizable LSO, but not locally linearizable GSO. For n = 1, the history h is locally linearizable GSO, but not locally linearizable LSO. Global observers and non-disjoint operations are expected to have negative impact on performance. If one cares for global consistency, local linearizability is not the consistency condition to be used. The restriction to containers and disjoint operations specifies, in an informal way, the minimal requirements for local consistency to be acceptable. Neither sets nor maps are containers according to our definition. However, it is possible to extend our treatment to sets and maps similar to our treatment of global observers. Locally A. Haas et al. XX:17 linearizable sets and maps will be weaker than their linearizable counterparts, but, due to the tight coupling between mutator and observer effects, the gain in performance is unlikely to be as substantial as the one observed in other data structures. The technicalities needed to extend local linearizability to sets and maps would complicate the theoretical development without considerable benefits and we, therefore, excluded such data structures. B Additional Results and Proofs Theorem 12 (Compositionality). A history h over a set of objects O with sequential specifications Sq for q ∈ O is locally linearizable if and only if h|q is locally linearizable with respect to Sq for every q ∈ O. Proof. The property follows from the compositionality of linearizability and the fact that (h|q)T = hT |q for every thread T and object q. Assume that h over O is locally linearizable. This means that all thread-induced histories hT over O are linearizable. Hence, since linearizability is compositional, for each object q ∈ O the history hT |q is linearizable with respect to Sq . Now from (h|q)T = hT |q we have that for every object q the history (h|q)T is linearizable for every thread T . Similarly, assume that for every object q ∈ O the history h|q is locally linearizable. Then, for every q, (h|q)T = hT |q is linearizable for every thread T . From the compositionality of linearizability, hT is linearizable for every thread T . This proves that h is locally linearizable. J Proposition 2 (Lin vs. LocLin 2). Linearizability implies local linearizability for sequential specifications that are closed under data-projection. Proof. Assume we are given a history h which is linearizable with respect to a sequential specification S that is closed under data-projection. Further assume that, without loss of generality, h is complete. Then there exists a sequential history s ∈ S such that (1) s is a permutation of h, and (2) if m <h n, then also m <s n. Given a thread T , consider the thread-induced history hT and let sT = s| (IT ∪ OT ). Then, sT is a permutation of hT since hT and sT consist of the same events. Furthermore, sT ∈ S since S is closed under dataprojection and since Equation (1) holds for containers. Finally, we have for each m ∈ hT and n ∈ hT that, if m <hT n, then also m <sT n since m <h n and therefore m <s n which implies m <sT n. Thereby, we have shown that hT is linearizable with respect to S, for an arbitrary thread T . Hence h is locally linearizable with respect to S. J Proposition 3 (Data-Projection Closedness). queue, and stack are closed under data-projection. The sequential specifications of pool, Proof. Let s ∈ SP , V 0 ⊆ V , and let s0 = s| ({ins(x), rem(x) | x ∈ V 0 ∪ Emp}) . Then, it suffices to check that all axioms for pool (Definition 2 and Table 1) hold for s0 . Clearly, all methods in s0 appear at most once, as they do so in s. If rem(x) ∈ s0 , then rem(x) ∈ s and, since s ∈ SP , ins(x) ≺s rem(x). But then also rem(x) ∈ s0 and hence ins(x) ≺s0 rem(x). Finally, if ins(x) ≺s0 rem(e) for e ∈ Emp, then ins(x) ≺s rem(e) implying that rem(x) ∈ s and rem(x) ≺s rem(e). But then rem(x) ∈ s0 as well and rem(x) ≺s0 rem(e). This shows that SP is closed under data-projection. XX:18 Local Linearizability Assume now that s ∈ SQ and s0 is as before (with enq() and deq() for ins() and rem(), respectively). Then, as SP is closed under data-projection, s0 satisfies the pool axioms. Moreover, the queue-order axiom (Definition 2 and Table 1) also holds: Assume enq(x) ≺s0 enq(y) and deq(y) ∈ s0 . Then enq(x) ≺s enq(y) and deq(y) ∈ s. Since s ∈ SQ we get deq(x) ∈ s and deq(x) ≺s deq(y). But this means deq(x) ∈ s0 and deq(x) ≺s0 deq(y). Hence, SQ is closed under data-projection. Finally, if s ∈ SS and s0 is as before (with push() and pop() for ins() and rem(), respectively), we need to check that the stack-order axiom (Definition 2 and Table 1) holds. Assume push(x) ≺s0 push(y) ≺s0 pop(x). This implies push(x) ≺s push(y) ≺s pop(x) and since s ∈ SS we get pop(y) ∈ s and pop(y) ≺s pop(x). But then pop(y) ∈ s0 and pop(y) ≺s0 pop(x). So, SS is closed under data-projection. J Proposition 4 (LocLin Pool). Let h be a locally linearizable history wrt a pool. Then: 1. No value is duplicated, i.e., every remove method appears in h at most once. 2. There are no out-of-thin-air values, i.e., ∀x ∈ V. rem(x) ∈ h ⇒ ins(x) ∈ h ∧ rem(x)6<h ins(x). 3. No value is lost, i.e., ∀x ∈ V. ∀e ∈ Emp. ins(x) <h rem(e) ⇒ rem(x) ∈ h ∧ rem(e)6<h rem(x) and ∀x ∈ V. ∀e ∈ Emp. rem(e) <h rem(x) ⇒ ins(x) 6<h rem(e). Proof. Note that if a history h is linearizable wrt a pool, then all of the three stated properties hold, as a consequence of linearizability and the definition of SP . Now assume that h is locally linearizable wrt a pool. If rem(x) appears twice in h, then it also appears twice in some thread-induced history hT contradicting that hT is linearizable with respect to a pool. This shows that no value is duplicated. If rem(x) ∈ h, then rem(x) ∈ hT for some T and, since hT is linearizable with respect to a pool, ins(x) ∈ hT and rem(x)6<hT ins(x). This yields ins(x) ∈ h and rem(x)6<h ins(x). Hence, there are no thin-air values. Finally, if rem(e) ∈ h for e ∈ Emp then rem(e) ∈ hT for all T . Let ins(x) <h rem(e) and let T 0 be such that ins(x) ∈ hT 0 . Then ins(x) <hT 0 rem(e) and since hT 0 is linearizable with respect to a pool, rem(x) ∈ hT 0 and rem(e)6<hT 0 rem(x). This yields rem(x) ∈ h and rem(e)6<h rem(x). Similarly, the other condition holds. Hence, no value is lost. J Theorem 25 (Queue Local Linearizability). A queue concurrent history h is locally linearizable with respect to the queue sequential specification SQ if and only if 1. h is locally linearizable with respect to the pool sequential specification SP , and 2. ∀x, y ∈ V. ∀i. enq(x) <ih enq(y) ∧ deq(y) ∈ h ⇒ deq(x) ∈ h ∧ deq(y) 6<h deq(x). Proof. Assume h is locally linearizable with respect to SQ . Since SQ ⊆ SP (with suitably renamed method calls), h is locally linearizable with respect to SP . Moreover, since all hi are linearizable with respect to SQ , by Theorem 24, for all i we have ∀x, y ∈ V. enq(x) <hi enq(y) ∧ deq(y) ∈ hi ⇒ deq(x) ∈ hi ∧ deq(y) 6<hi deq(x). Assume x, y ∈ V are such that enq(x) <ih enq(y) and deq(y) ∈ h. Then enq(x) <hi enq(y) and deq(y) ∈ hi so deq(x) ∈ hi and deq(y) 6<hi deq(x). This implies deq(x) ∈ h and deq(y) 6<h deq(x). For the opposite, assume that conditions 1. and 2. hold for a history h. We need to show that (1) hi form a decomposition of h, which is clear for a queue, and (2) each hi is linearizable with respect to SQ . A. Haas et al. XX:19 By 1., each hi is linearizable with respect to a pool. Assume enq(x) <hi enq(y) and deq(y) ∈ hi . Then enq(x) <ih enq(y) ∧ deq(y) ∈ h and hence by 2., deq(x) ∈ h ∧ deq(y) 6<h deq(x). Again, as enq(x), deq(x) ∈ hi we get deq(x) ∈ hi ∧ deq(y) 6<hi deq(x). According to Theorem 24 this is enough to conclude that each hi is linearizable with respect to SQ . J Theorem 15 (Pool, Queue, & Stack, SC). For pool, queue, and stack, local linearizability is incomparable to sequential consistency. Proof. The following histories, when instantiating i() with ins(), enq(), and push(), respectively, and instantiating r() with rem(), deq(), and pop(), respectively, are sequentially consistent but not locally linearizable wrt pool, queue and stack: (a) Pool: T1 i(1) r(1) r(empty) T2 (b) Queue: r(2) T1 T2 i(1) i(2) i(1) i(2) r(1) (c) Stack: T1 r(1) T2 r(2) History (a) is already not locally linearizable wrt pool, queue, and stack, respectively, histories (b) and (c) provide interesting examples. The history in Figure 2 is locally linearizable but not sequentially consistent wrt a pool. The following histories are locally linearizable but not sequentially consistent wrt a queue and a stack, respectively: (d) Queue: T1 T2 i(1) i(2) i(3) r(1) r(2) i(4) r(4) r(3) The two thread-induced histories i(1)i(2)i(3)r(1)r(2)r(3) and i(4)r(4) are both linearizable with respect to a queue. However, the overall history has no sequential witness and is therefore not sequentially consistent: To maintain the queue behavior, the order of operations r(1) and r(2) cannot be changed. However, this implies that the value 3 instead of the value 4 would have to be removed directly after i(4). (e) Stack: XX:20 Local Linearizability qi = ins(xi,1 )rem(xi,1 ) . . . ins(xi,p )rem(xi,p )rem(xi,p+1 )rem(xi,q )rem(empty)ri ins(xi,q+1 ) . . . ins(xi,m ). Figure 6 Sequential history qi . T1 i(1) i(2) r(2) T2 i(3) r(1) r(3) The two thread-induced histories i(1)i(2)r(2)r(1) and i(3)r(3) are both linearizable with respect to a stack. The operations i(2) and r(2) prevent the reordering of operations i(1) and i(3). Therefore, the overall history has no sequential witness and hence it is not sequentially consistent. J Proposition 5 (Pool, QC). Let h be a pool history in which no data is duplicated, no thin-air values are returned, and no data is lost, i.e., h satisfies 1.-3. of Proposition 4. Then h is quiescently consistent. Proof. Assume h is a pool history that satisfies 1.-3. of Proposition 4. Let h1 , . . . , hn be histories that form a sequential decomposition of h. That is h = h1 · · · hn and the only quiescent states in any hi are at the beginning and at the end of it. Note that this decomposition has nothing to do with a thread-local decomposition. Let Mi = Mhi be the set of methods of hi , for i ∈ {1, . . . , n}. Note that the sanity conditions 1.-3. ensure that none of the following two situations can happen: rem(x) ∈ Mi , ins(x) ∈ Mj , j > i, ins(x) ∈ Mi , rem(empty) ∈ Mj , rem(x) ∈ Mk , k > j > i, Let Vi = {xi,1 , . . . , xi,m } denote the set of values in Mi ordered in a way that there is a p and q such that ins(xi,j ), rem(xi,j ) ∈ Mi for j ≤ p; rem(xi,j ) ∈ Mi for j > p, j ≤ q; and ins(xi,j ) ∈ Mi for j > q. Moreover, let ri be the number of occurrences of rem(empty) in hi . We now construct a sequential history for h, which has the form q = q1 · · · qn where each sequential history qi is a permutation of Mi shown in Figure 6. Using the observations above, it is easy to check that q is indeed a quiescent witness for h. J Theorem 16 (Pool, Queue, & Stack, QC). For pool, local linearizability is stronger than quiescent consistency. For queue and stack, local linearizability is incomparable to quiescent consistency. Proof. The following histories are quiescently consistent but not locally linearizable wrt pool, queue, and stack, respectively: (a) Pool: rem(empty) T1 T2 ins(1) rem(empty) rem(1) A. Haas et al. XX:21 (b) Queue: enq(1) T1 T2 enq(2) enq(3) deq(3) deq(2) (c) Stack: push(1) T1 T2 push(2) push(3) pop(2) pop(3) In all three histories, the only quiescent states are before and after the longest operation. Therefore, all operations in thread T2 can be reordered arbitrarily, in particular in a way such that they satisfy the sequential specification of the respective concurrent data structure. However, each of the thread-induced histories for thread T2 are not linearizable with respect to pool, queue, and stack, respectively. Therefore, none of these histories is locally linearizable. Also here history (a) suffices. On the other hand, the following histories are not quiescently consistent but locally linearizable wrt queue, and stack, respectively: (d) Queue: T1 enq(1) deq(2) enq(2) T2 deq(1) (e) Stack: T1 T2 push(1) pop(1) push(2) pop(2) In histories (d) and (e), between each two operations, the concurrent data structure is in a quiescent state. Therefore, none of the operations can be reordered and, hence, no sequential witness exists. However, all thread-induced histories are linearable and, therefore, the overall histories are locally linearizable. In particular, on a history where each pair of operations is separated by a quiescent state, i.e., there is no overlap of operations, a quiescent consistent data structure behaves as it would be linearizable with respect to its sequential specification and we see the same semantic differences to local linearizability as we see between linearizability and local linearizability. J C Case Study: Work Stealing Queues Consider a data structure D which admits two operation types: ins(x), which inserts the element x into the container, and rem(), which returns and removes an element from the container. Now imagine that the implementation uses a Work Stealing Queue (WSQ) [35]. Every thread T that uses D has its unique designated buffer QT in the WSQ. Whenever thread T calls ins(x), x is appended to the tail of QT . When T calls rem(), WSQ first XX:22 Local Linearizability T1 T2 enq(3) enq(2) enq(1) deq(1) deq(2) deq(3) Figure 7 History that is QQC but not LL. checks whether QT is non-empty; if it is, then it returns the element at the tail of QT (LIFO semantics) and removes it. Otherwise, it chooses some other QT 0 and tries to return an element from that buffer. But any time a different thread’s buffer is checked, the element to be removed is taken from the head (FIFO semantics). If T and T 0 are both trying to access the same buffer at the same time, then usual synchronization measures are taken to ensure that exactly one thread removes one element. Given this implementation, the developer of D wants to write a specification for the potential users of D. Since D is essentially a collection of deques, the developer is tempted to state that D is a deque with a particular consistency condition. However, D is not a linearizable deque because ins(x) by T followed by ins(y) by T 0 followed by rem() returns either x or y depending on whether T or T 0 calls it; i.e. rem() has ambiguous semantics. D can be seen as a sequentially consistent (SC) deque but then D does not allow many behaviors that an SC deque would allow; i.e. SC does not capture the behaviors of D tightly. Relaxed sequential specifications will not work either since D does converge to sequential semantics (of a LIFO stack) when a single thread uses it. In short, the developer will fail to capture the semantics of D in a satisfactory manner. D on the other hand is a locally linearizable deque in which rem() by T from QT 0 is treated as FIFO removal whenever T 6= T 0 and as LIFO removal whenever T = T 0 . In other words, local linearizability provides a succinct and clean representation of a well-known implementation framework (WSQ) hiding away implementation details. Compare this with the fact that even though WSQ has a queue in it, to argue its correctness it is proved to be a linearizable pool even though it has stronger semantics than a pool; i.e. linearizable pool semantics is too weak for D. Observe also that since what we have described in the example is essentially providing the illusion of using a monolithic structure which is implemented in terms of distributed components (shared memory is typically implemented on message passing), we expect local linearizability to be widely applicable. D Quiescent Consistency & Quantitative Quiescent Consistency Without going into the details of the definition of quantitative quiescent consistency we give a history in Figure 7 that is quantitatively quiescently consistent but not locally linearizable wrt a queue. Quantitative quiescent consistency allows to reorder the two insert-operations in thread T2 and thereby violates local linearizability. E Consistency Conditions for Distributed Shared Memory Decomposition per LL thread Coherence PRAM #SHs Write-Operations Ih (i) Read-Operations Oh (i) CCfSH LoD n {ins(v) ∈ h|Ti | v ∈ V } {head(vinit ) ∈ h} ∪ {head(v) ∈ h | ins(v) ∈ Ih (i)} Lin. no memory location k {ins(v) ∈ h | v ∈ V } {head(v) ∈ h | v ∈ V } SC yes thread n {ins(v) ∈ h | v ∈ V } {head(v) ∈ h|Ti | v ∈ V } SC yes a yes PC thread n {ins(v) ∈ h | v ∈ V } {head(v) ∈ h|Ti | v ∈ V } SC CC thread n {ins(v) ∈ h | v ∈ V } {head(v) ∈ h|Ti | v ∈ V } SCb yes {head(v) ∈ h|Ti | v ∈ V } c yes LC thread & memory location n·k {ins(v) ∈ h|Ti | v ∈ V } ∪ {ins(v) ∈ h | head(v) ∈ h|Ti } SC A. Haas et al. Consistency Condition SCa : SC and ins-operations are in the same order for each witness. SCb : SC and ins-operations are ordered by the transitive closure of the thread program orders and write-read pairs. SCc : SC and ins-operations from threads other than Ti can be reordered even if they are from the same thread and only logical contradictions in the local history are considered for consistency. n: number of threads, k: number of memory locations, #SHs: number of subhistories, CCfSH: consistency condition for subhistories, LoD: loss of data Table 2 Comparison of consistency conditions for a single distributed shared memory location, i.e., k = 1 XX:23 XX:24 Local Linearizability In Table 2 we compare local linearizability (LL) against the consistency conditions coherence [3], pipelined RAM (PRAM) consistency [31, 32, 41, 4], processor consistency (PC) [3, 16], causal consistency (CC) [4], and local consistency (LC) [20]. Local linearizability shares with all these consistency conditions the idea of decomposing a concurrent history into several subhistories. Coherence projects a concurrent history to the operations on a single memory location and each resulting history has to be sequentially consistent. Since sequential consistency is not compositional, coherence does not imply sequential consistency for the overall history [3] whereas local linearizability for each single memory location implies local linearizability for the overall history. In contrast to coherence and local consistency, local linearizability, PRAM consistency, PC, and CC all decompose the history into per-thread subhistories, i.e., if there are n threads then these conditions consider n subhistories and need n sequential witnesses. Coherence requires one witness per memory location and local consistency requires one witness per thread and memory location. For determining the subhistory for a thread Ti , coherence, PRAM consistency, PC, and CC consider all write-operations in a given history, i.e., Ih (i) = {ins(v) ∈ h | v ∈ V }. In contrast, local linearizability only considers the write-operations in thread Ti , i.e., Ih (i) = {ins(v) ∈ h|Ti | v ∈ V } and local consistency considers all write-operations in thread Ti as well as all write-operations whose values are read in thread Ti , i.e., Ih (i) = {ins(v) ∈ h|Ti | v ∈ V } ∪ {ins(v) ∈ h | head(v) ∈ h|Ti }. Regarding read-operations, PRAM consistency, PC, CC, and LC consider only the read-operations in thread Ti . Coherence considers all read-operations in a given history and local linearizability only considers read-operations that read the initial value vinit and read-operations that read values that were written by a write-operation in thread Ti . Reading the initial value is analogous to returning empty in a data structure. Local linearizability requires that each subhistory, i.e., thread-induced history, is linearizable with respect to the sequential specification under consideration. In contrast, coherence, PRAM consistency, PC, CC, and LC require that each subhistory is sequentially consistent (or a variant thereof) with respect to the sequential specification. However, the variants of sequential consistency that are used by these consistency conditions are vulnerable to a loss of data as discussed in Section 5 and, therefore, make these consistency conditions unsuitable for concurrent data structures. When considering PRAM consistency, the sequentialization of the write-operations of different threads might be observed differently by different threads, e.g., a thread T1 might observe all write operations of thread T2 before the write operations of thread T3 but a thread T4 might observe all write operations of T3 before the write operations of T2 . In contrast, threadinduced histories as defined by local linearizability do not involve write-operations from other threads but involve (some) read-operations performed by other threads. Like PRAM consistency, processor consistency requires for each thread Ti that the read- and write-operations performed by Ti are seen in Ti ’s program order and that the write-operations performed by other threads are seen in their respective program order. Furthermore, processor consistency also requires that two write-operations to the same memory location appear in the same order in each sequential witness of each thread even if they are from different threads [3, 16]. This additional condition makes processor consistency strictly stronger than PRAM consistency [3]. This condition also creates a similar effect as the consideration of read-operations in different threads when forming the thread-induced history in local linearizability. Causal consistency considers a causal order instead of the thread program orders alone. Like local A. Haas et al. XX:25 ` = 4, v = 4 0 `−1 0 backend ` = 5, v = 5 `−1 s: s: n: ` = 4, v = 4 max `−1 0 s: ni : ni : (b) Add new node ni (c) Adjust `, then v alive (a) Initial state Figure 8 Segment modifications throughout announce_thread(). linearizability, causal consistency matches write-read pairs across different threads. In particular, the causal order is the transitive closure of the thread program orders and write-read pairs. By considering the causal order, writes from different threads can become ordered which is not the case for local linearizability. F LLD and LL+ D Implementation Details As already mentioned, each thread inserts elements into a local backend and removes elements either from its local backend (preferred) or from other backends (fall-back) accessed through a single segment (thread-indexed array), effectively managing single-producer/multipleconsumer backends for a varying number of threads. The segment is dynamic in length (with a predefined maximum). A slot in this segment refers to a node that consists of a backend and a flag indicating whether the corresponding thread is alive or has terminated. Similar to other work [2, 21] the flag is used for logically removing the node from the segment (it stays in the segment until its backend is empty). Additionally, a (global) version number keeps track of all changes in the segment. The algorithm is divided into two parts: (1) maintaining the segment, and (2) adding and removing elements to backends. In the following we refer to the segment as s, a thread’s Ti local node as ni , the version number of the segment as v and the current length of the segment as `. The range of indices r is then defined as 0 ≤ r < `. For maintaining the segment we provide two methods announce_thread() and cleanup_thread(node) that are used to add and remove nodes to the segment. Upon removal of a node the segment is also compacted, i.e., the hole that is created by removing a node pointer is filled with the last node pointer in the segment. As nodes are added and removed the length of the segment ` and thus the range of valid indices i of the segment, 0 ≤ i < `, is updated. All changes to the segment involve incrementing the version number. More detailed, the operations for maintaining the segment and compacting it as nodes are cleaned up are: announce_thread(): Allocates a node for the thread as follows: searches for an existing node of a terminated thread and reuses it if it finds one; otherwise it creates a new node, adds the node to s, and adjusts `. In both cases it then increments v and returns the node. The creation of new node is illustrated in Figure 8. cleanup_thread(Node n): Searches for the node n in s using linear search. If it finds n at slot j, it copies the pointer of s[` − 1] to s[j], decrements `, increments v, and resets s[`] to null using the new `. If n is not found, then a concurrent thread has already performed the cleanup and the operation just returns. Figure 9 illustrates an example XX:26 Local Linearizability ` = 5, v = 5 0 ` = 5, v = 5 `−1 s: ` = 4, v = 6 `−1 0 0 s: `−1 s: backend n: dead n: backend m: m: dead (a) n at s[0] is empty and dead (b) Write s[` − 1] into s[0] Adjust ` then v Figure 9 Segment modifications throughout cleanup_thread(Node n). where initially ` = 5, the thread owning the node at s[0] is dead and the corresponding backend is empty. Note that updating the segment state is only needed when threads are joining or when backends of terminated threads become empty. We consider both scenarios as infrequent and implement the corresponding operations using locks. Alternatively those operations can be implemented using helping approaches, similar to wait-free algorithms [29]. Also note that although operations on segments are protected by locks, partial changes can be observed, e.g., a remove operation (as defined below) can observe a segment in an intermediate state with two pointers pointing to a node during cleanup. The invariant is that no change can destroy the integrity of the segment within the valid range, i.e., all slots within the range either point to a valid node or nothing (null). The actual algorithm for adding and removing elements is then defined as follows: ins(): Upon first insertion, a thread Ti gets assigned a node ni (containing backend bi ) using announce_thread(). The element is then inserted into bi . Subsequent insertions from this thread will use ni throughout the lifetime of the thread. rem(): The remove operation consists of two parts: (a) finding and removing an element and (b) cleaning up nodes of terminated threads. For (a) a thread Ti tries to get an element from its own backend in ni . If ni does not exist (because the thread has not yet performed a single ins() operation) or the corresponding backend is empty, then a different node n is selected randomly within the valid range. If the backend contained in n is empty, the operation scans all other nodes’ backends in linear fashion. However, if the version number changed during the round of scanning through all backends, the operation is restarted immediately. Note that since ` is dynamic a remove operation may operate on a range that is no longer valid. Checking the version number ensures that the operation is restarted in such a case. For (b) a thread calls cleanup_thread(n) upon encountering a node n that has its alive-flag set to false (dead) and contains an empty backend. A cleanup also triggers a restart of the remove operation. terminate(): Upon termination a thread Ti changes the alive flag of ni to false (dead). Dynamic memory used for nodes is susceptible to the ABA problem and requires proper handling to free memory. Our implementations use 16-bit ABA counters to avoid the ABA problem and refrain from freeing memory. Hazard pointers [33] can be used for solving the ABA problem as well as for freeing memory. F.1 LL+D: LLD with Linearizable Emptiness Check We call a data structure implementation Φ stateful if the remove methods of Φ can be modified to return a so-called state that changes upon an insert or a remove of an element, A. Haas et al. but does not change between two removes that return empty unless an element has been inserted in the data structure in the meantime. For stateful implementations Φ we can create the locally linearizable version with linearizable emptiness check LL+ D Φ. Michael-Scott queue [34] and Treiber stack [42] are stateful implementations, whereas LCRQ [36] is not. Also TS stack [14], and k-FIFO [28] and k-Stack [23] are stateful implementations, but the notion of a state in these data structures is huge making it unsuitable for LL+ D. For LL+ D implementations, linearizable emptiness checks are achieved via an atomic snapshot [25], just like for DQs. A detailed description of the LLD and LL+ D implementations, as well as the pseudo code, can be found in the appendix. Here, we only present the results of the experimental performance evaluation. F.2 Correctness of LL+ D I Proposition 7 (LLD and LL+ D). Let Φ be a stateful data structure implementation that is linearizable with respect to a sequential specification SΦ . Then LL+ D Φ is linearizable with respect to a pool. Proof. Proving that LL+ D Φ is linearizable with respect to pool, in particular that it has a linearizable emptiness check, follows the proof for DQ in general, see [18]: The emptiness check is performed by creating an atomic snapshot [25] of the states of all backends (stored in the states array) using the first loop (lines 28-43). If the atomic snapshot is valid (checked via the second loop, lines 46-52, in particular line 48) and all backends are empty in this atomic snapshot, then there existed a point in time during the creation of the atomic snapshot where all backends were indeed empty. Notice that since the segment is dynamic in length it can happen that some backends are not contained in the atomic snapshot. To guarantee that no elements are missed in the emptiness check the atomic snapshot is extended by the version number v of the segment. If a new backend is added to the segment during the generation of the atomic snapshot, then the version number is increased and the atomic snapshot becomes invalid (line 45). The linearization point of the remove operation that returns empty is inbetween the two loops (the last remove attempt of the first loop) if the version check and second loop go through. J F.3 LLD Pseudo Code All implementations use the interfaces depicted in Listing 1. For simplicity, the interface only mentions pool, queue, and stack. The highlighted code refers to linearizable emptiness check, i.e., it is only part of the LL+ D implementations: Methods retrieving elements (e.g. rem) are assumed (or modified when possible) to also return a State object that uniquely identifies the state of the data structure with respect to methods inserting elements (e.g. ins). The same state can be accessed via the get_state() observer method. Listing 2 illustrates the pseudo-code for maintaining the segment. The backend on line 2 can either be declared as Stack or Queue as defined in Listing 1 (or any other linearizable data structure). Listing 3 shows the pseudo-code for LL+ D. When removing the highlighted code, we obtain the code for LLD. Each thread maintains its own backend, enclosed in a thread-local node (line 3), for insertion. The local backend is always accessed through get_local_node (line 5). This method also makes sure that a thread is announced (line 7) upon first insertion and acquires a node. An ins() operation then always uses a thread’s local backend XX:27 XX:28 Local Linearizability 1 2 3 4 5 Pool { < Element , State > rem () ; v o i d ins ( Element e ) ; State get_state(); } 6 7 8 9 10 11 12 Queue : Pool { < Element , State > dequeue () ; v o i d enqueue ( Element e ) ; v o i d ins ( Element e ) = > enqueue ( e ) ; < Element , State > rem () = > dequeue () ; } 13 14 15 16 17 18 19 Stack : Pool { < Element , State > pop () ; v o i d push ( Element e ) ; v o i d ins ( Element e ) = > push ( e ) ; < Element , State > rem () = > pop () ; } Listing 1 Pool, queue, and stack interfaces (line 13 and 14) for insertion. For removing an element in rem(), a thread tries to remove an element from its local backend first (line 19-23). If no element can be found, all backends in the valid range are searched in a linear fashion, starting from a random index. The highlighted code (lines 46-52) illustrates checking the atomic snapshot for LL+ D. F.4 LLD with Observer Methods We have implemented LLD variants of (strict and relaxed) queue and stack implementations. None of our LLD implementations involves observer methods, but the LLD algorithm can easily be extended to support observer methods: A data observer on LLD Φ (independently of which thread performs it) amounts to a data observer on any ΦT . A local shape observer on LLD Φ performed by thread T executes the shape observer on ΦT . A global shape observer on LLD Φ executes the shape observer on each backend ΦT and produces an aggregate value. G Additional Implementations We now present and evaluate additional algorithms that provide locally linearizable variants of queues and stacks, obtained by modifying relaxed k-out of order queues and stacks [23, 28] in a way that makes them sequentially correct. We have also tried another generic implementation, related to the construction in [9], that implements a flat-combining wrapper with sequential (to be precise, single-producer multiple-consumer) backends. In our initial experiments the performance of such an implementation was not particularly promising. G.1 Locally Linearizable k-FIFO Queue and k-Stack k-FIFO queues [28] and k-Stacks [23] are relaxed queues and stacks based on lists of segments where each segment holds k slots for elements, effectively allowing reorderings of elements of up to k − 1. The list of segments is implemented by a variant of Michael-Scott queue [34] for A. Haas et al. 1 2 3 4 Node { Pool backend ; Bool alive ; } XX:29 // Any linearizable data structure . 5 6 7 8 9 Segment { Node nodes [ MAX_THREADS ]; Int l = 0; Int version = 0; 10 // Returns all indexes between 0 and l ( exclusive ) in random order . [ Int ] range () ; 11 12 13 // Announces a node in the buffer , effectively adding it to nodes_ , // adjusting l , and changing the version . Node a nn ou nc e _t hr ea d () { segment_lock () ; // Protecting against concurrent announce or cleanup operations . Node n = find_ dead_nod e () ; i f n == null { n = Node ( b : Backend () ) ; nodes [ l ] = n ; l ++; } n . alive = true ; version ++; segme nt_unloc k () ; r e t u r n n; } 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 // Removes a node from the buffer , effectively removing it from nodes_ , // adjusting l , and changing the version . v o i d clea nup_thre ad ( Node n , Int old_version ) { segment_lock () ; // Protecting against concurrent announce or cleanup operations . <j , error > = f i n d _ n o d e _ i n _ s e g m e n t ( n ) ; i f error || n . alive || old_version != version { segm ent_unlo ck () ; return ; } nodes [ j ] = nodes [l -1]; l - -; version ++; nodes [ l ] = null ; segme nt_unloc k () ; } 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 } Listing 2 Node and segment structure for LLD and LL+ D (queue or stack) k-FIFO and a variant of Treiber stack [42] for k-Stack. Insert and remove methods operate on the segments ignoring any order of elements within the same segment. Segments used for insertion and removal are identified by insertion and removal pointers, respectively. For queues, elements are removed from the oldest segment and inserted into the mostrecent not-full segment. Upon trying to remove an element from an empty segment the segment is removed and the removal pointer advanced to the next segment. Upon trying to insert an element into a full segment a new segment is appended and the insertion pointer is advanced to this new segment. Similarly (but different) for a stack, removal and insertion operate on the most-recent segment, i.e., removal and insertion pointer are synonyms and identify the same segment at all times. Again, upon trying to remove an element from an empty segment the segment is removed and the removal pointer advanced to the next segment. Upon trying to insert an element into a full segment a new segment is prepended and the insertion pointer is set to this new segment. k-FIFO queues and k-Stacks are relaxed queues and stacks that are: (1) linearizable with respect to k-out-of-order queue and stack [23], respectively; (2) linearizable with respect to a pool [23, 28]; (3) not locally linearizable with respect to queue and stack, respectively, for k ≥ 1 since reordering elements that are inserted in the same segment (even sequentially by XX:30 Local Linearizability 1 2 3 DynamicLocallyLinearizableDQ { Segment s ; thread_local Node local_node ; 4 Node get_loca l_node ( Bool c r e a t e _ i f_ a b s e n t ) { i f ( c r e a t e _ i f _ a b s e n t ) && ( local_node == null ) { local_node = s . an n ou nc e_ t hr ea d () ; } r e t u r n local_node ; } 5 6 7 8 9 10 11 v o i d ins ( Element e ) { n = get_loca l_node ( cr e a t e _ i f _ a b s e n t : true ) ; n . backend . ins ( e ) ; } 12 13 14 15 16 Element rem () { // Fast path of retrieving an element from the thread - local backend . n = get_loca l_node ( cr e a t e _ i f _ a b s e n t : false ) ; i f n != null { <e , state > = n . backend . rem () ; i f e != null { r e t u r n e ; } } w h i l e true { retry = false ; old_version = s . version ; range = s . range () ; f o r i in range { n = s . nodes [ i ]; i f old_version != s . version { retry = true ; b r e a k ; } Bool alive = n . alive ; <e , state > = n . backend . rem () ; i f e == null { states[i] = state; i f ! alive { s . c leanup_ thread (n , old_version ) ; retry = true ; b r e a k ; } } else { r e t u r n e; } } i f retry { c o n t i n u e ; } i f old_version != s . version { c o n t i n u e ; } f o r i in range { n = s . nodes [ i ]; i f n == null || n . backend . get_state () != states [ i ] { retry = true ; break ; } } i f retry { c o n t i n u e ; } 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 r e t u r n null ; // Empty case . 55 } 56 } 57 58 // Called upon thread termination . v o i d terminate () { n = get_loca l_node ( c r e a t e _ i f _ a b s e n t : false ) ; i f n != null { n . alive = false ; } } 59 60 61 62 63 64 } Listing 3 LLD and LL+ D (queue and stack) a single thread) is allowed, see the histories (b) and (c) in the proof of Theorem 15; and (4) not sequentially consistent with respect to queue and stack, as shown by the histories (d) and (e) in the proof of Theorem 15 that are k-FIFO and k-Stack histories, respectively, for k ≥ 1. A. Haas et al. XX:31 We now present LL k-FIFO and LL k-Stack, modifications of k-FIFO and k-Stack, that enforce local linearizability by ensuring that no thread inserts more than once in a single segment. Assuming that segments are unique (by tagging pointers), LL k-FIFO remembers the last used insertion pointer per thread. For LL k-Stack the situation is more subtle as (due to the stack semantics) segments can be reached multiple times for insertion and removal. Figure 10 illustrates an example where the top segment of a k-Stack is reached multiple times by the same thread (T1 ). Since in the general case all segments could be reached multiple times by a single thread it is required to maintain the full history of each thread’s insertions. Assuming the maximum number of threads is known in advance, a bitmap is used to maintain the information in which segment a thread has already pushed a value. One can similarly implement a locally linearizable version of the Segment Queue [2]. T1 ins(1) ins(3) ins(4) ins(2) T2 rem(3) rem(2) 2 ⊥ 1 1 T1 segment state insert/remove ⊥ ⊥ 2 ⊥ 2 ⊥ 4 ⊥ 1 1 3 1 1 ⊥ Figure 10 LL k-Stack run (k = 2). T1 can only insert in uncolored segments and needs to prepend a new segment (for insertion) otherwise. G.1.1 k-FIFO Queue and LL k-FIFO Queue Pseudo Code. Listing 4 shows the pseudo code for LL k-FIFO queue. Again we highlight the code we added to the original pseudo code [28]. Similar to the locally linearizable k-Stack each thread inserts at most one element into a segment. However, in the k-FIFO queue we do not need flags in each segment to achieve this property. It is sufficient to remember the last segment used for insertion for each thread (set_last_tail; line 15). For each enqueue the algorithm checks whether the executing thread has already used this segment for enqueueing an element (get_last_tail; line 5). If the segment has already been used, the thread tries to append a new segment (effectively adding a new tail). G.1.2 Correctness Proof of LL k-FIFO Queue. Having Theorem 25, the proof of correctness of LL k-FIFO queue is easy. I Theorem 21 (Correctness of LL k-FIFO). LL k-FIFO queue presented in Listing 5 is locally linearizable. Proof. Using Theorem 25, as a first proof obligation we have to show that any history h of the LL k-FIFO queue is locally linearizable with respect to the pool sequential specification SP . This proof is analogous to the proof that any history of the LL k-Stack is locally linearizable with respect to the pool sequential specification SP , and is therefore postponed until the corresponding LL k-Stack theorem. What remains to show is that ∀x, y ∈ V. ∀i. enq(x) <ih enq(y) ∧ deq(y) ∈ h ⇒ deq(x) ∈ h ∧ deq(y) 6<h deq(x) XX:32 Local Linearizability 1 2 3 4 5 6 7 LocallyLinearizableKFIFOQueue { enqueue ( item ) : w h i l e true : tail_old = get_tail () ; i f get_last_tail ( thread_id ) == tail_old : advance_tail ( tail_old , k ) ; c o n t i n u e ; // Restart while loop . head_old = get_head () ; item_old , index = f in d _e mp ty _ sl ot ( tail_old , k ) ; i f tail_old == get_tail () : i f item_old . value == EMPTY : item_new = atomic_value ( item , item_old . version + 1) ; i f CAS (& tail_old - > segment [ index ] , item_old , item_new ) : i f committed ( tail_old , item_new , index ) : 8 9 10 11 12 13 14 set_last_tail ( thread_id , tail_old ) ; 15 r e t u r n true ; else: advance_tail ( tail_old , k ) ; 16 17 18 19 bool committed ( tail_old , item_new , index ) : i f tail_old - > segment [ index ] != item_new : r e t u r n true ; head_current = get_head () ; tail_current = get_tail () ; item_empty = atomic_value ( EMPTY , item_new . version + 1) ; i f i n _ q u e u e _ a f t e r _ h e a d ( tail_old , tail_current , head_current ) : r e t u r n true ; e l s e i f not_in_queue ( tail_old , tail_current , head_current ) : i f ! CAS (& tail_old - > segment [ index ] , item_new , item_empty ) : r e t u r n true ; e l s e : // in queue at head head_new = atomic_value ( head_current . value , head_current . version + 1) ; i f CAS (& head , head_current , head_new ) : r e t u r n true ; i f ! CAS (& tail_old - > segment [ index ] , item_new , item_empty ) : r e t u r n true ; r e t u r n false ; 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 item dequeue () : w h i l e true : head_old = get_head () ; item_old , index = find_item ( head_old , k ) ; tail_old = get_tail () ; i f head_old == get_head () : i f item_old . value != EMPTY : i f head_old . value == tail_old . value : advance_tail ( tail_old , k ) ; item_empty = atomic_value ( EMPTY , item_old . version + 1) ; i f CAS (& head_old [ index ] , item_old , item_empty ) : r e t u r n item_old . value ; else: i f head_old . value == tail_old . value && tail_old . value == get_tail () : r e t u r n null ; advance_head ( head_old , k ) ; 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 } Listing 4 Locally Linearizable k-FIFO Queue Assume enq(x) <ih enq(y). This means that x and y were enqueued by the same thread i and therefore inserted into different segments. Moreover, the segment of x is closer to the head of the list than the segment of y. A deq(y) method call can remove y only if the segment of y is the head segment. The segment of y can only become the head segment if all segments closer to the head of the list get empty. This means that also the segment of x has to become empty. Therefore there has to exist a deq(x) method call which removes x from the segment, and deq(x) 6<h deq(y). J A. Haas et al. G.1.3 k-Stack and LL k-Stack Pseudo Code. Listing 5 shows the pseudo code for LL k-Stack. The highlighted code is the code we added to the original pseudo code [23] to achieve local linearizability. The difference to the original algorithm is that a thread inserts at most one element into a segment. To achieve this property each segment in the k-stack contains a flag per thread which is set when an element is inserted into the segment (mark_segment_as_used; line 14 and line 60). If a thread encounters a segment where its flag is already set, the thread does not insert its element into that segment but tries to prepend a new segment (is_segment_marked; line 50). Otherwise the element is inserted into the existing segment and the flag of the thread in that segment is set. 1 2 LocallyLinearizableKStack { SegmentPtr top ; 3 4 5 6 v o i d init () : new_ksegment = calloc ( s i z e o f ( ksegment ) ) ; top = atomic_value ( new_ksegment , 0) ; 7 8 9 10 11 12 13 14 15 16 17 bool t r y _ a d d _ n e w _ k s e g m e n t ( top_old , item ) : i f top_old == top : new_ksegment = calloc ( s i z e o f ( ksegment ) ) ; new_ksegment - > next = top_old ; new_ksegment - > s [0] = atomic_value ( item , 0) ; // Use first slot for item . top_new = atomic_value ( new_ksegment , top_old . ver +1) ; m a r k _ s e g m e n t _ a s _ u s e d ( top_new ) ; i f CAS (& top , top_old , top_new ) : r e t u r n true ; r e t u r n false ; 18 19 20 21 22 23 24 25 26 27 v o i d t r y _ r e m o v e _ k s e g m e n t ( top_old ) : i f top_old == top : i f top_old - > next != null : a t o m i c _ i n c r e me n t (& top_old - > remove ) ; i f empty ( top_old ) : top_new = atomic_value ( top_old - > next , top_old . ver +1) ; i f CAS (& top , top_old , top_new ) : return ; a t o m i c _ d e c r e me n t (& top_old - > remove ) ; 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 bool committed ( top_old , item_new , index ) : i f top_old - > s [ index ] != item_new : r e t u r n true ; e l s e i f top_old - > remove == 0: r e t u r n true ; e l s e : // top_old - > remove >= 1 item_empty = atomic_value ( EMPTY , item_new . ver +1) ; i f top_old != top : i f ! CAS (& top_old - > s [ index ] , item_new , item_empty ) : r e t u r n true ; else: top_new = atomic_value ( top_old . val , top_old . ver +1) ; i f CAS (& top , top_old , top_new ) : r e t u r n true ; i f ! CAS (& top_old - > s [ index ] , item_new , item_empty ) : r e t u r n true ; r e t u r n false ; 46 47 48 49 50 51 52 53 54 55 56 57 58 59 v o i d push ( item ) : w h i l e true : top_old = top ; i f s e g m e n t _ i s _ m a r k e d ( top_old ) : i f t r y _ a d d _ n e w _ k s e g m e n t ( top_old , item ) ; r e t u r n true ; c o n t i n u e ; // Restart while loop . item_old , index = f i nd _e mp t y_ sl ot ( top_old ) ; i f top_old == top : i f item_old . val == EMPTY : item_new = atomic_value ( item , item_old . ver +1) ; i f CAS (& top_old - > s [ index ] , item_old , item_new ) : i f committed ( top_old , item_new , index ) : XX:33 XX:34 Local Linearizability m a r k _ s e g m e n t _ a s _ u s e d ( old_top ) ; 60 r e t u r n true ; 61 else: i f t r y _ a d d _ n e w _ k s e g m e n t ( top_old , item ) : r e t u r n true ; 62 63 64 65 item pop () : w h i l e true : top_old = top ; item_old , index = find_item ( top_old ) ; i f top_old == top : i f item_old . val != EMPTY : item_empty = atomic_value ( EMPTY , item_old . ver +1) ; i f CAS (& top_old - > s [ index ] , item_old , item_empty ) : r e t u r n item_old . val ; else: i f only_ksegment ( top_old ) : i f empty ( top_old ) : i f top_old == top : r e t u r n null ; else: t r y _ r e m o v e _ k s e g m e n t ( top_old ) ; 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 } Listing 5 Locally Linearizable k-Stack G.1.4 Correctness Proof of LL k-Stack. The local linearizability proof of LL k-Stack is more involved, but very interesting. We use a theorem from the published artifact of [14], which has been mechanically proved in the Isabelle HOL theorem prover. I Theorem 22 (Empty Returns for Stack). Let h be a history, and let h0 be the projection of h to Σ \ pop(empty). If h is linearizable with respect to the sequential specification SP of a pool (see Definition 2), and h0 is linearizable with respect to the sequential specification SS of a stack (see Definition 2), then h is linearizable with respect to SS . Proof. Here we repeat the key insights of the proof and leave out technical details. A complete and mechanized version of the proof is available in the published artifact of [14]. As h is linearizable with respect to SP , and h0 is linearizable with respect to SS , there exists a sequential history s ∈ SP such that s is a linearization of h, and there exists a sequential history s0 ∈ SS such that s0 is a linearization of h0 . We show that we can construct a sequential history t ∈ SS such that t is a linearization of h. The linearization t is constructed as follows: the position of pop(empty) in s is preserved in t. This means for any method call m ∈ s that if pop(empty) ≺s m, then also pop(empty) ≺t m, and if m ≺s pop(empty), then also m ≺t pop(empty). Moreover, if two method calls m, n ∈ s are ordered as m ≺s pop(empty) ≺s n and therefore by transitivity it holds that m ≺s n, then also m ≺t n. For all other method calls the order of s0 is preserved. This means for any two method calls m, n ∈ s with m ≺s0 n, that if for all pop(empty) it holds that pop(empty) ≺s m if and only if pop(empty) ≺s n, then m ≺t n. By construction, the history t is sequential and a permutation of h. Next we show that t is a linearization of h by showing that t preserves the precedence order of h. Also by construction, it holds that if m ≺t n for any two method calls m, n ∈ t, then also either m ≺s n or m ≺s0 n. Both s and s0 are linearizations of h and h0 , respectively. Therefore it cannot be for any m, n with m <h n that n ≺s m or n ≺s0 m, it can also not be that n ≺t m. Since t is sequential, this means that t preserves the precedence order of h. Next we show that t ∈ SP according to Definition 2: A. Haas et al. (1) Every method call, but pop(empty), appears in s at most once: This is guaranteed since t is a permutation of s, and s ∈ SP . (2) If pop(x) appears in t, then also push(x) does and push(x) ≺t pop(x): again, since t is a permutation of s and s ∈ SP , if pop(x) ∈ t, then also push(x) ∈ t. Since push(x) ≺s pop(x) and push(x) ≺s0 pop(x) (because both s and s0 are in SP ) it also holds that push(x) ≺t pop(x), as we argued already above. (3) ∀x ∈ V. push(x) ≺t pop(empty) ⇒ pop(x) ≺t pop(empty): this property is satisfied trivially as all pop(empty) operations are ordered the same in t as in s, and s ∈ SP . It only remains to check that all elements are removed in a stack fashion. We have to show the following: ∀x, y ∈ V. push(x) ≺t push(y) ≺t pop(x) ⇒ pop(y) ∈ t ∧ pop(y) ≺t pop(x) First we show that if push(x) ≺t push(y) ≺t pop(x), then also push(x) ≺s0 push(y) ≺s0 pop(x). We do this by showing that there cannot exist a pop(empty) such that push(x) ≺t pop(empty) ≺t push(y) or push(y) ≺t pop(empty) ≺t pop(x). Assume, towards a contradiction, push(x) ≺t pop(empty) ≺t push(y). By the transitivity of ≺t this implies that push(x) ≺t pop(empty) ≺t pop(x), which contradicts our observation above that t ∈ SP . Therefore push(x) ≺t pop(empty) ≺t push(y) is not possible, and for the same reason also push(y) ≺t pop(empty) ≺t pop(x) is not possible. Now, as s0 ∈ SS and push(x) ≺s0 push(y) ≺s0 pop(x), there has to exist a pop(y) ∈ s0 with pop(y) ≺s0 pop(x). For the same reason as above it cannot be that pop(x) ≺s pop(empty) ≺s pop(y). Therefore pop(y) and pop(x) are ordered in t the same as in s0 , i.e. pop(y) ≺t pop(x), and therefore t ∈ SS . J I Theorem 23 (Correctness of LL k-Stack). The LL k-Stack algorithm presented in Listing 5 is locally linearizable. Proof. We have to show that every history h of LL k-Stack is locally linearizable with respect to the sequential specification SS defined in Definition 2. This means that we have to show that every thread-induced history hi of h is linearizable with respect to SS for any thread i. Having Theorem 22 we only have to show that hi is linearizable with respect to the sequential specification SP of a pool (defined in Definition 2), and that h0 i , the projection of hi to Σ \ pop(empty), is linearizable with respect to the sequential specification SS of a stack. We start with the proof that hi is linearizable with respect to SP . We construct a sequential history si from hi by identifying the linearization points of the push and pop method calls of the LL k-Stack. This means that two method calls m, n are ordered in si , m ≺si n if the linearization point of m is executed before the linearization point of n in hi . The linearization point of push method calls is either the successful insertion of a new segment in line 15, or the last successful CAS which writes the element into a segment slot in line 58. The linearization point of pop method calls is the successful CAS which removes an element from its segment slot in line 73. For the linearization point of pop(empty) we take the linearization point of the call to empty in line 77. The empty method creates an atomic snapshot [25] of the top segment. This atomic snapshot is the state of the top segment at some point (i.e. linearization point of empty) within the execution of empty. If empty returns true, then there exists no element in the atomic snapshot of the segment. XX:35 XX:36 Local Linearizability Next we show that si is in SP as defined in Definition 2. (1) Since there exists exactly one linearization point per method call, every method call, but rem(empty), appears in si at most once. (2) If pop(x) appears in si , then it reads x in a slot of the top segment before its linearization point. Since only push method calls write their elements into segment slots, there has to exist a push(x) which wrote x into that slot. Therefore the linearization point of push(x) is always before the linearization point of pop(x), and therefore push(x) ≺si pop(x). (3) Segments are only removed from the list of segments when they become empty. The call to committed guarantees that elements are not inserted into segments which are about to be removed. A pop method calls empty only if there is a single segment left in the LL k-Stack and no element was found in that segment in find_item. Now assume a push(x) method call inserts an element x which is missed by find_item. If push(x) wrote x into a segment before the linearization point of pop(empty) and the segment was not the last segment, then the top segment changed since pop(empty) searched for an element and therefore the check in line 70 would fail. If push(x) wrote x into the last segment of the LL k-Stack, then a pop(x) method call removed x from the segment because otherwise x would be in the atomic snapshot of empty and therefore empty would return false. Therefore, if push(x) ≺si pop(empty), then also pop(x) ≺si pop(empty). Therefore si is in the sequential specification SP of a pool. Next we show that h0 i is linearizable with respect to SS . We construct again a sequential history s0 i from h0 i by identifying the linearization points of the push and pop method calls of LL k-Stack. The linearization point of the push operations is the successful insertion of a new segment in line 15 if it is executed, or the reading of the empty slot (line 54) in the last (and therefore successful) iteration of the main loop. The linearization point of a pop operation is the reading of a non-empty slot (line 69) in the last (and therefore successful) iteration of the main loop. There do not exist any pop(empty) method calls in s0 i . Since we assume a sequentially consistent memory model, these read operations define a total order on the LL k-Stack method calls in h0 i . First we show that s0 i is in the sequential specification SP of a pool as defined in Definition 2. (1) Since there exists exactly one linearization point per method call, every method call appears in s0 i at most once. (2) If pop(x) appears in s0 i , then it read x in a slot of the top segment at its linearization point. Since only push operations write their elements into segment slots, there has to exist a push(x) which wrote x into that slot. The linearization point of push(x) is always before x is written into a segment slot. Therefore push(x) ≺s0 i pop(x). (3) Since there exist no pop(empty) operations in s0 i the third pool condition is trivially correct. Next we show that s0 i also provides a stack order, which means that we have to show that ∀x, y ∈ V. push(x) ≺s0 i push(y) ≺s0 i pop(x) ⇒ pop(y) ∈ s0 i ∧ pop(y) ≺s0 i pop(x). We start by observing some invariants. A. Haas et al. 1. A thread never inserts elements into the same segment twice. This is guaranteed by the call to segment_is_marked. 2. Between the linearization point of a push and the time it writes its element into a segment the segment the element gets written into is not removed: if the push operation inserts a new segment this is trivially correct. If the push operation writes the element into an existing segment, then the call to committed in line 59 guarantees that the segment was not removed. 3. At the time of the linearization point of the pop, which is the time when the pop reads the non-empty slot (line 69) in the last (and therefore successful) iteration, the pop reads the non-empty slot from the top segment. This is guaranteed by the check in line 70. Now assume there exist the operations push(x), push(y) and pop(x) in s0 i and push(x) ≺s0 i push(y) ≺s0 i pop(x). Since push(x) and push(y) are both in s0 i , this means that both operations are executed by the same thread. Therefore, according to Invariant 1., x and y get inserted into different segments, with the segment y on top of the segment of x. The linearization point of pop(x) cannot be before y is written into its segment because according to Invariant 2. the segment y gets inserted into does not get removed between the linearization point of push(y) and the time y is written into the segment. With Invariant 3. this means that x is unaccessible for pop(x) before y gets written into a segment. Also because of the third invariant the top segment changes between the insertion of y and the linearization point of pop(x). Next we observe that as long as y is not removed, no segment below the segment of y can become the top segment. Therefore for the segment of x to become the top segment so that pop(x) can remove it, y has to be removed first. Only a pop(y) can remove y, and therefore there exists a pop(y) and the linearization point of pop(y) is before the linearization point of pop(x). Hence s0i is in the sequential specification of a stack. Using Theorem 22 this means that LL k-Stack in listing 5 is locally-linearizable with respect to the sequential specification of a stack. J H Additional Experiments We also evaluate the implementations on another Scal workload, the sequential alternating workload. However, we note that in this workload in the locally linearizable implementations threads only access their local backends, so no wonder they perform perfectly well. Mixed Workload. In order to evaluate the performance and scalability of mixed workloads, i.e., workloads where threads produce and consume values, we exercise the so-called sequential alternating workload in Scal. Each thread is configured to execute 106 pairs of insert and remove operations, i.e., each insert operation is followed by a remove operation. As in the producer-consumer workload, the contention is controlled by adding a busy wait of 5µs. The number of threads is configured to range between 1 and 80. Again we report the number of data structure operations per second. Data structures that require parameters to be set are configured like in the producerconsumer benchmark. Figure 11 shows the results of the mixed workload benchmark for all considered data structures. The MS queue and Treiber stack do not perform and scale for more than 10 threads. As in the producer-consumer benchmark, LCRQ and TS Stack either perform competitively XX:37 32 28 24 20 16 12 8 4 0 1 10 20 30 40 50 60 70 80 million operations per sec (more is better) Local Linearizability million operations per sec (more is better) XX:38 32 28 24 20 16 12 8 4 0 1 10 20 30 40 50 60 70 80 number of threads number of threads MS LCRQ k-FIFO LL+D MS LLD LCRQ LLD k-FIFO 1-RA DQ Queues, LL queues, and “queue-like” pools Treiber TS Stack k-Stack LL+D Treiber LLD TS Stack LLD k-Stack 1-RA DS Stacks, LL stacks, and “stack-like” pools Figure 11 Performance and scalability of sequential alternating microbenchmarks with an increasing number of threads on a 40-core (2 hyperthreads per core) machine with their k-out-of-order relaxed counter parts k-FIFO and k-Stack or even outperform and outscale them (in the case of LCRQ, that even outperforms the pool). LL+ D MS queue, LLD LCRQ, and LL+ D Treiber stack perform very well and scale (nearly) linearly in the number of threads. A surprising result is that LLD k-FIFO performs poorly in this experiment. The reason is that k-FIFO performs poorly when it is almost empty, and in this experiment each backend instance of LLD k-FIFO contains at most one element at any point in time. The k-Stack performs better on a nearly-empty state. The benefit of trying to perform a local operation first in the LLD algorithms is visible when comparing to 1-RA DQ and DS that do not utilize a local fast path. I Verifying Local Linearizability In general, verifying local linearizability amounts to verifying linearizability for a set of smaller histories. This might enable verification in a modular/compositional way. Aside from this, it is important to mention (again) that for our locally linearizable data structures in Section 6 built from linearizable building blocks, the correctness proofs are straightforward assuming the building blocks are proven to be linearizable. In addition, for queue we can state an “axiomatic" verification theorem for local linearizability in the style of [24, 10], whose main theorem we recall next (with a slight reformulation). I Theorem 24 (Queue Linearizability). A queue concurrent history h is linearizable wrt the queue sequential specification SQ if and only if 1. h is linearizable wrt the pool sequential specification SP (with suitable renaming of method calls), and 2. ∀x, y ∈ V. enq(x) <h enq(y) ∧ deq(y) ∈ h ⇒ deq(x) ∈ h ∧ deq(y) 6<h deq(x). J We note that an analogous change to the axioms in the sequential specification of a pool and a stack does not lead to a characterisation of linearizability for pools and stacks, cf. [14]. An axiomatic characterisation of linearizability for pools and stacks would involve an infinite number of axioms/infinite axioms, due to the need to prohibit infinitely many problematic shapes, cf. [7]. We are now able to state the queue-local-linearizability-verification result. A. Haas et al. I Theorem 25 (Queue Local Linearizability). A queue concurrent history h is locally linearizable wrt the queue sequential specification SQ if and only if 1. h is locally linearizable wrt the pool sequential specification SP (after suitable renaming of method calls), and 2. ∀x, y ∈ V. ∀T. enq(x) <Th enq(y) ∧ deq(y) ∈ h ⇒ deq(x) ∈ h ∧ deq(y) 6<h deq(x). J XX:39
8cs.DS
Inference for Continuous Time Random Maxima with Heavy-Tailed Waiting Times arXiv:1802.05218v2 [math.ST] 17 Feb 2018 Katharina Hees ∗ University of Dortmund and Smarak Nayak † National Australia Bank and Peter Straka ‡ UNSW Sydney February 20, 2018 Abstract In many complex systems of interest, inter-arrival times between events such as earthquakes, trades and neuron voltages have a heavy-tailed distribution. The set of event times is fractal-like, being dense in some time windows and empty in others, a phenomenon dubbed “bursty” in the physics literature. Renewal processes with heavy-tailed waiting times reproduce this bursty behaviour. This article develops an inference method for “Continuous Time Random Maxima” (also called “Max-renewal processes”), which assume i.i.d. magnitudes at the renewal events and model the largest cumulative magnitude. For high thresholds and infinite-mean waiting times, we show that the times between threshold crossings are Mittag-Leffler distributed, i.e. form a fractional Poisson Process. Exceedances of thresholds are known to be Generalized Pareto distributed, according to the Peaks Over Threshold approach. We model threshold crossing times and threshold exceedances jointly and provide graphical means of estimating model parameters. We show that these methods yield meaningful insights on real-world datasets. Keywords: heavy tails, renewal process, extreme value theory, peaks over threshold ∗ Katharina Hees ([email protected]) was supported by the DAAD co-financed by the German Federal Ministry of Education and Research (BMBF). The authors would like to thank Peter Scheffler for insights on stochastic process limits for CTRMs, and Gurtek Gill who helped create the MittagLeffleR R-package. † ([email protected]) ‡ Corresponding author ([email protected]). Peter Straka was supported by the Discovery Early Career Research Award DE160101147 on the Project “Predicting Extremes when Events Occur in Bursts” by the Australian Research Council. 1 1 Introduction Time series displaying temporally inhomogeneous behaviour have received strong interest in the recent statistical physics literature (Barabási 2005, Oliveira & Barabási 2005, Vasquez et al. 2006, Vazquez et al. 2007, Omi & Shinomoto 2011, Min et al. 2011, Karsai et al. 2011, Bagrow & Brockmann 2013), and have been observed in the context of earthquakes, sunspots, neuronal activity and human communication (see Karsai et al. 2012, Vajna et al. 2013, and Meerschaert & Stoev (2008) for a list of references). Such time series exhibit high activity in some ‘bursty’ intervals, which alternate with other, quiet intervals. Although several mechanisms are plausible explanations for bursty behaviour (most prominently selfexciting point processes (Hawkes 1971)), there seems to be one salient feature which very typically indicates the departure from temporal homogeneity: a heavy-tailed distribution of waiting times (Vasquez et al. 2006, Karsai et al. 2012, Vajna et al. 2013). As we show below in simulations, a simple renewal process with heavy-tailed waiting times can capture this type of dynamics. For many systems, the renewal property is appropriate; a simple test of the absence of correlations in a succession of waiting times can be undertaken by randomly reshuffling the waiting times (Karsai et al. 2012). Often a magnitude, or mark can be assigned to each event in the renewal process, such as for earthquakes, sun flares or neuron voltages. Extreme value theory provides models for the distribution of the events with the largest magnitude. A commonly made assumption is that times between events are either fixed or light-tailed, and this entails that the times at which a (high) threshold is crossed form a Poisson process (Beirlant et al. 2006). In the heavy-tailed waiting time scenario, as we will see, threshold crossing times form a fractional Poisson process, which generalizes the standard Poisson process. Maxima of events which occur according to a renewal process with heavy-tailed waiting times have been studied under the names “Continuous Time Random Maxima process” (CTRM) (Benson et al. 2007, Meerschaert & Stoev 2008, Hees & Scheffler 2016, 2017), “Max-Renewal process” (Silvestrov 2002, Silvestrov & Teugels 2004, Basrak & Špoljarić 2014), and “Shock process” (Esary & Marshall 1973, Shanthikumar & Sumita 1983, 1984, 1985, Anderson 1987, Gut 1999). The existing literature focuses on probabilistic results surrounding these models. In this work, however, we introduce a method of inference for 2 x J7 J4 J5 J2 J3 J8 J1 W1 J9 J6 W2 W3 W4 W5 W6 W7 W8 W9 t Figure 1: A CTRM sample path. this type of model, a problem which has seemingly received little attention so far, even by the statistical community. We review the CTRM, or max-renewal model, in Section 2, and derive a scaling limit theorem for inter-exceedance times in Sections 3 & 4. A statistical procedure to estimate model parameters via stability plots is outlined in Section 5, and diagnostic plots for model criticism are discussed in Section 6. In Section 7, we give case studies for simulated data as well as for two real-world datasets, with a discussion in Section 8. All statistical computations have been done in R, and all code, data, as well as the source code for this manuscript has been organized into an R software package, available at https://github.com/strakaps/CTRM. 2 CTRMs Continuous Time Random Maxima (CTRM), or Max-Renewal processes, track the largest event in a renewal sequence of events (Basrak & Špoljarić 2014, Meerschaert & Stoev 2008, Hees & Scheffler 2016): Definition (CTRM): Let (W, J), (W1 , J1 ), (W2 , J2 ), . . . be i.i.d. pairs of random variables, where the Wk > 0 are interpreted as the waiting times or inter-arrival times and 3 Jk ∈ [xL , xR ] as the event magnitudes or marks (xL ∈ [−∞, +∞), xR ∈ (−∞, +∞]). The renewal process associated with the Wk is N (t) = max{n : W1 + . . . + Wn ≤ t}, and the running maximum is M (n) := Wn k=1 Jk . Then the process N (t) V (t) = M (N (t)) = _ Jk , t ≥ 0. k=1 is called a CTRM (Continuous Time Random Maxima) process. If W and J are independent, the CTRM is said to be uncoupled. We let M (0) = xL . Figure 1 shows a CTRM sample path. The alternative case where one considers the maximum of the first (N (t) + 1)’s event is called an OCTRM process (Overshooting Continuous Time Random Maxima; or Model II by Shanthikumar & Sumita (1983)). The conceptual difference between CTRM and OCTRM is the order of waiting times and events, which is W1 , J1 , W2 , J2 , .. for the CTRM and J1 , W1 , J2 , W2 , ... for the OCTRM. In the uncoupled case, unsurprisingly CTRM and OCTRM are asymptotically equivalent. In the coupled case, however, their distributions can be dramatically different (Hees & Scheffler 2016). The main purpose of this article is to introduce and discuss a method for fitting data to an uncoupled CTRM. The following two quantities are our main ingredients. Definition: The random variables X(`) = V (T (`)) − `, T (`) = inf{t : V (t) > `}, ` ∈ (xL , xR ) are called the exceedance resp. time until exceedance of level `. POT-like approach. Since we assume the uncoupled case, X(`) and T (`) are independent. To see this, note that X(`) is, in distribution, simply equal to J|J > `, independent of any waiting times Wk . For our inference on the CTRM model, we will extract realizations of X(`) and T (`) from data by considering thresholds ` ranging over some interval [`0 , xR ). (For instance, let `0 equal the 95-th percentile of J.) Write X(`, i) for the i-th exceedance of level `, and T (`, i) for the inter-arrival time between X(`, i−1) and X(`, i). Thus for any 4 8 0 2 4 6 magnitudes 0 20000 40000 60000 80000 times Figure 2: Exceedances (red) and Times until Exceedance (durations between blue crosses) for a given threshold ` (dashed line). threshold ` ∈ [`0 , xR ), we construct sequences {T (`, i)}i and {X(`, i)}i . These sequences are i.i.d. since the underlying Wk and Jk are i.i.d., and independent because Wk and Jk are uncoupled. Extracting the exceedances X(`) for inference is a standard procedure known as the Peaks Over Threshold (POT) approach in extreme value theory (Beirlant et al. 2006). Figure 2 illustrates the exceedances X(`, i) in red and the times until exceedance T (`, i) as the preceding intervals marked by blue crosses. A standard result from extreme value theory provides the asymptotic distribution of X(`) as ` ↑ xR . For later use, we also include the scaling limit of the cumulative maximum M (n). Theorem GEV (e.g. Chapter 2 & Section 5.3, Beirlant et al. (2006)): Suppose the distribution of Jk is continuous. Then there exist non-decreasing norming functions a(c) and d(c) such that as c → ∞, the running maximum1 M (c) converges weakly to 1 We extend M (n) continuously to [0, +∞) via M (c) := M (bcc) where bcc is the greatest integer not greater than c. 5 a Generalized Extreme Value Distribution with shape parameter ξ: d [M (c) − d(c)]/a(c) → A,  P(A ≤ z) = G(z|ξ) = exp −[1 + ξz]−1/ξ , (1) defined for all z such that 1 + ξz > 0. This definition extends continuously to ξ = 0 via G(z|0) = exp(− exp(−x)). For µ and σ > 0, we write GEV(ξ, µ, σ) for the probability distribution of the random variable σA + µ. Moreover, asymptotically as ` ↑ xR , P(J − ` > y|J > `) ∼ 1 − H(y), where    1 − (1 + ξy/σ̃)−1/ξ , y ∈ (0, ∞) if ξ > 0,    H(y) = 1 − exp(−y/σ̃), y ∈ (0, ∞) if ξ = 0,      1 − (1 + ξy/σ̃)−1/ξ , y ∈ (0, −σ/ξ) if ξ < 0 and where σ̃ := σ + ξ(` − µ). The CDF H(y) is said to belong to the Generalised Pareto family GP (ξ, σ̄). 3 3.1 CTRM Scaling limits Waiting times We will assume that the waiting times Wk have infinite mean, i.e. a tail parameter β ∈ (0, 1) and regularly varying tail probabilities: P(W > t) ∼ L(t)t−β as t ↑ ∞ for some slowly varying function L(t). As usually, f (t) ∼ g(t) means that the quotient of f (t) and g(t) converges to 1. The law of the W then lies in the domain of attraction of a stable law, in the sense that the distributional limit W1 + . . . + Wn d −→ D, b(n) 6 n→∞ (2) exists, for a regularly varying scaling function b ∈ RV∞ (1/β) (3) (See e.g. Section 2.9.2 in Beirlant et al. 2006, for a short introduction to regular variation). The limit is then a positively skewed stable distribution, whose scale parameter is 1 if b(n) is chosen accordingly (see e.g. Section 3.7 in Meerschaert & Sikorskii 2012). This distribution is most concisely defined via its Laplace transform E[exp(−sD)] = exp(−sβ ). (4) Moreover, the following functional limit theorem holds (see e.g. Remark 4.17 in Meerschaert & Sikorskii 2012): d (W1 + . . . + Wbctc )/b(c) −→ D(t), c→∞ with convergence in the Skorokhod J1 topology. The limit D(t) is a stable subordinator, i.e. an increasing Lvy process with Laplace transform exp(−tsβ ). It is well known (see e.g. Meerschaert & Scheffler 2004) that the renewal process then satisfies the functional limit d N (ct)/b̃(c) → E(t) = inf{r : D(r) > t}, c→∞ for a scaling function b̃(c) ∈ RV∞ (β) which is asymptotically inverse to b(c), in the sense of Seneta (1976) (p.20): b(b̃(c)) ∼ c ∼ b̃(b(c)). (also see Prop 4.15 in Meerschaert & Sikorskii 2012). The limit process E(t) is called the inverse stable subordinator (Meerschaert & Straka 2013). 3.2 Magnitudes and Extreme Value Distributions The extremal limit theorem then allows for an extension to functional (i.e. pathwise) limits: assume that the norming sequences a(c) and d(c) are as in Theorem GEV. Then d [M (ct) − d(c)]/a(c) → A(t), 7 c → ∞. Here convergence holds weakly in Skorokhod’s J1 topology, and the limit process A(t) is an extremal process, with finite-dimensional distributions given by P(A(ti ) ≤ xi , 1 ≤ i ≤ d) = FA (∧di=1 xi )t1 FA (∧di=2 xi )t2 −t1 . . . FA (xd )td −td−1 , (5) where FA (x) is a GEV distribution (see e.g. Resnick 2013). 3.3 CTRM limit The CTRM V (t) results from the running maximum M (n) via a time change by the renewal process n = N (t). This is also reflected in its corresponding limit process: Theorem MS1 (Meerschaert & Stoev 2008): The CTRM process V (t) = M (N (t)) satisfies the following functional scaling limit in the Skorokhod J1 topology: d [V (ct) − d(b̃(c))]/a(b̃(c)) → A(E(t)), c → ∞. The distribution of the hitting time of a level `∗ by the limit process A(E(t)) is also known: Theorem MS2 (Meerschaert & Stoev 2008): Let FA be the CDF of a GEV distribution, and let A(t) be the extremal process corresponding to FA via (5). For a given threshold `∗ in the support of FA , the hitting time B(`∗ ) = inf{t : A(E(t)) > `∗ } is equal in distribution to (− log FA (`∗ ))−1/β X 1/β D, where X ∼ Exp(1) and D (defined in (4)) are independent. The Mittag-Leffler distribution with parameter β ∈ (0, 1] is (except for β = 1) a heavytailed positive distribution. For σ > 0, we write ML(β, σ) for the distribution of σY , where Y has Laplace transform E[exp(−sY )] = 1/(1 + sβ ). Due to e.g. Theorem 19.1 in Haubold et al. (2011), the exceedance time from Theorem MS2 can be written as B(`∗ ) ∼ ML β, (− log FA (`∗ ))−1/β 8  (6) −0.05 −0.15 Shape 1.0 1.2 1.4 1.6 Modified Scale 1.5 2.0 2.5 3.0 1.5 Threshold 2.0 2.5 3.0 Threshold Figure 3: Stability plot for the shape and scale parameters of the generalized Pareto distribution. Here, the magnitudes are standard Gumbel, hence ξ = 0 and σ = 1. Plots were generated using the POT package in R (Ribatet & Dutang 2016). 4 Scaling limit of Exceedance Times In classical extreme value theory, there are two main approaches for the inference on GEV distributions: Block Maxima and Peaks-Over-Threshold (POT). Block Maxima subdivide the time line into ‘blocks’ of equal length, and the maximum of each block is taken as realization of the random variable Mn . This approach is not appropriate for CTRM data, because maxima in same-sized blocks will not be i.i.d. As mentioned in Section 2, the POT approach does extract i.i.d. X(`) (and T (`)), and can hence be directly used for the inference on the extreme values of Jk . Figure 3 shows an example for the so-called “threshold-selection” plots for data drawn from the standard Gumbel distribution. For a range of thresholds, maximum likelihood estimators of the shape and scale parameters in the GP distribution are computed and plotted. Note that the scale parameter is transformed so that it appears independent of the threshold (see e.g. Section 4.3.4 in Coles 2001). For the remainder of this article, we focus on statistical inference for the inter-exceedance 9 times T (`) of the threshold crossings. In our setting, the inter-exceedance times follow a fractional Poisson process instead of a standard Poisson process, which is how our approach generalizes the standard POT approach. Theorem: Let b(c) be the scaling function (3), and let ` be a threshold from the support [xL , xR ] of J. Furthermore let p := P(J > `). Under the assumption (2) and the assumptions of the GEV Theorem, we have T (`)/b(1/p) → ML(β, 1) as ` ↑ xR . (7) Proof: Let the scaling functions a(c) and d(c) be as in Section 3.2, and assume WLOG ` = a(n)`∗ + d(n) for some arbitrary but fixed `∗ , out of the support of A. We first note that due to (1) d FJ (a(c)`∗ + d(c))c → FA (`∗ ), as c → ∞. (8) Taking the logarithm on each side and using the relationship z − 1 ∼ log(z) as z → 1, we get d c(1 − FJ (a(c)`∗ + d(c))) → − log FA (`∗ ). (9) Hence we have d c · p → − log FA (`∗ ) (10) as ` ↑ xR . Now we get P [T (`)/b(1/p) > t] = P[V (b(1/p)t) ≤ `] = P[V (b(1/p)) ≤ a(c)`∗ + d(c)]   V (b(1/p)/b(c) · b(c) · t) − d(c) ∗ ≤` =P a(c) (11) d → P(A(E(− log FA (l))−1/β t) ≤ `∗ ), where the convergence follows due to Theorem MS1 (with c replaced by b(c)) and the fact that b(1/p) b(1/cp · c) = ∼ (cp)−1/β → (− log FA (l))−1/β as c → ∞. b(c) b(c) (12) In (12) we used (10) and b ∈ RV (1/β), which means that b(λc)/b(c) → λ1/β as c → ∞ uniformly in λ on each compact subset of (0, ∞). The limit in (11) is equal to   P (− log(FA (`∗ )))1/β B(`∗ ) > t . 10 Due to Theorem MS2 and (6), we know that (− log FA (`∗ ))1/β B(`∗ ) is M L(β, 1) distributed, and hence the theorem follows. Remark: By the above theorem, the inter-exceedance times are i.i.d. and approximately Mittag-Leffler distributed, which means that the exceedance times form a fractional Poisson process (Laskin 2003). Since the Mittag-Leffler distribution nests the exponential distribution (the special case where β = 1), the fractional Poisson process generalizes the standard Poisson process. As the threshold height increases, the threshold crossing events are effectively “thinned out”, and the thinned (or rarefied) processes retain the characteristics of a fractional Poisson process (Gorenflo 2010), with a growing scale parameter b(1/p). Remark: A fractional Poisson process can be represented as a standard Poisson process N (t), time-changed by an inverse stable subordinator E(t) (Meerschaert et al. 2011). This pattern can be made sense of in our context: The exceedance times for a standard extreme value process A(t) form a standard Poisson process N (t). Accordingly, the exceedance times of the CTRM limit A(E(t)) must be N (E(t)), a fractional Poisson process. 5 Inference on Exceedance times Equation (7) implies that for large ` we may approximate the distribution of T (`) with an ML(β, b(1/p)) distribution. Building on the POT (Peaks Over Threshold) method, we propose the following estimation procedure for the distribution of T (`): 1. For varying thresholds ` ↑ xR , extract datasets of exceedance times {T (`, i)}i . 2. Fit a Mittag-Leffler distribution to each dataset, which results in the `-dependent estimates {β̂(`)}` and {σ̂(`)}` . 3. Plot ` vs. β̂(`). As ` increases towards xR , β̂(`) stabilizes around a constant β̂. Use β̂ as an estimate for the tail parameter β of the Mittag-Leffler distribution of exceedance times. 11 4. Approximate p ≈ |{k : Jk > `}|/n. Recall that b(c) is regularly varying with parameter 1/β, and hence has the representation b(c) = L(c)c1/β for some slowly varying function L(c). Assuming that the variation of L(c) is negligible, we hence plot ` vs. p1/β̂ σ̂(`). Again as ` increases towards xR , p1/β̂ σ̂(`) is expected to stabilize around a constant σ̂0 . We then use p−1/β̂ σ̂0 as an estimate of the scale parameter of the Mittag-Leffler distribution of exceedance times for the level `. The above approach, though theoretically sound, benefits from the following practical adjustments: • We choose ` from the order statistics, i.e. ` is the k-th largest of the observations Xj , where k runs from kmin , kmin + 1, . . . , kmax . The datasets are then of length k − 1. • We use k rather than ` for the horizontal axis of our plots. • In Step 4, rather than plotting p1/β̂ σ̂(`) we plot k 1/β̂ σ̂(`). This changes σ̂0 by the multiplicative constant n1/β̂ , but has the advantage that σ̂0 does not change if one pre-processes the data by removing all observations below a certain threshold. The estimates β̂ and σ̂0 give an estimate of the distribution of exceedance times, dependent on the threshold `: T (`) ∼ ML(β̂, k −1/β̂ σ̂0 ). For quick estimates of the Mittag-Leffler parameters the method of log-transformed moments by Cahoy (2013) was used. 6 Checking Model Assumptions The CTRM model is based on three main assumptions, which are repeated below. For each assumption, we suggest one means of checking if it holds: I.i.d.: The pairs (Wi , Ji ) are i.i.d. An indication if this is true is given by an autocorrelation plot for the logarithms (to ensure finite moments) of the two time series. Uncoupled: Each Wi is independent of each Ji . We propose an empirical copula plot to check for any dependence. 12 Heavy tails: The waiting times are heavy-tailed with tail parameter β ∈ (0, 1). A Hill plot can confirm this assumption. The motivation behind a CTRM model is to fit extreme observations and their interarrival times. Observations below a certain threshold may be interpreted as noise and discarded. Since the signal rather than the noise needs to satisfy our modelling assumptions, we suggest that the above model assumptions are checked after the noisy small observations are discarded. 7 Application to data 7.1 Simulated Data To test our inference method, we have simulated 10000 independent waiting time and magnitude pairs (Wk , Jk ). In order to have exact analytical values available for β and σ0 , a distribution for Wk needs to be chosen for which b(n) from (2) is known. If we d choose Wk = D, where D is as in (4), then due to the stability property we have the d equality of distribution W1 + . . . + Wn = b(n)D, for b(n) = n1/β . Using the parametrisation of Samorodnitsky & Taqqu (1994), a few lines of calculation (see e.g. the vignette on parametrisation in Gill & Straka (2017)) show that D must have the stable distribution Sβ (cos(πβ/2)1/β , +1, 0), which is implemented in the R package stabledist by Wuertz et al. (2016). By (7), the distribution of T (`) is approximately ML(β, p−1/β ) = ML(β, k −1/β n1/β ), which means σ0 = n1/β . The distribution of Jk is irrelevant for the inference on β and σ0 (we have chosen unit exponential random variables). Figure 4 displays plots of β̂(`) and σ̂(`) vs. k, the number of exceedances as ` traverses the largest observations Ji . Dotted lines show 95% confidence intervals, which are derived from the asymptotic normality of the log-moments estimators (Cahoy 2013) and the δ-method (Gill & Straka 2017). The dashed lines show the actual values of β resp. σ0 , showing that our inference method effectively identifies the right parameters. 13 ML scale 0 100000 scale parameter 1.0 0.5 0.0 tail parameter 1.5 ML tail 0 100 300 500 0 exceedances 100 300 500 exceedances Figure 4: Tail and scale estimates for simulated data, with waiting times drawn from the stable distribution Sβ (cos(πβ/2)1/β , +1, 0) with β = 0.8. Dashed lines are 95% confidence intervals, dotted lines are the known theoretical values (0.8 and 100001/0.8 ). 14 1.0e+08 magnitudes 0.0e+00 2011 2012 2013 2014 2015 2016 times Figure 5: Time Series of ‘Bitcoin days destroyed’, a measure for the traded volume of bitcoins. 7.2 Bitcoin trading volumes We study the daily trade volumes of Bitcoin since 2009, provided by Blockchain and downloaded from Data Market2 . Although the observations are regular (daily), extremes in the trade volumes occur in bursts, which can be seen over timescales of months and years (Figure 5). Figure 6 shows plots identifying the candidates β = 0.9 and σ0 = 2000 for the tail and scale parameters of the exceedance time distribution. That is, exceedances of a threshold ` at the k-th largest observed magnitude are distributed as T (`) = ML(0.9, 2000 ∗ k −1/0.9 ). A QQ plot (Figure 10) of the exceedance times at the level of the 200th largest event lends credence to a heavy-tailed distribution with tail parameter near the value 1. 15 scale parameter 1.0 0.5 0 0.0 tail parameter 2000 4000 6000 ML scale 1.5 ML tail 0 50 100 200 0 50 100 exceedances 200 exceedances 100000 200000 0 magnitudes Figure 6: Tail and scale plot of the bitcoin data. Jan Mrz Mai Jul Sep times Figure 7: The solar flare time series data. 16 Nov Jan ML scale 0 50 100 150 4e+07 0e+00 scale parameter 0.0 0.5 1.0 tail parameter 1.5 ML tail 0 50 exceedances 100 150 exceedances Figure 8: Stability plots for the tail and scale parameter of the Mittag-Leffler distribution of the Solar Flare dataset. 7.3 Solar Flare Data The “complete Hard X Ray Burst Spectrometer event list” 3 Dennis et al. (1991) is a comprehensive reference for all measurements of the Hard X Ray Burst Spectrometer on NASA’s Solar Maximum Mission from the time of launch on Feb 14, 1980 to the end of the mission in Dec 1989. 12,776 events were detected, with the “vast majority being solar flares”. The list includes the start time, peak time, duration, and peak rate of each event. We have used “start time” as the variable for event times, and “peak rate” as the variable for event magnitudes (Figure 7). Figure 8 shows the fitted tail and scale parameters of the Mittag-Leffler distribution. The dotted line for the tail parameter is at β = 0.85, yielding the plot of (transformed) scale estimates σ̂0 = k 1/0.85 σ̂(`). We suggest the estimate σ0 = 2.5 × 107 seconds ≈ 289 days. The exceedance times of a threshold ` as high as the k-measurement are hence 2 3 https://datamarket.com/data/list/?q=provider:blockchain https://umbra.nascom.nasa.gov/smm/hxrbs.html 17 Mittag-Leffler distributed as T (`) ∼ ML(0.85, 289k −1/0.85 days). 8 Discussion Comparing plots of the simulated data in Figure 2 with plots of the empirical data 5 and 7, it can be seen that the empirical data show long time intervals without any event occurring, whereas for real-world data events appear to happen continuously. This seeming discrepancy vanishes, however, when all but the kmax largest observations are discarded. We repeat that the CTRM model focuses on extreme events and interprets smaller events as noise. The CTRM model, moreover, assumes a “pure” power-law for the event inter-arrival times. Real datasets, however, are often exponentially tapered or truncated, see e.g. the discussion of tempered power-law distributions by Meerschaert et al. (2012) and the truncated Pareto distribution by Aban et al. (2006). This means that the fit to a power-law distribution may seem adequate for medium-size time scales, but that at very large timescales the power-law character of the distribution can weaken or disappear. This behaviour seems to appear in both the Bitcoin data and the Solar-Flare data: the Hill plot for the tail parameter is increasing towards lighter tails as the threshold reaches very high values. This may mean that the CTRM model may overestimate the heaviness of the tail of the waiting time distribution; or that a CTRM base on a tempered power-law renewal process might be a more realistic model. 9 Conclusion We have proposed the CTRM model for the extremes of “bursty” events. Burstiness is a phenomenon of intermittency which has received a lot of attention in the recent statistical physics literature. The CTRM model is a straightforward generalization of the POT (Peaks over Threshold) model, for which the inter-arrival times between threshold crossings are exponentially distributed. If the Mittag-Leffler tail parameter of the CTRM equals 1, then 18 the CTRM model reproduces this behaviour exactly, showing that the CTRM model nests the POT model. The scale parameter σ of the inter-event distribution follows a power-law σ ∝ p−1/β , where β ∈ (0, 1) is the tail parameter of the inter-event distribution and p the probability that an event crosses a given threshold. From this power law, we have constructed “stability plots”, from which estimates of β and σ can be read off. We have demonstrated the applicability of the CTRM model with two real-world datasets. Although the CTRM model possibly overestimates the heaviness of the tail of the inter-arrival distribution, it clearly captures that the inter-arrival times of threshold crossings scale non-linearly with the treshold crossing probability, and follow a clearly non-Poissonian behaviour. Thus we have shown that the CTRM model is a useful tool for the modelling of extremes of bursty events, which requires very little computation and which allows for straightforward ways of checking and criticizing model assumptions. The analyses from this paper are readily reproduced via the R package CTRM, available at https://github.com/strakaps/CTRM. A Diagnostic Plots 19 0.0 0.4 ACF 0.4 0.0 0 5 10 15 20 25 0 5 10 15 20 25 CrossCor (Exc & Exc Time) Mittag−Leffler QQ Plot Population Quantiles −0.05 ACF −20 −10 0 10 1e+00 Lag 0.05 0.10 Lag 1e−04 ACF 0.8 ACF (Exceedances) 0.8 ACF (Exceedance Times) 20 1 Lag 10 100 1000 Sample Quantiles Threshold Emp. Copula (Exc & Exc Time) Hill Plot 12.400 50.500 0.444 1.0 0.2 0.0 0.6 0.4 y alpha 0.8 1.4 375.000 0.0 0.2 0.4 0.6 0.8 1.0 15 x 123 231 338 Order Statistics Figure 9: Diagnostic plots for the simulated data. 20 446 0.0 0 5 10 15 20 0 5 10 15 20 CrossCor (Exc & Exc Time) Mittag−Leffler QQ Plot −10 0 10 1e−03 0.10 0.00 −20 1e+01 Lag Population Quantiles Lag −0.10 ACF 0.4 ACF 0.4 0.0 ACF 0.8 ACF (Exceedances) 0.8 ACF (Exceedance Times) 20 1 Lag 2 5 10 20 50 Sample Quantiles Threshold Hill2 Plot1 27 6 15 79 1 3 2 0.0 1 0.4 y alpha 0.8 4 Emp. Copula (Exc & Exc Time) 0.2 0.4 0.6 0.8 1.0 x 142 205 Order Statistics Figure 10: Diagnostic plots for the Bitcoin data. 21 268 0.2 −0.2 −0.2 0 5 10 15 20 0 5 10 15 20 CrossCor (Exc & Exc Time) Mittag−Leffler QQ Plot −5 0 5 1e−01 1e−03 Population Quantiles 0.1 0.0 −15 1e+01 Lag 0.2 Lag −0.1 ACF 0.6 ACF 0.6 0.2 ACF 1.0 ACF (Exceedances) 1.0 ACF (Exceedance Times) 10 15 20 Lag 100 500 5000 50000 Sample Quantiles Threshold Emp. Copula (Exc & Exc Time) Hill Plot 318.0 1440.0 22.7 1.0 0.0 0.5 0.4 y alpha 1.5 0.8 2.0 8390.0 0.0 0.2 0.4 0.6 0.8 1.0 15 x 45 75 105 Order Statistics Figure 11: Diagnostic plots for the Solar Flare data. 22 135 References Aban, I. B., Meerschaert, M. M. & Panorska, A. K. (2006), ‘Parameter estimation for the truncated pareto distribution’, J. Am. Stat. Assoc. 101(473), 270–277. URL: http://projecteuclid.org/euclid.ss/1340110872 Anderson, K. K. (1987), ‘Limit Theorems for General Shock Models with Infinite Mean Intershock Times’, J. Appl. Probab. 24(2), 449–456. URL: http://www.jstor.org/stable/3214268 Bagrow, J. P. & Brockmann, D. (2013), ‘Natural emergence of clusters and bursts in network evolution’, Phys. Rev. X 3(2), 1–6. Barabási, A. L. (2005), ‘The origin of bursts and heavy tails in human dynamics’, Nature 435(May), 207–211. Basrak, B. & Špoljarić, D. (2014), ‘Extremal behaviour of random variables observed in renewal times’. URL: http://arxiv.org/abs/1406.6208 Beirlant, J., Goegebeur, Y., Segers, J. & Teugels, J. (2006), Statistics of extremes: theory and applications, John Wiley & Sons. Benson, of D. extreme A., Schumer, events with R. & Meerschaert, power-law interarrival M. M. times’, (2007), ‘Recurrence Geophys. Res. Lett. 34(l16404), DOI:10.1029/2007GL030767. URL: http://www.agu.org/pubs/crossref/2007/2007GL030767.shtml Cahoy, D. O. (2013), ‘Estimation of Mittag-Leffler Parameters’, Commun. Stat. - Simul. Comput. 42(2), 303–315. URL: https://www.tandfonline.com/doi/full/10.1080/03610918.2011.640094 http://www.tandfonline.com/doi/abs/10.1080/03610918.2011.640094 Coles, S. (2001), An Introduction to Statistical Modelling of Extreme Values, SpringerVerlag, London. 23 Dennis, B. R., Orwig, L. E., Kennard, G. S., Labow, G. J., Schwartz, R. A., Shaver, A. R. & Tolbert, A. K. (1991), ‘The complete Hard X Ray Burst Spectrometer event list, 19801989’. URL: https://umbra.nascom.nasa.gov/smm/hxrbs.html Esary, J. D. & Marshall, A. W. (1973), ‘Shock Models and Wear Processes’. Gill, G. & Straka, P. (2017), MittagLeffleR: Using the Mittag-Leffler distributions in R. URL: https://github.com/strakaps/MittagLeffler/ Gorenflo, R. (2010), ‘Mittag-Leffler Waiting Time, Power Laws, Rarefaction, Continuous Time Random Walk, Diffusion Limit’, p. 28. URL: http://arxiv.org/abs/1004.4413 Gut, A. (1999), ‘Extreme Shock Models’, Extremes (1983), 295–307. URL: http://link.springer.com/article/10.1023/A:1009959004020 Haubold, H., Mathai, A. M. & Saxena, R. K. (2011), ‘Mittag-Leffler Functions and Their Applications’, J. Appl. Math. 2011, 1–51. URL: http://www.hindawi.com/journals/jam/2011/298628/ Hawkes, A. G. (1971), ‘Point spectra of some mutually exciting point processes’, J. R. Stat. Soc. Ser. B Stat. Methodol. pp. 438–443. Hees, K. & Scheffler, H.-P. (2016), ‘On joint sum/max stability and sum/max domains of attraction’, pp. 1–31. URL: http://arxiv.org/abs/1606.03109 Hees, K. & Scheffler, H.-P. (2017), ‘Coupled Continuous Time Random Maxima’, Extremes (June), 1–24. URL: http://link.springer.com/10.1007/s10687-017-0304-6 Karsai, M., Kaski, K., Barabási, A. L. & Kertész, J. (2012), ‘Universal features of correlated bursty behaviour’, Sci. Rep. 2. 24 Karsai, M., Kivelä, M., Pan, R. K., Kaski, K., Kertész, J., Barabási, A. L. & Saramäki, J. (2011), ‘Small but slow world: How network topology and burstiness slow down spreading’, Phys. Rev. E - Stat. Nonlinear, Soft Matter Phys. 83, 1–4. Laskin, N. (2003), ‘Fractional Poisson process’, Commun. Nonlinear Sci. Numer. Simul. 8(3-4), 201–213. Meerschaert, M. M., Nane, E. & Vellaisamy, P. (2011), ‘The fractional Poisson process and the inverse stable subordinator’, Electron. J. Probab. 16, 1600–1620. Meerschaert, M. M., Roy, P. & Shao, Q. (2012), ‘Parameter estimation for exponentially tempered power law distributions’, Commun. Stat. - Theory Methods 41(10), 1839–1856. Meerschaert, M. M. & Scheffler, H.-P. (2004), ‘Limit Theorems for Continuous-Time Random Walks with Infinite Mean Waiting Times’, J. Appl. Probab. 41(3), 623–638. Meerschaert, M. M. & Sikorskii, A. (2012), Stochastic models for fractional calculus, Vol. 43, Walter de Gruyter. Meerschaert, M. M. & Stoev, S. A. (2008), ‘Extremal limit theorems for observations separated by random power law waiting times’, J. Stat. Plan. Inference 139(7), 2175– 2188. URL: http://linkinghub.elsevier.com/retrieve/pii/S0378375808003984 Meerschaert, M. M. & Straka, P. (2013), ‘Inverse Stable Subordinators’, Math. Model. Nat. Phenom. 8(2), 1–16. URL: http://www.mmnp-journal.org/10.1051/mmnp/20138201 Min, B., Goh, K. I. & Vazquez, A. (2011), ‘Spreading dynamics following bursty human activity patterns’, Phys. Rev. E - Stat. Nonlinear, Soft Matter Phys. 83(3), 2–5. Oliveira, J. & Barabási, A. L. (2005), ‘Darwin and Einstein correspondence patterns’, Nature 437(October), 1251. Omi, T. & Shinomoto, S. (2011), ‘Optimizing Time Histograms for Non-Poissonian Spike Trains’, Neural Comput. 23(12), 3125–3144. 25 Resnick, S. I. (2013), Extreme values, regular variation and point processes, Springer. Ribatet, M. & Dutang, C. (2016), POT: Generalized Pareto Distribution and Peaks Over Threshold. R package version 1.1-6. URL: https://CRAN.R-project.org/package=POT Samorodnitsky, G. & Taqqu, M. S. (1994), Stable Non-Gaussian Random Processes: Stochastic Models with Infinite Variance, Stochastic Modeling, Chapman Hall, London. Seneta, E. (1976), Regularly Varying Functions, Vol. 508 of Lecture Notes in Mathematics, Springer-Verlag, Berlin. Shanthikumar, J. G. & Sumita, U. (1983), ‘General shock models associated with correlated renewal sequences’, J. Appl. Probab. 20(3), 600–614. URL: http://www.jstor.org/stable/3213896 Shanthikumar, J. G. & Sumita, U. (1984), ‘Distribution Properties of the System Failure Time in a General Shock Model’, Adv. Appl. Probab. 16(2), 363–377. URL: http://www.jstor.org/stable/1427074 Shanthikumar, J. G. & Sumita, U. (1985), ‘A class of correlated cumulative shock models’, Adv. Appl. Probab. 17(2), 347–366. URL: http://www.jstor.org/stable/1427145 Silvestrov, D. S. (2002), Limit Theorems for Randomly Stopped Stochastic Processes, Springer (Berlin, Heidelberg). Silvestrov, D. S. & Teugels, J. L. (2004), ‘Limit theorems for mixed max-sum processes with renewal stopping’, Ann. Appl. Probab. 14(4), 1838–1868. URL: http://projecteuclid.org/Dienst/getRecord?id=euclid.aoap/1099674080/ Vajna, S., Tóth, B. & Kertész, J. (2013), ‘Modelling bursty time series’, New J. Phys. 15(10), 103023. URL: http://stacks.iop.org/1367-2630/15/i=10/a=103023?key=crossref.eac401be0d0a5b8ecbf34a51a9f1 26 Vasquez, a., Oliveira, J. G., Dezso, Z., Goh, K.-I., Kondor, I. & Barabási, A. L. (2006), ‘Modeling bursts and heavy tails in human dynamics’, Phys. Rev. E 73, 361271–3612718. Vazquez, A., Rácz, B., Lukács, A. & Barabási, A. L. (2007), ‘Impact of non-poissonian activity patterns on spreading processes’, Phys. Rev. Lett. 98(APRIL), 1–4. Wuertz, D., Maechler, M. & core team members., R. (2016), stabledist: Stable Distribution Functions. R package version 0.7-1. URL: https://CRAN.R-project.org/package=stabledist 27
10math.ST
This paper has been accepted for publication in forthcoming issue of IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. The content is final but has NOT been proof-read. This is an author copy for personal record only. SRE: Semantic Rules Engine For the Industrial InternetOf-Things Gateways Charbel El Kaed, Member, IEEE, Imran Khan, Member, IEEE, Andre Van Den Berg, Hicham Hossayni and Christophe SaintMarcel Abstract—The Advent of the Internet-of-Things (IoT) paradigm has brought opportunities to solve many real-world problems. Energy management, for example has attracted huge interest from academia, industries, governments and regulatory bodies. It involves collecting energy usage data, analyzing it, and optimizing the energy consumption by applying control strategies. However, in industrial environments, performing such optimization is not trivial. The changes in business rules, process control, and customer requirements make it much more challenging. In this paper, a Semantic Rules Engine (SRE) for industrial gateways is presented that allows implementing dynamic and flexible rule-based control strategies. It is simple, expressive, and allows managing rules on-the-fly without causing any service interruption. Additionally, it can handle semantic queries and provide results by inferring additional knowledge from previously defined concepts in ontologies. SRE has been validated and tested on different hardware platforms and in commercial products. Performance evaluations are also presented to validate its conformance to the customer requirements. Index Terms—Internet-of-Things; Semantic Web; Industrial Control; Rules; Industrial Internet-of-Things; Embedded Systems I. INTRODUCTION The Internet-of-Things (IoT) is expected to interconnect sensors, devices, gateways, and objects on a massive scale [1] to solve many challenges. Such interconnectivity will play an important part to build powerful industrial systems [2] that are more energy efficient with lower costs while contributing to a better environment. In addition, the Semantic Web technology [3] is getting more popular in the development of rich and interactive applications [4]. In industrial environments and automation domains, the Semantic Web has been used to solve data interoperability issues [5], [6] and to provide context aware applications and services [7]. In industrial facilities, black-box devices (gateways or data loggers) are typically used to collect data from variety of devices like; sensors, actuators, machines, plants, processes, and systems. Typically these gateways, sample, collect, and push data to a remote platform for further analysis and may also send notifications for certain events. In this era of inter-connectivity and optimization, users and managers desire some sort of flexible control over their installations. Due to ever changing business requirements and the nature of IoT applications and services, it has become The authors are with IoT & Digital Transformation, Schneider Electric, Boston One Campus, Andover, MA, 01810, USA and 38TEC, Grenoble, 38000, France. (e-mail: {charbel.el-kaed, imran2.khan}@schneiderelectric.com, [email protected], {hicham.hossayni, christophe.saint-marcel}@non.schneider-electric.com) difficult to preempt the requirements of the users from manufacturer perspective. More dynamic solutions are required that by design offer more flexibility and better control to theses gateways users. Further more, issues like low bandwidth, latency, and security in the industrial domain are additional factors to consider [8]. Hence, easy-to-use solutions located closer to the devices are preferred but issues like device and protocol heterogeneity, multi-vendor solutions, and variety of data models make it a challenging task. In this paper, we present Semantic Rules Engine (SRE) which consists of two parts: a Rules Engine and a Semantic Engine. The Rules Engine provides a simple and effective way to deploy a control mechanism (as rules) on gateways. These rules are expressed in a simple scripting language and can be modified and uploaded at run-time without disrupting the operation of the gateways. The Semantic Engine provides absolute abstraction from the heterogeneity of devices, protocols, data and any topological changes. It leverages devices meta-data and enables the retrieval of contextual information using semantic queries. Inspired from our previous work [9], we leverage a modular approach with a set of common and domain specific ontologies across our enterprise. For instance, a domain ontology capturing one of our industrial automation contexts, is used to annotate the devices with their contextual information, thereby promoting data interoperability and its understanding to users and applications. The following are key differentiating factors of SRE. 1) The rules rely on devices’ annotations and are not tied to the devices ID or any other binding. Hence, they are flexible and independent of topology changes and assigning unique identifiers does not affect their execution. 2) Rules themselves use semantic queries to retrieve contextual information in order to perform actions/eventing functions. Thus, higher-level concepts like, location and measurement type can be used to compose logic in rules to achieve a desired behavior from the gateway. 3) We have developed a simple reasoning module in SRE to answer ondemand queries. For example, a device’s location is in a room A, and such room is located on a floor within a building A. The reasoning feature will deduce that the device’s location is also in building A. This is powerful when aggregating measurements or searching for specific device types. 4) SRE provides complete lifecycle management of its rules, they can be installed, activated, modified at run-time, deactivated, and uninstalled. 5) SRE supports cooperation between rules to share functions which are This paper has been accepted for publication in forthcoming issue of IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. The content is final but has NOT been proof-read. This is an author copy for personal record only. needed by many rules thereby avoiding redundancy. 6) SRE uses the industrial process. One simple solution is to install light the concept of settable parameters in rules. These parameters indicators, along the industrial process, to inform the local can be updated on-the-fly without disturbing the execution of the personnel about situations like energy wastage (Orange light ON), rules. process fault (Red light ON) or normal operation (Green light ON). The rest of the paper is organized as follows: Section II presents The audit team along with the facility manager proposed a set of the background, motivating scenario, requirements and the rules to create this solution. related works. Section III describes the proposed solution while section IV details the implementation and evaluation. Section V outlines lessons learned and future work while Section VI concludes the paper. II. BACKGROUND, REQUIREMENTS, AND RELATED WORK This section presents the background, motivating scenario, requirements and a review of the related works. A. Background Energy consuming devices have evolved from just being able to switch ON or OFF to be more sophisticated for control and monitoring purposes. However, these devices have mainly worked in isolation, only taking into account their own measurements without any sort of intelligence or learning. With the advent of IoT paradigm, the “smart devices” of today are much more advanced than their predecessors. They can communicate with each other using various protocols and can push data of their connected sensors and actuators to a remote cloud platform where it can be analyzed. However, relying on a cloud platform to remotely control devices is sometimes not desirable for various reasons ranging from the privacy concerns to latency issues and to minimize the downtime or to enable a facility to operate even without the cloud connectivity. More over, once the data has been analyzed in the cloud, normally there is no clear defined mechanism to deploy/modify the behavior of the devices, such as changing the push interval of the data or to select additional data points from a specific set of devices from a particular location. Thus, there is need to be able to create control strategy (i.e. rules) and execute them on the gateways for more localized control. These rules can range from simply sending an alarm when the temperature in an area reaches a certain threshold, to a more complex rule to control a liquid flow within an underground mining facility [10]. B. Motivating Scenario and Requirements In one of our industrial manufacturing facility, an energy monitoring solution has been deployed. The solution consists of an IoT gateway and a set of wireless sensors deployed along the industrial manufacturing machines. The IoT gateway collects data from the sensors and pushes it to the remote cloud platform for visualization and analysis, as shown in Fig. 1. In our continuous efforts to maintain green facilities, an internal energy audit concluded the following: most of the energy waste is occurring in the semi-automated industrial process. Energy can be saved by engaging our local personnel working on Fig. 1. Our Industrial Facility Use Case For example, in Fig. 1, when the conveyor is ON while the mold and the furnace are OFF, energy is being wasted. However, for preheating purposes, it is acceptable for a short period of time for the furnace alone to be ON. From this simple scenario, it is clear that the facility manager needs a solution that gives her more flexibility to tackle new situations that were not envisioned during the initial setup. The solution needs to be dynamic, flexible and should not involve any reprogramming or hard reset of the devices. It should also be usable by non-IT experts. There are two possible solutions : One is to use a tailored solution to solve one problem only and when new requirements arise, reprogram everything again. This option does not scale well and is not suitable to solve new problems or implement new business rules efficiently. The second option is to have a more flexible solution that is easier to implement, does not require reprogramming and supports quick implementation of new business rules. Thus, the solution requires the following characteristics: 1) Expressing requirements and conditions in an explicit manner to control the devices and to send alerts. 2) Deployment strategy of these requirements. 3) Efficient execution of these requirements. 4) Support semantics to query status and details of the devices by location, type, connectivity, and other concepts. 5) Additionally, the solution should be suitable for different types of devices (gateways, edge, fog nodes, and Raspberry Pi), easily integrate-able, modular in design to implement new features, and be independent of device types, protocols or application domain constraints. This paper has been accepted for publication in forthcoming issue of IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. The content is final but has NOT been proof-read. This is an author copy for personal record only. In literature, we found several Rules Engines and Semantic of a rule. In fact, our early investigation started with drools [22], Engines, we discuss some of them in the following subsection. however, due to its rigid dependency on Java and its packages, we opted for a Lua based approach which is light weight and portable C. Related Work even on smaller footprint gateways. The work in [11] proposes LINC, a coordination programming On the Semantic Web side, the authors in [24] discuss a unified environment to execute Rules efficiently. LINC uses different semantic engine for IoT and Smart Cities to tackle data Linda-like tuple-spaces. The global tuple space is split into ”bags”. interoperability and scalability among others. However, their Each bag can either encapsulates a database, service (SOAP or work does not provide any details regarding the implementation RPC), event system or hardware like a sensor or an actuator. A or technologies used to address the identified issues. A Semantic coordination language is used to specify Rules with statements gateway is proposed in [25] to tackle the industrial field service and has operation types get, put and read to interact with the use-case where service engineers rely on a plethora of tools to ”bags” and identify their content using keys or identifiers. track and solve the issues of the products which may have been Dependence on identifiers and keys makes LINC unsuitable for installed decades ago. The semantic aspect in this work only deals dynamic environment because rules will need updates as well. with the mapping of the SOAP bindings to the networking This is not the case in SRE, which remains immune to such platform. A gateway architecture is presented in [26] that changes thanks to the use of semantic queries. Also, compared to abstracts the network services and translates network services to SRE, LINC does not provide any query mechanism except the keys a standard DPWS interface but there is no notion of queries or to retrieve objects from bags. Therefore it is not possible to look rules. up various things on the gateway based on their contextual The authors in [27], [28] present a semantic smart gateway information such as their measurements types and/or physical framework to achieve device interoperability. Features such as locations. Moreover, a simple rule example as described in [11] ‘on-the-fly’ ontology learning and ontology alignment are does not seem trivial for a developer compared to Lua in SRE provided. Similarly, our previous work[6] proposes a following an EventCondition-Action paradigm. It is also not clear semiautomatic approach to dynamically generate and install if LINC uses higher-level of abstraction for Rules similar to SRE. proxies on the gateway from ontology alignments to achieve Authors in [12] propose a Rules Engine to efficiently handle the semantic interoperability. However, these related approaches do high data throughput and large set of rules in the context of smart not fulfill our requirements of query and control using rules. In building systems. Due to high frequency of data, it is difficult to our approach, instead of relying on ontology alignment, we opted apply corresponding Rules from a large set, for example to handle for the commissioning phase described in our previous work urgent events. The sensor and actuator data are used to find SQenIoT [9] to semantically annotate data sources from atomic events then rules are used to construct the minimum ontologies when the gateway is commissioned. prefect hash table to filter meaningless atomic events. Using a III. PROPOSED SOLUTION feedback mechanism the rule matching overhead is further By carefully considering requirements, constraints and reduced. The main strengths of this approach are scalability and rules conflict management with the help of the user. However, in viewpoints of the stakeholders we concluded that our proposed their approach, a rule is described in an XML data structure solution will have the following features: Flexibility: design rules limiting the expressiveness of the rule, e.g., it is not clear how a to express, deploy, and execute user requirements quickly with loop is handled or whether atomic conditions with logical time and cost savings and avoiding software development lifeoperations can be expressed to trigger an action. In addition, each cycle for every requirement. Deployment: install rules on the rule is tied to a sensor identifier along with a room and a user gateways either locally or remotely through a cloud application. identifier making it very rigid when a device is replaced or its Interoperability: leverage the ontology concepts to provide physical location changes. SRE does not have these drawbacks consistent, reusable, and shareable view about the data. because it relies on the Semantic Query Engine to handle dynamic Semantic Query: rely on a natural language-like grammar to environments and the Lua language constructs for better retrieve information from the gateway based on annotated data liberating rules from static unique identifiers. Modularity: to expressiveness. There are several other works that address the same problem easily integrate new functionalities and to scale. Finally, the using approaches such as programming models like [13] and [14], solution should provide dedicated rules execution environment. After a careful study of the state-of-the-art and available open middleware like [15], coordination languages like [16] and [17] source rules engines like [22], [23], we decided to design the and the solutions based on tuplespace like [18], [19], [20] and Semantic Rules Engine (SRE) to fulfill the required features [21]. Most of these works provide complex solutions that are tailored for a particular scenario or are difficult to use in medium mentioned earlier. The SRE comprises of two parts: the Rules to small gateways. Also some of these works are prior to the IoT Engine and an existing work Semantic Engine [9]. The overall design architecture of SRE is shown in Fig. 2. The components are paradigm and do not consider the challenges it introduces. Other existing Rules Engines such as [22], [23] are designed to detailed in the following subsections. run with an underlying Java Virtual Machine with a clear dependency on java packages as shown in the import declaration This paper has been accepted for publication in forthcoming issue of IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. The content is final but has NOT been proof-read. This is an author copy for personal record only. A. Rules Engine a sensor or measure and is capable of handling changes in the The Rules Engine provides gateways with the decentralized topology (e.g. device joining/leaving/being replaced). The interaction between the Rules Engine and SQenIoT is a intelligence and the ability to control or query the connected devices. Figure 3 shows the components of the Rules Engine. A major differentiating factor from other solutions. In fact, existing Rules Manager interacts with remote applications, receives and Rules Engines rely on a unique identifier to address a sensor, manages the rule files. Once started, the Rules Manager loads the actuator, or measurement. Since the identifier is hardcoded in execution environment used to execute the rules. An execution the rule, it requires manual update when, for example, a faulty environment provides a set of functions, for example to handle sensor is replaced by a new one. On the other hand, by relying on subscriptions, timers, and interactions with other components contextual information and meta-data (tags), the rule will still be like SQenIoT and the Cloud Connectivity Agent. Once the valid even when the sensor is replaced since the meta-data will execution environment is setup, the Rules Manager handles the remain the same for the new sensor. life-cycle of the rules (e.g. install, start, stop or delete). Each rule Overall, with this capability, SRE offers a flexible solution where is executed in isolation to avoid conflicts with other rules and the same rules can be reused in different products and solutions resources access issues. as long as higher-level concepts (like location) are reused. This provides time and cost savings as well as same level of functionality across different domains and platforms. Fig. 2. Design Architecture of Semantic Rules Engine B. Semantic Engine: SQenIoT To provide the rules with the ability to integrate semantic queries, we reused existing work SQenIoT [9]. An API is provided with SQenIoT which makes it possible for SQenIoT to access the device meta-data. The values of the meta-data tags can be injected during the commissioning phase manually or automatically as described in [9]. By combining Rules Engine with SQenIoT, rules are able to execute semantic queries and use the returned results. For example, a rule can delegate the aggregation of temperature of a given floor to SQenIoT through a query. Then, the returned results will be used in another query to trigger an action or an event. The formulated query will rely on annotated data in the gateway such as location (i.e. a floor) and measurement (i.e. temperature) tags as means to get the list of temperature sensors to get the average temperature of a given floor. Once received by SQenIoT, it gets the values of the temperature sensors of that particular floor only and returns the average temperature values. The Rules Engine can then compare the result with a given threshold and execute the action (a notification, an alarm, or an actuation) according to the logic specified in the rule. This semantic query feature decouples the rule from any identifier of Fig. 3. SRE Implementation Architecture C. Rule Design The users’ requirements, regarding control or information are expressed in the form of rules. Therefore the rules are designed to enable the following: 1) Event-Condition-Action (ECA) paradigm on the resources (i.e. devices/sensors/actuators) and their capabilities (measurement, points). 2) Publish/Subscribe mechanism on a resource or measurement with a related condition. 3) Support life-cycle management process (install, start, stop, and uninstall). 4) Orchestration and cooperation between rules which allow delegation and reuse. These features are elaborated as follows: This paper has been accepted for publication in forthcoming issue of IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. The content is final but has NOT been proof-read. This is an author copy for personal record only. 1) ECA Design: The condition part of a rule is designed to be the unique identifier of the sensor and its resource, for example, flexible. It takes only one resource or capability into account. To SRE.subscribe(@exist[Sensor11] evaluate multiple resources and their capabilities, a rule can have == True, HandleDynamicSensorCallback)1. The second mechanism multiple conditions combined by logical operators. The following goes through SQenIoT with a semantic query based on the sensor syntax enables to look up ”SensorA” and its measurement value metadata instead of its unique identifier, for example, ”Temperature”: SRE.query("subscribe catalog:sensor and location:Room1", [SensorA] Temperature HandleDynamicSensorCallback). Using this definition, multiple conditions can be combined 3) Rule Life-cycle Design: One of the requirements for the together as follows and are also shown in Fig.4 rules is to be able to manage them easily. For example, a rule that lowers the temperature of a hot water geyser might only be [MultiSensorA]Temp > 25◦ C AND started on weekends and stopped on weekdays. We designed [DoorSensorB]isOpen == True life-cycle management of rules, as shown in Fig.5, to easily The supported logical operators are AND and OR, whereas the manage them using a Graphical User Interface (GUI). allowed comparators are: =,<,==,≤,≥,<>,>. 4) Orchestration and Cooperation: To avoid rule conflicts The following types of conditions are defined to evaluate and to enable reuse, orchestration is primordial. Consider for resources and their capabilities. example, an eventing function which sends an notification with a A) Evaluator: Evaluates the measurement of a resource and its description to a remote monitoring center, such function can be capability: [SensorA]Temp>25◦ C It is useful when a implemented once and reused by different rules. Therefore, SRE capability reaches a threshold or is equal (or not) to a enables rules cooperation and orchestration. specific value. 5) Rule Persistence: Rules are persisted on the device along with their states (installed, started, stopped) and the recent values of their settable parameters. When a rule is created, it is first encoded in Base64 then the resulting JSON file is digitally signed (for security) and compressed as ZIP file. SRE receives this ZIP file and validates its signature. If valid, the ZIP file is stored locally and the rule is extracted and loaded in the SRE for installation. Additionally, SRE saves the state of the rules locally in a small database with details such as name of the rules, list of Fig. 4. Example of Condition Consisting of Two Basic Condition Blocks settable parameters, and their most recent values. If device reboots, SRE first validates the local ZIP files, extracts the rules and, by using the details in the database, restores them to their B) Existence: This condition is used to check if a resource exist, last execution state along with the last stored values of the for example, in a dynamic context, parameters. appearance/disappearance of a device. @exist[SensorA] Finally, although it is not the focus of this paper, we did == True consider the security aspects to allow safe deployment of rules in C) EventOnChange: A granular subscription on the change of our gateways for execution. Only rules, signed with corporate PKI, state/value of a capability (e.g. window is open or close) is are executed by SRE. Every received rule is first validated to check of interest. its origin and authenticity and then installed in the gateway, @change[DoorSensor1]State == True otherwise it is discarded. D) Increment/Decrement: Enables the subscription on the increase/decrease of the capability value. IV. IMPLEMENTATION & EVALUATION @incr[SensorA]Temp == True (@decr) In this Section, we first present the SRE implementation The Existence, EventOnChange, and Increment/Decrement choices and then the setup. Later, performance metrics and the operations are coupled with a callback function. The logical results are discussed. The section concludes with the operators AND and OR can be combined to specify powerful presentation of real use-cases where SRE is being used. conditions in the rules. By relying on SQenIoT, users do not need to know the name of the resource and capability they are A. Implementation Choices interested in, instead they can use higher-level concepts like 1) Rules Engine: is expected to run on embedded devices as location, device type, and physical quantity as described in [9]. 2) Publish/Subscribe Mechanism: There are two well as resourceful devices. There were quite a few choices like mechanisms to express publish/subscribe requests. The first one JESS, JBoss Drools [22], Lua and OpenRules. However, Lua [29] is identifier dependent, which means that the rule must contain was selected due to the following factors: 1) Developed for embedded devices but it is also usable for resourceful devices. 2) 1 https://github.com/InnovationSE/SRE/blob/master/TII/LuaAlertEx.lua This paper has been accepted for publication in forthcoming issue of IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. The content is final but has NOT been proof-read. This is an author copy for personal record only. Open source, has a strong user base, and its interpreters are the account by the rule in its next execution cycle. Several available in several languages including Java and C for integration semantic queries can be combined together to compose complex within different platforms. 3) Easy to use syntax. 4) rules. Lua also supports userdefined functions so complex Expressiveness of basic and complex rules. 5) Multiple execution computations can be performed in these functions for more environments to run rules independently. The Lua interpreter can advanced control features. exist in a separate process on the gateway and therefore has less 2) SQenIoT: The implementation is shown in Fig. 3. Like the interference with the main framework and can be shutdown and Rules Engine, it is also developed in both Java and C languages. It restarted independently. The design of Rules Engine is shown in exposes a Query Interface through which rules can send semantic Fig. 3. A rule is basically a Lua script executed by the Lua queries. The necessary functions are provided by the Engine API interpreter. Both Java and C version of Rules Engine were module. For semantic support SQenIoT uses open source libraries, developed for different hardware platforms offering same namely OWL API2 and Redland RDF Libraries3 in Java and C version functionality. Using the Engine API, rules can interact with respectively. functions to handle subscriptions and timers. The execution environment is created by the Lua interpreter and ensures that multiple rules co-exist without any issues. Also, rules can call Java B. Implementation Setup methods or C functions for more complex operations. SRE Java version is deployed on a commercial off-theshelf An example of a Lua rule is shown in Listing 1, it regulates industrial Gateway which has Modbus 4, Ethernet, WiFi, ZigBee, the luminosity levels of the lights in a given site based on the and GPRS interfaces to connect to devices and a remote cloud average luminosity level. Lines 10, 11, 15, and 16 of Listing 1 platform. The gateway uses Linux OS with IBM J9 [30] as Java demonstrates the expressivity of SRE through semantic Virtual Machine (JVM) on top. J9 is certified for embedded queries. Lines 10-11 shows a semantic query which delegates systems in industrial usage. The ProSyst5 implementation of Open to SQenIoT, the average luminosity value from the Sensors Service Gateway initiative (OSGi) framework 6 is used over J9 for located in Site1. This query makes it very easy to retrieve the modular design. SRE is implemented as one of the OSGi aggregated value from the sensors without a reference to any component. fixed identifier or other bindings. In addition, the inference is SRE C version is implemented for our in-house hardware requested through the @ symbol in the query. To calculate platform based on dual core Cortex A9 chip clocked at 900Mhz with 1GB RAM. It also runs Linux 7 for embedded systems. The connectivity options include, ZigBee, Ethernet, Bluetooth and WiFi. SRE is developed as a POSIX compliant library that can be imported by client applications. Fig. 5. Lifecycle of a Rule 1 2 3 4 function LightControl.init() engine.timer("LightControl", "Control", 500,2000,-1) defaultThreshold = 600 end 6 function LightControl.Control() 7 threshold = engine.getRuleSetting("LightControl","threshold") 8 if( ˜ threshold) the inference, SQenIoT, relies on the annotated data and the location ontology created during the commissioning phase which contains concepts and relationships between Site1 and all locations in it (e.g. floors, rooms). The Sensors are not directly tagged with location:Site1, they were annotated with their locations (mainly rooms and open spaces). SQenIoT relies on the ontology to infer and retrieve the sensors located in the site. This feature is a major differentiating factor of SRE from other solutions. If the average luminosity is below a certain threshold, then the light actuators are queried (lines 15-16) and a new value is set in lines 18-22 of the Listing. Another interesting feature is on line 7 which allows a rule to get threshold value dynamically. A new threshold value can be provided on the fly and it will be taken into 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 threshold = defaultThreshold averageLuminosityOfSite1_query = "Avg variable usage:LuminositySensor and @loc:Site1" averageLuminosityOfSite1_result = engine.query(averageLuminosityOfSite1_query) if (averageLuminosityOfSite1_result < threashold) light_actuators_devices = "Search Device usage:LightActuator and @loc:Site1" lightActuators = engine.query(light_actuators_devices) for i = 1, #lightActuators, 1 do lux = engine.getCapability(sensors[i],"LuminositySetPoint") differenceToSet = threshold - lux.value if(differenceToSet > 0) engine.setValue(lux, lux.value+differenceToSet) end end end ... 2 5 3 6 http://owlapi.sourceforge.net http://librdf.org 4 http://www.modbus.org http://www.prosyst.com https://www.osgi.org 7 http://www.windriver.com/products/linux This paper has been accepted for publication in forthcoming issue of IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. The content is final but has NOT been proof-read. This is an author copy for personal record only. Listing 1: Lua Rule Example C. Performance Metrics The performance of SRE is assessed in terms of Rule Execution Time (RET), Rule Latency Time (RLT) & Rule Memory Usage (RMU). RET and RLT are measured in milliseconds. RET measures the time needed to execute rules. It includes the time needed to parse the rule condition, its evaluation, and the execution of an action. To evaluate RET multiple sets with different number of rules are defined. Each rule defines a condition on 5 smart devices. The condition part results in a true evaluation each time to ensure that the action (i.e. toggle the state of the actuator and send message to cloud) is executed. RLT measures the average latency between the occurrence of an event and the execution of the corresponding rule. For this we simulated occupant comfort scenario in three multi-story residential buildings to control the heater and air conditioner based on temperature. Each building has ten floors, which have three rooms each. Each room has a temperature sensor. In order to test the robustness of SRE we stress-tested it using a Lua script8 to control the heater and air conditioner in each room when it’s too cold or too hot respectively. SRE evaluates and executes rules in a sequential manner so it is important to determine how much latency is introduced when multiple rules are enabled. We define different sets of rules where each rule monitors a temperature sensor. Then, periodically and simultaneously, multiple events are generated on all temperature sensors to activate corresponding rules. RMU measures the amount of memory needed to manage certain number of rules, it is measured in Kilobytes. D. Results For RET, recall that the action part of the rules consists of changing the value of a device and sending a message to the Fig. 7. Rules Latency Time Evaluation cloud. Figure 6 shows the results of the RET evaluation, it shows that only 12ms are necessary to evaluate and execute 100 rules, while 56ms are needed to evaluate 500 rules. We can conclude that on average the evaluation and execution of each rule takes about 0.12 ms. RET shows that the Rules Engine is suitable to execute large number of rules, however in real situations, executing 100s of rules will not be common. Figure 7 shows the results of RLT evaluation. It shows the averages of latency time of different scenarios. Each scenario consists of the execution during 2 minutes of a specific number of rules between (1, 10, 30, 50, 70, 90, 100, 200, 300, 400), and the generation of a number of events for each rule among (5, 10, 11, 15, 20, 30, 100, 200) events per second. It is found that for all sets of rules, the delay is negligible when the number of events/second are less than or equal to 11. After this latency becomes noticeable and exceeds 80ms for 200 events. Figure 8 shows RMU, i.e. amount of memory needed by SRE to manage different number of rules. We found that even for large number of active rules, the amount of memory remains acceptable for embedded systems (less than 2400KB). We find that SRE is suitable for embedded as well as resourceful devices. Its code size is also manageable, as Java version is ≈1.3MB and C version is less than 1MB in size. Fig. 6. Rules Execution Time Fig. 8. Memory Usage 8 https://github.com/InnovationSE/SRE/blob/master/TII/SreEvalRule.lua This paper has been accepted for publication in forthcoming issue of IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. The content is final but has NOT been proof-read. This is an author copy for personal record only. E. SRE Deployment in Real Industrial Environments to write rules but we still need to abstract them with GUI to make We have also tested SRE to solve our real business use cases. it easier for non-technical users. The solution should consider The Java version has been tested in an industrial environment to QoE and the human experience when interacting with technology monitor the production lines within a factory to ensure safety of [37]. VI. CONCLUSION the production lines. The setup is shown in Fig. 9. The rules in SRE receive measurements from Zigbee Green Power modules and This paper presented SRE with control and querying capability then generate alerts, as blinking light, to alert the on-site on top of existing gateways and data logger devices. The Rules supervisor. The same SRE version is used in a different facility Engine allows different stakeholders to define rules to control and where a rule is used to detect the tripping event of a circuit monitor devices. Rule-based solutions bring flexibility to quickly breaker, read specific values from Modbus registers to determine address business requirements without going through the the causes of the trip and send this data to the remote monitoring complex implementation and installation process. There is a platform without any human intervention. In another complete life-cycle management of rules as well as corporation deployment, SRE Java C version resides in a gateway and uses between rules to enable reuse of functionality. The Semantic rules to, for example, stop sending the data to the cloud when Engine, SQenIoT, allows access to device data using semantic tags. the luminosity is zero in order to save cost on the 3G network. The cooperation between the Rules Engine and SQenIoT is what In terms of added value of SRE, we can envision an application sets this work apart from existing solutions. The rules are defined that receives data from multiple SRE deployments and then using semantic tags so that they do refer to higher level concepts displays comparison/bench-marking of energy, occupancy, and not specific devices. The advantage of this is that rules remain efficiency, and other dimensions. Different widgets can be used valid even when devices are added or removed. to send semantic queries to SRE and display the results in an SRE solved simple yet important requirements related to cost appropriate manner. and time savings. Instead of implementing custom functions for Similarly, an analytics application can get aggregated data from each of our end clients by going through typical software SRE by sending a semantic query. As part of machine learning development process, SRE makes our industrial gateways process, semantic queries can be used to subscribe to the data customizable with little effort using rules and semantic queries. from machines for a specific duration which can be then fed into The work described in this paper has been implemented, tested an algorithm to learn about the machine failures with real values. and validated in real industrial settings. Several work items have In fact, with SRE rules, a complex machine learning strategy can been identified and will be used to extend this work. be developed and executed at the Edge without depending on input from the Cloud. We can see that the rule-based approach in SRE makes it much easier to handle different requirements. There is no need to code and deploy a new solution where requirements change. The rules can be easily managed thanks to our rule life-cycle approach. Our experience shows that SRE is a general purpose solution to solve different problems in different domains. V. LESSONS LEARNED AND FUTURE WORK During this work we learned several lessons and plan to tackle them in future works. The first lesson is that when there are multiple rules executing concurrently, conflicts may occur. However, detecting conflicts in rules and solving them is not trivial. The works such as [12], and BZR language [31] and [32] can be explored to find a solution. The second lesson is about using properly aligned ontologies, for the meta-data of the devices. This raises ontology governance issue in large enterprises. There is a tremendous scope of using ontologies in industrial context. We can find early initiative like SAREF ontology [33] and its proposed extensions, Haystack Tagging Ontology [34] and IEEE Ontologies for Robotics and Automation [35]. The third lesson is about efficient inference engines usable on gateways and edge devices. Localized inference capabilities can be particularly useful for emerging trends like local analytics [36]. The fourth and final lesson is the need for a userfriendly way to write rules and semantic queries. Developers can easily use Lua Fig. 9. SRE Deployment in Industrial Environment This paper has been accepted for publication in forthcoming issue of IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. The content is final but has NOT been proof-read. This is an author copy for personal record only. [24] A. Gyrard and M. Serrano, “A unified semantic engine for internet of things REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010. L. D. Xu, W. He, and S. Li, “Internet of things in industries: A survey,” IEEE Transactions on Industrial Informatics, vol. 10, no. 4, pp. 2233– 2243, Nov 2014. J. Ye et al., “Semantic web technologies in pervasive computing: A survey and research roadmap,” Pervasive and Mobile Computing, 2015. I. Khan et al., “A data annotation architecture for semantic applications in virtualized wireless sensor networks,” in Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on, 2015. E. Kharlamov et al., “How semantic technologies can enhance data access at siemens energy,” in The Semantic Web–ISWC, 2014. C. E. Kaed, Y. Denneulin, and F. G. Ottogalli, “Dynamic service adaptation for plug and play device interoperability,” in Proceedings of the 7th International Conference on Network and Services Management. International Federation for Information Processing, 2011. S. N. Han, G. M. Lee, and N. Crespi, “Semantic context-aware service composition for building automation system,” IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 752–761, Feb 2014. R. Want, B. N. Schilit, and S. Jenson, “Enabling the internet of things,” Computer, vol. 48, no. 1, pp. 28–35, Jan 2015. C. E. Kaed, I. Khan, H. Hossayni, and P. Nappey, “Sqenlot: Semantic query engine for industrial internet-of-things gateways,” in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Dec 2016, pp. 204– 209. P. Nappey, C. E. Kaed, A. W. Colombo, J. Eliasson, A. Kruglyak, R. Kyusakov, C. Hbner, T. Bangemann, and O. Carlsson, “Migration of a legacy plant lubrication system to soa,” in IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society, 2013. M. Louvel and F. Pacull, “Linc: A compact yet powerful coordination environment,” in International Conference on Coordination Languages and Models, 2014. Y. Sun, T. Y. Wu, G. Zhao, and M. Guizani, “Efficient rule engine for smart building systems,” IEEE Transactions on Computers, June 2015. J. Barbosa, F. Dillenburg, G. Lermen, A. Garzao, C. Costa, and J. Rosa,˜ “Towards a programming model for context-aware applications,” Computer Languages, Systems & Structures, 2012. E. Kuhn, S. Craß, G. Joskowicz, A. Marek, and T. Scheller,¨ Peer-Based Programming Model for Coordination Patterns, 2013. C. Julien and G. C. Roman, “Egospaces: facilitating rapid development of context-aware mobile applications,” Transactions on Software Engineering, 2006. M. Viroli, D. Pianini, and J. Beal, “Linda in space-time: An adaptive coordination model for mobile ad-hoc environments,” in Proceedings of the 14th International Conference on Coordination Models and Languages, ser. COORDINATION’12, 2012. Y. Zheng, A. T. S. Chan, and G. Ngai, “Mcl: A mobigate coordination language for highly adaptive and reconfigurable mobile middleware: Experiences with auto-adaptive and reconfigurable systems,” Softw. Pract. Exper., 2006. G. Cabri, L. Leonardi, and F. Zambonelli, “Mars: a programmable coordination architecture for mobile agents,” IEEE Internet Computing, vol. 4, no. 4, pp. 26–35, Jul 2000. A. L. Murphy, G. P. Picco, and G.-C. Roman, “Lime: A coordination model and middleware supporting mobility of hosts and agents,” ACM Trans. Softw. Eng. Methodol., vol. 15, no. 3, pp. 279–328, Jul. 2006. M. Mamei and F. Zambonelli, “Programming pervasive and mobile computing applications: The tota approach,” ACM Trans. Softw. Eng. Methodol., vol. 18, no. 4, pp. 15:1–15:56, Jul. 2009. M. Viroli, M. Casadei, S. Montagna, and F. Zambonelli, “Spatial coordination of pervasive services through chemical-inspired tuple spaces,” ACM Trans. Auton. Adapt. Syst., 2011. M. Proctor, Drools: A Rule Engine for Complex Event Processing, 2012. S. Kuboi, K. Baba, S. Takano, and K. Murakami, “An evaluation of a complex event processing engine,” in 2014 IIAI 3rd International Conference on Advanced Applied Informatics, Aug 2014, pp. 190–193. [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] and smart cities: From sensor data to end-users applications,” in 2015 IEEE International Conference on Data Science and Data Intensive Systems, 2015. T. Riedel et al., “Using web service gateways and code generation for sustainable iot system development,” in Internet of Things (IOT), 2010. F. Jammes and H. Smit, “Service-oriented paradigms in industrial automation,” Industrial informatics, IEEE transactions on, 2005. K. Kotis et al., “Semantic interoperability on the web of things: the semantic smart gateway framework,” in Complex, Intelligent and Software Intensive Systems, Sixth International Conference on, 2012. K. Kotis and A. Katasonov, “Semantic interoperability on the internet of things: The semantic smart gateway framework,” Int. J. Distrib. Syst. Technol., 2013. R. Ierusalimschy, L. H. De Figueiredo, and W. Celes Filho, “Lua-an extensible extension language,” Softw., Pract. Exper., 1996. N. Grcevski, A. Kielstra, K. Stoodley, M. G. Stoodley, and V. Sundaresan, “Java just-in-time compiler and virtual machine improvements for server and middleware applications.” in 3rd Conference on Virtual Machine Research And Technology Symposium, 2004. M. Zhao, G. Privat, E. Rutten, and H. Alla, “Discrete control for the internet of things and smart environments,” in Presented as part of the 8th International Workshop on Feedback Computing, 2013. G. Delaval, E. Rutten, and H. Marchand, “Integrating discrete controller´ synthesis into a reactive programming language compiler,” Discrete Event Dynamic Systems, vol. 23, no. 4, pp. 385–418, 2013. L. Daniele, F. den Hartog, and J. Roes, “Created in close interaction with the industry: the smart appliances reference (saref) ontology,” in International Workshop Formal Ontologies Meet Industries, 2015. V. Charpenay, S. Kbisch, D. Anicic, and H. Kosch, “An ontology design pattern for iot device tagging systems,” in 2015 5th International Conference on the Internet of Things (IOT), Oct 2015, pp. 138–145. C. Schlenoff, E. Prestes, R. Madhavan, P. Goncalves, H. Li, S. Balakirsky, T. Kramer, and E. Miguelanez, “An ieee standard ontology for robotics and automation,” in 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE, 2012, pp. 1337–1342. M. Satyanarayanan, P. Simoens, Y. Xiao, P. Pillai, Z. Chen, K. Ha, W. Hu, and B. Amos, “Edge analytics in the internet of things,” IEEE Pervasive Computing, vol. 14, no. 2, pp. 24–31, Apr 2015. K. U. R. Laghari, K. Connelly, and N. Crespi, “Toward total quality of experience: A qoe model in a communication ecosystem,” IEEE Communications Magazine, vol. 50, no. 4, pp. 58–65, April 2012.
2cs.AI
1 Full-Duplex Relaying with Improper Gaussian Signaling over Nakagami-m Fading Channels arXiv:1704.06640v2 [cs.IT] 26 Sep 2017 Mohamed Gaafar, Student Member, IEEE, Mohammad Galal Khafagy, Senior Member, IEEE, Osama Amin, Senior Member, IEEE, Rafael F. Schaefer, Senior Member, IEEE and Mohamed-Slim Alouini, Fellow, IEEE Abstract—We study the potential employment of improper Gaussian signaling (IGS) in full-duplex relaying (FDR) with non-negligible residual self-interference (RSI) under Nakagamim fading. IGS is recently shown to outperform traditional proper Gaussian signaling (PGS) in several interference-limited settings. In this work, IGS is employed as an attempt to alleviate RSI. We use two performance metrics, namely, the outage probability and the ergodic rate. First, we provide upper and lower bounds for the system performance in terms of the relay transmit power and circularity coefficient, a measure of the signal impropriety. Then, we numerically optimize the relay signal parameters based only on the channel statistics to improve the system performance. Based on the analysis, IGS allows FDR to operate even with high RSI. The results show that IGS can leverage higher power budgets to enhance the performance, meanwhile it relieves RSI impact via tuning the signal impropriety. Interestingly, one-dimensional optimization of the circularity coefficient, with maximum relay power, offers a similar performance as the joint optimization, which reduces the optimization complexity. From a throughput standpoint, it is shown that IGS-FDR can outperform not only PGS-FDR, but also half-duplex relaying with/without maximum ratio combining over certain regions of the target source rate. Keywords—improper Gaussian signaling, asymmetric complex signaling, interference mitigation, full-duplex relay, residual selfinterference, outage probability, ergodic rate, coordinate descent. I. I NTRODUCTION Contrary to a long-held acceptance that radio front-ends cannot simultaneously transmit and receive, a truly promising potential for full-duplex communications has been shown by recent hardware developments [1], [2]. Indeed, by multiplexing inbound and outbound traffic over the same channel resource, a full-duplex radio can recover the spectral efficiency loss known to be encountered by its half-duplex counterpart. Performance merits of full-duplex radio have been recently investigated in different communication settings, including full-duplex bidirectional communication, full-duplex base stations, and fullduplex relaying (FDR) [3], with the latter being the focus of M. Gaafar and R. F. Schaefer are with the Information Theory and Applications Chair, Technische Universität Berlin, Germany. Email: {mohamed.gaafar, rafael.schaefer}@tu-berlin.de. O. Amin and M.-S. Alouini are with the Computer, Electrical, and Mathematical Sciences and Engineering (CEMSE) Divison, King Abdullah University of Science and Technology (KAUST), Thuwal, Makkah Province, Saudi Arabia. Email: {osama.amin, slim.alouini}@kaust.edu.sa. M. G. Khafagy was with the CEMSE Division, KAUST, Thuwal, Makkah Province, Saudi Arabia. Currently, he is with the Computer Science and Engineering Department, College of Engineering, Qatar University, Doha, Qatar. Email: [email protected]. this work. These merits have qualified full-duplex communication to be considered as a candidate technology for future fifth generation (5G) wireless networks [4]. FDR allows a relay node to listen to an information source and simultaneously forward to its intended destination. Theoretically, this simultaneous transmission/reception doubles the spectral efficiency in the relay channel. However, in practice, this comes at the expense of a self-interference level introduced at the receiver of the relay node from its own transmitter. Even with the application of advanced self-interference isolation and cancellation techniques, a level of residual self-interference (RSI) persists. Such a persistent RSI link and the means to mitigate it represent the main challenge in full-duplex communications, especially with the fact that its adverse effect can typically be an increasing function of the relay power. Therefore, increasing the relay power no longer guarantees an enhanced end-to-end performance. For instance, by increasing the relay power in a fixed-rate transmission scheme, the relay may forward more reliably to the destination in the second hop. However, it also increases the RSI level which negatively affects the reliability in the first hop. Hence, higher relay power budgets cannot be always utilized beyond a certain threshold. Consequently, employing interference mitigation strategies in FDR is crucial to attain a satisfactory performance of fullduplex transmissions. Improper Gaussian signaling (IGS) has been first introduced in [5], where higher degrees of freedom for the 3-user singleinput single-output (SISO) interference channel (IC) were shown to be achievable. This comes in contrary to other communication settings with interference-free channels where proper Gaussian signaling (PGS) is the optimal choice. PGS assumes the zero-mean complex Gaussian transmit signal to be statistically circularly symmetric with uncorrelated real and imaginary components. On the other hand, IGS is a class of signals where circularity and uncorrelatedness conditions can be relaxed [6]. The results in [5] motivate the need to further study the potential gains of IGS in communication scenarios where interference imposes a noticeable limitation. IGS has been recently adopted to improve the performance of different interference-limited communication settings, namely, SISO-IC [7], [8], multiple-input single-output (MISO)-IC [9], multiple-input multiple-output (MIMO)-IC [10], [11], Z-IC [12]–[14], MIMO X-channel [15], interference broadcast channels [16], cognitive radio channels using underlay [17]–[21] and overlay [22] communication paradigms, alternate (two-path, virtual full-duplex) relaying [23], symbol error rate reduction [24] and asymmetric hardware distor- 2 tions [25]. The potential gains of IGS have been also recently studied in [26] for the MIMO relay channel when a partial decodeand-forward strategy is adopted. In such a relaying strategy, the relay only decodes a part of the message, while the rest of the message is treated as an additional interference term. It was shown in [26] that PGS is optimal within the class of Gaussian signals. However, the work in [26] assumed an ideal FDR, where the self-interference imposed by the relay’s transmitter on its own receiver is perfectly canceled. In [27], a simplified model for FDR with IGS was considered, where the transmit signal only occupies the real dimension of the two-dimensional complex signal space. Also, all the communicating nodes in [27] are assumed to perfectly share the instantaneous Rayleighfading channel coefficients. For such a simplified model, it was shown that IGS was able to effectively improve the achievable rate by eliminating the RSI via its alignment in only one orthogonal signal space dimension, and decoding the desired signal from the other. The more general problem, however, remains more challenging with further interesting aspects to investigate, where complex transmit signals are employed and only channel statistics are made available at the transmitter side. In this work1 , we study the potential performance merits of employing IGS in FDR systems with non-negligible RSI over Nakagami-m fading channels. The main contributions of this paper can be summarized as follows: • We first derive the exact end-to-end outage probability of the FDR system adopting IGS at the relay over Nakagami-m fading as a function of the relay’s transmit power and circularity coefficient in an integral form. Further, we derive a lower bound of the end-to-end outage probability in closed form. Moreover, we provide simpler forms of the derived expressions for Rayleigh fading and derive an upper bound for the end-to-end outage probability based on some convexity properties that are also proven herein. Based on this upper bound, we present an asymptotic analysis that shows the benefits which can be reaped from IGS in FDR systems. • We derive an integral form of the exact end-to-end ergodic rate of the IGS-FDR system as a function of the relay’s transmit power and circularity coefficient over Nakagami-m fading. In addition, we derive an upper bound for the end-to-end ergodic rate. We also present a lower bound for the end-to-end ergodic rate over Rayleigh fading. • We prove unimodality properties of the presented endto-end outage probability upper bound in the relay’s transmit power and circularity coefficient over Rayleigh fading, which allow for efficient numerical optimization 1 While this work was in progress, preliminary results have been accepted and presented in IEEE ICC’16 [28]. In this work, we consider a more generalized framework under Nakagami-m fading, which includes the work in [28] as a special case. We present herein the derived expressions for another performance metric, the ergodic rate, to evaluate the performance of IGS in FDR. Furthermore, we provide more detailed analysis and insights addressing the outage performance. Finally, more numerical results are presented to verify the mathematical analysis. using standard tools. Also, we design the relay’s transmit signal characteristics, represented in the power and circularity coefficient, by a coordinate descent algorithm based on the outage upper bound over Rayleigh fading. • Finally, with the aid of numerical results, we first validate the derived bounds for the outage probability and ergodic rate. Next, we discuss the benefits that can be reaped by employing IGS in FDR in comparison to PGS, and also relative to half-duplex relaying (HDR), under different system and fading parameters. We show that IGS-FDR is not only able to outperform PGS-FDR in terms of the end-to-end throughput, but also that of HDR even with maximum ratio combining (MRC) over certain ranges of the targeted source rate. Finally, we show that one may not seriously compromise the benefits attained via the joint tuning of the power and circularity, and still attain a close end-to-end performance merits through a simple one-dimensional tuning of the circularity coefficient. The rest of the paper is organized as follows. In Section II, we describe the adopted FDR system model. Section III derives the outage probability of the FDR system over Nakagami-m fading, while Section IV deals with the ergodic rate of the system. The design of the signal characteristics for the relay transmissions based on the outage probability over Rayleigh fading is presented in Section V. We validate the performance of IGS in FDR systems in Section VI through numerical simulations. Finally, we conclude the paper in Section VII. Notation and Special Functions: Throughout the rest of the paper, we use |·| to denote the absolute value operation. P{A} denotes the probability of occurrence of an event A. The operator E{·} is used to denote the statistical expectation, with the mean of a random variable (RV) X defined as X̄ = E{X}. n k is the binomial coefficient and min (x, y) is the minimum of the two quantities x and y. Throughout the analysis, R ∞ a−1we−tuse the following special functions [29]. Γ(a) = e dt R ∞0 t denotes the gamma function and Γ(a, x) = x ta−1 e−t dt is R ∞ −xt the upper incomplete gamma function. En (x) = 1 e tn dt R ∞ a−1 b−a−1 −zt 1 and U (a, b, z) = Γ(a) t (t + 1) e dt , a, z > 0 0 are the exponential integral and the Tricomi’s confluent hypergeometric functions, respectively. When n = 1, we use E1 (x) = −Ei(−x), R ∞ −t x > 0, where the exponential integral Ei(x) = − −x e t dt. Also, we use Ξn (x) = ex En (x) to combine the exponential function and integral. II. S YSTEM M ODEL We consider the communication setting depicted in Fig. 1, where a source (S) intends to communicate with a distant destination (D). The direct S − D link is assumed of a relatively weak gain due to path loss and shadowing effects. Accordingly, a full-duplex relay (R) is utilized to assist the end-to-end communication and extend the coverage. FDR can offer higher spectral efficiency when compared to HDR. However, FDR in practice suffers from an RSI level which imposes an additional communication challenge. In addition, 3 Desired Signal Interference hsr S B. Signal Model hrr hrd R D hsd Fig. 1: A full-duplex cooperative setting in coverage extension scenarios. the received signal component via the S − D link is assumed to be weak and hence, it is considered as interference at the destination for simpler decoding purposes as commonly assumed in the literature [30], [31]. Thus, the FDR system under consideration suffers from two interference sources; the RSI at the relay, and the direct S − D link signal received at the destination. A. Channel Model The fading coefficient of the i − j link is denoted by hij , for i ∈ {s, r} and j ∈ {r, d}, where s, r and d refer to the source, relay, and destination nodes, respectively. Moreover, the i − j link gain is denoted by gij = |hij |2 . All channels are assumed to follow a block fading model, where hij remains constant over one block, and varies independently from one block to another following a Nakagami-m fading distribution  with a shaping parameter mij and average power E |hij |2 = πij . Accordingly, the channel gain gij is a gamma RV with π a shaping parameter2 mij and a scale parameter θij = mijij . Furthermore, it should be noted that the probability density function (PDF) of gij is defined as − x xmij −1 e θij fgij (x; mij , θij ) = m , x ≥ 0· Γ(mij )θij ij (1) In the special case mij = 1, Rayleigh fading is obtained. All channel fading gains are assumed to be mutually independent. The relay operates in a full-duplex mode where simultaneous listening/forwarding is allowed with an introduced level of loopback interference. The link coefficient hrr 3 is assumed to represent the RSI after undergoing all possible isolation and cancellation techniques [30], [31], [35]. The source and the relay powers are denoted by Ps and Pr , respectively, where both are restricted to a maximum allowable value of Pmax . Also, nr and nd denote the circularly-symmetric complex additive white Gaussian noise (AWGN) components at the relay and the destination, with variance σr2 and σd2 , respectively. Without loss of generality, we assume that σr2 = σd2 = 1. 2 In this paper, we assume only integer shape parameter. Typical analysis involving wireless communications over Nakagami-m channels uses values of m = 1 up to m = 4 to keep the fading effects [32]. 3 Depending on the communication setting, transmit power ranges, and the employed RSI cancellation techniques, the average RSI link gain is typically assumed to range from 3 to 10/15 dB above the noise floor [2, Section IV.B], [33, Chapter 2], [34]. The transmit signals at the source and the relay at time t are denoted by xs [t] and xr [t], respectively. PGS is adopted at the source 4 which transmits with its power budget, Ps = Pmax . On the other hand, with the availability of statistical transmit channel state information (CSI) at the relay, zero-mean IGS is adopted at the relay in order to mitigate the non-negligible RSI at its receiver. The degree of impropriety of xr [t] is measured based on the following definitions. Definition 1. [36] The variance and pseudo-variance of the 2 relay’s transmit signal, xr [t], are given by σx2 = E{|xr | } and 2 2 σ̃x = E{xr }, respectively. Definition 2. A signal is called proper if it has a zero pseudovariance σ̃x2 , while an improper signal has a non-zero σ̃x2 . Definition 3. [17] A circularity coefficient is a measure of the degree of impropriety of the signal xr [t], which is given as Cx = σ̃x2 /σx2 . Following from Definitions 2 and 3, the circularity coefficient satisfies 0 ≤ Cx ≤ 1. In particular, Cx = 0 implies a proper signal, while Cx = 1 implies a maximally improper signal. The received signals at the relay and the destination at time t are given, respectively, by p p yr [t] = Ps hsr xs [t] + Pr hrr xr [t] + nr [t], (2) p p yd [t] = Pr hrd xr [t] + Ps hsd xs [t] + nd [t]· (3) The relay is assumed to adopt a decode-and-forward relaying strategy, where it does not transmit any message of its own, but forwards the regenerated source message after decoding. Due to the source and relay asynchronous transmissions, the signal transmitted by the relay (source) is considered as an additional noise term at the relay (destination) in the decoding stage as commonly treated in the related literature [30], [31]. C. Achievable Rates with IGS From the adopted signal model in (2) and (3), each transmit signal, i.e., from the source and the relay transmitter, is considered as a desired signal at one receiver while treated as interference at the other. Hence, the rate expressions for the first and second hops have the same form of those of a two-user IC. Lemma 1. [37] The achievable rate of a single link that is subjected to interference-plus-noise z when x is transmitted and observed as y is expressed as 2! σy4 − σ̃y2 1 R = log2 · (4) 2 2 σz4 − |σ̃z2 | As a result of using IGS, while treating the interference as a Gaussian noise, the achievable rates of the FDR system 4 For the ease of exposition, we use PGS at the source. This assumption can be further justified since the use of IGS at the source calls for a joint source/relay improper signal optimization. Although an IGS source is expected to offer further gains, such a joint optimization turns out to be mathematically involved and intractable. 4 are analyzed based on Lemma 1. First, the achievable rate supported by the S − R link can be expressed as !   1 − Cy2r 1 Ps gsr , (5) Rsr (Pr , Cx ) = log2 1 + + log2 Pr grr + 1 2 1 − CI2r where Cyr and CIr are the circularity coefficients of the received and interference-plus-noise signals at the relay, respectively. Hence, (5) can be simplified as ! 2 2 1 (Ps gsr + Pr grr + 1) −(Pr grr Cx ) Rsr (Pr , Cx ) = log2 · (6) 2 2 2 (Pr grr + 1) −(Pr grr Cx ) Similarly, the achievable rate supported by the R − D link is given by ! 2 2 1 (Pr grd +Ps gsd + 1) −(Pr grd Cx ) Rrd (Pr , Cx ) = log2 · (7) 2 2 (Ps gsd + 1) One can notice that if Cx = 0, we obtain the well known achievable rates of PGS. From (6) and (7), by adopting IGS at the relay transmitter, the rate of the S − R hop improves while the rate of the R − D hop deteriorates which creates a trade-off that can be optimized to yield a better performance than PGS. III. O UTAGE P ERFORMANCE In this section, we derive the end-to-end outage probability of the FDR system depicted in Fig. 1 under the assumption of Nakagami-m fading while the relay transmits improper signals. Moreover, we obtain simpler forms for the Rayleigh fading case. The end-to-end outage probability is given by PE−E = 1 − P sr P rd , (8) where Psr and Prd denote the outage probability in the S − R and the R − D links, respectively, while P ij = 1 − Pij . In what follows, we derive the outage probability expressions in the individual links, i.e., Psr and Prd . A. Outage Probability of S − R Link Let r (bits/sec/Hz) denote the target rate of the S − R link, then its outage probability is defined as Psr (Pr , Cx ) = P {Rsr (Pr , Cx ) < r} · (9) The outage probability of the S − R can be calculated from Lemma 2. Lemma 2. The exact outage probability of the S − R link with a target rate r is given by 1 Psr (Pr , Cx ) = 1 − mrr Γ (mrr ) Γ (msr ) θrr    Z∞ x Pr xCx (Pr x + 1) Ψr e− θrr dx, × xmrr −1 Γ msr , Ps θsr Pr x + 1 0 where Ψr (x) = p (10)  1 + γ (1 − x2 ) − 1 and γ = 22r − 1. Proof: By substituting (6) into (9), we get n 2 Psr (Pr , Cx ) = P Ps2 gsr + 2Ps gsr (Pr grr + 1)   o 2 2 − γ (Pr grr + 1) − (Pr grr Cx ) < 0 · (11) The expression inside the probability expression is a quadratic function in gsr . Hence, the conditional outage probability given grr is equivalent to integrating the gamma PDF of gsr over the region in which the quadratic function is less than 0 which gives ◦ Zgsr x 1 Psr (Pr , Cx |grr ) = xmsr −1 e− θsr dx msr Γ (msr ) θsr 0   ◦ gsr Γ msr , θsr =1− , (12) Γ (msr )   Cx ◦ where gsr = (Pr gPrrs +1) Ψr PPrrggrrrr+1 represents the positive root of the inequality inside the probability sign. Therefore, by averaging over the statistics of grr in (12), we obtain      Pr grr Cx r grr +1)  Γ msr , (PP  Ψ r θ P g +1 s sr r rr Psr (Pr , Cx ) = 1 − Egrr ,   Γ (msr ) (13) which directly yields the result in (10). Unfortunately, there is no closed form expression for the integral in Lemma 2. In the following, we derive a lower bound on the S − R outage probability for Nakagami-m fading, in addition to an upper bound for the special Rayleigh fading case. 1) Lower Bound: A lower bound on Psr is provided in the following lemma. Lemma 3. The S − R link outage probability can be lowerbounded as Ψr (Cx ) e− Ps θsr Psr ≥ 1 − mrr Γ (mrr ) θrr m  Ψr (Cx ) k mX m   sr −1 X P Γ (k + m ) rr r Ps θsr m ×  k+mrr k Pr Ψr (Cx ) m=0 k=0 Γ (m + 1) + θ1rr Ps θsr ∆ LB = Psr (Pr , Cx ) · (14) Proof: The S − R outage probability expression in rx Lemma 2 can be lower-bounded by replacing PP Cx r x+1 by Cx . This can be easily seen as Ψr (x) and Γ (., x) are monotonically decreasing in x. Then, we use the series expansion of the upper incomplete gamma function [38, 8.352-2] as 5 Then, the outage probability of the R − D link can be obtained from the following result.   (Pr x + 1) Ψr (Cx ) Γ msr , Ps θsr = Γ (msr ) e− (Pr x+1)Ψr (Cx ) Ps θsr mX sr −1  (Pr x+1)Ψr (Cx ) Ps θsr m=0 Γ (m + 1) Theorem 1. The R − D link outage probability with a target rate of r is expressed as m · (15) Hence, the integral can be rewritten as Ψ (C ) r x mX rd −1 1 e− Ps θsr (Pr , Cx ) = 1 − mrr Γ (mrr ) θrr m=0 Γ (m + 1)  mZ ∞ Pr Ψr (Cx ) 1 Ψr (Cx ) m xmrr −1 (Pr x + 1) e−( Ps θsr + θrr )x dx· × Ps θsr 0 (16) m  P m k m By using the binomial theorem (Pr x + 1) = k (Pr x) , LB Psr k=0 the result is obtained by solving the integral in (16) by [38, 3.381-4]. 2) Upper Bound over Rayleigh Fading: In the case of Rayleigh fading, the S − R hop outage probability is simplified as o n (Pr grr +1) Pr grr Cx P (P , C ) = 1 − E e− Ps πsr Ψr ( Pr grr +1 ) · (17) sr,RF r x grr Unfortunately, there is no closed-form expression for this expectation except at Cx = 0, which gives the known PGS outage probability given as − Psηπsr Ps πsr e , (18) Ps πsr + Pr πrr η where η = 2r − 1. Otherwise, we resort to obtain an upper bound as follows. Psr,RF (Pr , 0) = 1 − − Ψr (Cx ) e Pr θrd (1−Cx2 ) Prd (Pr , Cx ) = 1 − msd Γ (msd ) θsd m  Ψr (Cx ) k mX m   rd −1 X P Γ (k + m ) 2 sd s Pr θrd (1−Cx ) m × k+msd ·  k 1 r (Cx ) m=0 k=0 Γ (m + 1) PrPθsrdΨ(1−C 2) + θ sd x (21) Proof: The proof follows similar steps as in Lemma 2 and the S − R outage probability lower bound over Rayleigh fading in Lemma 3. For Rayleigh fading, the outage probability of the R − D link can be obtained from the following corollary. Corollary 1. The outage probability of the R − D link, over Rayleigh fading, is expressed as Prd,RF (Pr , Cx ) = 1 − e − Ψr (Cx ) 2) Pr πrd (1−Cx (Cx ) Ps πsd Pr πΨrdr (1−C 2) + 1 (22) · x From Corollary 1, it can be noticed that, for the PGS case, i.e., Cx = 0, Eq. (22) yields the known expression for PGS [30] as − η Pr πrd e Pr πrd · (23) Pr πrd + Ps πsd η Also, for the maximally improper case, i.e., Cx = 1, it yields Prd,RF (Pr , 0) = 1 − − 2Prγπ Prd,RF (Pr , 1) = lim Prd,RF (Pr , Cx ) = 1 − Cx →1 Proposition 1. The exponential term inside the expectation operator in (17) is convex in grr . e γPs πsd 2Pr πrd rd · +1 (24) Proof: The proof is given in Appendix VII. Therefore, an upper bound on the S − R link outage probability is given as follows. C. End-to-End Outage Probability The exact end-to-end outage performance can be obtained from the following theorem. Lemma 4. The S − R link outage probability, over Rayleigh fading, is upper-bounded by Theorem 2. The exact end-to-end outage probability with a target rate r can be numerically calculated from Psr,RF (Pr , Cx ) ≤ 1 − e− where α = Pr πrr +1 Ps πsr Ψr (αCx ) ∆ UB = Psr,RF (Pr , Cx ) , (19) Pr πrr Pr πrr +1 . Proof: First, we follow Proposition 1, then by applying the Jensen’s inequality to the expectation in (17), we obtain the given outage probability upper bound of the S − R link. − 0 B. Outage Probability of R − D Link Similarly, let r (bits/sec/Hz) denote the target rate of the R − D link, then its outage probability is defined as Prd (Pr , Cx ) = P {Rrd (Pr , Cx ) < r} · (20) Ψr (Cx ) e Pr θrd (1−Cx2 ) PE−E = 1 − msd mrr Γ (msd )Γ (mrr ) Γ (msr ) θsd θrr  m Ψr (Cx ) k mX m   rd −1 X P Γ (k + m ) 2 sd s Pr θrd (1−Cx ) m ×  k+msd k Ps Ψr (Cx ) m=0 k=0 Γ (m + 1) Pr θrd (1−C 2 ) + θ1sd x    Z∞ x (Pr x + 1) Pr xCx mrr −1 × x Γ msr , Ψr e− θrr dx· Ps θsr Pr x + 1 (25) Proof: Based on the derived expressions of the outage probability for S − R and R − D links from Lemma 2 and Theorem 1, respectively, and by direct substitution in (8), we obtain the result. 6 Unfortunately, there is no closed form solution for the end-to-end outage probability in Theorem 2. Therefore, we resort to obtain an expression for the lower bound of the end-to-end outage probability in the Nakagami-m fading, in addition to an upper bound expression for the special case of Rayleigh fading. These bounds have a significantly reduced computational complexity and an enhanced numerical stability than the exact expression in (25). 1) Lower Bound: The following theorem provides a lower bound for the end-to-end outage probability. Theorem 3. The end-to-end outage probability can be lowerbounded as   PE−E (Pr , Cx ) ≥ 1 − e −Ψr (Cx ) 1 Ps θsr + 1 2) Pr θrd (1−Cx 0 Prk−m Γ(k+mrr )Γ(k0 +msd )Ψrm+m (Cx ) 0 0 m θ m0 (1−C 2 )m Psm−k Γ(m+1)Γ(m0 +1)θsr x rd Pr Ψr (Cx ) Ps θsr + 1 θrr k+mrr  Ps Ψr (Cx ) 2) Pr θrd (1−Cx + 1 θsd k0 +msd ∆ LB = PE−E (Pr , Cx ) · (26) Proof: The result follows directly from (8), Lemma 3 and Theorem 1. Corollary 2. The lower bound in Theorem 3 at Cx = 0 reduces to the exact expression of the end-to-end outage probability for the PGS case. Specifically, for the PGS case over Rayleigh fading, we have the exact expression for the end-to-end outage probability as −η  1 + 1  Ps πsr Pr πrd Ps Pr πsr πrd e PE−E,RF (Pr , 0) = 1 − · (Ps πsr + Pr πrr η) (Pr πrd + Ps πsd η) (27) Proof: For Cx = 0, the S − R outage probability lower bound in Lemma 3 reduces to the exact expression and then the result follows directly. 2) Upper Bound over Rayleigh Fading: From a system design prospective, it is typically more beneficial to have an upper bound than a lower bound for the end-to-end outage probability. Therefore, we state next the upper bound of the end-to-end outage probability over Rayleigh fading in Theorem 4. Theorem 4. The end-to-end outage probability over Rayleigh fading can be upper-bounded by   PE−E,RF (Pr , Cx ) ≤ 1 − e − Ψr (Cx ) Pr πrr +1 2 ) + Ps πsr Ψr (αCx ) Pr πrd (1−Cx (Cx ) Ps πsd Pr πΨrdr (1−C 2) + 1 x ∆ UB = PE−E,RF (Pr , Cx ) · Corollary 3. When the relay node uses maximally IGS, the end-to-end outage probability, over Rayleigh fading, can be upper-bounded by − UB lim PE−E,RF =1−  2Pr πrd e γ 2Pr πrd +  (Pr πrr +1) Ψr (αCx ) Ps πsr 2Pr πrd + γPs πsd Cx →1 · (29) Theorem 5. In the limiting case where πrr → ∞ over Rayleigh fading with a fixed relay transmit power Pr , the exact end-to-end outage probability for the PGS case PE−E,RF (Pr , 0) → 1, while the upper bound for the end-to-end outage probability for the maximally IGS case UB (Pr , 1) → K, where PE−E,RF m =0 k=0 k =0 × Asymptotic Analysis: For maximally IGS, we obtain the upper bound of the end-to-end outage probability from the following corollary. In order to evaluate the performance of the end-to-end outage probability upper bound with respect to RSI when using maximally IGS at the relay transmitter, we state the following theorem. msd mrr Γ (msd ) Γ (mrr ) θsd θrr 0    mX m X m sr −1 mX rd −1 X m m0 × k k0 0 0 m=0 0 Proof: It follows directly from (8), Lemma 4 and Corollary 1. (28) −  γ + γ  2Pr πrd e 2Pr πrd Ps πsr K =1− · 2Pr πrd + γPs πsd (30) Proof: The result is obtained from Corollary 2, 3 and taking the limit at πrr → ∞. Interestingly, different from the PGS case, the maximally IGS introduces immunity against high RSI and achieves less outage probability with a constant upper bound (30), which depends on the quality of both S − R and R − D links, in addition to the target rate. IV. E RGODIC R ATE P ERFORMANCE In this section, we evaluate the ergodic rate performance of the canonical cooperative setting depicted in Fig. 1 when IGS is allowed at the relay under Nakagami-m fading. We also present simplified expressions for Rayleigh fading. The end-to-end ergodic rate of the FDR system can be calculated as Z∞ RE−E = E {min (Rsr , Rrd )} = P {min {Rsr , Rrd } ≥ r} dr· 0 (31) The last complementary cumulative distribution function (CDF) integral form for the statistical expectation follows from the fact that min {Rsr , Rrd } is a non-negative RV. Hence the exact end-to-end ergodic rate can be numerically computed from the following result. Theorem 6. The exact end-to-end ergodic rate can be numer- 7 partial fraction decomposition, I can be expressed as " 2 Z∞ m+m0 X 1 λi Ψr e−ΩΨr   dΨr I= i log (2) i=1 Ψ + 1 + (−1) C ically calculated from mrd −1 m X X m P k Γ (k + m ) sd s RE−E = k Γ (m + 1) m=0 k=0 m     Ψr (Cx ) (P x+1) Pr xCx Z∞Z∞ xmrr −1 Γ msr , Pr θ Ψr P 2) Pr θrd (1−Cx s sr r x+1 ×  k+m 0 0 − ×e m mrr Γ (msd ) Γ (mrr ) Γ (msr ) θsdsd θrr Ψr (Cx ) 2 Pr θrd 1−Cx ( Ps Ψr (Cx ) 2) Pr θrd (1−Cx + 1 θsd ) rr sd (32) dxdr· Proof: The result is obtained directly from (31). The expression of the integrand represents the complement of the end-to-end outage probability which is obtained in Theorem 2. Unfortunately, this double integral5 does not have a closed form solution in the general case. In what follows, we alternatively derive an upper bound on the end-to-end ergodic rate performance in the Nakagami-m fading. Additionally, we obtain a lower bound in the Rayleigh fading special case. The derived bounds are computationally simpler and numerically more stable than the exact form in (32). 1) Upper Bound: An upper bound for the end-to-end ergodic rate is presented in the following result. Theorem 7. The end-to-end ergodic rate can be upperbounded as (33) Proof: We define an upper bound for the end-to-end ergodic rate of the FDR system as Z∞ RE−E ≤ ∆ LB 1−PE−E (Pr , Cx |r ) dr = RUB E−E (Pr , Cx ) , (34) 0 LB is the lower bound of the outage probability where PE−E which is obtained in Theorem 3, which depends on the target rate r. By substituting (26) in (34), we get the following integral expression for the upper bound of the end-to-end ergodic rate. RUB E−E 1 = m mrr Γ (msd ) Γ (mrr ) θsdsd θrr mX m X m0 sr −1 mX rd −1 X m=0 m0 =0 k=0 k0 =0 Ps m (θ (1 − C 2 )) Γ (m + 1) Γ (m0 + 1) θsr rd x −Ψr (Cx ) Z∞ e × 0 |  Pr Ψr (Cx ) Ps θsr 0 Ps Ψr 2) Pr θrd (1−Cx + 1 θsd # l dΨr , (36) 2) Lower Bound over Rayleigh Fading: Similar to the discussion in the previous section, providing a lower bound for the ergodic rate offers further insights regarding the least performance merits IGS is able to offer relative to PGS. A lower bound for the ergodic rate of the FDR system over Rayleigh fading channels is presented in the following theorem. Theorem 8. The end-to-end ergodic rate, over Rayleigh fading, can be lower-bounded by  Pr πrd 1 − Cx2 RE−E,RF ≥ Ps πsd log (2)      i i 2 Pr πrr 1 + (−1) αCx 1 + (−1) αCx X  × κi Ξ1  + αPs πsr Pr πrd (1 − Cx2 ) i=1 (37) + κ3 Ξ1 p2r πrd πrr 1 − Cx2 αPs2 πsd πsr  + 1 Ps πsd !! (38) m0 0.5Ps πsd and i 2 )−P π Pr πrd (1−Cx s sd (1+(−1) αCx ) 2 Ps πsd (Ps πsd −Pr πrd (1−Cx )) 2 )−P π (1−αC ))(P π (1−C 2 )−P π (1+αC )) · (Pr πrd (1−Cx s sd x r rd s sd x x where κi = 1 + 2 Pr θrd 1−Cx ) (Ψ (C ))m+m0 r x k0 +msd dr · k+mrr  P Ψ (C ) 1 s r x + θ1 + 2) θsd Pr θrd (1−Cx rr {z } ( I  e−ΩΨr Remark 1. Following Corollary 2, the upper bound in Theorem 7 at Cx = 0 reduces to the exact expression of the endto-end ergodic rate for the PGS case. ∆ ! 1 Ps θsr m+m0 ξl Ψr which can be solved, using [38, Eq. 3.353-5, 8.352-5] and [39, Eq. 6.5.9] for the first integral, and [39, Eq. 2.3.6-9] for the other integrals. = RLB E−E,RF , 0 m−k0 k0X +msd Z∞ l=1 k0 Prk−m Γ (k + mrr ) Γ (k0 + msd ) × + mm0  k x ∞ 0 k+m Xrr Z ζj Ψm+m e−ΩΨr r +  j dΨr Pr Ψr 1 j=1 0 + Ps θsr θrr ! + θx r 0 (35) By employing a change of variables in the integral I and using κ3 = Proof: First, we define a lower bound on the ergodic rate as Z∞ LB UB RE−E,RF = 1 − PE−E,RF (Pr , Cx |r ) dr, (39) 0 5 The direct numerical computation of this double integral needs a careful selection of the upper limit value to avoid overflow. UB where PE−E,RF is the outage probability upper bound in the Rayleigh fading case which is stated in Theorem 4. Hence, 8 0 RE−E mX m X m sr −1 mX rd −1 X 1 ≤ m mrr log (2) m=0 0 Γ (msd ) Γ (mrr ) θsdsd θrr k=0 0 m =0 × 2 X ! ! 0 Prk−m Γ (k + mrr ) Γ (k0 + msd ) m m0 0 m (θ (1 − C 2 ))m k k0 Psm−k0 Γ (m + 1) Γ (m0 + 1) θsr rd x k =0  0 Di Ω−(m+m ) Γ m + m0 + 1 Ξm+m0 +1    1 + (−1)i Cx Ω i=1 k+m Xrr +  0 j ζj Pr−j Psj θsr Ω(j−1)−(m+m ) Γ m + m0 + 1 U   j, j − m + m0 , j=1 k0 +msd X + l ξl Ps−l Prl θrd 1− l 0 Cx2 Ω(l−1)−(m+m ) Γ 0 where Ω = + Pr θrd 1 − Cx2 1 + l, l − m + m , Ps θsd Ps2 θsr θsd m+m +1 U λi =  lim Ψr →−(1+(−1)i Cx ) 2 Q i=1 1+(−1)i Cx (Ψr +( lim ))  Pr Ψr Ps θsr , ξl = rr ( 2 Pr θrd 1−Cx ) 0 dk +msd −l k0 +msd −l dΨr !k0 +m P s Ψr ( 2 Pr θrd 1−Cx ) + θ1 sd Z∞ = e − Ψr (Cx ) 2) Pr πrd (1−Cx (a) dr (40) x  Z∞ − e ≥  (Pr πrr +1) Ψr (αCx ) + P s πsr (Cx ) Ps πsd Pr πΨrdr (1−C 2) + 1 0 0  Ψr (αCx ) (Pr πrr +1) Ψr (αCx ) 2) + Ps πsr Pr πrd (1−Cx r (αCx ) Ps πsd PrΨ πrd (1−C 2 ) + 1 ×e − Pr πrr αPs πsr ( 2 Pr θrd 1−Cx ) + θ1 sd  sd F (Ψr ) dr, sd −l ) (k0 +msd −l)! sd I MPROPER S IGNALING O PTIMIZATION In this part, for Rayleigh fading, we optimize the parameters of the IGS transmit signal to minimize the end-to-end outage probability upper bound given some boundaries for the optimization variables. First, we individually optimize the relay power/circularity coefficient, assuming the other variable is kept fixed. Second, we jointly optimize the power and circularity. x where (a) is obtained by replacing every Ψr (Cx ) by Ψr (αCx ) as it can be readily verified that Ψr (x) is a monotonically decreasing function in x and α < 1. Then, by changing of variables and performing partial fraction decomposition, we get  Pr πrd 1 − Cx2 LB RE−E,RF = Ps πsd log (2)   Z∞ X 2 κi κ3    +   ×  2) Pr πrd (1−Cx i Ψ + 1 + (−1) αC Ψ + i=1 r x r Ps πsd 0  Ps Ψr · V.   !k0 +m ( rr !k0 +m  Ps θsd Ps 2 Pr θrd 1−Cx (Ψr +1) k+m + θ1 Ωr →− we get RLB E−E,RF ∆ = RUB E−E ,   Ψr + 1 + (−1)i Cx F (Ψr ),  k+m  rr Pr Ψr dk+mrr −j lim F (Ψr ) + θ1 k+mrr −j Ps θsr rr P θ Ωr →− s sr dΨr Pr θrr  k+m −j rr Pr (k+mrr −j)! Ps θsr and F (Ψr ) =  !! (33) 1 , 2) Pr θrd (1−Cx  ζj =  0  l=1 1 Ps θsr 1 Ps θsr + 2 Pr θrr Pr θrd θrr (1 − Cx2 ) 1 + 2) Pr πrd (1−Cx  Ψr dΨr , (41) which can be solved using [38, Eq. 3.352-4] to give the lower bound. A. Individual Power and Circularity Coefficient Optimization In order to investigate the merits of IGS over conventional PGS in FDR channels, we aim at finding the optimal circularity coefficient value that minimizes the end-to-end outage probability upper bound. Specifically, we aim at solving the following optimization problem: min Cx s.t. UB PE−E,RF (Pr , Cx ) 0 ≤ Cx ≤ 1· (42) In order to solve the optimization problem, we analyze the conUB vexity properties of the objective function PE−E,RF (Pr , Cx ) in (28). In general, the function is found to be non-convex due to the indefinite sign of the second derivative. However, other desirable properties that allow us to find the global optimal point are presented in the following theorem. 9 Theorem 9. The upper bound of the end-to-end outage probability, over Rayleigh fading, is either a monotonic or a unimodal function in each of its variables, Pr and Cx , individually. Proof: The proof is provided in Appendix VII. Since monotonicity and unimodality are special cases of quasi-convexity, such a result allows for the use of quasiconvex optimization algorithms. For instance, the optimal Cx can be numerically obtained using the well-known bisection method operating on its derivative given in Appendix B. Similar properties are shown for the individual power optimization problem. B. Joint Power and Circularity Coefficient Optimization The power optimization problem in PGS is formulated as min PE−E,RF (Pr , 0) s.t. 0 < Pr ≤ Pmax · Pr (43) Also, for the IGS case, the joint problem is given as follows: min UB PE−E,RF (Pr , Cx ) s.t. 0 < Pr ≤ Pmax , 0 ≤ Cx ≤ 1· Pr ,Cx (44) It can be readily verified that the PGS outage probability in (27) is non-convex in Pr . However, it is shown in [33, Appendix 3.A] that the interior of the function is unimodal, and hence quasi-convex, in Pr following similar footsteps of the proof in Theorem 9, i.e., via the Descartes rule of signs applied to the derivative of the outage probability function. Hence, the bisection method can be used to locate the global optimum. The second problem is a minimization of a non-convex function with simple box constraints. Thus, one may try to solve it numerically by, for example, the gradient projected method or the projected Newton’s method without any guarantee to converge to an optimal solution [40]. For exact performance analysis purposes, we find the optimal solution via a fine grid search. Moreover, in Theorem 9, we proved that the objective function is either a monotonic or unimodal in each of the optimization variables individually over the interior of the constraint set. This property motivates us to use a coordinate descent (alternating optimization) method based on a twodimensional bisection algorithm as in [41]. Fortunately, as it will be noticed in the numerical results section, it always converges numerically to the optimal solution obtained by grid search. VI. N UMERICAL R ESULTS We numerically evaluate the benefits that can be reaped by employing IGS in FDR systems. Throughout the following, we compare the performance of IGS to that of PGS as a benchmark in terms of the outage probability and ergodic rate metrics. For the adaptive design of the FDR system based on the outage probability over Rayleigh fading, we use the algorithms discussed in Section V. Specifically, for PGS, we show the unoptimized performance with maximum power allocation (MPA), alongside that with optimized relay power using the bisection algorithm (BA) in addition to a fine grid search (GS) for verification purposes. On the other hand, the IGS outage performance is shown via two expressions, namely, a) the derived upper bound (UB) in Theorem 4 and, b) the exact end-to-end expression involving the numerical computation of the integral in (17). The IGS optimization involves two variables; Pr and Cx . Hence, we consider two cases for IGS in the presented figures, namely, i) one-dimensional (1D) optimization over Cx while adopting maximum power allocation for Pr , and ii) joint Pr /Cx two-dimensional (2D) optimization. The optimization is done for the two aforementioned cases using both BA and GS, with the prefixes 1D and 2D to distinguish between them. Also, for performance analysis purposes, we optimize the outage probability and the ergodic rate performances of the FDR system over Nakagami-m fading based on a fine 1D and 2D grid search (GS). We use the simulation parameters in Table I unless otherwise stated. A. Outage Probability Performance Here, we evaluate the proposed lower bound of the end-toend outage probability for m ≥ 1 and the upper bound for Rayleigh fading. We use these bounds to optimize the outage performance. Finally, we compare the throughput of the IGSFDR to that of PGS-FDR and HDR. 1) Performance of Proposed Outage Bounds: We evaluate the performance of the proposed outage probability bounds comparing to the exact integral form expressions which are computed numerically. For this purpose, we plot the end-toend outage probability versus Pr and Cx in Fig. 2 for (a) πrr = 0 dB and (b) πrr = 10 dB. It is clear from the figure that the outage performance improves by increasing m as the fading effect becomes less severe in the relayed path. Also, we can see the tightness of the outage probability bounds for different values of Pr and Cx for the two πrr values. For a fixed Pr while increasing Cx , the outage performance depends on the RSI. Specifically, in our simulation setup, it is increasing for πrr = 0 dB and decreasing for πrr = 10 dB. Further, for a fixed Cx while increasing Pr , in both RSI values, the outage improves till a certain relay power, at which it starts to deteriorate. 2) Outage Probability Optimization: We evaluate here the performance of the optimized end-to-end outage probability with respect to several system and fading parameters based on the aforementioned optimization algorithms. Effect of RSI: In Fig. 3, we plot the outage probability versus πrr for m = 2 based on a fine 1D and 2D GS. As shown, one can observe that at lower values of the RSI, the IGS solution reduces to PGS since the RSI is low and the relay can use more power without deteriorating the S − R link qualityof-service. As πrr increases, the outage performance of the PGS is significantly deteriorated. On the other hand, the IGS design saturates at a fixed level. However, this level depends on the target rate and the S − R and R − D link conditions which can be clearly noticed from the outage performance at the two values of π. Moreover, a very interesting observation 10 Parameter πsr = πrd = π πsd Cx mrr = msd Value 20 dB 3 dB 0.9 1 Parameter πrr Ps = Pr = Pmax r msr = mrd Value 10 dB 1W 1 bits/sec/Hz m ∈ {1, 2, 3} TABLE I: Simulation Parameters. 10 -1 10 0 Outage Probability Outage Probability m=1 m=1 10 10 m=2 -2 -3 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10 10 -2 m=2 10 1 -1 -3 0 0.1 0.2 0.3 0.4 Cx 0.7 0.8 0.9 1 IGS-UB IGS-Exact IGS-LB 10 0 m=1 m=1 Outage Probability Outage Probability 0.6 Cx IGS-UB IGS-Exact IGS-LB 10 0 0.5 10 -1 10 -2 10 -3 10 -1 10 -2 m=2 m=2 10 -4 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 Pr (W ) (a) πrr = 0 dB 10 -3 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 Pr (W ) (b) πrr = 10 dB Fig. 2: Outage prob. vs. Pr [lower] and Cx [upper], for different πrr and m. in Fig. 3 is that the individual optimization of the signal asymmetry gives nearly the same performance as that via the joint optimization of Pr and Cx . Hence, one can resort to the simpler 1D optimization on Cx to reduce the complexity of the adaptive FDR system design. Effect of Allowable Relay Power Budget: In Fig. 4, we study the outage probability versus the available power budget at the relay. For FDR with PGS, and specifically when the relay transmits with its maximum power, the outage probability performance is known to be enhanced by increasing the allowable power only till a breakeven point as shown. This point is where the increasing adverse effect of RSI on the first hop due to higher relay power starts to exceed any performance returns due to the higher reliability of the second hop. After such a point, any increase in the relay power causes a steady increase in the end-to-end outage probability. If relay power optimization is allowed in PGS, the performance can at best be kept constant after this breakeven point by clipping the transmit power level, rendering any further increase in the power budget unutilized. On the other hand, the performance trend is different when IGS is adopted at the relay node. Indeed, by optimizing the relay’s circularity coefficient, the outage probability performance continues its decreasing trend. It is also observed that, unlike in PGS, the relay tends to use its maximum power in IGS when joint power/circularity optimization is considered. For high power budgets, the optimal circularity coefficient value approaches unity, denoting a maximally improper signal that tends to allocate most of its power in only one dimension of the complex signal space. This renders the worst case scenario to have the remaining orthogonal signal space dimension as self-interference-free. The decreasing trend of the outage probability in IGS, however, still shows diminishing returns due to the outage performance bottleneck in the first hop, which is primarily influenced by the first hop gain, πsr . Effect of Average S − R Link Gain: In Fig. 5, we plot the outage probability versus πsr for different source target rates. First, communication fails at low πsr values due to the first hop bottleneck, causing the outage probability of both PGS and IGS to start close to unity. As πsr increases, using IGS enables the relay to utilize more power relative to PGS to boost the outage performance. At the end, when πsr reaches a significantly higher value than the RSI, the first hop no longer operates in the interference-limited regime, and hence, the IGS merits become less significant relative to PGS. Finally, as shown, the merits of IGS over PGS are more clear as the target rate decreases. In this case, the rate requirements in the first hop become less stringent, allowing IGS to utilize higher transmit power relative to PGS and yielding a better performance. 11 100 10 0 10 -1 10 -2 10-1 10 -3 0 2 4 6 8 10 12 14 16 18 20 Fig. 3: Optimized outage prob. vs. πrr for different π and m = 2. 0 1 2 3 4 5 Fig. 4: Outage prob. performance vs. relay power budget, for m = 1. 100 100 10 -1 10 -2 10-1 100 10-2 10-1 10-2 10-3 0.1 0 5 10 15 20 25 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 30 Fig. 5: Outage prob. performance vs. πsr for different target rates and m = 1. Fig. 6: Outage prob. performance vs. normalized relay location, for m = 1 and r = 0.5 bits/sec/Hz. Effect of Relay Location: We study the relative relay location impact on the end-to-end outage performance for πrr ∈ {0, 15} dB. The relay location in Fig. 6 is defined as the normalized distance of S − R link, Lsr with respect to the distance of S − D link, Lsd . When the relay location is closer to the source, the S − R link gain is very strong relative to the RSI. In such a relatively self-interference-free scenario, the IGS solution reduces as expected to the PGS solution. As the relay moves towards the destination, the relative adverse effect of RSI increases, causing the first hop to operate in the interference-limited regime. In such a regime, the benefits of IGS start to show up in mitigating the adverse effect of the RSI by tuning the signal impropriety. This gives the performance improvement in the second hop, due to the higher R − D link gain, a better opportunity to enhance the end-toend performance. When the relay is too close to the destination, the RSI effect significantly decreases due to the very low relay power required for successful communication, yielding similar IGS/PGS performance. It is clear that the benefits of IGS are noticeable only when the RSI link effect is non-negligible. When πrr = 0 dB, i.e., at the noise level, IGS yields the PGS solution. 3) Throughput Comparison to HDR: It is essential to compare the performance of FDR system with IGS not only to PGS but also to HDR. For this purpose, we consider the optimized network throughput versus the target rate r 12 for (a) m = 2 and (b) m = 1 in Fig. 7. First, the optimized throughput can be computed directly from the optimized end-to-end outage probability, with  a target rate ∗ ∗ r, as TE−E (Pr , Cx ) = r 1 − PE−E (Pr , Cx ) . For the outage expressions of the HDR, we consider two protocols; 1) simple multi-hop decode-and-forward (MHDF) HDR, where the destination distills the desired information only from the relayed path, and 2) HDR with MRC, where the destination combines the two time-orthogonal copies of the signal via the direct and relayed paths, as given in [35, Table I]. It can be seen from Fig. 7 that the target rate support set is divided into three regions where one protocol outperforms the others; 1) FDR with PGS, 2) FDR with IGS, and 3) HDR. As shown, for very small (as well as for very high) target rates, optimized IGS simply yields the PGS solution. As the rate requirement gradually increases, IGS can perform better than PGS and HDR by increasing the signal asymmetry as discussed earlier. However, at higher rates, the RSI saturates the FDR receiver and the performance deteriorates significantly, even with IGS reaching the maximum impropriety, i.e., Cx = 1. At this point, HDR with/without MRC starts to offer better throughput than FDR. We can see that HDR with MRC is slightly better than HDR without MRC as expected. Moreover, we can observe from the figure that the FDR with PGS region is wider at m = 2. This is caused since the fading is less severe in the relayed path than at m = 1. Hence, the adverse effect of the RSI on the first hop relatively decreases, leaving more room for FDR with IGS to compete with HDR via circularity coefficient tuning. Thus, for lower values of m, the performance of HDR starts to crossover that of FDR at an earlier target rate cutoff than for higher m. B. Ergodic Rate Performance We first evaluate the performance of the proposed upper bound of the end-to-end ergodic rate for m ≥ 1 and the lower bound for Rayleigh fading. Then, we analyze the optimized end-to-end ergodic rate based on a fine 1D and 2D GS. 1) Performance of Proposed Ergodic Rate Bounds: We plot the ergodic rate versus Pr and Cx for (a) low RSI: πrr = 0 dB and (b) high RSI: πrr = 20 dB for different m in Fig. 8. From the figure, one can notice the tightness of the lower and upper bounds compared to the exact ergodic rate. However, the lower bound over Rayleigh fading becomes loose at very high values of Cx , i.e., Cx ≈ 1. As m increases, higher end-to-end rate can be achieved as expected. Moreover, similar to Fig. 2, for a fixed relay transmit power, the value of RSI affects the ergodic rate performance. For instance, it is decreasing and increasing for (a) and (b), respectively. 2) Ergodic Rate Optimization: Here, we aim at maximizing the ergodic rate under the box constrains of Pr and Cx based on a fine 1D and 2D GS. We plot the end-to-end ergodic rate versus πrr for (a) m = 2 and (b) m = 1 in Fig. 9. It can be noticed that IGS reduces to PGS at lower RSI, similar to the previously noticed outage probability trend in Fig. 3. As the RSI increases, the PGS performance degrades, while the IGS attains nearly a fixed value. Although the gap between the analytical bounds and the exact numerical value widens in (b) to within 0.5 bits/sec/Hz as the RSI increases, the bounds still exhibit the same trend as the exact solution, and hence, they are able to reflect good design insights. For instance, a good figure of the RSI level at which IGS starts to offer better rates than PGS can be obtained to be within the two points via the bounds. Finally, similar to Fig. 3, the optimizing only the circularity coefficient performs nearly the same as the joint optimization. VII. C ONCLUSION In this work, we study the potential merits of employing improper Gaussian signaling (IGS) in full-duplex relaying (FDR) with non-negligible residual self-interference (RSI) over Nakagami-m fading channels. To analyze the benefits of IGS, we present exact integral forms as well as analytical lower and upper bound expressions for the end-to-end outage probability and ergodic rate in terms of the relay’s transmit power and circularity coefficient, which measures the degree of the signal impropriety. In order to optimize the FDR system performance, we numerically tune the relay power and circularity coefficient based only on the relay’s knowledge of the channel statistics. The findings of this work show that IGS yields promising performance merits over proper Gaussian signaling (PGS) in FDR channels. Specifically, for strong RSI, IGS tends to leverage higher powers to enhance the performance while alleviating the RSI impact by tuning the relay’s circularity coefficient. Further, we show that unlike PGS, as the RSI value increases, IGS is able to maintain a fixed performance that depends on the channel statistics and the target rate. It is also shown that, from an end-to-end throughput standpoint, IGS-FDR can outperform not only PGS-FDR but also half-duplex relaying with/without maximum ratio combining over certain regions of the target rate. Furthermore, numerical simulations show that it is usually sufficient to individually optimize the circularity coefficient to obtain nearly the same performance as the joint optimization of the power and circularity. Future research lines include obtaining efficient optimization algorithms for the FDR system performance in the Nakagami-m case based on the derived bounds. Moreover, by capitalizing on the results reported herein, a more general multi-antenna setting with RSI could be considered while adopting IGS at both the source and relay. In this case, it would be interesting, yet challenging, to investigate the IGS benefits via the efficient design of the covariance/pseudo-covariance matrices of the transmit signals. A PPENDIX A: P ROOF OF P ROPOSITION 1 We prove the convexity of the exponential term inside the expectation operator in (17) by expressing it as e−f (grr ) . In fact, one can show easily that f (grr ) can be written as p 2 + Bg + C − (Dg + F ), f (grr ) = Agrr (45) rr rr Pr 2 (1+γ(1−Cx 2 )) r where A = , B = 2(1+γ)P , C = P(1+γ) 2 2, Ps 2 πsr 2 Ps 2 πsr 2 s πsr Pr 1 D = Ps πsr , and F = Ps πsr are positive. Indeed, the second derivative of f (grr ) with respect to grr is ∂ 2 f (grr ) 4AC − B 2 = ≤ 0, (46) 2 3/2 ∂grr 4(C + grr (B + Agrr )) 13 2 2.5 FDR-PGS Region FDR-PGS Region HDR Region HDR-Region 1.8 1.6 FDR-IGS FDR-PGS HDR-MRC HDR 1.5 FDR-IGS FDR-PGS HDR-MRC HDR 1.4 Throughput (bits/sec/Hz) Throughput (bits/sec/Hz) 2 1 1.2 1 0.8 0.6 0.5 0.4 FDR-IGS Region 0 0 1 FDR-IGS Region 0.2 2 3 4 5 6 7 0 8 0 1 2 3 r (bits/sec/Hz) 4 5 6 7 8 r (bits/sec/Hz) (a) m = 2 (b) m = 1 Ergodic Rate (bits/sec/Hz) Ergodic Rate (bits/sec/Hz) Fig. 7: Optimized throughput vs. r, for πrr = 15 dB. 5 4 3 m=3 2 m=1 1 3 m=3 2.5 m=1 2 1.5 1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 Cx 0.7 5 4 3 2 0.8 0.9 IGS-UB IGS-Exact IGS-LB 3 Ergodic Rate (bits/sec/Hz) Ergodic Rate (bits/sec/Hz) 6 0.6 Cx IGS-UB IGS-Exact IGS-LB m=3 m=1 1 0 m=3 2.5 2 1.5 1 m=1 0.5 0 0 0.5 1 1.5 2 2.5 3 0 0.5 1 1.5 Pr (W ) 2 2.5 3 Pr (W ) (a) πrr = 0 dB (b) πrr = 20 dB Fig. 8: Erg. rate vs. Pr [lower] and Cx [upper], for different πrr and m. since 1 + γ(1 − Cx 2 ) ≤ 1 + γ for 0 ≤ Cx ≤ 1. Hence, f (grr ) is concave and e−f (grr ) is convex. A PPENDIX B: P ROOF OF T HEOREM 9 s πsd r πrr +1 where 0 ≤ x ≤ 1, a = Pr1πrd , b = PP and c = P Pr πrd . s πsr In the following, we analyze the stationary points of f (x) = 1 − f (x). Its derivative is given by −a df (x) e =x  dx 1) Unimodality in Cx : The outage upper bound in (28) as a function of Cx , denoted here as x, is given on the form. f (x) = 1 − e −a Ψr (x) (1−x2 ) −bΨr (αx) Ψr (x) c (1−x 2) +1 , (47) where Ψr (x) −bΨr (αx) 1−x2 r (x) c Ψ1−x 2 + 1 2 S(x), (48) 14 5 4 4.5 3.5 4 3 Ergodic Rate (bits/s/Hz) Ergodic Rate (bits/s/Hz) 3.5 3 2.5 IGS-UB-2DGS IGS-UB-1DGS IGS-Exact-2DGS IGS-Exact-1DGS PGS-GS PGS-MPA 2 1.5 1 2.5 2 IGS-UB-2DGS IGS-UB-1DGS IGS-Exact-2DGS IGS-Exact-1DGS IGS-LB-2DGS IGS-LB-1DGS PGS-GS PGS-MPA 1.5 1 0.5 0.5 0 0 0 5 10 15 20 25 30 0 5 10 15 πrr (dB) 20 25 30 πrr (dB) (a) m = 2 (b) m = 1 Fig. 9: Optimized ergodic rate vs. πrr , for different m.  " a 2Ψr (x) + γ x2 − 1 Ψr (x) S(x) = c + 1 2 1 − x2 (Ψr (x) + 1) (1 − x2 ) # bγα2 γc 2cΨr (x) + + − · Ψr (αx) + 1 (Ψr (x) + 1) (1 − x2 ) (1 − x2 )2 (49)  From the given form, and in addition to the roots of S(x), (x) it is clear that dfdx admits only a zero at x = 0. Now, we investigate the roots for S(x), and use the change of variables, z = Ψr (x) + 2. Hence, 1 − x2 = z(z−2) . After substitution γ and some manipulations,√S(z) is hence given for our region of interest, 2 ≤ z ≤ 1 + 1 + γ, by   γ  −aγ 2 bγα2 γ2c S(z) = c + 1 + − · z z 2 (z − 1) Ψr (αx) + 1 z 2 (z − 1) (50) Since 0 < α < 1, we know that 1 − α2 x2 ≥ 1 − x2 . Hence, Ψr (αx)+1 ≥ Ψr (x)+1 = z−1. Let Ψr (αx)+1 = tz (z−1), where tz ≥ 1. Therefore, (cγ + z)(−aγ 2 tz + bγα2 z 2 ) − γ 2 ctz z · (51) S(z) = tz z 3 (z − 1) The numerator is a cubic polynomial in z which is given by T (z) = bα2 γz 3 + bα2 cγ 2 z 2 − (a + c)γ 2 tz z − acγ 3 tz · To find the number of positive roots for T (z), we use the Descartes rule of signs [42]. Specifically, for the sequence formed by the descending order of the cubic equation coefficients, i.e., the sequence {bα2 γ, bα2 cγ 2 , −(a+c)γ 2 tz , −acγ 3 tz }, the number of sign changes is only one. For our real cubic polynomial, this determines the number of positive roots to be exactly one √ root. Hence, in the positive region of interest, 2 ≤ z ≤ 1 + 1 + γ, either one or no feasible roots exist for T (z), and hence for S(z). This shows that f (x) is either monotonic or unimodal due to the existence of one root at maximum in its interior. 2) Unimodality in Pr : The outage probability upper bound in (28) as a function of Pr , also denoted here as x, is given by   a x +bx − f (x) = 1 − c e d x | , +1 {z } (52) D(x) Ψr (αCx ) Ψr (Cx ) Ψr (αCx ) , c = e− Ps πsr , and 2 ) , b = πrr P π πrd (1−Cx s sr Ps πsd Ψr (Cx ) 2 ) . In what follows, we analyze the stationary πrd (1−Cx where a = d= points of the interior of the function D(x). Differentiating D(x) with respect to x yields S(x) z }| { dD dx + (a − bx2 )(x + d) −( xa +bx) = e . (53) dx x(x + d)2 Now, the stationary points of D(x) originate from the roots of the cubic polynomial S(x) = −bx3 − bdx2 + (a + d)x + ad. Again, there exists only one sign change in the coefficients of the cubic equation, and hence, only one root exists for S(x). Therefore, in the positive region of interest, i.e., 0 < Pr < Pmax , D(x) and hence f (x), are either monotonic or unimodal in x. R EFERENCES [1] M. Jain, J. Choi, T. Kim, D. Bharadia, S. Seth, K. Srinivasan, P. Levis, S. Katti, and P. Sinha, “Practical, real-time, full duplex wireless,” in Proc. ACM MobiCom’11, Las Vegas, NV, Sep. 2011. 15 [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] M. Duarte, C. Dick, and A. Sabharwal, “Experiment-driven characterization of full-duplex wireless systems,” IEEE Trans. Wireless Commun., vol. 11, no. 12, pp. 4296–4307, Dec. 2012. A. Sabharwal, P. Schniter, D. Guo, D. W. Bliss, S. Rangarajan, and R. Wichman, “In-band full-duplex wireless: Challenges and opportunities,” IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1637–1652, Sep. 2014. S. Hong, J. Brand, J. Choi, M. Jain, J. Mehlman, S. Katti, and P. Levis, “Applications of self-interference cancellation in 5G and beyond,” IEEE Commun. Mag., vol. 52, no. 2, pp. 114–121, Feb. 2014. V. R. Cadambe, S. A. Jafar, and C. Wang, “Interference alignment with asymmetric complex signaling: settling the Høst-Madsen-Nosratinia conjecture,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4552–4565, Sep. 2010. P. J. Schreier and L. L. Scharf, Statistical signal processing of complexvalued data: the theory of improper and noncircular signals. Cambridge University Press, 2010. Z. Ho and E. Jorswieck, “Improper Gaussian signaling on the two-user SISO interference channel,” IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3194–3203, Sep. 2012. C. Lameiro and I. Santamaria, “Degrees-of-freedom for the 4-user SISO interference channel with improper signaling,” in Proc. IEEE ICC’13, Budapest, Hungary, Jun. 2013. Y. Zeng, R. Zhang, E. Gunawan, and Y. Guan, “Optimized transmission with improper Gaussian signaling in the K-user MISO interference channel,” IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6303– 6313, Dec. 2013. C. Wang, T. Gou, and S. A. Jafar, “On optimality of linear interference alignment for the three-user MIMO interference channel with constant channel coefficients,” 2011. [Online]. Available: http://escholarship.org/uc/item/6t14c361 S. Lagen, A. Agustin, and J. Vidal, “Coexisting linear and widely linear transceivers in the MIMO interference channel,” IEEE Trans. Signal Process., vol. 64, no. 3, pp. 652–664, Feb. 2016. E. Kurniawan and S. Sun, “Improper Gaussian signaling scheme for the Z-interference channel,” IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3912–3923, Jul. 2015. S. Lagen, A. Agustin, and J. Vidal, “On the superiority of improper Gaussian signaling in wireless interference MIMO scenarios,” IEEE Trans. Commun., vol. 64, no. 8, pp. 3350–3368, Aug. 2016. C. Lameiro, I. Santamara, and P. J. Schreier, “Rate region boundary of the siso z-interference channel with improper signaling,” IEEE Trans. Commun., vol. 65, no. 3, pp. 1022–1034, Mar. 2017. L. Yang and W. Zhang, “Interference alignment with asymmetric complex signaling on MIMO X channels,” IEEE Trans. Commun., vol. 62, no. 10, pp. 3560–3570, Oct. 2014. H. Y. Shin, S. H. Park, H. Park, and I. Lee, “A new approach of interference alignment through asymmetric complex signaling and multiuser diversity,” IEEE Trans. Wireless Commun., vol. 11, no. 3, pp. 880–884, Mar. 2012. C. Lameiro, I. Santamaria, and P. Schreier, “Benefits of improper signaling for underlay cognitive radio,” IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 22–25, Feb. 2015. M. Gaafar, O. Amin, W. Abediseid, and M.-S. Alouini, “Spectrum sharing opportunities of full-duplex systems using improper Gaussian signaling,” in IEEE PIMRC’15, Hong Kong, Aug. 2015. C. Lameiro, I. Santamaria, W. Utschick, and P. J. Schreier, “Maximally improper interference in underlay cognitive radio networks,” in Proc. IEEE ICASSP’16, Shanghai, China, Mar. 2016. O. Amin, W. Abediseid, and M.-S. Alouini, “Underlay cognitive radio systems with improper Gaussian signaling: Outage performance analysis,” IEEE Trans. Wireless Commun., vol. 15, no. 7, Jul. 2016. M. Gaafar, O. Amin, W. Abediseid, and M.-S. Alouini, “Underlay spectrum sharing techniques with in-band full-duplex systems using improper Gaussian signaling,” IEEE Trans. Wireless Commun., vol. 16, no. 1, pp. 235–249, Jan. 2017. [22] O. Amin, W. Abediseid, and M.-S. Alouini, “Overlay spectrum sharing using improper Gaussian signaling,” IEEE J. Sel. Areas Commun., vol. 35, no. 1, pp. 50–62, Jan. 2017. [23] M. Gaafar, O. Amin, A. Ikhlef, A. Chaaban, and M.-S. Alouini, “On alternate relaying with improper Gaussian signaling,” IEEE Commun. Lett., vol. 20, no. 8, pp. 1683–1686, Aug. 2016. [24] H. D. Nguyen, R. Zhang, and S. Sun, “Improper signaling for symbol error rate minimization in K-user interference channel,” IEEE Trans. Commun., vol. 63, no. 3, pp. 857–869, Mar. 2015. [25] S. Javed, O. Amin, S. S. Ikki, and M. S. Alouini, “Asymmetric hardware distortions in receive diversity systems: Outage performance analysis,” IEEE Access, vol. 5, pp. 4492–4504, Feb. 2017. [26] C. Hellings, L. Gerdes, L. Weiland, and W. Utschick, “On optimal Gaussian signaling in MIMO relay channels with partial decode-andforward,” IEEE Trans. Signal Process., vol. 62, no. 12, pp. 3153–3164, Jun. 2014. [27] C. Kim, E.-R. Jeong, Y. Sung, and Y. H. Lee, “Asymmetric complex signaling for full-duplex decode-and-forward relay channels,” in Proc. Int. Conf. on ICT Convergence (ICTC), Jeju Island, South Korea, Oct. 2012. [28] M. Gaafar, M. G. Khafagy, O. Amin, and M.-S. Alouini, “Improper Gaussian signaling in full-duplex relay channels with residual selfinterference,” in Proc. IEEE ICC’16, Kuala Lumpur, Malaysia, May 2016. [29] M. Abramowitz and I. A. Stegun, Handbook of mathematical functions. 10th Printing, Dover Publications, Dec. 1972. [30] T. Kwon, S. Lim, S. Choi, and D. Hong, “Optimal duplex mode for DF relay in terms of the outage probability,” IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3628–3634, Sep. 2010. [31] T. Riihonen, S. Werner, and R. Wichman, “Hybrid full-duplex/halfduplex relaying with transmit power adaptation,” IEEE Trans. Wireless Commun., vol. 10, no. 9, pp. 3074–3085, Sep. 2011. [32] M. K. Simon and M.-S. Alouini, Digital communication over fading channels. Wiley-Interscience, 2005, vol. 95. [33] M. G. Khafagy, “On the performance of in-band full-duplex cooperative communications,” Ph.D. dissertation, KAUST, Jun. 2016. [Online]. Available: http://hdl.handle.net/10754/617879 [34] D. Bharadia, E. McMilin, and S. Katti, “Full duplex radios,” in Proc. ACM SIGCOMM’13. New York, NY, USA: ACM, 2013, pp. 375–386. [Online]. Available: http://doi.acm.org/10.1145/2486001.2486033 [35] M. G. Khafagy, A. Ismail, M.-S. Alouini, and S. Assa, “Efficient cooperative protocols for full-duplex relaying over nakagami- m fading channels,” IEEE Trans. Wireless Commun., vol. 14, no. 6, pp. 3456– 3470, Jun. 2015. [36] F. D. Neeser and J. L. Massey, “Proper complex random processes with applications to information theory,” IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1293–1302, Jul. 1993. [37] Y. Zeng, C. M. Yetis, E. Gunawan, Y. L. Guan, and R. Zhang, “Transmit optimization with improper Gaussian signaling for interference channels,” IEEE Trans. Signal Process., vol. 61, no. 11, pp. 2899–2913, Jun. 2013. [38] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, Seventh Edition. Academic Press, 2007. [39] A. Prudnikov, Y. A. Brychkov, and O. Marichev, Integrals and Series, vol. I: Elementary Functions. Gordon and Breach Science Publishers, 1998. [40] D. P. Bertsekas, Nonlinear Programming. [41] M. Fadel, A. El-Keyi, and A. Sultan, “QOS-constrained multiuser peerto-peer amplify-and-forward relay beamforming,” IEEE Trans. Signal Process., vol. 60, no. 3, pp. 1397–1408, Mar. 2012. [42] V. V. Prasolov, Polynomials. 2009. Athena Scientific, 1999. Springer Science & Business Media,
7cs.IT
C OMPACT N EURAL N ETWORKS BASED ON THE M ULTISCALE E NTANGLEMENT R ENORMALIZATION A NSATZ Andrew Hallam1 , Edward Grant2 , Vid Stojevic1,3 , Simone Severini2,4 , Andrew G. Green5 arXiv:1711.03357v2 [cs.NE] 3 Apr 2018 1 Department of Physics & Astronomy, University College London Department of Computer Science, University College London 3 GTN Ltd. 4 Institute of Natural Sciences, Shanghai Jiao Tong University 5 London Centre for Nanotechnology, University College London 2 A BSTRACT This paper demonstrates a method for tensorizing neural networks based upon an efficient way of approximating scale invariant quantum states, the Multi-scale Entanglement Renormalization Ansatz (MERA). We employ MERA as a replacement for the fully connected layers in a convolutional neural network and test this implementation on the CIFAR-10 and CIFAR-100 datasets. The proposed method outperforms factorization using tensor trains, providing greater compression for the same level of accuracy and greater accuracy for the same level of compression. We demonstrate MERA layers with 14000 times fewer parameters and a reduction in accuracy of less than 1% compared to the equivalent fully connected layers, scaling like O(N ). 1 I NTRODUCTION The curse of dimensionality is a major bottleneck in machine learning, stemming from the exponential growth of variables with the number of modes in a data set (Cichocki et al. (2016)). Typically state-of-the-art convolutional neural networks have millions or billions of parameters. However, previous work has demonstrated that representations stored in the network parameters can be highly compressed without significant reduction in network performance (Novikov et al. (2015), Garipov et al. (2016), ?). Determining the best network architecture for a given task remains an open problem. Descriptions of quantum mechanical systems raise a similar challenge; representing n d-dimensional particles requires a rank-n tensor whose memory cost scales as dn . Indeed, it was the promise of harnessing this that led Richard Feynman (Feynman (1982)) to suggest the possibility of quantum computation. In the absence of a quantum computer, however, one must use compressed representations of quantum states. A level of compression can be achieved by factorizing the tensorial description of the quantum wavefunction. Many such factorizations are possible, the optimal structure of the factorization being determined by the structure of correlations in the quantum system being studied. A revolution in quantum mechanics was made by realizing that the best way to characterize the distribution of correlations and information in a state is by a quantity known as entanglement – loosely the mutual quantum information between partitions of a quantum system (Eisert et al. (2010)). This has led to many successful applications of tensorial approaches to problems in solid state physics and quantum chemistry over the past 25 years (Orús (2014), Kin-Lic Chan et al. (2007)). Intriguing ideas have also emerged over the past few years attempting to bridge the successes of neural networks in machine learning with those of tensorial methods in quantum physics, both at a fundamental level (Lin et al. (2017), Mehta & Schwab (2014)), and as a practical tool for network design (Levine et al. (2017)). Recent work has suggested that entanglement itself is a useful quantifier of the performance of neural networks (Levine et al. (2017), Liu et al. (2017)) 1 The simplest factorization employed in quantum systems is known as the matrix product state (Orús (2014)). In essence, it expresses the locality of information in certain quantum states. It has already been adopted to replace expensive linear layers in neural networks – in which context it has been independently termed tensor trains (Oseledets (2011)). This led to substantial compression of neural networks with only a small reduction in the accuracy (Novikov et al. (2015), Garipov et al. (2016)). Here we use a different tensor factorization – known as the Multi-scale Entanglement Renormalization Ansatz (MERA) – that encodes information in a hierarchical manner (Vidal (2008)). MERA works through a process of coarse graining or renormalization. There have been a number of papers looking at the relationship between renormalization and deep learning. MERA is a concrete realization of such a renormalization procedure (Vidal (2009)) and so possesses a multi-scale structure that one might anticipate in complex data. A number of works have utilized tree tensor network models that possess a similar hierarchical structure. However, they do not include the disentangler tensors that are essential if each layer of the MERA is to capture correlations on different length scales (Liu et al. (2017)). In this work we employ MERA as a replacement for linear layers in a neural network used to classify the CIFAR-10 and CIFAR-100 datasets. Our results show that this performs better than the tensor train decomposition of the same linear layer, and gives better accuracy for the same level of compression and better compression for the same level of accuracy. In Section 2 we introduce factorizations of fully connected linear layers, starting with the tensor train factorization followed by a tree-like factorization and finally the MERA factorization. In Section 3 we discuss how this is employed as a replacement for a fully connected linear layer in deep learning networks. Section 4 gives our main results and we note connections with the existing literature in Section 5. Finally, in Section 6 we discuss some potential developments of the work. 2 T ENSOR FACTORIZATION OF L INEAR L AYERS a) i1 b) i2 iN j1 j2 jN i1 i2 j1 c) α1 α2 αN j2 jN i1 j1 j2 j3 j4 j5 j6 j7 j8 i2 i3 i4 i5 i6 i7 i8 d) iN i1 j1 j2 j3 j4 j5 j6 j7 j8 i2 i3 i4 i5 i6 i7 i8 Figure 1: Schematic diagrams of various tensor factorizations of linear layers. a) a general linear layer, b) its tensor train factorization. The squares represent smaller tensors. Connections represent contractions as indicated in Eq.(1). c) Tree network factorization. d) MERA factorization. In this report we have replaced the linear layers of the standard neural network with tensorial MERA layers. The first step in achieving this involves expressing a linear layer as a tensor. This can be accomplished by taking a matrix W and reshaping it to be a higher dimensional array. For 2 example, suppose W is dn by dn dimensional with components WAB . It can be transformed into a rank 2n tensor by mapping A to n elements A → i1 , i2 , ..., in and B to another n elements B → j1 , j2 , ..., jn . In this case each of the elements of the new tensor will be of size d. ,i2 ,...,in . It is important to note Figure 1a gives a graphical representation of this rank 2n tensor Wji11,j 2 ,...,jn that in this representation, the lines represent the indices of the tensors rather than weights. Figure 1b illustrates the tensor train decomposition of W. This consists of writing the larger tensor as the contraction of a train of smaller tensors:X αn−1 ,in ,i2 ,...,in 1 ,i1 . (1) = Aij11 ,α1 Aα Wji11,j j1 ,α2 · · · Ajn 2 ,...,jn α1 ,α2 ,...,αn−1 In the tensor graphical notation, closed legs represent indices being summed over and free legs represent indices that aren’t being summed over. For example, in equation 1 the αi indices are being summed over and in Figure 1b the αi lines are connected to tensors at both ends. If each index runs over values from 1 to d, this represents an exponential reduction from d2n parameters to n(Dd)2 , where the indices α run over values from 1 to D (known as the bond order or Schmidt rank in the quantum context). As noted above, this type of tensor factorization works well in physics when the information has a local structure (Eisert et al. (2010), Verstraete & Cirac (2006)); tensor trains capture correlations effectively up to length scales of order log D (Schollwöck (2011)). This means that while useful for many tasks, the learned representations will be highly local. Tensors at either end of a tensor train decomposition of a linear layer will not be strongly correlated with one another. A hierarchically structured tensor network can better represent correlations across the linear layer. The tree tensor network shown in Figure 1c represents one possible hierarchical factorization. Each element of this network is a rank 4 tensor. The two tensors on the top left would have the form Mji11,i,α21 and Nij32,i,α4 2 . The in elements being represented by the lines on the left of the figure, the jn elements represented by the dotted lines on the right of the figure and the αn lines being those connected with the tensor immediately to the right of M and N . Reading from left to right Figure 1c can be interpreted as follows: the tree-like connectivity imbues the network with a causal structure whereby a given linear element and its outputs are influenced by inputs in a region determined by its height in the tree. For example, the rightmost element in Figure 1c is influenced by all of the inputs, whereas the top element in the middle column is influenced by inputs i1 to i4 . Elements other than the rightmost tensor have one dashed output (that connects directly to the overall output) and one solid output (that ties it to the branching tree structure). These dashed lines are controlled by representations occurring on a particular scale in the data. Notice that removing these dashed lines, the network has a true tree structure and represents a coarse graining or renormalization of the network. In this case, the linear elements are the isometries of the original MERA’s definition (Vidal (2008; 2009)). The simple tree network, which has been studied before in the context of neural networks, has a major deficiency. At each branching, it partitions the system in two, so that in extremis, the correlations between neighbouring inputs – for example i4 and i5 in Figure 1c – are only controlled by the element at the end of the network. Requiring the higher elements in the tree-structure to capture correlations between neighbouring inputs restricts their ability to describe the longer length scale correlations you would hope to capture by using a hierarchical structure. The MERA (Vidal (2009)) factorization was introduced in order to solve this problem. As can be seen in Figure 1d it adds an additional set of rank 4 tensors called disentanglers. The MERA is ,β2 constructed by taking a tree network and placing one of these rank 4 tensors Dγβ11,γ such that its 2 right-going legs β1 and β2 connect to two adjacent tensors of the tree network. For example, if we consider the top left-most disentangler in Figure 1d it has elements Diβ21,i,β32 and connects to the tree j ,α j ,α elements M0 i11,β11 and N 0 β22 ,i42 with β1 and β2 then being summed over. The role of the disentanglers is to cause all correlations on the same length scale to be treated similarly. For example, correlations between any two neighbouring input indices in and in+1 will be captured by either the first row of tree elements or the disentanglers. This allows the later elements in the network to work at capturing longer range correlations. 3 In summary, a rank-N MERA layer can be constructed in the following manner: 1. Create a tree tensor layer. For example, an N = 2τ tree can be constructed from 2τ −1 ,β2 rank-4 tree tensors Mβγ11,γ in the first layer, followed by 2τ −2 tree tensors in the second 2 layer until after τ layers there is only a single tree tensor. ,β2 2. A set of disentanglers are introduced. These are rank-4 tensors Dγβ11,γ which are placed 2 such that every disentangler is contracted with two neighbouring tree tensors in an upcoming layer of the tree tensor. 3 E XPERIMENTS & NETWORK STRUCTURE We have considered the performance of a neural network with the two penultimate fully connected layers of the model replaced with MERA layers, similar to the Novikov et al. (2015) study of compression of fully connected layers using tensor trains. We have quantified the performance of the MERA layer through comparisons with two other classes of networks: fully connected layers with varying numbers of nodes and tensor train layers with varying internal dimension. The three types of network are otherwise identical. The networks consisted of three sets of two convolutional layers each followed by max pooling layers with 3 × 3 kernels and stride 2. The convolutional kernels were 3 × 3. There were 64 channels in all of the convolutional layers except for the input, which had three channels, and the last convolutional layer, which had 256 channels. The final convolutional layer was followed by two more hidden layers, these were either fully connected, MERA layers or TT-layers depending upon the network. The first of these layers was of size 4096 × x, the second is of size x × 64. For the MERA and TT networks, these layers were 4096 × 4096 and 4096 × 64. The final layer had 10 or 100 nodes corresponding to the image classes in CIFAR-10 and CIFAR100. Leaky rectified linear units (LReLU) were used on all layers except the final layer, with leak = 0.2 (Maas et al. (2013)). During training, nodes in the final convolutional layer and the two first fully connected layers were dropped with probability 0.5. The penultimate convolutional layer nodes were dropped with probability 0.2 (Srivastava et al. (2014)). Batch-normalization was used on all layers after dropout and max pooling (Ioffe & Szegedy (2015)). We did not use bias units. Gaussian weight initialization was employed in the fully connected models with standard deviation equal to √n1in , where nin was the number of inputs (He et al. (2015)). In this report we considered networks with two varieties of fully-connected layers. The first of these networks had a 4096 × 4096 fully connected layer followed by one which was 4096 × 64; this network was used as a benchmark against which the other models could be compared. The second network instead had a 4096 × n fully connected layer followed by a n × 64 layer where n = 5 for the CIFAR-10 network and n = 10 for the CIFAR-100 network. We trained these network to compare the MERA and tensor train layers to a fully connected model with a comparable number of parameters, in order to evaluate how detrimental naive compression is to accuracy. A schematic of the two MERA layers can be found in Figure 2. The input to the first MERA layer was reshaped in to a rank-12 tensor with each index being dimension 2, as described in Section 2. The MERA layer was then constructed from a set of rank-4 tensors using the method described in Section 2. The first MERA layer works as follows: It contains a column of 6 rank-4 tree elements, followed by 3 tree elements and finally a single tree element. 5 disentanglers are placed before the first column of tree elements and 2 more disentanglers are placed before the second column of tree elements. The second MERA layer has an identical structure to the first MERA layer, one of the outputs of the first set of tree elements is fixed. As a result the output of the second MERA layer is 64 nodes. MERA weights were initialized using elements of randomized orthogonal matrices (Saxe et al. (2013)). The tensors themselves were constructed by reshaping these matrices, as described in Section 2. The random orthogonal matrix was constructed using the method of Stewart (?, ?). Starting from a random n−1×n−1 dimensional orthogonal matrix, a random n×n dimensional orthogonal 4 CONV OUT PREDICTION Figure 2: A schematic of the MERA layers of the model. The small rectangles represent linear elements to factorize a general linear layer. White rectangles represent disentanglers. Red rectangles represent tree elements. Solid black lines connecting nodes represent tensor contraction and dashed lines with arrow heads represent the nonlinearities being applied. Dashed lines ending in a circle represent fixed outputs. matrix can be constructed by taking a randomly distributed n-dimensional vector, constructing its Householder transformation, and then applying the n − 1 dimensional matrix to this vector. Finally, a network with its fully connected layers replaced with a tensor train decomposition was trained in order to provide a comparison with the MERA layers. The tensor train layers were constructed as described in Section 2 with the internal dimension being fixed at D = 3. In the second tensor train layer, half of the output indices were fixed to match the second MERA layer. We tested performance on the CIFAR-10 and CIFAR-100 datasets. We used 45, 000 images for training, 5, 000 for validation and 10, 000 for testing. Each training batch consisted of 50 images. Training data was augmented by randomly flipping and translating the input images by up to 4 pixels. Translated images were padded with zeros. All images were normalized by dividing by 255 and subtracting the mean pixels value from the training set. Validation and test set accuracy was recorded every 500 iterations and training was stopped when validation accuracy did not improve for 10 successive tests. The network was trained using backpropagation and the Adam optimizer, with initial learning rate 0.001 (Kingma & Ba (2014)) and a softmax-cross-entropy objective. The test set accuracy for the model with the highest validation set accuracy was recorded. Each network was trained 10 times with a different random weight initialization. The networks were implemented in Tensorflow r1.3 and trained on NVIDIA Titan Xp and 1080ti GPUs. 4 E XPERIMENTAL RESULTS In Table 1 we compare the different models described in section 3 trained on the CIFAR-10 dataset. The compression rate stated is with respect to the number of parameters used in the fully-connected benchmark model, FC-1. When comparing the MERA network to the fully connected model, FC-1 we see a considerable drop in the number of parameters required with only a modest drop in the accuracy of the network. MERA compresses the fully connected layers by a factor of 14, 000 with a drop in the accuracy of only 0.4%. We do not attempt to compress the convolutional layers in this work so in the MERA network the vast majority of the parameters are used in the convolutional layers which are identical to the fully connected model. How significant is the MERA network structure we have chosen to the results obtained? To test this we compare the MERA results obtained to the fully connected model with many fewer parameters in the fully connected layers, FC-2. Despite having around 20 times more parameters in the fully 5 connected layer than the MERA model, the MERA model significantly out performs FC-2, with a 1.2% drop in the accuracy of FC-2 compared to MERA. The MERA network also compares favourably to a tensor train network. In this case, the two networks have a comparable number of parameters but the MERA appears to achieve a higher accuracy than the tensor train network in this case. Results for the CIFAR-100 model can be seen in Table 2. While none of the networks are as accurate as the benchmark case, the MERA network continues to outperform the tensor train and ablated fully connected network. However, the reduction in accuracy compared to the fully connected network is larger than for the CIFAR-10 dataset. In addition to the degree of compression achieved by these networks, we also address the time to optimize. There is evidently a degree of compromise required here: the number of multiplications required to apply a MERA layer scales with the input size N and bond order D as N log2 D . The equivalent scaling for a tensor train and fully connected layer are N D2 and N 2 , respectively. This is reflected in the times taken to optimize these networks. Note however, that MERA can accommodate correlations at all scales of its input even at low bond order, whereas tensor trains require a bond order that scales exponentially with the length scale of correlation (Orús (2014)). MERA is, therefore, expected to scale better for very large data sets than either tensor trains or fully connected layers. Table 1: The CIFAR-10 experimental results for the different models. FC1 was the fully-connected model and FC2 was the fully-connected model with severely reduced number of parameters in the fully-connected layers. MERA are the result for the MERA inspired network. Finally TT is the tensor train model with the internal dimension being 3. Network Parameters (Total) 17,336,640 Compression (FC layer) 1 Compression (Total) 1 Accuracy FC-1 Parameters (FC Layer) 17,040,000 88.9 Standard Deviation 0.2 FC-2 21,440 318,080 795 54.5 86.5 0.8 MERA 1192 297,832 14,295 58.21 88.5 0.1 TT 1312 297,952 12,987 58.19 87.9 0.2 Table 2: The CIFAR-100 experimental results for the different models. FC1 was the fully-connected model and FC2 was the fully-connected model with severely reduced number of parameters in the fully-connected layers. MERA are the result for the MERA inspired network. Finally TT is the tensor train model with the internal dimension being 3. Network 5 Parameters (Total) 17,342,400 Compression (FC Layer) 1 Compression (Total) 1 Accuracy FC-1 Parameters (FC Layer) 17,045,760 61.8 Standard Deviation 0.7 FC-2 48,000 344,640 355 50.3 53.4 0.6 MERA 6952 303,592 2451 57.12 58.4 0.6 TT 7072 303,712 2410 57.10 57.9 0.6 R ELATED W ORK Given how memory intensive deep neural networks typically are, substantial effort has been made to reduce number of parameters these networks require without significantly reducing their accuracy. Some of these have taken a similar approach to the MERA network described above, using tensor decompositions of the fully connected layers. 6 These include the tensor train models of Novikov et al. (2015) and Garipov et al. (2016). Here we have found replacing a fully connected linear layer with a MERA factorization resulted in superior accuracy for a comparable number of parameters. More directly related to this MERA model are a number of tree tensor network models (Liu et al. (2017), Levine et al. (2017)). As Section 2 explained, tree tensor networks inconsistently capture correlations on the same length scale, this is the reason for the introduction of disentanglers. Tree tensors do not possess these and we expect them to struggle to capture long range correlations as effectively as MERA. A MERA works through a process of coarse graining or renormalization. There have been a number of other papers looking at the relationship between renormalization and deep learning. Lin et al. (2017) argue that the effectiveness of deep neural networks should be thought of in terms of renormalization and Mehta & Schwab (2014) demonstrate an exact mapping between the variational renormalization group and restricted Boltzmann machines. In this report we have taken a different approach: only the fully connected layers of the network were replaced with MERA layers. 6 D ISCUSSION We have shown that replacing the fully connected layers of a deep neural network with layers based upon the multi-scale entanglement renormalization ansatz can generate significant efficiency gains with only small reduction in accuracy. When applied to the CIFAR-10 data we found the fully connected layers can be replaced with MERA layers with 14, 000 times less parameters with a reduction in the accuracy of less than 1%. The model significantly outperformed compact fully connected layers with 70 − 100 times as many parameters. Moreover, it outperformed a similar replacement of the fully connected layers with tensor trains, both in terms of accuracy for a given compression and compression for a given accuracy. While the MERA layer resulted in a larger accuracy drop in the CIFAR-100 case, it still outperformed a comparable tensor train network. An added advantage — not explored here — is that a factorized layer can potentially handle much larger input data sets, thus enabling entirely new types of computation. Correlations across these large inputs can be handled much more efficiently by MERA than by tensor trains. Moreover, a compressed network may provide a convenient way to avoid over-fitting of large data sets. The compression achieved by networks with these factorized layers comes at a cost. They can take longer to train than networks containing the large fully connected layers due to the number of tensor contractions required to apply the factorized layer. Our results suggest several immediate directions for future inquiry. Firstly, there are some questions about how to improve the existing model. For example, before the MERA layer is used the input is reshaped into a rank-12 tensor. There isn’t a well defined method for how to perform this reshaping optimally and some experimentation is necessary. The best way to initialize the MERA layers is also still an open question. The results presented here are a promising first step for using MERA in a more fundamental way. Since MERA can be viewed as a coarse graining procedure (as explained in Section 2), and image data is often well represented in a hierarchical manner, one possibility would be to simply train a two-dimensional MERA directly on an image dataset, with no reference to a neural network. In Stoudenmire & Schwab (2016) a similar idea was explored with matrix product states being trained directly on MNIST. An alternative possibility would be the replacement of just the convolutional layers of the network with a two-dimensional MERA. Both of these approaches would be closer in spirit to the fundamental ideas about the relationships between quantum physics and machine learning proposed in Lin et al. (2017) and Mehta & Schwab (2014). Additionally, there has been some work using entanglement measures to explore how correlations are distributed in deep neural networks, and then utilizing these in order to optimize the design of networks (Liu et al. (2017), Levine et al. (2017)). It would be intriguing to explore such ideas using MERA, for example by using the concrete MERA model explored in this paper, or one of the more ambitious possibilities mentioned above. We end by noting two facts: any variational approximation to a quantum wavefunction can be used to construct a replacement for linear layers of a network. There are many examples and each may 7 have its sphere of useful application. Moreover, quantum computers of the type being developed currently by several groups are precisely described by a type of tensor network (a finite-depth circuit - and one that may very soon be too large to manipulate classically) and could be used as direct replacement for linear layers in a hybrid quantum/classical neural computation scheme. ACKNOWLEDGMENTS This work was supported by the Engineering and Physical Sciences Research Council [grant number EP/P510270/1]. The Titan Xp used for this research was donated by the NVIDIA Corporation. We would like to thank Miles Stoudenmire for many enlightening discussions. R EFERENCES A. Cichocki, N. Lee, I. V. Oseledets, A.-H. Phan, Q. Zhao, and D. Mandic. Low-Rank Tensor Networks for Dimensionality Reduction and Large-Scale Optimization Problems: Perspectives and Challenges PART 1. ArXiv e-prints arXiv:1609.00893, September 2016. J. Eisert, M. Cramer, and M. B. Plenio. Colloquium: Area laws for the entanglement entropy. Reviews of Modern Physics, 82:277–306, January 2010. doi: 10.1103/RevModPhys.82.277. R. P. Feynman. Simulating physics with computers. International Journal of Theoretical Physics, 21(6):467–488, 1982. Timur Garipov, Dmitry Podoprikhin, Alexander Novikov, and Dmitry P. Vetrov. Ultimate tensorization: compressing convolutional and FC layers alike. CoRR, abs/1611.03214, 2016. URL http://arxiv.org/abs/1611.03214. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delving deep into rectifiers: Surpassing human-level performance on imagenet classification. In Proceedings of the IEEE international conference on computer vision, pp. 1026–1034, 2015. Sergey Ioffe and Christian Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International Conference on Machine Learning, pp. 448–456, 2015. G. Kin-Lic Chan, J. J. Dorando, D. Ghosh, J. Hachmann, E. Neuscamman, H. Wang, and T. Yanai. An Introduction to the Density Matrix Renormalization Group Ansatz in Quantum Chemistry. ArXiv e-prints arXiv:0711.1398, November 2007. Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014. Yoav Levine, David Yakira, Nadav Cohen, and Amnon Shashua. Deep learning and quantum entanglement: Fundamental connections with implications to network design. CoRR, abs/1704.01552, 2017. URL http://arxiv.org/abs/1704.01552. H. W. Lin, M. Tegmark, and D. Rolnick. Why Does Deep and Cheap Learning Work So Well? Journal of Statistical Physics, 168:1223–1247, September 2017. doi: 10.1007/s10955-017-1836-5. D. Liu, S.-J. Ran, P. Wittek, C. Peng, R. Blázquez Garcı́a, G. Su, and M. Lewenstein. Machine Learning by Two-Dimensional Hierarchical Tensor Networks: A Quantum Information Theoretic Perspective on Deep Architectures. ArXiv e-prints arXiv:1710.04833, October 2017. Andrew L Maas, Awni Y Hannun, and Andrew Y Ng. Rectifier nonlinearities improve neural network acoustic models. In Proc. ICML, volume 30, 2013. P. Mehta and D. J. Schwab. An exact mapping between the Variational Renormalization Group and Deep Learning. ArXiv e-prints arXiv:1410.3831, October 2014. Alexander Novikov, Dmitry Podoprikhin, Anton Osokin, and Dmitry P. Vetrov. Tensorizing neural networks. CoRR, abs/1509.06569, 2015. URL http://arxiv.org/abs/1509.06569. 8 R. Orús. A practical introduction to tensor networks: Matrix product states and projected entangled pair states. Annals of Physics, 349:117–158, October 2014. doi: 10.1016/j.aop.2014.06.013. I. V. Oseledets. Tensor-train decomposition. SIAM J. Sci. Comput., 33(5):2295–2317, September 2011. ISSN 1064-8275. doi: 10.1137/090752286. URL http://dx.doi.org/10.1137/ 090752286. A. M. Saxe, J. L. McClelland, and S. Ganguli. Exact solutions to the nonlinear dynamics of learning in deep linear neural networks. ArXiv e-prints arXiv:1312.6120, December 2013. U. Schollwöck. The density-matrix renormalization group in the age of matrix product states. Annals of Physics, 326:96–192, January 2011. doi: 10.1016/j.aop.2010.09.012. Nitish Srivastava, Geoffrey E Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. Dropout: a simple way to prevent neural networks from overfitting. Journal of machine learning research, 15(1):1929–1958, 2014. Miles Stoudenmire and D. J. Schwab. Supervised Learning with Quantum-Inspired Tensor Networks. ArXiv e-prints arXiv:1605.05775, May 2016. F. Verstraete and J. I. Cirac. Matrix product states represent ground states faithfully. Physical Review B: Condensed Matter and Materials, 73(9):094423, March 2006. doi: 10.1103/PhysRevB.73. 094423. G. Vidal. Class of Quantum Many-Body States That Can Be Efficiently Simulated. Physical Review Letters, 101(11):110501, September 2008. doi: 10.1103/PhysRevLett.101.110501. G. Vidal. Entanglement Renormalization: an introduction. ArXiv e-prints arXiv:0912.1651, December 2009. 9
9cs.NE
Implementing an Agent Trade Server Magnus Boman arXiv:cs/0307064v1 [cs.CE] 29 Jul 2003 Swedish Institute of Computer Science (SICS) AB and The Royal Institute of Technology, Kista, Sweden Anna Sandin Swedish Institute of Computer Science (SICS) AB, Kista, Sweden Abstract An experimental server for stock trading autonomous agents is presented and made available, together with an agent shell for swift development. The server, written in Java, was implemented as proof-of-concept for an agent trade server for a real financial exchange. Key words: Trading agent, Agent server, Financial exchange, Complex order, Agent programming 1 Introduction There are always investors seeking to place orders more complicated than can be accepted by the software of a financial exchange (F/X) system, regardless of its current level of sophistication. To some of these investors, the agent metaphor is a means to implementing combinatorial, temporal, contingent, or otherwise complex orders. In general, a trading agent is a piece of encapsulated software that codes the preferences of its owner. In theoretical research, trading agents have been used in idealized games [1], artificial markets [2], and competitions such as the Trading Agent Competition [3] (see http://www.sics.se/tac/). To economists, trading agents are speculating noise traders (traders with non-rational expectations and potentially zero intelligence) [4], often subjected to the Efficient Market Hypothesis and the Rational Expectations Hypothesis [5], since the empirical evidence against the accompanying assumptions are directed almost exclusively towards human traders [6]. In the system of trading agents we consider, the agents interact with the same order book as the human traders (cf. [7]), resulting in a system only slightly more complex than an F/X is today, but a system that is Preprint submitted to Elsevier Science 14 September 2017 extremely difficult to analyze (cf., e.g., [8]). From an academic perspective, the introduction of agents in the actual exchange of real stocks is a formidable challenge in that it prompts research in real-time control, agent programming, decision analysis, user interaction, privacy, and security. Its theoretical models must go beyond agent-based computational finance [9] and agent-based computational economics [10], and already simulation studies are highly complex [11] [12] [13] [14]. From a commercial perspective, the concept is promising in that it enables implementation of new services in the service portfolio of the F/X. A vast range of commercial efforts have helped renew and refine the concept of an electronic F/X, including ambitious liquidity-moving approaches, such as OptiMark [15] [16] [17]. This fact notwithstanding, there has been no technical platform for real stock trading agent development and no special-purpose server generally available. We rectify this matter by making available our documented Java code [18] for such a platform. We have also implemented an experimental server for supporting agent trading of stocks, an Agent Trade Server (ATS). The conceptual development [19] was initiated in 2001 (cf. Fig. 1) in cooperation with OM, the world’s largest supplier of software to stock exchanges [20], and OM has filed a U.S. patent on the ATS concept [21]. The ATS was built not with commercial operation in mind, but as proof-of-concept. That said, OM’s trading package SAXESS and its third party APIs provided for much inspiration. We have not designed the ATS for any particular market design. Instead, all agents must abide by the rules of the F/X. The submarket emerging from ATS operations will depend on the agents’ business logic, including their decision-analytic [22] and normative modeling [23] of the market, which we have previously investigated. We have no illusion of ATS traffic accounting for more than one per cent of any stock exchange before 2010, and whether or not investors will find the ATS attractive will to a large extent depend on pricing and other commercial or political concerns. The following section briefly describes the role that software, and agent software in particular, plays at an electronic F/X. In Section 3, the architecture of our ATS is explained. In Section 4, the issue of logging and other forms of keeping history is highlighted. The various business roles, i.e. those interested in the logs, are also discussed. We end with our conclusions and directions for future research. 2 Development of Financial Exchange Software Trading of stocks is normally done through a broker, as shown in Fig. 2. The trader can be a professional investor, a daytrader, or any other person using stocks as a means to invest. The broker could be a bank, an Internet broker, or some other financial institution. The figure is simplified: orders can also be 2 Fig. 1. The four phases of the ATS implementation project, with the most fundamental at the bottom, and with all four still running. The Gantt schema also indicates key breakthroughs in each of the four phases. The second conceptual design will hopefully be made at OM, or at some other ITC provider for F/X software, while in itself an interesting academic exercise. The first ATS was made publicly available in January 2003, but the permission to run agents on the ATS was restricted to select agent developers at SICS and at two Swedish universities. These developers came up with a first shell in January, which was refined over the following months, and sophisticated agents are now under development. As a result of a small empirical study, not reported on here, the first user service—a trade notification service for smart phones—was recently implemented. placed by walking into a bank and filling out a form, IP phones are no requirement, the computer used is often a PDA, etc. Each broker communicates with the core of the F/X via a gateway, over leased lines (at Stockholmsbörsen, the Swedish stock exchange, backed up by an ISDN connection, as well as OMnet, a fibre-optic MetroLAN option). In Fig. 2, the dissemination of information from the F/X to the outside world is not shown. Suffice to say here that stock exchange dissemination is an elaborate system of latencies and routing, in order to secure fairness, and that such information is an important part of the feedback from core to broker, and from broker to trader. Suppliers of software to an electronic exchange system are basically of two kinds: those that provide software serving the core (the order book), and those that provide software for those interacting with the core (the traders). In most countries, the software supplier in the first category is also competing in the second category. In Sweden, for example, OM provides all of the software for the core, and they also provide the SAXESS and CLICK (for the derivatives 3 Fig. 2. A schematic view of the current trade information flow. For simplicity, dissemination procedures are not shown. market, which we will neglect entirely at this stage) software trading packages, as well as the SECUR software clearing and back office package. The bulk of the software aimed at traders and brokers is however developed by third party software houses. We would like to complicate Fig. 2 slightly (see Fig. 3) by considering individuals as service provisioners [24], thus introducing a third kind of code developer. We anticipate that end-user code development in the form of trading agents will be an increasingly important part of the future F/X service portfolio. The third party code pertains to the trading applications used. In order to use the SAXESS system today, the broker needs a member SAXESS trade application. Each such application must be certified, to guarantee smooth operation alongside all other running applications. The OM application offered is SAXESS Trade, an NT-based client-server solution with the trading data being maintained on an SQL server. There are currently about two dozen certified alternatives. Each application connects to a SAXESS trade server, which is in turn connected to the core. The transaction protocol used is XTP (open eXchange Transaction Protocol) 2.40, an OSI Layer 7 protocol. The Session Layer protocol used is XMP (eXchange Message Protocol). The transactions involving the core are governed by a C program, essentially matching the stack of sell orders with the stack of buy orders. It is important to note that the matching is deterministic. The ATS concept is not a suggested alternative 4 Fig. 3. Three kinds of code development. to the SAXESS (or any other) trade server currently in use, but a complement. In Fig. 4, the ordinary electronic trading is represented by SAXESS. Upward arrows denote the placing of orders while downward arrows denote feedback. Each trade application uses zero or more distributed instances of the SAXESS Trade Server, a freeware available to all registered traders. In practice, the ATS will also contain an instance of the SAXESS Trade Server, since the latter contains the latest API for communicating with the core. All communication with the core goes via the Front End (FE). The wall indicates the physical and logical boundary between the market owner and the outside world, while the barbed wire surrounding the core illustrates a further level of protection. The shadow backup system is not shown. Note that brokers may still be used, for example for legal reasons, when delegating trading to an agent. While delegating the right to place orders in itself does not introduce non-determinism in the marketplace, there is nothing that per se stops an agent developer to introduce non-determinism in the business logic of the agent. Security control of agent code is done at the time of agent certification and testing, and also online in the ATS. In SAXESS, each trade application must also connect to a dedicated Distributed Dissemination Server (DDS). With an ATS running together with a SAXESS trade server, the owner of the F/X has the option to either route all traffic feedback through the existing DDS channels, or to complement the 5 Fig. 4. The ATS as a complement to ordinary electronic trading. 6 DDS with ATS traffic feedback. In particular, the agents running on the ATS could subscribe to ATS traffic feedback of various sorts, and at variable cost. Even non-professional traders are no strangers to varying levels of sophistication of the individually specified trading constraints built on feedback. The stop loss service offered by Internet brokers (such as Avanza; see http://www.avanza.com) is a case in point. The ATS concept provides the third party software houses with a business opportunity, viz. to provide code for the agents trading on the ATS. This involves coding investor preferences and encapsulating these into agents, whereafter the agents are placed on the ATS, without disclosure. Preference elicitation is as always difficult, but suffice to say here that investors will come in many varieties, from those that have developed advanced agents on their own, to those that have no clue on agent programming. A template agent can be coded based on the investor filling out a fairly simple questionnaire. The size and structure of such template agents is simple, and the first agent shell for our ATS has already been written [25]. After the agent is placed on the ATS, there remains the challenge of providing software services for notification and (depending on security issues) possibly for termination of agents. Investors no doubt require interfaces for a variety of modalities, and will in the future include roaming [26]. 3 An Agent Trade Server Architecture We developed the ATS in-house at SICS, in order to allow for free experimentation with agent code and simultaneously adjusting and adding code to the server. A jar-file containing an agent can be run locally or remotely. Each trading agent executes in its own thread. The three server packages implemented (cf. Fig. 5) are described in turn below. The choice of Java was motivated, among several factors, by smooth compatibility with small devices, such as Java-enabled cell phones. While there is no theoretical reason to limit any sandbox environment for agent development to only one language, Java currently seems the most practical first choice. For instance, Java’s policy files are useful for defining the boundary between ATS and agent, and java.security allows for basic signing of agent code. 3.1 se.sics.ats.core This package represents the interface towards the agents, and is distributed to agent developers. Initially, the list of agent developers will most likely overlap considerably with the list of certified SAXESS members, and the principles 7 Fig. 5. The three ATS packages implemented. for testing similar. The next step is then to automate the certification process so that individual agent developers can submit agents to the ATS. Since there are legal and practical reasons for the market owner not to certify every single developer, there is room here for traditional as well as agent brokerage. The class AgentComponent specifies all ATS interfacing demands on the agent. For instance, the agent must have functionality for starting and stopping. The class AgentContext is the agent’s handle on the server. AgentContext is inspired by and adheres to the SAXESS Trade API for third party code development, based on Microsoft’s Component Object Model (COM). 3.2 se.sics.ats.reference This package contains the implementation of the ATS itself. It contains log handlers and socket tranceivers. 8 3.3 se.sics.ats.data This package represents the interface towards the stock exchange. This is where the ATS will connect to the core of the F/X. For now, it contains a parser which, like the connection, can easily be replaced by another. It now parses data disseminated through the WWW (more specifically, it parses http://www.stockholmsborsen.se). The ATS thus uses real stock exchange data, albeit with a delay of up to 15 minutes. We have limited its capability at the outset to the most traded stocks on the Stockholmsbörsen A-list. The package also simulates an order book. 4 Agent Shell Execution We can now specify the “Agent” rectangle from Fig. 5 above by explaining the agent shell. We first turn to some more abstract aspects of ATS management, however. 4.1 Roles In our proof-of-concept implementation work, we have felt a need for a division of labor between agent developers and ourselves: the ATS developers. In order to leave the core software unchanged—a requirement from OM, and most likely from any market owner—we also need to define the role of ATS administrator. The regulation of trade in SAXESS is today done through surveillance of the Trading Engine (SaxView), as well as through the official trading control and supervisory functions units. These units operate on the core and will be used also for agent trading. In addition, the ATS administrator must store and sign certificates for authenticated agent code developers. In addition, there are new business roles in the future scenario of commercially available ATS services, perhaps including dedicated agent brokers. We have enabled this new business role by implementing an object relating agent brokers and their agents. This object maintains references, deducts brokerage fees, and supplies data for notification services. For security reasons, the agent broker object is placed in the same execution environment as the ATS. The only agent manipulation granted the object is the killing of an agent thread, should this become necessary. 9 Fig. 6. Excerpt from a log of Daytrader, a simple agent running on the ATS. 10 4.2 Logs The ATS administrator must monitor the actions of all agents on the ATS, and activity logs are therefore needed. These logs are likely to be processed only automatically, but in case of system failure or suspected illicit agent action, manual inspection may be required. For this reason, the responsibility for logging should not be distributed, but be the responsibility of the ATS administrator. Each agent should be allowed read and write access to its own action logs, since logs provide interesting information on top of the generally available trade statistics. Logged information could be used for machine learning, which could occur offline or online, depending on the agent business logic. An excerpt from a log of a simple agent, to be discussed further in the next subsection, is shown in Fig. 6. The full source code of the agent, as well as the full log, has been published [25]. Since all stakeholders are potentially interested in parsing the log, it is in XML format. For instance, the ATS administrator might like to find the agent responsible for some illegal action on the ATS. Analogously, an agent broker might seek to attribute errors to the ATS implementation, using logs as evidence. The error log of Java exceptions and String objects is kept separate from all other logged data. 4.3 se.sics.ats.agent The structurally designed agent shell packages are intended as support for ATS agent development, and their JavaDoc is publicly available [27]. We give an abstract overview here of the low coupling design, so that the role of the shell in our implementation of the ATS is made clear. Agents extend the abstract TradeAgent class (see Fig. 7), which handles all ATS interaction, including the final methods initialize and start, invoked by the ATS [18]. The agent (SubAgent) gets information about stocks through various get methods, or by subscribing to stock changes (cf. Fig. 6). The latter alternative is the one used by most non-artificial stock traders today, and so subscription procedures and costs have already been carefully designed at most exchanges. Agents place orders using the Order object, and its interface OrderListener [18]. An order is created by calling the method createOrder. The OrderListener then implements the methods orderCancelled and orderClosed, which result in account updates and logging, as demonstrated in Fig. 6. The account and portfolio maintenance should in any commercial implementation of the ATS be handled by standard F/X middleware. Similarly, the AgentBroker has only minimal functionality in this version of the ATS. 11 Fig. 7. The agent shell package structure. 5 Conclusions and Further Research We have described a proof-of-concept implementation of a running agent trade server, which we believe serves as a blueprint for future implementations intended for live use on a real financial exchange. We have also constructed and described an agent shell, currently in use for server implementation of agents of increasing complexity. These agent developers are also providing the first anecdotal evidence of the quality of our implementation. We intend to engage more developers before a formal evaluation is made. Our future work (cf. Fig. 1) includes demonstrating that the size of an agent with a sophisticated business logic is manageable. We have also implemented various demonstrators for notifying services, to be used for presenting agent logs to the agent brokers and agent owners [28]. While professional trading is a highly collaborative activity [29], the agents in our set-up model each other only in a weak sense, based solely on their bidding. There are several multi-agent system aspects that deserve attention, such as multiple agent submission for teamwork, or even for manipulative purposes. Finally, the effects on the entire financial system as a result of wide adoption of agent trade is under investigation. This work is being done together with the Stockholm School of Economics and OM. Acknowledgments The authors would like to thank Jesper Johansson and Michael Poijes, who wrote the first agent shell and some of the server code, and kindly provided 12 log data. David Lybäck and Ulf Essler contributed with important comments and fruitful discussions. The Vinnova project TAP on accessible autonomous software provided the authors with the time required for this study. References [1] J. Rust, J. H. Miller, R. Palmer, Characterizing effective trading strategies– insights from a computerized double auction tournament, Economic Dynamics and Control 18 (1994) 61–96. [2] R. G. Palmer, W. B. Arthur, J. H. Holland, B. LeBaron, P. Tayler, Artificial economic life—a simple model of a stockmarket, Physica D 75 (1–3) (1994) 264–274. [3] A. Greenwald, The 2002 trading agent competition—an overview of agent strategies, AI Magazine 24 (1) (2003) 83–91. [4] J. B. D. Long, A. Shleifer, L. H. Summers, R. Waldmann, The survival of noise traders in financial markets, Journal of Business 64 (1991) 1–19. [5] T. Lux, M. Ausloos, Market fluctuations I: Scaling, multi-scaling and their possible origins, in: A. Bunde, J. Kropp, H.-J. Schellnhuber (Eds.), Science of Disaster—Scaling Laws Governing Weather, Body, Stock-Market Dynamics, Springer-Verlag, 2002, pp. 373–409. [6] T. Lux, Herd behaviour, bubbles and crashes, The Economic Journal 105 (1995) 881–896. [7] M. Boman, S. Johansson, D. Lybäck, Parrondo strategies for artificial traders, in: N. Zhong, J. Liu, S. Ohsuga, J. Bradshaw (Eds.), Intelligent Agent Technology, World Scientific, Singapore, 2001, pp. 150–159. [8] P. Jefferies, M. Hart, P. Hui, N. Johnson, From market games to real-world markets, European Physical Journal B 20 (1) (2001) 493–501. [9] B. LeBaron, Agent-based computational finance–suggested readings and early research, Economic Dynamics and Control 24 (2000) 679–702. [10] L. Tesfatsion, Agent-based computational economics–growing economies from the bottom up, Artificial Life 8 (1) (2002) 55–82. [11] M. Lettau, Explaining the facts with adaptive agents–the case of mutual fund flows, Journal of Economic Dynamics and Control 21 (1997) 1117–1147. [12] T. Lux, M. Marchesi, Scaling and criticality in a stochastic multi-agent model of a financial market, Nature 397 (1999) 498–500. [13] K. Bertels, M. Boman, Agent-based social simulation in markets, Electronic Commerce Research 1 (1–2) (2001) 149–158. 13 [14] J. D. Farmer, S. Joshi, The price dynamics of common trading strategies, Journal of Economic Behavior and Organization 49 (2002) 149–171. [15] W. A. Lupien, J. T. Rickard, Crossing Network Utilizing Optimal Mutual Satisfaction Density Profile, uS Patent No. 5689652 (1997). [16] E. K. Clemons, B. W. Weber, Restructuring institutional block trading—an overview of the OptiMark system, in: Proc HICSS 6—Organizational Systems and Technology, IEEE Computer Society, 1998, pp. 301–310. [17] C. Gerber, J. Teich, H. Wallenius, J. Wallenius, A simulation of OptiMark’s electronic matching algorithm and its simple variations of instutional block trading, Decision Support Systems In press. [18] A. Sandin, AgentTradeServer javaDoc, http://www.sics.se/~sandin/ats/doc/ (2002). Available at [19] D. Lybäck, M. Boman, Agent trade servers in financial exchange systems, ACM Transactions on Internet Technology 3 (4), in press. [20] R. Sales, First Europe, now the world, Wall Street and Technology online, available at http://www.wallstreetandtech.com/story/inDepth/WST20010816S0009 (August 2001). [21] An Automated Semi-Deterministic Trading System, filed to US Patent and Trademark Office (March 2002). [22] L. Ekenberg, M. Danielson, M. Boman, Imposing security constraints on agentbased decision support, Decision Support Systems 20 (1) (1997) 3–15. [23] M. Boman, Norms in artificial decision making, Artificial Intelligence and Law 7 (1999) 17–35. [24] F. Espinoza, Individual service provisioning, Ph.D. thesis, Dept of Computer and Systems Sciences, Stockholm Univ (2003). [25] J. Johansson, M. Poijes, Agent shell for stock market systems, Master’s thesis, Dept of Computer and Systems Sciences, Stockholm Univ (2003). [26] M. Boman, M. Bylund, F. Espinoza, M. Danielson, D. Lybäck, Trading agents for roaming users, presented at the Tokyo Mobile Roundtable, May 2002. Available at http://www.arxiv.org/abs/cs.CE/0204056 (May 2002). [27] J. Johansson, M. Poijes, DayTrader agent javaDoc, Available http://www.dsv.su.se/~mich-poi/trade_agent/javadoc/ (2003). at [28] S. Nylander, M. Bylund, M. Boman, Mobile access to real-time information— the case of autonomous stock brokering, submitted. (2003). [29] C. Heath, M. Jirotka, P. Luff, J. Hindmarsh, Unpacking collaboration—the interactional organisation of trading in a city dealing room, in: G. D. Michelis, C. Simone, K. Schmidt (Eds.), Proc ECSCW’93, Kluwer Academic, 1993, pp. 155–170. 14
5cs.CE
Real-Time Stochastic Optimal Control for Multi-agent Quadrotor Systems Vicenç Gómez1 , Sep Thijssen2 , Andrew Symington3 , Stephen Hailes4 , Hilbert J. Kappen2 arXiv:1502.04548v5 [cs.SY] 10 Mar 2016 2 1 Universitat Pompeu Fabra. Barcelona, Spain [email protected] Radboud University Nijmegen, the Netherlands {s.thijssen,b.kappen}@donders.ru.nl 3 University of California Los Angeles, USA [email protected] 4 University College London, United Kingdom [email protected] Abstract This paper presents a novel method for controlling teams of unmanned aerial vehicles using Stochastic Optimal Control (SOC) theory. The approach consists of a centralized high-level planner that computes optimal state trajectories as velocity sequences, and a platform-specific low-level controller which ensures that these velocity sequences are met. The planning task is expressed as a centralized path-integral control problem, for which optimal control computation corresponds to a probabilistic inference problem that can be solved by efficient sampling methods. Through simulation we show that our SOC approach (a) has significant benefits compared to deterministic control and other SOC methods in multimodal problems with noise-dependent optimal solutions, (b) is capable of controlling a large number of platforms in real-time, and (c) yields collective emergent behaviour in the form of flight formations. Finally, we show that our approach works for real platforms, by controlling a team of three quadrotors in outdoor conditions. 1 Introduction The recent surge in autonomous Unmanned Aerial Vehicle (UAV) research has been driven by the ease with which platforms can now be acquired, evolving legislation that regulates their use, and the broad range of applications enabled by both individual platforms and cooperative swarms. Example applications include automated delivery systems, monitoring and surveillance, target tracking, disaster management and navigation in areas inaccessible to humans. Quadrotors are a natural choice for an experimental platform, as they provide a safe, highly-agile and inexpensive means by which to evaluate UAV controllers. Figure 1 shows a 3D model of one such quadrotor, the Ascending Technologies Pelican. Quadrotors have non-linear dynamics and are naturally unstable, making control a non-trivial problem. Stochastic optimal control (SOC) provides a promising theoretical framework for achieving autonomous control of quadrotor systems. In contrast to deterministic control, SOC directly captures the uncertainty typically present in noisy environments and leads to solutions that qualitatively depend on the level of uncertainty (Kappen 2005). However, with the exception of the simple Linear Quadratic Gaussian Copyright c 2016, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: Control hierarchy: The path-integral controller (1) calculates target velocities/heights for each quadrotor. These are converted to roll, pitch, throttle and yaw rates by a platform-specific Velocity Height PID controller (2). This control is in turn passed to the platform’s flight control system (3), and converted to relative motor speed changes. case, for which a closed form solution exists, solving the SOC problem requires solving the Hamilton Jacobi Bellman (HJB) equations. These equations are generally intractable, and so the SOC problem remains an open challenge. In such a complex setting, a hierarchical approach is usually taken and the control problem is reduced to follow a state-trajectory (or a set of way points) designed by hand or computed offline using trajectory planning algorithms (Kendoul 2012). While the planning step typically involves a low-dimensional state representation, the control methods use a detailed complex state representation of the UAV. Examples of control methods for trajectory tracking are the Proportional Integral Derivative or the Linear-Quadratic regulator. A generic class of SOC problems was introduced in Kappen; Todorov (2005; 2006) for which the controls and the cost function are restricted in a way that makes the HJB equation linear and therefore more efficiently solvable. This class of problems is known as path integral (PI) control, linearly-solvable controlled diffusions or Kullback-Leibler control, and it has lead to successful robotic applications, e.g. (Kinjo, Uchibe, and Doya 2013; Rombokas et al. 2012; Theodorou, Buchli, and Schaal 2010). A particularly interesting feature of this class of problems is that the computation of optimal control is an inference problem with a solution given in terms of the passive dynamics. In a multiagent system, where the agents follow independent passive dynamics, such a feature can be exploited using approximate inference methods such as variational approximations or belief propagation (Kappen, Gómez, and Opper 2012; Van Den Broek, Wiegerinck, and Kappen 2008). In this paper, we show how PI control can be used for solving motion planning tasks on a team of quadrotors in real time. We combine periodic re-planning with receding horizon, similarly to model predictive control, with efficient importance sampling. At a high level, each quadrotor is modelled as a point mass that follows simple double integrator dynamics. Low-level control is achieved using a standard Proportional Integral Derivative (PID) velocity controller that interacts with a real or simulated flight control system. With this strategy we can scale PI control to ten units in simulation. Although in principle there are no further limits to experiments with actual platforms, our first results with real quadrotors only include three units. To the best of our knowledge this has been the first real-time implementation of PI control on an actual multi-agent system. In the next section we describe related work. We introduce our approach in Section 3 Results are shown on three different scenarios in Section 4 Finally, Section 5 concludes this paper. 2 Related Work on UAV Planning and Control There is a large and growing body of literature related to this topic. In this section, we highlight some of the most related papers to the presented approach. An recent survey of control methods for general UAVs can be found in Kendoul (2012). Stochastic optimal control is mostly used for UAV control in its simplest form, assuming a linear model perturbed by additive Gaussian noise and subject to quadratic costs (LQG), e.g. (How et al. 2008). While LQG can successfully perform simple actions like hovering, executing more complex actions requires considering additional corrections for aerodynamic effects such as induced power or blade flapping (Hoffmann et al. 2011). These approaches are mainly designed for accurate trajectory control and assume a given desired state trajectory that the controller transforms into motor commands. Model Predictive Control (MPC) has been used optimize trajectories in multi-agent UAV systems (Shim, Kim, and Sastry 2003). MPC employs a model of the UAV and solves an optimal control problem at time t and state x(t) over a future horizon of a fixed number of time-steps. The first optimal move u∗ (t) is then applied and the rest of the optimal sequence is discarded. The process is repeated again at time t + 1. A quadratic cost function is typically used, but other more complex functions exist. MPC has mostly been used in indoor scenarios, where high-precision motion capture systems are available. For instance, in Kushleyev et al. (2013) authors generate smooth trajectories through known 3-D environments satisfying specifications on intermediate waypoints and show remarkable success controlling a team of 20 quadrotors. Trajectory optimization is translated to a relaxation of a mixed integer quadratic program problem with additional constraints for collision avoidance, that can be solved efficiently in realtime. Examples that follow a similar methodology can be found in Turpin, Michael, and Kumar; Augugliaro, Schoellig, and D’Andrea (2012; 2012). Similarly to our approach, these methods use a simplified model of dynamics, either using the 3-D position and yaw angle Kushleyev et al.; Turpin, Michael, and Kumar (2013; 2012) or the position and velocities as in Augugliaro, Schoellig, and D’Andrea (2012). However, these approaches are inherently deterministic and express the optimal control problem as a quadratic problem. In our case, we solve an inference problem by sampling and we do not require intermediate trajectory waypoints. In outdoor conditions, motion capture is difficult and Global Positioning System (GPS) is used instead. Existing control approaches are typically either based on Reynolds flocking (Bürkle, Segor, and Kollmann 2011; Hauert et al. 2011; Vásárhelyi et al. 2014; Reynolds 1987) or flight formation (Guerrero and Lozano 2012; Yu et al. 2013). In Reynolds flocking, each agent is considered a point mass that obeys simple and distributed rules: separate from neighbors, align with the average heading of neighbors and steer towards neighborhood centroid to keep cohesion. Flight formation control is typically modeled using graphs, where every node is an agent that can exchange information with all or several agents. Velocity and/or position coordination is usually achieved using consensus algorithms. The work in Quintero, Collins, and Hespanha (2013) shares many similarities with our approach. Authors derive a stochastic optimal control formulation of the flocking problem for fixed-wings UAVs. They take a leader-follower strategy, where the leader follows an arbitrary (predefined) policy that is learned offline and define the immediate cost as a function of the distance and heading with respect to the leader. Their method is demonstrated outdoors with 3 fixedwing UAVs in a distributed sensing task. As in this paper, they formulate a SOC problem and perform MPC. However, in our case we do not restrict to a leader-follower setup and consider a more general class of SOC problems which can include coordination and cooperation problems. Planning approaches Within the planning community, Bernardini, Fox, and Long (2014) consider search and tracking tasks, similar to one of our scenarios. Their approach is different to ours, they formulate a planning problem that uses used search patterns that must be selected and se- quenced to maximise the probability of rediscovering the target. Albore et al. (2015) and Chanel, Teichteil-Knigsbuch, and Lesire (2013) consider a different problem: dynamic data acquisition and environmental knowledge optimisation. Both techniques use some form of replanning. While Albore et al. (2015) uses a Markov Random Field framework to represent knowledge about the uncertain map and its quality, Chanel, Teichteil-Knigsbuch, and Lesire (2013) rely on partially-observable MDPs. All these works consider a single UAV scenario and low-level control is either neglected or deferred to a PID or waypoint controller. bitrary functions, f is the drift in the uncontrolled dynamics (including gravity, Coriolis and centripetal forces), and G describes the effect of the control u into the state vector x. A realization τ = x0:dt:T of the above equation is called a (random) path. In order to describe a control problem we define the cost that is attributed to a path (cost-to-go) by Recent Progress in Path-Integral Control There has been significant progress in PI control, both theoretically and in applications. Most of existing methods use parametrized policies to overcome the main limitations (see Section 3.1). Examples can be found in Theodorou, Buchli, and Schaal; Stulp and Sigaud; Gómez et al. (2010; 2012; 2014). In these methods, the optimal control solution is restricted by the class of parametrized policies and, more importantly, it is computed offline. In Rawlik, Toussaint, and Vijayakumar (2013), authors propose to approximate the transformed cost-to-go function using linear operators in a reproducing kernel Hilbert space. Such an approach requires an analytical form of the PI embedding, which is difficult to obtain in general. In Horowitz, Damle, and Burdick (2014), a lowrank tensor representation is used to represent the model dynamics, allowing to scale PI control up to a 12-dimensional system. More recently, the issue of state-dependence of the optimal control has been addressed (Thijssen and Kappen 2015), where a parametrized state-dependent feedback controller is derived for the PI control class. Finally, model predictive PI control has been recently proposed for controlling a nano-quadrotor in indoor settings in an obstacle avoidance task (Williams, Rombokas, and Daniel 2014). In contrast to our approach, their method is not hierachical and uses naive sampling, which makes it less sample efficient. Additionally, the control cost term is neglected, which can have important implications in complex tasks involving noise. The approach presented here scales well to several UAVs in outdoor conditions and is illustrated in tasks beyond obstacle avoidance navigation. where rT (xT ) and rt (xt ) are arbitrary state cost terms at end and intermediate times, respectively. R is the control cost matrix. The general stochastic optimal control problem is to minimize the expected cost-to-go w.r.t. the control 3 Path-Integral Control for Multi-UAV planning We first briefly review PI control theory. This is followed by a description of the proposed method used to achieve motion planning of multi-agent UAV systems using PI control. 3.1 Path-Integral Control We consider continuous time stochastic control problems, where the dynamics and cost are respectively linear and quadratic in the control input, but arbitrary in the state. More precisely, consider the following stochastic differential equation of the state vector x ∈ Rn under controls u ∈ Rm dx = f (x)dt + G(x)(udt + dξ), (1) where ξ is m−dimensional Wiener noise with covariance Σu ∈ Rm×m and f (x) ∈ Rn and G(x) ∈ Rn×m are ar- S(τ |x0 , u) = rT (xT )   X 1 > + rt (xt )dt + ut Rut dt, 2 (2) t=0:dt:T −dt u∗ = arg min E[S(τ |x0 , u)]. u In general, such a minimization leads to the HamiltonJacobi-Bellman (HJB) equations, which are non-linear, second order partial differential equations. However, under the following relation between the control cost and noise covariance Σu = λR−1 , the resulting equation is linear in the exponentially transformed cost-to-go function. The solution is given by the Feynman-Kac Formula, which expresses optimal control in terms of a Path-Integral, which can be interpreted as taking the expectation under the optimal path distribution (Kappen 2005) p∗ (τ |x0 ) ∝ p(τ |x0 , u) exp(−S(τ |x0 , u)/λ), hu∗t (x0 )i = hut + (ξt+dt − ξt )/dti , (3) (4) where p(τ |x0 , u) denotes the probability of a (sub-optimal) path under equation (1) and h·i denotes expectation over paths distributed by p∗ . The constraint Σu = λR−1 forces control and noise to act in the same dimensions, but in an inverse relation. Thus, for fixed λ, the larger the noise, the cheaper the control and viceversa. Parameter λ act as a temperature: higher values of λ result in optimal solutions that are closer to the uncontrolled process. Equation (4) permits optimal control to be calculated by probabilistic inference methods, e.g., Monte Carlo. An interesting fact is that equations (3, 4) hold for all controls u. In particular, u can be chosen to reduce the variance in the Monte Carlo computation of hu∗t (x0 )i which amounts to importance sampling. This technique can drastically improve the sampling efficiency, which is crucial in high dimensional systems. Despite this improvement, direct application of PI control into real systems is limited because it is not clear how to choose a proper importance sampling distribution. Furthermore, note that equation (4) yields the optimal control for all times t averaged over states. The result is therefore an open-loop controller that neglects the statedependence of the control beyond the initial state. 3.2 Multi-UAV planning The proposed architecture is composed of two main levels. At the most abstract level, the UAV is modeled as a 2D point-mass system that follows double integrator dynamics. Algorithm 1 PI control for UAV motion planning 1: function PIC ONTROLLER(N, H, dt, rt (·), Σu , ut:dt:t+H ) 2: for k = 1, . . . , N do 3: Sample paths τk = {xt:dt:t+H }k with Eq. (5) 4: end for 5: Compute Sk = S(τk |x0 , u) with Eq. (2) 6: Store the noise realizations {ξt:dt:t+H P }k 7: Compute the weights: wk = e−Sk /λ / l e−Sl /λ 8: for s = t : dt : t +P H do 1 9: u∗s = us + dt k wk ({ξs+dt }k − {ξs }k ) 10: end for 11: Return next desired velocity: vt+dt = vt + u∗t dt and u∗t:dt:t+H for importance sampling at t + dt 12: end function At the low-level, we use a detailed second order model that we learn from real flight data (De Nardi and Holland 2008). We use model predictive control combined with importance sampling. There are two main benefits of using the proposed approach: first, since the state is continuously updated, the controller does not suffer from the problems caused by using an open-loop controller. Second, the control policy is not restricted by any parametrization. The two-level approach permits to transmit control signals from the high-level PI controller to the low-level control system at a relatively low frequencies (we use 15Hz in this work). Consequently, the PI controller has more time available for sampling a large number of trajectories, which is critical to obtain good estimates of the control. The choice of 2D in the presented method is not a fundamental limitation, as long as double-integrator dynamics is used. The control hierarchy introduces additional model mismatch. However, as we show in the results later, this mismatch is not critical for obtaining good performance in real conditions. Ignoring height, the state vector x is thus composed of the East-North (EN) positions and EN velocities of each agent i = 1, . . . , M as xi = [pi , vi ]> where pi , vi ∈ R2 . Similarly, the control u consists of EN accelerations ui ∈ R2 . Equation (1) decouples between the agents and takes the linear form dxi = Axi dt + B(ui dt + dξi ),     0 1 0 A= , B= . 0 0 1 (5) Notice that although the dynamics is decoupled and linear, the state cost rt (xt ) in equation (2) can be any arbitrary function of all UAVs states. As a result, the optimal control will in general be a non-linear function that couples all the states and thus hard to compute. Given the current joint optimal action u∗t and velocity vt , the expected velocity at the next time t0 is calculated as vt0 = vt + (t0 − t)u∗t and passed to the low-level controller. The final algorithm optionally keeps an importance-control sequence ut:dt:t+H that is incrementally updated. We summarize the high-level controller in Algorithm 1. The importance-control sequence ut:dt:t+H is initialized using prior knowledge or with zeros otherwise. Noise is Figure 2: The flight control system (FCS) is comprised of two control loops: one for stabilization and the other for pose control. A low-level controller interacts with the FCS over a serial interface to stream measurements and issue control. dimension-independent, i.e. Σu = σu2 Id. To measure sampling convergence, we define the Effective Sample Size PN (ESS) as ESS := 1/ k=1 wk2 , which is a quantity between 1 and N . Values of ESS close to one indicate an estimate dominated by just one sample and a poor estimate of the optimal control, whereas an ESS close to N indicates near perfect sampling, which occurs when the importance- equals the optimal-control function. 3.3 Low Level Control > The target velocity v = [vE vN ] is passed along with a height p̂U to a Velocity-Height controller. This controller uses the current state estimate of the real quadrotor > y = [pE pN pU φ θ ψ u v w p q r] , where (pE , pN , pU ) and (φ, θ, ψ) denote navigation-frame position and orientation and (u, v, w), (p, q, r) denote body-frame and angular velocities, respectively. It is composed of four independent PID controllers for roll φ̂, pitch θ̂, throttle γ̂ and yaw rate r̂. that send the commands to the flight control system (FCS) to achieve v. Figure 2 shows the details of the FCS. The control loop runs at 1kHz fusing triaxial gyroscope, accelerometer and magnetometer measurements. The accelerometer and magnetometer measurements are used to determine a reference global orientation, which is in turn used to track the gyroscope bias. The difference between the desired and actual angular rates are converted to motor speeds using the model in Mahony, Kumar, and Corke (2012). An outer pose control loop calculates the desired angular rates based on the desired state. Orientation is obtained from the inner control loop, while position and velocity are obtained by fusing GPS navigation fixes with barometric pressure (BAR) based altitude measurements. The radio transmitter (marked TX in the diagram) allows the operator to switch quickly between autonomous and manual control of a platform. There is also an acoustic alarm on the platform itself, which warns the operator when the GPS signal is lost or the battery is getting low. If the battery reaches a critical level or communication with the transmitter is lost, the platform can be configured to land immediately or alternatively, to fly back and land at its take-off point. horizon problem. A key difference between iLQG and PI control is that the linear-quadratic approximation is certainty equivalent. Consequently, iLQG yields a noise independent solution. 4.1 Figure 3: Drunken Quadrotor: a red target has to be reached while avoiding obstacles. (Left) the shortest route is the optimal solution in the absence of noise. (Right) with control noise, the optimal solution is to fly around the building. 3.4 Simulator Platform We have developed an open-source framework called CRATES1 . The framework is a implementation of QRSim (De Nardi 2013; Symington et al. 2014) in Gazebo, which uses Robot Operating System (ROS) for high-level control. It permits high-level controllers to be platform-agnostic. It is similar to the Hector Quadrotor project (Meyer et al. 2012) with a formalized notion of a hardware abstraction layers. The CRATES simulator propagates the quadrotor state forward in time based on a second order model (De Nardi and Holland 2008). The equations were learned from real flight data and verified by expert domain knowledge. In addition to platform dynamics, CRATES also simulates various noise-perturbed sensors, wind shear and turbulence. Orientation and barometric altitude errors follow zero-mean Ornstein-Uhlenbeck processes, while GPS error is modeled at the pseudo range level using trace data available from the International GPS Service. In accordance with the Military Specification MIL-F-8785C, wind shear is modeled as a function of altitude, while turbulence is modeled as a discrete implementation of the Dryden model. CRATES also provides support for generating terrain from satellite images and light detection and ranging (LIDAR) technology, and reporting collisions between platforms and terrain. 4 Results We now analyze the performance of the proposed approach in three different tasks. We first show that, in the presence of control noise, PI control is preferable over other approaches. For clarity, this scenario is presented for one agent only. We then consider two tasks involving several units: a flight formation task and a pursuit-evasion task. We compare the PI control method described in Section 3.2 with iterative linear-quadratic Gaussian (iLQG) control (Todorov and Li 2005). iLQG is a state-of-the-art method based on differential dynamic programming, that iteratively computes local linear-quadratic approximations to the finite 1 CRATES stands for ’Cognitive Robotics Architecture for Tightly-Coupled Experiments and Simulation’. Available at https://bitbucket.org/vicengomez/crates Scenario I: Drunken Quadrotor This scenario is inspired in Kappen (2005) and highlights the benefits of SOC in a quadrotor task. The Drunken Quadrotor is a finite horizon task where a quadrotor has to reach a target, while avoiding a building and a wall (figure 3). There are two possible routes: a shorter one that passes through a small gap between the wall and the building, and a longer one that goes around the building. Unlike SOC, the deterministic optimal solution does not depend on the noise level and will always take the shorter route. However, with added noise, the risk of collision increases and thus the optimal noisy control is to take the longer route. This task can be alternatively addressed using other planning methods, such as the one proposed by Ono, Williams, and Blackmore (2013), which allow for specification of user’s acceptable levels of risk using chance constraints. Here we focus on comparing deterministic and stochastic optimal control for motion planning. The amount of noise thus determines whether the optimal solution is go through the risky path or the longer safer path. The state cost in this problem consists of hard constraints that assign infinite cost when either the wall or the building is hit. PI control deals with collisions by killing particles that hit the obstacles during Monte Carlo sampling. For iLQG, the local approximations require a twice differentiable cost function. We resolved this issue by adding a smooth obstacle-proximity penalty in the cost function. Although iLQG computes linear feedback, we tried to improve it with a MPC scheme, similar as for PI control. Unfortunately, this leads to numerical instabilities in this task, since the system disturbances tend to move the reference trajectory through a building when moving from one time step to the next. For MPC with PI control we use a receding horizon of three seconds and perform re-planning at a frequency of 15 Hz with N = 2000 sample paths. Both methods are initialized with ut = 0, ∀t. iLQG requires approximately 103 iterations to converge with a learning rate of 0.5%. Figure 3 (left) shows an example of real trajectory computed for low control noise level, σu2 = 10−3 . To be able to obtain such a trajectory we deactivate sensor uncertainties in accelerometer, gyroscope, orientation and altimeter. External noise is thus limited to aerodynamic turbulences only. In this case, both iLQG and PI solutions correspond to the shortest path, i.e. go through the gap between the wall and the building. Figure 3 (right) illustrates the solutions obtained for larger noise level σu2 = 1. While the optimal reference trajectory obtained by iLQG does not change, which results in collision once the real noisy controller is executed (left path), the PI control solution avoids the building and takes the longer route (right path). Note that iLQG can find both solutions depending on initialization. However, However, it will always choose the shortest route, regardless of nearby obstacles. Also, note that the PI controlled unit takes a longer route to reach the target. The reason is that the con- 1 Percent of crashes 90 Cost solution 80 70 60 50 0 iLQG PI 0.8 0.6 0.4 0.2 0.05 0.1 0.15 Wind velocity (m/s) 0.2 0 0 0.05 0.1 0.15 Wind velocity (m/s) 0.2 Figure 4: Results: Drunken Quadrotor with wind: For different wind velocities and fixed control noise σu2 = 0.5. (Left) cost of the obtained solutions and (Right) percentage of crashes using iLQG and PI. trol cost R is set quite high in order to reach a good ESS. Alternatively, if R is decreased, the optimal solution could reach the target sooner, but at the cost of a decreased ESS. This trade-off, which is inherent in PI control, can be resolved by incorporating feedback control in the importance sampling, as presented in Thijssen and Kappen (2015). We also consider more realistic conditions with noise not limited to act in the control. Figure 4 (a,b) shows results in the presence of wind and sensor uncertainty. Panel (a) shows how the wind affects the quality of the solution, resulting in an increase of the variance and the cost for stronger wind. In all our tests, iLQG is not able to bring the quadrotor to the other side. Panel (b) shows the percentage of crashes using both methods. Crashes occur often using iLQG control and only occasionally using PI control. With stronger wind, the iLQG controlled unit does occasionally not even reach the corridor (the unit did not reach the other side but did not crash either). This explains the difference in percentages of Panel (b). We conclude that for multi-modal tasks (tasks where multiple solution trajectories exist), the proposed method is preferable to iLQG. 4.2 Scenario II: Holding Pattern The second scenario addresses the problem of coordinating agents to hold their position near a point of interest while keeping a safe range of velocities and avoiding crashing into each other. Such a problem arises for instance when multiple aircraft need to land at the same location, and simultaneous landing is not possible. The resulting flight formation has been used frequently in the literature (Vásárhelyi et al. 2014; How et al. 2008; Yu et al. 2013; Franchi et al. 2012), but always with prior specification of the trajectories. We show how this formation is obtained as the optimal solution of a SOC problem. Consider the following state cost (omitting time indexes) rHP (x) = M X exp (vi − vmax ) + exp (vmin − vi ) i=1 + exp (k pi − d k2 ) + M X Chit / k pi − pj k2 j>i (6) Figure 5: Holding pattern in the CRATES simulator. Ten units coordinate their flight in a circular formation. In this example, N = 104 samples, control noise is σu2 = 0.1 and horizon H = 1 sec. Cost parameters are vmin = 1, vmax = 3, Chit = 20 and d = 7. Environmental noise and sensing uncertainties are modeled using realistic parameter values. where vmax and vmin denote the maximum and minimum velocities, respectively, d denotes penalty for deviation from the origin and Chit is the penalty for collision risk of two agents. k · k2 denotes `-2 norm. The optimal solution for this problem is a circular flying pattern where units fly equidistantly from each other. The value of parameter d determines the radius and the average velocities of the agents are determined from vmin and vmax . Since the solution is symmetric with respect to the direction of rotation (clockwise or anti-clockwise), only when the control is executed, a choice is made and the symmetry is broken. Figure 5 shows a snapshot of a simulation after the flight formation has been reached for a particular choice of parameter values 2 . Since we use an uninformed initial control trajectory, there is a transient period during which the agents organize to reach the optimal configuration. The coordinated circular pattern is obtained regardless of the initial positions. This behavior is robust and obtained for a large range of parameter values. 2 Supplementary video material is available at http://www. mbfys.ru.nl/staff/v.gomez/uav.html (a) (d) 3 1.1 250 10 2 N=10 N=102 400 N=10 N=104 3 N=10 200 350 1.05 250 200 150 100 10 ESS 300 Cost iLQG/PI 2 state cost state cost (c) (b) 450 1 1 10 0.95 150 100 0 50 100 time 150 50 2 4 6 8 number of quadrotors 10 0.9 −3 10 0 −2 −1 10 10 Noise level σ2 10 −3 10 u −2 −1 10 10 Noise level σ2 0 10 u Figure 6: Holding pattern: (a) evolution of the state cost for different number of samples N = 10, 102 , 103 . (b) scaling of the method with the number of agents. For different control noise levels, (c) comparison between iLQG and PI control (ratios > 1 indicate better performance of PI over iLQG) and (d) Effective Sample Sizes. Errors bars correspond to ten different random realizations. Position for both UAVs 6 UAV0 UAV1 4 2 Meters North Figure 6(a) shows immediate costs at different times. Cost always decreases from the starting configuration until the formation is reached. This value depends on several parameters. We report its dependence on the number N of sample paths. For large N , the variances are small and the cost attains small values at convergence. Conversely, for small N , there is larger variance and the obtained dynamical configuration is less optimal (typically the distances between the agents are not the same). During the formation of the pattern the controls are more expensive. For this particular task, full convergence of the path integrals is not required, and the formation can be achieved with a very small N . Figure 6(b) illustrates how the method scales as the number of agents increases. We report averages over the mean costs over 20 time-steps after one minute of flight. We varied M while fixing the rest of the parameters (the distance d which was set equal to the number of agents in meters). The small variance of the cost indicates that a stable formation is reached in all the cases. As expected, larger values of N lead to smaller state cost configurations. For more than ten UAVs, the simulator starts to have problems in this task and occasional crashes may occur before the formation is reached due to limited sample sizes. This limitation can be addressed, for example, by using more processing power and parallelization and it is left for future work. We also compared our approach with iLQG in this scenario. Figure 6(c) shows the ratio of cost differences after convergence of both solutions. Both use MPC, with a horizon of 2s and update frequency of 15Hz. Values above 1 indicate that PI control consistently outperforms iLQG in this problem. Before convergence, we also found, as in the previous task, that iLQG resulted in occasional crashes while PI control did not. The Effective Sample Size (ESS) is shown in Figure 6(d). We observe that higher control noise levels result in better exploration and thus better controls. We can thus conclude that the proposed methodology is feasible for coordinating a large team of quadrotors. For this task, we performed experiments with the real platforms. Figure 7 shows real trajectories obtained in outdoor 0 −2 −4 −6 −5 −3 −1 1 Meters East 3 5 Figure 7: Resulting trajectories of a Holding Pattern experiment using two platforms in outdoors conditions. conditions (see also the video that accompanies this paper for an experiment with three platforms). Despite the presence of significant noise, the circular behavior was also obtained. In the real experiments, we used a Core i7 laptop with 8GB RAM as base station, which run its own ROS messaging core and forwarded messages to and from the platforms over a IEEE 802.11 2.4GHz network. For safety reasons, the quadrotors were flown at different altitudes. 4.3 Scenario III: Cat and Mouse The final scenario that we consider is the cat and mouse scenario. In this task, a team of M quadrotors (the cats) has to catch (get close to) another quadrotor (the mouse). The mouse has autonomous dynamics: it tries to escape the cats by moving at velocity inversely proportional to the distance to the cats. More precisely, let pmouse denote the 2D position of the mouse, the velocity command for the mouse is Mouse Cats Figure 8: Cat and mouse scenario: (Top-left) four cats and one mouse. (Top-right) for horizon time H = 2 seconds, the four cats surround the mouse forever and keep rotation around it. (Bottom-left) for horizon time H = 1 seconds, the four cats chase the mouse but (bottom-right) the mouse manages to escape. With these settings, the multi-agent system alternates between these two dynamical states. Number of sample paths is N = 104 , noise level σu2 = 0.5. Other parameter values are d = 30, vmin = 1, vmax = 4, vmin = 4 and vmax mouse = 3. computed (omitting time indexes) as M vmouse = v max mouse k X pi − pmouse v . , where v = v k2 k pi − pmouse k2 i=1 The parameter v max determines the maximum velocity of mouse the mouse. As state cost function we use equation (6) with an additional penalty term that depends on the sum of the distances to the mouse M X k pi − pmouse k2 . rCM (x) = rHP (x) + i=1 This scenario leads to several interesting dynamical states. For example, for a sufficiently large value of M , the mouse always gets caught (if its initial position is not close to the boundary, determined by d). The optimal control for the cats consists in surrounding the mouse to prevent collision. Once the mouse is surrounded, the cats keep rotating around it, as in the previous scenario, but with the origin replaced by the mouse position. The additional video shows examples of other complex behaviors obtained for different parameter settings. Figure 8 (top-right) illustrates this behavior. The types of solution we observe are different for other parameter values. For example, for M = 2 or a small time horizon, e.g. H = 1, the dynamical state in which the cats rotate around the mouse is not stable, and the mouse escapes. This is displayed in Figure 8 (bottom panels) and better illustrated in the video provided as supplementary material. We emphasize that these different behaviors are observed for large uncertainty in the form of sensor noise and wind. 5 Conclusions This paper presents a centralized, real-time stochastic optimal control algorithm for coordinating the actions of multiple autonomous vehicles in order to minimize a global cost function. The high-level control task is expressed as a PathIntegral control problem that can be solved using efficient sampling methods and real-time control is possible via the use of re-planning and model predictive control. To the best of our knowledge, this is the first real-time implementation of Path-Integral control on an actual multi-agent system. We have shown in a simple scenario (Drunken Quadrotor) that the proposed methodology is more convenient than other approaches such as deterministic control or iLQG for planning trajectories. In more complex scenarios such as the Holding Pattern and the Cat and Mouse, the proposed methodology is also preferable and allows for realtime control. We observe multiple and complex group behavior emerging from the specified cost function. Our experimental framework CRATES has been a key development that permitted a smooth transition from the theory to the real quadrotor platforms, with literally no modification of the underlying control code. This gives evidence that the model mismatch caused by the use of a control hierarchy is not critical in normal outdoor conditions. Our current research is addressing the following aspects: Large scale parallel sampling− the presented method can be easily parallelized, for instance, using graphics processing units, as in Williams, Rombokas, and Daniel (2014). Although the tasks considered in this work did not required more than 104 samples, we expect that this improvement will significantly increase the number of application domains and system size. Distributed control− we are exploring different distributed formulations that take better profit of the factorized representation of the state cost. Note that the costs functions considered in this work only require pairwise couplings of the agents (to prevent collisions). However, full observability of the joint space is still required, which is not available in a fully distributed approach. References [Albore et al.] Albore, A.; Peyrard, N.; Sabbadin, R.; and Teichteil Königsbuch, F. 2015. An online replanning approach for crop fields mapping with autonomous UAVs. In International Conference on Automated Planning and Scheduling (ICAPS). [Augugliaro, Schoellig, and D’Andrea] Augugliaro, F.; Schoellig, A.; and D’Andrea, R. 2012. Generation of collision-free trajectories for a quadrocopter fleet: A sequential convex programming approach. In Intelligent Robots and Systems (IROS), 1917–1922. [Bernardini, Fox, and Long] Bernardini, S.; Fox, M.; and Long, D. 2014. Planning the behaviour of low-cost quadcopters for surveillance missions. In International Conference on Automated Planning and Scheduling (ICAPS). [Bürkle, Segor, and Kollmann] Bürkle, A.; Segor, F.; and Kollmann, M. 2011. Towards autonomous micro UAV swarms. J. Intell. Robot. Syst. 61(1-4):339–353. [Chanel, Teichteil-Knigsbuch, and Lesire] Chanel, C. C.; TeichteilKnigsbuch, F.; and Lesire, C. 2013. Multi-target detection and recognition by UAVs using online POMDPs. In International Conference on Automated Planning and Scheduling (ICAPS). [De Nardi and Holland] De Nardi, R., and Holland, O. 2008. Coevolutionary modelling of a miniature rotorcraft. In 10th International Conference on Intelligent Autonomous Systems (IAS10), 364 – 373. [De Nardi] De Nardi, R. 2013. The QRSim Quadrotors Simulator. Technical Report RN/13/08, University College London. [Franchi et al.] Franchi, A.; Masone, C.; Grabe, V.; Ryll, M.; Bülthoff, H. H.; and Giordano, P. R. 2012. Modeling and control of UAV bearing-formations with bilateral high-level steering. Int. J. Robot. Res. 0278364912462493. [Gómez et al.] Gómez, V.; Kappen, H. J.; Peters, J.; and Neumann, G. 2014. Policy search for path integral control. In European Conf. on Machine Learning & Knowledge Discovery in Databases, 482– 497. [Guerrero and Lozano] Guerrero, J., and Lozano, R. 2012. Flight Formation Control. John Wiley & Sons. [Hauert et al.] Hauert, S.; Leven, S.; Varga, M.; Ruini, F.; Cangelosi, A.; Zufferey, J.-C.; and Floreano, D. 2011. Reynolds flocking in reality with fixed-wing robots: Communication range vs. maximum turning rate. In Intelligent Robots and Systems (IROS), 5015–5020. [Hoffmann et al.] Hoffmann, G. M.; Huang, H.; Waslander, S. L.; and Tomlin, C. J. 2011. Precision flight control for a multi-vehicle quadrotor helicopter testbed. Control. Eng. Pract. 19(9):1023 – 1036. [Horowitz, Damle, and Burdick] Horowitz, M. B.; Damle, A.; and Burdick, J. W. 2014. Linear Hamilton Jacobi Bellman equations in high dimensions. arXiv preprint arXiv:1404.1089. [How et al.] How, J.; Bethke, B.; Frank, A.; Dale, D.; and Vian, J. 2008. Real-time indoor autonomous vehicle test environment. IEEE Contr. Syst. Mag. 28(2):51–64. [Kappen, Gómez, and Opper] Kappen, H. J.; Gómez, V.; and Opper, M. 2012. Optimal control as a graphical model inference problem. Mach. Learn. 87:159–182. [Kappen] Kappen, H. J. 2005. Path integrals and symmetry breaking for optimal control theory. Journal of statistical mechanics: theory and experiment 2005(11):P11011. [Kendoul] Kendoul, F. 2012. Survey of advances in guidance, navigation, and control of unmanned rotorcraft systems. J. Field Robot. 29(2):315–378. [Kinjo, Uchibe, and Doya] Kinjo, K.; Uchibe, E.; and Doya, K. 2013. Evaluation of linearly solvable Markov decision process with dynamic model learning in a mobile robot navigation task. Front. Neurorobot. 7:1–13. [Kushleyev et al.] Kushleyev, A.; Mellinger, D.; Powers, C.; and Kumar, V. 2013. Towards a swarm of agile micro quadrotors. Auton. Robot. 35(4):287–300. [Mahony, Kumar, and Corke] Mahony, R.; Kumar, V.; and Corke, P. 2012. Multirotor aerial vehicles: Modeling, estimation, and control of quadrotor. IEEE Robotics & Automation Magazine 20–32. [Meyer et al.] Meyer, J.; Sendobry, A.; Kohlbrecher, S.; and Klingauf, U. 2012. Comprehensive Simulation of Quadrotor UAVs Using ROS and Gazebo. Lecture Notes in Computer Science 7628:400–411. [Ono, Williams, and Blackmore] Ono, M.; Williams, B. C.; and Blackmore, L. 2013. Probabilistic planning for continuous dynamic systems under bounded risk. J. Artif. Int. Res. 46(1):511– 577. [Quintero, Collins, and Hespanha] Quintero, S.; Collins, G.; and Hespanha, J. 2013. Flocking with fixed-wing UAVs for distributed sensing: A stochastic optimal control approach. In American Control Conference (ACC), 2025–2031. [Rawlik, Toussaint, and Vijayakumar] Rawlik, K.; Toussaint, M.; and Vijayakumar, S. 2013. Path integral control by reproducing kernel Hilbert space embedding. In Twenty-Third International Joint Conference on Artificial Intelligence, 1628–1634. AAAI Press. [Reynolds] Reynolds, C. W. 1987. Flocks, herds and schools: A distributed behavioral model. SIGGRAPH Comput. Graph. 21(4):25– 34. [Rombokas et al.] Rombokas, E.; Theodorou, E.; Malhotra, M.; Todorov, E.; and Matsuoka, Y. 2012. Tendon-driven control of biomechanical and robotic systems: A path integral reinforcement learning approach. In International Conference on Robotics and Automation, 208–214. [Shim, Kim, and Sastry] Shim, D. H.; Kim, H. J.; and Sastry, S. 2003. Decentralized nonlinear model predictive control of multiple flying robots. In IEEE conference on Decision and control (CDC), volume 4, 3621–3626. [Stulp and Sigaud] Stulp, F., and Sigaud, O. 2012. Path integral policy improvement with covariance matrix adaptation. In International Conference Machine Learning (ICML). [Symington et al.] Symington, A.; De Nardi, R.; Julier, S.; and Hailes, S. 2014. Simulating quadrotor UAVs in outdoor scenarios. In Intelligent Robots and Systems (IROS), 3382–3388. [Theodorou, Buchli, and Schaal] Theodorou, E.; Buchli, J.; and Schaal, S. 2010. A generalized path integral control approach to reinforcement learning. J. Mach. Learn. Res. 11:3137–3181. [Thijssen and Kappen] Thijssen, S., and Kappen, H. J. 2015. Path integral control and state-dependent feedback. Phys. Rev. E 91:032104. [Todorov and Li] Todorov, E., and Li, W. 2005. A generalized iterative LQG method for locally-optimal feedback control of constrained nonlinear stochastic systems. In American Control Conference (ACC), 300–306 vol. 1. IEEE. [Todorov] Todorov, E. 2006. Linearly-solvable Markov decision problems. In Advances in neural information processing systems (NIPS), 1369–1376. [Turpin, Michael, and Kumar] Turpin, M.; Michael, N.; and Kumar, V. 2012. Decentralized formation control with variable shapes for aerial robots. In International Conference on Robotics and Automation (ICRA), 23–30. [Van Den Broek, Wiegerinck, and Kappen] Van Den Broek, B.; Wiegerinck, W.; and Kappen, H. J. 2008. Graphical model inference in optimal control of stochastic multi-agent systems. J. Artif. Intell. Res. 32:95–122. [Vásárhelyi et al.] Vásárhelyi, G.; Virágh, C.; Somorjai, G.; Tarcai, N.; Szorenyi, T.; Nepusz, T.; and Vicsek, T. 2014. Outdoor flocking and formation flight with autonomous aerial robots. In Intelligent Robots and Systems (IROS), 3866–3873. [Williams, Rombokas, and Daniel] Williams, G.; Rombokas, E.; and Daniel, T. 2014. GPU based path integral control with learned dynamics. In Autonomously Learning Robots - NIPS Workshop. [Yu et al.] Yu, B.; Dong, X.; Shi, Z.; and Zhong, Y. 2013. Formation control for quadrotor swarm systems: Algorithms and experiments. In Chinese Control Conference (CCC), 7099–7104.
3cs.SY
The gene family-free median of three Daniel Doerr1 , Pedro Feijão2 , Metin Balaban1 , and Cedric Chauve3 arXiv:1606.05910v1 [cs.DS] 19 Jun 2016 1 3 School of Computer and Communication Sciences, EPFL, 1015 Lausanne, Switzerland [email protected] 2 Faculty of Technology, Bielefeld University, 33615 Bielefeld, Germany Department of Mathematics, Simon Fraser University, Burnaby BC, Canada Abstract. The gene family-free framework for comparative genomics aims at developing methods for gene order analysis that do not require prior gene family assignment, but work directly on a sequence similarity multipartite graph. We present a model for constructing a median of three genomes in this family-free setting, based on maximizing an objective function that generalizes the classical breakpoint distance by integrating sequence similarity in the score of a gene adjacency. We show that the corresponding computational problem is MAX SNP-hard and we present a 0-1 linear program for its exact solution. The result of our FF-median program is a median genome with median genes associated to extant genes, in which median adjacencies are assumed to define positional orthologs. We demonstrate through simulations and comparison with the OMA orthology database that the herein presented method is able compute accurate medians and positional orthologs for genomes comparable in size of bacterial genomes. 1 Introduction The prediction of evolutionary relationships between genomic sequences is a longstanding problem in computational biology. According to Fitch [9], two genomic sequences are called homologous if they descended from a common ancestral sequence. Furthermore, Fitch identifies different events that give rise to a branching point in the phylogeny of homologous sequences, leading to the concepts of orthologous genes (who descend from their last common ancestor through a speciation) and paralogous genes (descending from their last common ancestor through a speciation), that reach far beyond evolutionary genomics [10]. Until quite recently, orthology and paralogy relationships were mostly inferred from sequence similarity. However it is now well accepted that the syntenic context can carry valuable evolutionary information, which has lead to the notion of positional orthologs [6]. In the present work, we describe a method to compute groups of likely orthologous genes for a group of three genomes, through a new problem we introduce, the gene family-free median of three. Most methods for detecting potential orthologous groups require a prior clustering of the genes of the considered genomes into homologous gene families, defined as groups of genes assumed to originate from a single ancestral gene; clustering protein sequences into families is already in itself a difficult problem. Here, we follow the matching-based approach, framed within the gene familyfree principle, that embodies the idea to perform gene order analysis without the prerequisite of gene family or homology assignments. Instead, we are given allagainst-all gene similarities through a symmetric and reflexive similarity measure σ : Σ×Σ → R≥0 over the universe of genes Σ [4]. We use sequence similarity but other similarity measures can fit the previous definition. Gene family or homology assignments represent a particular subgroup of gene similarity functions that require transitivity. Independent of the particular similarity measure σ, relations between genes imposed by σ are considered as candidates for homology assignments. A gene family-free research program was outlined in [4] (see also [8]) and has so far been developed for the pairwise comparison of genomes [7,14,11] and shown to be effective for orthology analysis [12]. In Section 2 we introduce a new genome median problem in the family-free framework, that generalizes the traditional breakpoint median problem [19]. For a group of three genomes, the input of the family-free median problem is a tripartite similarity graph of pairwise gene similarities. Informally, a median of three is defined as both a set of median genes – each defined by three extant genes forming a clique in the similarity graph, scored according the edges of this clique –, forming a set of median adjacencies, each supported by at least one extant gene adjacency (hence any median gene belongs to at least one median adjacency). A median is optimal if it maximizes the sum of the scores of its median genes. Hence, the optimization criterion of this problem fully integrates both sequence similarity and synteny conservation. In Section 3 we study its the computational complexity and give an exact algorithm for its solution. We show that our method can be used for positional ortholog prediction in simulated and real data sets of bacterial genomes in Section 4. 2 The gene family-free median of three Extant genomes, genes and adjacencies. In this work, a genome G is entirely represented by a tuple G ≡ (C, A), where C denotes a non-empty set of unique genes, and A is a set of adjacencies. Genes are represented by their extremities, i.e., a gene g ≡ (g t , g h ), g ∈ C, consists of a head g h and a tail g t . Telomeres are modeled explicitly, as special genes of C(G) with a single extremity, denoted by “◦”. Extremities g a , ḡ b , a, b ∈ {h, t} of any two genes g, ḡ can form an adjacency. In the following, we will conveniently use the notation C(G) and A(G) to denote the set of genes and the set of adjacencies of genome G, respectively. We indicate the presence of an adjacency {xa1 , xb2 } in an extant genome X by ( 1 if {xa1 , xb2 } ∈ A(X) IX (xa1 , xb2 ) = (1) 0 otherwise. Given two genomes G and H and gene similarity measure σ, two adjacencies, {g1a , g2b } ∈ A(G) and {ha1 , hb2 } ∈ A(H) with a, b ∈ {h, t} are conserved iff σ(g1 , h1 ) > 0 and σ(g2 , h2 ) > 0. We subsequently define the adjacency score of 2 any four extremities g a , hb , ic , j d , where a, b, c, d ∈ {h, t} and g, h, i, j ∈ Σ as the geometric mean of their corresponding gene similarities: p s(g a , hb , ic , j d ) ≡ σ(g, h) · σ(i, j) (2) Median genome, genes and adjacencies. Informally, the family-free median problem asks for a fourth genome M that maximizes the sum of pairwise adjacency scores to three given extant genomes G, H, and I. In doing so, the gene content of the requested median M must first be defined: each gene m ∈ C(M ) must be unambiguously associated with a triple of extant genes (g, h, i), g ∈ C(G), h ∈ C(H), and i ∈ C(I). Moreover, we want to associate to a median gene m a sequence similarity score (g, h, i) relatively to the three extant genes it is related to. As the sequence of the median gene is obviously not available, we define this score as the geometric mean of their pairwise similarities: p σ(g, m) = σ(h, m) = σ(i, m) ≡ 3 σ(g, h) · σ(g, i) · σ(h, i) (3) g1 i (a) ? σ(g, i) σ(h, i) m ? g2 g3 G (b) H ? g σ(g, h) g4 h3 h1 h2 I h i1 i2 i3 Fig. 1. (a) Illustration of the score of a candidate median gene. (b) Gene similarity graph of three genomes G, H, and I. Colored components indicate candidate median genes m1 = (g1 , h1 , i2 ), m2 = (g2 , h2 , i1 ), m3 = (g3 , h3 , i2 ), and m4 = (g4 , h3 , i3 ). Median gene pairs m1 , m3 and m3 , m4 are conflicting. In the following we make use of mapping πG (m) ≡ g, πH (m) ≡ h, and πI (m) ≡ i to relate gene m with its extant counterparts. Two candidate median genes or telomeres m1 and m2 are conflicting if m1 6= m2 and the intersection between associated gene sets {πG (m1 ), πH (m1 ), πI (m1 )} and {πG (m2 ), πH (m2 ), πI (m2 )} is non-empty. A set of candiate median genes or telomeres C is called conflict-free if no two of its members m1 , m2 ∈ C are conflicting. This definition trivially extends to the notion of a conflict-free median. Problem 1 (FF-Median). Given three genomes G, H, and I, and gene similarity measure σ, find a conflict-free median M , which maximizes the following formula: X X s(ma1 , πX (m1 )a , mb2 , πX (m2 )b ), F (M ) = b {ma 1 ,m2 }∈A(M) X∈{G,H,I}, {πX (m1 )a ,πX (m2 )b }∈A(X) (4) where a, b ∈ {h, t} and s(·) is the adjacency score as defined by Equation (2). 3 Remark 1. The adjacency score for a median adjacency {ma1 , mb2 } with respect to the corresponding potential extant adjacency {πX (m1 )a , πX (m2 )b }, where {ma1 , mb2 } ∈ A(M ) and X ∈ {G, H, I}, can be entirely expressed in terms of pairwise similarities between genes of extant genomes using Equation (3): s(ma1 , πX (m1 )a , mb2 , πX (m2 )b ) = s 6 Y σ(πY (m1 ), πZ (m1 )) · σ(πY (m2 ), πZ (m2 )) {Y,Z}⊂{G,H,I} In the following, a median gene m and its extant counterparts (g, h, i) are treated as equivalent. We denote the set of all candidate median genes by Σ = {(g, h, i) | g ∈ C(G), h ∈ C(H), i ∈ C(I) : σ(g, h) · σ(g, i) · σ(h, i) > 0} . (5) Each pair of median genes (g1 , h1 , i1 ), (g2 , h2 , i2 ) ∈ Σ and extremities a, b ∈ {h, t} give rise to a candidate median adjacency {(g1a , ha1 , ia1 ), (g2b , hb2 , ib2 )} if (g1a , ha1 , ia1 ) 6= (g2b , hb2 , ib2 ), and (g1a , ha1 , ia1 ) and (g2b , hb2 , ib2 ) are non-conflicting. We denote the set of all candidate median adjacencies and the set of all conserved (i.e. present in at least one extant genome) candidate median adjacencies by A = {{ma1 , ma2 } | m1 , m2 ∈ P a b a b Σ , a, b ∈ {h, t}} and AC = { {m , m } ∈ A |   1 2 X∈{G,H,I} IX (πX (m1 ) , πX (m2 ) ) ≥ 1}, respectively. Remark 2. A median gene can only belong to a median adjacency with nonzero adjacency score if all pairwise similarities of its corresponding extant genes g, h, i are non-zero. Thus, the search for median genes can be limited to 3-cliques (triangles) in the tripartite similarity graph. Remark 3. The right-hand side of the above formula for the weight of an adjacency is independent of genome X. From Equation (4), an adjacency in median M has only an impact in a solution to problem FF-Median if it participates in a gene adjacency in at least one extant genome. So including in a median genome median genes that do not belong to a candidate median adjacency in AC  do not increase the objective function. Related problems. The FF-median problem relates to previously studied gene order evolution problems. It is a generalization of the tractable mixed multichromosomal median problem introduced in [19], that can indeed be defined as an FF-median problem with a similarity graph composed of disjoint 3-cliques and edges having all the same weight. The FF-median problem also bears similarity with methods aimed at detecting groups of orthologous genes based on gene order evolution, especially the MultiMSOAR [18] algorithm, although other method integrate synteny and sequence conservation for inferring orhogroups, see [6]. Our approach differs first and foremost in its family-free principle (all other methods require a prior gene family assignment). Compared to MultiMSOAR, the only other method that can handle more than two genomes with an optimization criterion that considers gene order evolution, both MultiMSOAR (for three genomes) and FF-median aim at computing a maximum weight tripartite matching. However we differ fundamentally from MultiMSOAR by the 4 full integration of sequence and synteny conservation into the objective function, while MultiMSOAR proceeds first by computing pairwise orthology assignments to define a multipartite graph. 3 Algorithmic and complexity results We now describe our theoretical results: a NP-hardness proof, an exact Integer Linear Program (ILP), and an algorithm to detect local optimal structures. Theorem 1. Problem FF-Median is MAX SNP-hard. We describe the full hardness proof in Appendix A. It is based on a reduction from the Maximum Independent Set for Graphs of Bounded Degree 3. An exact ILP algorithm to problem FF-Median. We now present program FF-Median, described by Algorithm 1, that exploits the specific properties of problem FFMedian to design an ILP using O(n5 ) variables and statements. Program FF-Median makes use of two types of binary variables a and b as declared in domain specifications (D.01) and (D.02), that defines the set of median genes Σλ and of candidate conserved median adjacencies AC  (Remark 3). The former variable type indicates the presence or absence of candidate genes in an optimal median M . The latter, variable type b, specifies if an adjacency between two gene extremities or telomeres is established in M . Constraint (C.01) ensures that M is conflict-free, by demanding that each extant gene (or telomere) can be associated with at most one median gene (or telomere). Further, constraint (C.02) dictates that a median adjacency can only be established between genes that both are part of the median. Lastly, constraint (C.03) guarantees that each gene extremity and telomere of the median participates in at most one adjacency. Property 1. The size (i.e. number of variables and statements) of any ILP returned by program FF-Median is limited by O(n5 ) where n = max(|C(G)|, |C(H)|, |C(I)|). Remark 4. The output of the algorithm FF-Median is a set of adjacencies between median genes that define a set of linear and/or circular orders, called CARs (Contiguous Ancestral Regions), where linear segments are not capped by telomeres. So formally the computed median might not be a valid genome. However, as adding adjacencies that do not belong to AC  do not modify the score of a given median, a set of median adjacencies can always be completed into a valid genome by such adjacencies that join the linear segments together and add telomeres. These extra adjacencies would not be supported by any extant genome and thus can be considered as dubious, and in our implementation, we only return the median adjacencies computed by the ILP, i.e. a subset of AC . Remark 5. Following Remark 2, preprocessing the input extant genomes requires to handle the extant genes that do not belong to at least one 3-clique in the similarity graph. Such genes can not be part of any median. So one could decide to leave them in the input, and the ILP can handle them and ensures they 5 Algorithm 1 Program FF-Median for three genomes (G, H, I) Objective: Maximize b a b b(g1a , g2b , ha 1 , h2 , i1 , i2 ) X q 6 b a b σ(g1 , h1 , i1 )σ(g2 , h2 , i2 ) (IG (g1a , g2b ) + IH (ha 1 , h2 ) + II (i1 , i2 )) (g1 ,h1 ,i1 ), (g2 ,h2 ,i2 )∈AC , a,b∈{h, t} Constraints: (C.01) X ∀ g ′ ∈ C(G): a(g, h, i) ≤ 1 (g,h,i)∈Σ , g=g ′ ∀ h′ ∈ C(H): X a(g, h, i) ≤ 1 (g,h,i)∈Σ , h=h′ ∀ i′ ∈ C(I): X a(g, h, i) ≤ 1 (g,h,i)∈Σ , i=i′ (C.02) ∀ (g1 , h1 , i1 ), (g2 , h2 , i2 ) ∈ Σ and ∀ a, b ∈ {h, t}: 2 · b(g1a , g2b , ha1 , hb2 , ia1 , ib2 ) ≤ a(g1 , h1 , i1 ) + a(g2 , h2 , i2 ) (C.03) ∀ (g1 , h1 , i1 ) ∈ Σ and ∀ a ∈ {h, t}: X b(g1a , g2b , ha1 , hb2 , ia1 , ib2 ) ≤ 1 (g2 ,h2 ,i2 )∈Σ , b∈{h, t} Domains: (D.01) ∀ (g, h, i) ∈ Σ : a(g, h, i) ∈ {0, 1} (D.02) ∀ (g1 , h1 , i1 ), (g2 , h2 , i2 ) ∈ AC  and ∀ a, b ∈ {h, t}: b(g1a , g2b , ha1 , hb2 , ia1 , ib2 ) ∈ {0, 1} are never part of the output solution. However, discarding them from the extant genomes can help recover adjacencies that have been disrupted by the insertion of a mobile element for example, so in our implementation we follow this approach. As discussed at the end of Section 2, the FF-median problem is a generalization of the mixed multichromosomal breakpoint median [19]. However, it was shown in [19] that this breakpoint median problem can be solved in polynomial time by a Maximum-Weight Matching (MWM) algorithm. This motivates the results presented in the next paragraph that use a MWM algorithm to identify optimal median substructures by focusing on conflict-free sets of median genes. Finding local optimal segments. Tannier et al. [19] solve the mixed multichromosomal breakpoint median problem by transforming it into an MWM problem, that we outline now. A graph is defined in which each extremity of a candidate median gene and each telomere gives rise to a vertex. Any two vertices are connected by an edge, weighted according to the number of observed adjacencies between the two gene extremities in extant genomes. Edges corresponding to adjacencies between a gene extremity and telomeres are weighted only by half 6 as much. An MWM in this graph induces a set of adjacencies that defines an optimal median. We first describe how this approach applies to our problem. We define a graph Γ (G, H, I, σ) constructed from an FF-Median instance (G, H, I, σ) that is similar to that of Tannier et al., only deviating by defining vertices as candidate median genes and weighting an edge between two candidate median gene extremities (or telomeres) ma1 , mb2 , a, b ∈ {h, t}, by w({ma1 , mb2 }) = s 6 Y σ(πX (m1 ), πY (m1 ))σ(πX (m2 ), πY (m2 )) {X,Y }⊂{G,H,I} · X (6) a b IX (πX (m1 ) , πX (m2 ) ). X∈{G,H,I} We make first the following observation, where a conflict-free matching is a matching that does not contain two conflicting vertices (candidate median genes): Observation 2 Any conflict-free matching in graph Γ (G, H, I, σ) of maximum weight defines an optimal median. We show now that we can define notions of sub-instances – of a full FFmedian instance – that contains no internal conflicts, for which applying the MWM can allow to detect if the set of median genes defining the sub-instance is part of at least one optimal FF-median. Let S be a set of candidate median genes. An internal conflict is a conflict between two genes from S; an external conflict is a conflict between a gene from S and a candidate median gene not in S. We say that S is contiguous in extant genome X if the set πX (S) forms a unique, contiguous, segment in X. We say that S is an internal-conflict free segment (IC-free segment) if it contains no internal conflict and is contiguous in all three extant genomes; this can be seen as the family-free equivalent of the notion of common interval in permutations [3]. An IC-free segment is framed if the extremities of the extant segments belong to the same two median genes, with conserved relative orientations (the equivalent of a conserved interval ). An IC-free segment is a run if the order of the extant genes is conserved in all three extant genomes, up to a full reversal of the segment. Intuitively, one can find an optimal solution to the sub-instance defined by an IC-free segment, but it might not be part of an optimal median for the whole instance due to side effects of the rest of the instance. So we need to adapt the graph to which we apply an MWM algorithm to account for such side effects. To do so, we define the potential of a candidate median gene m as  w({ma1 , mb }) + w({ma , mb2 }) . ∆(m) = max b b a {{ma 1 ,m },{m ,m2 }}∈A We then extend graph Γ =: (V, E) to graph Γ ′ := (V, E ′ ) by adding edges between the extremities of each candidate median gene of an IC-free segment S, 7 i.e. E ′ = E ∪ {{mh , mt } | m ∈ S}. In the following we refer to these edges as conflict edges. Let C(m) be the set of candidate median genes that are involved in an (external) conflict with a given candidate median gene m of S, then the conflict edge {mh , mt } ∈ E ′ is weighted by the maximum potential of a nonconflicting subset of C(m), X w′ ({mh , mt }) = max({ ∆(m′ ) | C ′ ⊆ C(m) : C ′ is conflict-free}) . m′ ∈C ′ A conflict-free matching in Γ ′ is a matching that does not contain a conflict edge. Lemma 1. Given an internal conflict-free segment S, any maximum weight matching in graph Γ ′ (S) that is conflict-free defines a set of median genes and adjacencies that belong to at least one optimal FF-median of the whole instance. A proof is presented in Appendix B. Lemma 1 leads to a procedure (Algorithm 2) that iteratively identifies and tests IC-free segments in the FF-Median instance. For each identified IC-free segment S an adjacency graph Γ ′ (S) is constructed and a maximum weight matching is computed (lines 2-3). If the resulting matching is conflict free (line 4), adjacencies of IC-free segment S are reported and S is removed from an FF-Median instance by masking its internal adjacencies and removing all candidate median genes (and consequently their associated candidate median adjacencies) corresponding to external conflicts (lines 5-6). It then follows immediately from Lemma 1 that the set median genes returned by Algorithm 2 belongs to at least one optimal solution to the FF-median problem. Algorithm 2 Algorithm ICF-SEG Input: FF-Median instance (G, H, I, σ) Output: Set of adjacencies AdjM that is part of a median M of (G, H, I, σ). 1: while there exists an unobserved IC-free conserved segment S in (G, H, I, σ) do 2: Construct adjacency graph Γ ′ (S) of S 3: Find maximum weight matching M ⊆ E(Γ ′ (S)) 4: if A(S) = M then 5: Add A(S) to AdjM 6: Remove S including external conflicts from (G, H, I, σ) 7: end if 8: end while 4 Experimental results and discussion Our algorithms have been implemented in Python and require CPLEX4 ; they are freely available as part of the family-free genome comparison tool FFGC downloadable at http://bibiserv.cebitec.uni-bielefeld.de/ffgc. 4 http://www.ibm.com/software/integration/optimization/cplex-optimizer/ 8 In subsequent analyses, gene similarities are based on local alignment hits identified with BLASTP [2] on protein sequences using an e-value threshold of 10−5 . In gene similarity graphs, we discard spurious edges by applying a stringency filter proposed by Lechner et al. [13] that utilizes a local threshold parameter f ∈ [0, 1] and BLAST bitscores: a BLAST hit from a gene g to h is only retained if it is has a higher or equal score than f times the best BLAST hit from h to any gene g ′ that is member of the same genome as g. In all our experiments, we set f to 0.5. Edge weights of the gene similarity graph are then calculated according to the relative reciprocal BLAST score (RRBS) [17]. Finally we applied Algorithm ICF-SEG with conserved segments defined as runs. For solving the FF-Median problem, we granted CPLEX two CPU cores, 4 GB memory, and a time limit of 3 hours per dataset. In our experiments, we compare ourselves against the orthology prediction tool MultiMSOAR [18]. This tool requires precomputed gene families, which we constructed by following the workflow described in [18]. Evaluation on simulated data. We first evaluate our algorithms on simulated data sets obtained by ALF [5]. The ALF simulator covers many aspects of genome evolution from point mutations to global modifications. The latter includes two types of genome rearrangements, as well as various options to customize the process of gene family evolution. In our simulations, we mainly use standard parameters suggested by the authors of ALF and we focus on three parameters that primarily influence the outcome of gene family-free genome analysis: (i) the rate of sequence evolution, (ii) the rate of genome rearrangements, and (iii) the rate of gene duplications and losses. We keep all three rates constant, only varying the evolutionary distance between the generated extant genomes. We confine our simulations to protein coding sequences. A comprehensive list of parameter settings used in our simulations is shown in Table 2 in Appendix C. As root genome in the simulations, we used the genomic sequence of an E. coli K-12 strain5 which comprises 4, 320 protein coding genes. We then generated 7 × 10 data sets with increasing evolutionary distance ranging from 10 to 130 percent accepted mutations (PAM). Details about the generated data sets are shown in Table 1 in Appendix C. Figure 2 (a) shows the outcome of our analysis with respect to precision and recall6 of inferring positional orthologs. In all simulations, FF-Median generated no or very few false positives, leading to perfect or near-perfect precision score, consistently outperforming MultiMSOAR. However, since the objective of FF-Median only takes median genes into account that are conserved by synteny, the increase in mutational changes over evolutionary time causes a growing loss of syntenic context which results in a lower recall. Therefore, MultiMSOAR retains a better recall for larger evolutionary distances, while FF-Median provides better results for more closely related genomes. 5 6 Accession no: NC 000913.2 precision: #true positives/(#true positives + #false positives), recall: #true positives/(#true positives + #false negatives) 9 real data: median statistics ALF simulated datasets 10 5 1 0.98 10 4 0.96 10 3 #median genes #cars #circular cars 0.94 10 2 0.92 precision FF-Median recall FF-Median precision MultiMSOAR recall MultiMSOAR 0.9 0.88 10 30 50 70 10 1 90 110 10 0 130 0 100 (a) 2500 400 OMA: MultiMSOAR 5000 agreeing compatible disagreeing 3000 300 (b) OMA: FF-Median 3500 200 combinations of 3 input genomes evolutionary distance (PAM) agreeing compatible disagreeing 4000 2000 3000 1500 2000 1000 1000 500 0 0 100 200 300 400 combinations of 3 input genomes 0 0 100 200 300 400 500 combinations of 3 input genomes (c) (d) Fig. 2. Top: (a) Precision and recall of FF-Median and MultiMSOAR in simulations; (b) statistical assessment of CARs and median genes on real datasets. Bottom: agreement, compatiblity and disagreement of positional orthologs inferred by (c) FF-Median and (d) MultiMSOAR with OMA database. Evaluation on real data. We study 15 γ-proteobacterial genomes that span a large taxonomic spectrum and are contained in the OMA database [1]. A complete list of species names is given in Appendix D. We obtained the genomic sequences from the NCBI database and constructed for each combination of three genomes a gene similarity graph following the same procedure as in the simulated dataset. In 9 out of the 455 combinations of genomes the time limit prohibited CPLEX from finding an optimal solution. However, in those cases CPLEX was still able to find integer feasible suboptimal solutions. Figure 2 (b) displays statistics of the real dataset. The number of candidate median genes and adjacencies ranges from 442 to 18, 043 and 3, 164 to 2, 261, 716, respectively, giving rise to up to 3, 227 median genes that are distributed on 5 to 91 CARs per median. Some CARs are circular, indicating dubious conformations mostly arising from tandem duplications, but the number of such cases were low (mean: 2.78, max: 13). 10 We observed that the gene families in the OMA database are clustered tightly and therefore missing many true orthologies in the considered triples of genomes. As a result, many of the orthologous groups inferred by FF-Median and MultiMSOAR fall into more than one gene family inferred by OMA. We therefore evaluate our results by classifying the inferred orthologous groups into three categories: An orthologous group agrees with OMA if its three genes are in the same OMA group. It disagrees with OMA if extant genes x and y (of genomes X and Y respectively) are in different OMA groups but the OMA group of x contains another gene from genome Y . It is compatible with OMA if it neither agrees nor disagrees with OMA. We measure the number of median genes as well as the number orthologous groups of MultiMSOAR in each of the three categories. Figure 2 (c) and (d) show the outcome this analysis. MultiMSOAR is generally able to find more orthology relations in the dataset. This comes at no surprise, as it is clear from the objective of problem FF-Median and from the results of the simulated datasets that our method does not retain candidate median genes which have lost their syntenic context, which happens in triples of highly divergent genomes. The number of disagreeing orthologous groups that disagree with OMA is comparably low for both FF-Median (mean: 35.16, var: 348) and MultiMSOAR (mean: 48.61, var: 348). We then performed another analysis to assess the robustness of the positional orthology predictions. To this end, we look at orthologous groups across multiple datasets that share two extant genomes, but vary in the third. Given two genes, x of genome X and y of genome Y , an orthologous group that contains x and y is called robust if x and y occur in the same orthologous group, whatever the third extant genome is. We computed the percentage of robust orthologous groups for all gene pairs of genomes E. coli K-12 MG 1655 and S. enterica subsp. enterica serovar Typhimurium str. 14028s in our dataset. The results indicate that orthologous groups inferred by FF-Median are slightly more robust (95.61%) than robust those by MultiMSOAR (91.77%). This is likely due to the strict constraint of defining median adjacencies only from genes that participate in at least one observed adjacency (Remark 4). Overall, we can observe that FF-Median performed better than MultiMSOAR only for triples of closely related genomes – which is consistent with our observation on simulated data – while being slightly more robust in general. This suggests FF-Median is an interesting alternative to identify higher confidence positional orthologs, at the expense of a higher recall rate. Future work. We first aim to investigate alternative methods to reduce the computational load of Program FF-Median by identifying further strictly suboptimal and optimal substructures, which might require to understand better the impact of internal conflicts within substructures defined by intervals in the extant genomes. Without the need to modify drastically either the FF-median problem definition or the ILP, one can think about more complex weighting schemes for adjacencies that could account for known divergence time between genomes or relaxed notion of adjacencies that would address the high recal rate we observe in FF-Median. Within that regard, it would probably be interesting to combine this with the use of common intervals instead of runs to define 11 conflict-free sub-instances. Finally, ideal family-free analysis should take into account the effects of gene family evolution. However, the presented family-free median model can only resolve certain cases of gene duplication. It is generally susceptible to gene losses that occurred along the evolutionary paths between the three extant genomes and their common ancestor. The definition of a familyfree median model that tolerates events of gene family evolution at a reasonable computational cost is likely an interesting research avenue. References 1. A M Altenhoff, N Skunca, N Glover, C-M Train, A Sueki, I Pilizota, K Gori, B Tomiczek, S Müller, H Redestig, G H Gonnet, and C Dessimoz. The OMA orthology database in 2015: function predictions, better plant support, synteny view and other improvements. Nucleic Acids Res., 43(Database-Issue):240–249, 2015. 2. S F Altschul, W Gish, W Miller, E W Myers, and D J Lipman. Basic local alignment search tool. J. Mol. Biol, 215(3):403–410, 1990. 3. A Bergeron, C Chauve, and Y Gingras. Formal models of gene clusters. In Bioinformatics algorithms: techniques and applications, pages 177–202. Wiley, 2008. 4. M D V Braga, C Chauve, D Doerr, K Jahn, J Stoye, A Thévenin, and R Wittler. The potential of family-free genome comparison. In Models and Algorithms for Genome Evolution, pages 287–323. Springer London, 2013. 5. D A Dalquen, M Anisimova, G H Gonnet, and C Dessimoz. Alf – a simulation framework for genome evolution. Mol. Biol. Evol., 29(4):1115–1123, 2012. 6. C N Dewey. Positional orthology: Putting genomic evolutionary relationships into context. Brief. Bioinformatics, 12(5):401–412, 2011. 7. D Doerr, A Thévenin, and J Stoye. Gene family assignment-free comparative genomics. BMC Bioinformatics, 13(Suppl 19):S3, 2012. 8. D Dörr. Gene family-free genome comparison. PhD thesis, Universität Bielefeld, Bielefeld, Germany, 2016. 9. W M Fitch. Homology a personal view on some of the problems. Trends Genet., 16:227–231, 2000. 10. T Gabaldón and E V Koonin. Functional and evolutionary implications of gene orthology. Nat. Rev. Genet., 14:360–366, 2013. 11. L A B Kowada, D Doerr, S Dantas, and J Stoye. New genome similarity measures based on conserved gene adjacencies. In Proc. of RECOMB 2016, pages 204–224, 2016. 12. M Lechner, M Hernandez-Rosales, D Doerr, N Wieseke, A Thévenin, J Stoye, R K Hartmann, S J Prohaska, and P F Stadler. Orthology detection combining clustering and synteny for very large datasets. PLoS ONE, 9(8):e105015, 2014. 13. Marcus Lechner, Sven Findeiß, Lydia Steiner, Manja Marz, Peter F Stadler, and Sonja J Prohaska. Proteinortho: Detection of (co-)orthologs in large-scale analysis. BMC Bioinformatics, 12:124, 2011. 14. F V Martinez, P Feijão, M D V Braga, and J Stoye. On the family-free DCJ distance and similarity. Algorithms Mol. Biol., 10:13, 2015. 15. J Misra and D Gries. A constructive proof of Vizing’s theorem. Inform. Process. Lett., 41(3):131–133, 1992. 16. C H Papadimitriou and M Yannakakis. Optimization, approximation, and complexity classes. J. Comp. Sys. Sci., 43(3):425–440, 1991. 12 17. C Pesquita, D Faria, H Bastos, A E N Ferreira, A O Falcão, and F M Couto. Metrics for GO based protein semantic similarity: a systematic evaluation. BMC Bioinformatics, 9(Suppl 5):S4, 2008. 18. G Shi, M-C Peng, and Jiang T. Multimsoar 2.0: An accurate tool to identify ortholog groups among multiple genomes. PLoS ONE, 6(6):e20892, 2011. 19. E Tannier, C Zheng, and D Sankoff. Multichromosomal median and halving problems under different genomic distances. BMC Bioinformatics, 10:120, 2009. 20. V G Vizing. On an estimate of the chromatic class of a p-graph. Diskret. Analiz No., 3:25–30, 1964. 13 A A.1 Hardness proof Reduction The maximum independent set problem for graphs bounded by node degree 3, denoted as MAX IS-3 is MAX SNP-hard [16]. The corresponding decision problem can be informally stated as follows: Given a graph Λ bounded by degree 3 and some number l ≥ 1, does there exists a set of vertices V ′ ⊆ V of size |V ′ | = l whose induced subgraph is unconnected? In the following, we present a transformation scheme R to phrase Λ as FF-median instance R(Λ) = (G, H, I, σ) such that the value F (M ) of a median M of R(Λ) is limited by F (M ) ≤ 2 · l + 3. In doing so, we associate vertices of V with genes of extant genomes G, H and I. In order to keep track of associated genes, we denote by function ξ(x) the list of vertices associated with gene x. We further introduce two types of unassociated genes, “∅” and “∗”, whose members are identified by subscript notation. Transformation R: 1. Construct genome G such that for each vertex v ∈ V there exists two associated genes gv , ḡv ∈ C(G), i.e. ξ(gv ) = ξ(ḡv ) = v. Further, let each gene pair gv , ḡv form a circular chromosome, giving rise to adjacency set A(G) = {{ḡvh, gvt }, {ḡvh , gvt } | v ∈ V, gv , ḡv ∈ C(G)}. 2. For each edge (u, v) ∈ E construct a circular chromosome Xuv hosting two genes xuv , x∅ ∈ C(Xuv ), with gene xuv being associated with both vertices u and v and gene x∅ being unassociated. Further, let both genes form a circular chromosome, giving rise to adjacency set A(Xuv ) = {{xhuv , xt∅ }, {xh∅ , xtuv }}. 3. Assign each chromosome constructed in the previous step either to genome H or to genome I such that each vertex v ∈ V is associated with at most two genes per genome. 4. Complete genomes H and I with additional circular chromosomes Xv where C(Xv ) = {xv , x∅ } and A(Xv ) = {{xhv , xt∅ }, {xh∅ , xtv }} such that each vertex in V is associated with exactly two genes per genome. 5. For each vertex v ∈ V , let g, ḡ ∈ C(G), h, h̄ ∈ C(H), and i, ī ∈ C(I) be the pairs of genes associated with v, i.e. ξ(g) = ξ(ḡ) = ξ(h) ∩ ξ(i) = ξ(h̄) ∩ ξ(ī) = v. Assign gene similarities σ(g, h) = σ(g, i) = σ(h, i) = 1 and σ(ḡ, h̄) = σ(ḡ, ī) = σ(h̄, ī) = 1. 6. Add a copy of circular chromosome X∗ to each genome G, H, and I, where C(X∗ ) = {x∗ , x̄∗ } and A(X∗ ) = {{xh∗ , x̄t∗ }, {x̄h∗ , xt∗ }}. Let g∗ , ḡ∗ ∈ C(G), h∗ , h̄∗ ∈ C(H), and i∗ , ī∗ ∈ C(I), set the gene similarity score between all pairs of genes in {g∗ , h∗ , i∗ } and {ḡ∗ , h̄∗ , ī∗ } respectively, to 1. Lastly, set the gene similarity score of all pairs of unassociated genes of type “∅” including genes g∗ , ḡ∗ to 14 . Except for step 3, none of the instructions of transformation scheme R are computationally challenging. Note that in step 3 the demanded partitioning of chromosomes into genomes H and I is always possible as consequence of Vizing’s Theorem [20], by which every graph with maximum node degree d is 14 a b c d ∗ ā b̄ c̄ d̄ ∗ ab ād cd̄ b̄ c̄ ∗ ∅ ∅ ∅ ∅ ∅ ∗ bd b̄c a ā c̄ d̄ ∗ ∅ ∅ ∅ ∅ ∅ ∅ ∗ G a b H I c d (a) (b) Fig. 3. (a) A simple graph bounded by degree three and (b) a corresponding FF-Median instance constructed with transformation scheme R. edge-colorable using at most d or d + 1 colors. Hence, using colors χ1 , χ2 , χ3 , χ4 with χ1 = χ2 ≡ I, χ3 = χ4 ≡ H and Misra and Gries’ algorithm [15], edges of graph Λ = (E, V ) can be partitioned into two groups in O(|E||V |) time implying an assignment to genomes H and I. Example 1. Figure 3 (b) shows a FF-Median instance constructed with transformation scheme R from the simple graph depicted in Figure 3 (a). Gene similarities between genes are not shown, but can be derived from the genes’ labeling. We structure our proof that the presented transformation is in fact a valid mapping of an MAX IS-3 instance to an instance of FF-Median into three different lemmas: Lemma 2. Given a median M of FF-Median instance R(Λ) = (G, H, I, σ), (1) for each median gene (g, h, i) ∈ C(M ) where g, h, or i are associated with vertices in V (Λ) holds ξ(g) = ξ(h) ∩ ξ(i) = v, v ∈ V (Λ); (2) there exist at most two median genes whose corresponding extant genes are not associated to any vertex in V (Λ). Proof. Assume for contradiction that claim (1) does not hold. Then either ξ(g) 6= ξ(h) ∩ ξ(i), or ξ(h) ∩ ξ(i) = ∅, both of which violate the constraint of establishing gene similarities between associated genes that is given in step 5. For claim (2), observe that the only unassociated genes in genome G are gene g∗ and ḡ∗ introduced in step 6, limiting the overall number of unassociated genes in any median M . ⊓ ⊔ Lemma 3. The conserved adjacency set of any median M of FF-Median int h t G h stance R(Λ) = (G, H, I, σ) is of the form A(M )∩AC  = A (M )∪{{m∗ , m∗ }, {m∗ , m∗ }}, where the extant genes corresponding  h t to mC∗ and m∗ are all unassociated genes of type “∗” and A(M )G ⊆ {m1 , m2 } ∈ A | ξ(πG (m1 )) = ξ(πG (m2 )) .  15 Proof. Observe that both candidate median adjacencies a∗ = {mh∗ , mt∗ } and ā∗ = {mh∗ , mt∗ } are conserved in all three genomes, whereas all other conserved candidate adjacencies between associated and unassociated genes can be at most conserved in H and I. Establishing adjacencies a∗ , ā∗ gives rise to a cumulative adjacency score of 6. Conversely, up to 4 non-conflicting adjacencies between associated and unassociated genes can be established that are conserved in both genomes H and I. However, since such adjacencies are only conserved between unassociated genes of type “∅” whose gene similarities are set to 41 , the best cumulative adjacency score can not exceed 4. Thus, adjacencies a∗ , ā∗ must be contained in any median. Further, because of this and the fact that in both genomes H and I, each gene associated with vertices of V (Λ) is only adjacent to an unassociated gene, M cannot contain adjacencies that are conserved in extant genomes other than genome G, which are the adjacencies of each gene pair (gv , ḡv ) associated with the same vertex v ∈ V (Λ). ⊓ ⊔ Lemma 4. Given FF-median instance R(Λ) = (G, H, I, σ), let mu , mv be any pair of candidate median adjacencies of A whose corresponding extant genes are associated to vertices u, v ∈ V (Λ), then mu , mv are conflicting if and only if (u, v) ∈ E. Proof. By construction in step 5 of transformation scheme R, each vertex v ∈ V is associated with exactly two candidate median genes mv = (g, h, i), mv = (ḡ, h̄, ī), mv , mv ∈ Σ , such that ξ(g) = ξ(h)∩ξ(i) = v and ξ(ḡ) = ξ(h̄)∩ξ(ī) = v. Further, let u be another vertex of V (Λ), such that (u, v) ∈ E(Λ), and mu , mu are its two corresponding candidate median genes. Then, by construction in step 2, there exists exactly one extant gene x with ξ(x) = uv (which, by assignment in step 3, is either contained in genome H or I). Consequently, either mu is in conflict with mv , or mu with mv , or mu with mv , or mu with mv . Recall that by construction in step 2 in R and by Lemma 3, mu , mu and mv , mv form conserved candidate adjacencies {mhu , mtu }, {mhu , mtu } and {mhv , mtv }, {mhv , mtv }, respectively. Clearly, independent of which of the candidate median gene pairs of u and v are in conflict, both pairs of candidate median adjacencies are in conflict with each other. Now, let u, v be two vertices of V (Λ) such that edge (u, v) 6∈ E(Λ), then there exists no gene x in extant genomes H and I with ξ(x) = uv. Even more, due to Lemma 2, there cannot exist a candidate median gene (g, h, i) with {u, v} ⊆ ξ(g)∪ξ(h)∪ξ(i). Thus, the candidate median genes of u and v are not conflicting and neither are their corresponding candidate median adjacencies. ⊓ ⊔ We proceed to show that the given transformation scheme gives rise to an approximation preserving reduction known as L-reduction. An L-reduction reduces a problem P to a problem Q by means of two polynomial-time computable transformation functions: A function f : P → Q′ ⊆ Q that maps each instance of P onto an instance of Q, herein represented by transformation scheme R, and a function g : Q′ → P to transform any feasible solution of an instance in Q′ to a feasible solution of an instance of P . Here, a feasible solution means any – not necessarily optimal – solution that obeys the problem’s constraints. A feasible solution of FF-Median instance (G, H, I, σ) is an ancestral genome X where 16 C(X) ⊆ Σ and A(X) ⊆ A such that A(X) is conflict-free. We give the following transformation scheme to map ancestral genomes of an FF-Median instance to solutions of an MAX IS-3 instance: Transformation S: Given any ancestral genome X of R(Λ), return {ξ(πG (m1 )) | {ma1 , mb2 } ∈ A(X) : IG (πG (m1 )a , πG (m2 )b ) = 1 and ξ(πG (m1 )) 6= ∅}. We define score function s (X) ≡ 12 F (X) − 3 of an ancestral genome X. For (R, S) to be an L-reduction the following two properties must hold for any given MAX IS-3 instance (Λ, l): (1) There is some constant α such that for any median M of the transformed FF-Median instance R(Λ) holds s (M ) ≤ α·l; (2) There is some constant β such that for any ancestral genome X of R(Λ) holds l−|S(X)| ≤ β · |s (M ) − s (X)|. We proceed to proof the following lemma: Lemma 5. (R, S) is an L-reduction of problem MAX IS-3 to problem FF-Median with α = β = 1. Proof. For any median M of FF-Median instance R(Λ), the number of conserved median adjacencies with correspondence to the same vertex of Λ is two, giving rise a cumulative adjacency score of two. From Lemmata 3 and 4 immediately follows that any ancestral genome of R(Λ) that maximizes the number of conserved adjacencies also maximizes the number of independent vertices in Λ. Recall that the two conserved adjacencies between unassociated genes of type “∗” (which are part of all medians) give rise to a cumulative adjacency score of 1 6, we conclude that |A(M ) ∩ AC  | − 2 = 2 F (M ) − 3 = s (M ) = l, thus α = 1. Because l = sλ (M ), it remains to show that l−|S(X)| ≤ β|l−s (X)|. In a suboptimal ancestral genome of R(Λ), median genes with no association to vertices of Λ can also contain extant genes of type “∅”. These unassociated median genes can form “mixed” conserved adjacencies with genes that are associated with vertices of Λ. Such mixed conserved adjacencies have no correspondence to vertices in Λ and do not contribute to the transformed solution S(X) of an ancestral genome X. Yet, as mentioned earlier, the cumulative adjacency score of all mixed conserved adjacencies can not not exceed 4. Therefore it holds that |S(X)| ≥ s (X) and we conclude β = 1. ⊓ ⊔ B Speeding up the search for a median Proof of Lemma 1: Proof. Given an IC-free segment S = {m1 , . . . , mk } of an FF-Median instance (G, H, I, σ). Let M be a conflict-free matching in graph Γ ′ (S). Because M is conflict-free and S contiguous in all three extant genomes, M must contain all candidate median genes of S. Now, let M be a median such that S 6⊆ C(M ′ ). Further, let C(m) be the set of candidate median genes that are S involved in a conflict with with a given median gene m of S and X = C(M ′ )∩( m∈S C(m)∪S). Clearly, X 6= ∅ and for the contribution F (X) must hold F (X) ≥ F (S), 17 otherwise M ′ is not optimal since it is straightforward to construct a median higher score which P includes S. Clearly, the contribution F (X) to the median is bounded by max({ m′ ∈C ′ ∆(m′ ) | C ′ ⊆ C(m) : C ′ is conflict-free}) + F (S). But since S gives rise to a conflict-free matching with maximum score, also median M ′′ with C(M ′′ ) = (C(M ′ ) \ X) ∪ C(S) and A(M ′′ ) = (A(M ′ ) \ A(X)) ∪ A(S)) must be an (optimal) median. ⊓ ⊔ C Simulated sequence evolution with ALF PAM Genome Inversions Transpositions Duplications Losses 10 G H I 8.7 7.3 8.5 6.1 4.5 6.6 7.3 6.3 10.4 6.9 5.4 5.6 30 G H I 24.5 23.4 25.5 16.9 19.8 17.2 21.0 20.6 17.5 22.7 18.4 20.9 50 G H I 39.9 41.8 43.2 27.8 31.8 30.0 32.4 31.0 28.7 36.7 31.7 39.7 70 G H I 58.6 57.0 60.4 42.3 43.6 41.4 41.1 46.3 40.7 39.2 45.1 39.1 90 G H I 75.0 69.9 75.2 54.5 50.5 55.5 53.1 54.1 60.3 64.2 65.0 58.5 110 G H I 96.3 90.6 90.2 69.4 64.2 68.5 67.0 62.5 62.6 74.6 70.9 61.2 130 G H I 105.7 108.7 110.8 76.3 78.2 73.6 74.4 79.6 73.9 81.0 82.8 77.3 Table 1. Average benchmark data of seven evolutionary distances, each comprising ten genomic datasets generated by ALF [5]. 18 Parameter name Value sequence evolution substitution model WAG (amino acid substitution model) insertion and deletion Zipfian distribution insertion rate maximum insertion length rate variation among sites Γ -distribution number of classes rate of invariable sites exponent c = 1.8214 0.0003 50 shape parameter a = 1 5 0.01 genome rearrangement inversion rate maximum inversion length transposition rate maximum transposition length rate of inverted transposition 0.0004 100 0.0002 100 0.1 gene family evolution gene duplication rate max. no. of genes involved in one dupl. probability of transposition after dupl. fission/fusion after duplication probability of rate change rate change factor probability of temporary rate change (duplicate) temporary rate change factor (duplicate) life of rate change (duplicate) probability of temporary rate change (orig+duplicate) temporary rate change factor (orig+duplicate) life of rate change (orig+duplicate) gene loss rate maximum length of gene loss gene fission/fusion rate maximum number of fused genes 0.0001 5 0.5 0.1 0.2 0.9 0.5 1.5 10 PAM 0.3 1.2 10 PAM 0.0001 5 0.0 − Table 2. Parameter settings for simulations generated by ALF [5]. D Real genomes dataset 19 Genbank ID Name U00096.3 AE004439.1 AE016853.1 AM039952.1 CP000266.1 CP000305.1 CP000569.1 CP000744.1 CP000766.3 CP000950.1 CP001120.1 CP001172.1 CP001363.1 FM180568.1 CP002086.1 Escherichia coli str. K-12 substr. MG1655, complete genome Pasteurella multocida subsp. multocida str. Pm70, complete genome Pseudomonas syringae pv. tomato str. DC3000, complete genome Xanthomonas campestris pv. vesicatoria complete genome Shigella flexneri 5 str. 8401, complete genome Yersinia pestis Nepal516, complete genome Actinobacillus pleuropneumoniae L20 serotype 5b complete genome Pseudomonas aeruginosa PA7, complete genome Rickettsia rickettsii str. Iowa, complete genome Yersinia pseudotuberculosis YPIII, complete genome Salmonella enterica subsp. enterica serovar Heidelberg str. SL476, complete genome Acinetobacter baumannii AB307-0294, complete genome Salmonella enterica subsp. enterica serovar Typhimurium str. 14028S, complete genome Escherichia coli 0127:H6 E2348/69 complete genome, strain E2348/69 Nitrosococcus watsoni C-113, complete genome Table 3. Dataset of genomes used in comparison with the OMA database. 20
8cs.DS
arXiv:1707.05163v2 [physics.ao-ph] 26 Sep 2017 Parcels v0.9: prototyping a Lagrangian Ocean Analysis framework for the petascale age Michael Lange1 and Erik van Sebille2,3 1 Grantham Institute & Department of Earth Science and Engineering, Imperial College London, UK Institute for Marine and Atmospheric research Utrecht, Utrecht University, Utrecht, Netherlands 3 Grantham Institute & Department of Physics, Imperial College London, UK 2 Correspondence to: Erik van Sebille ([email protected]) Abstract. As Ocean General Circulation Models (OGCMs) move into the petascale age, where the output of single simulations exceeds petabytes of storage space, tools to analyse the output of these models will need to scale up too. Lagrangian Ocean Analysis, where virtual particles are tracked through hydrodynamic fields, is an increasingly popular way to analyse OGCM output, by mapping pathways and connectivity of biotic and abiotic particulates. However, the current software stack of Lagrangian Ocean Analysis codes is not dynamic enough to cope with the increasing complexity, scale and need for customisation of use-cases. Furthermore, most community codes are developed for stand-alone use, making it a nontrivial task to integrate virtual particles at runtime of the OGCM. Here, we introduce the new Parcels code, which was designed from the ground up to be sufficiently scalable to cope with petascale computing. We highlight its API design that combines flexibility and customisation with the ability to optimise for HPC workflows, following the paradigm of domain-specific languages. Parcels is primarily written in Python, utilising the wide range of tools available in the scientific Python ecosystem, while generating low-level C-code and using Just-In-Time compilation for performance-critical computation. We show a worked-out example of its API, and validate the accuracy of the code against seven idealised test cases. This version 0.9 of Parcels is focussed on laying out the API, with future work concentrating on support for curvilinear grids, optimisation, efficiency and at-runtime coupling with OGCMs. 1 Introduction Lagrangian Ocean Analysis, where virtual particles are tracked within the flow field of hydrodynamic models, has over the last two decades increasingly been used by physical oceanographers and marine biologists alike (Van Sebille et al., submitted).The particles can represent passive parcels of seawater (e.g. Döös, 1995; Blanke and Raynaud, 1997) or its constituent tracers such as nutrients (e.g. Jönsson et al., 2011; Qin et al., 2016), as well as particulate matter such as microbes (e.g. Hellweger et al., 2014; Doblin and van Sebille, 2016), larvae (e.g. Cowen et al., 2006; Paris et al., 2005; Teske et al., 2015; Cetina-Heredia et al., 2015), pumice (e.g. Jutzeler et al., 2014), plastic litter (e.g. Lebreton et al., 2012), or icebergs (e.g. Marsh et al., 2015). The trajectories of the virtual particles can be used to analyse the flow within Ocean General Circulation Models (OGCMs) and other velocity fields for dispersion characteristics (e.g. Beron-Vera and LaCasce, 2016), Lagrangian Coherent Structures (e.g. Haller, 2015), water mass pathways and transit times (e.g. Rühs et al., 2013), Lagrangian streamfunctions (e.g. Döös et al., 1 2008) and biological connectivity between regions (e.g. Kool et al., 2013). See Van Sebille et al. (submitted) for an extensive review on Lagrangian Ocean Analysis. There are currently three main community codes available to calculate the trajectories of virtual particles in Ocean General Circulation Models: Ariane (Blanke and Raynaud, 1997), TRACMASS (Döös et al., 2013; Döös et al., 2017), and the Connectivity Modeling System (CMS, Paris et al., 2013). These codes, being open-source and having excellent support teams, have served the wider community very well over the past decades. However, it is not clear that these three codes will be able to scale up easily to the petascale age of computing, where particle trajectory codes will need to be able to deal with potentially petabytes of hydrodynamic field data and gigabytes of particle trajectory data. Exploring advanced optimization strategies to overcome these big-data challenges, such as coupled (online) execution with the host OGCM or reducing the volume of hydrodynamic data by selectively filtering data regions based on particle locations, will require a flexible execution model that can dynamically be adapted to complement the respective data and execution formats of various host OGCMs. Furthermore, the current stack of codes is mostly built for the tracking of water parcels or passive particulates. While the CMS and TRACMASS do support the addition of diffusive processes through Markovian stochastic models (e.g. Griffa, 1996), it is non-trivial to incorporate ‘behaviour’ of particulates to these codes. Effortless incorporation of behaviour such as sinking, fragmentation, or even swimming to particulates would simplify exploration of the dynamics of particulates such as fish, icebergs and marine debris. Here, we describe a novel framework for computing Lagrangian particle trajectories, named Parcels (‘Probably A Really Computationally Efficient Lagrangian Simulator’). Being developed from the ground up with scalability and performance in mind, we hope that this Parcels framework will be able to keep up with OGCM development for the coming decades, particularly by being scalable and efficient at reading in hydrodynamic data. We have furthermore focussed on flexibility and customisability of the particle dispersion schemes, so that it is relatively straightforward to add new functionality such as active particle behaviours. We have decided to brand this version of Parcels as v0.9, signalling that while in principle it is feature-complete, the code is not nearly as fast and efficient as we envision it to be in the future. Improving performance will be the main priority as we work towards v1.0. We invite all interested researchers to contribute to the development by starting to use the code. While development efforts of Parcels focus on oceanographic applications, the Parcels framework should in principle also be adaptable to atmospheric particle tracking simulations. Models such as FLEXPART (Stohl and James, 2005) and the MetOffice NAME model (Jones et al., 2007) are state-of-the-art and have an excellent track-record in the field of atmospheric dispersion modelling, but perhaps some of the ideas presented here could be incorporated or used in these models too. This paper is structured as follows: in the next section, we will describe the philosophy behind the Parcels code. We then present a worked-out example of an application of Parcels for an actual scientific experiment in Sect. 3. Following that, we evaluate the accuracy of the code in Sect. 4, by comparison to analytical solutions in idealised test. We provide a future outlook in Sect. 5, before concluding in Sect. 6. 2 2 Prototype design and philosophy A key contribution of the new Parcels v0.9 framework is to define a set of interfaces and composable abstractions that encapsulate the various processes required to create dynamic and extensible Lagrangian models that feature direct interactions between particles and an associated OGCM grid. The design follows modern scientific software engineering practices, providing high levels of modularity and flexibility with a clear intent to further specialize various sub-components at a later stage. The interfaces provided in Parcels are therefore intended to capture the general domain-specific challenges posed by particle tracking for Lagrangian Ocean Analysis. The overall design philosophy, as well as the structure of the code, are driven by three major design considerations: – Extensibility – While the core algorithm of Lagrangian particle models is concerned with the advection and dispersion of passive particles that constitute infinitely small point parcels, practical oceanographic applications often require more complex behaviour of the particles. Potential extensions towards individual-based modelling of particulates to simulate biological species or marine debris will require extensions to particle data definitions and programmable behavioural customisation at a per-particle level. – Compatibility – Particle tracking in oceanography requires the close coupling of computational particles to velocity data that defines the hydrodynamic flow field. Parcels aims to make as little assumptions about the nature and structure of the hydrodynamic fields as possible, so as to be compatible with various types of OGCMs and data formats. While the focus in this v0.9 is on utilising offline data, this includes considerations for at-runtime coupling with OGCMs in the future. – Dynamic data – Particle data is sparse in nature and can, depending on application context, exhibit very dynamic data access patterns where new particles are inserted and deleted from the active set at runtime. For this reason, structured compile-time performance optimisations and parallelisation strategies are insufficient, and Just-In-Time scheduling is required to handle the amorphous data parallelism inherent in dynamic particle applications (Pingali et al., 2011). The above list of requirements suggests that a static compile-time approach is likely to provide insufficient flexibility to adjust to the various scientific contexts in which oceanographic particle tracking might be utilised. For this reason Parcels is based on the domain-specific languages paradigm, which aims to decouple the problem definition as defined by the scientific modeller from the implementation that is ultimately executed on a particular hardware architecture. This approach is based on automated code generation at runtime and creates a separation of concerns between domain scientists and computational experts that allows hardware-specific performance optimisation and thus greater flexibility with respect to advances in highperformance computing resources. Since the prototype of the Parcels framework presented here provides a conceptual blueprint for future versions, we define a clear set of abstractions for the following three software layers: – User-facing API – The primary objective of Parcels is to provide a user-friendly, clear and concise API for scientists to perform oceanographic particle tracking experiments with very little effort, while leaving room for customisations that 3 go beyond traditional configuration files. For this reason Parcels provides a high-level Python API that enables users to define a complete model in a small number of lines of code (see examples in Sect. 3). For more advanced models, the API also provides enough scope to fully control the variable layout of particles in memory, as well as to define custom behaviour via individual kernel operations. – Execution layer – The transient nature of Lagrangian particles implies that many practical oceanographic applications rely on particle sets that may grow and shrink dynamically, while also relying on external hydrodynamic field data that might be sampled at a timestep much different from the primary particle loop. This complex parameter variability entails that the core loop that updates individual particle states needs to be highly dynamic and flexible, as well as highly optimised for large-scale applications. Parcels aims to encapsulate the core parameters of the particle update loop so as to establish an interface for integration with a variety of external host OGCMs, and leaves enough scope for more advanced performance optimisations in the future. – Data layout – The two fundamental types of data involved in Lagrangian particle tracking algorithms constitute field data provided by the external OGCM, as well as data on the particle state. Since the data layout for particle data might change with future performance optimisations, and the memory layout of field data depends on the OGCM implementation, Parcels provides high-level abstractions for both types of data, allowing the actual data layout in memory to change. The abstractions shown in Fig. 1 comprise the core functionalities provided by the framework. The primary input in the user layer consists of generic definitions of the particle variables for individual types of particles, alongside an interface to define the computation kernels. Parcels’ core execution loop uses this information to update particle data given external parameters, such as timestepping constraints, and interpolated hydrodynamic field data. Thus, given a stable user-level API and a highly modular code structure, it is possible to implement various applications and experiments without commiting to a particular implementation, while leaving enough scope for further development and future performance optimisation ‘under the hood’. 2.1 Programmable user interface The prototype presented in this paper provides a highly flexible user API that allows users to define complete models via the Python programming language. The user hereby manages creation, execution and customisation of individual sets of particles, as well as combinations of computational kernels to update the particle state. In contrast to traditional configuration files, this approach provides the user with native compatability with the open-source libraries and tools available in the scientific Python ecosystem. The key components of Parcels’ overall class structure are depicted in Fig. 2. The definition of the variables that constitute a single particle is hereby encapsulated in the Particle class, while container objects of type ParticleSet provide the runtime handling and management of particle data. Python descriptor objects are used to generically define the compound data type underlying each type of particle, leaving allocation and memory layout choices to the particular implementation of the data container structure. 4 The computational behaviour of particles is encapsulated through the Kernel. Parcels provides a set of pre-defined advection methods, as well as allowing users to define custom behaviour programmatically. Multiple kernels can be concatenated, allowing users to incrementally build complex behaviour from individual components. 2.1.1 Advection algorithm At its core, computing Lagrangian particle trajectories is equivalent to solving the following equation: t+∆t Z v(x, τ ) dτ + ∆X b (t), X(t + ∆t) = X(t) + (1) t where X is the three-dimensional position of a particle, v(x, t) is the three-dimensional velocity field at that location from an OGCM, and ∆X b (t) is a change in position due to ‘behaviour’. The latter can itself be an integration of a (three-dimensional) velocity field, for example when a particle sinks downward because of a negative buoyancy force. In Parcels, the trajectory equation (1) is by default time-stepped using a 4th order Runge-Kutta scheme, although schemes for Euler-Forward and adaptive Runge-Kutta-Fehlberg integration (RKF45, e.g. Alexander, 1990) are also provided. In principle, the Parcels framework should be flexible enough to also implement integration using the discrete analytical streamtube method (Blanke and Raynaud, 1997; Döös et al., 2017). 2.1.2 Custom kernels Lagrangian particle tracking in the ocean often involves more complex displacement schemes than simple velocity-driven advection. For example, in the presence of turbulence, a Random Walk kernel or Brownian motion is required, while ocean ecology models often include active locomotion. Parcels therefore allows users to create generic kernel functions by providing native Python functions that adhere to the function signature KernelName(particle, fieldset, time, dt). Within these kernel functions, users can access built-in particle state variables, such as particle.lat and particle.lon, or user-defined ones. Access to field data from within kernels is provided through the fieldset object, which provides fields as named properties, for example fieldset.U for the zonal velocity. Interpolation of field data is implemented via overloaded member access on the field object (square bracket notation), allowing user to express field sampling as fieldset.fieldname[time, lon, lat, depth]. In addition to kernels that update the internal state of particles, Parcels’ execution engine also enables users to customize the behaviour of particles under various error conditions. For this, a similar type of kernel function can be created and passed to the execution call, mapped to a particular error type that might be triggered during the main particle update, for example OutOfBoundsError. 5 2.2 Execution and JIT compilation The update of the internal state of particles is facilitated by a dynamic loop, which applies a user-defined combination of kernels to each particle in a ParticleSet. The primary particle update loop can either be run with a forward timestepping, or in a time-backward mode to enable inverse modelling. For this central update loop, Parcels provides two modes of execution: – Scipy mode: A pure Python mode that utilises interpolator objects provided by the Scientific Python package (SciPy) to perform interpolation of field data. This mode is primarily intended as a debug option due to the performance penalty of running kernels in the Python interpreter itself. – JIT mode: Runtime code generation and Just-In-Time compilation (JIT) are utilised to generate low-level C code that performs the particle state update and field data interpolation. The code generation engine hereby primarily translates a restricted subset of the Python language into equivalent C code, while a set of utility modules provides auxiliary functionality such as random number generation or mathematical utilities (math.h). The execution mode of the particle update loop is determined by the type of the particle (ScipyParticle or JITParticle) used to create the ParticleSet. Development of new features in the current Parcels prototype is strongly driven by the fact that both modes are intended to be semantically equivalent. This means that new features can rapidly be developed using the full flexibility of the Python interpreter, providing a template implementation and test case for implementation in the computationally more efficient JIT mode. Parcels’ dynamic update loop also provides an interval keyword to impose a secondary sub-timestepping that allows for direct coupling with a host OGCM in the future. The dynamic composition of multiple timestepping intervals might also be used for future data and performance optimisation strategies, for example directed prefetching of regional field data. Such strategies, as well as a potentially more intricate execution engine, have to be explored carefully to successfully tackle the big-data challenges facing Lagrangian tracking codes in the petascale age. 2.3 Interpolation The interaction of particles with their enclosing fields is currently limited to interpolating field data onto the current particle position. In the SciPy debug mode this is facilitated by scipy.interpolate.RegularGridInterpolator objects and supports linear and nearest-neighbour interpolation. Equivalent low-level C routines are also included in the Parcels source code as macros that can be inlined into the generated C kernel code by the code generation engine. More advanced interpolation methods, such as quadratic, cubic or spline interpolation, may easily be added in future releases if a fast C implementation can be provided with Parcels’ internal header files. One of key performance advantages of using runtime code generation is the ability to inline bespoke grid interpolation methods with the user-defined kernels in Parcels to avoid the Python interpreter overhead of repeatedly calling native Python interpolation functions. This overhead can be quite significant due to the high frequency at which the associated field data needs to be sampled. This can be illustrated using the “Steady-state flow around a peninsula” test case discussed in Sect. 4.2.4, where 6 100 particles are advected for 20 hours with a timestep size of 30 seconds. While the sequential execution time of the pure Python implementation runs in 305.92 seconds, the auto-generated JIT kernels can run the same experiment in 1.74 seconds, a speedup of over 150×. 2.4 External field data Parcels v0.9 supports external field data from NetCDF files, with a configurable interface to describe the input data and variable structure. The data is encapsulated in individual Field objects, which are accessible from within particle kernels via provided interpolation routines. Individual fields are stored in a FieldSet container class, which may also provide global meta-data to the kernel execution engine at runtime. Currently, only linear interpolation schemes are implemented in Parcels, both in space and in time. In space, Parcels can currently only work on regular grids (i.e. where the grid dimensions are functions of only longitude, only latitude or only depth). However, support for unstructured grids is a priority for the next release of the code, Parcels v1.0. 3 A worked-out example: tracking virtual foraminifera in the Agulhas region To highlight some of the prototype design and philosophies of the Parcels API, we here present a worked-out example code of a previously-published scientific experiment. This example follows the experimental design of Van Sebille et al. (2015), where the goal was to investigate the temperatures that planktic foraminifera experience during their lifespan as they drift with the currents in the upper ocean. In particular, that study looked at the variability of lifespan-averaged temperatures of foraminifera that all end up on one single location on the ocean floor (e.g. Peeters et al., 2004; Katz et al., 2010). Figure 1b of Van Sebille et al. (2015) depicted the origin of virtual planktic foraminifera that end up on a site just off the coast of Cape Town (17.3◦ E, 34.7◦ S), at 2,440 meter water depth. The virtual particles were released at that site and then tracked in time-backward mode. There were two phases to the experiment: in the sinking phase, the foraminifera were tracked back as they sunk at 200 meter per day to the ocean floor, while being advected by the (deep) ocean circulation. In the lifespan phase, the particles were then tracked further backward in time as they were advected by the horizontal circulation at their 50m dwelling depth. During this last phase, temperature along their trajectory was recorded at daily interval. While the original experiment was computed with the Connectivity Modelling System (Paris et al., 2013), here we have re-coded it using the Parcels API. This experiment setup is a fitting one, as it combines a number of the API highlights of Parcels: custom kernels, NetCDF I/O, and field sampling. The full Python code for this experiment in Parcels is available at https://doi.org/10.5281/zenodo.823994. Below, we emphasise some of the key statements in the Python script. 3.1 Reading the FieldSet The hydrodynamic fields that carry the foraminifera come from the OFES model (Masumoto et al., 2004) and can be accessed from http://apdrc.soest.hawaii.edu/datadoc/ofes/ncep_0.1_global_3day.php. Three-dimensional velocities and temperature are available on 1/10◦ horizontal resolution, on 54 vertical levels, and are stored as three-day averages. The bash script 7 get_ofesdata_agulhas.sh provided at https://doi.org/10.5281/zenodo.823994 was used to download snapshot numbers 3165 to 3289, covering the year 2006, in a subdomain around the core site off Cape Town (note, the total file size is 6GB). While the 6GB file size for this example is not excessively large and could in principle be loaded into memory all at once, this will not be possible for FieldSets with larger regional domains or longer time series. Hence, Parcels provides a system to read in hydrodynamic fields during particle integration, at any time storing only three consecutive timeslices (e.g. Paris et al., 2013). See also Section 3.4. After the first three days of hydrodynamic fields are read in through a call to the user-defined set_ofes_fieldset function (see the example_corefootprintparticles.py script for the exact formulation of this function, which requires as input a set with filenames, provided as a list of arbitrary length), three global constants are added to the FieldSet fieldset . add_constant ( ’ dwellingdepth ’ , 50.) fieldset . add_constant ( ’ sinkspeed ’ , 200./86400) fieldset . add_constant ( ’ maxage ’ , 30.*86400) These constants will be used later in the custom kernels controlling the movement of the particles. 3.2 Defining the ParticleSet Apart from information on their location and time, the virtual foraminifera particles will need two extra Variables: the sea water temperature at their present location, and their age. Therefore, we define a new particle class, which inherits from the standard JITParticle: class ForamParticle ( JITParticle ): temp = Variable ( ’ temp ’ , dtype = np . float32 , initial = np . nan ) age = Variable ( ’ age ’ , dtype = np . float32 , initial =0.) And we then define a ParticleSet containing a single particle as pset = ParticleSet ( fieldset = fieldset , pclass = ForamParticle , lon =[17.3] , lat =[ -34.7] , depth =[2440] , time = fieldset . U . time [ -1]) 3.3 Defining the custom kernels We need to define four custom kernels: one that causes the particle to sink after it dies, one that keeps track of its age and deletes it once it reaches its maximum age, one that samples the temperature at its location, and one that deletes the particle when it reaches a boundary of the domain (since we only have hydrodynamic data in a subset of the global OFES domain). Note that while in principle the first three could be written in one Kernel, here we write three separate kernels and then concatenate these with the built-in AdvectionRK4_3D kernel. The first kernel, controlling the sinking of the particle after it died (i.e. the first twelve days in our reverse-time experiment), can be written as def Sink ( particle , fieldset , time , dt ): if particle . depth > fieldset . dwellingdepth : particle . depth = particle . depth + fieldset . sinkspeed * dt else : particle . depth = fieldset . dwellingdepth 8 The second kernel, which keeps track of the age and deletes the particle when it reaches maxage, can be written as def Age ( particle , fieldset , time , dt ): if particle . depth <= fieldset . dwellingdepth : particle . age = particle . age + math . fabs ( dt ) if particle . age > fieldset . maxage : particle . delete () The third kernel, which samples the temperature, can be written as def SampleTemp ( particle , fieldset , time , dt ): particle . temp = fieldset . temp [ time , particle . lon , particle . lat , particle . depth ] These three kernels are then concatenated with the AdvectionRK4_3D kernel as kernels = pset . Kernel ( AdvectionRK4_3D ) + Sink + SampleTemp + Age Where at least one of the kernels needs to be cast into a Kernel object for the overloading of the + operator as a kernel concatenator to work. Finally, the kernel that deletes a particle if it reaches one of the lateral boundaries and which will be invoked through the error recovery execution is def DeleteParticle ( particle , fieldset , time , dt ): particle . delete () 3.4 Executing the particle set The ParticleSet can now be integrated with a call to pset.execute(). This method requires as input the list of kernels, the starttime of the execution loop, the runtime of the execution loop, the Runge Kutta integration timestep (here taken to be 5 minutes), the interval at which output is written (here once per day), and the recovery kernel that gets called when a Particle crosses the boundary of the regional domain. As mentioned in section 3.1, only three timeslices are held in memory at any one time. The loading of new fields is controlled by the fieldset.advancetime() method, which replaces the oldest timeslice with a new one (held in this case in [snapshots[s]]). This also means that the executing of the ParticleSet has to be done within a loop: for s in range ( len ( snapshots ) -5 , -1 , -1): pset . execute ( kernels , starttime = pset [0]. time , runtime = delta ( days =3) , dt = delta ( minutes = -5) , interval = delta ( days = -1) , recovery ={ ErrorCode . ErrorOutOfBounds : DeleteParticle }) fieldset . advancetime ( set_ofes_fieldset ([ snapshots [ s ]])) There is another reason to call the pset.execute method within a loop: it allows for a new particle to be released every three days (the frequency with which hydrodynamic data is available). This happens within the for-loop through a call to pset . add ( ForamParticle ( lon =[17.3] , lat =[ -34.7] , depth =[2440] , fieldset = fieldset )) 3.5 Saving and plotting the output The Parcels framework allows for storing of the locations of the particle to disk on-the-fly in NetCDF files, following the Discrete Sampling Geometries section of http://cfconventions.org/cf-conventions/v1.6.0/cf-conventions.html\#discrete-sampling-geometries, 9 and is hence CF-1.6-compliant. Storing of the particle trajectories and properties such as age and along-track temperature happens in the for-loop through calls to pfile . write ( pset , pset [0]. time ) Since particles are continually added to and deleted from the ParticleSet, the ParticleFile needs to be stored in ‘indexed’ format, where for each variable all particle states are written in one long vector. pfile = ParticleFile ( outfile , pset , type = " indexed " ) These long vectors in Indexed format, however, are not very easy to work with, so Parcels provides the utility script convert_IndexedOutputToArray to convert an Indexed NetCDF file to array format. The particle trajectories can then be plotted using the matplotlib and Basemap libraries, see Fig. 3. This figure shows the temperature recorded on each day during the lifespan of all virtual particles. It highlights that foraminifera that end up on the ocean floor off Cape Town travel hundreds to thousands of kilometers during their lifespan, and that while some originate from the Agulhas Current as far north as 27◦ S, others originate from the much colder Southern Ocean south of 40◦ S. 4 Model evaluation Evaluation of a code-base’s accuracy and performance is a key component of its validation and roll-out. For this Parcels v0.9, performance and speed are not a priority; these will be the focus for the v1.0 release (see also Sect. 5). Instead, while developing Parcels v0.9 we have concentrated on accuracy. 4.1 Unit tests and continuous integration Following best practices in software engineering, we have incorporated Unit Testing and Continuous Integration into the development cycle of Parcels. Every push of code changes to github automatically triggers a validation of the entire code base (an important component of the Continuous Integration paradigm), through the travis-ci.org web service. The validation of the code base is done through so-called unit tests; small snippets of code that test individual components of the codebase. Parcels v0.9 has over 150 of these unit tests, which check the integrity and consistency of the codebase. Where relevant, these unit tests are run in both Scipy and JIT mode, to test both modes of executing the kernels. The following Python snippet shows a typical example of a unit test for Parcels (as included in the test_particle_sets.py file). It performs the test that Particles in a ParticleSet indeed get their assigned longitudes and latitudes. While this may seem a trivial test, these kinds of unit tests can help prevent bugs. @pytest . mark . parametrize ( ’ mode ’ , [ ’ scipy ’ , ’ jit ’ ]) def t e st _ p s e t _ c r e a t e _ l o n _ l at ( fieldset , mode , npart =100): lon = np . linspace (0 , 1 , npart , dtype = np . float32 ) lat = np . linspace (1 , 0 , npart , dtype = np . float32 ) pset = ParticleSet ( fieldset , lon = lon , lat = lat , pclass = ptype [ mode ]) assert np . allclose ([ p . lon for p in pset ] , lon , rtol =1 e -12) assert np . allclose ([ p . lat for p in pset ] , lat , rtol =1 e -12) 10 Ideally, the full set of unit tests means that no change of the code can ever break another part of the code, since some of the unit tests would then fail. Of course, in reality the completeness of the unit tests can never be guaranteed, but during Parcels development we have attempted to provide unit tests for a broad spectrum of the Parcels functionality and code. 4.2 Idealised and analytic test cases Following the list of standard tests of particle tools, as described in Sec. 6 of Van Sebille et al. (submitted), we have validated the accuracy of Parcels v0.9 against seven idealised and analytical test cases. In this section we will describe the results in detail. All test cases are run with Runge-Kutta4 integration and in JIT mode. In each case, the hydrodynamic velocities are generated within the Python scripts and converted directly to a FieldSet (i.e. without first storing these fields in NetCDF format).The Python code for all testcases is available at https://doi.org/10.5281/zenodo.823994. 4.2.1 Radial rotation with known period The first test case is that of a simple counter-clockwise solid-body rotation with a period of 24 hours. Velocities are defined on a (20 × 20) km Arakawa A-grid centered at the origin with a 100 m horizontal resolution. Solid-body radial velocities (u, v) = (−ωr sin(φ), ωr cos(φ)), with r and φ the radius and angle from the origin and ω = 2π/86, 400 s the angular frequency, are then computed on that grid. Four particles are started at x = 0 km and y = (1000, 2000, 3000, 4000) km and then advected for 24 hours, using an RK4 timestep of 5 minutes, and with particle positions stored every hour (Fig. 4a). All four particles indeed follow the flow for the full circle. The maximum distance error after this 24 hours advection is less than 3mm, on path lengths of more than 5km. 4.2.2 Longitudinal shear flow The second test case tests the ability of the Parcels code to convert between spherical longitude/latitude space and local flat Euclidian space. When defining a FieldSet on a spherical mesh, Parcels automatically performs this conversion under the hood. To test its accuracy, an idealised flow on a sphere at 1◦ horizontal resolution is created, with a uniform zonal velocity of 1 m/s and no meridional velocity. A total of 31 particles are then released on a north-south line, with a meridional spacing of 3◦ . These particles are advected for 57 days, using an RK4 timestep of 5 minutes and output saved every day (Fig. 4b). The main panel shows trajectories in planar projection, with the inset showing the same trajectories in orthographic projection. At a speed of 1 m/s, the particles travel 4.9·106 m in the 57 days. At the equator, this amounts to almost 45◦ of longitude, but because of the cosine-dependence of zonal distance with latitude, particles closer to the poles travel farther in degrees (main panel in Fig. 4b). The inset of Fig. 4b, nevertheless, shows that in an orthographic projection, all particles travel the same distance. 11 4.2.3 Advection due to a time-oscillating zonal flow The third test case tests the ability of Parcels to cope with simple time-varying flow. The flow in this case is a uniform meridional flow of v = A = 0.1 m/s, and an oscillating zonal flow with u(t) = A cos(ωt) where ω = 2π/T and the period is T = 1 day. The time resolution of the FieldSet is 5 minutes, and since the flow is constant in space there are only two grid cells in each of the horizontal directions. A total of 20 particles are then released on a zonal line at y = 0 km and advected for 4 days, using an RK4 timestep of 5 minutes and storing output every 3 hours (Fig. 4c). The analytical flow for the paths of these particles is y(t) = At and x(t) = x0 + A/ω sin(ωt) where ω = 2π/T and x0 is the zonal start location of the particle. Indeed, all particles follow these analytical pathways very closely (Fig. 4c), with largest positional errors after 4 days being 6 cm in the zonal direction and 4 mm in the meridional direction. 4.2.4 Steady-state flow around a peninsula The test case of steady-state flow around a peninsula follows a description by Ådlandsvik et al. (2009) and was also used as a validation test case in the article describing the Connectivity Modeling System (Paris et al., 2013). Starting from the analytical expression for a streamfunction Ψ of a steady-state flow around a peninsula, analytical expressions of the zonal and meridional component of velocity are solved on a (1◦ × 0.5◦ ) Arakawa A-grid at 1/100◦ horizontal resolution. A set of 20 particles is seeded just off the western edge of the domain, and then advected with the flow for 24 hours using an RK4 timestep of 5 minutes and particle positions stored every hour (Fig. 4d, where the brown semi-circle is the peninsula). Since the particles should follow streamlines, a comparison of the interpolated streamfunction value at t = 24 hours to that at t = 0 hours gives an estimate of the error. The largest error is 0.008 m2 /s, which corresponds to a positional error of 10−5 degrees, or 1 meter. Indeed, Fig. 4d shows that the particle trajectories closely follow the dashed streamlines. 4.2.5 Steady-state flow in a Stommel gyre and western boundary current The test case of the Stommel gyre follows a description in Fabbroni (2009), and provides an analytical solution to the streamfunction field of a Stommel gyre and western boundary current. Here, we compute the meridional and zonal central derivatives of this streamfunction field to generate zonal and meridional velocities, respectively, on a (10, 000 × 10, 000) km Arakawa A-grid at 50 km horizontal resolution. A set of four particles is seeded on a line crossing the western boundary, at y = 5,000 km, and then advected for 50 days with an RK4 timestep of 5 minutes and the particle positions stored every 24 hours (Fig. 4e). Since the particles should follow streamlines, the deviation of particles from the streamlines is a measure of the accuracy of the method. Fig. 4e shows that all three particles stay close to their streamline throughout the 50 day advection period. The largest error is 0.05 m2 /s, which corresponds to a positional error of less than 5 km. 4.2.6 Damped inertial oscillation on a geostrophic flow The test case of a damped inertial oscillation on a geostrophic flow follows Fabbroni (2009) and Döös et al. (2013). In this test case, the velocity varies over the entire domain, following an analytical time-dependent equation. Here, we use a time 12 resolution of 5 minutes for the velocity field. A particle is then seeded at the origin and advected for four days, with a RK4 timestep of 5 minutes and output stored every hour (Fig. 4f). After four days of advection, the positional error of the particle, as compared to the analytical solution, is less than 5 cm. 4.2.7 Brownian motion with uniform Kh The test case of Brownian motion with uniform Kh tests for the accuracy and implementation of the random number generator. Here, a total of 100,000 particles are seeded at the origin of a (60×60) km grid centered around the origin with zero velocities, and then diffused using a normal variate random number distribution with Kh = 100 m2 /s. The particles are diffused for 1 day with a timestep of 5 minutes (Fig. 4g). The two-dimensional normalised histogram agrees very well with the analytical solution √ of this Brownian motion: a two-dimensional Gaussian with a mean at the origin and standard deviation of σ = 2Kh ∆t = 4.16 km. 5 Future outlook As mentioned before, Parcels v0.9 is a prototype. The core contributions of this paper are both the API, as well as the design philosophy which enables a wide range of valuable future improvements of the framework. Below, we discuss some of the conceptual ideas for these planned improvements. 5.1 Performance optimisation The primary performance optimisation in version 0.9 of Parcels is the automated generation of C kernel code to allow inlining of field evaluation routines. However, several future optimisations have been planned during the design of the code, based around considerations for irregular data processing. Since dynamic addition and deletion of particles is a common feature of many oceanographic use cases, no assumptions about data layout or iteration protocol have been made in the high-level API of particle sets, allowing more optimised implementations in the future. The use of dynamic code generation at runtime also enables further automated specialisation of kernel code, while allowing us to define a clear initial interface for kernel customisation. In addition to optimising the execution of particle kernels, the extensive interaction with hydrodynamic field data constitutes a considerable cost of the overall computation - a cost that is likely to dominate overall execution if large sets of hydrodynamic field data are to be read from files. Multiple potential approaches can be considered in future versions of Lagrangian particle tracking codes: – Directly coupled (online) runs within the host OGCM can completely avoid the bandwidth bottlenecks imposed by reading dense field data from disk, at the expense of additional computation. For simulations at local scales with a high particle density, this trade-off might prove beneficial, for example for regional studies on marine ecology. 13 – For global-scale models that require offline hydrodynamic field data but feature a low particle density with high localization, the total volume of data read from disk might be drastically reduced by explicitly prefetching local subsets of field data based on particle locations. Such a mechanism would require the use of additional geospatial indexing methods, for example via octrees or r-trees (Isaac et al., 2015; Schubert et al., 2013), that decompose the grid into individual sub-regions and provide fast indexing methods. Using explicit prefetch directives in the dynamic execution loop might also enable overlapping of asynchronous file reads with effective computation to further amortize file I/O overheads. The modularity of Parcels’ internal abstractions, as well as the composability of kernels and the flexibility provided by the dynamic execution loop should facilitate extensive experimentation and exploration with such advanced optimization techniques, without the need for users to change any high-level algorithmic definitions. The use of advanced data handling and task-scheduling libraries, such as Dask (Rocklin, 2015) or Xarray (Hoyer and Hamman, 2017), might also be utilised to quickly achieve efficient out-of-core data management in Parcels. 5.1.1 Towards parallellisation The current version of Parcels is not in itself parallel due to two restrictions: – The primary input format of field data in the v0.9 prototype is NetCDF-based field data, so that parallellisation requires an explicit domain decomposition and a parallel file reader. The current version of the netcdf Python package does not provide these features. Alternative implementations of the NetCDF file format, such as Xarray, might be leveraged in future versions of Parcels to provide parallel data management. – Exchanging particle information between parallel processors is currently not supported, although it is deemed a critical feature for the next release (v1.0). 5.2 Community building and kernel sharing One of the key ideas between the development of Parcels is for it to be a flexible and extendable codebase, where particle behaviour can easily be customised. The worked out example in Sect. 3 shows that many types of behaviour (sinking, aging, etc) can be coded in a few lines of Python code. The customisability of Parcels enables a multitude of oceanographic modelling, from water parcels to plankton to plastic litter to fish. We therefore envision an active community of Parcels users who share and discuss kernel development. We encourage anyone who wishes to share their custom kernels to upload them onto github, and we will provide a properly referenced library of user-contributed kernels for others to reuse on oceanparcels.org. 5.3 Towards runtime integration with OGCMs Although the current version of Parcels primarily uses off-line field data, the overall design of the particle exectuion engine is designed to be compatible with a variety of OGCMs for directly coupled (at-runtime) simulations. In particular, the current 14 Field interface can easily be extended to provide interpolation routines for various types of field data, for example based on unstrctured meshes, while the primary particle update loop provides a mechanism for host models to dictate a model timestep size that varies from that of the particle update. Moreover, the explicit generation of C code allows Parcels kernel code to be easily injected into existing ocean modelling frameworks, while the provision of error-recovery kernels can guarantee progression of the coupled model. 6 Conclusions Here, we have introduced a new framework for Lagrangian ocean analysis that focusses on customisability, flexibility and ease-of-use. This v0.9 of Parcels is very much a prototype, providing a proof-of-concept of the API and showcasing how it can be used to create high-level Python code for full-fledged scientific experiments. We also assess the accuracy of the current implementation, with the idea to provide a benchmark for future versions. Future development will focus on increasing efficiency of the framework, and also towards providing easy tools to port the generated C-code of Parcels experiments to at-runtime integration within OGCMs. 7 Code availability The code for Parcels is licensed under the MIT license and is available through github at github.com/OceanParcels/parcels. The version 0.9 described here is archived at Zenodo at https://doi.org/10.5281/zenodo.823562. More information is available on the project webpage at oceanparcels.org. Author contributions. ML and EvS developed the code and wrote the manuscript jointly. Competing interests. The authors declare no competing interests Acknowledgements. The initial ideas for the Parcels framework were the result of very fruitful discussions with the attendees of the “Future of Lagrangian Ocean Modelling” workshop, held at Imperial College London, UK, in September 2015. Funding for this workshop was provided through an EPSRC Institutional Sponsorship grant to EvS under reference number EP/N50869X/1. EvS is supported through funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No 715386). The OFES simulation was conducted on the Earth Simulator under the support of JAMSTEC. We thank Joe Scutt-Phillips, Ronan McAdam, Joel Kronberg, Thomas Stokes, Nathaniel Tarshish, Michael Hart-Davis, Birgit Sutzl, Ben Snowball, Samuel Wetherell and David Ham for their support in testing and developing aspects of the Parcels code. 15 References Ådlandsvik, B., Bartsch, J., Brickman, D., Browman, H. I., Edwards, K., Fiksen, Ø., Gallego, A., Hermann, A. J., Hinckley, S., Houde, E., Huret, M., Irisson, J.-O., Lacroix, G., Leis, J. M., McCloghrie, P., Megrey, B. A., Miller, T., Van der Molen, J., Mullon, C., North, E. W., Parada, C., Paris, C. B., Pepin, P., Petitgas, P., Rose, K., Thygesen, U. H., and Werner, C.: Manual of recommended practices for modelling physical – biological interactions during fish early life, Tech. rep., 2009. Alexander, R.: Solving ordinary differential equations I: Nonstiff problems (E. Hairer, SP Norsett, and G. Wanner), SIAM Review, 32, 485, 1990. Beron-Vera, F. J. and LaCasce, J. H.: Statistics of Simulated and Observed Pair Separations in the Gulf of Mexico, Journal of Physical Oceanography, 46, 2183–2199, 2016. Blanke, B. and Raynaud, S.: Kinematics of the Pacific Equatorial Undercurrent: An Eulerian and Lagrangian approach from GCM results, Journal of Physical Oceanography, 27, 1038–1053, 1997. Cetina-Heredia, P., Roughan, M., van Sebille, E., Feng, M., and Coleman, M. A.: Strengthened currents override the effect of warming on lobster larval dispersal & survival, Global Change Biology, 21, 4377–4386, 2015. Cowen, R. K., Paris, C. B., and Srinivasan, A.: Scaling of connectivity in marine populations, Science, 311, 522–527, 2006. Doblin, M. A. and van Sebille, E.: Drift in ocean currents impacts intergenerational microbial exposure to temperature, Proceedings of the National Academy of Sciences, pp. 201521 093–11, 2016. Döös, K.: Interocean Exchange of Water Masses, Journal of Geophysical Research: Oceans, 100, 13 499–13 514, 1995. Döös, K., Nycander, J., and Coward, A. C.: Lagrangian decomposition of the Deacon Cell, J. Geophys. Res. Ocean., 113, C07 028, doi:10.1029/2007JC004351, http://dx.doi.org/10.1029/2007JC004351, 2008. Döös, K., Kjellsson, J., and Jonsson, B. F.: TRACMASS—A Lagrangian Trajectory Model, in: Preventive Methods for Coastal Protection, pp. 225–249, Springer International Publishing, Heidelberg, 2013. Döös, K., Jönsson, B., and Kjellsson, J.: Evaluation of oceanic and atmospheric trajectory schemes in the TRACMASS trajectory model v6.0, Geoscientific Model Development, 10, 1733–1749, doi:10.5194/gmd-10-1733-2017, http://www.geosci-model-dev.net/10/1733/2017/, 2017. Fabbroni, N.: Numerical simulations of passive tracers dispersion in the sea, Ph.D. thesis, Universita di Bologna, 2009. Griffa, A.: Applications of stochastic particle models to oceanographic problems, in: Stochastic modelling in physical oceanography, pp. 113–140, Springer, 1996. Haller, G.: Lagrangian Coherent Structures, Annual Review of Fluid Mechanics, 47, 137–162, doi:10.1146/annurev-fluid-010313-141322, 2015. Hellweger, F. L., van Sebille, E., and Fredrick, N. D.: Biogeographic patterns in ocean microbes emerge in a neutral agent-based model, Science, 345, 1346–1349, 2014. Hoyer, S. and Hamman, J.: xarray: N-D labeled Arrays and Datasets in Python, Journal of Open Research Software, 5(1), 10, doi:10.5334/jors.148, http://doi.org/10.5334/jors.148, 2017. Isaac, T., Burstedde, C., Wilcox, L. C., and Ghattas, O.: Recursive Algorithms for Distributed Forests of Octrees, SIAM Journal on Scientific Computing, 37, C497–C531, doi:10.1137/140970963, https://doi.org/10.1137/140970963, 2015. 16 Jones, A., Thomson, D., Hort, M., and Devenish, B.: The U.K. Met Office’s Next-Generation Atmospheric Dispersion Model, NAME III, in: Air Pollution Modeling and Its Application XVII, edited by Borrego, C. and Norman, A.-L., pp. 580–589, Springer US, Boston, MA, 2007. Jönsson, B. F., Salisbury, J. E., and Mahadevan, A.: Large variability in continental shelf production of phytoplankton carbon revealed by satellite, Biogeosciences, 8, 1213–1223, doi:10.5194/bg-8-1213-2011, http://www.biogeosciences.net/8/1213/2011/, 2011. Jutzeler, M., Marsh, R., Carey, R. J., White, J. D. L., Talling, P. J., and Karlstrom, L.: On the fate of pumice rafts formed during the 2012 Havre submarine eruption, Nature Communications, 5, 3660, 2014. Katz, M. E., Cramer, B. S., Franzese, A. M., Hoenisch, B., Miller, K. G., Rosenthal, Y., and Wright, J. D.: Traditional and emerging geochemical proxies in foraminifera, Journal of Foraminiferal Research, 40, 165–192, 2010. Kool, J. T., Moilanen, A., and Treml, E. A.: Population connectivity: recent advances and new perspectives, Landscape Ecology, 28, 165–185, doi:10.1007/s10980-012-9819-z, http://dx.doi.org/10.1007/s10980-012-9819-z, 2013. Lebreton, L. C. M., Greer, S. D., and Borerro, J. C.: Numerical modelling of floating debris in the world’s oceans, Marine Pollution Bulletin, 64, 653–661, 2012. Marsh, R., Ivchenko, V. O., Skliris, N., Alderson, S., Bigg, G. R., Madec, G., Blaker, A. T., Aksenov, Y., Sinha, B., Coward, A. C., Le Sommer, J., Merino, N., and Zalesny, V. B.: NEMO–ICB (v1.0): interactive icebergs in the NEMO ocean model globally configured at eddypermitting resolution, Geoscientific Model Development, 8, 1547–1562, 2015. Masumoto, Y., Sasaki, H., Kagimoto, T., Komori, N., Ishida, A., Sasai, Y., Miyama, T., Motoi, T., Mitsudera, H., Takahashi, K., Sakuma, H., and Yamagata, T.: A fifty-year eddy-resolving simulation of the world ocean - Preliminary outcomes of OFES (OGCM for the Earth Simulator), Journal of the Earth Simulator, 1, 2004. Paris, C. B., Cowen, R. K., Claro, R., and Lindeman, K. C.: Larval transport pathways from Cuban snapper (Lutjanidae) spawning aggregations based on biophysical modeling, Marine Ecology-Progress Series, 296, 93–106, 2005. Paris, C. B., Helgers, J., van Sebille, E., and Srinivasan, A.: Connectivity Modeling System: A probabilistic modeling tool for the multi-scale tracking of biotic and abiotic variability in the ocean, Environmental Modelling & Software, 42, 47–54, 2013. Peeters, F. J. C., Acheson, R., Brummer, G.-J. A., de Ruijter, W. P. M., Schneider, R. R., Ganssen, G. M., Ufkes, E., and Kroon, D.: Vigorous exchange between the Indian and Atlantic oceans at the end of the past five glacial periods, Nature, 430, 661–665, 2004. Pingali, K., Nguyen, D., Kulkarni, M., Burtscher, M., Hassaan, M. A., Kaleem, R., Lee, T.-H., Lenharth, A., Manevich, R., Méndez-Lojo, M., Prountzos, D., and Sui, X.: The Tao of Parallelism in Algorithms, SIGPLAN Not., 46, 12–25, doi:10.1145/1993316.1993501, http: //doi.acm.org/10.1145/1993316.1993501, 2011. Qin, X., Menviel, L., Sen Gupta, A., and van Sebille, E.: Iron sources and pathways into the Pacific Equatorial Undercurrent, Geophysical Research Letters, pp. n/a–n/a, doi:10.1002/2016GL070501, 2016GL070501, 2016. Rocklin, M.: Dask: Parallel Computation with Blocked algorithms and Task Scheduling, in: Proceedings of the 14th Python in Science Conference, edited by Huff, K. and Bergstra, J., pp. 130 – 136, 2015. Rühs, S., Durgadoo, J. V., Behrens, E., and Biastoch, A.: Advective timescales and pathways of Agulhas leakage, Geophysical Research Letters, 40, 3997–4000, doi:10.1002/grl.50782, http://doi.wiley.com/10.1002/grl.50782, 2013. Schubert, E., Zimek, A., and Kriegel, H.-P.: Geodetic Distance Queries on R-Trees for Indexing Geographic Data, pp. 146–164, Springer Berlin Heidelberg, Berlin, Heidelberg, doi:10.1007/978-3-642-40235-7_9, https://doi.org/10.1007/978-3-642-40235-7_9, 2013. Stohl, A. and James, P.: A Lagrangian analysis of the atmospheric branch of the global water cycle. Part II: Moisture transports between earth’s ocean basins and river catchments, Journal of Hydrometeorology, 6, 961–984, 2005. 17 Teske, P. R., Sandoval-Castillo, J., van Sebille, E., Waters, J., and Beheregaray, L. B.: On-shelf larval retention limits population connectivity in a coastal broadcast spawner, Marine Ecology-Progress Series, 532, 1–12, 2015. Van Sebille, E., Scussolini, P., Durgadoo, J. V., Peeters, F. J. C., Biastoch, A., Weijer, W., Turney, C. S. M., Paris, C. B., and Zahn, R.: Ocean currents generate large footprints in marine palaeoclimate proxies, Nature Communications, 6, 6521, 2015. Van Sebille, E., Griffies, S. M., Abernathey, R., Adams, T. P., Berloff, P., Biastoch, A., Blanke, B., Chassignet, E. P., Cheng, Y., Cotter, C. J., Deleersnijder, E., Doöös, K., Drake, H., Drijfhout, S., Gary, S. F., Heemink, A. W., Kjellsson, J., Koszalka, I. M., Lange, M., Lique, C., MacGilchrist, G. A., Marsh, R., Mayorga Adame, C. G., McAdam, R., Nencioli, F., Paris, C. B., Piggott, M. D., Polton, J. A., Rühs, S., Shah, S. H. A. M., Thomas, M. D., Wang, J., Wolfram, P. J., Zanna, L., and Zika, J. D.: Lagrangian ocean analysis: fundamentals and practices, Ocean Modeling, submitted. 18 User Particle Kernel Define variables Define computation Visualization Particle Loop Execution Data External OGCM Update particles Particle Data Field Data File I/O Interpolation External data Figure 1. Conceptual abstractions (dark) and functionalities encapsulated in the Parcels prototype in relation to external components (light). 19 .from_list() ParticleSet.from_list Field is one of the methods used to define the starting positions of Particles. ParticleSet objects are Field objects hold the data of the hydrodynamic fields, stored as 4dimensional (lon, lat, depth, time) numpy arrays. .from_netcdf() FieldSet.from_netcdf is the method used to read hydrodynamic fields in NetCDF data using info of Fields in dictionaries. ParticleSet Particle Particle objects contain the position and other variables of each particle in the ParticleSet. FieldSet the main objects in Parcels. They contain a FieldSet and a list of Particles. The .from_list, .execute and .show are the most important methods defined on ParticleSets. FieldSet objects are collections of Fields. At least a U and V Field are .execute() ParticleSet.execute is the method used to actually compute the evolution of particles by executing Kernel objects. .show() ParticleSet.show is the method used to plot particle positions, optionally overlayed on a Field. required for Parcels to work. Kernel Kernels are little snippets of code that get run when a ParticleSet is executed. Parcels comes with some build-in kernels like 4th order Runge-Kutta advection, but it is very easy to create custom kernels. Multiple kernels can be concatenated with the + operator. Figure 2. Class diagram of the Parcels v0.9 prototype implementation. Classes are depicted in blue, methods in green. Note that not all methods and classes are shown in this diagram. 20 [ C] 20 30°S 18 16 14 40°S 10°E 20°E 30°E 12 Figure 3. Footprints of virtual foraminifera ending up on the ocean floor just off Cape Town in the Agulhas region. This experiment is a Parcels implementation of the study described in Van Sebille et al. (2015), and this figure can be compared to Fig. 1b in that paper. The magenta dot is the location of the sediment core, from which virtual particles are first tracked back until they reach their 50m dwelling depth (black dots), and then further tracked back for their 30-day lifespan. Temperatures (in degrees Celcius) are recorded each day throughout their lifespan and shown as colours. The code for this experiment and plotting is available at https://doi.org/10.5281/zenodo.823994. 21 (a) Radial rotation with known period (b) Longitudinal shear flow 0 2 Meridional distance [km] Latitude [degrees] Meridional distance [km] 30 40 2 20 0 25 20 15 10 5 20 4 0 4 2 0 Zonal distance [km] 2 4 0 (d) Steady-state flow around a peninsula 20 40 60 Longitude [degrees] 80 10 (e) Steady-state flow in a Stommel gyre and western boundary current 0.25 0.20 0.15 0.10 5 10 1 Meridional distance [km] Meridional distance [km] 0.30 0 Zonal distance [km] 0 8000 0.35 5 (f) Damped inertial oscillation on a geostrophic flow 10000 0.40 Latitude [degrees] (c) Advection due to a time-oscillating zonal flow 35 60 4 6000 4000 2 3 4 2000 0.05 0.1 0.2 0.3 0.4 0.5 0.6 Longitude [degrees] 0.7 0 0.8 0 2000 4000 6000 Zonal distance [km] 8000 (g) Brownian motion with a uniform Kh Meridional distance [km] 10 10000 5 0 2 4 6 8 Zonal distance [km] 10 12 0.010 0.008 5 0.006 0 0.004 5 0.002 10 15 15 10 5 0 5 Zonal distance [km] 10 0.000 Figure 4. Evaluation of trajectory accuracy in Parcels v0.9, following the seven idealised and analytical test case described in in Sect. 6 of Van Sebille et al. (submitted): (a) radial rotation with known period; (b) longitudinal shear flow; (c) advection due to a time-oscillating zonal flow; (d) steady-state flow around a peninsula; (e) steady-state flow in a Stommel gyre and western boundary current; (f) damped inertial oscillation on a geostrophic flow; and (g) Brownian motion with a uniform Kh . In the upper six panels, the coloured lines are the particle trajectories and the black dashed lines are the analytical solutions. In panel (g), the colouring shows the density of particles, and the contours show the probability density function of the equivalent analytical solution (a two-dimensional Gaussian). 22
5cs.CE
arXiv:1711.06400v2 [math.RT] 23 Jan 2018 GENERICALLY FREE REPRESENTATIONS II: IRREDUCIBLE REPRESENTATIONS SKIP GARIBALDI AND ROBERT M. GURALNICK Abstract. We determine which faithful irreducible representations V of a simple linear algebraic group G are generically free for Lie(G), i.e., which V have an open subset consisting of vectors whose stabilizer in Lie(G) is zero. This relies on bounds on dim V obtained in prior work (part I), which reduce the problem to a finite number of possibilities for G and highest weights for V , but still infinitely many characteristics. The remaining cases are handled individually, some by computer calculation. These results were previously known for fields of characteristic zero; we provide a shorter proof that gives the result with very mild hypotheses on the characteristic. (The few characteristics not treated here are settled in part III.) Combining these results with those of Guralnick–Lawther–Liebeck shows that for any irreducible module for a simple algebraic group, there is a generic stabilizer (as a group scheme) and gives a classification of the generic stabilizers in all cases. These results are also related to questions about invariants. Let G be a simple linear algebraic group over a field k acting faithfully on a vector space V . In the special case k = C, there is a striking dichotomy between the properties of irreducible representations V whose dimension is small (say, ≤ dim G) versus those whose dimension is large, see for example [AVE68], [Èla72], [Pop88], and [PV94, §8.7]. For example, if dim V < dim G, then (trivially) the stabilizer Gv of a vector v ∈ V is nontrivial. Conversely (and nontrivially) for V hardly bigger than dim G, the stabilizer Gv for generic v ∈ V is trivial, i.e., 1; in this case one says that V is generically free or G acts generically freely on V . This property has taken on increased importance recently due to applications in Galois cohomology and essential dimension, see [Rei10] and [Mer13] for the theory and [BRV10], [GG17b], [Kar10], [LMMR13], [Löt13], etc. for specific applications. With applications in mind, it is desirable to extend the results on generically free representations to all fields. In that setting, [GLL18] has shown that, if V is irreducible and dim V is large enough, then G(k), the group of k-points of G, acts generically freely. Equivalently (when k is algebraically closed), the stabilizer Gv of a generic v ∈ V is an infinitesimal group scheme. For applications, one would like to say that Gv is not just infinitesimal but is the trivial group scheme, for which one needs to know that the Lie algebra g of G acts generically freely on V , i.e., gv = 0. The two conditions are related in that dim Gv ≤ dim gv , so in particular if gv = 0, then Gv is finite. Conversely, if Gv (k) = 1, gv can be nontrivial (i.e., Gv may be a nontrivial infinitesimal group scheme), see Example 3.2. In a previous paper, [GG17a], we proved that, roughly speaking, if dim V is large enough (where the bound is Θ((rank G)2 )), then V is a generically free g-module. 2010 Mathematics Subject Classification. 20G05 (primary); 17B10 (secondary). 1 2 S. GARIBALDI AND R.M. GURALNICK In this paper, we restrict our focus to irreducible modules and settle the question of whether or not g acts generically freely. Theorem A. Let G be a simple linear algebraic group over a field k such that char k is not special for G and let ρ : G → GL(V ) be a restricted irreducible representation of G. If dim V ≤ dim G or (G, ρ, k) is one of the five representations in Table 1, then g does not act virtually freely on V . Otherwise, g acts virtually freely on V . G A7 A8 D8 char k weight dim V dim gv G char k weight dim V dim gv 2 ∧4 70 4 C4 3 0100 40 2 3 3 ∧ or ∧6 84 3 B2 5 11 12 1 2 half-spin 128 4 Table 1. Irreducible and restricted representations V of simple G with dim V > dim G that are not virtually free for g. For each, the stabilizer gv of a generic v ∈ V is a toral subalgebra, and dim gv is given for the case where G is simply connected. We say that g acts virtually freely on V if the stabilizer gv of a generic vector v ∈ V satisfies gv = ker dρ, i.e., gv is as a small as possible. This notion is the natural generalization of “generically freely” to allow for the possibility that G does not act faithfully. (For V as in Theorem A and not the trivial representation, ker dρ is a proper ideal in g, so is contained in z(g) by the hypothesis that char k is not special for G. Thus ker dρ = ker λ|z(g) for λ the highest weight of V , which depends only on the equivalence class of λ modulo the root lattice.) We remark that the exceptions in Theorem A, listed in Table 1, can be divided into two types. In the left column are three “θ-group” representations, which arise from embedding g in some larger Lie algebra with a finite grading, and the generic stabilizer Gv is a non-étale, non-infinitesimal finite group scheme. (Premet’s appendix in [GG17b] gives a detailed study of the half-spin representation of D8 in characteristic 2. For the other two representations in the left column, see Remark 6.3, [Aul01, 4.8.2, 4.9.2], or [GLL18, 4.1].) In the right column are two representations where the generic stabilizer is a nonzero infinitesimal group scheme, see Examples 3.2 and 4.2. Recall that every irreducible representation V of G has a highest weight λ, and we consider separately three cases. Specifically, we may write λ = λ0 + pλP 1 where p := char k 6= 0 and λ0 is restricted, i.e., when λ0 is expressed as a sum ω cω ω where the sum runs over the fundamental dominant weights ω, we have 0 ≤ cω < p for all ω. Theorem A treats the case where λ is itself restricted, i.e., when λ1 = 0. When λ0 = 0, V is the Frobenius twist of the irreducible module of G with highest weight λ1 , so g acts trivially on V . The next theorem treats the remaining case, where λ0 and λ1 are both nonzero; in that case L(λ) ∼ = L(λ0 ) ⊗ L(λ1 )[p] , where both L(λ0 ), L(λ1 ) 6∼ k, i.e., L(λ) is irreducible and tensor decomposable. (The G= representation V is tensor decomposable if there exist G-representations V ′ , V ′′ 6∼ =k ′ ′′ such that V ∼ V ⊗ V .) = Theorem B. Let G be a simple linear algebraic group over a field k such that char k is not special for G. If ρ : G → GL(V ) is an irreducible representation that is tensor decomposable, then for generic v ∈ V , Lie(G)v = ker dρ. GENERICALLY FREE IRREDUCIBLE REPRESENTATIONS 3 The main results here and in [GG17a] do not address the case when char k is special for G. Results for that case will appear in [GG18]. Notation. For convenience of exposition, we will assume in most of the rest of the paper that k is algebraically closed of characteristic p 6= 0. This is only for convenience, as our results for p prime immediately imply the corresponding results for characteristic zero: simply lift the representation from characteristic 0 to Z and reduce modulo a sufficiently large prime. We say that char k is special for G if char k = p 6= 0 and the Dynkin diagram of G has a p-valent bond, i.e., if char k = 2 and G has type Bn or Cn for n ≥ 2 or type F4 , or if char k = 3 and G has type G2 . (Equivalently, these are the cases where G has a very special isogeny.) This definition is as in [Ste63, §10]; in an alternative history, these primes might have been called “extremely bad” because they are a subset of the very bad primes — the lone difference is that for G of type G2 , the prime 2 is very bad but not special. Let G be an affine group scheme of finite type over k, which we assume is algebraically closed. If G is additionally smooth, then we say that G is an algebraic group. An algebraic group G is simple if it is not abelian, is connected, and has no connected normal subgroups 6= 1, G; for example SLn is simple for every n ≥ 2. If G acts on a variety X, the stabilizer Gx of an element x ∈ X(k) is a subgroup-scheme of G with points Gx (R) = {g ∈ G(R) | gx = x} for every k-algebra R. Statements “for generic x” means that there is a dense open subset U of X such that the property holds for all x ∈ U . If Lie(G) = 0 then G is finite and étale. If additionally G(k) = 1, then G is the trivial group scheme Spec k. We write g for Lie(G) and similarly spinn for Lie(Spinn ), etc. We put z(g) for the center of g; it is the Lie algebra of the (scheme-theoretic) center of G. As char k = p, the Frobenius automorphism of k induces a “p-mapping” x 7→ x[p] on n g. An element x ∈ g is nilpotent if x[p] = 0 for some n > 0, toral if x[p] = x, and semisimple if x is contained in the Lie p-subalgebra of g generated by x[p] . In this paper, highest weights are numbered as in Table 2, imitating [Lüb01] to make it convenient to refer P to that paper. We write c1 c2 c3 · · · cℓ as shorthand for the dominant weight ci ωi , where ωi is the fundamental dominant weight corresponding to the vertex i in Table 2. (Aℓ ) r r 1 2 r· · · r 3 ℓ−2 r ℓ−1 r ℓ (Cℓ ) r 1 2 (Bℓ ) r 1 > r 2 r· · · r 3 ℓ−2 r ℓ−1 r ℓ (Dℓ ) 1 < r 2 r ❩❩r r✚✚3 r· · · r 3 ℓ−2 r· · · r 4 ℓ−2 r ℓ−1 r ℓ−1 r ℓ r ℓ Table 2. Dynkin diagrams of simple root systems of classical type, with simple roots numbered as in [Lüb01]. Acknowledgements. Guralnick was partially supported by NSF grants DMS1265297, DMS-1302886, and DMS-1600056. 4 S. GARIBALDI AND R.M. GURALNICK 1. Results from part I For a representation V of simple G with V g = 0 (such as in Theorem A in this paper), we showed in part I ([GG17a, Th. A]): if dim V > b(G) for b(G) as in Table 3, then g acts virtually freely on V . Furthermore, this was used to verify Theorem A except in the following cases: (1) G has type Aℓ for 2 ≤ ℓ ≤ 19; (2) G has type Bℓ or Cℓ with 2 ≤ ℓ ≤ 11; (3) G has type Dℓ for 4 ≤ ℓ ≤ 11. type of G Aℓ Aℓ Bℓ Cℓ Dℓ Dℓ char k b(G) type of G char k 6= 2 2.25(ℓ + 1)2 G2 6= 3 =2 2(ℓ + 1)2 − 2 F4 6= 2 6= 2 8ℓ2 E6 any 6= 2 6ℓ2 E7 any 2(2ℓ − 1)2 E8 any 6= 2 =2 4ℓ2 Table 3. Bound b(G) from part I b(G) 48 240 360 630 1200 Put g := Lie(G). For x ∈ g, put V x := {v ∈ V | dρ(x)v = 0}. We are going to verify the inequality (1.1) dim(Ad(G)x) + dim V x < dim V for various x ∈ g. The following lemma is Lemma 2.6 in [GG17b]; it resembles [AP71, Lemma 4] and [Gue97, §3.3]. Lemma 1.2. Suppose k is an algebraically closed field of characteristic p > 0 and h is a G-invariant subspace of g. n (1) If, for every x ∈ g \ h such that x[p] = x or x[p] = 0 for some n, (1.1) holds, then for generic v ∈ V , gv ⊆ h. (2) If h consists of semisimple elements and equation (1.1) holds for every x ∈ g \ h with x[p] ∈ {0, x}, then for generic v in V , gv ⊆ h. Taking h = z(g) in Lemma 1.2, we see that verifying (1.1) for noncentral nilpotent and toral x ∈ g implies that gv ⊆ z(g) for generic v ∈ V . Theorem 12.2 in [GG17a] proved a somewhat stronger result than the one stated at the start of this section: If V is a representation of a simple group G such that V g = 0 and dim V > b(G), then (1.1) holds for all noncentral x ∈ g with x[p] ∈ {0, x}. 2. Constructing representations in Magma In order to prove Theorem A, the results of [GG17a] reduce us to considering a finite list of irreducible representations, each of which we will consider. Some of these will be dealt with by invoking calculations done on a desktop computer using Magma [BCP90], which we now explain. (Code and output are attached to the arxiv version of this article.) GENERICALLY FREE IRREDUCIBLE REPRESENTATIONS 5 The built-in Magma instructions IrreducibleRootDatum and LieAlgebra produce the Lie algebra g of a simple algebraic group over Fq for q a power of a prime p; the main cases of concern in this paper are for p ≤ 7. For a given highest weight λ, HighestWeightModule gives a homomorphism ρ from g to matrices, and one can identify the standard module with highest weight λ with the space of row vectors v where the action by g is v 7→ vρ(x) for x ∈ g. The vector (1, 0, . . . , 0) is a highest weight vector and it generates a submodule V that is irreducible with highest weight λ. For any row vector v, it is then a matter of linear algebra to compute the stabilizer gv , i.e., the subspace of x ∈ g such that vρ(x) = 0. It is determined by Kernel(VerticalJoin([vρ(y):y in Basis(g)])). To verify that a particular V is virtually free, we use Random(V) to generate random vectors v ∈ V . For each, we compute dim gv . By upper semicontinuity of dimension, dim gv is at least as big as dim gw for w generic in V . Therefore, if we find any v ∈ V with dim gv = dim ker dρ, we have verified that the representation is virtually free. e → G is a central isogeny; note that the differential dq : g̃ → g Remark. Suppose q : G need not be surjective, i.e., q need not be étale. Nonetheless, if g acts virtually freely on V , then so does g̃. Therefore, in the computer calculations described above we e such that ρ is defined. construct G to be the largest central quotient of G (If we instead assume that g̃ acts virtually freely on V , it need not follow that g e = Sp8 , G = PSp8 , char k = 2, and V is the does. For example, this occurs when G 16-dimensional irreducible “spin” representation, see [GG18, Example 6.8].) 3. Examples where g does not act virtually freely Lemma 3.1. Let V be a representation of a simple algebraic group G. If there is a v ∈ V such that (1) L := gv is a toral subalgebra; (2) dim zg (L) = rank G; and (3) dim G − rank G = dim V − dim V L , then there is an open subset U of V containing v such that gu is a G-conjugate of L for every u ∈ U . Proof. The torus L is contained in Lie(T ) for some maximal torus T in G [Hum67, Th. 13.3]. Since zg (L) contains Lie(T ), the two are equal. Put Û for the set of v ′ ∈ V L such that dim gv′ is minimal; it is open in V L . On the one hand, L ⊆ gv′ , and on the other hand, v ∈ V L , so dim gv′ ≤ dim L, whence gv′ = L and v ∈ Û . If g ∈ G(k) normalizes L, then it also normalizes zg (L) = Lie(T ), hence T , so dim NG (L) = rank G. In particular, for v ′ ∈ Û , the space of g ∈ G(k) with gv ′ = v has dimension at most rank G and the map G × V L → V defined by (g, w) 7→ gw, then, has image of dimension at least dim G − rank G + dim V L = dim V . That is, the map is dominant, so an open subset of V consists of elements whose stabilizer in g is conjugate to L.  Example 3.2 (C4 , 0100, p = 3). Consider now G = Sp8 over a field k of characteristic 3. (See Prop. 7.4(2) for the case char k 6= 2, 3.) It has a unique irreducible representation V with dim V = 40 [Lüb01], which occurs as a quotient of the Weyl 6 S. GARIBALDI AND R.M. GURALNICK module of dimension 48 contained in ∧3 (k 8 ) (with k 8 as the other composition factor), compare [PS83] or Proposition 7.4. Using Magma, one can construct V (say, with k = F3 ) as in the preceding section and verify that for a random v ∈ V , in the notation of Lemma 3.1, dim L = 2 and dim V L = 8. It follows that g does not act virtually freely on V . On the other hand, Gv (k) = 1 for generic v ∈ V by [GLL18], so this is an example of a representation where the scheme-theoretic generic stabilizer Gv is a nontrivial and infinitesimal group scheme. Lemma 3.1 shows also that the other representation in the right column of Table 1 is not virtually free, see Example 4.2. 4. Representations defined over a localization of the integers Recall that G is defined over an algebraically closed field k of characteristic p, and in particular is split. Let now R be a subring of Q with homomophisms to Fp and to a field K containing a primitive p-th root of unity ζ (e.g., take R = Z and K = C). There exists a smooth affine group scheme GR over R such that GR × k is isomorphic to G. Lemma 4.1. Let ρ : GR → GL(V ) be a homomorphism of group schemes over R for some free R-module V . Then the following are equivalent: (1) dim xG + dim(Vk )x < dim V for all noncentral x ∈ g such that x[p] = x. (2) dim g GK + dim(VK )g < dim V for all noncentral g ∈ GR (K) such that g p = 1. Here and below we use the shorthand XF for XR × F , where XR is an R-scheme and there is an implicit homomorphism R → F . Proof. This is essentially §3.4 in [Aul01], which we reproduce here for the convenience of the reader. Pick a split maximal torus TR in GR and a basis τ1 , . . . , τℓ of the lattice of cocharacters Gm → TR . Identifying the Lie algebra of Gm with k, the elements hj := dτj (1) make up a basis of the Lie algebra t of TR × Fp such that [p] hj = hj . This gives a bijection of toral elements in t with elements of order p in TK via X Y ψ: cj hj 7→ τj (ζ cj ) for cj ∈ Fp . The character lattices of TK and t are naturally identified; indeed there is a basis χ1 , . . . , χℓ such that χi (hj ) = δij and P χi ◦ τj : Gm → Gm is the P identity for Q i=j and trivial for i 6= j. Writing χ = P di χi , we P find that χ(ψ( cj hj )) = i ζ ci di , which is 1 in K if and only if χ( cj hj ) = ci di is 0 in k. Decomposing V as a sum of weight spaces relative to TR , we find that for toral x ∈ t, we have dim(Vk )x = dim(VK )ψ(x) . The centralizer in g of x and the centralizer in GK of ψ(x) contain Lie(Tk ) and TK , so their identity components are generated by that and the root subalgebras or subgroups corresponding to roots vanishing on x or ψ(x) respectively. As in the preceding paragraph, we find that the centralizers of x and ψ(x) have the same dimension, hence (a) x is central in g if and only if ψ(x) is central in GK and (b) dim xG = dim ψ(x)GK . The equivalence of (1) and (2) follows.  Example 4.2 (B2 , 11). Let G = Spin5 ∼ = Sp4 and take V to be the irreducible representation of dimension 12 (if char k = 5) or 16 (if char k 6= 5). It occurs as GENERICALLY FREE IRREDUCIBLE REPRESENTATIONS 7 a composition factor of the tensor product X of the two fundamental irreducible representations. In case char k = 5, we apply Lemma 3.1. One finds dim L = 1 and dim V L = 4, so V is not virtually free. We remark that in this case again Gv (k) = 1, so Gv is a nonzero infinitesimal group scheme. In case char k = 2, we verify that V is generically free for g using Magma as in §2. So assume char k 6= 2, 5. As X is self-dual, it is a direct sum of V and X/V , the natural representation of Sp4 . In this case we argue that V is virtually free by verifying (1.1). We get it for toral elements via Lemma 4.1, where we refer to the literature (in this case [GLL18]) for the corresponding result for Sp4 (C). A long root element x has a single Jordan block of size 2 on the natural module and 2 Jordan blocks of size 2 on the 5-dimensional module. Since char k 6= 2, x has partition (32 , 25 , 14 ) on X, so dim X x = 11. Since V /X is the 4-dimensional symplectic module, dim(V /X)x = 3, so dim V x = 8. As dim xG = 4, (1.1) is verified. For any other nilpotent, the closure of xG in sp4 contains a nilpotent with partition (2, 2), so dim V x ≤ 6; as dim xG ≤ 8, the inequality is verified. Example 4.3 (B3 , 101). Let G = Spin7 and take V to be the irreducible representation of dimension 40 (if char k = 7) or 48 (if char k 6= 7). It occurs as a composition factor of the tensor product X of the natural and spin representations. In case char k = 2 or 7, we construct the representation in Magma as in §2 and observe that it is generically free. So suppose char k 6= 2, 7. Then X is self-dual so it is a direct sum of V and X/V , the spin representation. As in the preceding example, we argue that V is virtually free by verifying (1.1) and we similarly are reduced to considering nonzero nilpotent x. For x with partition (32 , 1) on the natural representation, dim V x ≤ 22 and dim xG = 14. If x has partition (7) or (5, 12 ), then dim xG ≤ 18 and dim V x ≤ 22 (by specialization). A long root element x (partition (22 , 13 )), has dim xG = 8 and dim V x = 34. The remaining possibilities for x have partition (3, 22 ) or (3, 14 ), which have dim xG = 12 or 10 and by specialization dim V x ≤ 34. Example 4.4 (D4 , 1001). Consider the representation V of G = Spin8 with highest weight 1001. In case char k = 2, dim V = 48 and g acts with 1-dimensional kernel; we verify with Magma that V is virtually free for g. So suppose char k 6= 2, in which case dim V = 56. Writing Vi with i = 1, 2, 3 for the three inequivalent irreducible 8-dimensional representations, we find X := V1 ⊗ V2 ∼ = V ⊕ V3 . Lemma 4.1 verifies the inequality (1.1) for x toral. Suppose that x is nonzero nilpotent with dim xG < 23. Certainly dim V x ≤ dim V y for a root element y. Such a y has two Jordan blocks of size 2 on the Vi ’s, and so y acts on X with partition (34 , 217 , 118 ). Thus dim X y = 39 and dim V y = dim X y − dim V3y = 33, and the inequality is verified for x. We now divide into cases based on the partition of x on one of the Vi ’s. If x only has Jordan blocks of size at most 3, then dim xG < 21 and we are done by the previous paragraph. If x has two Jordan blocks of size 4, then dim V x < 16. If x has a Jordan block of size ≥ 5, then dim V x < 20. In either case, as dim xG ≤ 24, the inequality is verified. 8 S. GARIBALDI AND R.M. GURALNICK Example 4.5 (D5 , 20000). Consider the representation V of G = Spin10 with highest weight 20000 of dimension 126. If char k = 2, then 126 > b(G) and the inequality (1.1) holds for noncentral x ∈ g with x[2] ∈ {0, x} by [GG17a]. So assume char k 6= 2. For one of the half-spin representations X, the second symmetric power S 2 X is a direct sum of V and the natural 10-dimensional module. A root element x ∈ g has a 12-dimensional fixed space on X and so has 4 nontrivial Jordan blocks. On S 2 X, it has a fixed space of dimension 84 hence dim V x = 72. Therefore, for every nonzero nilpotent x ∈ g, we have dim V x ≤ 72 and of course dim xG ≤ dim G − rank G = 40, verifying the inequality. For noncentral toral x, the inequality is verified as in the preceding examples. Example 4.6 (C5 , 10000). Let now V be the irreducible representation of G = Sp10 with highest weight 10000. In case char k = 3, dim V = 122 and one checks using Magma that a generic vector has trivial stabilizer. So assume char k > 3, in which case dim V = 132. The inequality holds for noncentral toral elements by Lemma 4.1, so we verify the inequality for nilpotent elements of sp10 . Restricting to the Levi subgroup Sp8 , the representation decomposes as a direct sum of irreducibles X ⊕ Y ⊕ Y where dim X = 48 and dim Y = 42. Since char k > 3, X is a submodule of ∧3 k 8 with quotient k 8 . The restriction of Y to the Levi Sp6 in Sp8 is a direct sum of irreducibles Y ′ ⊕ Y ′ ⊕ Y ′′ where dim Y ′ = dim Y ′′ = 14, Y ′ is a submodule of ∧3 k 6 with quotient k 6 and Y ′′ is a submodule of ∧2 k 6 with quotient k. Using these decompositions, we find that a long root x ∈ sp6 ⊂ sp10 has dim V x = 90 and nilpotent y ∈ sp6 ⊂ sp10 with partition (4, 16 ) has dim V y = 19. In view of the fomer, it suffices to consider nilpotent z ∈ g such that dim CSp10 (z) ≤ 13 Such a z has a Jordan block of size at least 4 and so specializes to y. Then dim z Sp10 + dim V z ≤ 50 + 19, verifiying the inequality. 5. Example: symmetric squares and wedge squares Recall that k is assumed algebraically closed of characteristic p ≥ 0. Put gln (k) for the Lie algebra of n-by-n matrices with entries in k. We first note that, for x ∈ gln (k), CGLn (x) is the group of units in the associative k-algebra gln (k)x . Therefore, dim xGLn = dim [gln (k), x] and we have: Lemma 5.1. Let x ∈ gln (k). Then dim xGLn + dim gln (k)x = n2 .  Lemma 5.2. Let x ∈ gln = gl(V ) with x a regular nilpotent element. (1) The number of Jordan blocks of x on gl(V ) and V ⊗ V is n. If furthermore char k 6= 2, then (2) the number of Jordan blocks of x on Sym2 (V ) is n/2 for n even and (n+1)/2 for n odd; and (3) the number of Jordan blocks of x on ∧2 (V ) is n/2 if n is even and (n − 1)/2 if n is odd. Proof. As x is nilpotent, V and V ∗ are equivalent k[x]-modules, hence the number of Jordan blocks on V ⊗ V and gl(V ) is the same and is also independent of the characteristic by Lemma 5.1. If the characteristic of k is not 2, then V ⊗ V = Sym2 (V ) ⊕ ∧2 (V ). if we take x in characteristic 0 (over the integers) and reduce modulo the characteristic, we see that the number of Jordan blocks on each of GENERICALLY FREE IRREDUCIBLE REPRESENTATIONS 9 Sym2 (V ) and ∧2 (V ) can only increase in positive characteristic and so we have equality. Thus, we may assume that k has characteristic 0. In characteristic 0, we view V as a module under a principal SL2 and see that V ⊗V ∼ = L(n − 1) ⊗ L(n − 1) ∼ = L(2n − 2) ⊕ L(2n − 4) ⊕ · · · ⊕ L(0), proving (1). Examining the weights shows that ∧2 V ∼ = L(2n − 4) ⊕ L(2n − 8) ⊕ · · · , proving (3),  from which (2) follows. Lemma 5.3. Let x ∈ gln (k) = gl(V ) with k of characteristic p 6= 2. Assume that x has r1 Jordan blocks of even size and r2 Jordan blocks of odd size. Let s be the number of Jordan blocks of x on Sym2 (V ) and a the number of Jordan blocks on ∧2 (V ). Then s − a = r2 . Proof. Let J1 , . . . , Jm be the Jordan blocks for x. Then Ji ⊗ Jj for i < j occurs in both Sym2 (V ) and ∧2 (V ). The other terms are Sym2 (Ji ) on Sym2 (V ) and ∧2 (Ji ). Thus, the difference in the number of Jordan blocks on Sym2 (V ) and ∧2 (V ) is just the sum of the differences on Sym2 (Ji ) and ∧2 (Ji ) and the result follows by the previous lemma.  Put λ for the highest weight of the natural module of son , i.e., λ = ω⌊n/2⌋ . We can now show that son acts freely on L(2λ) in characteristic not 2 by proving that our standard inequality (1.1) holds. See [GG15, Example 10.7] or [GLL18, §4.1] for another proof that the generic stabilizer is an elementary abelian 2-group (as a group scheme). Lemma 5.4. Let g = son (k) = so(V ) with n ≥ 5 and k of characteristic p = 6 2. Set W = L(2λ). If x ∈ g is nonzero nilpotent or noncentral semisimple, then dim xG + dim W x < dim W . Proof. If x is semisimple, by considering weights on V , Sym2 (V ) and ∧2 (V ), we see that dim Sym2 (V )x − dim ∧2 (V )x = dim V x , using that p 6= 2. Since dim xG + dim ∧2 (V )x = dim G, we see that dim xG + dim Sym2 (V )x = dim G + dim V x = dim Sym2 (V ) − (dim V − dim V x ), which is at most dim Sym2 (V ) − 2, because the fixed space of x has codimension at most 2. Since L(2λ) is a summand of Sym2 (V ) as an x-module and x is trivial on a complement, the result follows. If x is nilpotent, we argue similarly using the previous lemma. We obtain that dim xG + dim Sym2 (V )x = dim Sym2 (x) − (n − r2 ). The result follows immediately if r2 < n − 2. If r2 = n − 2, then x has a single Jordan block of size 3 and all other blocks of 1. In particular, this implies that dim W x < dim Sym2 (V )x and the result follows.  6. Example: Vinberg representations Let G be an algebraic group over a field k and suppose θ ∈ Aut(G)(k) has finite order m not divisible by char k. Then θ gives a Z/m-grading g = ⊕i∈Z/m gi on the Lie algebra g of G (clear) and the sub-scheme G0 of fixed points is smooth by [Con14, Exercise 2.4.10]. In this section we will assume furthermore that G is semisimple simply connected, in which case G0 is connected reductive and can be described explicitly using the recipe in [Ste68, §8]. Representations (G0 , g1 ) arising in this way are sometimes called Vinberg representations or θ-groups. 10 S. GARIBALDI AND R.M. GURALNICK Lemma 6.1. Let T be a maximal torus in a simple algebraic group G over a field k. Then, (1) G has type Cn for some n ≥ 1 and char k = 2 or (2) for a generic t ∈ Lie(T ), the transporter {x ∈ Lie(G) | [x, t] ∈ Lie(T )} equals Lie(T ). Proof. Write x as a sum of an element x0 ∈ Lie(T ) and elements xα in the root subalgebra for each root α. Choose t ∈ Lie(T ) generic and suppose [x, t] ∈ Lie(T ), i.e., dα(t)xα = [xα , t] = 0 for all α. If (1) fails, then an exercise with roots as in [CR10, Lemma 2.13] shows that dα(t) 6= 0, proving that xα = 0, whence the claim.  Example 6.2 (m = 2). Suppose θ ∈ Aut(G)(k) has order 2 and acts on a maximal torus T via θ(t) = t−1 for t ∈ T , so Lie(T ) is contained in g1 . As char k 6= 2, the centralizer of a generic element in Lie(T ) in Lie(G) is just Lie(T ) which misses g0 , whence g0 acts virtually freely on g1 . More precisely, as a group scheme, the stabilizer of a generic element of Lie(T ) in G0 is the 2-torsion subgroup of T . In this way, if we pick a subgroup H of G0 , we conclude that h acts generically freely on g1 . We now consider examples where this applies; in each case a generic element of g1 is a regular semisimple element of g, see [RLYG12, §7] or [GLL18, §4.1]. (1): Take G to have type E6 and θ to be an outer automorphism so that G0 is the adjoint group PSp8 of type C4 , compare, for example, [GPT09, §5]. In that case, g0 = sp8 and g1 is the Weyl module with highest weight 1000 (the “spin” representation). If char k 6= 3 (and 6= 2), then the representation g1 is irreducible of dimension 42. If char k = 3, g1 has head the irreducible representation of dimension 41 and radical k = z(g). Let v be a regular semisimple element of Lie(T ) ⊂ g1 . The stabilizer in g0 = sp8 of the image of v in g1 /k transports v into z(g), and therefore belongs to Lie(T ) ∩ g0 = 0 by Lemma 6.1. In particular, sp8 acts generically freely on the irreducible representation g1 /k. (2): Take G to be E8 and θ to be such that G0 has type D8 . In this case, G0 is a half-spin group Spin16 /µ2 and g1 is the 128-dimensional half-spin representation. We conclude that it acts generically freely when char k 6= 2. (Regardless of char k, the generic stabilizer in G0 is (Z/2)4 × (µ2 )4 as a group scheme, see [GG17b, Th. 1.2].) (3): Take G to be E7 and θ to be such that G0 = SL8 /µ4 . In this case, g1 is the representation ∧4 k 8 , which is generically free for char k 6= 2. (We provide a stronger result in Prop. 7.1(1).) (4): Take G to be SLn with θ(g) = g −⊤ , so G0 = SOn and g1 is the Weyl module with head L(2λ) as in Lemma 5.4. The representation ∧3 k 9 of G0 = SL9 /µ3 arises also in this way when G = E8 and m = 3, see [VE78] for a detailed analysis of the orbits in the case char k = 0. A generic element of g1 is regular semisimple as an element of g as in the references in Example 6.2 ([GLL18] produces an explicit regular nilpotent element), and we find that sl9 acts generically freely on ∧3 k 9 . We will provide a stronger result below in Prop. 7.1(1). Remark 6.3. The setup above can be generalized to accomodate the case where char k divides m. Instead of an element θ ∈ Aut(G)(k), one picks a homomorphism of group schemes µm → Aut(G) defined over k. Again one obtains a Z/m-grading on g and an action of µm on G such that G0 is smooth. Some statements about the representation g1 of G0 from [Vin76] or [Lev09] do not hold in this generality. GENERICALLY FREE IRREDUCIBLE REPRESENTATIONS 11 For example, the representations from Example 6.2(2) and (3) with char k = 2 and ∧3 SL9 with char k = 3, are not virtually free. This can be seen by computationally verifying that Lemma 3.1 applies; in each of these three cases the stabilizer of a generic vector is a toral subalgebra whose dimension we list in Table 1. Alternatively, for x ∈ g1 , x[p] is in zg0 (x), so finding any x with x[p] not in the kernel of the representation (as is done in [Aul01, Prop. 4.8.2, 4.9.2]) suffices to show that the representation is not virtually free. For the spin representation of Sp8 , 2 is a special prime so is treated in [GG18]. 7. Example: 3rd and 4th exterior powers We now consider the representation ∧e (k n ) of SLn and its analogues for SOn and Spn . Whether or not such representations are virtually free has previously been considered in [Aul01] and elsewhere. We will check here the stronger condition of whether or not inequality (1.1) holds for x ∈ sln . Proposition 7.1. For the representation V := ∧e (k n ) of SLn and noncentral x ∈ sln with x[p] ∈ {0, x}, we have: (1) If (a) e = 3 and n ≥ 10; (b) e = 3, n = 9, and char k 6= 2, 3; (c) e = 4 and n ≥ 9; or (d) e = 4, n = 8, and char k 6= 2, then dim xSLn +dim V x < dim V and Lie(SLn /µgcd(e,n) ) acts generically freely on V . (2) If (a) e = 3, n = 9, and char k = 2, 3 or (b) e = 4, n = 8, and char k = 2, then dim xSLn + dim V x ≤ dim V . Proof. If x is noncentral toral, then we may find a nilpotent y in the closure of the Gm SLn orbit of x such that dim y SLn = dim xSLn and (automatically) dim V x ≤ dim V y [GG17a, Lemma 3.2]. Therefore, we may assume that x[p] = 0. If n > 16, then dim V = n3 > 2.25n2 ≥ b(SLn ), and (1.1) holds by [GG17a]. So suppose n ≤ 16. We calculate dim xSLn , which does not depend on char k, using the well known formulas from, for example, [LS12, p. 39]. For the other term in (1.1), dim V x , we view V as a representation of SL2 where a nilpotent element acts as x on V . Arguing as in [McN00, §3.4], we find that if char k > en, then the Jordan form of x acting on V is the same as in characteristic zero. Therefore, it suffices to check the inequality over Q and over Fp for 2 ≤ p < en. This is quickly done via computer. For the convenience of the reader, Table 4 lists the partitions corresponding to nilpotent x for which we have equality in (2). In case gcd(e, n) = 1, this shows that sln acts generically freely on ∧e k n ; when gcd(e, n) > 1, we verify that Lie(SLn /µgcd(e,n) ) acts generically freely using Magma.  partition of x dim xG dim V x (24 , 1) 40 44 (9) 72 12 (33 ) 54 30 4 ∧ sl8 2 (8) 56 14 (42 ) 48 22 (24 ) 32 38 Table 4. Complete list of nilpotent elements x from Proposition 7.1(2) where equality holds. representation char k ∧3 sl9 2 ∧3 sl9 3 12 S. GARIBALDI AND R.M. GURALNICK Trivectors and SOn . Consider now SOn with n ≥ 9. The representation ∧3 (k n ) is a fundamental Weyl module and it is irreducible representation if char k 6= 2, see for example [Jan03, II.8.21] and [McN00, Remark 3.4]. Proposition 7.2. For SOn with n ≥ 9 (over any field k) and V := ∧3 (k n ), the inequality (1.1) holds for all nonzero x ∈ son with x[p] ∈ {0, x}, and g acts generically freely on V . Proof. Under the tautological inclusion SOn ֒→ SLn , suppose the inequality holds for x viewed as an element of sln . Then as dim xSOn ≤ dim xSLn , the inequality holds also for x as an element of son , completing the proof in case n ≥ 10, or n = 9 and char k 6= 2, 3 (Prop. 7.1). So suppose n = 9 and char k = 2 or 3. Write y for the image of x in sln if x is nilpotent, and for the image of the nilpotent specialization of x as in the proof of Prop. 7.1 if x is toral. As in the previous paragraph, we are done if the inequality holds for y, and therefore we may assume that y has partition (24 , 1), (9), or (33 ) as in the first three lines of Table 4. In any of these cases, we have dim xSO9 + dim V x ≤ 32 + dim V y < 76, completing the proof.  When char k = 2, the representation ∧3 k 2ℓ of SO2ℓ is no longer irreducible, as the invariant alternating bilinear form generates a submodule. We now study the irreducible module L(ωℓ−2 ) with the same highest weight. Proposition 7.3. Suppose char k = 2 and ℓ ∈ {5, 6, 7}. For noncentral x ∈ so2ℓ with x[2] ∈ {0, x} and V := L(ωℓ−2 ), inequality (1.1) holds. Moreover, so2ℓ acts generically freely on V . Proof. Recall that dim L(ω3 ) = 100, 208, 336 for ℓ = 5, 6, 7 respectively [Lüb01]. Suppose first that x[2] = 0. As every Jordan block of x has size at most 2 and even blocks occur with even multiplicity, the element x has partition (22r , 12ℓ−4r ) for some 1 ≤ r ≤ ⌊r/2⌋ and dim xG ≤ 4r(ℓ − r) as in [GG17a, Example 9.5], so dim xG ≤ 24, 36, 48. For x a root element (i.e., r = 1), dim(∧3 k 2ℓ )y = 76, 146, 252 respectively, so the inequality holds for nilpotent x if dim xG < 24, 62, 84. We are reduced to considering the class x ∈ so10 with partition (24 , 12 ). Such an x has dim xG ≤ 24 and dim V x ≤ 64, verifying the inequality. Suppose now that x[2] = x, so as in the proof of [GG17a, Cor. 9.6] we have dim xG ≤ 24, 36, 48 respectively. We find a nilpotent y ∈ Gm Ad(SOn )x with dim(k n )y ≥ 2. Now ∧3 k n is self-dual, so we find that ∧3 k n ∼ = V ⊕ k n if n = 12 n n and V ⊕ k ⊕ k if n = 10, 14 as SOn -modules. (That the other component is k n or has composition factors k n , k n is clear from inspecting weight multiplicities, and that it is a direct sum in the latter case follows because Ext1SOn (k n , k n ) = 0 [Jan03, II.2.12(1)].) Therefore, as dim(∧3 k n )y ≤ 76, 146, 252 respectively, we have dim V x ≤ dim V y ≤ 72, 144, 248. Putting this together, we find dim xG + dim V x ≤ 96, 180, 296.  Trivectors and Sp2ℓ . The natural representation of Sp2ℓ has an invariant alternating bilinear form b. The subspace V (ωℓ−2 ) of ∧3 k 2ℓ spanned  by those v1 ∧v2 ∧v3 with b(vi , vj ) = 0 for all i, j is a submodule of dimension 2ℓ 3 − 2ℓ; it is the Weyl module with highest weight ωℓ−2 . It is irreducible, i.e., V (ωℓ−2 ) = L(ωℓ−2 ), if and GENERICALLY FREE IRREDUCIBLE REPRESENTATIONS 13 only if ℓ − 1 is nonzero in k; otherwise V (ωℓ−2 ) has socle the natural module k 2ℓ and head L(ωℓ−2 ) [PS83, Th. 2(i)]. Proposition 7.4. In the notation of the preceding paragraph, if (1) ℓ ≥ 5 and char k > 2; or (2) ℓ = 4 and char k > 3, then for V := V (ωℓ−2 ) or L(ωℓ−2 ), inequality (1.1) holds for all nonzero x ∈ sp2ℓ with x[p] ∈ {0, x}, and therefore sp2ℓ acts generically freely on V .  Proof. If ℓ > 6, then dim V (ωℓ−2 ) ≥ dim L(ωℓ−2 ) ≥ 2ℓ 3 − 4ℓ > b(Sp2ℓ ), and the conclusion holds by the results of [GG17a]. So suppose ℓ = 4, 5, or 6. First suppose that x ∈ sp2ℓ has x[p] = 0. If ℓ = 5 or 6, we have dim L(ωℓ−2 )x ≤ dim V (ωℓ−2 )x ≤ dim(∧3 k 2ℓ )x and one checks that dim xSp2ℓ + dim(∧3 k 2ℓ )x < dim L(ωℓ−2 )x , which need only be done for small characteristics as in the proof of Proposition 7.1 and therefore amounts to a computer calculation. If ℓ = 4 (and char k > 3), then ∧3 k 8 is a direct sum of V and k 8 , so dim V x = dim(∧3 k 8 )x − dim(k 8 )x and the same computer calculations verify (1.1). For V (ωℓ−2 ) and x toral, we appeal to Lemma 4.1. Thus we are reduced to the case ℓ = 6, k = F5 , V = L(ω4 ), and x[p] = x. One can construct the Lie algebra g := sp12 and the Weyl module V (ωℓ−2 ) in Magma. Certainly Lie(CG (x)) = zg (x) = ker(ad(x)), and as CG (x) is smooth we find that dim xG = dim(im ad(x)). For the other term in (1.1), x acts semisimply on V (ω3 ), so dim L(ωℓ−2 )x = dim(∧3 k 12 )x − 2 dim(k 12 )x . Using these expressions, the computer can immediately verify the inequality for all toral x in a maximal toral subalgebra of g.  8. Proof of Theorem A In this section, we adopt the hypotheses of Theorem A and deduce it from what has gone before. Recall that V is assumed to be restricted and irreducible for G, hence irreducible for g [Ste63]. The main result of [GG17a] allows us to assume that G has type Aℓ , Bℓ , Cℓ or Dℓ of bounded ℓ as in §1 and that dim V ≤ b(G) for b(G) as in Table 3. Therefore, V appears in tables A.6–A.48 in [Lüb01].1 (Note that the search space remains infinite: while there are only finitely many possibilities for G and for the highest weight of V , we have not exhibited any upper bound on char k.) We aim to show that V is virtually free as a representation of g if and only if dim V > dim G and (G, char k, V ) does not appear in Table 1. If dim V < dim G − dim z(g), then certainly g cannot act virtually freely on V . If dim G ≥ dim V ≥ dim G − dim z(g), then examining the tables shows that V is the irreducible representation with highest weight the highest root, which is not virtually free as in [GG17a, Example 13.2]. Therefore we assume for the rest of this section that dim V > dim G. 1For A 18 and A19 , we refer to the extended table available on his webpage at http://www. math.rwth-aachen.de/~Frank.Luebeck/chev/WMSmall/A18-130321.html 14 S. GARIBALDI AND R.M. GURALNICK Type A. For Aℓ with ℓ = 16, 17, 18, 19, there are no restricted irreducible representations of dimension between dim G and b(G), according to Lübeck’s tables. Thus we are reduced to considering 3 ≤ ℓ ≤ 15. Proposition 7.1 treats the representations ∧3 SLℓ+1 and ∧4 SLℓ+1 , apart from a few cases. For ∧3 SL9 when char k = 2, sl9 acts generically freely on V by [Aul01, Prop. 4.8.3], by reasoning as in §6, or as can be checked in Magma, despite the failure of inequality (1.1). The representations ∧3 SL9 when char k = 3 or ∧4 SL8 when char k = 2 are not virtually free, see Remark 6.3. We refer to [Gue97, Th. 4.3.2] for the representation of Aℓ (3 ≤ ℓ ≤ 9) with highest weight 0 · · · 011 with char k = 3 (Claim 12 on p. 97 of ibid., or check with Magma); of Aℓ (2 ≤ ℓ ≤ 9) with highest weight 0 · · · 03 (and char k > 3 so it is restricted); of A3 with highest weight 004 and dimension 35; of A3 with highest weight 102 and char k 6= 5; of A2 with highest weight 04 and dimension 15; and of A2 with highest weight 13 or 22 with char k = 5. We refer to [Aul01] to see that the following are virtually free: the representation of Aℓ (ℓ = 3, 4, 5) and char k 6= 3 with highest weight 0 · · · 011 (§4.5); the representation of A2 with highest weight 12 and dimension 15 when char k 6= 2 (§4.1); the representation of A3 with highest weight 102 and dimension 32 when char k = 5 (§4.2); the representation of A4 with highest weight 0101 and dimension 40 or 45 (§4.6); the representation of A4 with highest weight 0200 and dimension 45 or 50 when char k 6= 2 (§4.7); the representation of A4 with highest weight 0110 and dimension 51 when char k = 3 (§4.4); and the representation of A5 with highest weight 01001 and dimension 78 when char k = 5 (§4.6). The representation of A3 with highest weight 020 and char k 6= 2 is the representation S 2 (k 6 ) of so6 , and the inequality holds by Lemma 5.4. Types B and D. For G of type Dℓ with 4 ≤ ℓ ≤ 11 or Bℓ with 2 ≤ ℓ ≤ 11 and char k 6= 2, the representation with highest weight 0 · · · 02 is handled by Lemma 5.4. The half-spin representations of Bℓ for 7 ≤ ℓ ≤ 11 and Dℓ for ℓ = 9, 10, 11 (corresponding to Spinn for n = 15 and 17 ≤ n ≤ 23) are virtually free but for D8 it has generic stabilizer (Z/2)4 × µ42 as a group scheme, so it is virtually free in when char k 6= 2 and is not virtually free when char k = 2 [GG17b]. The representation ∧3 (k n ) of SOn with n = 9, . . . , 13 (i.e., B4 , B5 , B6 , D5 , D6 ) with char k 6= 2 is virtually free by Proposition 7.2. The representations of B2 with highest weight 11 and B3 with highest weight 101 are handled in Examples 4.2 and 4.3. The representation of B3 with highest weight 200 and dimension 35 appears as a summand in S 2 X for X the (8-dimensional spin representation); we have S2X ∼ = V ⊕ k. The action on V factors through the action of D4 as in Lemma 5.4, whence we have the inequality for V . Similarly the representation of B4 with highest weight 2000 and dimension 126 is virtually free because it factors through the virtually free representation of D5 as in Example 4.5. We refer to [Gue97, Th. 4.3.3] for the representations of B4 with highest weight 1001 and dimension 112 or 128; of B3 with highest weight 011 and dimension 63 and char k = 3; of B3 with highest weight 110 and dimension 64 and char k = 5; of B2 with highest weights 30, 12, 03, or 21. The representation of D4 with highest weight 1001 has dimension greater than dim D4 and is virtually free as in Example 4.4. GENERICALLY FREE IRREDUCIBLE REPRESENTATIONS 15 For the representation of D5 with highest weight 10001 of dimension 144 with char k 6= 2, 5, [Gue97, Th. 4.3.5] proves it is virtually free. If char k = 2, that representation has dimension 144 > b(G) and the inequality holds. If char k = 5, one checks with Magma that a random vector has zero-dimensional stabilizer. The representation with highest weight 0 · · · 0100 of Dℓ for ℓ = 5, 6, 7 and char k = 2 is virtually free by Prop. 7.3. The representation of D5 with highest weight 20000 of dimension 126 is virtually free by Example 4.5. Type C. Type C is similar to types B and D. The only case for which we refer to [Gue97] is type C3 with highest weight 011 of dimension 50 with char k = 3 (Th. 4.3.4), which can also be checked using Magma. The representations ∧30 (Sp2ℓ ) with ℓ = 4, 5, 6 and char k not dividing ℓ − 1 or C6 with highest weight 000100 are generically free by Proposition 7.4. For C4 with highest weight 0100 and dimension 40 in characteristic 3, see Example 3.2. The representation of C5 with highest weight 10000 is generically free by Example 4.6. We use Magma to verify that a random vector has trivial stabilizer when char k = 3 for C5 with highest weight 01000 and dimension 121. The remaining representation V of C4 with highest weight 1000, which was treated in Example 6.2. It has dim V > dim C4 and V is generically free. 9. Proof of Theorem B In this section we will prove Theorem B. Lemma 9.1. Let G be a simple algebraic group. For every dominant weight λ 6= 0, i i g acts virtually freely on L(λ) ⊗ L(λ)[p] and L(λ) ⊗ (L(λ)∗ )[p] for all i > 0. Proof. Suppose first that G = SLn and L(λ) is the natural module. The representation dρ of sln on V is equivalent to a direct sum of n copies of the natural module, i.e., is equivalent to sln acting on n-by-n matrices by left multiplication. A generic matrix v is invertible, so the generic stabilizer (sln )v is zero. (We remark that the group SLn has finitely many orbits on P(V ) [GLMS97, Lemma 2.6].) Otherwise, the representation factors through SL(L(λ)), and the previous paragraph shows that sl(L(λ)) acts generically freely.  Note that, in the lemma, the inequality (1.1) need not hold. Specifically, a root element x ∈ sln has dim xSLn = 2(n − 1) and kernel of dimension n − 1 on the natural module, so we find dim xSLn + dim V x = dim V + n − 2 for V a sum of n copies of the natural module. Example 9.2. Consider now SOn for n ≥ 3 and suppose that char k 6= 2 or n is even. Take V to be a direct sum of n − 1 copies of the natural module V0 . Let v ∈ V be a vector each of whose n − 1 components is a generic element of V0 ; in particular, the SOn -invariant quadratic form q is nonzero on each component of v. The n − 1 components generate a codimension 1 subspace U of V0 on which the bilinearization of q is nondegenerate if char k 6= 2 or has a 1-dimensional radical on which q does not vanish if char k = 2. In either case, an element of son that annihilates U is zero on V0 , hence son acts generically freely on V . (See [BGS17] for more general arguments in a similar vein.) 16 S. GARIBALDI AND R.M. GURALNICK Proof of Theorem B. Adopt now the hypotheses of Theorem B. Note that p := char k 6= 0 because when char k = 0 irreducible representations P are tensor indecomposable. We may write the highest weight of V as λ = λ0 + i>0 pi µi where λ0 and each µi is a restricted dominant weight. Since char k is not special for G, the statement that V is tensor decomposable means that at least two of these weights are nonzero [Sei87, 1.6]. If λ0 = 0, then V is a Frobenius twist of an irreducible representation and g acts P trivially, so V is virtually free. So assume λ0 6= 0. Then λ = λ0 + pλ1 for λ1 := i>0 pi−1 µi 6= 0 and V ∼ = L(λ0 ) ⊗ L(λ1 )[p] . As g acts [p] trivially on L(λ1 ) , the representation V of g is the same as a sum of dim L(λ1 ) copies of L(λ0 ). Let m(G) be the dimension of the smallest nonzero restricted irreducible representation of G. If dim L(λ0 ) > b(G)/m(G) for b(G) as in Table 3, then dim V > b(G) and g acts virtually freely on V by part I. If dim L(λ0 ) = m(G), then V contains L(λ0 ) ⊗ L(λ0 )[p] as a summand, and we are done by Lemma 9.1. Therefore, it remains to inspect ⊕m(G) L(λ0 ) for those nonzero restricted dominant weights λ0 with m(G) < dim L(λ0 ) ≤ b(G)/m(G), the list of which may be extracted from the tables in [Lüb01]. For G2 , the tables show there are no λ0 to be inspected. For the other exceptional groups, m(G) > b(G)/m(G). Thus the theorem is proved for all exceptional types. Types B, C, and D. With type Cℓ for ℓ ≥ 2, m(G) = 2ℓ, so b(G)/m(G) = 3ℓ and the unique reduced irreducible representation of dimension in the target range is C2 where L(λ0 ) is the 5-dimensional fundamental irreducible representation, i.e., g is sp4 acting on four copies of the 5-dimensional module and so a generic stabilizer in sp4 is the annihilator of a 4-dimensional space. We are not in characteristic 2, so generically this is non-degenerate but if something kills a non-degenerate 4-space it preserves the orthogonal complement and so also the entire 5-dimensional space (since the trace is 0) and so a generic stabilizer is central. For type Dℓ with ℓ ≥ 4, m(G) = 2ℓ. The unique dominant weight λ0 that must be considered is for type D5 with char k 6= 2 and L(λ0 ) a half-spin representation. One checks that for regular x ∈ spin10 , dim L(λ0 )x < 12, so (1.1) holds. On the other hand, for non-regular and noncentral x ∈ spin10 , dim L(λ0 )x ≤ 12 by [GG17b, Prop. 2.1(i)] and again (1.1) holds, completing the proof of the theorem for type D. For type Bℓ with ℓ ≥ 2, m(G) = 2ℓ+1. The only λ0 to be considered is B3 where L(λ0 ) is the 8-dimensional spin representation. In this case, the representation factors through Spin8 as a vector representation, and we apply Example 9.2 to see that the generic stabilizer in so8 is trivial and therefore the same is true for spin7 . Type A. For type Aℓ with ℓ ≥ 1, we will verify that (1.1) holds for x ∈ slℓ+1 with x[p] = 0. This will imply that the inequality also holds for noncentral toral x as in the proof of Proposition 7.1, whence the claim. For type A1 , L(λ0 ) is virtually free unless λ0 = 1 or 2 [GG17a, Example 1.4] so we need only consider V = L(2) ⊕ L(2) when char k ≥ 3, i.e., where V is a sum of two copies of the adjoint representation. For x nonzero nilpotent we have dim xSLn = 2 and dim L(2)x = 1, so (1.1) holds. For ℓ ≥ 2, we again refer to [Lüb01] to enumerate the weights λ0 such that ℓ + 1 < dim L(λ0 ) ≤ b(G)/(ℓ + 1), yielding three cases to be checked: (i) A2 , where char k 6= 2 and L(λ0 ) = S 2 (k 3 ); GENERICALLY FREE IRREDUCIBLE REPRESENTATIONS 17 (ii) A3 , where L(λ0 ) = ∧2 (k 4 ); and (iii) A4 , where char k 6= 2 and L(λ0 ) = ∧2 (k 5 ). We write the details of the verification in the most complicated case, (iii). For x ∈ sl5 a root element, i.e., nilpotent with partition (2, 13 ), we have dim xG = 8 and dim L(λ0 )x = 7, and 8 + 5 · 7 = 43 < 50. For x nilpotent with partition (2, 2, 1), we have dim xG = 12 and dim L(λ0 )x = 6, and 12 + 5 · 6 = 42 < 50. For x nilpotent with partition (3, 12 ), we have dim L(λ0 )x = 4 and dim xG ≤ dim G − rank G = 20. Consequently, for every nilpotent y ∈ sl5 such that x ∈ Ad(G)y, we have: dim y G + dim V y ≤ (dim G − rank G) + m(G) · dim L(λ0 )x < dim V. Thus we have verified the inequality (1.1) for every nonzero nilpotent in sl5 . For cases (i) and (ii) respectively, the role of (3, 12 ) is instead played by the smallest class xG such that dim L(λ0 )x < dim L(λ0 ) − (dim G − rank G)/m(G), where the right side is 4 or 3 respectively.  References [AP71] E.M. Andreev and V.L. Popov, Stationary subgroups of points of general position in the representation space of a semisimple Lie group, Functional Anal. Appl. 5 (1971), no. 4, 265–271. [Aul01] A. Auld, Exceptional modular representations of special linear Lie algebras, Ph.D. thesis, University of Manchester, February 2001. [AVE68] E.M. Andreev, E.B. Vinberg, and A.G. Elashvili, Orbits of greatest dimension in semi-simple linear Lie groups, Funct. Anal. Appl. 1 (1968), 257–261. [BCP90] W. Bosma, J. Cannon, and C. Playoust, The Magma algebra system I: the user language, J. Symbolic Computation 9 (1990), 677–698. [BGS17] T. Burness, R. Guralnick, and J. Saxl, On base sizes for algebraic groups, J. Eur. Math. Soc. (JEMS) 19 (2017), no. 8, 2269–2341. [BRV10] P. Brosnan, Z. Reichstein, and A. Vistoli, Essential dimension, spinor groups, and quadratic forms, Ann. of Math. (2) 171 (2010), no. 1, 533–544. [Con14] B. Conrad, Reductive group schemes, Autour des Schémas en Groupes I, Panoramas et synthèses, vol. 42–43, Société Mathématique de France, 2014. [CR10] P.-E. Chaput and M. Romagny, On the adjoint quotient of Chevalley groups over arbitrary base schemes, J. Inst. Math. Jussieu 9 (2010), no. 4, 673–704. [Èla72] A. G. Èlašvili, Canonical form and stationary subalgebras of points in general position for simple linear Lie groups, Funkcional. Anal. i Priložen. 6 (1972), no. 1, 51–62. [GG15] S. Garibaldi and R.M. Guralnick, Simple groups stabilizing polynomials, Forum of Mathematics: Pi 3 (2015), e3 (41 pages). , Generically free representations I: Large representations, November 2017, [GG17a] arxiv:1711.05502. [GG17b] , Spinors and essential dimension, Compositio Math. 153 (2017), 535–556, with an appendix by A. Premet. [GG18] , Generically free representations III: Exceptionally bad characteristic, January 2018, arxiv:1801.06915. [GLL18] R.M. Guralnick, R. Lawther, and M. Liebeck, Generic stabilizers for actions of simple algebraic groups, in preparation, 2018. [GLMS97] R.M. Guralnick, M.W. Liebeck, D. Macpherson, and G.M. Seitz, Modules for algebraic groups with finitely many orbits on subspaces, J. Algebra 196 (1997), 211–250. [GPT09] S. Garibaldi, R. Parimala, and J.-P. Tignol, Discriminant of symplectic involutions, Pure Applied Math. Quarterly 5 (2009), no. 1, 349–374. [Gue97] M. Guerreiro, Exceptional representations of simple algebraic groups in prime characteristic, Ph.D. thesis, University of Manchester, 1997, arxiv:1210.6919. 18 [Hum67] S. GARIBALDI AND R.M. GURALNICK J.E. Humphreys, Algebraic groups and modular Lie algebras, Memoirs of the American Mathematical Society, No. 71, American Mathematical Society, Providence, R.I., 1967. [Jan03] J.C. Jantzen, Representations of algebraic groups, second ed., Math. Surveys and Monographs, vol. 107, Amer. Math. Soc., 2003. [Kar10] N. Karpenko, Canonical dimension, Proceedings of the International Congress of Mathematicians 2010, World Scientific, 2010. [Lev09] P. Levy, Vinberg’s θ-groups in positive characteristic and Kostant-Weierstrass slices, Transform. Groups 14 (2009), no. 2, 417–461. [LMMR13] R. Lötscher, M. MacDonald, A. Meyer, and Z. Reichstein, Essential dimension of algebraic tori, J. Reine Angew. Math. 677 (2013), 1–13. [Löt13] R. Lötscher, A fiber dimension theorem for essential and canonical dimension, Compositio Math. 149 (2013), no. 1, 148–174. [LS12] M. Liebeck and G. Seitz, Unipotent and nilpotent classes in simple algebraic groups and Lie algebras, Math. Surveys and Monographs, no. 180, Amer. Math. Soc., 2012. [Lüb01] F. Lübeck, Small degree representations of finite Chevalley groups in defining characteristic, LMS J. Comput. Math. 4 (2001), 135–169. [McN00] G.J. McNinch, Semisimplicity of exterior powers of semisimple representations of groups, J. Algebra 225 (2000), 646–666. [Mer13] A. Merkurjev, Essential dimension: a survey, Transform. Groups 18 (2013), no. 2, 415–481. [Pop88] A.M. Popov, Finite isotropy subgroups in general position of simple linear Lie groups, Trans. Moscow Math. Soc. (1988), 205–249, [Russian original: Trudy Moskov. Mat. Obschch. 50 (1987), 209–248, 262]. [PS83] A.A. Premet and I.D. Suprunenko, The Weyl modules and the irreducible representations of the symplectic group with the fundamental highest weights, Comm. Algebra 11 (1983), no. 12, 1309–1342. [PV94] V.L. Popov and E.B. Vinberg, Invariant theory, Encyclopedia of Mathematical Sciences, vol. 55, pp. 123–284, Springer-Verlag, 1994. [Rei10] Z. Reichstein, Essential dimension, Proceedings of the International Congress of Mathematicians 2010, World Scientific, 2010. [RLYG12] M. Reeder, P. Levy, J.-K. Yu, and B.H. Gross, Gradings of positive rank on simple Lie algebras, Transform. Groups 17 (2012), no. 4, 1123–1190. [Sei87] G.M. Seitz, The maximal subgroups of classical algebraic groups, Mem. Amer. Math. Soc. 67 (1987), no. 365. [Ste63] R. Steinberg, Representations of algebraic groups, Nagoya Math. J. 22 (1963), 33–56, [= Collected Papers, pp. 149–172]. , Endomorphisms of linear algebraic groups, Mem. Amer. Math. Soc. 80 [Ste68] (1968), 1–108, (= Collected Papers #23). [VE78] E.B. Vinberg and A.G. Elashvili, A classification of the three-vectors of ninedimensional space, Trudy Sem. Vektor. Tenzor. Anal. 18 (1978), 197–233. [Vin76] E.B. Vinberg, The Weyl group of a graded Lie algebra, Math. USSR Izv. 10 (1976), 463–495.
4math.GR